Talk:Typex
|
Missing image Key-crypto-sideways.png WikiProject on Cryptography | This article is part of WikiProject Cryptography, an attempt to build a comprehensive and detailed guide to cryptography in the Wikipedia. If you would like to participate, you can choose to edit the article attached to this page, or visit the project page, where you can join the project and see a list of open tasks. |
Contents |
Weakness of Enigma
"Their inability to use the machine in order to crack Typex messages may have convinced them even more of the security of Engima."
the Abwehr specialists knew of the weakness of enigma. They concluded, however, that no one would be able to orchestrate the effort to actually achieve decyphering.
Reference?
Does any have access to:
- Ralph Erskine, "The Development of Typex", The Enigma Bulletin 2 (1997): pp69-86
— Matt 02:27, 2 Aug 2004 (UTC)
Removing for now
[3->5 rotors]...This change alone adds no security, because a rotor only turns after enough key presses have occurred to turn all the rotors to the left of it. In the case of a three-rotor machine that would require 26 × 26 = 676 key-presses before the third rotor would have any effect. In the case of a four-rotor machine the message would have to be 676 × 26 = 17576 letters long — and messages this long simply were not sent.
Simply adding extra rotors can add security — the security doesn't just depend on the period of the machine; increasing the number of rotors increases the number of possible keys, and would likely make most attacks more complex. For example, a bombe would have a lot more work to do with five rotors than with three. — Matt 23:06, 1 Sep 2004 (UTC)
Replaced book ciphers?
- In the late 1920s the British were seeking a replacement for their book cipher systems...
Is the author suggesting that book ciphers were used in the British services at this time, or is this a thinko for code books? Securiger 14:00, 27 Nov 2004 (UTC)