Тёмный

The U.S. SIGABA Cipher Machine - An Incredible Encryption Device 

Cryptography for Everybody
Подписаться 15 тыс.
Просмотров 3,9 тыс.
50% 1

Опубликовано:

 

14 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 11   
@MichaelDoornbos
@MichaelDoornbos 3 года назад
I knew this existed, but knew almost nothing about it until now. I’m thinking about implementing it on an 8 Bit Machine. Excellent presentation.
@CryptographyForEverybody
@CryptographyForEverybody 3 года назад
Hi Michael Doornbos, Thank you :-) If you need furhter details for implementing the SIGABA, you may have a look at (1) the MysterytwisterC3 challenges zip; here, you find a paper about the SIGABA's inner workings (www.mysterytwisterc3.org/en/challenges/level-2/sigaba-csp-889-part-1) (2) the source code written in C# (svn.cryptool.org/CrypTool2/trunk/CrypPlugins/SIGABA/SIGABAImplementation.cs). Username "anonymous", passwort blank. Greetings, Nils
@elisouille
@elisouille 3 месяца назад
hi i'm a french person preparing an oral about different cipher machines used during wwII so thanks for your very useful video ! i have one thing i don't understand : why are the index rotors for ?
@CryptographyForEverybody
@CryptographyForEverybody 3 месяца назад
Hi thank you, the index rotors are fed with current by the control rotors and output the current to the stepping control. basically they are just changing the input based on their positions and rotations. They never move but since they can be put in any configuration into the machine they are also part of the key. I hope this answers the question 🙂 Greetings, Nils
@elisouille
@elisouille 3 месяца назад
@@CryptographyForEverybody thank you I think I understood ! i just have two more questions : for the maths of the key space size, why don't you take into account the 2^35.5 for the positions of the rotors ? also, is there any chance you have worked on the purple cipher machine by the japanese side during WWII ? it's also called the type b cipher machine or the code 97 I think thank you for all your work it's really helping 🙏🫶
@ed3086
@ed3086 3 года назад
Nice and well-structured video. Thx Could u pls answer some more questions? - So now we can encrypt and decrypt messages in ct2 with the sigaba emulator by our own. This is done instantly. Do you know how quick this was done by the operators then in history? - What is the weight of such a device? - Will the cryptanalysis algorithms mentioned be implemented someday too? Will they also be open-source?
@CryptographyForEverybody
@CryptographyForEverybody 3 года назад
Hello Ed, Answers to your questions: a) "Do you know how quick this was done by the operators then in history?" --> Not sure how fast they were. I know that Enigma operators often worked in teams of... One operator typed in the plaintext letters and another one read out the ciphertext letters. Often, a third one also morsed the message. Since the U.S. Sigaba was used on battleships and in headquarters and not in the field (in contrast to Enigma), I assume it was operated by only one person. Also, I think, Sigaba could be directly connected to a telewriter... So I think it could be operated fastly (telewriter) or "slowly" (by hand) b) "Will the cryptanalysis algorithms mentioned be implemented someday too? Will they also be open-source?" --> Probably I will implement it. George Lasry told me, that the analysis takes several hours and is rather complex. Therefore, I am not sure which part we will put into CT2. And yes, of course, everything will be open-source :-) Greetings, Nils
@richardroddenberry2079
@richardroddenberry2079 3 года назад
I believe SIGABA led to the KL-7. any thoughts about that? Rodstar - an old AF crypto technician
@CryptographyForEverybody
@CryptographyForEverybody 3 года назад
Hello Richard Roddenberry, I am by far no expert of the KL-7 :-). But it is a quite interesting machine. I think I will have to look at it in detail to answer that correctly. Maybe, we have to implement it in CT2 and I will also create a video about it. Nevertheless, I think, they always used knowledge gained based on analyses of previous machines for developing the new ones. I think that for example William Friedman was even inspired by Enigma. Knowing Enigma's weaknesses, he designed SIGABA in such a way that it has none of the Enigma weaknesses, e.g. the reflector. Greetings, Nils
@richardroddenberry2079
@richardroddenberry2079 3 года назад
great video
@CryptographyForEverybody
@CryptographyForEverybody 3 года назад
Thank you very much :-)
Далее
The Straddling Checkerboard Cipher Explained
17:28
Просмотров 2,3 тыс.
The British Typex Cipher Machine Explained
22:36
Просмотров 2,9 тыс.
The German SZ42 Cipher Machine Explained
32:13
Просмотров 2,1 тыс.
Coding the Enigma machine - Part 1
27:43
Просмотров 22 тыс.
How Enigma was cracked
19:29
Просмотров 142 тыс.
Flaw in the Enigma Code - Numberphile
10:58
Просмотров 4,9 млн
How did the Enigma Machine work?
19:26
Просмотров 10 млн