Rasterschluessel 44http://www.cryptoden.com/index.php/ciphers/rasterschluessel-442015-07-03T08:41:20+00:00Joomla! - Open Source Content ManagementIntroduction2012-07-20T12:23:20+00:002012-07-20T12:23:20+00:00http://www.cryptoden.com/index.php/ciphers/rasterschluessel-44/21-intro-rasterSuper Usermikejcowan@me.com<div class="feed-description"><h1 style="text-align: center;"><span style="font-family: verdana, geneva; font-size: small; color: #0000ff;">Rasterschluessel 44 (RS44)</span></h1>
<p><span style="font-family: verdana, geneva; font-size: small;">RS44 was a German field cipher that gave the Allies a major headache during the second world war. It took so long to break that the information was out of date and of no operational use.</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">RS 44 was a transposition cipher with a twist. Random gaps were left between letters that broke-up the continuity of the ciphertext and prevented attack by anagramming. The basis of the cipher was a ‘stencil’ that contained white cells for writing-in the message and black cells, distributed randomly, that were left empty.</span></p>
<p style="text-align: left;"><span style="font-family: verdana, geneva; font-size: small;"><img src="images/Stencila.jpg" border="0" alt="" align="right" /></span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">Every row and column was given a different bigram identifier and in addition every column was numbered in a random order to form the transposition key. </span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">The idea of the cipher was to pick a cell at random to start and then write-in the message horizontally, row by row. Then to take-out the ciphertext vertically, column by column, in the order of the key.</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">A different stencil was used each day so that the location of the black cells, the column identifiers and the transposition key were changing daily. Other camouflaging tactics were used which are explained in detail in the later section on enciphering.</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;"> </span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">The stencils were printed by machine in pads of 31 -- one for each day of the month. The Germans made only 36 different printing patterns of black and white cells , from which 24 were chosen to print each stencil. This limitation was enforced by an extreme shortage of materials due to the increasing encirclement by the Allies.</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">A 20-page <a href="http://www.cdvandt.org/RS44.pdf">Instruction Manual</a> was issued by General Fellgiebel of the German High Command (OKW) in March 1944. The intention was that the Army, Airforce and regular Police would begin using the cipher in August. Material shortages hindered progress and the Army was not at all keen to adopt the cipher. They finally took it up in February 1945. </span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">The cipher was used by forward troops who needed a simple and highly portable cipher. They had previously been using the Double Playfair cipher but this was not sufficiently secure. In fact the Allies broke it every day. With the prospect of invasion in the West, the OKW wanted something more secure and RS 44 certainly provided that as I will describe in the next section.</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">Most of the messages enciphered by RS 44 were fairly trivial, dealing with troop movements, deliveries of petrol and other logistical matters. However even such mundane matters would have been of interest to the Allies to aid tactical decisions.</span></p>
<p style="text-align: center;"><a href="index.php/ciphers/rasterschluessel-44/22-a-tough-challenge"><span style="font-family: verdana, geneva; font-size: small;">NEXT </span></a></p>
<p><span style="font-family: verdana, geneva; font-size: small;"> </span></p>
<p><span style="text-align: left;"> </span></p></div><div class="feed-description"><h1 style="text-align: center;"><span style="font-family: verdana, geneva; font-size: small; color: #0000ff;">Rasterschluessel 44 (RS44)</span></h1>
<p><span style="font-family: verdana, geneva; font-size: small;">RS44 was a German field cipher that gave the Allies a major headache during the second world war. It took so long to break that the information was out of date and of no operational use.</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">RS 44 was a transposition cipher with a twist. Random gaps were left between letters that broke-up the continuity of the ciphertext and prevented attack by anagramming. The basis of the cipher was a ‘stencil’ that contained white cells for writing-in the message and black cells, distributed randomly, that were left empty.</span></p>
