Ah, the enigma codes. The German esszett ligature (also called the scharfes s (sharp s)) ß evolved from the ligature"long s over round s". <br>
<br>
It is replaced by 'SS' in capitalized spelling and in alphabetic ordering. ß is only used in Germany and Austria, nowadays generally never in Switzerland.<br>
<br>
The code might have been a little harder to crack if there weren't apparantly orphaned SS's in messages.<br>
<br>
I wonder how <a href="http://tlug.ß.org">tlug.ß.org</a> would resolve.<br>
<br>
Cheers,<br>
Rußell<br>
<br>
Christopher Browne <cbbrowne-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> wrote:<br>
<br>
>Well, the "security" of the rolls mostly depends on the attacker not<br>
>knowing how it works, and the majority of the population being<br>
>comprised of<br>
>illiterate slaves. Having 3 or 4 rolls of different sizes would<br>
>suffice<br>
>for cracking most of this; knowing the fact of variable roll size is<br>
>99% of<br>
>the trick.<br>
><br>
>A considerable portion of security from encryption is achieved by<br>
>minimizing the source text, notably to keep out readily guessable plain<br>
>text. In WWII, British decryption efforts were helped plenty by German<br>
>officers that considered it a "career limiting" factor *not* to end<br>
>messages with "Heil Hitler". That perception mayn't have been wrong,<br>
>but<br>
>those bits of predictable plain text almost certainly caused the losses<br>
>of<br>
>German U-Boats, as it provided a vulnerability for Allied<br>
>cryptographers to<br>
>exploit.<br>
><br>
>F. L. Bauer's book on cryptography describes other "politically<br>
>necessary"<br>
>sorts of cryptographic protocol failures - when messages contain<br>
>fawning<br>
>phrasing ("by order of the fuhrer") or spelling out some of the wacky<br>
>long<br>
>officer titles in high command, this all helps in attacking:<br>
>A) individual messages<br>
>B) message keys that will be used on other messages<br>
>(Hence, the sloppy bozo may wind up getting others that are competent<br>
>killed)<br>
>C) the cipher system as a whole.<br>
><br>
>Bauer observes that a *good* cryptograms clerk:<br>
>- removes all unnecessary text<br>
>- abbreviates heavily<br>
>- misspells whatever they can<br>
><br>
>That seems like it's likely to still be valid-ish.<br>
><br>
>We do have stronger ciphers, today, but the notion that having known<br>
>plaintext helps certainly persists in modern cryptanalysis. You'll see<br>
>it<br>
>a fair bit in Bruce Schneier's writing (sp?)<br>
><br>
>On some extra reflection, there is a harmful aspect to encrypting your<br>
>whole system, as this introduces a barrel load of known plaintext. <br>
>Forget<br>
>about a few references to Nazi haute, you are throwing in a dozen<br>
>copies of<br>
>the GPL, and as likely as not, a gigabyte of well-known binary and text<br>
>data. Lots of material for cryptanalysis, quite possibly enough to<br>
>meaningfully enhance a brute force attack.<br>
><br>
>And when it's certain that the key for all that will be in the VM, a<br>
>smart<br>
>attacker won't bother with brute force when getting the key from the VM<br>
>will provide the Keys To The Kingdom. Better still, once cracked, you<br>
>can't fix it - changing the key requires rebuilding your VM. A<br>
>*really*<br>
>smart attacker may be sufficiently ready that they'll regain access<br>
>before<br>
>you can reboot into the new VM!<br>
<br>
R. Russell Reiter's Left Brain Messaging Matrix<br>
[Currently Under Development] Your mileage may vary.