|
Home Page Kryha Home Page
|
IntroductionUsing an encryption system requires a set of rules known to the various correspondents. These correspondents must primarily share secret elements, first and foremost the encryption keys. Usually, when using a cipher machine, there are three types of keys:
Notes:
Furthermore, there are other procedural elements that correspondents must share:
Documents availableTwo documents are accessible on this site:
Data compressionIntroductionMarks (cf. Reference) informs us that the 1925 manual suggests using Kryha as a system for code over-encryption and data compression. Indeed, certain letters (D=12, W=23, N=25, etc.) can encode two digits. Therefore, Kryha can encode numbers from 0 to 25. This allows for a form of compression. Fixed Alphabet: Letters and numeric groups equivalent0(O), 1(K), 2(E), 3(Q), 4(Z), 5(H), 6(S), 7(B), 8(L), 9(V), 10(I), 11(U), 12(D), 13(Y), 14(M), 15(J), 16(T), 17(P), 18(A), 19(X), 20(C), 21(R), 22(G), 23(W), 24(F), 25(N) ExampleConsider the following code:A = 100, B = 101, C=102, D=103, E=104,…, I=109, J=110,K=111,S=119, …, ARM = 124, …, AT = 247, …, CK = 259, …, DAWN = 666, OUR = 221, …, TA = 228, …, WILL = 753 Consider the following clear text: (25 letters) Our armies will attack at dawn. Here is the coded text: (11 groups, 33 letters) 221-124-109-104-119-753-247-228-259-247-666 Equivalent text in Kryha (using the fixed alphabet) : (in whole, 22 letters) 4(Z)-21(R)-12(D)-4(Z)-10(I)-9(V)-10(I)-4(Z)-7(B)-5(H)-3(Q) 24(F)-7(B)-22(G)-8(L)-25(N)-9(V)-24(F)-7(B)-6(S)-6(S)-6(S) Note: if there is a group meaning "Attack at dawn", the compression is obvious. A notable improvementIn 1941, Allied cryptanalysts faced enemy traffic encrypted by the Kryha (from Spain), whose procedures complicated the breaking of the messages. The most significant of the changes in enciphering procedure is that which introduces the element of key interruption into the system. At the end of each word, the letter J (appearing with "-" dash on a single tab) is enciphered as a word-separator. After each such plain-text J the operating lever is depressed twice instead of the usual once. Thus, the first letter of the next word instead of being enciphered at the setting it normally would, is enciphered at the one following it. Note: The methods implemented by the allies to solve the traffic are described by Frode Weierud (link). ReferenceArticles & Books
Web sites
|