|
Principles |
The German Enigma machine used a symmetrical key cypher system, which means that for any given message, the same settings, or key, must be used at both the sending (encrypting) end and the receiving (decrypting) end of the data transfer. Both the sending and receiving parties must be in possession of the same code page for configuring their machines uniquely for the date on which any particular message is handled. This, of course, was one of Enigma's great weaknesses, leading to the development of the asymmetrical key system, known today as the public-private key cypher. The public-private key cypher eliminates the vulnerabilities created by regularly having to pass up-to-date key tables between all parties in a net. Though Enigma had some cryptographic weaknesses, in practice it was German procedural flaws, operator mistakes, laziness, failure to systematically introduce timely improvements in encypherment procedures, and the Allied capture of key tables and hardware that, during the war, enabled Allied cryptologists to succeed in breaking all the German armed forces Enigma traffic. Even Lorenz was broken at Bletchley Park, and was read continuously until telephone lines, instead of radio, were brought into common use by the German teletype services. Full details on how to operate a whole range of Enigma machines may be found on the splendid Enigma World Code Group website, with grateful acknowledgement to Bruce Culp N7CLH. A configurable and fully functioning Virtual Enigma Machine may be downloaded from Dirk Rijmenants' comprehensive website, either for educational purpose or for real-time use. This is by far the best working presentation of Arthur Scherbius' famous 1918 invention to be found on the internet (in the author's personal opinion).
|
|
|
|
All Copyrights and Trademarks
remain the property of their respective owners. |
|
|