Team for Research in
Ubiquitous Secure Technology

SIGABA: cryptanalysis of the full keyspace
Mark Stamp, Wing On Chan

Citation
Mark Stamp, Wing On Chan. "SIGABA: cryptanalysis of the full keyspace". Cryptologia, 31(3):201-222, July 2007.

Abstract
In this paper we consider an attack on the SIGABA cipher under the assumption that the largest practical keyspace is used. The attack highlights various strengths and weaknesses of SIGABA and provides insight into the inherent level of security provided by the cipher.

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Mark Stamp, Wing On Chan. <a
    href="http://www.truststc.org/pubs/427.html"
    >SIGABA: cryptanalysis of the full keyspace</a>,
    <i>Cryptologia</i>, 31(3):201-222, July 2007.
  • Plain text
    Mark Stamp, Wing On Chan. "SIGABA: cryptanalysis of the
    full keyspace". <i>Cryptologia</i>,
    31(3):201-222, July 2007.
  • BibTeX
    @article{StampChan07_SIGABACryptanalysisOfFullKeyspace,
        author = {Mark Stamp and Wing On Chan},
        title = {SIGABA: cryptanalysis of the full keyspace},
        journal = {Cryptologia},
        volume = {31},
        number = {3},
        pages = {201-222},
        month = {July},
        year = {2007},
        abstract = {In this paper we consider an attack on the SIGABA
                  cipher under the assumption that the largest
                  practical keyspace is used. The attack highlights
                  various strengths and weaknesses of SIGABA and
                  provides insight into the inherent level of
                  security provided by the cipher. },
        URL = {http://www.truststc.org/pubs/427.html}
    }
    

Posted by Mark Stamp on 18 Aug 2008.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.