Cracking Enigma, a (Short) Summary of the Past

Total Page:16

File Type:pdf, Size:1020Kb

Cracking Enigma, a (Short) Summary of the Past Cracking Enigma, a (short) Summary of the past Jens Hubrich Technische Universitat¨ Kaiserslautern, Embedded Systems Group j [email protected] Abstract This paper is focused on the Enigma I or ‘Wehrmachtsenigma’. After a short introduction giving the relevance of ciphering, the historical background of Enigmas will be described. Following the his- torical background, the mechanics and functionality of the whole Enigma machine and its separated parts(Rotors, Reflector, Plugboard) is examined. Once the mechanics are clear, the usage by operators is explained and the theoretical cryptographic strength of enigma is calculated. This Part of the work ends with a overview of the Enigma versions important to German military during Word War Two. The second part of this work is related to ‘Cracking Enigma’, the protagonists and some of their methods used to break the encryption of Enigma. In first focus the work of Marian Rejewski, who revealed the internal wiring of the Enigma and then the one of Alan Turing which is probably the most famous person in this process with his ‘bomb’. In the end a short look at modern methods to break still unbroken messages with today technologies is given and in the conclusion it will be discussed which of the given Enigma problems are still relevant in nowadays cryptography. 1 Introduction Since early mankind keeping informations secret is one of the main keys in military and commercial structures. Since the exclusive knowledge is a big benefit. Of course it is the same way beneficial to gain such secret knowledge. After Edward Snowden leaked secret documents, which lead to the NSA-scandal in 2013, the topic of secure communication became a widely discussed topic in public domain again.[9] During the time of WWI (World War One, 1914-1918) ciphering secret messages was done primarily by manual en- and decoding. Therefore, cryptographically strong methods needed a lot of time and their handling was pretty difficult. For more information about WWI cryptography see [7] or [16]. Around the end of WWI multiple companies and inventors developed machines to reduce the effort of ciphering drastically. For example Edward H. Hebern in the USA [26], [25], [24] or Ingenieursbureau (engineering office) ‘Securitas’ from Amsterdam [27]. The probably most famous kind of those ciphering machines was ‘Enigma’, which is the Greek word for riddle. They are known for their key role as main en- and decryption tool of German military during WWII (Second World War 1939-1945). The next section will give a brief history about the Enigma, explain the mechanics behind it, list the different Models produced, and a assumption about its cryptographic strength. 2 2 Enigma The Enigma machines were a series of electro-mechanical rotor cipher machines invented by Arthur Scherbius. He and E. Richard Ritter founded a firm called ‘Scherbius Ritter’ and submitted a patent for a ‘Chiffrierapperat’ (German for: ciphering machine) at 23th Feb. 1918[22]. During the late days of WWI they tried to offer the idea to the German navy, which refused. As consequence they transferred the patent to ‘Gewerkschaft Securitas’. And as a next step they of- fered the machines as commercial product to companies, banks, and everyone else who could have an in- terest in secure communication.[15] Therefore the ‘Chiffriermaschinen-Aktiengesellschaft’ was founded at 9th July 1923 with Scherbius and Ritter as directors.[19] (Which also is a good recourse for further information about the commercial history) However, the interest of the German military awakened quickly after publications like Winston Churchills ‘The world Crisis’[4] showed clearly that the manual methods used during WWI were broken and no longer provide any acceptable security. After a short test period of two years military decided to use the Enigma for secure communication in 1928 and the civil sale of the machines was stopped. Just one year later, in 1929, Scherbius died in an accident, short before the Enigma mass production was started. And in 1934 Rudolf Heimsoeth and Elsbeth Rinke took over the ”Chiffriermaschinen- Aktiengesellschaft” and went on to produce and develop the Enigma machines in their new firm ‘H&R’. As mentioned in section 1 the Enigma became the main en- and decryption tool of German military during WWII and was a huge advantage over other military forces, but when it was broken, it turned into the biggest drawback. This work will focus on the Enigma I or ‘Wehrmachts’ Enigma, since it was the most commonly used model during WWII and includes all concepts other models were based on. The following subsection will explain the mechanical principles which were used in Enigma machines. 