Home Page
Hebern's machines
The 5 rotors machine home page
|
Introduction
W. Friedman, in 1934, published a report entitled
"ANALYSIS OF A MECHANICO-ELECTRICAL CRYPTOGRAPH, PART I",
which summarizes all the work he accomplished on Mr Hebern's
cipher machine equipped with 5 rotors, in particular he
describes
the methods he used to succeed in the challenge which
the Navy launch to him in 1924. This report was intended for
the internal use of the Army signal service. It remained
classified for decades (50, 60, 90 years?) [1].
This report is a completely essential text in the history of
cryptology in the same way as Rejewski's report concerning
the analysis of the Enigma or Turing's professor's book.
Indeed it reveals in detail the methods used by W. Friedman
to break Hebern's encryption machine.
If we place ourselves
in the context of the 1920s, this is the very first work of
cryptanalysis which shows that a complex encryption machine
can be broken and more over via manual methods. Friedman's
work is simply extraordinary. If only one proof were needed,
the fact that his report remained classified for so long proves
it.
Friedman deserves for his work on Hebern's machine (not
counting the rest), to be included in the top 5 of the greatest
cryptanalysts in history.
[1] Note: What is certain is that this report was reclassified
CONFIDENTIAL in 1983 (see NSA ID:A2919767 & ID:A2919743).
On the other hand, in 2015, the NSA declassified the second
part of the report, concerning an evolution of the machine
broken in 1924 by Friedman. In short, I could not find the
exact date of declassification of this report. Perhaps it is
still classified 100 years after the Navy challenge?
The heart of the report: the interval method
The heart of the report concerns the methods Friedman used
in
1924 to win the challenge thrown at him by the Navy
(link).
In all the methods that Friedman used, there are
mainly the use
of a statistical method which
allowed us to reconstruct the
wiring of the rotor in position V (the fast rotor or right rotor).
This step is essential, because then, more or less easily, a
cryptologist is able to
reconstruct the plain text of the messages.
This method, which I call "Interval method" (Friedman does not give
it a name) is a very original statistical method. I think this is
the main reason his report remained classified for so long because
it may be applicable to other issues.
The plan of the work
SECRET
Register N°XX
WAR DEPARTMENT
Office of the Chief Signal Officer
Washington
ANALYSYS of a MECHANICO-ELECTRICAL
CRYPTOGRAPH
Part I
Technical Paper by William Friedman,
Cryptanalyst, Chief of Signal Intelligence Section,
War Plans of Training Division
UNITED STATES, Goverment Printing Office,
Washington: 1934
CONTENTS
- Section I. Introductory remarks
- Section II. Description of machine and its operation
- Section III. Basic cryptographic principles of operation
- Section IV. Analysis based only upon a knowledge of the mechanics of the machine
- Section V. The table of basic cipher-text sequences
- Section VI. Mathematical theory of analysis
- Section VII. Reconstruction of table of basic cipher-text sequences
- Section VIII. General observations
- Section XI. Reconstruction of Alphabet 5
- Section X. Practical application of principles
- Section XI. Further steps in analysis
- Section XII. Solution without preliminary analysis of any line of text
- Section XIII. Reconstruction of other alphabets
- Section XIV. Reverse encipherment
- Section XV. Miscellaneous
- Appendix
Some topics studied in detail
In other pages concerning the Hebern machine and its cryptographic
study,
I described some of the methods discovered by Friedman. Here
is,
Below is a reference to these pages:
- Find the rotor wiring in position V
This is the page where I describe the interval method.
This topic is covered in sections IV to X of the report.
(link).
- Find the plain text of a few lines of the cryptogram
This topic is covered in section X of the report, paragraph 53.
(link).
- Find the rotor wiring in position I.
This topic is covered in section XI, paragraphs 54 and 55 of the report.
(link).
- Find the wiring of pseudo-rotor S equivalent to rotors II, III, IV.
Find the plain text of the cryptograms (after steps 3 and/or 4)
This topic is covered in section XI, paragraph 56 of the report.
(link).
- Find the wiring of the rotors in position II, III and IV.
This topic is covered in section XIII of the report.
(link).
- Is knowledge of RFS wiring necessary?
This topic is covered in section VIII.
(link)
- Reverse encipherment (link).
- Find the wiring of the rotors when the plain text is known.
This topic is covered in section XV, paragraph 85.
(link)
Note: I remind you that I did not use Friedman's notation, nor the
same examples as him. On the other hand, I tried to simplify the understanding
of his methods.
Web Links
- ANALYSIS OF A MECHANICO-ELECTRICAL CRYPTOGRAPH,
PART I, TECHNICAL PAPER,
BY WILLIAM F. FRIEDMAN
Cryptanalyst, Chief of Signal Intelligence Section
UNITED STATES GOVERNMENT PRINTING OFFICE,
WASHINGTON: 1934, Secret.
(link)
- NSA - Friedman collection - classification of the report
about Hebern cipher machine - 1983 -
REF. ID:A2919767
- NSA - Friedman collection - comparison between the report
by
Friedman and the book by Deavours & Kruh - 1983 -
REF. ID:A2919743.
Note: The conclusion of this document is to retain the report of
Friedman classified.
- NSA - Friedman collection - The Legendary William F. Friedman,
By Lambros D. Callimahos, 12 pages, Unclassified, ID: A4045961. 1974.
(
link).
|