Cryptanalysis of Typex

Abstract Rotor cipher machines played a large role in World War II: Germany used Enigma; America created Sigaba; Britain developed Typex. The breaking of Enigma by Polish and (later) British cryptanalysts had an enormous impact on the war. However, despite being based on the commercial version of the Enigma, there is no documented successful attack on Typex during its time in service. This article covers the Typex machine. Researchers consider the development of Typex, discuss how Typex works, and present and analyze two cryptanalytic attacks on the cipher. The first attack assumes the rotor wirings are known and uses Turing's crib attack—originally developed for Enigma—to recover the settings of the stepping rotors. The second attack assumes that the rotor wirings are unknown. This ciphertext-only attack uses a hill-climb to determine the wirings of the stepping rotors. Finally, researchers briefly consider an attack developed by Polish cryptanalysts to recover the Enigma rotor wirings, and they argue that Typex was significantly more resistant to this particular attack.

[1]  L. Carroll,et al.  Alice's Adventures in Wonderland: Princeton University Press , 2015 .

[2]  A. Nijenhuis Combinatorial algorithms , 1975 .

[3]  Louis Kruh,et al.  The Typex Cryptograph , 1983, Cryptologia.

[4]  William F. Friedman The index of coincidence and its applications in cryptanalysis , 1987 .

[5]  James Rusbridger,et al.  Betrayal at Pearl Harbor : How Churchill Lured Roosevelt into World War II , 1991 .

[6]  外山 昇 霧のイニシエーション--Adventures of Huckleberry Finnとシャーマニズム , 1993 .

[7]  Thomas Jakobsen A Fast Method for Cryptanalysis of Substitution Ciphers , 1995, Cryptologia.

[8]  Friedrich L. Bauer,et al.  Decrypted secrets - methods and maxims of cryptology , 1997 .

[9]  David H. Hamer Enigma: Actions involved in the 'Double Stepping' of the Middle Rotor , 1997, Cryptologia.

[10]  Victor J. Rayward-Smith,et al.  The Cryptanalysis of a Three Rotor Machine Using a Genetic Algorithm , 1997, ICGA.

[11]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory , 2002 .

[12]  Simon Singh,et al.  Book Review: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography , 2003, ACM Queue.

[13]  Geoff Sullivan,et al.  PURPLE REVEALED: SIMULATION AND COMPUTER-AIDED CRYPTANALYSIS OF ANGOOKI TAIPU B , 2003, Cryptologia.

[14]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory (2nd Edition) , 2005 .

[15]  John Ferris Intelligence and Strategy: Selected Essays , 2005 .

[16]  Hugh Mann What is common sense? , 2006, Irish medical journal.

[17]  R. A. Ratcliff Delusions of Intelligence: Enigma, Ultra, and the End of Secure Ciphers , 2006 .

[18]  Mark Stamp,et al.  Applied Cryptanalysis: Breaking Ciphers in the Real World , 2007 .

[19]  Mark Stamp,et al.  SIGABA: Cryptanalysis of the Full Keyspace , 2007, Cryptologia.

[20]  Chris Christensen Polish Mathematicians Finding Patterns in Enigma Messages , 2007 .

[21]  Kent D. Boklan,et al.  Introduction to cryptography with coding theory, second edition , 2007 .

[22]  Sjsu ScholarWorks,et al.  EFFICIENT ATTACKS ON HOMOPHONIC SUBSTITUTION CIPHERS , 2011 .

[23]  Mark Stamp,et al.  Efficient Cryptanalysis of Homophonic Substitution Ciphers , 2013, Cryptologia.

[24]  Josef Kittler,et al.  Combinatorial Algorithms , 2016, Lecture Notes in Computer Science.