An Examination of the Components and Mathematics of the Enigma Electromechanical Rotor Ciphers

Total Page:16

File Type:pdf, Size:1020Kb

An Examination of the Components and Mathematics of the Enigma Electromechanical Rotor Ciphers Journal of Young Investigators RESEARCH ARTICLE An Examination of the Components and Mathematics of the Enigma Electromechanical Rotor Ciphers Kristi Short1 and Aharon Dagan2 This paper describes the mathematics of the Enigma electromechanical rotor ciphers used by Germany during WWII. The research is focused on the contributions made by the Polish Cipher Bureau and presents their incentives for breaking Enigma encryptions. German operational procedure is included to show how redundancy measures allowed frequency analysis to be enabled, easing Polish efforts. Also included are the calculations for the strength of encryption granted by each component. Research focuses on the three- rotor configuration of the Wehrmacht Enigma variant used by the German Army in 1932. Also presented are examinations of the mathematical solutions of Marian Rejewski in order to show the method of decoding as well as the significance of contributions from the Polish Cipher Bureau prior to the beginning of World War II. This paper shows why it is important to calculate the practical as well as theoretical encryption strength of a cipher method. Also, that it is important to eliminate redundancy methods whenever possible. INTRODUCTION The focus of this paper is the Polish contribution to breaking offered commercially (Mowry 2003. Axis power encryptions during World War II (WWII). The Only five years after WWI Winston Churchill released Polish had more incentive due to the geographical positioning “The World Crisis”, in which he disclosed that the Allies had than any other country and could not accept that the Enigma was routinely read German Naval messages sent during the war.This flawless. For this reason, research is limited to the Wehrmacht announcement took the Germans entirely by surprise, and Enigma machine used by the German Army starting from 1932 generated a rumor that Germany had not actually lost the and broken by the Polish. The invention of electromechanical war.The ’stab-in-the-back’legend stated that Germany had not cipher devices such as the Enigma machines allowed for the lost but had been betrayed by republicans and civilians who had creation of increasingly complex algorithms that would have overthrown the monarchy (Tucker and Roberts 2005).Shortly never been feasible with the pen and paper methods of classical after Churchill’s remarks, Rudolph Thilo-Schmidt, Chief of Staff cryptography. This report shows why the German World War II of the German Signal Corps, purchased over 30,000 Enigma military relyed on the Enigma cipher, as well as why this machines from ChiffriermaschinenAktien-Gesellschaft (Cipher confidence was undeserved. Machines Stock Corporation chaired by Scherbius and E. Included are details of the physical components of the Richard Ritter). Almost immediately, the English and French Enigma cryptosystem as well as the security imparted by each could no longer decrypt German communications. Germany’s component. An aalysis of Rejewski’s permutation notation of the main encryption method was now Enigma (Perry 2010). ciphers with respect to their components is also included. This Ironically, Rudolph Thilo-Schmidt’s brother, Hans Thilo- paper attempts to place the Enigma cipher mathematics in their Schmidt, sold codebooks to the French(Wilcox 2006).The French proper historical context in a brief, easy to understand format. made no progress even with the codebooks, and they passed them to the Polish(as per the Franco-Polish Warrant Agreement, History 1925). Polish involvement in World War Two The first break in the Enigma cipher came from The BiuroSzyfrow (Polish Cipher Bureau) in Warsaw. In 1932, three The German engineer Arthur Scherbius invented the Enigma recent mathematics graduates from PoznańUniversity-- Marian electromechanical rotor cipher towards the end of World War I Rejewski, Jerzy Rozycki and HenrykZygalski-- were recruited to (WWI) for the banking industry. However, due to reparations the Polish Cipher Bureau (Kull 2007). These three Germany was experiencing a period of hyperinflation, and the mathematicians, known as the ‘Great War Time Polish device did not sell.Scherbius marketed the Enigma to the German Geniuses’, first broke Enigma’s ciphers in December, 1932. The Navy next, but due to the country’s economic situation at the end break was facilitated by the codebooks passed by the French to of WWI, they initially did not purchaseit and the machines were the Polish. Rejewski had already determined cornerstoneequations for the wiring of the rotors but still had 1Mills College, 5000 MacArthur Blvd.,Oakland, CA 94613 2Santa variables to understand. The key settings indicated in the Fe College, 3000 NW 83rd St., Gainesville, FL, 32606 codebooks provided enough information to fill in Rejewski’s unknowns and complete his system of equations modeling the *To whom correspondence should be addressed: functions of the Enigma. The subsequent development of [email protected] Rejewski’s “Enigma Doubles” soon followed (Christensen 2007). 