Cryptanalysis of the Lorenz cipher


Cryptanalysis of the Lorenz cipher
The Lorenz SZ machines had 12 wheels each with a different number of cams (or pins).
Wheel number 1 2 3 4 5 6 7 8 9 10 11 12
BP wheel name[1] ψ1 ψ2 ψ3 ψ4 ψ5 μ37 μ61 χ1 χ2 χ3 χ4 χ5
Number of cams (pins) 43 47 51 53 59 37 61 41 31 29 26 23

Cryptanalysis of the Lorenz cipher was the process that enabled the British to read secret German military messages during World War II. The British Government Code and Cypher School at Bletchley Park decrypted many communications between the German High Command in Berlin and their army commands throughout occupied Europe. These were intercepted non-Morse radio messages that had been enciphered by the Lorenz SZ teletypewriter rotor cipher attachments. British cryptographers referred to encrypted German teleprinter traffic as "Fish". They dubbed this machine and its traffic "Tunny", and the intelligence it yielded as "Ultra".[2]

As with the entirely separate Cryptanalysis of the Enigma, it was German operational shortcomings that allowed the initial diagnosis of the system, and a way into decryption.[3] Unlike Enigma, however, no physical machine reached allied hands until the very end of the war in Europe, long after wholesale decryption had been established.

The message characters were encoded in the 5-bit International Telegraphy Alphabet No. 2 (ITA2). The cipher attachments implemented a type of Vernam stream cipher using a complex array of twelve wheels. The right hand five of these, the chi (χ) wheels, changed the five bits of the incoming character, advancing one position with each one. The left hand five, the psi (ψ) wheels, changed the result of the chi transform further. The central two mu (μ) or "motor" wheels determined whether the psi wheels rotated with a new character.[4]

Initially, operator errors produced a number of pairs of messages sent with the same keys, giving a so-called "depth", which often allowed manual decryption to be achieved. Such depths also allowed the complete logical structure of the machine to be worked out, a quite remarkable cryptanalytical feat on which the subsequent bulk decryption of Tunny messages relied.[5]

Subsequently, decryption was achieved by a combination of manual and automated methods. The effect of the chi component of the key was removed with the use of machines that implemented a statistical technique. The first machine was called "Heath Robinson" and it was followed by several other "Robinsons". These were, however, slow and unreliable, and were superseded by "Colossus" the world's first electronic, (semi-)programmable computer, ten of which were in use by the end of the war.[6] The psi component was then removed using manual methods and machines that imitated the Tunny machine - the so-called "British Tunny" machines.[7]

Secure Telegraphy

Electro-mechanical telegraphy was developed in the 1830s and 1840s, well before telephony, and was in widespread use all over the world by the time of the Second World War. An extensive system of cables were used within and between countries, but for mobile German Army Units, radio transmission was often used.

Teleprinters at each end of the circuit consisted of a keyboard and printing mechanism, and very often a five-hole paper tape reading and punching mechanism. When used online, pressing an alphabet key at the transmitting end caused the relevant character to be printed at the receiving end. Commonly, however, the transmitting operator would prepare a message offline by punching it onto paper tape, and then going online only for the transmission of the message recorded on the tape. Typically this would be at some ten characters per second, and so occupy the line or radio channel for a shorter time than for online typing.

The characters of the message were represented by the codes of the International Telegraphy Alphabet No. 2 (ITA2). The transmission medium, either wire or radio, used asynchronous serial communication with each character signaled by a start bit, 5 data bits and 1½ stop bits. Each bit was either a "mark" (hole in paper tape, 1 in binary or x at Bletchley Park) or a "space" (no hole in tape, binary 0 or at Bletchley Park). For example the letter "H" would be coded as ••x•x.[8]

International telegraphy alphabet No. 2 with terminology and conventions used at Bletchley Park (BP)
Pattern of impulses Mark = x, Space = Binary Letter shift Figure shift BP 'shiftless' interpretation
••••• 00000 null null /
••x•• 00100 space space 9
••x•x 00101 H # H
••••x 00001 T 5 T
•••xx 00011 O 9 O
••xxx 00111 M M
••xx• 00110 N , N
•••x• 00010 CR CR 3
•x•x• 01010 R 4 R
•xxx• 01110 C  : C
•xxxx 01111 V  ; V
•x•xx 01011 G & G
•x••x 01001 L ) L
•xx•x 01101 P 0 P
•xx•• 01100 I 8 I
•x••• 01000 LF LF 4
xx••• 11000 A - A
xxx•• 11100 U 7 U
xxx•x 11101 Q 1 Q
xx••x 11001 W 2 W
xx•xx 11011 FIGS + or 5
xxxxx 11111 LTRS - or 8
xxxx• 11110 K ( K
xx•x• 11010 J ' J
x••x• 10010 D $ D
x•xx• 10110 F  ! F
x•xxx 10111 X / X
x••xx 10011 B  ? B
x•••x 10001 Z " Z
x•x•x 10101 Y 6 Y
x•x•• 10100 S ' S
x•••• 10000 E 3 E

