Lorenz cipher

Lorenz cipher

:"Tunny" redirects here. For the fish, see Tuna."The Lorenz SZ 40 and SZ 42 ("Schlüsselzusatz", meaning "cipher attachment") were German cipher machines used during World War II for teleprinter circuits. British codebreakers, who referred to encrypted German teleprinter traffic as "Fish", termed the machine and its traffic "Tunny". While the well-known Enigma machine was generally used by field units, the Lorenz machine was used for high-level communications which could support the heavy machine, teletypewriter and attendant fixed circuits. The machine itself measured 51cm × 46cm × 46cm (20in × 18in × 18in), and served as an attachment to a standard Lorenz teleprinter. The machines implemented a stream cipher.

Operation

The teleprinters of the day output each character as five parallel bits on five lines, typically encoded in the Baudot code or something similar. The Lorenz machine output groups of five pseudorandom bits to be XORed with the plaintext. The pseudorandom bits were generated by ten pinwheels, five of which stepped regularly, termed the chi ("chi") wheels, and five of which were stepped irregularly, termed the psi ("psi") wheels. The stepping of the psi wheels was determined by two more pinwheels, termed the "motor wheels". Apart from the stepping of the five irregular pinwheels (which either all stepped together, or all stayed together), the Lorenz machine is actually five parallel pseudorandom generators; there is no other interaction between the five lines. The numbers of pins on all the wheels were relatively prime.

Colonel Parker Hitt of the US Army first proposed a very similar device in 1914. [ [http://www.maritime.org/csp488.htm USS Pampanito - CSP-488 ] ] . He explained its use in his "Manual for Military Ciphers" published in 1916. But Col. Hitt's design was without the feature that allowed the stepping of five wheels to be irregular. [ [http://www.quadibloc.com/crypto/te0301.htm The Lorenz Schlusselzusatz ] ]

Cryptanalysis

British cryptographers at Bletchley Park had deduced the operation of the machine by January 1942 without ever having seen a Lorenz machine. This was made possible because of a mistake made by a German operator. On 30 August, 1941, a 4,500 character message was transmitted; however, the message was not received correctly at the other end, so (after the recipient sent an unencoded request for retransmission, which let the codebreakers know what was happening) the message was retransmitted with the same key settings (HQIBPEXEZMUG); a forbidden practice. Moreover, the second time the operator made a number of small alterations to the message, such as using abbreviations (The second message was only 4000 characters long). From these two related ciphertexts, John Tiltman and his team were able to recover both the plaintext and the keystream. From the keystream, the entire structure of the machine was reconstructed by W. T. Tutte.

Originally the Tunny traffic was intercepted at the Foreign Office Y Station operated by the Metropolitan Police at Denmark Hill in Camberwell, London but due to lack of resource at this time (~1941) it was given a low priority. A new station, Knockholt in Kent, was later constructed specifically to receive Tunny traffic so that the messages could be efficiently recorded and sent to Bletchley Park. The head of Y station, Harold Kentwothy, moved to head up Knockholt. He was later promoted to head the Foreign Office Research and Development Establishment (F.O.R.D.E).

Several complex machines were built by the British to attack Tunny. The first was a family of machines known as "Heath Robinsons", which used several high-speed paper tapes, along with electronic logic circuitry, to find the pin wheel settings of the Lorenz machine.

The next was the Colossus, the world's first electronic digital computer. This was developed by the British G.P.O engineer Tommy Flowers at Dollis Hill in London (the Post Office research station). Like ENIAC, it did not have a stored program, and was programmed through plugboards and jumper cables. It was both faster and more reliable than the Heath Robinsons; using it, the British were able to speed up the process of finding the Lorenz pin wheel settings.

The third machine was the Tunny Emulator, the machine designed by Blechley Park based on the reverse engineering work done by Tiltman's team in the Testery to emulate the Lorenz Cypher Machine. When the pin wheel settings were found by colossus the tunny machine was set up and run so the messages could be read.

