|
Home Page The Kryha Home Page
|
IntroductionA manual was supplied with every Kryha machine. It was accompanied by a brochure extolling the machine's invulnerability, written by the mathematician Georg Hamel. This manual, as well as the standard Kryha, dates from at the earliest 1926 (this year is present in the manual) and at the latest 1929.
![]() This website presents two versions of the official Kryha manual: Note: I am extremely grateful to Klaus Schmeh for providing me with this Kryha manual. It is a very important document for gaining a good understanding of this machine. Manual Outline and Summary
Notes on the ManualIt should be noted that, unlike the Enigma, the official Kryha manual includes both a description of how the Kryha works and procedures related to securing transmissions. In the case of the Enigma, there are two manuals: one describes the machine's operation (how to change the rotors, etc.), and another describes the procedures for using it within a transmission network (example of a key table, message headers, etc.). Compared to other cipher machine manuals, the lack of information related to machine maintenance is noticeable: lubrication points, how to disassemble the machine for repair, etc. When reading this manual, one gets the impression that its primary purpose is to proclaim the merits of having purchased this marvelous machine: it is very secure, it is easy to use, and the key can be changed indefinitely... The manual emphasizes the possibilities for changing the key:
He advises locking the physical components of the key in a safe: the internal alphabet (a wheel), the external alphabet (an arc of a circle), and the coding wheel. The rest of the machine can remain unattended. My main criticism of this manual, from the perspective of encryption security, is that the "home position" (the initial position of the coding wheel and the initial position of the internal alphabet) is presented as constituting the global key. Thus, if a station sends different messages to the same recipient, the home position will be reused, and therefore, the different messages will be in-depth. Their decryption will be possible (see the in-depth page) even without knowing the workings or the key of the Kryha. This lack of knowledge indicates that Von Kryha, his team and his advisors are not experts in cryptology. Conversely, the document describing the procedures for using Kryha by Spanish nationalists specifies that each message must have a different message key, equivalent to the "home key" in the Kryha manual. This technique prevents messages from being encrypted in depth.
|