33 JYI | May 2013 | Vol. 25 Issue 5 2013 Journal of Young Investigators Journal of Young Investigators RESEARCH ARTICLE In July 1939, Polish, French and British Intelligence Services met for a conference at Pyry near Warsaw. Here the The Enigma machines used a bi-directional keyboard with 26 Polishrevealed they had broken Enigma and promised an Enigma keys. Bi-directional keyboards are capable of both sending and Double to both countries. The Polish delivered their equipment receiving commands from the system. Modern keyboards are all and techniques for breaking Enigma to British and French bi-directional in design and function. intelligence. The Polish breakthrough helped the Allies Standard North American keyboards have a QWERTY develop one of the most important weapons of World War II, setup for the position of letters on the keys; counterparts in Alan Turing’s cryptographic bomba.Turing’s electromechanical Eastern Europe have a QWERTZU setup similar to the setup of device, which the Allies codenamed “Ultra”, was able to solve the German Enigma machines later in the war. At the time of the the daily settings of the German Enigma machines. Polish break, the keyboard setup was unknown; Rejewski Additionally, Turing’s bomba decrypted the specialized deduced that the Enigma keyboard was laid out alphabetically Lorenz 40 and 42 ciphers used by German high command, Italian (Copeland 2004). ciphers such as Hagelin, and Japan’s JN-25 and Purple ciphers. When a key is pressed on the keyboard, an electrical Winston Churchill would tell King George the VI after World circuit is completed. The current then passes from the keyboard War II ended, “It was thanks to Ultra that we won the war.” through each of the components ultimately lighting up a bulb on the light-board indicating the new ciphertext letter. In addition, German Operational Procedures when a letter is pressed on the keyboard, before any enciphering Under the correct set of procedures, the military variants of of the messages takes place the right-most rotor advances Enigma would have been unbreakable. However, the Germans forward one-step. In other words, when a key is pressed, a never used the machine to the maximum capacity. current is released into the machine causing the components to The largest exploitable weakness did not actually come begin the ciphering process. from the machine itself but was due to the German operating procedure. The problem came in the transmission of these The Lightboard ciphered messages. In order for Enigma communications to be The lightboard has the same 26 characters as the keyboard and is read, both sending and receiving machines had to have matching arranged in the same order. When a key is pressed, the current settings. At the time of the Rejewski decryptions, and until runs through each of the components and the corresponding September 15, 1938 (Rejewski1980, German set-up of the ciphertext letter lights up on the lightboard. The new ciphertext Enigma had the following specifications: letter was then either recorded by the operator, or transmitted 1. The three rotors were set up in the machine in an through radio channels (Rejewski 1982). order specified by the codebooks provided by German intelligence. The Plugboard 2. After the rotor assembly was placed in the machine, the plugboard sockets were paired and connected. German: Steckerbrett The plugboard settings were also designated by the The plugboard is the first variable component of the Enigma. The codebooks. plugboard is located on the front of the machine and contains 26 3. The letter ring on each rotor was adjusted to show a sockets, one for each letter in the alphabet. The Plugboard sequence of three letters in the window on top of the generates a great deal of Enigma’s cryptographic strength (its machine chosen by the operator. large key space). In order to read messages sent by Enigma the 4. Finally, the three letters were then enciphered by the receiver must have the same plugboard setup. The daily setup of machine, twice. This meant that the first six letters the plugboard was determined by codebooks distributed to (or preamble) were really just a pair of three letters operators from German intelligence. ciphered, each with different alphabets twice. The A rangefrom zero to thirteen dual-wired cables analyst would know that the first letter eventually (Steckerverbindungen) can be plugged into the plugboard changed into the fourth letter, the second letter allowing pairs of letters to be transposed. When electriccurrent changed into the fifth letter, and the third letter reaches the plugboard, it changes its path if the letter is socketed changed into the sixth letter. to another letter. For instance, suppose the letter ‘B’ is left un- The setup procedure, particularly the redundancy measure of socketed then ‘B’ is wired directly to the ‘B’ input on the rotors. ciphering the letters twice, allowed Rejewski to deduce the At the time of the Polish attack (1932), the Germans wiring of the rotors and eventually the entire Enigma machine.
