Cyclometer (horse)
   HOME

TheInfoList



OR:

The cyclometer was a
cryptologic Cryptologic Limited was a Dublin, Ireland-based software application service provider (formerly Toronto, Ontario, Canada), one of the oldest established in the online gambling industry. It was acquired by the Amaya Gaming Group in 2012 and has sin ...
device designed, "probably in 1934 or 1935," by
Marian Rejewski Marian Adam Rejewski (; 16 August 1905 – 13 February 1980) was a Polish people, Polish mathematician and Cryptography, cryptologist who in late 1932 reconstructed the sight-unseen German military Enigma machine, Enigma cipher machine, aided ...
of the
Polish Cipher Bureau The Cipher Bureau ( Polish: ''Biuro Szyfrów'', ) was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography (the ''use'' of ciphers and codes) and cryptanalysis (the ''study'' of ciphers and codes ...
's German section (BS-4), to catalog the
cycle Cycle, cycles, or cyclic may refer to: Anthropology and social sciences * Cyclic history, a theory of history * Cyclical theory, a theory of American political history associated with Arthur Schlesinger, Sr. * Social cycle, various cycles in ...
structure of
Enigma Enigma may refer to: *Riddle, someone or something that is mysterious or puzzling Biology *ENIGMA, a class of gene in the LIM domain Computing and technology * Enigma (company), a New York–based data-technology startup *Enigma machine, a famil ...
permutation In mathematics, a permutation of a set can mean one of two different things: * an arrangement of its members in a sequence or linear order, or * the act or process of changing the linear order of an ordered set. An example of the first mean ...
s, thereby facilitating the decryption of German
Enigma Enigma may refer to: *Riddle, someone or something that is mysterious or puzzling Biology *ENIGMA, a class of gene in the LIM domain Computing and technology * Enigma (company), a New York–based data-technology startup *Enigma machine, a famil ...
ciphertext In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext ...
. With Rejewski's later
cryptologic bomb The ''bomba'', or ''bomba kryptologiczna'' (Polish for "bomb" or "cryptologic bomb"), was a special-purpose machine designed around October 1938 by Polish Cipher Bureau cryptologist Marian Rejewski to break German Enigma-machine ciphers. Etym ...
, it can be viewed as a predecessor to the
Bombe The bombe () was an Electromechanics, electro-mechanical device used by British cryptologists to help decipher German Enigma machine, Enigma-machine-encrypted secret messages during World War II. The United States Navy, US Navy and United Sta ...
that was to help break Enigma ciphers later in the war at
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
in England. Using drawings made by Rejewski, Hal Evans and Tim Flack at the Department of Engineering,
University of Cambridge The University of Cambridge is a Public university, public collegiate university, collegiate research university in Cambridge, England. Founded in 1209, the University of Cambridge is the List of oldest universities in continuous operation, wo ...
, in 2019 constructed a working version of the cyclometer.


History


Example message

Fede Weierud provides the procedure, secret settings, and results that were used in a 1950 German technical manual.
Daily key (shared secret):
  Wheel Order  : II  I  III
  Ringstellung : 24  18  22 (XMV)
  Reflector    : A
  Plugboard    : A-M, F-I, N-V, P-S, T-U, W-Z
  Grundstellung: FOL

Operator chosen message key : ABL
Enciphered starting with FOL: PKPJXI

Cleartext message to send and resulting cleartext:
  Feindliche Infanteriekolonne beobachtet.
  Anfang Südausgang Bärwalde.
  Ende drei km ostwärts Neustadt.

  FEIND LIQEI NFANT ERIEK 
  OLONN EBEOB AQTET XANFA 
  NGSUE DAUSG ANGBA ERWAL 
  DEXEN DEDRE IKMOS TWAER 
  TSNEU STADT

Resulting message:
  1035 – 90 – 341 – 
  PKPJX IGCDS EAHUG WTQGR
  KVLFG XUCAL XVYMI GMMNM
  FDXTG NVHVR MMEVO UYFZS
  LRHDR RXFJW CFHUH MUNZE
  FRDIS IKBGP MYVXU Z
The first line of the message is not encrypted. The "1035" is the time, "90" is number of characters encrypted under the message key, and "341" is a system indicator that tells the recipient how the message was encrypted (i.e., using Enigma with a certain daily key). The first six letters in the body ("PKPJXI") are the doubled key ("ABLABL") encrypted using the daily key settings and starting the encryption at the ground setting/Grundstellung "FOL". The recipient would decipher the first six letters to recover the message key ("ABL"); he would then set the machine's rotors to "ABL" and decipher the remaining 90 characters. Notice that the Enigma does not have numerals, punctuation, or umlauts. Numbers were spelled out. Most spaces were ignored; an "X" was used for a period. Umlauts used their alternative spelling with a trailing "e". Some abbreviations were used: a "Q" was used for "CH".


