TY - GEN
T1 - On how turing and singleton arc consistency broke the enigma code
AU - Antuori, Valentin
AU - Portoleau, Tom
AU - Rivière, Louis
AU - Hebrard, Emmanuel
N1 - Publisher Copyright:
© Valentin Antuori, Tom Portoleau, Louis Rivière, and Emmanuel Hebrard.
PY - 2021/10/1
Y1 - 2021/10/1
N2 - In this paper, we highlight an intriguing connection between the cryptographic attacks on Enigma's code and local consistency reasoning in constraint programming. The coding challenge proposed to the students during the 2020 ACP summer school, to be solved by constraint programming, was to decipher a message encoded using the well known Enigma machine, with as only clue a tiny portion of the original message. A number of students quickly crafted a model, thus nicely showcasing CP technology - as well as their own brightness. The detail that is slightly less favorable to CP technology is that solving this model on modern hardware is challenging, whereas the "Bombe", an antique computing device, could solve it eighty years ago. We argue that from a constraint programming point of vue, the key aspects of the techniques designed by Polish and British cryptanalysts can be seen as, respectively, path consistency and singleton arc consistency on some constraint satisfaction problems.
AB - In this paper, we highlight an intriguing connection between the cryptographic attacks on Enigma's code and local consistency reasoning in constraint programming. The coding challenge proposed to the students during the 2020 ACP summer school, to be solved by constraint programming, was to decipher a message encoded using the well known Enigma machine, with as only clue a tiny portion of the original message. A number of students quickly crafted a model, thus nicely showcasing CP technology - as well as their own brightness. The detail that is slightly less favorable to CP technology is that solving this model on modern hardware is challenging, whereas the "Bombe", an antique computing device, could solve it eighty years ago. We argue that from a constraint programming point of vue, the key aspects of the techniques designed by Polish and British cryptanalysts can be seen as, respectively, path consistency and singleton arc consistency on some constraint satisfaction problems.
KW - Constraint Programming
KW - Cryptography
U2 - 10.4230/LIPIcs.CP.2021.13
DO - 10.4230/LIPIcs.CP.2021.13
M3 - Conference contribution
AN - SCOPUS:85118157399
T3 - Leibniz International Proceedings in Informatics, LIPIcs
BT - 27th International Conference on Principles and Practice of Constraint Programming, CP 2021
A2 - Michel, Laurent D.
PB - Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
T2 - 27th International Conference on Principles and Practice of Constraint Programming, CP 2021
Y2 - 25 October 2021 through 29 October 2021
ER -