<p style="text-align: left;"><span style="font-family: verdana, geneva; font-size: small;"><img src="images/Stencila.jpg" border="0" alt="" align="right" /></span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">Every row and column was given a different bigram identifier and in addition every column was numbered in a random order to form the transposition key. </span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">The idea of the cipher was to pick a cell at random to start and then write-in the message horizontally, row by row. Then to take-out the ciphertext vertically, column by column, in the order of the key.</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">A different stencil was used each day so that the location of the black cells, the column identifiers and the transposition key were changing daily. Other camouflaging tactics were used which are explained in detail in the later section on enciphering.</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;"> </span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">The stencils were printed by machine in pads of 31 -- one for each day of the month. The Germans made only 36 different printing patterns of black and white cells , from which 24 were chosen to print each stencil. This limitation was enforced by an extreme shortage of materials due to the increasing encirclement by the Allies.</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">A 20-page <a href="http://www.cdvandt.org/RS44.pdf">Instruction Manual</a> was issued by General Fellgiebel of the German High Command (OKW) in March 1944. The intention was that the Army, Airforce and regular Police would begin using the cipher in August. Material shortages hindered progress and the Army was not at all keen to adopt the cipher. They finally took it up in February 1945. </span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">The cipher was used by forward troops who needed a simple and highly portable cipher. They had previously been using the Double Playfair cipher but this was not sufficiently secure. In fact the Allies broke it every day. With the prospect of invasion in the West, the OKW wanted something more secure and RS 44 certainly provided that as I will describe in the next section.</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">Most of the messages enciphered by RS 44 were fairly trivial, dealing with troop movements, deliveries of petrol and other logistical matters. However even such mundane matters would have been of interest to the Allies to aid tactical decisions.</span></p>
<p style="text-align: center;"><a href="index.php/ciphers/rasterschluessel-44/22-a-tough-challenge"><span style="font-family: verdana, geneva; font-size: small;">NEXT </span></a></p>
<p><span style="font-family: verdana, geneva; font-size: small;"> </span></p>
<p><span style="text-align: left;"> </span></p></div>A tough challenge2012-07-21T10:00:02+00:002012-07-21T10:00:02+00:00http://www.cryptoden.com/index.php/ciphers/rasterschluessel-44/22-a-tough-challengeSuper Usermikejcowan@me.com<div class="feed-description"><h1 style="text-align: center;"><span style="font-family: verdana, geneva; font-size: small; color: #0000ff;">A tough challenge.</span></h1>
<p><br /><span style="font-family: verdana, geneva; font-size: small;">The number of different grids possible was, in principle, enormous. For each row there were 25x24x...x16 = 12 thousand billion different ways of arranging the white and black squares. Taking into account that there were 24 rows, the number of different grids increases to the astronomical figure of 7 followed by 36 zeros, a considerably greater number of possibilities than generated by an Enigma machine. It was consequently completely out of the question for a cryptanalyst to try every possibility! </span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">The Swedish mathematician Arne Beurling (who has been ranked alongside Rejewski and Turing both as a mathematician and a cryptanalyst) gave his conclusion on RS44 after the war: “The possibilities for successful cryptanalysis are nil, even under the best of circumstances”. Maj. Hugh Skillen, an officer in the British Y Service, wrote that ‘it defeated our cryptographers’. Sir Harry Hinsley, referring to a ‘new’ medium-grade cipher by which he undoubtedly meant RS44, said that it was practically unbreakable.</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">Bletchley Park tried hard to find a solving technique, with over 100 people employed on the task, but after a few months gave up. An exception was made for Police messages that gave a unique picture of the last days of the Nazi regime and of its individual leaders. Although the intelligence gained suffered from long delays and had a disproportionately high cost, it nevertheless provided posterity with a unique picture and for this reason wartime messages continued to be decrypted after VE-day.</span></p>
<p style="text-align: center;"><a href="index.php/ciphers/rasterschluessel-44/23-encryption-details"><span style="font-family: verdana, geneva; font-size: small;">NEXT</span></a></p></div><div class="feed-description"><h1 style="text-align: center;"><span style="font-family: verdana, geneva; font-size: small; color: #0000ff;">A tough challenge.</span></h1>
<p><br /><span style="font-family: verdana, geneva; font-size: small;">The number of different grids possible was, in principle, enormous. For each row there were 25x24x...x16 = 12 thousand billion different ways of arranging the white and black squares. Taking into account that there were 24 rows, the number of different grids increases to the astronomical figure of 7 followed by 36 zeros, a considerably greater number of possibilities than generated by an Enigma machine. It was consequently completely out of the question for a cryptanalyst to try every possibility! </span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">The Swedish mathematician Arne Beurling (who has been ranked alongside Rejewski and Turing both as a mathematician and a cryptanalyst) gave his conclusion on RS44 after the war: “The possibilities for successful cryptanalysis are nil, even under the best of circumstances”. Maj. Hugh Skillen, an officer in the British Y Service, wrote that ‘it defeated our cryptographers’. Sir Harry Hinsley, referring to a ‘new’ medium-grade cipher by which he undoubtedly meant RS44, said that it was practically unbreakable.</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">Bletchley Park tried hard to find a solving technique, with over 100 people employed on the task, but after a few months gave up. An exception was made for Police messages that gave a unique picture of the last days of the Nazi regime and of its individual leaders. Although the intelligence gained suffered from long delays and had a disproportionately high cost, it nevertheless provided posterity with a unique picture and for this reason wartime messages continued to be decrypted after VE-day.</span></p>