Marian Rejewski

During
Marian Rejewski Marian Adam Rejewski (; 16 August 1905 – 13 February 1980) was a Polish people, Polish mathematician and Cryptography, cryptologist who in late 1932 reconstructed the sight-unseen German military Enigma machine, Enigma cipher machine, aided ...
's mathematics studies at
Poznań University Poznań ( ) is a city on the Warta, River Warta in west Poland, within the Greater Poland region. The city is an important cultural and business center and one of Poland's most populous regions with many regional customs such as Saint John's ...
, the
Polish Cipher Bureau The Cipher Bureau ( Polish: ''Biuro Szyfrów'', ) was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography (the ''use'' of ciphers and codes) and cryptanalysis (the ''study'' of ciphers and codes ...
recruited him and some other mathematics students, including
Jerzy Różycki Jerzy Witold Różycki (; 24 July 1909 – 9 January 1942) was a Polish mathematician and cryptologist who worked at breaking German Enigma-machine ciphers before and during World War II. Life Różycki was born in what is now Ukraine, the fou ...
and
Henryk Zygalski Henryk Zygalski (; 15 July 1908 – 30 August 1978) was a Polish mathematician and cryptologist who worked at breaking German Enigma-machine ciphers before and during World War II. Life Zygalski was born on 15 July 1908 in Posen, German Empi ...
, to take a Bureau-sponsored course on cryptology. The Bureau later hired some of the students to work part-time at a temporary local Bureau office. After graduating from Poznań University, at the
University of Göttingen The University of Göttingen, officially the Georg August University of Göttingen (, commonly referred to as Georgia Augusta), is a Public university, public research university in the city of Göttingen, Lower Saxony, Germany. Founded in 1734 ...
Rejewski completed the first year of a two-year actuarial statistics course, then returned to Poznań. In September 1932 he, Różycki, and Zygalski went to Warsaw to work full-time for the Cipher Bureau. In December 1932 Rejewski was tasked by the Cipher Bureau to work on the German Enigma cipher machine. The Bureau had attempted, but had failed, to break it. Within a few weeks, Rejewski managed to reconstruct the machine. The German Enigma message procedures used common, secret daily machine settings, but also required a cipher clerk to choose an individual three-letter message key. Thus, a clerk might choose "ABL" as the message key. The message key was used to set the initial position of the rotors when enciphering or deciphering the message. Choosing an individual message key was a security measure: it avoided having all the day's messages sent using the same polyalphabetic key, which would have made the messages vulnerable to a polyalphabetic attack. However, the sender needed to communicate the message key to the recipient in order for the latter to decipher the message. The message key was first encrypted using the day's ''Grundstellung'' (a secret initial position of the Enigma's rotors, e.g., "FOL"). Communications were sometimes garbled, and if the message key were garbled, the recipient would be unable to decrypt the message. Consequently the Germans took the precaution of sending the message key twice; if there was a garble, the recipient should be able to find the message key. Here the Germans committed a crucial error. Instead of sending the encrypted message key (e.g., "PKP") twice to get "PKP PKP", they doubled the message key (e.g., "ABL ABL"), encrypted the doubled key to get ("PKP JXI"), and sent the encrypted doubled key. That mistake allowed Rejewski to identify six sequential permutations of the Enigma and exploit the knowledge that they encrypted the same message key. With the help of a commercial Enigma machine, German materials obtained by French spy
Hans-Thilo Schmidt Hans-Thilo Schmidt (13 May 1888 – 19 September 1943) codenamed Asché or Source D, was a German spy who sold secrets about the Enigma machine to the French during World War II. The materials he provided facilitated Polish mathematician Marian ...
, and German cipher clerks who chose weak keys, Rejewski was able to reverse-engineer the wiring of the Enigma's rotors and reflector. The Cipher Bureau then built several
Polish Enigma doubles A Polish Enigma "double" was a machine produced by the Polish Biuro Szyfrów that replicated the German Enigma machine. The Enigma double was one result of Marian Rejewski's remarkable achievement of determining the wirings of the Enigma's rotors ...
that could be used to decrypt German messages.