Recommended publications
  • To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (1939­1945).
    [Show full text]
  • Breaking the Enigma Cipher
    Marian Rejewski An Application of the Theory of Permutations in Breaking the Enigma Cipher Applicaciones Mathematicae. 16, No. 4, Warsaw 1980. Received on 13.5.1977 Introduction. Cryptology, i.e., the science on ciphers, has applied since the very beginning some mathematical methods, mainly the elements of probability theory and statistics. Mechanical and electromechanical ciphering devices, introduced to practice in the twenties of our century, broadened considerably the field of applications of mathematics in cryptology. This is particularly true for the theory of permutations, known since over a hundred years(1), called formerly the theory of substitutions. Its application by Polish cryptologists enabled, in turn of years 1932–33, to break the German Enigma cipher, which subsequently exerted a considerable influence on the course of the 1939–1945 war operation upon the European and African as well as the Far East war theatres (see [1]–[4]). The present paper is intended to show, necessarily in great brevity and simplification, some aspects of the Enigma cipher breaking, those in particular which used the theory of permutations. This paper, being not a systematic outline of the process of breaking the Enigma cipher, presents however its important part. It should be mentioned that the present paper is the first publication on the mathematical background of the Enigma cipher breaking. There exist, however, several reports related to this topic by the same author: one – written in 1942 – can be found in the General Wladyslaw Sikorski Historical Institute in London, and the other – written in 1967 – is deposited in the Military Historical Institute in Warsaw.
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • THE-POLISH-TRACE-Ebook.Pdf
    8 THE POLISH TRACE COMPOSED FROM COMMONLY AVAILABLE SOURCES BY LECH POLKOWSKI FOR IJCRS2017 FOREWORD It is a desire of many participants of conferences to learn as much as possible about the history and culture of he visited country and place and organizers try to satisfy this desire by providing excursions into attractive places and sites. IJCRS2017 also tries to take participants to historic sites of Warmia and Mazury and to show elements of local culture. As an innovation, we propose a booklet showing some achievements of Polish scientists and cryptographers, no doubt many of them are known universally, but some probably not. What bounds all personages described here is that they all suffered due to world wars, th efirst and the second. These wars ruined their homes, made them refugees and exiles, destroyed their archives and libraries, they lost many colleagues, friends and students but were lucky enough to save lives and in some cases to begin the career overseas. We begin with the person of Jan Czochralski, world famous metallurgist, discoverer of the technique of producing metal monocrystals `the Czochralski methode’ and inventor of duraluminum and the `bahnalloy’ who started his career and obtained its heights in Germany, later returned to Poland, became a professor at the Warsaw Polytechnical, played an important role in cultural life of Warsaw, lived in Warsaw through the second world war and the Warsaw Uprising of August-September 1944 and after the war was accused of cooperating ith occupying German forces and though judged innocent was literally erased from the public life and any information about him obliterated.
