Advertisement

Enigma machine

From Academic Kids

(Redirected from Enigma (machine))

Template:EnigmaSeries In the history of cryptography, the Enigma was a portable cipher machine used to encrypt and decrypt secret messages. More precisely, Enigma was a family of related electro-mechanical rotor machines — there were a variety of different models.

The Enigma was used commercially from the early 1920s on, and was also adopted by the military and governmental services of a number of nations — most famously by Nazi Germany before and during World War II (WWII). The German military model, the Wehrmacht Enigma, is the version most commonly discussed. The machine has gained notoriety because Allied cryptologists (see Biuro Szyfrw, Poland, and Bletchley Park, England) were able to decrypt a large number of messages that had been enciphered on the machine before being broadcast by radio (see cryptanalysis of the Enigma). The intelligence gained through this source — codenamed ULTRA — was a significant aid to the Allied war effort. Some historians have suggested that the end of the European war was hastened by up to a year or more because of the decryption of German ciphers.

Figure 1. A three-rotor German military Enigma machine showing, from bottom to top, the plugboard, the keyboard, the lamps and the finger-wheels of the rotors emerging from the inner lid (version with labels).
Enlarge
Figure 1. A three-rotor German military Enigma machine showing, from bottom to top, the plugboard, the keyboard, the lamps and the finger-wheels of the rotors emerging from the inner lid (version with labels).

Although the Enigma cipher has cryptographic weaknesses, it was, in practice, only their combination with other significant factors which allowed codebreakers to read messages: mistakes by operators, procedural flaws, and the occasional captured machine or codebook.

This article focuses on the actual Enigma machine; for the history and techniques of how Enigma was broken, see Cryptanalysis of the Enigma. For a discussion of how Enigma-derived intelligence was put to use, see ULTRA.

Contents


Description

Missing image
Enigma-action.png
Enigma encryption for two consecutive letters — current is passed into set of rotors, around the reflector, and back out through the rotors again. Note: The greyed-out lines represent other possible circuits within each rotor, which are hard-wired to contacts on each rotor. Letter A encrypts differently with consecutive key presses, first to G, and then to C. This is because the right hand rotor has stepped, sending the signal on a completely different route.

Like other rotor machines, the Enigma machine is a combination of mechanical and electrical systems. The mechanical mechanism consists of a keyboard; a set of rotating disks called rotors arranged adjacently along a spindle; and a stepping mechanism to turn one or more of the rotors with each key press. The exact mechanism varies, but the most common form is for the right-hand rotor to step once with every key stroke, and occasionally the motion of neighbouring rotors is triggered. The continual movement of the rotors results in a different cryptographic transformation after each key press.

The mechanical parts act in such a way as to form a varying electrical circuit — the actual encipherment of a letter is performed electrically. When a key is pressed, the circuit is completed; current flows through the various components and ultimately lights one of many lamps, indicating the output letter. For example, when encrypting a message starting ANX..., the operator would first press the A key, and the Z lamp might light; Z would be the first letter of the ciphertext. The operator would then proceed to encipher N in the same fashion, and so on.

Missing image
Enigma,wiringdiagram.png
The complete wiring diagram showing the current flow when pressing the 'A' key is encoded to the 'D' lamp, also D yields A, but A never A

Current flows from a battery through the bidirectional switch controlled by the depressed key to the plugboard. This plugboard allows the connections between the keyboard and the fixed entry wheel to be easily rewired by an operator. Current proceeds from the plugboard to the fixed entry wheel. This leads into the rotor assembly (or scrambler), where the complex internal wiring of each rotor results in the current passing from one rotor to the next along a convoluted path. After passing through all the rotors, current enters the reflector, which relays the signal back out again through the rotors and the entry wheel — this time via a different path — and proceeds through the plugs and the bi-directional switch from the target letter, to light-up the target lamp.

Rotors

Missing image
Enigma-rotor-pin-contacts.jpg
One side of an Enigma rotor, showing the pin electrical contacts. The roman number V identifies the wiring of the rotor.
The other side of the rotor, showing the flat electrical contacts. A single turnover notch is visible on the left edge of the rotor.
Enlarge
The other side of the rotor, showing the flat electrical contacts. A single turnover notch is visible on the left edge of the rotor.