Characteristic

The German procedure that sent an encrypted doubled key was the mistake that gave Rejewski a way in. Rejewski viewed the Enigma as permuting the plaintext letters into ciphertext. For each character position in a message, the machine used a different permutation. Let ''A B C D E F'' be the respective permutations for the first through sixth letters. Rejewski knew the first and fourth letters were the same, the second and fifth letters were the same, and third and sixth letters were the same. Rejewski could then examine the day's message traffic; with enough traffic he could piece together the composed permutations. For example, for the daily key in a 1930 technical manual, then (with enough messages) Rejewski could find the following characteristics: :\begin AD &= \texttt \\ BE &= \texttt \\ CF &= \texttt \\ \end The notation is
Cauchy Baron Augustin-Louis Cauchy ( , , ; ; 21 August 1789 – 23 May 1857) was a French mathematician, engineer, and physicist. He was one of the first to rigorously state and prove the key theorems of calculus (thereby creating real a ...
's
cycle notation In mathematics, a permutation of a set can mean one of two different things: * an arrangement of its members in a sequence or linear order, or * the act or process of changing the linear order of an ordered set. An example of the first meanin ...
. By examining the day's traffic, Rejewski would notice that if "p" were the first letter of the indicator, then "j" would be the fourth letter. On another indicator, "j" would be the first letter, and "x" would be the fourth letter. Rejewski would continue following the letters. Eventually, there would be a message whose first letter was "y" and the fourth letter would cycle back to "p". The same observations would be done for the second and fifth letters; usually there would be several cycles.


Grill method

Rejewski could use this cycle information and some sloppy habits of code clerks to figure out the individual permutations ''A B C D E F'' using the grill method, but that method was tedious. After using the grill, the Poles would know the rightmost rotor and its position, the plugboard connections, and ''Q'' (the permutation of the reflector and other two rotors). In order to get the daily key, the Poles would still have a lot of work to do, and that work could entail trying all possible orders and positions for the two left rotors to find the position for the Grundstellung. The Poles started using a ''Q''-catalog to make part of the grill method easier; that catalog had 4,056 entries (26 × 26 × 6). To find the ring settings, the grill method could require trying 17,576 possibilities. The grill method worked well until 1 October 1936, the day the Germans stopped using six steckers (plugboard connections) and started using five to eight steckers. More steckers could frustrate the grill method.


Cycle lengths

Instead of indexing the catalog by the actual cycles, the Poles hit upon indexing the catalog by the length of the cycles. Although the plugboard changed the identity of the letters in the permutation, the plugboard did not change the lengths of the cycles. It turns out there are 101 possible patterns for the cycle lengths of an indicator permutation. With the three permutations in the characteristic, there are about one million possible cycle length combinations (). Consequently, the cycle lengths could be used as a
hash function A hash function is any Function (mathematics), function that can be used to map data (computing), data of arbitrary size to fixed-size values, though there are some hash functions that support variable-length output. The values returned by a ...
into a
hash table In computer science, a hash table is a data structure that implements an associative array, also called a dictionary or simply map; an associative array is an abstract data type that maps Unique key, keys to Value (computer science), values. ...
of the 105,456 possible combinations. The Poles would look at the day's traffic, recover the characteristic of the indicator, and then look in the card catalog. The odds would be good that only one (or maybe a few) cards had those cycle lengths. The result would be the appropriate rotor order and the positions of all the rotors without much work. The method was simpler than the grill method and would work when there were many steckers.


Recovering the plugboard

The catalog did not disclose the plugboard settings. For six plugs (''steckers''), there are about 100 billion possible arrangements. Trying them all out is infeasible. However, the cryptographer could find the characteristic for that rotor order without a plugboard, use that bare characteristic in a known plaintext attack, and then determine the plugboard settings by comparing them with the daily characteristic. From some daily traffic, the cryptanalyst would calculate the characteristic. :\begin AD &= \texttt \\ BE &= \texttt \\ CF &= \texttt \\ \end In the grill method, the above characteristic would be solved for the individual permutations and then a laborious search would be done. Instead, the characteristic's paired cycle lengths would be calculated:
AD: 13
BE: 10 3
CF: 10 2 1
Those lengths would be looked up in the card catalog, and an entry would be found that would state the wheel order (II, I, III) and the initial position of each wheel. The card catalog did not include the actual characteristic: the cyclometer only indicated membership in a cycle; it did not specify the order of letters in a cycle. After finding a catalog entry, the cryptanalyst would then calculate the characteristic without steckers (just the catalog settings). The cryptanalyst can determine each of the individual permutations by setting an Enigma to the given wheel order and initial positions. The cryptanalyst then presses a and holds it down; the corresponding lamp lights and is written down; without releasing the first letter, the cryptanalyst presses b and then releases the first letter; that keeps the machine from advancing the rotors and lights the lamp corresponding to b. After mapping out all of , the cryptanalyst can move on to and the other permutations. The cryptanalyst recovers the unsteckered characteristic: :\begin A^*D^* &= \texttt \\ B^*E^* &= \texttt \\ C^*F^* &= \texttt \\ \end The two characteristics are then used to solve the stecker permutation . For this example, there are six ''steckers'', and they would affect 12 characters. Looking at the cycles, the plugboard cycles must transpose with the un-''steckered'' cycles . None of the letters are same, so all of those eight letters are steckered. Looking at the singleton cycles of and shows not only that "e" is not steckered, but also that "w" and "z" are steckered together. Thus ten of the twelve steckered letters are quickly identified. Most of the other 16 letters, such as "b", "d", "g", and "l", are probably not steckered. The cycle notation of , , and can be rearranged to match the likely unsteckered characters. (The initial letter of a cycle's notation is not significant: within a cycle, the letters must keep the same sequence, but they may be rotated. For example, is the same as which is the same as .) :\begin AD &= \texttt \\ A^*D^* &= \texttt \\ BE &= \texttt \\ B^*E^* &= \texttt \\ CF &= \texttt \\ C^*F^* &= \texttt \\ \end At this point, the potential steckers can be read from the differences in the first two lines; they can also be checked for interchange consistency. The result is
P-S T-U W-Z N-V A-M F-I
These steckers match the 1930 Enigma example. The only remaining secret is the ring positions (''Ringstellung'').