2.1 Mechanics The Enigma were typewriter similar, electro-mechanical, rotor based cipher machines. The base parts were a keyboard (German: ‘Tastenfeld’), a set of rotors (German: ‘Walzen’), and a output in form of a lampboard (German: ‘Lampenbrett’). The Figure 1, taken from the original Patent of Scherbius [22, p. 4], shows the basic idea behind the ciphering machine Enigma (and all other rotor based ciphering machines). By pressing a key (a. f) current is passed to the connector (1) which lead it trough the rotors (2a,2b). The first rotor permute the input letter and hand the permutation to the next rotor were another permutation is applied. The connector (3) lead the result finally to the lampboard (A . F). At this point encryption would be done by just a simple static permutation of the signs. To Change that, the rotors rotate after each keystroke, so similar following signs are exchanged by different signs. E. g. : Input AAA, output: RGT. In the first version the rotation was established by separate gears and could be set with external handles. 2.1.1 Rotors: ‘Walzen’ The rotors are the main part of any rotor based cipher machine. At the first models, as mentioned in subsection 2.1, the rotors were permutations only and rotated by additional gears. The military versions 3 (a) encryption (b) decryption Figure 1: Schematic of the ciphering machine. It shows a Keyboard (a . f), Lampboard (A . F), two rotors (2a,2b), Connectors (1,3) and a switch to change between en and decoding (4) Source: Patent [22, p. 4] had the rotation mechanics, integrated in each single rotor. During German army used five different rotors, the naval had a additional one and even increased the number to eight during the war. Those rotors were labelled by Greek numbers I-V for Army and VI-VIII for the additional naval ones. The main part of each rotor are the criss-cross connections between the contacts on both sides which are visible in Figure 2. This connections are the base permutations of each rotor. Figure 2b shows the notch (besides letter D), which is used to rotate the next rotor once per full rotation of this one, later versions of rotors had two notches. The turnovers, which were inducted by the notches, were different for most rotors as shown in Table 1, taken from [2, p. 113]. Rotor Turnover at I R II F III W IV K V A VI, VII and VIII A and N Table 1: Turnover positions of the German military rotors as listed in [2, p. 113] The letters written on the ring are used to define the starting orientation of each rotor by the operator. To increase the security in later development, a co-worker named Bernstein made the ring adjustable so the rotor position could be changed relative to the ring letters.[14] The ‘Wehrmachts’ Enigma could fit 3 rotors, the naval version was able to fit a fourth non rotating 4 (a) right side of a rotor (b) left side of a rotor Figure 2: Rotors of Enigma Model ‘Wehrmacht’. Source: https://commons.wikimedia.org/wiki/File:Enigma_rotors_and_spindle_showing_contacts_rachet_and_notch.jpg , 12:23 23.07-2018 In (a): Contacts per letter, dark gear to turn the rotor, and metal blade to set the orientation by operator. In (b): Contacts per letter, (letter) ring, and notch (at D) which turns the next rotator additional rotor of 2 versions labelled with a or g. 2.1.2 Reflector: ‘Umkehrwalze’ In 1926 a Patent [23] handed in by the ‘Chiffriermaschinen-Aktiengesellschaft’ was describing a Enigma Model which didn’t need a switch to change the wiring between en- and deciphering, as it was shown in Figure 1. The base idea behind it was introduced by Willi Korn, another Employee of ‘Chiffriermaschinen- Aktiengesellschaft’. A reflector drum (German: ‘Umkehrwalze’) Figure 3b, was placed after the last, most left, rotor. It’s internal wiring feed the output of the rotors back into themselves as schematically shown in Figure 3a. (a) Schematics of 3 rotor (1,2,3) Enigma, with reflector (4) (b) Picture of where (5) is the entry connector. Original Reflector Figure 3: Reflector, ‘Umkehrwalze’ Sources: (a): Taken from Patent [23, p. 5] / (b): https://commons.wikimedia.org/wiki/File:EnigmaReflector.jpg, 7:30 24.07.2018 The expected benefits of the reflector were a more easy handling of the machines, since it was not possible anymore to use a wrong mode (en- or decrypt) by mistake and a increase of the security by using each rotor twice.[23, p. 1] 5 During the first benefit is obvious true, the second one will be later known as one of the biggest drawbacks of the military Enigmas: Due to the electrical circuit issued by the reflector it became impos- sible to encrypt a letter with itself, since it would cause a short circuit. This made the whole system self reciprocal. There were three different reflectors labelled with A,B, and C. But usually they did not get changed in years.
