On how turing and singleton arc consistency broke the enigma code

Valentin Antuori, Tom Portoleau, Louis Rivière, Emmanuel Hebrard

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we highlight an intriguing connection between the cryptographic attacks on Enigma's code and local consistency reasoning in constraint programming. The coding challenge proposed to the students during the 2020 ACP summer school, to be solved by constraint programming, was to decipher a message encoded using the well known Enigma machine, with as only clue a tiny portion of the original message. A number of students quickly crafted a model, thus nicely showcasing CP technology - as well as their own brightness. The detail that is slightly less favorable to CP technology is that solving this model on modern hardware is challenging, whereas the "Bombe", an antique computing device, could solve it eighty years ago. We argue that from a constraint programming point of vue, the key aspects of the techniques designed by Polish and British cryptanalysts can be seen as, respectively, path consistency and singleton arc consistency on some constraint satisfaction problems.

Original languageEnglish
Title of host publication27th International Conference on Principles and Practice of Constraint Programming, CP 2021
EditorsLaurent D. Michel
PublisherSchloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
ISBN (Electronic)9783959772112
DOIs
Publication statusPublished - 1 Oct 2021
Externally publishedYes
Event27th International Conference on Principles and Practice of Constraint Programming, CP 2021 - Virtual, Montpellier, France
Duration: 25 Oct 202129 Oct 2021

Publication series

NameLeibniz International Proceedings in Informatics, LIPIcs
Volume210
ISSN (Print)1868-8969

Conference

Conference27th International Conference on Principles and Practice of Constraint Programming, CP 2021
Country/TerritoryFrance
CityVirtual, Montpellier
Period25/10/2129/10/21

Keywords

  • Constraint Programming
  • Cryptography

Fingerprint

Dive into the research topics of 'On how turing and singleton arc consistency broke the enigma code'. Together they form a unique fingerprint.

Cite this