Do-It-Yourself Electronic Enigma Machine 213
Radio Shack Robot writes "The Enigma-E is a DIY Building Kit that enables you to build your own electronic variant of the famous Enigma coding machine that was used by the German army during WWII. It works just like a real Enigma and is compatible with an M3 and M4 Enigma as well as the standard Service Machines. A message encrypted on, say, a real Enigma M4 can be read on the Enigma-E and vice versa."
What's the point? (Score:5, Interesting)
Original Messages (Score:5, Interesting)
I wonder if there is anywhere to get original Nazi Enigma messages to decode.
Electronic Version? Why not just use software (Score:5, Interesting)
Maybe I don't understand WWII fandom, but I understand geekfandom, and if you're going to build something that used to be a gear device, I don't wanna emulate it on my dreamcast.
Now what would be cool is to build the vacuum tube based machine the allies used to crack various codes...
How does it work ?? (Score:4, Interesting)
Enigma worked by looking like nonsense (Score:5, Interesting)
An Enigma-based crypto engine for binary data might be quite the interesting modern update. Especially because a brute force guessing of a 256-byte wheel would take a long time, and three wheels on top of each other would send the probablities of guessing your way into it into the stratosphere.
Re:Enigma worked by looking like nonsense (Score:3, Interesting)
An Enigma-based crypto engine for binary data might be quite the interesting modern update. Especially because a brute force guessing of a 256-byte wheel would take a long time, and three wheels on top of each other would send the probablities of guessing your way into it into the stratosphere.
Granted Enigma encryption is weak by today's standards, I think this would be interesting nonetheless. But with today's hardware, we could add arbitrarily many rotors (wheels) with negligible speed difference. I am sure even a thousand rotors would not be slow, but it would make for a stronger cipher.
Enigma cracking: Circa 2004 (Score:3, Interesting)
Re:Enigma worked by looking like nonsense (Score:5, Interesting)
Then again, what better way to remind people that longer keys equals more power?
Re:Enigma cracking: Circa 2004 (Score:4, Interesting)
If an e-mail message were to be encoded using Enigma, does there exist any modern-era software for cracking it? Or would the US Government be forced to pull out the vacuum tubes and crack it the way they did in WWII again?
I doubt that a cracking program would have the Enigma algorithm built-in, but Enigma is suceptible to a type of brute force attack. Generally you can do heuiristic analysis on a cipher to get a good head start, then brute force a smaller subset of the data. On modern hardware this would probably take a few seconds, if that long.
Re:What's the point? (Score:4, Interesting)
2. educational purposes
3. more tangible interface than multi-tasking keyboard/mouse + monitor
4. hobbyist mentality
5. nostalgia to pre-PC era
there are ways to achieve the same result, and obviously some people prefer harder and more time-consuming way. Also for some people writing code may take more time than building a DIY kit. some people prefer to drive 67 mustang than 03 accord or mercedes. others ride a bicycle.
Re:What's the point? (Score:5, Interesting)
Steve Ciarcia of Circuit Cellar [circuitcellar.com] fame once said "Soldering iron is my favorite computer language."
Well, it's mine too. For those who don't know who Steve is, there was this magazine on the newstands that was really cool to read and it was called "Byte" [byte.com]. Steve ranked up there with the Woz for hardware crafting.
I remember back in the day when you would go to the store and it was the only computer magazine there.
If you like crafting hardware, you can have a lot of fun by finding a library (most likely university) that has the back issues shelved somewhere.
Yes, I'm older than most of you here.
This is an interesting... (Score:4, Interesting)
An interesting piece of history...
Re:What's the point? (Score:5, Interesting)
Re:Enigma cracking: Circa 2004 (Score:4, Interesting)
Enigma encryption might have been a great leap ahead and looked completely state of art in the WW2, but today, it's quite trivial to crack. Enigma could be easily bruteforced - just check through the entire keyspace.
It also probably wouldn't stand too long if real crypto breakers who knew their stuff would start their job without knowing anything about the encryption scheme, even. The science has gone so far in recent times.
And an easy way to illustrate: Compare output from Enigma with any modern cipher. Enigma output looks like completely mangled words - the text is garbled, the layout of the message is exposed. Modern cipher output looks like a completely random arrangement of bits, everything completely spread around the message with no point to really take a good grip on. With Enigma, if you know that Nazi guy is always putting "Heil Hitler" at the end, you have already cracked that much of the message.
If the thing looks trivial, then it probably is. If it doesn't, it probably isn't. Of course, this isn't always true [schneier.com] in either way [interhack.net].
Now I'll get more coffee so I can start making sense today.
Re:Enigma worked by looking like nonsense (Score:2, Interesting)
The thing is, in modern crytography we simply don't need a rotor. A rotor system could be made very complicated indeed and complication is not good for security. Most ciphers use a static substitution as their non-linear step because when designing a cipher we want it to be simple to analyse.
That might sound counter-intuative but think about it. If I can prove my cipher can withstand attacks A,B & C then that's a bonus. If your cipher is too complicated to build proofs of security against attacks A, B & C we can't be sure it's secure against them.