Recommended publications
  • To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (1939­1945).
    [Show full text]
  • Breaking the Enigma Cipher
    Marian Rejewski An Application of the Theory of Permutations in Breaking the Enigma Cipher Applicaciones Mathematicae. 16, No. 4, Warsaw 1980. Received on 13.5.1977 Introduction. Cryptology, i.e., the science on ciphers, has applied since the very beginning some mathematical methods, mainly the elements of probability theory and statistics. Mechanical and electromechanical ciphering devices, introduced to practice in the twenties of our century, broadened considerably the field of applications of mathematics in cryptology. This is particularly true for the theory of permutations, known since over a hundred years(1), called formerly the theory of substitutions. Its application by Polish cryptologists enabled, in turn of years 1932–33, to break the German Enigma cipher, which subsequently exerted a considerable influence on the course of the 1939–1945 war operation upon the European and African as well as the Far East war theatres (see [1]–[4]). The present paper is intended to show, necessarily in great brevity and simplification, some aspects of the Enigma cipher breaking, those in particular which used the theory of permutations. This paper, being not a systematic outline of the process of breaking the Enigma cipher, presents however its important part. It should be mentioned that the present paper is the first publication on the mathematical background of the Enigma cipher breaking. There exist, however, several reports related to this topic by the same author: one – written in 1942 – can be found in the General Wladyslaw Sikorski Historical Institute in London, and the other – written in 1967 – is deposited in the Military Historical Institute in Warsaw.
    [Show full text]
  • Georgetown University in Partial Fulfillment of the Requirements for the Degree of Master of Arts in Security Studies
    THE BATTLE FOR INTELLIGENCE: HOW A NEW UNDERSTANDING OF INTELLIGENCE ILLUMINATES VICTORY AND DEFEAT IN WORLD WAR II A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Master of Arts in Security Studies By Edward J. Piotrowicz III, B.A. Washington, DC April 15, 2011 Copyright 2011 by Edward J. Piotrowicz III All Rights Reserved ii THE BATTLE FOR INTELLIGENCE: HOW A NEW UNDERSTANDING OF INTELLIGENCE ILLUMINATES VICTORY AND DEFEAT IN WORLD WAR II Edward J. Piotrowicz III, B.A. Thesis Advisor: Jennifer E. Sims, PhD. ABSTRACT Does intelligence make a difference in war? Two World War II battles provide testing grounds for answering this question. Allied intelligence predicted enemy attacks at both Midway and Crete with uncanny accuracy, but the first battle ended in an Allied victory, while the second finished with crushing defeat. A new theory of intelligence called “Decision Advantage,”a illuminates how the success of intelligence helped facilitate victory at Midway and how its dysfunction contributed to the defeat at Crete. This view stands in contrast to that of some military and intelligence scholars who argue that intelligence has little impact on battle. This paper uses the battles of Midway and Crete to test the power of Sims‟s theory of intelligence. By the theory‟s standards, intelligence in the case of victory outperformed intelligence in the case of defeat, suggesting these cases uphold the explanatory power of the theory. Further research, however, could enhance the theory‟s prescriptive power.
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • Stdin (Ditroff)
    Notes to accompany four Alan Turing videos 1. General The recent (mid-November 2014) release of The Imitation Game movie has caused the com- prehensive Alan Hodges biography of Turing to be reprinted in a new edition [1]. This biog- raphy was the basis of the screenplay for the movie. A more recent biography, by Jack Copeland [2], containing some new items of information, appeared in 2012. A more techni- cal work [3], also by Jack Copeland but with contributed chapters from other people, appeared in 2004. 2. The Princeton Years 1936–38. Alan Turing spent the years from 1936–38 at Princeton University studying mathematical logic with Prof. Alonzo Church. During that time Church persuaded Turing to extend the Turing Machine ideas in the 1936 paper and to write the results up as a Princeton PhD. You can now obtaing a copy of that thesis very easily [4] and this published volume contains extra chapters by Andrew Appel and Solomon Feferman, setting Turing’s work in context. (Andrew Appel is currently Chair of the Computer Science Dept. at Princeton) 3. Cryptography and Bletchley park There are many texts available on cryptography in general and Bletchley Park in particu- lar. A good introductory text for the entire subject is “The Code Book” by Simon Singh [5] 3.1. Turing’s Enigma Problem There are now a large number of books about the deciphering of Enigma codes, both in Hut 6 and Hut 8. A general overview is given by “Station X” by Michael Smith [6] while a more detailed treatment, with several useful appendices, can be found in the book by Hugh Sebag-Montefiore [7].
