Article | Proceedings of the 1st International Conference on Historical Cryptology HistoCrypt 2018 | Invited Talk - Special Session on Arne Beurling: Modern Codebreaking of T52 Linköping University Electronic Press Conference Proceedings
Göm menyn

Title:
Invited Talk - Special Session on Arne Beurling: Modern Codebreaking of T52
Author:
George Lasry: University of Kassel, Germany
Download:
Full text (pdf)
Year:
2018
Conference:
Proceedings of the 1st International Conference on Historical Cryptology HistoCrypt 2018
Issue:
149
Article no.:
006
Pages:
xxi
No. of pages:
1
Publication type:
Abstract and Fulltext
Published:
2018-06-13
ISBN:
978-91-7685-252-1
Series:
Linköping Electronic Conference Proceedings
ISSN (print):
1650-3686
ISSN (online):
1650-3740
Publisher:
Linköping University Electronic Press, Linköpings universitet


Export in BibTex, RIS or text

The Siemens and Halske T52 is a family of teleprinter encryption systems, used in WWII by the Luftwaffe, the German Navy and Army, and German diplomatic services. Codenamed “Sturgeon” by the Allied, it was designed to provide enhanced security, compared to the other German teleprinter encryption system, the Lorenz SZ42 (“Tunny”). In one of the most impressive feats of cryptographic genius, the first model, the T52a/b, was reconstructed by Arne Beurling only from encrypted traffic. It was also reconstructed at Bletchley Park. Until the end of 1942, Sweden was able to read current T52 traffic that passed through its teleprinter lines, taking advantage of errors by German operators (e.g., messages sent in depth). At the beginning of 1943, Germany increased their security measures, also introducing a new model, the T52d. The T52d was a much more secure system, featuring an irregular movement of the wheels, and a “Klartext” (autokey) function. Sweden could not read its traffic, and a Bletchley Park report from 1944 considers the T52d problem to be “completely hopeless”. The T52 problem (when no depth is available) is still daunting today, even with modern computing. Since WWII, no new methods for the cryptanalysis of the T52 have been published. The machine complexity, and its huge keyspace size, 1027, prohibit any brute-force attack. In this presentation, George will describe how he applied a novel statistical approach, to decipher rare original telegrams from 1942, encrypted using the T52a/b, and found in FRA archives. Also, he will present a first-ever practical attack on the T52d and its successor, the T52e, which takes advantage of a subtle weakness in the design of their stepping mechanism.

Proceedings of the 1st International Conference on Historical Cryptology HistoCrypt 2018

Author:
George Lasry
Title:
Invited Talk - Special Session on Arne Beurling: Modern Codebreaking of T52
References:
No references available

Proceedings of the 1st International Conference on Historical Cryptology HistoCrypt 2018

Author:
George Lasry
Title:
Invited Talk - Special Session on Arne Beurling: Modern Codebreaking of T52
Note: the following are taken directly from CrossRef
Citations:
No citations available at the moment


Responsible for this page: Peter Berkesand
Last updated: 2019-11-06