Online amateurs crack Nazi codes.

Blackleaf

Hall of Fame Member
Oct 9, 2004
48,402
1,667
113
Online amateurs crack Nazi codes
By Adam Blenford
BBC News



The Enigma machine vexed Allied codebreakers for years

Three German ciphers unsolved since World War II are finally being cracked, helped by thousands of home computers.

The codes resisted the best efforts of the celebrated Allied cryptographers based at Bletchley Park during the war.

Now one has been solved by running code-breaking software on a "grid" of internet-linked home computers.

The complex ciphers were encoded in 1942 by a new version of the German Enigma machine, and led to regular hits on Allied vessels by German U-boats.

Allied experts initially failed to deal with the German adoption in 1942 of a complex new cipher system, brought in at the same time as a newly upgraded Enigma machine.

The advancement in German encryption techniques led to significant Allied losses in the North Atlantic throughout 1942.

The three unsolved Enigma intercepts were published in a cryptography journal in 1995 and have intrigued enthusiasts ever since.

Although assumed to have little historical significance, they are thought to be among just a handful of German naval ciphers in existence still to be decoded.

Exponential growth

The latest attempt to crack the codes was kick-started by Stefan Krah, a German-born violinist with an interest in cryptography and open-source software.

Mr Krah told the BBC News website that "basic human curiosity" had motivated him to crack the codes, but stressed the debt he owed to veteran codebreaking enthusiasts who have spent years researching Enigma.

He wrote a code-breaking program and publicised his project on internet newsgroups, attracting the interest of about 45 users, who all allowed their machines to be used for the project.

Mr Krah named the project M4, in honour of the M4 Enigma machine that originally encoded the ciphers.

There are now some 2,500 separate terminals contributing to the project, Mr Krah said.

"The most amazing thing about the project is the exponential growth of participants. All I did myself was to announce it in two news groups and on one mailing list."

Nevertheless, in little over a month an apparently random combination of letters had been decoded into a real wartime communication.

In its encrypted form the cipher makes no sense at all, reading as follows:


Bletchley Park was thought to cut WWII by two years

"NCZW VUSX PNYM INHZ XMQX SFWX WLKJ AHSH NMCO CCAK UQPM KCSM HKSE INJU SBLK IOSX CKUB HMLL XCSJ USRR DVKO HULX WCCB GVLI YXEO AHXR HKKF VDRE WEZL XOBA FGYU JQUK GRTV UKAM EURB VEKS UHHV OYHA BCJW MAKL FKLM YFVN RIZR VVRT KOFD ANJM OLBG FFLE OPRG TFLV RHOW OPBE KVWM UQFM PWPA RMFH AGKX IIBG"

Unencrypted and translated into English, the message suddenly comes to life:

"Forced to submerge during attack. Depth charges. Last enemy position 0830h AJ 9863, [course] 220 degrees, [speed] 8 knots. [I am] following [the enemy]. [barometer] falls 14 mb, [wind] nor-nor-east, [force] 4, visibility 10 [nautical miles]."

A check against existing records confirmed that the message was sent by Kapitanleutnant Hartwig Looks, commander of the German navy's U264 submarine, on 25 November 1942.

Sophisticated

During the war, teams of codebreakers based at Bletchley Park, in the UK, scrambled to unravel German communications in an attempt both to undermine the German war machine and to save the lives of soldiers and seamen.



Frantic codebreaking work was carried out in plain-looking huts

Using early computers, Bletchley Park decoded thousands of intercepts in a knife-edge race to head off U-boat attacks.

German messages were encoded using the fearsome Enigma machine, which used a series of rotors, often augmented by a so-called "plugboard", to scramble transmissions not meant for Allied eyes.

The machines used ever-changing rotor wheel combinations and electrical currents to produce unique coded messages.

Plugboards further complicated matters by swapping pairs of letters over during the encoding process, greatly increasing the numbers of possible encryptions.

Stefan Krah's computerised codebreaking software uses a combination of "brute force" and algorithmic attempts to get at the truth.

The combined approach increases the chances of stumbling across a match by recreating possible combinations of plugboard swaps while methodically working through combinations of rotor settings.

Proud milestone

Bletchley Park and its codebreakers have been immortalised on television, in film and in best-selling novels.

Now a museum, staff at the site are not attempting to close the book on World War II by solving any remaining ciphers. That they leave to the enthusiasts.

But a spokeswoman said that Bletchley Park followed the M4 project with interest, describing Mr Krah's work as a "great tribute" to the achievements of the wartime codebreakers.

Ralph Erskine, who submitted the original intercepts to the journal Cryptologia in December 1995, told the BBC News website that cracking the German codes after more than 63 years would be an important milestone for amateur cryptologists.

"I think there is more satisfaction for people engaged in the project to know that they have been able to do something that Bletchley Park couldn't do," he said.


UNSOLVED CIPHER #1
HCEY ZTCS OPUP PZDI UQRD LWXX FACT TJMB HDVC JJMM ZRPY IKHZ AWGL YXWT MJPQ UEFS ZBCT VRLA LZXW VXTS LFFF AUDQ FBWR RYAP SBOW JMKL DUYU PFUQ DOWV HAHC DWAU ARSW TXCF VOYF PUFH VZFD GGPO OVGR MBPX XZCA NKMO NFHX PCKH JZBU MXJW XKAU OD?Z UCVC XPFT


UNSOLVED CIPHER #2
TMKF NWZX FFII YXUT IHWM DHXI FZEQ VKDV MQSW BQND YOZF TIWM JHXH YRPA CZUG RREM VPAN WXGT KTHN RLVH KZPG MNMV SECV CKHO INPL HHPV PXKM BHOK CCPD PEVX VVHO ZZQB IYIE OUSE ZNHJ KWHY DAGT XDJD JKJP KCSD SUZT QCXJ DVLP AMGQ KKSH PHVK SVPC BUWZ FIZP FUUP

http://news.bbc.co.uk/1/hi/technology/4763854.stm
 

Mogz

Council Member
Jan 26, 2006
1,254
1
38
Edmonton
"I think there is more satisfaction for people engaged in the project to know that they have been able to do something that Bletchley Park couldn't do," he said.

What a fucking stupid thing to say. Bletchley Park didn't have computers 60 years ago. They took some of the brightest people in the free world and had them use their MINDS to crack the codes.
 

jimmoyer

jimmoyer
Apr 3, 2005
5,101
22
38
68
Winchester Virginia
www.contactcorp.net
Actually ENIGMA was solved before the war ended.

The stupidity of this article was that there was no need
to decode transmissions prior to it being cracked open.

They solved all future transmissions, but left unsolved
transmissions previous to their successful decryption.
 

jeckgo

Nominee Member
Jan 24, 2006
79
0
6
Oman
This is an example of a polyalphabetic cipher. What you need is the keyword used to encipher this text and the actual multiple alphabet cipher used. I know that I've seen popular Nazi keywords used in these types of messages. Perhaps you can start trying some.

Obviously, the Nazis were aware of frequency analysis.

If you want to see an example of a polyalphabetic cipher, take a look at the Vigenere cipher
 

Mogz

Council Member
Jan 26, 2006
1,254
1
38
Edmonton
Actually ENIGMA was solved before the war ended.

The stupidity of this article was that there was no need
to decode transmissions prior to it being cracked open.

They solved all future transmissions, but left unsolved
transmissions previous to their successful decryption.

Engima wasn't cracked. An Enigma encoder was caputred (actually 3 were), thereby allowing the Allies to captured transmissions and decipher then.