翻訳と辞書
Words near each other
・ Grijó (Vila Nova de Gaia)
・ Grijó de Parada
・ Grijó e Sermonde
・ GRIK1
・ GRIK2
・ GRIK3
・ GRIK4
・ GRIK5
・ Grike
・ Grike (Lake District)
・ Griko dialect
・ Griko people
・ Grikor Suni
・ Grikurov Ridge
・ Grill
Grill (cryptology)
・ Grill (family)
・ Grill (jewelry)
・ Grill (philately)
・ Grill Me
・ Grill Music Venue
・ Grill pan
・ Grill Point
・ Grill Team
・ Grill'd
・ Grill, Interrupted
・ Grill, Pennsylvania
・ Grillades
・ Grillby
・ Grille


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Grill (cryptology) : ウィキペディア英語版
Grill (cryptology)

The grill method ((ポーランド語:metoda rusztu)),〔Marian Rejewski, Mathematical Solution of the Enigma Cipher, trans Christopher Kasparek, Cryptologia, Vol 6, Number 1, pp 1–18 at 17, January 1982〕 in cryptology, was a method used chiefly early on, before the advent of the cyclometer, by the mathematician-cryptologists of the Polish Cipher Bureau (''Biuro Szyfrów'') in decrypting German Enigma machine ciphers. The Enigma rotor cipher machine changes plaintext characters into cipher text using a different permutation for each character, and so implements a polyalphabetic substitution cipher.
==Background==
The German navy started using Enigma machines in 1926; it was called ''Funkschlüssel C'' ("Radio cipher C"). By 15 July 1928, the German Army (''Reichswehr'') had introduced their own version of the Enigma—the ''Enigma G''; a revised ''Enigma I'' (with plugboard) appeared in June 1930. The Enigma I used by the German military in the 1930s was a 3-rotor machine. Initially, there were only three rotors labeled ''I'', ''II'', and ''III'', but they could be arranged in any order when placed in the machine. Rejewski identified the rotor permutations by , , and ; the encipherment produced by the rotors altered as each character was encrypted. The rightmost permutation () changed with each character. In addition, there was a plugboard that did some additional scrambling.
The number of possible different rotor wirings is:〔 This is the number of ways to arrange 26 distinct objects.〕
: 26! = 403,291,461,126,605,635,584,000,000
The number of possible different reflector wirings is:〔 Take the number of ways to arrange 26 distinct letters (26!) and pair the selected letters. The paired letters interchange, so divide by 213 to account for the two orderings of each pair. The order the pairs are enumerated does not matter, so divide by the number of ways to order the 13 pairs (13!).〕
:\frac = 7,905,853,580,025
The number of possible different plugboard wirings (for six cables) is:〔 Take the number of ways to arrange 26 distinct letters and pair off the first 12 letters; divide by 26 because the pairs can be swapped (AB is same as BA), divide by 6! because the order of the pairs does not matter, and divide by 14! because the order of the trailing 14 characters does not matter.〕
:\frac = 100,391,791,500
To encrypt or decrypt, the operator made the following machine key settings:
* the rotor order (''Walzenlage'')
* the ring settings (''Ringstellung'')
* the plugboard connections (''Steckerverbindung'')
* an initial rotor position (''Grundstellung'')
In the early 1930s, the Germans distributed a secret monthly list of all the daily machine settings. The Germans knew that it would be foolish to encrypt the day's traffic using the same key, so each message had its own "message key". This message key was the sender-chosen initial rotor positions (e.g., YEK). The message key had to be conveyed to the recipient operator, so the Germans decided to encrypt it using the day's pre-specified daily ground setting (''Grundstellung''). The recipient would use the daily machine settings for all messages. He would set the Enigma's initial rotor position to the ground setting and decrypt the message key. The recipient would then set the initial rotor position to the message key and decrypt the body of the message.
The Enigma was used with radio communications, so letters were occasionally corrupted during transmission or reception. If the recipient did not have the correct message key, then the recipient could not decipher the message. The Germans decided to send the three-letter message key twice to guard against transmission errors. Instead of encrypting the message key "YEK" once and sending the encrypted key twice, the Germans doubled the message key to "YEKYEK" ("doubled key"), encrypted the doubled key with the ground setting, and sent the encrypted doubled key. The recipient could then recognize a garbled message key and still decrypt the message. For example, if the recipient received and decrypted the doubled key as "YEKYEN", then the recipient could try both message keys "YEK" and "YEN"; one would produce the desired message and the other would produce gibberish.
The encrypted doubled key was a huge cryptographic mistake because it allowed cryptanalysts to know two encipherments of the same letter, three places apart, for each of the three letters. The Polish codebreakers exploited this mistake in many ways. Marian Rejewski used the doubled key and some known daily keys obtained by a spy, to determine the wiring of the three rotors and the reflector. In addition, code clerks often did not choose secure random keys, but instead chose weak keys such as "AAA", "ABC", and "SSS". The Poles later used the doubled weak keys to find the unknown daily keys. The grill method was an early exploitation of the doubled key to recover part of the daily settings. The cyclometer and the ''bomba kryptologiczna'' were later exploitations of the doubled key.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Grill (cryptology)」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.