Название: Cryptography, Information Theory, and Error-Correction
Автор: Aiden A. Bruen
Издательство: John Wiley & Sons Limited
Жанр: Зарубежная компьютерная литература
isbn: 9781119582403
isbn:
Figure 2.2 The German Enigma machine. (a) the Enigma machine type‐K, (b) the German Enigma machine display at the Naval Museum of Alberta, Canada, (c) the caption on the display at the Naval Museum of Alberta, Canada, (d) the Enigma machine type‐K, power supply, and additional lamp panel.
Source: Used with permission of the Naval Museum of Alberta, Canada.
Figure 2.3 Block diagram of the Enigma machine.
To use the machine, an operator inputs the desired plain text into a keyboard, one character at a time. An electrical signal is passed from the keyboard through the rotors which are connected in series, until the charge reaches the reflector plate. Then, the signal is passed back from the plate through the rotors and back into the keyboard, where a separate panel consisting of light bulbs is illuminated. Each light bulb corresponds to a cipher text letter, which is recorded by the operator. As the signal passes through each rotor, the plain text character is continually substituted, depending on the daily settings of the rotor and the specific wiring between contacts, which govern the permutations of substitutions that are possible. When the enciphering process is complete, the operator sends the cipher text via radio to the intended receiver, who also possesses an Enigma machine. The receiver can then decode the message, given that the initial settings and the permutation sets of the machines are coordinated, by simply typing in the cipher text into the machine. The plain text message then appears on the illuminated keyboard.
It is worth noting some of the deficiencies in the machine design, as they made it possible for Allied cryptanalysts to eventually break the cipher. There is a very nice YouTube video, “Flaw in the Enigma Code ‐ Numberphile,” [Gri13], that talks about flaws in the Enigma machine. They note that a given letter of the alphabet might be mapped to any other letter, i.e. a letter is never encoded as itself. The number of permutations of
We will now investigate the machine from a mathematical standpoint. Each rotor is represented by a set of permutations containing all letter values between 0 and 25. The transition of each set runs left to right, with each bracket representing a wrap‐around or cycle. The first, second, and third rotors have unique permutation sets denoted
To show how the enciphering process works, consider the modified system shown in Figure 2.4.
The idea is to keep track of each intermediate substitution, in order to determine the final cipher text character. To illustrate the encoding process, consider the following example:
Example 2.1 Suppose the permutation sets of each rotor and reflector are defined as follows:
Figure 2.4 Simplified Enigma model.
So, with
Each permutation set possesses an inverse, which “undoes” the action of said permutation, as follows: