The Bombe machine takes advantage of the plugboard being reciprocal, and how the Enigma cannot encrypt a character to itself. We implemented the Enigma machine in both Verilog and C. The plugboard connections add the most amount of complexity and combinations. If two Enigma machines are set up the exact same way and one uses the first one to output an encrypted message, one can then use the other Enigma machine to input the encrypted message and get the original message out. The key of a message is which rotors are used, the rotor order, starting position of the rotors, which reflector is used, and the plugboard connections. In terms of the overall flow when a letter is encrypted, it first passes through the plugboard, the three rotors, the reflector, the three rotors again, and then the plugboard again. Lastly, the reflector connects letters in pairs. Similarly, when the middle rotor reaches a certain position, the left rotor moves one step. When the rightmost rotor reaches a certain position, the middle rotor moves one step. For every key press, the rightmost rotor moves one step. There are 3 rotors, with each having 26 pins on both the input/output and internal scrambled wiring for all 26 letters. The largest contribution to the number of total possible combinations for the Enigma results from the plugboard The plugboard is also reciprocal, meaning that if G is connected in the plugboard to W, then that means W must also be connected to G. In the example above, T enters the plugboard and exits after being swapped for K. The plugboard appears twice and consists of up to 10 pairs of letters that are swapped using cables. The main components of an Enigma are the plugboard, the three rotors, and the reflector. Even though we only replicated the physical machine, we are able to appreciate the complexity of the system and the intelligence of the minds behind it.įirst, we recreated the Enigma machine that is used to encrypt and decrypt messages. Lastly, write a C program to take the output of the Bombe machine, check all leftover plugboard settings and decrypt the entire input message along with the full plugboard setting. Second, implement the Bombe in Verilog and runs it on FPGA to eliminate plugboard settings. First, implement the Enigma machine in C and Verilog. In order to fully understand the process of decrypting a message, we need to accomplish three major tasks. We are curious to see the translation of mechanical structure to digital components through FPGA and how much speedup we can achieve through hardware implementations on the DE1-Soc. As one of the few machines that has altered history, the Bombe machine reduced the deciphering complexity of the Enigma machine and many believe that this decrypting tool is the most important victory by the Allied powers during WWII. The Bombe machine was a computationally intensive electromechanical system built during WWII to decrypt the Enigma machine.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |