Skip to main content
Article
Cryptanalysis of Typex
Cryptologia (2014)
  • Kelly Change
  • Richard M. Low, San Jose State University
  • Mark Stamp, San Jose State University
Abstract

Rotor cipher machines played a large role in World War II: Germany used Enigma; America created Sigaba; Britain developed Typex. The breaking of Enigma by Polish and (later) British cryptanalysts had an enormous impact on the war. However, despite being based on the commercial version of the Enigma, there is no documented successful attack on Typex during its time in service. This article covers the Typex machine. Researchers consider the development of Typex, discuss how Typex works, and present and analyze two cryptanalytic attacks on the cipher. The first attack assumes the rotor wirings are known and uses Turing's crib attack—originally developed for Enigma—to recover the settings of the stepping rotors. The second attack assumes that the rotor wirings are unknown. This ciphertext-only attack uses a hill-climb to determine the wirings of the stepping rotors. Finally, researchers briefly consider an attack developed by Polish cryptanalysts to recover the Enigma rotor wirings, and they argue that Typex was significantly more resistant to this particular attack.

Keywords
  • cryptanalysis,
  • Enigma,
  • hill climb,
  • rotor machine,
  • typex
Publication Date
2014
Publisher Statement
SJSU users: use the following link to login and access the article via SJSU databases
Citation Information
Kelly Change, Richard M. Low and Mark Stamp. "Cryptanalysis of Typex" Cryptologia Vol. 38 Iss. 2 (2014)
Available at: http://works.bepress.com/mark_stamp/15/