    [Show full text]
  • Polska Myśl Techniczna W Ii Wojnie Światowej
    CENTRALNA BIBLIOTEKA WOJSKOWA IM. MARSZAŁKA JÓZEFA PIŁSUDSKIEGO POLSKA MYŚL TECHNICZNA W II WOJNIE ŚWIATOWEJ W 70. ROCZNICĘ ZAKOŃCZENIA DZIAŁAŃ WOJENNYCH W EUROPIE MATERIAŁY POKONFERENCYJNE poD REDAkcJą NAUkoWą DR. JANA TARCZYńSkiEGO WARSZAWA 2015 Konferencja naukowa Polska myśl techniczna w II wojnie światowej. W 70. rocznicę zakończenia działań wojennych w Europie Komitet naukowy: inż. Krzysztof Barbarski – Prezes Instytutu Polskiego i Muzeum im. gen. Sikorskiego w Londynie dr inż. Leszek Bogdan – Dyrektor Wojskowego Instytutu Techniki Inżynieryjnej im. profesora Józefa Kosackiego mgr inż. Piotr Dudek – Prezes Stowarzyszenia Techników Polskich w Wielkiej Brytanii gen. dyw. prof. dr hab. inż. Zygmunt Mierczyk – Rektor-Komendant Wojskowej Akademii Technicznej im. Jarosława Dąbrowskiego płk mgr inż. Marek Malawski – Szef Inspektoratu Implementacji Innowacyjnych Technologii Obronnych Ministerstwa Obrony Narodowej mgr inż. Ewa Mańkiewicz-Cudny – Prezes Federacji Stowarzyszeń Naukowo-Technicznych – Naczelnej Organizacji Technicznej prof. dr hab. Bolesław Orłowski – Honorowy Członek – założyciel Polskiego Towarzystwa Historii Techniki – Instytut Historii Nauki Polskiej Akademii Nauk kmdr prof. dr hab. Tomasz Szubrycht – Rektor-Komendant Akademii Marynarki Wojennej im. Bohaterów Westerplatte dr Jan Tarczyński – Dyrektor Centralnej Biblioteki Wojskowej im. Marszałka Józefa Piłsudskiego prof. dr hab. Leszek Zasztowt – Dyrektor Instytutu Historii Nauki Polskiej Akademii Nauk dr Czesław Andrzej Żak – Dyrektor Centralnego Archiwum Wojskowego im.
    [Show full text]
  • Historical Ciphers • A
    ECE 646 - Lecture 6 Required Reading • W. Stallings, Cryptography and Network Security, Chapter 2, Classical Encryption Techniques Historical Ciphers • A. Menezes et al., Handbook of Applied Cryptography, Chapter 7.3 Classical ciphers and historical development Why (not) to study historical ciphers? Secret Writing AGAINST FOR Steganography Cryptography (hidden messages) (encrypted messages) Not similar to Basic components became modern ciphers a part of modern ciphers Under special circumstances modern ciphers can be Substitution Transposition Long abandoned Ciphers reduced to historical ciphers Transformations (change the order Influence on world events of letters) Codes Substitution The only ciphers you Ciphers can break! (replace words) (replace letters) Selected world events affected by cryptology Mary, Queen of Scots 1586 - trial of Mary Queen of Scots - substitution cipher • Scottish Queen, a cousin of Elisabeth I of England • Forced to flee Scotland by uprising against 1917 - Zimmermann telegram, America enters World War I her and her husband • Treated as a candidate to the throne of England by many British Catholics unhappy about 1939-1945 Battle of England, Battle of Atlantic, D-day - a reign of Elisabeth I, a Protestant ENIGMA machine cipher • Imprisoned by Elisabeth for 19 years • Involved in several plots to assassinate Elisabeth 1944 – world’s first computer, Colossus - • Put on trial for treason by a court of about German Lorenz machine cipher 40 noblemen, including Catholics, after being implicated in the Babington Plot by her own 1950s – operation Venona – breaking ciphers of soviet spies letters sent from prison to her co-conspirators stealing secrets of the U.S. atomic bomb in the encrypted form – one-time pad 1 Mary, Queen of Scots – cont.
