Jefferson disk

Jefferson disk

The Jefferson disk, or "wheel cypher" as Jefferson named it, is a cipher system using 26 wheels, each with the letters of the alphabet arranged randomly around them. First invented by Thomas Jefferson in 1795, it did not become well-known and was independently invented by Commandant Etienne Bazeries, the conqueror of the Great Cipher, a century later. Following this second "invention" the system was used by the United States Army from 1923 until 1942 as the M-94. The second form of the invention has become known as the Bazeries Cylinder.

A Bazeries cylinder consists of a set of roughly 20 to 30 numbered discs, with a different cipher alphabet on the edge of each disc, and a hole in the centre of the discs to allow them to be stacked on an axle. The discs are removable and can be mounted on the axle in any order desired. The order of the discs can be considered the cipher key for the Bazeries cylinder, with both Alice and Bob arranging the discs in the same predefined order.

Once the order of wheels along the axis has been devised, the user can rotate each wheel up and down until a desired message is spelled out in one row. Then the user can copy any row of text on the wheels other than the one that contains the message. The recipient simply has to put the discs in the agreed-upon order, spell out the encrypted message by rotating the wheels, and then look around the rows until he sees the plaintext message, i.e. the row that's not complete gibberish. There is an extremely small chance that there would be two readable messages, but that can be checked quickly by the person coding.

This system is considered quite secure against modern codebreaking if the message is short, and the ordering of letters and wheels is not known to the codebreaker. As messages get larger, or a significant number of them are accumulated, it is easy to apply the statistics of English language letter frequency, find patterns, and break the code.

Operation

To encrypt a message, Alice rotates the discs to produce the plaintext message along one "row" of the stack of discs, and then selects another row as the ciphertext. To decrypt the message, Bob rotates the discs on his cylinder to produce the ciphertext along a row. It is handy if both Alice and Bob know the offset of the row, but not really necessary since Bob can simply look around the cylinder to find a row that makes sense. For example, a simplified "toy" Bazeries cylinder, using only ten discs, might be organised as shown below, with each disc "unwrapped" into a line and each marked with a designating number:

Now suppose that the "key", the sequence of discs, for the Bazeries cylinder is:

:7,9,5,10,1,6,3,8,2,4

-- and Alice wants to send the message "retreat now" to Bob. Then she rearranges the discs as per the key and rotates each disc to obtain the plaintext, which is shown at the left, with spacing added to highlight it:

She then selects the ciphertext from the sixth row of the cylinder up from the plaintext. This ciphertext is also highlighted above with spacing, and gives:

:OMKEGWPDFN

When Bob gets the ciphertext, he rearranges the discs on his cylinder to the key arrangement, rotates the discs to give the ciphertext, and then reads the plaintext six rows down from the ciphertext, or simply looks over the cylinder for a row that makes sense.

Basis for military ciphers

The Bazeries cylinder was the basis for the US "M-94" cipher machine, which was introduced in 1922 and derived from work by Parker Hitt. In 1914, Hitt had experimented with the Bazeries device, building one prototype using slides on a wooden frame, with the cipher alphabets printed twice consecutively on the slides, and then another using discs of wood. He forwarded his experiments up the Signal Corps chain of command, and in 1917 Joseph Mauborgne refined the scheme, with the final result being the M-94.

The M-94 used 25 aluminium discs on a spindle. It was used by the Army, Coast Guard, and the Radio Intelligence Division of the Federal Communications Commission until early in World War II. The Army reverted back to Hitt's original slide scheme with the "M-138-A" cipher machine, which was introduced in the 1930s and was used by the US Navy and US State Department through World War II. The M-138-A featured 100 strips, with 30 selected for use in any one cipher session. It was a great improvement in security for the State Department, which during the interwar years had used laughably insecure codes, even in one case a standard commercial telegraph code, which were easily cracked.

