• BilSabab@lemmy.world
    link
    fedilink
    arrow-up
    19
    ·
    1 day ago

    15 or so years ago our local historical library had a code breaking challenge - it had all sorts of classic ciphers including that the polyalphabetic substitution one similar to Enigma’s. And the texts themselves were mostly your mama jokes in Yoda speak (because the librarians are assholes) and I can’t describe the deflating feeling of spending a good couple of hours or so to decrypt YO MAMA SO FAT.

  • Eufalconimorph@discuss.tchncs.de
    link
    fedilink
    arrow-up
    55
    ·
    2 days ago

    Except that the signoff with the same phrase every time was made up to dramatize the movie. They did often have predictable messages, like including the time & a weather report, which allowed crib dragging to work by guessing which of a few possibilities had been transmitted.

  • RememberTheApollo_@lemmy.world
    link
    fedilink
    arrow-up
    7
    ·
    edit-2
    1 day ago

    The HH at the end didn’t necessarily help crack the code, it was a trick that could be tried once in a while to see if the radio agent on the other end had been compromised. “Heil Hitler” was such an automatic response for German radio operators that they would sometimes automatically “HH” if one was sent to them and they were faking being an allied agent.

    Regarding WW2 and cryptography, I Highly recommend Between Silk and Cyanide by Leo Marks. Well written, easy read, dry British humor, and a real view into the British cryptography development, deployment of agents behind enemy lines, and the price that was paid. Can’t recommend it enough.

  • teslasaur@lemmy.world
    link
    fedilink
    arrow-up
    117
    ·
    2 days ago

    When i first heard of this praxis, i though that “wow, how stupid must they be to not make a rule about signing off with the same phrase”.

    In reality this was probably part of some poor engineers recommended instruction, which was promptly ignored because of pavlovian conditioning. Or ignorance by those in charge of making the messages.

    Can’t teach stupid.

    • zaphod@sopuli.xyz
      link
      fedilink
      arrow-up
      59
      ·
      2 days ago

      Oh it was, AFAIK they were supposed to switch some settings regularly, but didn’t, so they used the same keys way more often than they were supposed.

  • DagwoodIII@piefed.social
    link
    fedilink
    English
    arrow-up
    75
    ·
    2 days ago

    Similar story.

    The US Air Force designs the SR-71 Blackbird to be the ultimate spy plane. It’s meant to be undetectable and untraceable.

    Some general demands they paint USAF in big letters on the side.

    • Jesus_666@lemmy.world
      link
      fedilink
      arrow-up
      62
      ·
      2 days ago

      The SR-71 wasn’t all that stealthy. Its main defense was that it moved too high for flak and too fast for SAMs. It was retired when interception capabilities improved to match it.

      • AngryCommieKender@lemmy.world
        link
        fedilink
        arrow-up
        25
        ·
        edit-2
        2 days ago

        It was at least partially retired because some Asshat General decided that since the USAF has multi role attack airframes, that we didn’t need recon aircraft anymore. As far as I can tell the only viable threat to the planes were SAAB Viggens.

        I’m not salty. You’re salty.

          • lurch (he/him)@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            7
            ·
            2 days ago

            the problem with sattelites is that they have to be on a predictable course. any opponent able to reach space can destroy them. the communication to remotely piloted aircraft can also be jammed as part of an attack. it’s why they could use an astro-inertial navigation system on the SR-71 that could not be jammed and would allow the pilot to sway from the planned course, but also go back on course. i can’t believe they retired it. it closed a gap.

    • BenLeMan@lemmy.world
      link
      fedilink
      arrow-up
      12
      ·
      2 days ago

      Hm, I like the story of the U-2 better, in which Kelly Johnson, the plane’s designer, tells the CIA the Soviets won’t be able to shoot it down BUT that they are massively ramping up their capabilities and will have caught up by 1960. The plane was eventually shot down on May 1, 1960 to the great embarrassment of president Eisenhower.

      Happy May Day, Mr. Krushchev!

    • _stranger_@lemmy.world
      link
      fedilink
      arrow-up
      23
      ·
      edit-2
      2 days ago

      That was on purpose, They knew it wouldn’t matter, it was never shot down. It’s like they built the Titanic in the 80’s and decided to name it “200% more unsinkable”. Pure hubris

  • Grandwolf319@sh.itjust.works
    link
    fedilink
    arrow-up
    34
    ·
    2 days ago

    Even without the sign off, from what I remember from the movie (so take it with a grain of salt), they reported the time and weather every morning. That’s formulaic enough to make it a little easier too.

    • BenLeMan@lemmy.world
      link
      fedilink
      arrow-up
      12
      ·
      2 days ago

      Yeah, isn’t the thing about the sign-off a dramatization? They sure did repeat certain words like OKW and BdU, as well as sending uniform weather reports and changing their settings too infrequently. But that bit sounds fabricated.

      • ricecake@sh.itjust.works
        link
        fedilink
        arrow-up
        12
        ·
        2 days ago

        Exaggerated, but not fabricated. There were common sign offs, and messages like “nothing to report” that were seen often. Another example is an officer who started every message with the same long formal greeting when messaging their commander. The most common was messages starting with "to " (in German and written for transmission, so “ANX” was the actual plaintext).

    • OmegaMan
      link
      fedilink
      arrow-up
      14
      ·
      2 days ago

      The timing of that weather report was also crucial, as the code changed daily. Getting that report in the morning allowed them to crack the code, and then use that to decode messages for the rest of the day.

  • nomadjoanne@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    1 day ago

    Nah. Known plaintext wouldn’t help cracking a good encryption scheme. Enigma was not a great encryption scheme. It had a few fatal flaws.

      • Honytawk@feddit.nl
        link
        fedilink
        arrow-up
        1
        ·
        2 days ago

        You mean the group that supposedly had the “superior people” and the “superior army”, yet couldn’t win the single war they started, aren’t massive morons?

        They are history biggest losers at least.

    • ricecake@sh.itjust.works
      link
      fedilink
      arrow-up
      42
      ·
      2 days ago

      It’s slightly “way more complicated”. They occasionally forgot to update the key settings between messages, resent identical messages with different keys or encryption systems, or just chose easy to guess keys.

      There was also a defect in enigma where no letters could be encoded as themselves. This meant that you could use knowledge of what was likely in a message at a certain location to rule out keys, since any letters in common disqualified the guess.

    • cynar@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      ·
      2 days ago

      I believe that was Lorenz, not enigma. The higher level code. Basically Hitler and his generals only.

      An operator missed a letter in a message. He then reset the machine and re-encrypted it. 2 almost identical messages like that were enough to figure out how the encryption operated. They didn’t see a physical Lorenz machine till after the war.

        • cynar@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 day ago

          The sheer pressure. It should be a crack too small to prise open. However, if you do, all of Hitler’s personal messages are up for the reading.

  • slazer2au@lemmy.world
    link
    fedilink
    English
    arrow-up
    35
    ·
    2 days ago

    And that is why you make sure your encryption algorithm allows for a letter to be one itself after encryption.