    [Show full text]
  • Pioneers in U.S. Cryptology Ii
    PIONEERS IN U.S. CRYPTOLOGY II This brochure was produced by the Center for Cryptologic History Herbert 0. Yardley 2 Herbert 0. Yardley Herbert 0 . Yardley was born in 1889 in Worthington, Indiana. After working as a railroad telegrapher and spending a year taking an English course at the University of Chicago, he became a code clerk for the Department of State. In June 1917, Yardley received a commission in the Signal Officers Reserve Corps; in July Colonel Ralph Van Deman appointed him chief of the new cryptanalytic unit, MI-8, in the Military Intelligence division. MI-8, or the Cipher Bureau, consisted of Yardley and two clerks. At MI-8's peak in November 1918, Yardley had 18 officers, 24 civilians, and 109 typists. The section had expanded to include secret inks, code and cipher compilation, communications, and shorthand. This was the first formally organized cryptanalytic unit in the history of the U.S. government. When World War I ended, the Army was considering disbanding MI-8. Yardley presented a persuasive argument for retaining it for peacetime use. His plan called for the permanent retention of a code and cipher organization funded jointly by the State and War Departments. He demonstrated that in the past eighteen months MI-8 had read almost 11,000 messages in 579 cryptographic systems. This was in addition to everything that had been examined in connection with postal censorship. On 17 May Acting Secretary of State Frank L. Polk approved the plan, and two days later the Army Chief of Staff, General Peyton C.
    [Show full text]
  • Polish Mathematicians Finding Patterns in Enigma Messages
    Fall 2006 Chris Christensen MAT/CSC 483 Machine Ciphers Polyalphabetic ciphers are good ways to destroy the usefulness of frequency analysis. Implementation can be a problem, however. The key to a polyalphabetic cipher specifies the order of the ciphers that will be used during encryption. Ideally there would be as many ciphers as there are letters in the plaintext message and the ordering of the ciphers would be random – an one-time pad. More commonly, some rotation among a small number of ciphers is prescribed. But, rotating among a small number of ciphers leads to a period, which a cryptanalyst can exploit. Rotating among a “large” number of ciphers might work, but that is hard to do by hand – there is a high probability of encryption errors. Maybe, a machine. During World War II, all the Allied and Axis countries used machine ciphers. The United States had SIGABA, Britain had TypeX, Japan had “Purple,” and Germany (and Italy) had Enigma. SIGABA http://en.wikipedia.org/wiki/SIGABA 1 A TypeX machine at Bletchley Park. 2 From the 1920s until the 1970s, cryptology was dominated by machine ciphers. What the machine ciphers typically did was provide a mechanical way to rotate among a large number of ciphers. The rotation was not random, but the large number of ciphers that were available could prevent depth from occurring within messages and (if the machines were used properly) among messages. We will examine Enigma, which was broken by Polish mathematicians in the 1930s and by the British during World War II. The Japanese Purple machine, which was used to transmit diplomatic messages, was broken by William Friedman’s cryptanalysts.
