cryptanalysis of the engima - 44con 2012

Post on 29-May-2015

482 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

Bob Weiss and Benjamin Gatti present their work on Cryptanalysis of the Engima from 44CON 2012 in London, September 2012.

TRANSCRIPT

Cryptanalysis of the Enigma

whoami

• Bob Weiss - @pwcrack - President and Founder, Password Crackers, Inc. (pwcrack.com) & Defcon Goon

• Benjamin Gatti - @BenjaminoG - Developer, OpenVPN

Alan Turing

Were Alan Turing alive today, he would be unconstrained by either the mechanical computing devices of the 1940's; or it's pharisaical provincialism.

We are pleased to present a digital Enigma attack in London at #44Con during this centennial of his birth.

Demo Time

Yeah we're starting the demo now!

Why do we care about The Enigma?

• Inflection Point in the history of cryptography

•Fascinating WWII narrative

There is no Enigma

•There are multiple versions•Army and Navy• 3 & 4 Wheel•Variable Reflector

How the Enigma works.

• Wheel Order (3 of 5 wheels for 60 options)

How the Enigma works.

• Ring settings (676 orr 262 options)

How the Enigma works.

• Message Settings (17,576 or 263 options)

How the Enigma works.

• Plugboard (150,738,274,937,250 or 150 trillion)

How the Enigma works.

•Expected complexity of Enigma 277

•DES 256

•AES 2128

Historic Cryptanalysis

• Polish Cipher Bureau - 1932, Marian Rejewski, Machine Characteristics

• Polish Bombe - 1938• Polish Setback - Dec. 1938 Germans add two

rotors• Polish Disclosure - 1939 Poles tell the French• Crib-Based Decryption - Turing• British Bombe - 1930• American Bombe - 1941

Programming Challenges

GPU – OpenCL Memory Database Throughput

Sorted Chi

Stecker Isolation

Letters for each Stecker Binned separately.

26!! - 6!! (150T) to 26^3 (17K) (pwned)

EDGYEMHENYFYEJOEIYKUFMKEUATHEFOXJUMPEDOVERTHELAZYDOG

TOUORD Chi(E Stecker)

Diagonal Conflation

Back to the Demo

Q & A

enigmacrack.com

top related