Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Secret wartime projects drove 'incredible' advances, says Vint Cerf

Today's hackers would recognise some of the British techniques for hacking German messages as social engineering on a grand scale

Article comments

The Enigma cypher machine used by the German military in World War II is still a tough nut to crack today. The total number of ways it can be configured for every letter is around 150 million million million. That's enough to keep it beyond the reach of all but the most determined of brute force attacks.

So how were the late Alan Turing (whose 100th birthday is being celebrated in academic circles this June) and his fellow Bletchley Park code-breakers able to crack the Enigma and provide the Allies with such priceless intelligence?

To begin with, Google Internet evangelist Vint Cerf says, there was a lot more to it than raw computational genius.

"It's not entirely a result of the hardware. It's also people making extraordinary guesses about what might have been encoded, the formats, date and time of transmission; all these other things factored into the tactics for trying to break a particular message," he says.

Today's hackers would instantly recognise some of the British techniques for hacking German messages as social engineering - on a grand scale.

One British trick called for the Royal Air Force to drop sea mines at a location where they would be sure to be noticed by the Germans - which would invariably prompt a notification that "the British have mined grid coordinates x,y." The British could then work on that message with the knowledge that the German message would include those coordinates, giving them a substantial leg-up.

"These are called chosen plaintext attacks, and they are perniciously powerful. They're the sort of thing that any cryptographer really hates," Cerf says with a laugh.

Nevertheless, the advances in computing technology - particularly Turing's Bombe, created to automatically crack Enigma messages - were staggering, and also essential to the code-breaking effort.

"It's incredible what people did during World War II," says Cerf. "Given the crappy computational capabilities they had, and the very limited hardware that they could build, it's amazing what they got away with."



Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *