Enigma: Why the fight to break Nazi encryption still matters – News … – WDEF News 12

It was night when three British sailors and a 16-year-old canteen assistant boarded a sinking U-boat off the coast of Egypt. A spotlight shone on them from the HMS Petard, the Royal Navy destroyer that had hunted down the German submarine and now slowly circled the vessel. The U-boats commander lay dead below the hatch as water poured in from a crack in the hull.

The four men began searching the ship, but not for survivors. They were looking for codebooks.

These red-covered guides were vital to breaking a diabolical code that made Nazi radio messages unintelligible. The Germans had been using a typewriter-like machine toencrypttheir communications. They called it Enigma and were sure the code was unbreakable.

The British were determined to prove them wrong.

Wading past bodies through slowly rising water, First Lieutenant Anthony Fasson, Able SeamenColin GrazierandKenneth Lacroix, andyoung Tommy Brownfound the captains quarters and began searching drawers and breaking into cabinets. They found two codebooks written in red, water-soluble ink: the Short Weather Cipher, used to condense weather reports into a seven-letter message, and theShort Signal Book, used to report convoy sightings, along with other documents.

While Grazier and Fasson continued to search below, Brown carried the books up the ladder of the subs conning tower to awaiting boat. They were racing against time as seawater poured into the submarine.

On his third trip up the ladder, Brown called for his shipmates to come up, too but it was too late. U-559 sank before Fasson and Grazier could escape that night in October 1942. As Hugh Sebag-Montefiore recounts in Enigma: The Battle for the Code, their bravery helped changed the course of World War II.

Play Video

SciTech

A rare manuscript written by British mathematician and code-breaker Alan Turing has gone up for auction along with several other pieces of comput

The U-boat codes created by Enigma were especially hard to break, and the Allies found themselves locked out for weeks or months at a time. But several months after they recovered the codebooks from U-559 on March 19, 1943 cryptographers stationed in BritainsBletchley Parkbroke through into U-boats Enigma-coded messages and were never fully locked out again.

From then on, their efforts only improved. By September of that year, the Allies were reading encrypted U-boat messages within 24 hours of intercepting them. The breakthrough allowed the Allies to decrypt detailed field messages on German defenses in Normandy, the site of the impending D-Day invasion.And the machines themselves advanced the worlds technology pushing forward ideas about computer programming and memory.

Id call it the key to computing, says Ralph Simpson, a retired computer expert and amateur Enigma historian.

The years since have given us a cat-and-mouse game between codebreakers and cryptographers, with each side trying to outwit the other. Those battles are still raging. But theyre no longer confined to blackboards and spinning rotors on crude computers. They move at the speed of electrons flowing through your computers processor.

Todays computer-enabled encryption technology that scrambles what unauthorized viewers see is so complex that computers cant break it unless its been used incorrectly. Its so powerful that the US government and others have tried to legally require tech companies to unlock their own encryption, as was the case withAppleand the government last year over a terrorists lockediPhone.

And todays encryption is so useful that dissidents, spies and terrorists rely on it to protect their conversations.

The innovation wont stop. Future advances in quantum computing might be able to crack even perfectly implemented encryption. Thats led mathematicians to pre-emptively try to make encryption even stronger.

Its a cycle without end in sight.

Before the internet wove its way into our lives, encryption was pretty much something businesses and governments used to protect sensitive data, like financial documents and Social Security records.

Mostly it was banks, diplomatic services and the military who used cryptography throughout history, says Bill Burr, a retired cryptographer from the US National Institute of Standards and Technology.

The internet increased the use of encryption, as business and governments sent information over networks that hackers and spies could easily intercept. But few regular people went out of their way to use encryption as part of daily life. Maybe your paranoid friend would encrypt his email, forcing you to use extra software to read it.

Play Video

Evolving Technologies

Modern technology has transformed the playing field for spies and hackers all over the world. Lindsey Boerma reports.

That changed after disclosures by former NSA contractorEdward Snowden, who in the summer of 2013 revealed the existence of government mass surveillance programs designed to collect reams of information from everything our emails, calls and texts. Though we were told the programs werent designed to target Americans, the disclosures forced us to ask how much information we want to put on the internet and potentially expose.

Thetech industryhas tried to address the problem by offering us another option: encrypting as much of our lives as we can.

Whats made this possible was the Engima, and the men, women, mathematicians, computer scientists and linguists who ultimately beat it.

This is their story.

The Enigma has a surprisingly understated design for being such a deadly tool. It could easily be mistaken for a typewriter with a few extra parts, housed in a plain wooden box.

Lifting the lid of an Enigma, a German operator saw what might on first glance seem like two typewriters squished together. One set of keys, closest to the operator, was the actual keyboard to be typed on.

Above it was a second set of keys, laid out just like the keyboard. But when you type on the real keyboard, these letters light up. Type an a on the normal keyboard, for example, and x lights up above.

So if you start typing a word, each letter lights up in code.

This was Enigmas genius. The German operators didnt need to understand the complex math or electronics that scrambled what they typed on the keyboard. All they knew was that typing H-E-L-L-O would light up as X-T-Y-A-E, for example. And thats the message they sent around.

This jumbling of letters changed each day at midnight, when Nazi commanders would send new settings that Enigma operators would use to turn dials and change the plugs on a board below the keys, all designed to match the days code. Without the code, the message couldnt be unscrambled.

Enigma was so sophisticated it amounted to whats now called a 76-bit encryption key. One example of how complex it was: typing the same letters together, like H-H (for Heil Hitler) could result in two different letters, like L-N.

That type of complexity made the machines impossible to break by hand, Simpson says.

