BREAKING GERMAN ARMY CIPHERS

@article{Sullivan2005BREAKINGGA,
  title={BREAKING GERMAN ARMY CIPHERS},
  author={Geoff Sullivan and Frode Weierud},
  journal={Cryptologia},
  year={2005},
  volume={29},
  pages={193 - 232}
}
ABSTRACT A large number of encrypted German Army radio messages, from 1941 and 1945, have survived the end of the Second World War to the present day. Most of these messages are enciphered on the three-wheel, steckered Wehrmacht Enigma. We present an account of a ciphertext-only cryptanalysis of these messages and give details of the Enigma procedures used in the networks. 
Modern breaking of Enigma ciphertexts
TLDR
After reviewing the work done, and investigating the reasons for both lucky breaks and close misses, the modern ciphertext-only attack on Enigma messages is improved, especially on genuine ones with short lengths and/or many garbles.
Enigma Message Procedures Used by the Heer, Luftwaffe and Kriegsmarine
Abstract This paper is an effort to merge existing information about the message procedures, the enciphering methods and the required documents used with the German Enigma cipher machine by the
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher
TLDR
Although Alpha1 is a 128-bit stream cipher, the key can be recovered through this divide and conquer attack with complexity 261, using 35,000 bits of known plaintext.
Classic cryptanalysis using hidden Markov models
TLDR
The authors present a detailed introduction to hidden Markov models (HMM) and apply HMMs to the problem of solving simple substitution ciphers, and they empirically determine the accuracy as a function of the ciphertext length and the number of random restarts.
Cryptanalysis of Enigma double indicators with hill climbing
TLDR
Two new algorithms that build on the historical cryptanalytic attacks on the two variants of the double-indicator procedures are introduced, based on hill climbing, divide-and-conquer, and specialized scoring functions, and they can recover the daily key using a number of indicators significantly smaller than the number oficators required for the historical methods.
Applications of search techniques to cryptanalysis and the construction of cipher components.
TLDR
The emphasis then shifts from the construction of cryptographic artefacts to the related area of cryptanalysis, in which non-linear approximations to S-boxes more powerful than the existing linear approximation are derived and exploited in cryptanalytic attacks against the ciphers DES and Serpent.
History and Modern Cryptanalysis of Enigma's Pluggable Reflector
TLDR
The development history of Umkehrwalze Dora, Enigma's pluggable reflector, is presented from the first ideas in the mid-1920s to the last development plans and its actual usage in 1945, when it was intercepted by the British.
FPGA Implementation of Mac Based Stream Cipher-Phelix
Now a day's many people are connected to the internet with large amount of confidential information such as mails, transactions, being transmitted every day. Privacy and the confidentiality of this
Learning Cryptanalysis the Hard Way: A Study on German Culture of Cryptology in World War I
  • I. Niebel
  • Political Science, Computer Science
    HistoCrypt
  • 2018
TLDR
Understanding the antecedent German culture of cryptology enables us to investigate that of its descendants – spanning the decades from World War II to the Cold War, as well as today's "information security culture".
Deciphering German diplomatic and naval attaché messages from 1900-1915
  • G. Lasry
  • Computer Science, Political Science
    HistoCrypt
  • 2018
Abstract In World War One (WW I), the German diplomatic services and the Imperial Navy employed codebooks as the primary means for encoding confidential communications over telegraph and radio
...
1
2
...

References

SHOWING 1-10 OF 24 REFERENCES
Cryptology in the Early Bundesrepublik
TLDR
Many intelligence services, but the emphasis is on those involved in electronic warfare where cryptography and cryptanalysis are shrouded under the foggy cover of Electronic Warfare.
PURPLE REVEALED: SIMULATION AND COMPUTER-AIDED CRYPTANALYSIS OF ANGOOKI TAIPU B
TLDR
The structure and internal wiring of the machine, as well as details of the keying procedures and a system of abbreviations, which was used in the messages, are presented.
Ciphertext-only Cryptanalysis of Enigma
TLDR
Recovery of the message key setting is sensitive enough to distinguish the correct rotor order and its performance is estimated for different message lengths and numbers of plugs used.
CRYPTANALYSIS OF HAGELIN MACHINE PIN WHEELS
TLDR
A ciphertext-only attack on the pin wheel patterns of the Hagelin CD-57 Cryptographer is described, and the method is extended to finding the lug and pin settings of the M-209 using a longer message.
The Bombe a Remarkable Logic Machine
TLDR
The bombe was an electromechanical machine devised by Alan Turing and Gordon Welchman for breaking the German Enigma cipher in World War II and its relationship to the Polish version of the ‘bombe’ is explored.
Effectiveness of the Diagonal Board
TLDR
The work showed that there remained a class of false stops which had not been eliminated and further investigation showed that an attachment called the ‘machine gun’ helped to reduce the time lost for this reason.
British Intelligence in the Second World War
To the German invasion of Soviet Russia from the summer of 1941 to the end of 1942 the first half of 1943 from the summer of 1943 to the summer of 1944 Overlord and the Battle of Normandy the defeat
UMKEHRWALZE D: ENIGMA'S REWIRABLE REFLECTOR - PART I
Umkehrwalze D was a field-rewirable reflector for the German service Enigma machine, introduced primarily on German Air Force cipher networks late in the Second World War. The three parts of this
UMKEHRWALZE D: ENIGMA'S REWIRABLE REFLECTOR - PART II
Umkehrwalze D was a field-rewirable reflector for the German service Enigma machine, introduced primarily on German Air Force cipher networks late in the Second World War. The three parts of this
Enigma: The Battle for the Code
List of Illustrations. Acknowledgements. Introduction. Prologue. The Betrayal -- Belgium and Germany, 1931. The Leak -- Poland, Belgium and Germany, 1929--38. An Inspired Guess -- Poland, 1932. A
...
1
2
3
...