This is why most modern ciphers are fairly simple designs but due to this simplicity, we have a huge weight of analysis behind them.
Simon.
Level of difficulty (Score:5, Interesting)
Re:Level of difficulty (Score:5, Interesting)
output of enigma1 was input into enigma2 then transmitted.
there was a couple of accounts from some of the higher up officials that eluded to that this was a practice that was used near the end of the war for really important things.
Re:Enigma worked by looking like nonsense (Score:2, Interesting)
The problem with Enigma was that Enigma was unbreakable and if its unbreakable you don't have to bother with all this singals discipline. Some operators were allowed to select their own 'random' message keys (thus the code breakers became experts on German swearwords!)
I'd guess machine was probably already set up and the other end was having problems decrypting
Re:Too late (Score:5, Interesting)
In a similiar situation, one time pad encoded transmissions by Allied and Soviet spies during and after WW2 were dual encoded, first each word was encoded from plain text into a 4 digit number, and from there added to the onetime pad. This ended up with a situation where you could break the one time pad cyphers due to sloppy reuse of the pads on the soviet part, but then you had the task of matching up the numbers to words using a code book you can never see. Its not as easy as people make it out to be, less than 1% of all Venona traffic captured was ever broken, and then most were only broken by a word, thus useless.
You mean like this? (Score:3, Interesting)
The bombe [demon.co.uk] was the first significant such electo-mechanical device used by the allies. Based on the Polish Bomba, incidentally.
Later they turned to Colossus [codesandciphers.org.uk], thought by many to be the first true computer.
Both are being rebuilt at Bletchely Park by a team of volunteers. Very cool, in my opinion.
Re:Enigma worked by looking like nonsense (Score:5, Interesting)
Like many cryptographics systems, it was not beaten soley by technology. Human factors also played a factor. The Germans believed so much in the technology that they did not address the humans as much.
The Luftwaffe messages were consistently broken because they did stupid things. Some operators sent the same propaganda message at the same time every day. Part of the setting for every message was for the operator to choose a random message specific key. Lazy operators used the same key over and over again.
The Navy was more careful but humans also foiled the system. Instead of letting the operators choose a message key, they had a code book for the choosing the key and a code book for the other settings. All code books were printed on paper that disintegrated in water. One of the duties of a UBoat captain was to toss the books and the machine into the sea if they had to abandon ship or were about to be captured. One captain who hit a mine and abandoned his ship went back not to destroy the machine or the books but to get his treasured poems. The British captured a machine but more important the code books.
Colossus (Score:3, Interesting)
Re:Enigma worked by looking like nonsense (Score:2, Interesting)
During the cold war some soviet spy's would use an encryption scheme where a single bit of the key would decrypt a single bit of the message, after decryption the bits of the key that were used to decrypt were thrown away. The key had to be huge and it could only be used for a certain number of messages. That type of encryption is called a one time pad, it's nearly impossible to break. The common encryption schemes today like RSA or DES go for reusable keys but you still need to switch your key's every so often.
Generally the idea is to make the key as large as possible. There will always be a cap in how large one can go. Limitations in computing power can make the time needed to decrypt a message with a large key unacceptable. Maybe the key needs to fit onto some ealy concealable physical medium, or maybe it needs to be remembered. The idea is to acertain your upper limit and use keys that are that length. Keep in mind that 256,000 bytes is only 250 MB, without compression I can fit 3 of those on a CD.
Re:Enigma cracking: Circa 2004 (Score:4, Interesting)
I implemented an Enigma-cracking program when I was trying to crack the codes in Simon Singh's Cipher Challenge presented in The Code Book. It was a great deal of fun, and required just the right mix of learning, hacking and debugging to accomplish. Eventually I cracked 7 out of 10 of the ciphers (all the ones I expected to be within reasonable grasp).
The first difficulty was finding a sufficiently detailed description of the Enigma machine itself, so that I could write a simulator. Eventually I found a fairly good description of the machine, and some cleartext/ciphertext pairs to try it against. Initially there was a minor problem, which I eventually submitted as a plea to a newsgroup and received a quick response from an eGroup member as to the bug. Voila! A working simulator.
I took advice from Jim Gillogly and his cipher text only break [fortunecity.com] of the Enigma machine. I suspected the final text would be German, so I built a table of trigraph frequencies from Goethe's Faust, which I downloaded from Project Gutenberg. I then coded up a simple hill climbing algorithm which proceeded by Scanning all possible rotor orders (six of them) and all possible rotor positions (26^3), looking for the text with the trigraph score, and then refining that by hillclimbing by redoing the plugboard.
It worked the very first time: out popped the flawless decrypt in less than three minutes on my old 133Mhz P5.
Singh's challenge was signficantly aided by the fact that his ciphertext was quite a bit longer than the recommended message length that was actually used in the War. My experience in trying to crack shorter messages was that the statistics used to guide the search were often unreliable, and the likelihood of getting a successful automatic decrypt were quite a bit lower.