The rotors (alternatively wheels or drumsWalzen in German) form the heart of an Enigma machine. Approximately 10 cm in diameter, each rotor is a disk made of hard rubber or bakelite with a series of brass spring-loaded pins on one face arranged in a circle; on the other side are a corresponding number of circular electrical contacts. The pins and contacts represent the alphabet — typically the 26 letters A–Z (this will be assumed for the rest of the description). When placed side-by-side, the pins of one rotor rest against the contacts of the neighbouring rotor, forming an electrical connection. Inside the body of the rotor, a set of 26 wires connects each pin on one side to a contact on the other in a complex pattern. The wiring differs for every rotor.

By itself, a rotor performs only a very simple type of encryption — a simple substitution cipher. For example, the pin corresponding to the letter E might be wired to the contact for letter T on the opposite face. The complexity comes from the use of several rotors in series — usually three or four — and the regular movement of the rotors; this provides a much stronger type of encryption.

Three rotors in sequence when placed inside the Enigma.
Enlarge
Three rotors in sequence when placed inside the Enigma.


Three Enigma rotors and the shaft on which they are placed when in use.
Enlarge
Three Enigma rotors and the shaft on which they are placed when in use.
Missing image
Enigma_rotor_exploded_view.png
Exploded view of an Enigma rotor.
  1. notched ring
  2. marking dot for "A" contact
  3. alphabet tyre
  4. plate contacts
  5. wire connections
  6. pin contacts
  7. spring-loaded ring adjusting lever
  8. hub
  9. finger wheel
  10. ratchet wheel

When placed in the machine, a rotor can be set to one of 26 positions. It can be turned by hand using a grooved finger-wheel which protrudes from the internal cover when closed, as shown in Figure 2. So that the operator knows the position, each rotor has an alphabet tyre (or letter ring) attached around the outside of the disk, with 26 letters or numbers; one of these can be seen through a window, indicating the position of the rotor to the operator. In early Enigma models, the alphabet ring is fixed; a complication introduced in later versions is the facility to adjust the alphabet ring relative to the core wiring. The position of the ring is known as the Ringstellung ("ring settings").

The rotors each contain a notch (sometimes multiple notches), used to control the stepping of the rotors. In the military versions, the notches are located on the alphabet ring.

The Army and Air Force Enigmas came equipped with several rotors; when first issued there was a total of three. On 15 December 1938, this changed to five, from which three were chosen for insertion in the machine. These were marked with Roman numerals to distinguish them: I, II, III, IV and V, all with single notches. The Naval version of the Wehrmacht Enigma had always been issued with more rotors than the other services: at first, five, then seven and finally eight. The additional rotors were named VI, VII and VIII, all with different wiring, and had two notches cut into them, resulting in a more frequent turnover.

The four-rotor Naval Enigma (M4) accommodated an extra rotor in the same space as the three-rotor version. This was accomplished by replacing the original reflector with a thinner reflector and adding a special fourth rotor. The fourth rotor can be one of two types: Beta or Gamma. This 4th rotor never steps, but can be manually placed in any of the 26 positions.

For more information on the rotor wiring, ring settings and effect on the encryptions go to Enigma rotor details.

Stepping motion

Stepping motion of the Enigma. All three ratchet pawls (green) push in unison. In the first rotor (1), the ratchet (red) is always engaged, and steps with each keypress. Here, the second rotor (2) is engaged because the notch in the first rotor is aligned with the pawl; it will step with the next keypress. The third rotor (3) is not engaged, because the notch in the second rotor is not aligned; the pawl will simply slide over the curved ring.
Enlarge
Stepping motion of the Enigma. All three ratchet pawls (green) push in unison. In the first rotor (1), the ratchet (red) is always engaged, and steps with each keypress. Here, the second rotor (2) is engaged because the notch in the first rotor is aligned with the pawl; it will step with the next keypress. The third rotor (3) is not engaged, because the notch in the second rotor is not aligned; the pawl will simply slide over the curved ring.

To avoid merely implementing a simple substitution cipher, some rotors turn with consecutive presses of a key. This ensures that the cryptographic transformation is different at each position, producing a formidable polyalphabetic substitution cipher.

