Enigma Cryptanalysis Revisited – New State-of-the-Art Attacks on the Enigma Machine in CrypTool 2
#cryptology, #cryptography, #cryptanalysis
In this video, we show our newly implemented state-of-the-art attacks on the Enigma rotor cipher machine. The attacks are right now (at the time of creating this video) only available in the current nightly build of CrypTool 2. It will be available also in the next release version of CrypTool 2.
We recently got some criticism that our (old) Enigma analysis was not state-of-the-art. That was true, since the attacks were 10 years old. Therefore, we developed a new Enigma analyzer based on George Lasry's code.
We implemented the following new attacks:
- Turing Bombe
- Hillclimbing
- Simulated Annealing
Also, to have a faster attack, we implemented an attack based on Jim Gillogly's original paper.
For a basic introduction into the Enigma machine, watch this video here: https://www.youtube.com/watch?v=FG59my_HLtI
Also, the old attack is presented here: https://www.youtube.com/watch?v=MqNgagh6qpY
If you want to learn the basics of cryptology, have a look at our "Basics of Cryptology" series. Use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt
If you are interested in details about CrypTool 2, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8&t=853s
Finally, you may download the latest version of CrypTool 2 here: https://www.cryptool.org/en/ct2/downloads
Видео Enigma Cryptanalysis Revisited – New State-of-the-Art Attacks on the Enigma Machine in CrypTool 2 канала Cryptography for Everybody
In this video, we show our newly implemented state-of-the-art attacks on the Enigma rotor cipher machine. The attacks are right now (at the time of creating this video) only available in the current nightly build of CrypTool 2. It will be available also in the next release version of CrypTool 2.
We recently got some criticism that our (old) Enigma analysis was not state-of-the-art. That was true, since the attacks were 10 years old. Therefore, we developed a new Enigma analyzer based on George Lasry's code.
We implemented the following new attacks:
- Turing Bombe
- Hillclimbing
- Simulated Annealing
Also, to have a faster attack, we implemented an attack based on Jim Gillogly's original paper.
For a basic introduction into the Enigma machine, watch this video here: https://www.youtube.com/watch?v=FG59my_HLtI
Also, the old attack is presented here: https://www.youtube.com/watch?v=MqNgagh6qpY
If you want to learn the basics of cryptology, have a look at our "Basics of Cryptology" series. Use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt
If you are interested in details about CrypTool 2, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8&t=853s
Finally, you may download the latest version of CrypTool 2 here: https://www.cryptool.org/en/ct2/downloads
Видео Enigma Cryptanalysis Revisited – New State-of-the-Art Attacks on the Enigma Machine in CrypTool 2 канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
25 сентября 2020 г. 21:18:30
00:21:18
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel10 - Automatic Translation of CrypTool 2 To a New Language04 - Internationalization of the Component (CrypTool 2 Development Series)My Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Enigma Machine – Part 1 of 2 – How does it work?Digital File Signatures – How Do They Protect Your Computer?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalThe Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)The Trithemius Cipher and the Tabula Recta – Let's Create and Break ThemA Musical Cipher Challenge – End of 2021 – Win a Crypto BookThe Mexican Army Cipher Disk Explained and Broken