    [Show full text]
  • The Imagination Game Storia E Fantasia in the Imitation Game
    The Imagination Game storia e fantasia in The Imitation Game Cap. 2: Bletchley Park e Ultra Giovanni A. Cignoni – Progetto HMR 1/28 Bletchley Park e Ultra • Un’organizzazione poderosa • Bletchley Park • I luoghi, le strutture, le procedure • I meccanismi e gli appoggi • Il personale, le (tante) donne di BP • Ultra • Cos’era, come era nascosto • L’impatto sul conflitto, episodi e numeri Giovanni A. Cignoni – Progetto HMR 2/28 A lezione dai Polacchi • 1919, Biuro Szyfrów • Militari, Kowalewski, e matematici, Mazurkiewicz, Sierpiński, Leśniewski • Nel 1938 il 75% dei messaggi tedeschi intercettati era decifrato (Rejewski, Zygalski, Różycki) • Dopo il ’39 PC Bruno, Cadix, Boxmoor • In Inghilterra • Room40 (1914), GC&CS (1919), BP (1938) • Parigi (gennaio ’39), con Francesi e Polacchi • Pyry vicino Varsavia (luglio ’39) Giovanni A. Cignoni – Progetto HMR 3/28 Un posto strategico Bletchley Park - Gayhurst - Wavendon - Stanmore - Eastcote - Adstock Cambridge Banbury Letchworth Oxford London Giovanni A. Cignoni – Progetto HMR 4/28 Bletchley Park, 1942ca Giovanni A. Cignoni – Progetto HMR 5/28 Nel film, ci somiglia... Giovanni A. Cignoni – Progetto HMR 6/28 … ma non è Giovanni A. Cignoni – Progetto HMR 7/28 Il nume tutelare • 1941.10.21: Action this day! • In un momento di successo • Dopo una visita di Churchill • Le Bombe ci sono, mancano persone • Garanzie per i tecnici BTM • Personale per la catena • Intercettazione in grande • Risorse per una pesca industriale • Un po’ come “Echelon” Giovanni A. Cignoni – Progetto HMR 8/28 Il personale • Una grande industria • Da 9000 a 10000 persone, centinaia di macchine • Piuttosto stabile, circa 12000 nomi • Escluso l’indotto, fornitori e logistica • Reclutamento • Inizialmente diretto, da persona a persona • Poi attraverso controlli e selezioni metodiche • Soprattutto nell’ambito delle leve militari • Ma con un occhio anche ai civili Giovanni A.
    [Show full text]
  • Polska Myśl Techniczna W Ii Wojnie Światowej
    CENTRALNA BIBLIOTEKA WOJSKOWA IM. MARSZAŁKA JÓZEFA PIŁSUDSKIEGO POLSKA MYŚL TECHNICZNA W II WOJNIE ŚWIATOWEJ W 70. ROCZNICĘ ZAKOŃCZENIA DZIAŁAŃ WOJENNYCH W EUROPIE MATERIAŁY POKONFERENCYJNE poD REDAkcJą NAUkoWą DR. JANA TARCZYńSkiEGO WARSZAWA 2015 Konferencja naukowa Polska myśl techniczna w II wojnie światowej. W 70. rocznicę zakończenia działań wojennych w Europie Komitet naukowy: inż. Krzysztof Barbarski – Prezes Instytutu Polskiego i Muzeum im. gen. Sikorskiego w Londynie dr inż. Leszek Bogdan – Dyrektor Wojskowego Instytutu Techniki Inżynieryjnej im. profesora Józefa Kosackiego mgr inż. Piotr Dudek – Prezes Stowarzyszenia Techników Polskich w Wielkiej Brytanii gen. dyw. prof. dr hab. inż. Zygmunt Mierczyk – Rektor-Komendant Wojskowej Akademii Technicznej im. Jarosława Dąbrowskiego płk mgr inż. Marek Malawski – Szef Inspektoratu Implementacji Innowacyjnych Technologii Obronnych Ministerstwa Obrony Narodowej mgr inż. Ewa Mańkiewicz-Cudny – Prezes Federacji Stowarzyszeń Naukowo-Technicznych – Naczelnej Organizacji Technicznej prof. dr hab. Bolesław Orłowski – Honorowy Członek – założyciel Polskiego Towarzystwa Historii Techniki – Instytut Historii Nauki Polskiej Akademii Nauk kmdr prof. dr hab. Tomasz Szubrycht – Rektor-Komendant Akademii Marynarki Wojennej im. Bohaterów Westerplatte dr Jan Tarczyński – Dyrektor Centralnej Biblioteki Wojskowej im. Marszałka Józefa Piłsudskiego prof. dr hab. Leszek Zasztowt – Dyrektor Instytutu Historii Nauki Polskiej Akademii Nauk dr Czesław Andrzej Żak – Dyrektor Centralnego Archiwum Wojskowego im.
