Warning

 

Close

Confirm Action

Are you sure you wish to do this?

Confirm Cancel
BCM
User Panel

Site Notices
Posted: 2/27/2006 3:06:10 PM EDT
http://news.com.com/Distributed+computing+cracks+Enigma+code/2100-1029_3-6043572.html?tag=nefd.lede


More than 60 years after the end of World War II, a distributed computing project has managed to crack a previously uncracked message that was encrypted using the Enigma machine.

The M4 Project began in early January, as an attempt to break three original Enigma messages that were intercepted in 1942 and are thought never to have been broken by the Allied forces.

These messages were encrypted using a four-rotor Enigma. That version was considered by Germany to be completely unbreakable, as it could be set up in any one of a vast number of ways (2 times 10 to the 145th power), each of which would encrypt a plain text message differently.

Cryptologists at Bletchley Park in the U.K. managed to break Enigma through their development of early computers, led by Alan Turing, and also by using intelligence to cut down the number of possible set-ups.

According to the organizers of M4, their open-source message-breaking application managed to crack one of the three messages early last week.

The translation of the message is as follows:

Radio signal 1851/19/252: "F T 1132/19 contents: Forced to submerge during attack. Depth charges. Last enemy position 0830h AJ 9863, (course]) 220 degrees, (speed) 8 knots. (I am) following (the enemy). (Barometer) falls 14 mb, (wind) nor-nor-east, (force) 4, visibility 10 (nautical miles)."

In breaking the first message, the project organizers used so-called brute force to test the encrypted message against all possible set-up configurations of the four-rotor Enigma. However, this configuration did not include the machine's plugboard, which allowed the operator to swap two letters around before they were processed by the machine's rotors.

The plugboard added much more complexity to the encryption process than any single rotor. To address this, the M4 Project used a "hill-climbing algorithm."

"Hill-climbing algorithms try to optimize an object, in this case the plugboard settings, by changing the object step by step. After each change the 'goodness' or 'fitness' of the new object has to be determined by a scoring function. Changes that lead to a 'better' object are retained. Here the changes lie in constantly trying out new wirings of the Enigma plugboard. After each change, the scoring function tests a new wiring by deciphering the message and trying to determine how closely the resulting plaintext matches the statistics of the natural language," the M4 Project explained.

With two messages still to break, the M4 Project is looking for computer users to download its application and help out.

Link Posted: 2/27/2006 3:15:18 PM EDT
[#1]
As someone who's interested in classical cryptography, this is extremely cool.
Link Posted: 2/27/2006 3:19:56 PM EDT
[#2]

Quoted:
With two messages still to break, the M4 Project is looking for computer users to download its application and help out.



Download client here:
www.bytereef.org/m4_project.html
Link Posted: 2/27/2006 3:21:45 PM EDT
[#3]

Quoted:
As someone who's interested in classical cryptography, this is extremely cool.



+1
Link Posted: 2/27/2006 3:26:46 PM EDT
[#4]
very cool!
Link Posted: 2/27/2006 3:28:05 PM EDT
[#5]

Quoted:

Quoted:
As someone who's interested in classical cryptography, this is extremely cool.



+1



It is cool to a jackass in his living room surfing the net as well.
Close Join Our Mail List to Stay Up To Date! Win a FREE Membership!

Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!

You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.


By signing up you agree to our User Agreement. *Must have a registered ARFCOM account to win.
Top Top