Key to breaking Nazi code was in the patent office

2001-04-23 Thread William Knowles

http://www.telegraph.co.uk/et?ac=004782403739693pg=/et/01/4/20/ncyph20.html

By Michael Smith
Friday 20 April 2001

BRITAIN'S wartime codebreakers could have cracked the German Enigma
cipher machine much earlier if they had followed a diagram for the
commercial version lodged with the British Patent Office in the
mid-1920s, documents released to the Public Record Office show.

But the codebreakers did not believe that the German army would have
been so stupid as to use the same simple wiring system as the widely
available commercial machine for their military equivalents. The Code
and Cypher School, commonly known by its wartime home at Bletchley
Park, was fully aware of how the commercial machine worked in the
mid-1920s.

Chiffriermaschinen Aktiengesellschaft, the German company that
manufactured it, had offered the British Government commercial Enigma
machines at a price of $190 each in June 1924. Britain declined to
take up the offer, waiting for the Germans to register it with the
British Patent Office.

Then they obtained the description of how it worked from the patent
officials, including detailed plans of the make-up of the commercial
machine.The files show that, contrary to what had previously been
thought, British codebreakers were working on the Enigma machine
during the 1920s and 1930s.

But they did not manage to break the military variant until early 1940
after gaining vital help from the Poles. The Enigma machine looked
like a typewriter. Pressing the keys sent an electrical impulse
through a series of circuits wired through rotors that moved with each
tap of the key, constantly varying the cipher.

British codebreakers had made a good deal of progress in breaking the
military version but were held up because they could not work out the
order in which the typewriter keys were wired into the internal
circuits. The Germans weren't idiots, said Peter Twinn, one of those
who broke Enigma. When they had a perfect opportunity to introduce a
safeguard to their machine by jumbling it up, that would be a sensible
thing to do.

It was not until July 1939, when they met their Polish equivalents who
had broken early versions of the machine, that they found out that it
was wired alphabetically, A to the first contact, B to the second
contact and so on. This was the same as in the diagram attached to the
patent application but was so obvious that the codebreakers never even
considered it as a possibility.

Six months later, codebreakers made their first break into Enigma,
something they could have done far earlier if they had only tried the
alphabetical system in the patent application.It was such an obvious
thing to do, really a silly thing to do, that nobody ever thought it
worthwhile trying it, said Mr Twinn.







-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Requesting feedback on patched RC4-variant

2001-04-23 Thread Matthijs van Duin

In general, if you're not an expert (:), it's worth not messing with the
core parts of algorithms to prevent an attack when you don't 
undertand the attack.

I do fully understand how both RC4 and the attack work.

[I'm not so sure about that. --PM]

RC4 has two basic rules for using it securely
- Use long enough keys.
- Never EVER reuse a key.

I did those already, I was very well aware that reusing an RC4 key is 
a no-no, I even explained the need for this to other people.


The basic things wrong with the use of RC4 in several broken
commercial environments (e.g. 802.11 WEP, MS PPTP) include
snip

Too short key length wasn't the only problem in WEP: Another problem 
arose from the fact that when you toggle a single bit in the 
ciphertext, that *same* bit is toggled in the plaintext.

[That's not an RC4 feature -- that's a feature of any stream
cipher. However, in general, any time you use a cipher in a
communications protocol, you want a MAC as well, even if you are using
a block cipher in CBC. --PM]

Therefore, 
if the contents of part of the ciphertext is known, that part could 
be modified. WEP has integrity checking to protect against this, 
however they did this in a flawed way. (the propogation of a bit 
toggle can be tracked through the CRC algorithm to determine which 
bits of the CRC should be toggled to make sure the change will not be 
detected)

in general, I'm not comfortable with this bit-toggle property, but RB 
is too sucky to implement a decent algorithm.

Well, I'm working on getting cryptlib working on MacOS anyway, and 
then turn it into an RB plugin, and all my problems will be solved :-)


Matthijs van Duin
- PGP Key: 0xB6205CCB   finger:[EMAIL PROTECTED] -
- FP: D73C 9EE3 5F6B E5D5 8E19  2CBE 4648 8C3E B620 5CCB -



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: NTT offering free licenses for algorithms (incl. Camellia)

2001-04-23 Thread Ben Laurie

Kristen Tsolis wrote:
 
 According to Nikkan Kogyo News, NTT is offering four patented algorithms
 under royalty-free license for limited purposes.
 
 These algorithms include Camellia, EPOC, PSEC, and ESIGN.
 
 http://news.yahoo.co.jp/headlines/nkn/010418/nkn/08100_nkn13.html
 
 NTT made this announcement on the same day as the last CRYPTREC meeting. The
 CRYPTREC project was initiated by Japan's Information-technology Promotion
 Agency (IPA).
 
 The goal of CRYPTREC is to define standard cryptographic algorithms for use
 within the Japanese government.
 
 http://www.ipa.go.jp/security/enc/CRYPTREC/index-e.html

There was extensive discussion on the inclusion of Camellia in TLS
ciphersuites recently - I can't remember the outcome, though, sorry.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff

ApacheCon 2001! http://ApacheCon.com/



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Another shining example of Microsoft security.

2001-04-23 Thread Kris Kennaway

On Fri, Apr 20, 2001 at 05:44:55PM -0400, vertigo wrote:
 On Fri, 20 Apr 2001, Enzo Michelangeli wrote:
 
  Besides, the fact that many users don't check the validity of the certs
  presented by the other side is a disgrace, and should not be encouraged by
  distributing broken software.
 
 It certainly should not be encouraged.  The fact remains that
 informed users are rare.  The algorithms are strong, but the
 infrastructure is cream of wheat.  Microsoft, if this is true,
 (I use Pine and there isn't a copy of Outlook anywhere in sight)
 has done an injustice not only to the user but, more importantly,
 to the infrastructure.

The Pine SSL patches also don't do any validity checking of
certificates, AFAIK.

Kris

 PGP signature


Re: Another shining example of Microsoft security.

2001-04-23 Thread Kris Kennaway

On Sat, Apr 21, 2001 at 05:11:21AM -0400, vertigo wrote:
 Pine has SSL patches?  :)  It's plain old pine within
 an SSH session for me.

Yeah - they implement IMAP-over-SSL, with the aforementioned
limitation.

  The Pine SSL patches also don't do any validity checking of
  certificates, AFAIK.

Kris

 PGP signature