Forum

Challenge "Enigma Part 2"  

  By: admin on Oct. 7, 2010, 6:29 p.m.

Decrypt the given ciphertext which is encrypted with the Enigma chiper. The key conists of the configuration of the stecker and the initial setting of the three rotors. Please give the letters in the key as capital letters.
Read more...

 Last edited by: admin on Oct. 31, 2021, 2:54 a.m., edited 1 time in total.

About speed...  

  By: TBREAKER on Nov. 3, 2010, 8:42 p.m.

About speed:

I solved the two ENIGMA Challenges with my own
ENIGMA-TBreaker-Software (includes a Turingbombe),
not with the ENIGMA C core from the challenges.

I think my C implementation is not very fast and not optimized for
speed.

Challenge 1: Standard Method: 60 seconds (thru all rotor orders up to the solution)

Challenge 2: Standard Method: about 10 Min. (1 rotor order)
Challenge 2: Standard Method: about 2 Min. with first 20% of ciphertext (1 rotor order)
Challenge 2: Turingbombe (1 rotor order) with a proper crib: 0.5 seconds!!!

Challenge 2 has a mid-rotor turnover after the first 4 characters,
so the chosen crib for my Turingbombe run starts after that event.
The Turingbombe is ultra fast, but it is very hard to find a proper crib.
(crib position, many loops, many characters, no mid-rotor turnover).

Tell me, how fast your software did the job…

Best regards

Michael

 Last edited by: TBREAKER on Feb. 28, 2011, 10:12 p.m., edited 2 times in total.

Re: Challenge "Enigma Part 2"  

  By: TBREAKER on Jan. 17, 2011, 2:53 a.m.

Wen es interessiert, der kann hier einem LIVE Break einer originalen Enigma Nachricht von 1941 zusehen. Die verwendete Methode ist Hillclimbing (cipher only attack)…

Viele Grüße

Michael

PS: Auch als Anregung zu den Enigma Challenges hier!

Re: Challenge "Enigma Part 2"  

  By: Veselovský on Sept. 1, 2011, 1:57 p.m.

I wonder how many successful solvers of this challenge had read the plaintext…
There is at least one mistyped in the plaintext (which I am able to spot with my "limited" knowledge of English grammar)… and probably it was not intention of author to make an error deliberately
Correct letter "R" was replaced by incorrect letter "C" in one word
Nobody has noticed it?

But I have to say, that this has no effect on solving the challenge…
I write it here just as a "curiosity" ;-)

Re: Challenge "Enigma Part 2"  

  By: TBREAKER on Sept. 1, 2011, 3:59 p.m.

Hello Veselovský

First: Congratulation!

I can not see the error in my plaintext. Can you write me a PM with the word?

Michael

Re: Challenge "Enigma Part 2"  

  By: Veselovský on Sept. 2, 2011, 1:06 a.m.

It is strange, TBREAKER said, that he hand no mistake in the plaintext and we both have solve this challenge so both of us must have used the same key for decryption.

So either there is an error in Cryptool2 or there is error in the ZIP file, which contains ciphertext. Wasn't there some manipulations to the file recently?

It is only one letter in one word. Decrypted word in Cryptool2 contains incorrect letter "C" which should be "R".

Re: Challenge "Enigma Part 2"  

  By: Veselovský on Sept. 2, 2011, 1:41 a.m.

I figured it out… there must be a little error in simulation of enigma cryptool2, because when I used cryptool1 with same ciphertext and same key then there was no error in spelling of plaintext.
But why just one letter just in one position?

…I have double checked it also with my own program for simulation of enigma and there also wasn't any error…

Re: Challenge "Enigma Part 2"  

  By: TBREAKER on Sept. 2, 2011, 4:57 a.m.

There is definitely a malfunction with the ENIGMA "anomaly"
in CrypTool2. At this special position a mid AND and a slow rotor
turnover appears sequently! I assume the slow rotor turnover in CrypTool2 is one keystroke
too early …

The correct anomaly is (at this special position and rotor order):



EUI (character Position 366)
EUJ <– fast rotor notch in position / fast rotor: IV
EVK <– fast rotor turnovers mid rotor (mid rotor notch in position / mid rotor: III)
FWL <– slow rotor turnover !!!

CrypTool2 does something like this:



EUI (character Position 366)
EUJ <– fast rotor notch in position / rotor IV
FVK <– fast rotor turnovers mid AND slow rotor / wrong decrypt (C instead R!)
FWL <– correct position

RESULT: Only ONE! wrong character…

I have sent a "Bug-Report" to the CrypTool2 Team

Re: Challenge "Enigma Part 2"  

  By: TBREAKER on Sept. 7, 2011, 2:08 p.m.

Ok! They fixed it…

Rotor 2 did a double step at one key hit.
Due to a wrong order within the notch query code …

Re: Challenge  

  By: fmoraes on Nov. 12, 2013, 3:45 p.m.

Does this challenge require BF of the stecker combination, meaning 5311735 possible combinations of 8 paired letters out of the 26?

Re: Challenge  

  By: egebamyasi on Nov. 27, 2013, 9:11 p.m.

4 seconds for a full Gillogly run over the 5 wheels and all message settings. Settings 100% correctly recovered (small wonder, no ring settings and THAT amount of text).

However… I had some serious help by my CUDA powered graphics card… ;-) [HTML_REMOVED]

Nearly forgot Enigma 1: 1 second, however had to expand the checked vector size to the 10 best messages (text is a bit short, isn't it?)

Re: Challenge  

  By: Scryer on Dec. 5, 2013, 5:31 a.m.

I got confused with the identification of the rotors: instead of the standard 1-origin German numbering, the problem statement conforms to the sample program, which uses 0-origin numbering. For example, rotors I II III would be named 012 for the Enigma Part 1/2 problems. Not a problem if you use the provided code, I suppose.

Re: Challenge  

  By: bgr on July 31, 2014, 9:17 p.m.

For me the biggest challenge is always to find the right syntax to get the solution accepted.
Maybe someone can verify my solution?
Thanks in advance!
Bernhard

Re: Challenge  

  By: Bart13 on July 31, 2014, 10:26 p.m.

Bernhard, if you send me a pm I'll check your solution.

Re: Challenge  

  By: bgr on Aug. 4, 2014, 12:57 p.m.

Bernhard, if you send me a pm I'll check your solution.

Thanks a lot, Bart. Now the solution was accepted!
Bernhard


Currently 18 guests and one member are online.
Powered by the CrypTool project
Contact | Privacy | Imprint
© 2009-2024 MysteryTwister team