2015
DOI: 10.1080/01611194.2014.988370
|View full text |Cite
|
Sign up to set email alerts
|

Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…The second security enhancement has to do with how K affects encryption. In the regular Hagelin C machines, encryption is according to the Beaufort reciprocal formula (p is the plaintext symbol, c the resulting ciphertext symbol, and K the total kick) (Lasry et al, 2016):…”
Section: Complementary Kickmentioning
confidence: 99%
See 1 more Smart Citation
“…The second security enhancement has to do with how K affects encryption. In the regular Hagelin C machines, encryption is according to the Beaufort reciprocal formula (p is the plaintext symbol, c the resulting ciphertext symbol, and K the total kick) (Lasry et al, 2016):…”
Section: Complementary Kickmentioning
confidence: 99%
“…Because of the complex stepping mechanism, there are no periodic patterns that would allow statistical attacks to be effective, such as the ciphertextonly and known-plaintext attacks that were developed against Hagelin systems with regular stepping (Lasry et al, 2016;Lasry et al, 2018). Furthermore, the circular dependencies of the wheels with regards to their stepping (as illustrated in Figure 4) make the problem even more challenging.…”
Section: A Novel Known-plaintext Attackmentioning
confidence: 99%
“…We reproduce here the functional description of the device, which we presented in our prior article about a known-plaintext attack [12]. We show the mechanical internals of the M-209 device in Figure 1, and a functional diagram in Figure 2.…”
Section: Functional Descriptionmentioning
confidence: 99%
“…We reproduce here the keyspace analysis of the device, which we presented in our prior publication about a known-plaintext attack [12]. The settings of the device consists of the Wheel Settings which include the wheel pins and the initial position of the wheels, and of the Lug Settings -the settings of the lugs of the 27 bars.…”
Section: Keyspacementioning
confidence: 99%
See 1 more Smart Citation