Cryptanalysis: How Cipher-Text Machines Work

One of the most renowned cipher-text machines is the enigma machine. In straddling of the border between the mechanical properties and electrical characteristics, the machine looked more like a typewriter that is oversize. The Enigma machine operates both on M4 Enigma and Navy M3, and it was used in deciphering the German messages. The cipher-text is also known as encoded information as the text contains an original form of plaintext, which cannot be read both by a computer or human without a cipher-text that will decrypt the data or a message.

On the one side, decryption is the process of turning cipher-text into plain text that could be read easily. On receiving the information by the cypher-text machine, it will attempt to establish the encoded language’s message. The machine analyzes the message and identifies the bits that it contains (Schmeh, 2013). In an emulator, all wheel settings are always visible, and the plug-board above the lampboard has no keyboard. Inside this box is a system that has been built using three rotors. Each of the rotors will take in a letter and output it as a different message altogether.

The letter passing through each of the rotors will bounce off the reflector towards the end and eventually pass back through the three rotors in the opposite direction. The process is always the same towards the end where one is expected to type a ciphertext as well as the letters that are light and are likely to be encoded (Schmeh, 2013). Rotor machine is another device that is used in deciphering a ciphertext. It is the electro-magnetic cipher device that encrypts as well as decrypts secret messages. A major component of the set of rotors is the wheel or drum, which are the rotating disks that have an array of electric contacts on either side. The wiring between the contacts, therefore, implements fixed substitution of the letters in the secret message that has been sent. The positions of the rotors often make the alternate movements of the message and as such ensure that there is an effective understanding of the message that is being solved.

In most cases, it is the soldiers who prefer using messages using cipher-text which enables them to communicate secretly without the enemy getting to know what plans they have. Top investigative agencies also use Cipher-text in hiding some of the classified information through which they have the exclusive control over the encryption and decryption keys – this will in effect complexly replace the letters and thus improving the functionality of the machine in enabling a message to be read by the respondents.

Breaking Code Using Standard Brute Force Method

The advance positions of the rotors change the substitution of a message according to the manner in which the message has been encoded or decoded. A brute-force attack consists of a scenario where an attacker submits several paragraphs and passphrases with a hope that the guessing will be correct. The attacker will systematically check the possible passwords until they find a correct password or passphrase. The attacker could alternatively guess keys that are created from the passwords or the phrases – this is called a crucial exhaustive search.

In most cases, it yields results especially when an attacker correctly understands machine learning. It is for this reason that individuals are always advised to ensure that they do not share personal information as these could be a gateway to accessing passwords. There is no definite time that it takes in a brute-force attack as it could even last for a day or more.

 

References

Schmeh, K. (2013). Cryptography and public key infrastructure on the Internet. Chichester, West Sussex, England: Wiley.

 

Do you need high quality Custom Essay Writing Services?

Custom Essay writing Service