30.11.2012 Views

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

Code and ciphers: Julius Caesar, the Enigma and the internet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

130<br />

chapter 9<br />

Table 9.3<br />

Setting 1 Setting 2<br />

DH →GA DH →CD<br />

AB →KF AL →AF<br />

IL →DL IF →BK<br />

CF →BH CG →GI<br />

JG →IC JE →EH<br />

KE →EJ KB →JL<br />

These produce several contradictions: eg Setting 1 implies that (A, G) are<br />

paired in <strong>the</strong> composite reflector whereas Setting 2 tells us that (A, F) are<br />

paired. Therefore R1 is not at Setting 1.<br />

(2) We repeat <strong>the</strong> exercise but this time encipher <strong>the</strong> pairs at Settings 2<br />

<strong>and</strong> 3: Table 9.4.<br />

Table 9.4<br />

Setting 2 Setting 3<br />

DH →CD DH →HJ<br />

AB →AL AL →GK<br />

IL →BF IF →EI<br />

CF →GK CG →AL<br />

JG →EI JE →CD<br />

KE →JH KB →FB<br />

The two sets are in complete agreement <strong>and</strong> we conclude that we have<br />

identified R1 <strong>and</strong> that it was set at position 2 at <strong>the</strong> beginning of <strong>the</strong><br />

encryption. We also now know that <strong>the</strong> pairings of <strong>the</strong> 12 letters in <strong>the</strong><br />

composite reflector are<br />

(A, L), (B, F), (C, D), (E, I), (G, K) <strong>and</strong> (H, J).<br />

Since R1 <strong>and</strong> <strong>the</strong> actual reflector (U) are known <strong>the</strong> cryptanalyst would<br />

now try to find which combinations of U <strong>and</strong> two o<strong>the</strong>r wheels could<br />

produce <strong>the</strong>se pairs. The original <strong>Enigma</strong> had only three wheels in its set<br />

<strong>and</strong> so, since R1 has been identified, <strong>the</strong>re would be ‘only’ 2�26�26�<br />

1352 possibilities to be examined. Whilst this may seem a large number it<br />

is small in comparison with <strong>the</strong> 105 456 cases which <strong>the</strong> cryptanalyst<br />

would have faced initially. O<strong>the</strong>r lines of attack would now also be used,<br />

such as trying some possible plaintext beginnings for some of <strong>the</strong> messages.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!