Building the catalog

The cyclometer was used to prepare a catalog of the length and number of
cycles Cycle, cycles, or cyclic may refer to: Anthropology and social sciences * Cyclic history, a theory of history * Cyclical theory, a theory of American political history associated with Arthur Schlesinger, Sr. * Social cycle, various cycles in ...
in the "characteristics" for all 17,576 positions of the rotors for a given sequence of rotors. Since there were six such possible sequences, the resulting "catalog of characteristics," or "
card catalog A library catalog (or library catalogue in British English) is a register of all bibliographic items found in a library or group of libraries, such as a network of libraries at several locations. A catalog for a group of libraries is also ...
," comprised a total of (6) (17,576) = 105,456 entries. The utility of the
card catalog A library catalog (or library catalogue in British English) is a register of all bibliographic items found in a library or group of libraries, such as a network of libraries at several locations. A catalog for a group of libraries is also ...
, writes Rejewski, was independent of the number of plug connections being used by the Germans on their Enigma machines (and of the reconstruction of message keys). Preparation of the catalog "was laborious and took over a year, but when it was ready... daily keys ould be obtainedwithin about fifteen minutes." On November 1, 1937, however, the Germans changed the "reversing drum," or "
reflector Reflector may refer to: Science * Reflector, a device that causes reflection (for example, a mirror or a retroreflector) * Reflector (photography), used to control lighting contrast * Reflecting telescope * Reflector (antenna), the part of an ant ...
." This forced the Cipher Bureau to start anew with a new card catalog, "a task," writes Rejewski, "which consumed, on account of our greater experience, probably somewhat less than a year's time."Rejewski, "Summary of Our Methods...", p. 242. But then, on September 15, 1938, the Germans changed entirely the procedure for enciphering message keys, and as a result the card-catalog method became completely useless. This spurred the invention of Rejewski's
cryptologic bomb The ''bomba'', or ''bomba kryptologiczna'' (Polish for "bomb" or "cryptologic bomb"), was a special-purpose machine designed around October 1938 by Polish Cipher Bureau cryptologist Marian Rejewski to break German Enigma-machine ciphers. Etym ...
and Zygalski's
perforated sheets The method of Zygalski sheets was a cryptologic technique used by the Polish Cipher Bureau before and during World War II, and during the war also by British cryptologists at Bletchley Park, to decrypt messages enciphered on German Enigma machin ...
.Rejewski, "Summary of Our Methods...", pp. 242–43.