    [Show full text]
  • Historical Ciphers • A
    ECE 646 - Lecture 6 Required Reading • W. Stallings, Cryptography and Network Security, Chapter 2, Classical Encryption Techniques Historical Ciphers • A. Menezes et al., Handbook of Applied Cryptography, Chapter 7.3 Classical ciphers and historical development Why (not) to study historical ciphers? Secret Writing AGAINST FOR Steganography Cryptography (hidden messages) (encrypted messages) Not similar to Basic components became modern ciphers a part of modern ciphers Under special circumstances modern ciphers can be Substitution Transposition Long abandoned Ciphers reduced to historical ciphers Transformations (change the order Influence on world events of letters) Codes Substitution The only ciphers you Ciphers can break! (replace words) (replace letters) Selected world events affected by cryptology Mary, Queen of Scots 1586 - trial of Mary Queen of Scots - substitution cipher • Scottish Queen, a cousin of Elisabeth I of England • Forced to flee Scotland by uprising against 1917 - Zimmermann telegram, America enters World War I her and her husband • Treated as a candidate to the throne of England by many British Catholics unhappy about 1939-1945 Battle of England, Battle of Atlantic, D-day - a reign of Elisabeth I, a Protestant ENIGMA machine cipher • Imprisoned by Elisabeth for 19 years • Involved in several plots to assassinate Elisabeth 1944 – world’s first computer, Colossus - • Put on trial for treason by a court of about German Lorenz machine cipher 40 noblemen, including Catholics, after being implicated in the Babington Plot by her own 1950s – operation Venona – breaking ciphers of soviet spies letters sent from prison to her co-conspirators stealing secrets of the U.S. atomic bomb in the encrypted form – one-time pad 1 Mary, Queen of Scots – cont.
    [Show full text]
  • Polish Mathematicians Finding Patterns in Enigma Messages
    Fall 2006 Chris Christensen MAT/CSC 483 Machine Ciphers Polyalphabetic ciphers are good ways to destroy the usefulness of frequency analysis. Implementation can be a problem, however. The key to a polyalphabetic cipher specifies the order of the ciphers that will be used during encryption. Ideally there would be as many ciphers as there are letters in the plaintext message and the ordering of the ciphers would be random – an one-time pad. More commonly, some rotation among a small number of ciphers is prescribed. But, rotating among a small number of ciphers leads to a period, which a cryptanalyst can exploit. Rotating among a “large” number of ciphers might work, but that is hard to do by hand – there is a high probability of encryption errors. Maybe, a machine. During World War II, all the Allied and Axis countries used machine ciphers. The United States had SIGABA, Britain had TypeX, Japan had “Purple,” and Germany (and Italy) had Enigma. SIGABA http://en.wikipedia.org/wiki/SIGABA 1 A TypeX machine at Bletchley Park. 2 From the 1920s until the 1970s, cryptology was dominated by machine ciphers. What the machine ciphers typically did was provide a mechanical way to rotate among a large number of ciphers. The rotation was not random, but the large number of ciphers that were available could prevent depth from occurring within messages and (if the machines were used properly) among messages. We will examine Enigma, which was broken by Polish mathematicians in the 1930s and by the British during World War II. The Japanese Purple machine, which was used to transmit diplomatic messages, was broken by William Friedman’s cryptanalysts.
