At the hacker conference 44CON 2019, wich took place in September in London, I gave a talk about Cold War cryptography. Here’s a professionally produced video of it.

The 44CON, organized by Steve Lord and Marizel Fourie, is an annual hacker conference held at the IBIS Earl’s Court in London. It’s a great event, though I am usually among the oldest participants with my 49 years of age (at the NSA Symposium for Cryptologic History, which takes place next week, I am still one of the youngest).

 

44CON

In 2016, I handed in my first presentation proposal for 44CON. It was rejected. One year later, in 2017, I was more successful. In 2018, my submission was accepted again. At 44CON, all presentations are recorded on video and published on YouTube. You can find my two first 44CON talks here:

Schmeh

Schmeh

As it seems, my talks were received very well. So, when earlier this year I handed in a presentation for the 2019 edition of 44CON, it was accepted again. The topics I talk about at this hacker conference are not typical hacker topics, but apparently, the program committee is interested in them anyway.

 

My Cold War cryptography talk

My third 44CON talk, delivered on September 13, 2019, was about Cold War cryptography (again, not a typical hacker topic). To my surprise, a video of this talk is already available on YouTube. In the years before, the videos were published only a few months after the event. Thanks to Steve and Marizel for making my talk accessible so early this time. Here’s the video:

My talk had four chapters:

  • One-time pad encryption: The one time pad played an important role in the early Cold War. Among otger things, I mentioned the Reihenschieber.

Schmeh/BSI

  • Golden Triangle: The Golden Triangle of encryption technology is an area in northern Switzerland. It includes the towns of Zug, Regensdorf and Baden. As good as all commercially sold encryption machines of the early cold war I am aware of were produced in this region. This story is covered in my book Codeknacker gegen Codemacher.

Schmeh

Any questions, critics and suggestions about my presentation are welcome. I plan to hand in another talk for 44CON next year. Again, it will not be about a typical hacker topic, but about something historical. There’s always a lot of competition among the submitters, as the 44CON is a popular event. I hope my submission will be successful.


Further reading: More about the Arno Schmidt cryptograms

Linkedin: https://www.linkedin.com/groups/13501820
Facebook: https://www.facebook.com/groups/763282653806483/

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Kommentare (3)

  1. #1 George Lasry
    10. Oktober 2019

    Very nice presentation, and thank you for presenting my work. See you next week.
    George

  2. #2 Joe
    Berlin
    13. Oktober 2019

    Die Arbeitsgeschwindigkeit von DES auf einem PC mit einem Chiffriergerät das mit 50 bzw. 100 Bd arbeitet ist wie Äpfel mit Birnen zu vergleichen.

    Und es wird keine Aussage über die Sicherheit des Alpha Verfahrens gegen über des DES ausgesagt.

  3. #3 Joe
    Berlin
    13. Oktober 2019

    Hier ein korrekter Vergleich, den DU auch kennst:

    T-310: 240 Bit Schlüssel 13 * 217 Runden für 5bit 2fach Chiffrierung – Fernschreibzeichen

    DES: 56 bit Schlüssel 16 Runden für 8bit XOR Chiffrierung

    Nicht 12 sondern 13 bit werden für die Bildung der Additionsreihen erzeugt. Jedes Bit erfolgt nach 127 Runden des Algorithmus.
    —————————————————————–
    Die Darstellung der Doppel-Transposition ist so nie belegt worden. Deine Darstellung der Chiffrate zeigen Doppelungen die so nicht aufgetreten sind.
    “SKAJS” treten in allen 3 Beispielen auf.

    Die Termine entsprechen nicht der Wirklichkeit.
    Hier konkrete Termine:
    11. 6.56 1037/58 18. 6.56 8137/58 23. 7.56 1737/65 13. 8.56 1827/29 27. 8.56 7937/37 29.10.56 3758/37 03.11.56 9376/40 10.11.56 3487/58 17.11.56 5317/39 24.11.56 4937/41 1.12.56 3679/36 8.12.56 3725/46 15.12.56 3847/29 22.12.56 4937/17 5. 1.57 5370/32 12. 1.57 3478/33 19. 1.57 2317/56 26. 1.57 5397/54

    Die Termine sind nicht mit den Sprüchen identisch.
    Das Verfahren GRANIT würde über 1961 weiter verwendet.

    Links: https://scz.bplaced.net/des.html
    https://scz.blaced.net/t310.html
    https://scz.bplaced.net/kompromittierung.html#gg

    Du solltest es eigentlich besser wissen!