Leiberich started his career during World War II, conscripted as a soldier and working as a cryptanalyst in Chi IV of the OKW/Chi.[4]
After studying mathematics and physics at the University of Cologne, Leiberich earned a Dr. phil. in 1953 at the same university[5] with a topic on algebra; his thesis (German: "Über Systeme von Jardenschen Folgen", On systems of Jarden sequences) was supervised by Guido Hoheisel. Leiberich joined the newly established post war German cipher bureau that from 1956 on was called the Central Cryptography Office[3] (German: Zentralstelle für das Chiffrierwesen (ZfCh)). Dr Erich Hüttenhain was his director, both in OKW/Chi and in the new bureau.
Career
During the Cold War Leiberich and his team worked intensively on the cryptanalysis of double transposition ciphers. One of their results led in 1974 to the discovery of the spying activities of Günter Guillaume who was senior aide to Willy Brandt, the statesman who served as Chancellor of the Federal Republic of Germany (West Germany) from 1969 to 1974.[6] In 1972, Leiberich was the successor to Erich Hüttenhain as the Head of the Central Cryptography Office.[7]
In 1999, Leiberich wrote a report on the history of cryptography in Germany, which appeared in Spektrum der Wissenschaft,[8] the German edition of the Scientific American.
Cipher challenge
In order to encourage research on the double transposition cipher, Leiberich suggested during his retirement in 1999, that a double transposition challenge be published. Leiberich's recommendation for the challenge included:
Both transposition keys should be long enough: 20 to 25 elements.
The lengths of the ciphertext should not be a multiple of the length of either key.
A ciphertext of approximately 500 characters, i.e. the product of the lengths of the two keys, should be used.
These properties were based on Leiberich's own experience, designed with parameters to ensure its own security[7] In 2007, the challenge was published by Klaus Schmeh,[7] in various media channels including his own books, websites and academic and white papers.[7]
^ abHange, Michael (15 December 2015), "Obituary for Dr Otto Leiberich"(PDF), Security in Focus – BSI Magazine 2015, 2015, Bundesamt für Sicherheit in der Informationstechnik: 42–43 [22], retrieved 22 January 2019
^Leiberich, Otto (1 June 1999). "Vom diplomatischen Code zur Falltürfunktion". Spektrum der Wissenschaft (in German). Spektrum der Wissenschaft Verlagsgesellschaft mbH. Retrieved 13 June 2018.
^Lasry, George; Kopal, Nils; Wacker, Arno (2014). "Solving the Double Transposition Challenge with a Divide-and-Conquer Approach". Cryptologia. 38 (3). Taylor & Francis: 197–214. doi:10.1080/01611194.2014.915269. S2CID7946904.