Get all your news in one place.
100’s of premium titles.
One app.
Start reading
The Guardian - UK
The Guardian - UK
Technology
Charles Arthur

Second Enigma code cracked

The effort to break three previously-uncracked codes generated by a German Enigma machine during the Second World War has yielded its second success: see it here. Except that it looks like a string of rubbish German with no spaces - part of the fun of trying to comprehend messages sent by the military for the military. Update: the text is given here.

Even so, it means that this message (the third of the trio) has been broken in just four days. Now only the first remains to be cracked, and with the number of people contributing their time leaping upwards, surely it won't be long before we get an answer to just what that submarine was doing in November in the north Atlantic. Up to no good, probably. You can see some nice graphs of how the search is going here or here (the first looks better, though both use the same stats).

Meanwhile we also had an interesting comment from Mark Stamp, who is based at San Jose State University, explaining

The Enigma machine has an enormous keyspace, so a true brute force attack is out of the question, even today. The point is that shortcut attacks exist and, by modern standards, are relatively painless. To put it in some perspective, if you give me an Enigma encrypted message and I know (or can guess with reasonable probability) a crib of, say, 20 letter, there is an attack that requires work roughly equivalent to a brute force attack on a cipher with a 29 bit key. For comparison, DES has a 56 bit key, and brute force attacks have succeeded on DES. Also, each additional bit doubles the brute force work, so the time to brute force a DES key is roughly the square of the time it takes to run this shortcut attack on Enigma.


Btw, the number above are for the standard 3 rotor Enigma, not the 4 rotor naval Enigma (which was used to encrypt the wether report that was broken, as described in the article). However, the work factor for the equivalent shortcut attack on the 4 rotor Enigma is not massively larger.


It comes down to a fundamental flaw in the Enigma design which essentially allows the attacker to split the stecker (plugboard) from the rotors.


I've written a textbook on information security which has quite a bit of crypto in it (and if you read the back cover you'll discover that I've done cryptanalysis for a super-secret government agency). I'm currently working on another textbook focused on cryptanalysis. One chapter of this new book covers the "big machines" of WWII, namely, Enigma, Purple, and Sigaba.


Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.