Cryptanalysis

The Bazeries cylinder was a relatively strong system at the time, and Etienne Bazeries, a competent but very opinionated man, regarded it as indecipherable. In fact, it is hardly impregnable, and the "Pers z" code-breaking group of the German Foreign Office cracked the M-138-A in 1944. However, by that time the Americans had much more sophisticated cipher systems in operation, and it was too late for the Germans anyway. Many of the decrypts of Allied communications presented to the German high command were disregarded, because all they did was confirm bad news that nobody wanted to acknowledge in an environment where defeatism was potentially a capital crime.

de Viaris (aka Marquis Gaetan Henri Leon Viarizio di Lesegno) who is famous for one of the first printing cipher devices (1874), solved the Bazeries cylinder in 1893.

One major weakness of the Bazeries cylinder is that the offset from the plaintext letter to the ciphertext letter for the cipher alphabet on each disc will be exactly the same. In the example shown above, this offset is six letters.

Suppose a cryptanalyst — Holmes, say — has captured the simplified Bazeries cylinder described in the example above, with ten discs. This should not be enough to permit him to decipher messages with it, since he also has to know the key, or the arrangement of the discs on the cylinder. Even for this simplified Bazeries cylinder, the number of possible permutations of the discs are:

10! = 3,628,800

— which makes trial and error testing of the arrangement of the discs perfectly impractical to perform by hand, though a modern computer wouldn't be intimidated by such a search.

Now further suppose that Holmes has a crib. For example, suppose he knows that the first block of plaintext enciphered by the simplified Bazeries cylinder is the string:

:heilhitler

This is conveniently exactly ten letters long, and can be enciphered in a single pass with the simplified Bazeries cylinder. The corresponding ciphertext is:

:AZNCZEAPBH

The remainder of the message is of course a complete mystery for the moment. Fortunately, Holmes can use this crib to allow him to decipher all the following blocks of the message.

Holmes has no idea of which disc is used to encipher which letter, but he does know that the offset between the plaintext letter and the ciphertext letter must be the same for all ten characters. This gives him a way of penetrating the cipher by lining up the plaintext and ciphertext characters of the crib; forming them into pairs; determining the offsets for the plaintext letters and ciphertext letters for each disc; and then searching for a common offset in the matrix of offset.

Holmes knows that the correspondence between the two sets of letters is as follows:

*h—A
*e—Z
*i—N
*l—C
*h—Z
*i—E
*t—A
*l—P
*e—B
*r—H

Now Holmes takes disc 1, which has the cipher alphabet:

:1: < ZWAXJGDLUBVIQHKYPNTCRMOSFE <

The first letter pair is "h:A", and Holmes counts along the disc to determine that the offset between the two letters is 15. The second letter pair is "e:Z", and he sees right away that the offset is 1. He continues this process for each letter pair for disc 1, and then goes through the same procedure for the nine other discs, producing the following table:

h:A e:Z i:N l:C h:Z i:E t:A l:P e:B r:H ________________________________________________ 1: 15 1 6 12 13 14 10 9 10 19 2: 14 5 6 3 16 4 22 23 25 7 3: 15 15 4 2 17 12 14 25 10 7 4: 18 7 10 7 14 20 12 25 1 6 5: 4 14 20 13 20 7 21 14 25 24 6: 22 16 3 17 10 19 1 14 14 14 7: 14 15 14 8 7 12 15 19 12 13 8: 21 12 12 22 5 2 14 8 8 14 9: 11 14 15 14 15 14 16 25 5 2 10: 5 23 5 21 17 21 20 6 14 12

As Holmes prepares the table, the value "14" quickly jumps out at him as a common element, and in completion of the table proves to be the only common element. This is obviously the row offset from the plaintext to the ciphertext. He strips the other values out for clarity:

h:A e:Z i:N l:C h:Z i:E t:A l:P e:B r:H ________________________________________________ 1: - - - - - 14 - - - - 2: 14 - - - - - - - - - 3: - - - - - - 14 - - - 4: - - - - 14 - - - - - 5: - 14 - - - - - 14 - - 6: - - - - - - - 14 14 14 7: 14 - 14 - - - - - - - 8: - - - - - - 14 - - 14 9: - 14 - 14 - 14 - - - - 10: - - - - - - - - 14 -

