[Cryptography] the Herival tip - hut 6
ianG
iang at iang.org
Wed Apr 6 21:05:35 EDT 2016
While researching something else, I came across David Rees, 1918 - 2013.
The German operators of the Enigma machines were told which three rotors
and which settings to use each day, but they had to choose the starting
positions of the rotors and indicate their choices via the first three
letters of their first messages. John Herivel, another of Welchman's
recruits from Sidney Sussex College, predicted in February 1940 that
some German operators might use short cuts that could be exploited by
the Bletchley Park codebreakers.
For three months, this insight produced no result; but in May 1940 some
of the German operators began to make the predicted mistakes, and David
and his fellow codebreakers were able to use the technique known as the
"Herivel tip" to break Enigma ciphers for some critical months from May
1940. The initial breakthrough generated roars of excitement in Hut 6,
but it had to be kept secret for at least 40 years. David remarked in
2000 that "the Herivel tip was one of the seminal discoveries of the
second world war". He thought that Herivel should have received more credit.
http://www.theguardian.com/education/2013/aug/29/david-rees
Herivel's great insight came to him one evening in February 1940 whilst
he was dozing in front of his landlady's fire. It was that stressed or
lazy operators who had set the rings when the rotors were in the
machine, may then have left ring setting at the top, or near the top,
and used those three letters for the first message of the day.[13]
For each transmitted message, the sending operator would follow a
standard procedure. From September 1938 he would use an initial position
to encrypt the indicator, and send it in clear, followed by the message
key that had been enciphered at that setting. Suppose the initial
position, the ground setting (German: Grundstellung) was GKX for
example, he would then use Enigma with the rotors set to GKX to encrypt
the message setting, which he might choose to be RTQ; which might
encrypt to LLP. (Before May 1940 the encrypted message setting was
repeated, but this makes no difference to Herivel's insight.) The
operator would then turn his rotors to RTQ and encrypt the actual
message. Thus the preamble to the message would be the unencrypted
ground setting (GKX) followed by the encrypted message setting (LLP). A
receiving Enigma operator could use this information to recover the
message setting and then decrypt the message.
The ground setting (GKX in the above example) should have been chosen at
random, but Herivel reasoned that if an operator were lazy, or in a
hurry, or otherwise under pressure, he might simply use whatever rotor
setting was currently showing on the machine.[12] If this was the first
message of the day, and the operator had set the ring settings with the
rotors already inside the machine, then the rotor position currently
showing on the machine could well be the ring setting itself, or else be
very close to it. (If this situation occurred in the above example, then
GKX would be the ring setting, or close to it).
Polish cryptographers used the idea at PC Bruno during the Phoney War.[14]
https://en.wikipedia.org/wiki/John_Herivel#The_Herivel_tip
The effect predicted by Herivel did not immediately show up in the
Enigma traffic,[13] however, and Bletchley Park had to continue to rely
on a different technique to get into Enigma: the method of "perforated
sheets", which had been passed on by Polish cryptologists. The situation
changed on 1 May 1940, when the Germans changed their indicating
procedure, rendering the perforated sheet method obsolete. Hut 6 was
suddenly unable to decrypt Enigma.
Fortunately for the codebreakers, the pattern predicted by the Herivel
tip began to manifest itself soon after on 10 May, when the Germans
invaded the Netherlands and Belgium. David Rees spotted a cluster in the
indicators,[12] and on 22 May an Air Force message sent on 20 May was
decoded, the first since the change in procedure.[16] The Herivel tip
was used in combination with another class of operator mistake, known as
"cillies", to solve the settings and decipher the messages.[13][17] This
method was used for several months until specialised codebreaking
machines designed by Alan Turing, the so-called "bombes", were ready for
use.[18]
...
More information about the cryptography
mailing list