The most common arrangement utilises a ratchet and pawl mechanism. Each rotor is affixed with a ratchet with 26 teeth; a group of pawls engage the teeth of the ratchet. The pawls are pushed forward in unison with each keypress on the machine. If a pawl engages the teeth of a ratchet, that rotor advances by one step.

Each rotor is also affixed with a notched ring. The five basic rotors have one notch, while the additional naval rotors VI, VII and VIII have two notches. At a certain point, a rotor's notch will align with the pawl, allowing it to engage the ratchet of the next rotor with the subsequent key press. When a pawl is not aligned with the notch, it will simply slide over the surface of the ring without engaging the ratchet. In a single-notch rotor system, the second rotor is advanced one position for every 26 advances of the first rotor. Similarly, the third rotor is advanced one position for every 26 advances of the second rotor. The second rotor also advances at the same time as the third rotor, meaning the second rotor can step twice on subsequent key presses — "double stepping" — resulting in a reduced period (Hamer, 1997).

This double stepping causes the rotors to deviate from a normal odometer. A double step occurs as follows: the first rotor steps, and takes the second rotor one step further. If the second rotor has moved by this step into its own notch-position, the third pawl can drop down. On the next step this pawl pushes the ratchet of the third rotor and advances it, but will also push into the second rotor's notch, advancing the second rotor a second time in a row.

With three wheels and only single notches in the first and second wheels, the machine has a period of 26 × 25 × 26 = 16,900. Historically, messages were limited to a couple of hundred letters, and so there was no risk of repeating any position.

To make the use of the naval fourth rotors "Beta" and "Gamma" possible, introduced in 1942, only the reflector was changed to a thin model and the special thin fourth rotor was placed against it. No changes were made to the mechanism. Since there are only three pawls, the fourth rotor never steps, but can be manually set into one of its 26 positions.

When pressing a key, the rotors step before the electrical circuit is connected.

Entry wheel

The Enigma rotor assembly. The three movable rotors are sandwiched between two fixed wheels: the entry wheel on the right and the reflector (here marked "B") on the left.
Enlarge
The Enigma rotor assembly. The three movable rotors are sandwiched between two fixed wheels: the entry wheel on the right and the reflector (here marked "B") on the left.

The entry wheel (Eintrittwalze in German), or entry stator, connects the plugboard, if present, or otherwise the keyboard and lampboard to the rotor assembly. While the exact wiring used is of comparatively little importance to the security, it proved an obstacle in the progress of Polish cryptanalyst Marian Rejewski during his deduction of the rotor wirings. The commercial Enigma connects the keys in the order of their sequence on the keyboard: Q<math>\rightarrow<math>A, W<math>\rightarrow<math>B, E<math>\rightarrow<math>C and so on. However, the military Enigma connects them in straight alphabetical order: A<math>\rightarrow<math>A, B<math>\rightarrow<math>B, C<math>\rightarrow<math>C etc. It took an inspired piece of guesswork for Rejewski to realise the modification, and he was then able to solve the equations.

Reflector

With the exception of the early models A and B, the last rotor is followed by a reflector (German Umkehrwalze), a patented feature distinctive of the Enigma family amongst the various rotor machines designed in the period. The reflector connects outputs of the last rotor up in pairs, redirecting current back through the rotors by a different route. The reflector ensures that Enigma is self-reciprocal: conveniently, encryption is the same as decryption. However, the reflector also gives Enigma the property that no letter can encrypt to itself; this property was exploited by codebreakers.

In the commercial Enigma model C, the reflector can be inserted in one of two different positions. In Model D the reflector can be set in 26 possible positions, although it does not move during encipherment. In the Abwehr Enigma, the reflector is stepped during encryption in a similar way to the other wheels.

In the Wehrmacht Enigma, the reflector is fixed and does not rotate, and appeared in four versions. The original version was marked A, and was replaced by Umkehrwalze B on 1 November 1937. A third version, Umkehrwalze C appeared in 1941. The fourth version, first observed on 2 January 1944 is a rewireable reflector, called Umkehrwalze D, allowing the Enigma operator to alter the connections as part of the key settings. Cryptologically, the Umkehrwalze is a bad idea, it introduces significant weaknesses.

Plugboard

The plugboard (Steckerbrett) is positioned at the front of the machine, below the keys. When in use, there can be up to 13 connections. In the above photograph, two pairs of letters are swapped (S-O and J-A).
Enlarge
The plugboard (Steckerbrett) is positioned at the front of the machine, below the keys. When in use, there can be up to 13 connections. In the above photograph, two pairs of letters are swapped (S-O and J-A).

The plugboard (Steckerbrett in German) is a variable wiring that could be reconfigured by the operator (visible on the front panel of Figure 1; some of the patch cords can be seen in the lid). It was introduced on German Army versions in 1930 and was soon adopted by the Navy as well. The plugboard contributes a great deal to the strength of the machine's encryption, more than an extra rotor would. Enigma without a plugboard — "unsteckered" Enigma — can be solved relatively straightforwardly using hand methods; these techniques are generally defeated by the addition of a plugboard, and codebreakers resorted to special machines to solve it.

A cable placed onto the plugboard connects letters up in pairs, for example, E and Q might be a steckered pair. The effect is to swap those letters before and after the main rotor scrambling unit. For example, when an operator presses E, the signal is diverted to Q before entering the rotors. Several such steckered pairs, up to 13, might be used at one time.

Current flows from the keyboard through the plugboard, and proceeds to the entry-rotor or Eintrittwalze. Each letter on the plugboard has two jacks. Inserting a plug will disconnect the upper jack (from the keyboard) and the lower jack (to the entry-rotor) of that letter. The plug at the other end of the crosswired cable is inserted into another letter's jacks, switching the connections of the two letters.

Accessories

Missing image
Enigma-printer-2.jpg
The "Schreibmax" was a printing unit which could be attached to the Enigma, removing the need to laboriously read and write down the letters off the light panel.

A handy feature that was used on the M4 Enigma was the "Schreibmax", a little printer which could print the 26 letters on a small paper ribbon. This excluded the need for a second operator, reading the lamps and writing the letters down. The Schreibmax was placed on top of the Enigma machine and was connected to the lamp panel; to install the printer, the lamp cover and all lightbulbs had to be removed.

Another accessory was the remote lamp panel. If the machine was equipped with an extra panel, the wooden case of the Enigma was wider and could store the extra panel. There was a lamp panel version that could be connected afterwards, but that required, just as with the Schreibmax, the lamp panel and lightbulbs to be removed. The remote panel made it possible for a person to read the decrypted text, without giving the operator access to it.

Mathematical description

The Enigma transformation for each letter can be specified mathematically as a product of permutations. Assuming a three-rotor German Army/Air Force Enigma, let <math>P<math> denote the plugboard transformation, <math>U<math> denote the reflector, and <math>L, M, R<math> denote the actions of the left, middle and right rotors respectively. Then the encryption <math>E<math> can be expressed as

<math>E = PRMLUL^{-1}M^{-1}R^{-1}P^{-1}<math>

After each key press the rotors turn, changing the transformation. For example, if the right hand rotor <math>R<math> is rotated <math>i<math> positions, the transformation becomes <math>\rho^iR\rho^{-i}<math>, where <math>\rho<math> is the cyclic permutation mapping A to B, B to C, and so forth. Similarly, the middle and left-hand rotors can be represented as <math>j<math> and <math>k<math> rotations of <math>M<math> and <math>L<math>. The encryption function can then be described as:

<math>E = P(\rho^iR\rho^{-i})(\rho^{j}M\rho^{-j})(\rho^{k}L\rho^{-k})U(\rho^kL^{-1}\rho^{-k})(\rho^{j}M^{-1}\rho^{-j})(\rho^{i}R^{-1}\rho^{-i})P^{-1}<math>

Procedures for using the Enigma

Missing image
Kenngruppenheft.jpg
In use, the Enigma required a list of daily key settings as well as a number of auxillary documents. The procedures for German Naval Enigma were more elaborate, and secure, than the procedures used in other services. The Navy codebooks were also printed in red, water-soluble ink on pink paper so that they could easily be destroyed if they were at risk of being seized by the enemy. The above codebook was taken from captured U-boat U-505.

In German military usage, communications were divided up into a number of different networks, all using different settings for their Enigma machines. These communication nets were termed keys at Bletchley Park, and were assigned codenames, such as Red, Chaffinch and Shark. Each unit operating on a network was assigned a settings list specifying the Enigma for a period of time. For a message to be correctly encrypted and decrypted, both sender and receiver have to set up their Enigma in the same way; the rotor selection and order, the starting position and the plugboard connections need to be identical; these settings have to be agreed on beforehand, and were distributed in codebooks.