    [Show full text]
  • The the Enigma Enigma Machinemachine
    TheThe EnigmaEnigma MachineMachine History of Computing December 6, 2006 Mike Koss Invention of Enigma ! Invented by Arthur Scherbius, 1918 ! Adopted by German Navy, 1926 ! Modified military version, 1930 ! Two Additional rotors added, 1938 How Enigma Works Scrambling Letters ! Each letter on the keyboard is connected to a lamp letter that depends on the wiring and position of the rotors in the machine. ! Right rotor turns before each letter. How to Use an Enigma ! Daily Setup – Secret settings distributed in code books. ! Encoding/Decoding a Message Setup: Select (3) Rotors ! We’ll use I-II-III Setup: Rotor Ring Settings ! We’ll use A-A-A (or 1-1-1). Rotor Construction Setup: Plugboard Settings ! We won’t use any for our example (6 to 10 plugs were typical). Setup: Initial Rotor Position ! We’ll use “M-I-T” (or 13-9-20). Encoding: Pick a “Message Key” ! Select a 3-letter key (or indicator) “at random” (left to the operator) for this message only. ! Say, I choose “M-C-K” (or 13-3-11 if wheels are printed with numbers rather than letters). Encoding: Transmit the Indicator ! Germans would transmit the indicator by encoding it using the initial (daily) rotor position…and they sent it TWICE to make sure it was received properly. ! E.g., I would begin my message with “MCK MCK”. ! Encoded with the daily setting, this becomes: “NWD SHE”. Encoding: Reset Rotors ! Now set our rotors do our chosen message key “M-C-K” (13-3-11). ! Type body of message: “ENIGMA REVEALED” encodes to “QMJIDO MZWZJFJR”.
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • Code Breaking at Bletchley Park
    Middle School Scholars’ CONTENTS Newsletter A Short History of Bletchley Park by Alex ​ Lent Term 2020 Mapplebeck… p2-3 Alan Turing: A Profile by Sam Ramsey… ​ Code Breaking at p4-6 Bletchley Park’s Role in World War II by ​ Bletchley Park Harry Martin… p6-8 Review: Bletchley Park Museum by ​ Joseph Conway… p9-10 The Women of Bletchley Park by Sammy ​ Jarvis… p10-12 Bill Tutte: The Unsung Codebreaker by ​ Archie Leishman… p12-14 A Very Short Introduction to Bletchley Park by Sam Corbett… p15-16 ​ The Impact of Bletchley Park on Today’s World by Toby Pinnington… p17-18 ​ Introduction A Beginner’s Guide to the Bombe by Luca ​ “A gifted and distinguished boy, whose future Zurek… p19-21 career we shall watch with much interest.” This was the parting remark of Alan Turing’s Headmaster in his last school report. Little The German Equivalent of Bletchley could he have known what Turing would go on Park by Rupert Matthews… 21-22 ​ to achieve alongside the other talented codebreakers of World War II at Bletchley Park. Covering Up Bletchley Park: Operation Our trip with the third year academic scholars Boniface by Philip Kimber… p23-25 this term explored the central role this site ​ near Milton Keynes played in winning a war. 1 intercept stations. During the war, Bletchley A Short History of Bletchley Park Park had many cover names, which included by Alex Mapplebeck “B.P.”, “Station X” and the “Government Communications Headquarters”. The first mention of Bletchley Park in records is in the Domesday Book, where it is part of the Manor of Eaton.
    [Show full text]
  • The Enigma History and Mathematics
    The Enigma History and Mathematics by Stephanie Faint A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Mathematics m Pure Mathematics Waterloo, Ontario, Canada, 1999 @Stephanie Faint 1999 I hereby declare that I am the sole author of this thesis. I authorize the University of Waterloo to lend this thesis to other institutions or individuals for the purpose of scholarly research. I further authorize the University of Waterloo to reproduce this thesis by pho­ tocopying or by other means, in total or in part, at the request of other institutions or individuals for the purpose of scholarly research. 11 The University of Waterloo requires the signatures of all persons using or pho­ tocopying this thesis. Please sign below, and give address and date. ill Abstract In this thesis we look at 'the solution to the German code machine, the Enigma machine. This solution was originally found by Polish cryptologists. We look at the solution from a historical perspective, but most importantly, from a mathematical point of view. Although there are no complete records of the Polish solution, we try to reconstruct what was done, sometimes filling in blanks, and sometimes finding a more mathematical way than was originally found. We also look at whether the solution would have been possible without the help of information obtained from a German spy. IV Acknowledgements I would like to thank all of the people who helped me write this thesis, and who encouraged me to keep going with it. In particular, I would like to thank my friends and fellow grad students for their support, especially Nico Spronk and Philippe Larocque for their help with latex.
    [Show full text]