How impossible? If you gave 100,000 operators each their own Enigma machine, and they spent 24 hours a day, 7 days a week testing a new setting every second, it would take twice the age of the universe to break the code, Simpson says.

Obviously, codebreaking by hand wasnt going to cut it.

Because we now have machine encryption for the first time, it took a machine to break it, Simpson says.

Equally fascinating is that Nazi military leaders knew, in theory, that someone could develop a machine-assisted way to speed up their code cracking. But they didnt believe their enemies would put in the time and resources needed.

They were wrong.

Of course, the UK was very motivated to break the Enigma. German U-boats were sinking hundreds of British ships, costing thousands of lives and choking the country off from vital supplies being shipped from the United States and Canada. Whats more, the country was desperate for any advantage in the early days of the war, filled with German bombing campaigns and fears of a land invasion.

So resources, manpower and the lives of sailors like Fasson and Glazier were poured into cracking the Enigma codes. The first result of these efforts was the Bombe.

Play Video

Sunday Morning

Anthony Mason visits with actor Benedict Cumberbatch to talk about his role as mathematician Alan Turing in The Imitation Game, a new film reco

Custom-designed by British mathematicians likeAlan Turing, Bombes were about the size of three vending machines stacked side by side, with a series of spinning rotators connected in the back by a 26-way cable. They were based on the Polish Bomba codebreaking machine, which the Poles were forced to abandon in 1939, after their country was invaded by Germany.

Housed at a secretive intelligence program on the grounds of manor houseBletchley Park, less than 50 miles outside of London, and other nearby installations, the Bombes were run by teams of Navy women.

Each of the Bombes rotators had letters on it and, as they spun, the machine tested possible solutions to a given Enigma code much faster than a human could.

Researchers like Turing and his team were able to make the Bombes more efficient by using pinched codebooks from U-boats and other clues, eliminating thousands of possible solutions.

If we understand the book, we then know what the submarines are likely to say, says David Kenyon, a research historian at the Bletchley Park Trust.

Breaking into the U-boats Shark code in 1943 set in motion a series of dominoes that ultimately led to the Nazi defeat. Intercepted U-boat messages made the Allies better at sinking the vessels, which contributed to the German Navys decision to pull its U-boats out of the Atlantic later that year, Kenyon says. That respite allowed the Allies to prepare for D-Day in 1944 and to end the war in 1945.

While codebreaking alone didnt win World War II, it was one of the most powerful weapons invented for that purpose.

There was no point in the Second World War where the outcome was a foregone conclusion, Kenyon says. Theres no telling what might have happened if you took away any of the factors that were working in the Allies favor.

The work done on the Bombes and other codebreaking machines didnt just aid in the fight against the Nazis. They proved theories about computer programming and data storage, the lifeblood of todays modern computers.

One of these breakthroughs came when the Joseph Desch of the US Navy found a way to speed up the Bombe. The machines could only run so fast, because operators read the results of the codebreaking analysis right off of the wheels themselves. Go any faster and the wheels would spin right past the correct answer.

Deschs solution was a primitive form of digital memory. When the Bombe came upon the correct answer, electrical relays would detect and record it. That let the US Bombes spin more than 17 times faster than the British Bombes.

Then there was Colossus. This machine designed not to break Enigma, but rather the more sophisticated Lorenz codes used by the German High Command advanced vacuum tube tech that later came to power the worlds first true computers, like the ENIAC and Mark-1, and then the first generation of IBM mainframes.

To create a codebreaking machine powerful enough to crack Lorenz, British engineer Tommy Flowers found a way to run more than 2,000 vacuum tubes at once. While it had been theorized this approach could power a programmable computer, Flowers was the first to make it happen.

Flowers himself didnt get a chance to push this technology to its next logical conclusion. But Turing and other Bletchley alums worked at the University of Manchester after the war, creating theFerranti Mark 1 a programmable computer run with vacuum tubes.

That the work at Bletchley showed up later in the first general-purpose computers doesnt surprise Burr. The codebreakers were able to fully understand the workings of Enigma and the Lorenz code create machines to break them at a time when the principles of computing only existed in theory.

Its hard for me to imagine people smart enough to do that, says Burr, whos an expert in cryptography.

In terms of global politics, encryption was pretty straightforward during World War II. One nation tapped its linguists and mathematicians and relied on the heroism of men who boarded sinking U-boats to crack the encryption tech of an enemy force.

The worlds gotten a lot more complicated since then.

Just as in World War II, law enforcement and spy agencies today try to read the communications of criminals, terrorists and spies. But now that almost everyone uses encryption, a governments ability to break it doesnt just worry our countrys enemies it concerns us, too.

And despite the advances in computing and encryption since Bletchley Park, we havent come close to agreeing on when its okay to break encryption.

Case in point: the 2016 conflict betweenApple and the US Federal Bureau of Investigation. The FBI wanted Apples help breaking into the iPhone of a suspected terrorist, but Apple argued that this could put everyone who uses an iPhone at risk.

Burr, who saw the inside of public controversies over the government breaking encryption during his time at the National Institute of Standards and Technology, says theres no clear path forward.

Theres just a big dilemma there, he says. Creating ways to break encryption will weaken the actual strength of your security against bad guys of ability. And you have to count among those the state actors and pretty sophisticated and organized criminals.

In their laser-focused effort to crack Nazi encryption, codebreakers like Turing and soldiers like Fasson and Grazier were unlikely to have imagined a world like this. But here it is: the catch-22 of computerized encryption. And its not going away anytime soon.

This article originally appeared on CNET.

2017 CBS Interactive Inc.

Go here to read the rest:
Enigma: Why the fight to break Nazi encryption still matters - News ... - WDEF News 12

Related Posts
This entry was posted in $1$s. Bookmark the permalink.