Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Swedish analysis of Nazi crypto TTYs

Type
Slides
Tags
cryptography
Authors
Sven Moritz Hallberg
Event
Chaos Communication Camp 2007
Indexed on
Mar 27, 2013
URL
http://events.ccc.de/camp/2007/Fahrplan/attachments/1327-G-Schreiber%20Slides
File name
1327-G-Schreiber%20Slides
File size
103.2 KB
MD5
ed1a1fe29995003a4a9a3d8dba0d7840
SHA1
0373e8c8a689380a26b9c33c1f13f9ab582d5172

This talk will describe how a team of Swedish cryptanalysts broke the electromechanical cryptographic teleprinter "Siemens & Halske T52" which was used by the Germans during World War II for "important" traffic. It contained a stream cipher implementation much more sophisticated than the substitution engine of the well-known Enigma. The talk will focus on reconstructing how the Swedes, specifically the key figure of Arne Beurling, could have gotten the ideas for breaking the cipher -- a process about which next to no historical accounts exist. The machine called Enigma, widely famous for being used by German armies during World War II to secretly (or so they hoped) communicate among troops, was a field device. It was portable, simple to operate, as well as relatively cheap to produce, containing neither electrical motors nor any coding/decoding assembly. It was, however, not the only crypto device employed by the Germans. The Siemens & Halske T52 (in its several variants), commonly referred to as the Geheim- or G-Schreiber (German for "secretly-writer"), was a teleprinter with integrated encryption/decryption facility. It was cryptographically superior to the Enigma and, by its nature, much more sophisticated in terms of its electro-mechanical engineering. Due to the latter, it was also much bulkier, weighing no less than 100kg, excluding the transport case. Therefore it was used as a stationary unit, primarily by the German air force, navy, and for diplomatic purposes. In total, about 600 units were in operation. From April 1940, Swedish authorities gained access to large quantities of T52-encrypted telegraph traffic. With Norway just invaded and significant parts of Finland already surrendered to Russia, the Swedes were obviously interested in the plaintexts and, having been quite successful at breaking Russian and French crypto already, promptly tried their luck in deciphering the German messages. The initial successfull cryptanalysis was done in only a matter of weeks by a scientist named Arne Beurling with next to no knowledge but the mere basics of teleprinter technology and a bunch of ciphertext intercepts. Unfortunately he refused to talk about the details of how he actually broke the cipher. This talk will try to reconstruct a possible sequence of ideas that could have led to the eventual breaking of the code. Thus it tries to shed some light on the "magical" work of a cryptanalyst.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !