piatok 11. októbra 2024

Crypto chip / The Codestar module add-on board

The CodeStar module was designed for encryption and decryption of information for personal computers. The board was inserted into a free computer slot and occupied one 8-bit bus slot of a PC, XT, AT class computer. The module was supplied with a floppy disk with files in the Turbo C++ language under the MS-DOS OS. The original CRY 8 customer circuit, based on reliable technology had the entire information encryption and decryption algorithm hidden. This algorithm (Feistel-type algorithm) was developed and manufactured in Switzerland for reliability on a special order basis, together with a semi-custom integrated circuit using CMOS VLSI technology. The order was placed by the Institute of Computer Systems of the Slovak Academy of Sciences (today‘s Institute of Informatics SAV).
The module was used to encrypt and decrypt the user's information or the user's entire file with an original and constantly changing key, it served to protect the user's data from unauthorised handling of the information, it was guaranteed that the information could not be read by an_ unauthorised person who copied the data or the program without consent, it guaranteed access to selected oformation or user programs only through the correctly entered password and ensured the protection of user programs with the identification number assigned to the user module. The advantage of the module was, that it was hidden in the computer reducing the possibility of loss or theft, the key space (the set of all keys) was 2^48 keys, and no additional forms of encryption were needed. This module was used, for example, to encrypt images during CT and MRI scans at the Derer hospital in Bratislava.

streda 11. októbra 2023

Slovak cryptodevice - a fax with encoder - model HC-4400-09

 A fax with an encoder, model HC-4400-09 from the Swiss Company Crypto AG, was placed at Ministry of Foreign Affairs of the Slovak Republic (SR) and abroad at the representative offices of the Slovak Republic. It was used to encrypt and transfer copies of documents using the regular telephone network. The electronic device was compatible with any fax machine or personal computer. It was in the service as a fax server, did not have any restrictions on standard devices, with an error correction mode, automatic protocol adaptation, a security module resistant to unauthorised manipulation, automatic or manual key selection, for protection against forgery, for generating and encrypting keys, a program for managing keys, protected database, speed from 2400 to 14400 b/s. Installation and  operation of the fax machine was simple.

Cryptodevice - a fax with encoder - model HC-4400-09

 The device was manufactured in the 1990s by the Swiss company Crypto AG, which specialised in communication and information security. The predecessor of CryptoAG was AB Cryptoteknik, founded in Stockholm (Sweden) in 1920 and producing mechanical cryptographic machines.

During World war II, the company supplied up to 140,000 encryption devices to American troops. In 1952, the company moved to Switzerland, and in 1970 it was secretly bought (and influenced) by the Central Intelligence Agency (CIA) and the West German intelligence service BND, starting Operation Rubikon (Operation Thesaurus). The secret operation was used to collect communication information about the encrypted government communications of other countries, including the Slovak Republic (it is assumed that the operation affected up to 100 countries). This was achieved by selling manipulated encryption technology — exploiting the weakness of the algorithms.

streda 22. februára 2023

Spanish Embassy's cipher machine break by Czechoslovakian Secret Service and KGB

How the Czechoslovak secret service ŠtB breaks the encryption machine Gretag TC 803 at the Spanish embassy in Prague: https://www.info.cz/zpravodajstvi/cesko/akce-sumperk?odemknout=YAYLEWR8KH

Detailed description of the encryption machine Gretag TC 803: https://www.cryptomuseum.com/crypto/gretag/803/index.htm

