Grid method
The grid method (actually: "Der Rost" , Polish Metoda rusztu ( German literally: "Rust method" ), English grill method , French Méthode du gril ) was a cryptanalytic process devised by the Polish cryptanalyst Marian Rejewski in the early 1930s of the key of the German rotor key machine Enigma .
background
Since June 1, 1930, when the Enigma I went into service , the German Reichswehr had an - for the time - exceptionally secure encryption machine . In contrast to its predecessors, such as the Enigma-D , it was strengthened by a secret additional device, the plug board used exclusively by the military (picture) . This allowed all letters of the Latin alphabet to be exchanged in pairs .
However, the cryptographic potential of the plug board was not fully used. Instead of using all thirteen possible and available letter pairs , in the first few years the company limited itself to exchanging only six of them with double-pole plug-in cables. The remaining fourteen (14 = 26 - 2 × 6) letters remained " unplugged " (were not swapped). The Enigma set in this way was then used to encrypt the message key to be individually selected for each encrypted radio message . Here, the German authorities made another mistake by stipulating that the key to the verdict be doubled .
method
The prerequisites for the implementation of the grid method are - after the Polish Biuro Szyfrów ( German "Chiffrenbüro" ) had clarified the functionality of the machine and determined the wiring of the rollers - the above two procedural errors: Use of only six (of the thirteen possible) plug connections and the duplication of the spell key . The Polish cryptanalyst could also assume that "firstly, while the key is being keyed, the central roller only turns about once in 5 cases [exactly 5 out of 26], and secondly that the plug connection leaves a number of letters unchanged."
Under these conditions, it is possible to specify a relation between the left part of the roller set, consisting of the middle and left roller as well as the reversing roller (VHF), and the right part, consisting of the rotating right roller, in the form of a system of equations. Since the doubled saying key consists of a total of six letters, you get six such equations. The respective left-hand side is constant for all six equations with the exception of an “exponent”, which can have one of 26 values. And the respective right side shows the substitution of the right roller. Rejewski called these substitution with the letter F . This can be calculated for each of the 26 assumed cases of the exponent using each of the six equations. In most cases, the six equations different result F , with one exception, the same in all six equations F specify. This is the solution you are looking for, from which you can deduce the rotational position of the right roller.
The method described depends on the fact that none of the six letters of the duplicated slogan key and its encryption are "plugged in", i.e. that they are not mixed up by a cable plugged into the plug board. If this is still the case, then with a little effort it is possible to use the method anyway if only a few letters are affected by "plugging". However, if too many or even all letters are inserted, the method will fail. In other words, the usefulness of the screening method is impaired by the number of letters swapped. If the Germans had swapped all thirteen pairs of letters with plug-in cables, the break-in opportunity described would not have existed.
In practice, the Polish cryptanalysts saved themselves the tedious and time-consuming examinations and calculations that were repeated for each individual daily key . Instead, they devised a mechanical process using two sheets of paper placed one on top of the other. On the lower one, write the possible substitutions made by the left part of the set of rollers in 26 consecutive lines. Each line contains the assumed “scrambled” substitution alphabet. On the upper sheet, write the substitutions given by the six letters of the doubled key in six lines, also as 26 scrambled letters each. Slits were cut below each of the six lines through which one could see the lower sheet (picture) .
So the top sheet looks like a grate. This grid is placed on the lower sheet and shifted up and down until one discovers identical substitutions on the upper sheet and - through the grid slits - on the lower sheet. As I said, this only applies if you are “lucky” and the letters concerned “happen to be” all unplugged. Otherwise it can still be possible to recognize certain symmetries or analogies between letter pairs and thus even to open up some plug connections. The result is some of the connectors you are looking for and the rotation position of the right roller.
successor
The grid method was rarely used after October 1936. Instead, it created using a now specially built for this purpose electromechanical cryptanalytic auxiliary device, called the cyclometer ( German literally means "bow knife" ), a so-called " Catalog of characteristics " (Polish: Catalog charakterystyk ). On the basis of this, the key sought could be determined much more easily and quickly. The creation of this cycle catalog, as Rejewski expressed himself, "was laborious and took more than a year, but after it was finished [...] day keys could [be] determined within about 15 minutes".
literature
- Friedrich L. Bauer : Deciphered Secrets. Methods and maxims of cryptology. 3rd, revised and expanded edition. Springer, Berlin et al. 2000, ISBN 3-540-67931-6 .
- Friedrich L. Bauer: Historical Notes on Computer Science . Springer, Berlin 2009. ISBN 3-540-85789-3 .
- David Kahn : Seizing the Enigma - The Race to Break the German U-Boat Codes, 1939-1943 . Naval Institute Press, Annapolis, MD, USA, 2012, ISBN 978-1-59114-807-4 .
- Władysław Kozaczuk : Secret Operation Wicher . Bernard et al. Graefe, Koblenz 1989, Karl Müller, Erlangen 1999. ISBN 3-7637-5868-2 , ISBN 3-86070-803-1
- Władysław Kozaczuk: Under the spell of Enigma . Military publishing house of the German Democratic Republic , 1987, ISBN 3-327-00423-4
- Władysław Kozaczuk & Jerzy Straszak: Enigma - How the Poles Broke the Nazi Code . Hyppocrene Books, New York 2004. ISBN 0-7818-0941-X
- Tadeusz Lisicki : The performance of the Polish deciphering service in solving the method of the German "Enigma" radio key machine in J. Rohwer and E. Jäkel: The radio clearing up and its role in the Second World War , Motorbuch Verlag, Stuttgart, 1979, pp. 66-81 . PDF; 1.7 MB . Retrieved March 11, 2019.
- Marian Rejewski and Henryk Zygalski : Brief description of the dissolution methods. Bertrand Archive SHD DE 2016 ZB 25/6, Dossiers Nos. 281 and 282, ca 1940.
- Dermot Turing : X, Y & Z - The Real Story of how Enigma was Broken. The History Press , 2018, ISBN 978-0-75098782-0 .
Web links
- Secret Operation Wicher Description of the Polish contribution to the breaking of the Enigma.
Individual evidence
- ^ Friedrich L. Bauer: Historical Notes on Computer Science . Springer, Berlin 2009, p. 301. ISBN 3-540-85789-3 .
- ↑ Marian Rejewski and Henryk Zygalski: Brief description of the dissolution methods. Bertrand Archive SHD DE 2016 ZB 25/6, Dossiers Nos. 281 and 282, ca.1940, pp. 24-26.
- ↑ Craig P. Bauer: Secret History | - The Story of Cryptology . CRC Press, Boca Raton 2013, p. 248. ISBN 978-1-4665-6186-1 .
- ↑ Louis Kruh, Cipher Deavours: The Commercial Enigma - Beginnings of Machine Cryptography . Cryptologia, Vol.XXVI, No. 1, January 2002, p. 11. apprendre-en-ligne.net (PDF; 0.8 MB), accessed on March 11, 2019.
- ↑ Friedrich L. Bauer: Deciphered secrets. Methods and maxims of cryptology. 3rd, revised and expanded edition. Springer, Berlin a. a. 2000, p. 412.
- ↑ Marian Rejewski and Henryk Zygalski: Brief description of the dissolution methods. Bertrand Archive SHD DE 2016 ZB 25/6, Dossiers Nos. 281 and 282, ca.1940, p. 24.
- ↑ Marian Rejewski and Henryk Zygalski: Brief description of the dissolution methods. Bertrand Archive SHD DE 2016 ZB 25/6, Dossiers Nos. 281 and 282, ca.1940, p. 26.
- ^ Friedrich L. Bauer: Historical Notes on Computer Science . Springer, Berlin 2009, pp. 301-302. ISBN 3-540-85789-3 .
- ↑ Friedrich L. Bauer: Deciphered secrets. Methods and maxims of cryptology. 3rd, revised and expanded edition. Springer, Berlin a. a. 2000, p. 417.
- ^ Dermot Turing: X, Y & Z - The Real Story of how Enigma was Broken. The History Press, Stroud 2018, ISBN 978-0-75098782-0 , p. 67.