Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages
نویسندگان
چکیده
The Hagelin M-209 portable encryption device was used by the US Army in World War II and the Korean War, as well as by other armies and in embassy settings. In this paper, we present a fully automated computerized known-plaintext attack, based on hillclimbing and a novel fitness function – the Aggregate Displacement Error. In our performance evaluation we show that we are able to recover key settings for messages as short as 50 characters. To validate our results, we solved several publicly available challenge messages, including a message with only 40 letters.
منابع مشابه
Ciphertext-only cryptanalysis of Hagelin M-209 pins and lugs
The Hagelin M-209 was a mechanical encryption device used by the US Army during World War 2 and the Korean War, as well as by other armies and in embassy settings. In this paper, we present a 4-stage hillclimbing algorithm for recovering the full key settings from ciphertext only. The two first stages are based on a divide-and-conquer approach developed by Geoff Sullivan. In our performance eva...
متن کاملAutomated Cryptanalysis
Classical ciphers are used to encrypt plaintext messages written in a natural language in such a way that they are readable for sender or intended recipient only. Many classical ciphers can be broken by brute-force search through the key-space. One of the pertinent problems arising in automated cryptanalysis is the plaintext recognition. A computer should be able to decide which of many possibl...
متن کاملAutomated Cryptanalysis of Classical Ciphers
Classical ciphers are used to encrypt plaintext messages written in a natural language in such a way that they are readable for sender or intended recipient only. Many classical ciphers can be broken by brute-force search through the key-space. Methods of artificial intelligence, such as optimization heuristics, can be used to narrow the search space, to speed-up text processing and text recogn...
متن کاملCryptanalysis of the EPBC Authenticated Encryption Mode
A large variety of methods for using block ciphers, so called ‘modes of operation’, have been proposed, including some designed to provide both confidentiality and integrity protection. Such modes, usually known as ‘authenticated encryption’ modes, are increasingly important given the variety of issues now known with the use of unauthenticated encryption. In this paper we show that a mode known...
متن کاملModern breaking of Enigma ciphertexts
Breaking German Army Ciphers” is the title of a Cryptologia article from 2005, describing the lucky survival of several hundred authentic Enigma messages of World War II, and an account of a ciphertext-only cryptanalysis of a large number of these messages, leaving only a few, mostly short messages, unbroken. After reviewing the work done, and investigating the reasons for both lucky breaks and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Cryptologia
دوره 40 شماره
صفحات -
تاریخ انتشار 2016