ABSTRACT Chaocipher is a manual encryption method designed by John F. Byrne in 1918. Until he passed away in 1960, Byrne fervently believed that his cipher system was unbreakable, regardless of the amount of material available to a cryptanalyst. For several decades, he tried (unsuccessfully), to propose the Chaocipher to government agencies. In 1953, he exposed his Chaocipher in his autobiography, Silent Years, providing several examples of texts encrypted with Chaocipher as challenges, but without divulging the inner workings of the cipher. Those were made public only in 2010, when Byrne’s family donated the entire corpus of Chaocipher papers to the National Cryptologic Museum (NCM) in Fort Meade. A known-plaintext method for recovering the key settings, given sufficient matching plaintext and ciphertext, was published in 2010. However, to date, no method for the cryptanalysis of a single ciphertext-only Chaocipher message has been proposed, nor for the cryptanalysis of short messages “in-depth,” i.e., multiple messages generated with the same initial key settings. In this article, the authors present a new hillclimbing algorithm for a ciphertext-only cryptanalysis of Chaocipher in-depth messages. This algorithm is based on a “divide-and-conquer” approach and the use of the Index of Coincidence. It takes advantage of a major weakness in the design of the cipher. This previously unknown weakness may have been the reason why William F. Friedman, the inventor of the Index of Coincidence, rejected Byrne’s offer for the use of Chaocipher by the U.S. government. Additionally, the authors present a known-plaintext attack for short in-depth messages, as well as the solution for Lou Kruh’s and Cipher Deavours’s alternate Exhibit 5, also known as “Exhibit 6.” Finally, the authors reevaluate the security of the Chaocipher in view of those findings, with the conclusion that in its classic form, as designed by Byrne, the Chaocipher was a relatively weak cipher, despite Byrne’s rather strong assertions to the contrary.
[1]
H. Gary Knight.
Cryptanalyst's Corner
,
1978,
Cryptologia.
[2]
Moshe Rubin.
John F. Byrne's Chaocipher Revealed: An Historical and Technical Appraisal
,
2011,
Cryptologia.
[3]
Claude E. Shannon,et al.
Communication theory of secrecy systems
,
1949,
Bell Syst. Tech. J..
[4]
C. Babbage.
Passages from the Life of a Philosopher
,
1968
.
[5]
John Byrne,et al.
Chaocipher Enters the Computer Age when its Method is disclosed to Cryptologia Editors
,
1990,
Cryptologia.
[6]
D. Kahn.
The codebreakers : the story of secret writing
,
1968
.
[7]
Jeff Calof,et al.
Chaocipher Exhibit 5: History, Analysis, and Solution of Cryptologia's 1990 Challenge
,
2014,
Cryptologia.
[8]
Arno Wacker,et al.
Solving the Double Transposition Challenge with a Divide-and-Conquer Approach
,
2014,
Cryptologia.