Picture of the cipher machine's daily key block 


 "...Another break-in at the embassy took place on June 27, 1980. In this case, the State Security encountered a problem that it could not deal with. The Spanish started using the Gretag TC 803 encryption machine. ... Daily slips of paper with an encryption key were inserted into it. These were stored in a safe and bound with bookbinding cloth on three sides and in the middle. The canvas thus formed a kind of letter E with four arms. Between the canvas arms were perforated slips of metal foil that were inserted into the encryption machine. One part was designated for each day. Used and unused keys were shredded the next day. Without knowledge of this key, encrypted telexes could not be decrypted. Not even a specialist bookbinder from the Department of Intelligence could devise a way to bypass this security in a way that would not be noticed by the Spanish embassy cipher clerk. ... Although the StB found out the settings of the encryption machine's commutators for the second half of 1981, without knowledge of the day's encryption key, it was unable to decipher the dispatches sent. "An attempt was made to disassemble the block. A part of the light blue cardboard that covers the end of the binding cloth strips was peeled off by steaming. A high risk of exposure was found during this operation, as it is an area of 20 x 15 cm. (…) On the basis of the knowledge gained from the said inspection, I recommend consulting the problem through cooperation with the relevant workplace of experts in the issue of specially secured shipments in the USSR." Another inspection of the embassy took place on September 22, 1981, the StB copied the paper documents, but it was again unable to break the encrypted communication failed. ... The direct participation of four KGB workers in breaking into the Spanish embassy in Prague took place for the first time on March 17, 1983. The KGB had evidently managed to find a way to break the cipher blocks and copy the daily cipher for the Gretag cipher machine. It was not until four years after the installation of the "security" door to the encryption room that an employee of the Grany company, which manufactured the door, visited the embassy and removed the "defect". Between August 7 and 10, 1984, State Security verified that the door to the code room was recoded and was unable to discover the new password. The new lock was only breached during another break-in at the embassy on July 3, 1985, when Soviet specialists managed to copy all the encryption keys necessary for decrypting the communications of the Spanish embassy. Another break-in at the embassy took place in June 1986, when it was again possible to break into the encryption room and copy everything that the StB and KGB were interested in."

 

štvrtok 15. októbra 2020

Military Ciphers according to cpt. Frybort

Article about military ciphers by cpt. Bedřich Frýbort, in "Vojenský svět", 1937, 11 and 12, vol. V. I. part, pp. 438-9, II.part: pp. 479-80, Title of the article in czech: "Šifrování":




etc...

Content of the article is probably about basic cipher systems used in military exercises in Czechoslovakia.

Member of the group C of cipher solutionists at Czechoslovak HQ of the Ministry of Defence headed by lieutenant colonel Josef RŮŽEK, in czech:"člen šifrové skupiny C HV MNO", according to Porubský, Š.: Application and Misapplication of the Czechoslovak STP cipher during WWII (report on an unpublished manuscript). In: Tatra Mountains Mathematical Publications, vol. 70, no. 3, p.47


streda 14. októbra 2020

Miracle over miracles

Title of the article: "Miracle over Miracles", which was published on 15.04.1939, writes about kryptograph by certain danish inventor named Helgermhansen:


Google translate of the article:

Miracle over miracles ...

Copenhagen, Friday. (Stefani.) A young Danish named Helgermhansen invented a machine called a cryptograph, with which one can find the key to each secret cipher. The Danish Ministry of War is studying the machine. The sale of a patent abroad was prohibited.

utorok 13. októbra 2020

Časový tunel do minulosti - kryptografia a inkvizícia

 Program Čs. rozhlasu v Bratislave na 5.12.1932:

Obidve témy, ktoré ma obzvlášť zaujímajú: kryptografie, prednáška prof. Evžena Římana, ktorý napísal prvú brožúrku na toto téma:

a ďalej inkvizičné procesy s kacírmi v stredoveku, prednáška univ. prof. dr. Vratislava Buška, právnika, znalca cirkevného práva a bývalého rektora Univerzity Komenského v Bratislave( v rokoch 1936–1937).

Program:



Uvedené:


Nech sa vám pekne počúva:)

pondelok 5. októbra 2020

Challenge Grille cipher / Flamm's Kryptograph

Flamm's Kryptograph, patented in USA, 1875.

A newspaper article published in the past covers an encrypted message written by the anonymous reader with pseudonym Tekew:

NVRDIEMHNEAT

IRVOAEINFYIU

BRNTTTEHSEUA

FHSEREPEFDRF

OORRMOSVTOHO

EIDFNOTSHTUH

RETRTEEEAMLE

EUGGSTSRIELA

TARIEGTEAMRY

OBSFOUCTTOHT

EMTRPHCOLIIE

XPSIHRTEIEYN




In Slovak:

Odkaz na šifrovanie pomocou Flammovho Kryptografu v slovenčine, Obzor, 1875, s.217-8:

 



Rozlúštenie tejto šifrovanej správy je nasledovné, vďaka čitateľovi s pseudonymom Narga na blogu Klausa Schmeha:

 I HAVE FURTHER PROVED THE UTILITY OF THIS INVENTION IN THE FORM OF THE TELEGRAM BUT TO RENDER IT SAFE FOR SHORT MESSAGES OTHER CIPHER MAY BE USED TO INSURE A GREATER COMPLEXITY

Later on, i found that  the Plaintext of the turning grille cipher challenge was presented in the next answer from reader with initials H. E. A. to Tekew's describing:




(To be continued)