Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages

نویسندگان

  • George Lasry
  • Nils Kopal
  • Arno Wacker
چکیده

The Hagelin M-209 portable encryption device was used by the US Army in World War II and the Korean War, as well as by other armies and in embassy settings. In this paper, we present a fully automated computerized known-plaintext attack, based on hillclimbing and a novel fitness function – the Aggregate Displacement Error. In our performance evaluation we show that we are able to recover key settings for messages as short as 50 characters. To validate our results, we solved several publicly available challenge messages, including a message with only 40 letters.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ciphertext-only cryptanalysis of Hagelin M-209 pins and lugs

The Hagelin M-209 was a mechanical encryption device used by the US Army during World War 2 and the Korean War, as well as by other armies and in embassy settings. In this paper, we present a 4-stage hillclimbing algorithm for recovering the full key settings from ciphertext only. The two first stages are based on a divide-and-conquer approach developed by Geoff Sullivan. In our performance eva...

متن کامل

Automated Cryptanalysis

Classical ciphers are used to encrypt plaintext messages written in a natural language in such a way that they are readable for sender or intended recipient only. Many classical ciphers can be broken by brute-force search through the key-space. One of the pertinent problems arising in automated cryptanalysis is the plaintext recognition. A computer should be able to decide which of many possibl...

متن کامل

Automated Cryptanalysis of Classical Ciphers

Classical ciphers are used to encrypt plaintext messages written in a natural language in such a way that they are readable for sender or intended recipient only. Many classical ciphers can be broken by brute-force search through the key-space. Methods of artificial intelligence, such as optimization heuristics, can be used to narrow the search space, to speed-up text processing and text recogn...

متن کامل

Cryptanalysis of the EPBC Authenticated Encryption Mode

A large variety of methods for using block ciphers, so called ‘modes of operation’, have been proposed, including some designed to provide both confidentiality and integrity protection. Such modes, usually known as ‘authenticated encryption’ modes, are increasingly important given the variety of issues now known with the use of unauthenticated encryption. In this paper we show that a mode known...

متن کامل

Modern breaking of Enigma ciphertexts

Breaking German Army Ciphers” is the title of a Cryptologia article from 2005, describing the lucky survival of several hundred authentic Enigma messages of World War II, and an account of a ciphertext-only cryptanalysis of a large number of these messages, leaving only a few, mostly short messages, unbroken. After reviewing the work done, and investigating the reasons for both lucky breaks and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Cryptologia

دوره 40  شماره 

صفحات  -

تاریخ انتشار 2016