Cryptanalysis of the Engima - 44CON 2012
description
Transcript of Cryptanalysis of the Engima - 44CON 2012
![Page 1: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/1.jpg)
Cryptanalysis of the Enigma
![Page 2: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/2.jpg)
whoami
• Bob Weiss - @pwcrack - President and Founder, Password Crackers, Inc. (pwcrack.com) & Defcon Goon
• Benjamin Gatti - @BenjaminoG - Developer, OpenVPN
![Page 3: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/3.jpg)
Alan Turing
Were Alan Turing alive today, he would be unconstrained by either the mechanical computing devices of the 1940's; or it's pharisaical provincialism.
We are pleased to present a digital Enigma attack in London at #44Con during this centennial of his birth.
![Page 4: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/4.jpg)
Demo Time
Yeah we're starting the demo now!
![Page 5: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/5.jpg)
Why do we care about The Enigma?
• Inflection Point in the history of cryptography
•Fascinating WWII narrative
![Page 6: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/6.jpg)
There is no Enigma
•There are multiple versions•Army and Navy• 3 & 4 Wheel•Variable Reflector
![Page 7: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/7.jpg)
How the Enigma works.
• Wheel Order (3 of 5 wheels for 60 options)
![Page 8: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/8.jpg)
How the Enigma works.
• Ring settings (676 orr 262 options)
![Page 9: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/9.jpg)
How the Enigma works.
• Message Settings (17,576 or 263 options)
![Page 10: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/10.jpg)
How the Enigma works.
• Plugboard (150,738,274,937,250 or 150 trillion)
![Page 11: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/11.jpg)
How the Enigma works.
•Expected complexity of Enigma 277
•DES 256
•AES 2128
![Page 12: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/12.jpg)
Historic Cryptanalysis
• Polish Cipher Bureau - 1932, Marian Rejewski, Machine Characteristics
• Polish Bombe - 1938• Polish Setback - Dec. 1938 Germans add two
rotors• Polish Disclosure - 1939 Poles tell the French• Crib-Based Decryption - Turing• British Bombe - 1930• American Bombe - 1941
![Page 13: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/13.jpg)
Programming Challenges
GPU – OpenCL Memory Database Throughput
![Page 14: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/14.jpg)
Sorted Chi
![Page 15: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/15.jpg)
Stecker Isolation
Letters for each Stecker Binned separately.
26!! - 6!! (150T) to 26^3 (17K) (pwned)
EDGYEMHENYFYEJOEIYKUFMKEUATHEFOXJUMPEDOVERTHELAZYDOG
TOUORD Chi(E Stecker)
![Page 16: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/16.jpg)
Diagonal Conflation
![Page 17: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/17.jpg)
Back to the Demo
![Page 18: Cryptanalysis of the Engima - 44CON 2012](https://reader031.fdocuments.in/reader031/viewer/2022020718/556807f6d8b42a242a8b4c86/html5/thumbnails/18.jpg)
Q & A
enigmacrack.com