<p style="text-align: center;"><a href="index.php/ciphers/rasterschluessel-44/23-encryption-details"><span style="font-family: verdana, geneva; font-size: small;">NEXT</span></a></p></div>Encryption details2012-07-21T10:17:12+00:002012-07-21T10:17:12+00:00http://www.cryptoden.com/index.php/ciphers/rasterschluessel-44/23-encryption-detailsSuper Usermikejcowan@me.com<div class="feed-description"><h1 style="text-align: center;"><span style="font-family: verdana, geneva; font-size: small; color: #0000ff;">Details of Encryption process.</span></h1>
<p><br /><span style="font-family: verdana, geneva; font-size: small;">The cipher clerk was handed the message to be enciphered. He began by writing the time and the number of letters in the message on a transmission sheet. He laid a transparent ‘flimsy’ over the stencil and selected a cell to start the message. This cell was identified by its row and column coordinates, let us say ea ac, which were then encoded with a bigram table such as:</span></p>
<p style="text-align: center;"><span style="font-family: 'courier new', courier; font-size: medium;"> <strong><span style="text-decoration: underline;">a b c d e </span></strong></span><br /><span style="font-family: 'courier new', courier; font-size: medium;">l c g q j</span><br /><span style="font-family: 'courier new', courier; font-size: medium;">o y e v z</span><br /><span style="font-family: 'courier new', courier; font-size: medium;">n b s k x</span><br /><span style="font-family: 'courier new', courier; font-size: medium;">i a p r u</span><br /><span style="font-family: 'courier new', courier; font-size: medium;">d w m f h</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">So coordinates 'eaac' could be encoded to a choice of letters, including 'zios' or 'jodg' and so on. The transmission sheet would then look something like this:</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">1307 – 54 – zios</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">Next he looks at the message text. Following his Instruction Manual, he replaces numerals with text making abbreviations where appropriate – for example ‘aqt’ for ‘acht’ – and he enciphers place names with a given substitution cipher.</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">Now he writes the message onto the flimsy, from the starting cell from left to right, row by row, using the white cells only. If the end of the stencil is reached, continuation proceeds in the top row. He puts an arrow to mark the starting column and rules of the top of the message (see below).</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">Finally he identifies the offset for the take-out column by adding together the digits of the minutes and the number of letters. In our example this is 0+7+5+4=16. He counts 16 columns to the right of the start column and puts a cross there. And he rules off the bottom of the text.</span><span style="text-align: center;"> </span></p>
<p><img src="images/stencil4jpeg.jpg" border="0" alt="" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p><span style="font-family: verdana, geneva; font-size: small;">Now he is ready to take out the ciphertext. He starts in the column marked 19, then follows the transposition key 20,21...25,1,2...18. The ciphertext is thus</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">NITOT SNILM AISMT OOISA HENEE AIRTP SDTPP HMSSS YATHO AWIOO TSOS</span></p>
<p> </p>
<p>Messages may be enciphered and deciphered using the Windows program written by Geoff Sullivan to accompany my article in Cryptologia "<a href="http://www.tandfonline.com/doi/abs/10.1080/0161-110491892827#.UtlYeXk4mS4">RS44 - the epitome of hand field ciphers</a>". The next section gives details on how to use this program.</p>
<p style="text-align: center;"><a href="index.php/ciphers/rasterschluessel-44/50-implementing-the-rs-44-program"><span style="font-family: verdana, geneva; font-size: small;"> NEXT</span></a></p>
<p><span> </span></p>
<p><span> </span></p>
<p> </p></div><div class="feed-description"><h1 style="text-align: center;"><span style="font-family: verdana, geneva; font-size: small; color: #0000ff;">Details of Encryption process.</span></h1>
<p><br /><span style="font-family: verdana, geneva; font-size: small;">The cipher clerk was handed the message to be enciphered. He began by writing the time and the number of letters in the message on a transmission sheet. He laid a transparent ‘flimsy’ over the stencil and selected a cell to start the message. This cell was identified by its row and column coordinates, let us say ea ac, which were then encoded with a bigram table such as:</span></p>