Now Holmes rearranges the discs to reflect the correct order of the letters on the cylinder. This is done by rearranging the rows of the table so that the value "14" appears in every cell along the table's main diagonal. In this case, there are no ambiguities in the arrangement of the discs; but if there had been, a little testing of subsequent blocks of the ciphertext would reveal the proper order.

h:A e:Z i:N l:C h:Z i:E t:A l:P e:B r:H ________________________________________________ 2: 14 - - - - - - - - - 5: - 14 - - - - - 14 - - 7: 14 - 14 - - - - - - - 9: - 14 - 14 - 14 - - - - 4: - - - - 14 - - - - - 1: - - - - - 14 - - - - 3: - - - - - - 14 - - - 6: - - - - - - - 14 14 14 10: - - - - - - - - 14 - 8: - - - - - - 14 - - 14

This gives the key:

:2,5,7,9,4,1,3,6,10,8

In the real world, a Bazeries cylinder has 20 or 30 discs, not ten, and it is unlikely that there would be a single crib that would span the entire cylinder. The approach described above still works. Even if the cylinder had 30 discs and a crib only had five letters, Holmes could build up a table of the offsets for each of the 30 discs for the five letter pairs, and use it to greatly narrow down the possibilities for the offset and the discs used for the crib.

Holmes could repeat the procedure with several independent cribs in the same message, almost certainly pinning down the offset quickly and giving an improved knowledge of the order of the discs. Once the offset has been determined, then Holmes would have what amounted to a straight transposition of the letters not determined by tinkering with the cribs, and use methods such as multiple anagramming to crack it.

ources

*"The Codebreakers," David Kahn, 1967, pp. 192-195

External links

* [http://www.monticello.org/reports/interests/wheel_cipher.html Thomas Jefferson's Wheel Cipher]


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Thomas Jefferson — Infobox President name=Thomas Jefferson order=3rd President of the United States term start=March 4, 1801 term end=March 4, 1809 predecessor=John Adams successor=James Madison birth date=OldStyleDate|April 13|1743|April 2 birth place=Shadwell,… …   Wikipedia

  • Cipher disk — The Union Cipher Disk from the American Civil War was 3.75 inches (95 mm) in diameter and made of light yellow heavy card stock. It consisted of two concentric disks of unequal size revolving on a central pivot. The disks were divided along their …   Wikipedia

  • Enigma machine — Military Enigma machine …   Wikipedia

  • Cryptex — Replica cryptex: prize from Google Da Vinci Code Quest Contest The word cryptex is a neologism coined by the author Dan Brown for his 2003 novel The Da Vinci Code, denoting a portable vault used to hide secret messages. It is a combi …   Wikipedia

  • M-94 — can also refer to a state trunkline in the U.S. state of Michigan. For the highway see, M 94 (Michigan highway) The M 94 was a piece of cryptographic equipment used by the United States army, consisting of several lettered discs arranged as a… …   Wikipedia

  • SIGSALY — exhibit at the National Cryptologic Museum In cryptography, SIGSALY (also known as the X System, Project X, Ciphony I, and the Green Hornet) was a secure speech system used in World War II for the highest level Allied communications. It pioneered …   Wikipedia

  • NEMA (machine) — The NEMA machine was a Swiss rotor machine, designed to replace commercial Enigma machines. In the history of cryptography, the NEMA (NEue MAschine) ( new machine ), also designated the T D (Tasten Druecker Maschine) ( key stroke machine ), was a …   Wikipedia

  • Secure voice — (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. Contents 1 History 2 Analog Secure Voice technologies 3 Di …   Wikipedia

  • Controlled Cryptographic Item — A Controlled Cryptographic Item (CCI) is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated cryptographic component or other hardware item which performs a critical COMSEC… …   Wikipedia

  • OMNI (SCIP) — The OMNI adds Type 1 secure voice and secure data to any standard analog telephone or modem connected computer. SCIP signalling allows interoperability with other SCIP devices such as the Secure Terminal Equipment (STE) phone. In bypass mode, STU …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”