    [Show full text]
  • Idle Motion's That Is All You Need to Know Education Pack
    Idle Motion’s That is All You Need to Know Education Pack Idle Motion create highly visual theatre that places human stories at the heart of their work. Integrating creative and playful stagecraft with innovative video projection and beautiful physicality, their productions are humorous, evocative and sensitive pieces of theatre which leave a lasting impression on their audiences. From small beginnings, having met at school, they have grown rapidly as a company over the last six years, producing five shows that have toured extensively both nationally and internationally to critical acclaim. Collaborative relationships are at the centre of all that they do and they are proud to be an Associate Company of the New Diorama Theatre and the Oxford Playhouse. Idle Motion are a young company with big ideas and a huge passion for creating exciting, beautiful new work. That is All You Need to Know ‘That Is All You Need To Know’ is Idle Motion’s fifth show. We initially wanted to make a show based on the life of Alan Turing after we were told about him whilst researching chaos theory for our previous show ‘The Seagull Effect’. However once we started to research the incredible work he did during the Second World War at Bletchley Park and visited the site itself we soon realised that Bletchley Park was full of astounding stories and people. What stood out for us as most remarkable was that the thousands of people who worked there kept it all a secret throughout the war and for most of their lives. This was a story we wanted to tell.
    [Show full text]
  • The the Enigma Enigma Machinemachine
    TheThe EnigmaEnigma MachineMachine History of Computing December 6, 2006 Mike Koss Invention of Enigma ! Invented by Arthur Scherbius, 1918 ! Adopted by German Navy, 1926 ! Modified military version, 1930 ! Two Additional rotors added, 1938 How Enigma Works Scrambling Letters ! Each letter on the keyboard is connected to a lamp letter that depends on the wiring and position of the rotors in the machine. ! Right rotor turns before each letter. How to Use an Enigma ! Daily Setup – Secret settings distributed in code books. ! Encoding/Decoding a Message Setup: Select (3) Rotors ! We’ll use I-II-III Setup: Rotor Ring Settings ! We’ll use A-A-A (or 1-1-1). Rotor Construction Setup: Plugboard Settings ! We won’t use any for our example (6 to 10 plugs were typical). Setup: Initial Rotor Position ! We’ll use “M-I-T” (or 13-9-20). Encoding: Pick a “Message Key” ! Select a 3-letter key (or indicator) “at random” (left to the operator) for this message only. ! Say, I choose “M-C-K” (or 13-3-11 if wheels are printed with numbers rather than letters). Encoding: Transmit the Indicator ! Germans would transmit the indicator by encoding it using the initial (daily) rotor position…and they sent it TWICE to make sure it was received properly. ! E.g., I would begin my message with “MCK MCK”. ! Encoded with the daily setting, this becomes: “NWD SHE”. Encoding: Reset Rotors ! Now set our rotors do our chosen message key “M-C-K” (13-3-11). ! Type body of message: “ENIGMA REVEALED” encodes to “QMJIDO MZWZJFJR”.
    [Show full text]
  • Timeline of Computer History
    Timeline of Computer History By Year By Category Search AI & Robotics (55) Computers (145)(145) Graphics & Games (48) Memory & Storage (61) Networking & The Popular Culture (50) Software & Languages (60) Bell Laboratories scientist 1937 George Stibitz uses relays for a Hewlett-Packard is founded demonstration adder 1939 Hewlett and Packard in their garage workshop “Model K” Adder David Packard and Bill Hewlett found their company in a Alto, California garage. Their first product, the HP 200A A Called the “Model K” Adder because he built it on his Oscillator, rapidly became a popular piece of test equipm “Kitchen” table, this simple demonstration circuit provides for engineers. Walt Disney Pictures ordered eight of the 2 proof of concept for applying Boolean logic to the design of model to test recording equipment and speaker systems computers, resulting in construction of the relay-based Model the 12 specially equipped theatres that showed the movie I Complex Calculator in 1939. That same year in Germany, “Fantasia” in 1940. engineer Konrad Zuse built his Z2 computer, also using telephone company relays. The Complex Number Calculat 1940 Konrad Zuse finishes the Z3 (CNC) is completed Computer 1941 The Zuse Z3 Computer The Z3, an early computer built by German engineer Konrad Zuse working in complete isolation from developments elsewhere, uses 2,300 relays, performs floating point binary arithmetic, and has a 22-bit word length. The Z3 was used for aerodynamic calculations but was destroyed in a bombing raid on Berlin in late 1943. Zuse later supervised a reconstruction of the Z3 in the 1960s, which is currently on Operator at Complex Number Calculator (CNC) display at the Deutsches Museum in Munich.
    [Show full text]