<p style="text-align: center;"><span style="font-family: 'courier new', courier; font-size: medium;"> <strong><span style="text-decoration: underline;">a b c d e </span></strong></span><br /><span style="font-family: 'courier new', courier; font-size: medium;">l c g q j</span><br /><span style="font-family: 'courier new', courier; font-size: medium;">o y e v z</span><br /><span style="font-family: 'courier new', courier; font-size: medium;">n b s k x</span><br /><span style="font-family: 'courier new', courier; font-size: medium;">i a p r u</span><br /><span style="font-family: 'courier new', courier; font-size: medium;">d w m f h</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">So coordinates 'eaac' could be encoded to a choice of letters, including 'zios' or 'jodg' and so on. The transmission sheet would then look something like this:</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">1307 – 54 – zios</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">Next he looks at the message text. Following his Instruction Manual, he replaces numerals with text making abbreviations where appropriate – for example ‘aqt’ for ‘acht’ – and he enciphers place names with a given substitution cipher.</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">Now he writes the message onto the flimsy, from the starting cell from left to right, row by row, using the white cells only. If the end of the stencil is reached, continuation proceeds in the top row. He puts an arrow to mark the starting column and rules of the top of the message (see below).</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">Finally he identifies the offset for the take-out column by adding together the digits of the minutes and the number of letters. In our example this is 0+7+5+4=16. He counts 16 columns to the right of the start column and puts a cross there. And he rules off the bottom of the text.</span><span style="text-align: center;"> </span></p>
<p><img src="images/stencil4jpeg.jpg" border="0" alt="" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p><span style="font-family: verdana, geneva; font-size: small;">Now he is ready to take out the ciphertext. He starts in the column marked 19, then follows the transposition key 20,21...25,1,2...18. The ciphertext is thus</span></p>
<p><span style="font-family: verdana, geneva; font-size: small;">NITOT SNILM AISMT OOISA HENEE AIRTP SDTPP HMSSS YATHO AWIOO TSOS</span></p>
<p> </p>
<p>Messages may be enciphered and deciphered using the Windows program written by Geoff Sullivan to accompany my article in Cryptologia "<a href="http://www.tandfonline.com/doi/abs/10.1080/0161-110491892827#.UtlYeXk4mS4">RS44 - the epitome of hand field ciphers</a>". The next section gives details on how to use this program.</p>
<p style="text-align: center;"><a href="index.php/ciphers/rasterschluessel-44/50-implementing-the-rs-44-program"><span style="font-family: verdana, geneva; font-size: small;"> NEXT</span></a></p>
<p><span> </span></p>
<p><span> </span></p>
<p> </p></div>Implementing the RS 44 Program2014-01-17T14:26:06+00:002014-01-17T14:26:06+00:00http://www.cryptoden.com/index.php/ciphers/rasterschluessel-44/50-implementing-the-rs-44-programSuper Usermikejcowan@me.com<div class="feed-description"><p>1. Download the Windows exec file <a href="equations/RS44.exe">RS44.exe by clicking here</a> and put it into a directory called RS44.</p>
<p>2. In the same directory make a text file named plain.txt and type the plaintext into the file. As an example:</p>
<p>A PESSIMIST IS A PERSON WHO HAS HAD TO LISTEN TO TOO MANY OPTIMISTS</p>
<p>3. Now run the program RS44.exe by double-clicking the icon.</p>
<p>4. In the title bar at the top of the stencil click Options/Enter Start Cell . A dialogue box appears in which you enter the start cell, <span style="line-height: 1.3em;">the start column and the offset (which is the number of columns to the right where taking out will begin). </span><span style="line-height: 1.3em;">In the example we enter 'ea' as the start row, 'ac' as the start column and '16' as the offset. </span></p>
<p>5. Now click File/Open PT file and select the file plain.txt The plaintext will appear in the stencil starting at the position specified as below:</p>
<p><img src="images/RS cipher.png" border="0" alt="" /></p>
<p>6. Finally click File/Save CT file and enter the name for your ciphertext file, and click save.</p>
<p>If you now look in the directory at the file cipher.txt it will contain the ciphertext NITOT SNILM AISMT OOISA HENEE AIRTP SDTPP HMSSS YATHO AWIOO TSOS</p>
<p style="text-align: center;"> <a href="index.php/ciphers/rasterschluessel-44/21-intro-raster">BACK TO START</a></p></div><div class="feed-description"><p>1. Download the Windows exec file <a href="equations/RS44.exe">RS44.exe by clicking here</a> and put it into a directory called RS44.</p>
<p>2. In the same directory make a text file named plain.txt and type the plaintext into the file. As an example:</p>
<p>A PESSIMIST IS A PERSON WHO HAS HAD TO LISTEN TO TOO MANY OPTIMISTS</p>
<p>3. Now run the program RS44.exe by double-clicking the icon.</p>
<p>4. In the title bar at the top of the stencil click Options/Enter Start Cell . A dialogue box appears in which you enter the start cell, <span style="line-height: 1.3em;">the start column and the offset (which is the number of columns to the right where taking out will begin). </span><span style="line-height: 1.3em;">In the example we enter 'ea' as the start row, 'ac' as the start column and '16' as the offset. </span></p>
<p>5. Now click File/Open PT file and select the file plain.txt The plaintext will appear in the stencil starting at the position specified as below:</p>
<p><img src="images/RS cipher.png" border="0" alt="" /></p>
<p>6. Finally click File/Save CT file and enter the name for your ciphertext file, and click save.</p>
<p>If you now look in the directory at the file cipher.txt it will contain the ciphertext NITOT SNILM AISMT OOISA HENEE AIRTP SDTPP HMSSS YATHO AWIOO TSOS</p>
<p style="text-align: center;"> <a href="index.php/ciphers/rasterschluessel-44/21-intro-raster">BACK TO START</a></p></div>