The Swedish cryptanalytic service, the FRA ("Försvarets Radioanstalt"), also broke into an early version of the Lorenz system; their break occurred in April, 1943. They tapped cables carrying traffic between Germany and Norway. The work was led by mathematician Arne Beurling.

ee also

* STURGEON
* SIGCUM
* Newmanry
* Testery

Further reading

* Stephen Budiansky, "Battle of Wits" (Free Press, New York, 2000) Contains a short but informative section (pages 312-315) describing the operation of Tunny, and how it was attacked.
* Paul Gannon "Colossus: Bletchley Park's Greatest Secret" (Atlantic Books, 2006) Using recently declassified material and dealing exclusively with the efforts to break into Tunny. Clears up many previous misconceptions about Fish traffic, the Lorenz cipher machine and Colossus.
* F. H. Hinsley, Alan Stripp, "Codebreakers: The Inside Story of Bletchley Park" (Oxford University, 1993) Contains a lengthy section (pages 139-192) about Tunny, the British attack on it, and the British replicas of the Lorenz machine.
* Michael Smith, "Station X: Decoding Nazi Secrets" (TV Books, New York, 2001) Contains a lengthy section (pages 183-202) about Tunny and the British attack on it.

References

* Jack Good, Donald Michie, and Geoffrey Timms, [http://www.alanturing.net/turing_archive/archive/index/tunnyreportindex.html "General Report on Tunny"] , 1945, HW 25/4 and HW 25/5
* W. T. Tutte, [http://frode.home.cern.ch/frode/crypto/tutte.html "FISH and I"] Transcript of a lecture by Prof. Tutte explaining how he broke into Tunny.
* Donald W. Davies, "The Lorenz Cipher Machine SZ42", (reprinted in "Selections from Cryptologia: History, People, and Technology", Artech House, Norwood, 1998)
* [http://www.alanturing.net/turing_archive/archive/b/B06/BO6-092.html Entry for "Tunny"] in the GC&CS "Cryptographic Dictionary"
* [http://www.codesandciphers.org.uk/lorenz/fish.htm The Lorenz Cipher and how Bletchley Park broke it] by Tony Sale

External links

* [http://www.codesandciphers.org.uk/lorenz/index.htm Lorenz ciphers and the Colossus]
* [http://www.eclipse.net/~dhamer/lorenz.htm Information on Lorenz]
* [http://www.jproc.ca/crypto/tunny.html Photographs and description of Tunny]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Cryptanalysis of the Lorenz cipher — The Lorenz SZ machines had 12 wheels each with a different number of cams (or pins). Wheel number 1 2 3 4 5 6 7 …   Wikipedia

  • Lorenz — may refer to:Law Firm* Lorenz International Lawyers, an international law firm with offices in Brussels, Bishkek and GenevaMusic* Christian Flake Lorenz, a German musician * Lorenz Hart, the lyricist half of the famed Broadway songwriting team… …   Wikipedia

  • Cipher disk — The Union Cipher Disk from the American Civil War was 3.75 inches (95 mm) in diameter and made of light yellow heavy card stock. It consisted of two concentric disks of unequal size revolving on a central pivot. The disks were divided along their …   Wikipedia

  • Código Lorenz — La máquina de Lorenz fue utilizada para cifrar comunicaciones militares alemanas de alto nivel durante la Segunda Guerra Mundial. Criptógrafos ingléses en Bletchley Park fueron capaces de romper el cifrado. La Lorenz SZ 40 y la SZ 42… …   Wikipedia Español

  • Stream cipher attack — Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive or operation (xor), can be very secure if used properly. However they are vulnerable to attack if certain precautions are not followed:*keys must never be… …   Wikipedia

  • Combined Cipher Machine — CSP 1600, the replacement stepping unit to adapt the ECM Mark II to CCM The Combined Cipher Machine (CCM) (or Combined Cypher Machine) was a common cipher machine system for securing Allied communications during World War II and for a few years… …   Wikipedia

  • Mercury (cipher machine) — Mercury was a British cipher machine used by the Air Ministry from 1950 until at least the early 1960s. Mercury was an online rotor machine descended from Typex, but modified to achieve a longer cycle length using a so called double drum basket… …   Wikipedia

  • Colossus computer — Colossus MkI/MkII A Colossus Mark 2 computer. The operator on the left is Dorothy Duboisson. The slanted control panel on the left was used to set the pin patterns on the Lorenz. The bedstead paper tape transport is on the right. Developer Tommy… …   Wikipedia

  • Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… …   Wikipedia

  • Машина Лоренца — (Lorenz Chiffre, Schlüsselzusatz; Lorenz SZ 40 и SZ 42)  немецкая шифровальная машина, использовавшаяся во время Второй мировой войны для передачи информации по телетайпу. Британские аналитики, которые закодированный немецкий телетайпный… …   Википедия

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”