The figure shift (FIGS) and letter shift (LETRS) characters determined how the receiving end should interpret the string of characters up to the next shift character. Because of the danger of a shift character being corrupted, some operators would send a pair of shift characters when changing from letters to numbers or vice versa. Such doubling of characters was helpful to the cryptanalysts at Bletchley Park's statistical analysis. After encipherment, shift characters had no special meaning.

For its secret transmissions, the German armed services enciphered each character using various online Geheimschreiber (secret writer) machines at both the transmitting and receiving ends. These were the Lorenz SZ (SZ for Schlüsselzusatz, meaning "cipher attachment") machine for the army, the Siemens and Halske T52 for the air force and the Siemens T43 which was little used and never broken by the Allies.[9] Enigma decrypts had revealed that the Germans called the wireless teleprinter transmission systems "Sägefisch" (sawfish), so the name "Fish" was adopted for this traffic.[10] "Tunny" was the name given at Bletchley Park to the first non-Morse link, and it was subsequently used for all traffic enciphered with the Lorenz SZ machines.

References and Notes

  1. ^ Good, Michie & Timms 1945, p. 6 of German Tunny
  2. ^ Hinsley 1993, p. 141-142
  3. ^ Copeland 2006, p. 45
  4. ^ Good 1993, p. 153
  5. ^ Tutte 1998, pp. 5, 6
  6. ^ All but two of the Colossus computers, which were taken to GCHQ, were destroyed in 1945, and the whole project was kept strictly secret until the 1970s, and so Colossus did not feature in many early descriptions of the development of electronic computers.
  7. ^ Wylie 2001, pp. 289–304
  8. ^ Copeland 2006, pp. 348, 349
  9. ^ Weierud 2006, p. 307 in Copeland 2006, pp. 307–327
  10. ^ Gannon 2006, p. 102

Bibliography


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Lorenz cipher — Tunny redirects here. For the fish, see Tuna. The Lorenz SZ 40 and SZ 42 ( Schlüsselzusatz , meaning cipher attachment ) were German cipher machines used during World War II for teleprinter circuits. British codebreakers, who referred to… …   Wikipedia

  • Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… …   Wikipedia

  • Cipher disk — The Union Cipher Disk from the American Civil War was 3.75 inches (95 mm) in diameter and made of light yellow heavy card stock. It consisted of two concentric disks of unequal size revolving on a central pivot. The disks were divided along their …   Wikipedia

  • Combined Cipher Machine — CSP 1600, the replacement stepping unit to adapt the ECM Mark II to CCM The Combined Cipher Machine (CCM) (or Combined Cypher Machine) was a common cipher machine system for securing Allied communications during World War II and for a few years… …   Wikipedia

  • Mercury (cipher machine) — Mercury was a British cipher machine used by the Air Ministry from 1950 until at least the early 1960s. Mercury was an online rotor machine descended from Typex, but modified to achieve a longer cycle length using a so called double drum basket… …   Wikipedia

  • Тьюринг, Алан — Алан Тьюринг Alan Mathison Turing …   Википедия

  • One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit …   Wikipedia

  • Alan Turing — Turing redirects here. For other uses, see Turing (disambiguation). Alan Turing Turing at the time of his election to Fellowship of the Royal Society …   Wikipedia

  • История криптографии — Основная статья: Криптография История криптографии насчитывает около 4 тысяч лет. В качестве основного критерия периодизации криптографии возможно использовать технологические характеристики используемых методов шифрования. Первый период… …   Википедия

  • Siemens and Halske T52 — The Siemens and Halske T52, also known as the Geheimfernschreiber ( secret teleprinter ), or Schlüsselfernschreibmaschine (SFM), was a World War II German teleprinter cipher machine. The machine and its traffic were codenamed Sturgeon by British… …   Wikipedia


Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.