See also

*
Cryptologic bomb The ''bomba'', or ''bomba kryptologiczna'' (Polish for "bomb" or "cryptologic bomb"), was a special-purpose machine designed around October 1938 by Polish Cipher Bureau cryptologist Marian Rejewski to break German Enigma-machine ciphers. Etym ...
: a machine designed about October 1938 by
Marian Rejewski Marian Adam Rejewski (; 16 August 1905 – 13 February 1980) was a Polish people, Polish mathematician and Cryptography, cryptologist who in late 1932 reconstructed the sight-unseen German military Enigma machine, Enigma cipher machine, aided ...
to facilitate the retrieval of Enigma keys. *
Bombe The bombe () was an Electromechanics, electro-mechanical device used by British cryptologists to help decipher German Enigma machine, Enigma-machine-encrypted secret messages during World War II. The United States Navy, US Navy and United Sta ...
: a machine, inspired by Rejewski's "(cryptologic) bomb," that was used by British and American cryptologists during World War II. *
Cryptanalysis of the Enigma Cryptanalysis of the Enigma ciphering system enabled the western Allies of World War II, Allies in World War II to read substantial amounts of Morse code, Morse-coded radio communications of the Axis powers that had been enciphered using Enigm ...
and
Enigma machine The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the W ...
. *
Zygalski sheets The method of Zygalski sheets was a cryptologic technique used by the Polish Cipher Bureau before and during World War II, and during the war also by British cryptologists at Bletchley Park, to decrypt messages enciphered on German Enigma machi ...
: invented about October 1938 by
Henryk Zygalski Henryk Zygalski (; 15 July 1908 – 30 August 1978) was a Polish mathematician and cryptologist who worked at breaking German Enigma-machine ciphers before and during World War II. Life Zygalski was born on 15 July 1908 in Posen, German Empi ...
and called "perforated sheets" by the Poles, they made possible the recovery of the Enigma's entire cipher key.


Notes


References

*
Władysław Kozaczuk Władysław Kozaczuk (23 December 1923 – 26 September 2003) was a Polish Army colonel and a military and intelligence historian. Life Born in the village of Babiki near Sokółka, Kozaczuk joined the army in 1944, during World War II, at B ...
, ''
Enigma Enigma may refer to: *Riddle, someone or something that is mysterious or puzzling Biology *ENIGMA, a class of gene in the LIM domain Computing and technology * Enigma (company), a New York–based data-technology startup *Enigma machine, a famil ...
: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two'', edited and translated by
Christopher Kasparek Christopher Kasparek (born 1945) is a Scottish-born writer of Polish descent who has translated works by numerous Polish authors, including Ignacy Krasicki, Bolesław Prus, Florian Znaniecki, Władysław Tatarkiewicz, Marian Rejewski, and Wł ...
, Frederick, MD, University Publications of America, 1984, . * *
Marian Rejewski Marian Adam Rejewski (; 16 August 1905 – 13 February 1980) was a Polish people, Polish mathematician and Cryptography, cryptologist who in late 1932 reconstructed the sight-unseen German military Enigma machine, Enigma cipher machine, aided ...
, "Summary of Our Methods for Reconstructing ENIGMA and Reconstructing Daily Keys, and of German Efforts to Frustrate Those Methods," Appendix C to
Władysław Kozaczuk Władysław Kozaczuk (23 December 1923 – 26 September 2003) was a Polish Army colonel and a military and intelligence historian. Life Born in the village of Babiki near Sokółka, Kozaczuk joined the army in 1944, during World War II, at B ...
, ''Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two'', 1984, pp. 241–45. *
Marian Rejewski Marian Adam Rejewski (; 16 August 1905 – 13 February 1980) was a Polish people, Polish mathematician and Cryptography, cryptologist who in late 1932 reconstructed the sight-unseen German military Enigma machine, Enigma cipher machine, aided ...
, "The Mathematical Solution of the Enigma Cipher," Appendix E to
Władysław Kozaczuk Władysław Kozaczuk (23 December 1923 – 26 September 2003) was a Polish Army colonel and a military and intelligence historian. Life Born in the village of Babiki near Sokółka, Kozaczuk joined the army in 1944, during World War II, at B ...
, ''Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two'', 1984, pp. 272–91.


External links


"Polish Enigma Double"

About the Enigma (National Security Agency)


by
Jan Bury Jan Bury (born 1 October 1963 in Przeworsk) is a Polish politician. He was elected to the Sejm on 25 September 2005, getting 12050 votes in 23 Rzeszów district as a candidate from Polish People's Party The Polish People's Party (, PSL) is a ...

The „Enigma” and the Intelligence


* ttps://web.archive.org/web/20060418205857/http://www.smithsrisca.demon.co.uk/STMsubtypes-pt3.html A Brief History of Computing Technology, 1930 to 1939* {{citation , last=Kuhl , first=Alex , title=Rejewski's Catalog , journal=Cryptologia , volume=31 , issue=4 , pages=326–331 , date=October 2007 , publisher=Taylor & Francis , doi=10.1080/01611190701299487 , s2cid=14254844 , url=http://www.alexkuhl.org/research/RejewskisCatalog.pdf , url-status=dead , archiveurl=https://web.archive.org/web/20150724205315/http://www.alexkuhl.org/research/RejewskisCatalog.pdf , archivedate=2015-07-24 Science and technology in Poland Cipher Bureau (Poland)