cryptanalysis of the engima - 44con 2012
DESCRIPTION
Bob Weiss and Benjamin Gatti present their work on Cryptanalysis of the Engima from 44CON 2012 in London, September 2012.TRANSCRIPT
Cryptanalysis of the Enigma
whoami
• Bob Weiss - @pwcrack - President and Founder, Password Crackers, Inc. (pwcrack.com) & Defcon Goon
• Benjamin Gatti - @BenjaminoG - Developer, OpenVPN
Alan Turing
Were Alan Turing alive today, he would be unconstrained by either the mechanical computing devices of the 1940's; or it's pharisaical provincialism.
We are pleased to present a digital Enigma attack in London at #44Con during this centennial of his birth.
Demo Time
Yeah we're starting the demo now!
Why do we care about The Enigma?
• Inflection Point in the history of cryptography
•Fascinating WWII narrative
There is no Enigma
•There are multiple versions•Army and Navy• 3 & 4 Wheel•Variable Reflector
How the Enigma works.
• Wheel Order (3 of 5 wheels for 60 options)
How the Enigma works.
• Ring settings (676 orr 262 options)
How the Enigma works.
• Message Settings (17,576 or 263 options)
How the Enigma works.
• Plugboard (150,738,274,937,250 or 150 trillion)
How the Enigma works.
•Expected complexity of Enigma 277
•DES 256
•AES 2128
Historic Cryptanalysis
• Polish Cipher Bureau - 1932, Marian Rejewski, Machine Characteristics
• Polish Bombe - 1938• Polish Setback - Dec. 1938 Germans add two
rotors• Polish Disclosure - 1939 Poles tell the French• Crib-Based Decryption - Turing• British Bombe - 1930• American Bombe - 1941
Programming Challenges
GPU – OpenCL Memory Database Throughput
Sorted Chi
Stecker Isolation
Letters for each Stecker Binned separately.
26!! - 6!! (150T) to 26^3 (17K) (pwned)
EDGYEMHENYFYEJOEIYKUFMKEUATHEFOXJUMPEDOVERTHELAZYDOG
TOUORD Chi(E Stecker)
Diagonal Conflation
Back to the Demo
Q & A
enigmacrack.com