An Enigma machine's initial state, the cryptographic key, has several aspects:

  • Wheel order (Walzenlage) — the choice of rotors and the order in which they are used.
  • Initial position of the rotors: — an operator chose the initial positions of the rotors, different for each message.
  • Ring settings (Ringstellung) — the position of the alphabet ring relative to the rotor wiring.
  • Plug settings (Steckerverbindungen) — the connections of the plugs in the plugboard.

Enigma was designed to be secure even if the rotor wiring was known to an eavesdropper, although in practice the wiring was kept secret. With secret wiring, the total number of possible configurations has been calculated to be around 10114 (approximately 380 bits); with known wiring and other operational constraints, this is reduced to around 1023 (76 bits) [1] (http://www.nsa.gov/publications/publi00004.cfm). Users of Enigma were assured of its security by the large number of possibilities; it was not feasible for an adversary to even begin to try every possible configuration in a brute force attack.

Indicators

Missing image
Enigma-rotor-windows.jpg
Figure 2. With the inner lid placed down, the Enigma is ready for use. The finger wheels of the rotors protrude through the lid, allowing the operator to manually set the rotors, and the current position — here RDKP — is visible to the operator through a set of windows.

Most of the key was kept constant for a set time period, typically a day. However, a different initial rotor position was chosen for each message, because if a number of messages are sent encrypted with identical or near-identical settings, a cryptanalyst has several messages "in depth", and might be able to attack the messages using frequency analysis. To counter this, a different starting position for the rotors was chosen for each message; a similar concept to an initialisation vector in modern cryptography. The starting position was transmitted along with the ciphertext. The exact method used is termed the "indicator procedure" — weak indicator procedures allowed the initial breaks into Enigma.

One of the earliest indicator procedures was exploited to make the initial breaks into the Enigma by Polish cryptanalysts. The procedure was for the operator to set up his machine in accordance with his settings list, which included a global initial position for the rotors (Grundstellung — "ground setting"), AOH, say. The operator would turn his rotors until AOH was visible through the rotor windows. At this point, the operator would choose his own, arbitrary starting position for that particular message. An operator might select EIN, and this became the message settings for that encryption session. The operator would then type EIN into the machine, twice, to allow for detecting transmission errors. The results would be an encrypted indicator — the EIN typed twice might turn into XHTLOA, which would be transmitted along with the message. Finally, the operator would then spin the rotors to his message settings, EIN in this example, and the text of the actual message was typed in.

At the receiving end the operation was reversed. The operator set the machine to the initial settings and typed in the first six letters of the message (XHTLOA). In this example, EINEIN would be produced. By moving his rotors to EIN, the receiving operator would then type in the rest of the ciphertext, deciphering the message.

The weakness came from two factors: the use of a global ground setting — this was later changed so that the operator selected his initial position to encrypt the indicator, and sent the initial position in the clear. The second problem was the repetition of the indicator, which was eventually changed in May 1940.


History

Commercial Enigma

Missing image
Scherbius-1928-patent.png
Scherbius' Enigma patent — Template:US patent, granted in 1928

On February_23, 1918, engineer Arthur Scherbius applied for a patent for a cipher machine using rotors, and, with E. Richard Ritter, founded the firm of Scherbius & Ritter. They approached the German Navy and Foreign Office with their design, but neither were interested. They then assigned the patent rights to Gewerkschaft Securitas, who founded the Chiffriermaschinen Aktien-Gesellschaft (Cipher Machines Stock Corporation) on 9 July 1923; Scherbius and Ritter were on the board of directors.

Chiffriermaschinen AG began advertising a rotor machine — Enigma model A — which was exhibited at the Congress of the International Postal Union in 1923 and 1924. The machine was heavy and bulky, incorporating a typewriter. It measured 65×45×35 cm and weighed about 50kg. A model B was introduced, and was of a similar construction. While bearing the Enigma name, both models A and B were quite unlike later versions: they differed in physical size and shape, but also cryptographically, in that they lacked the reflector.

Missing image
Enigma-logo.jpg
The Enigma logo

The reflector — an idea suggested by Scherbius' colleague Willi Korn — was first introduced in the Enigma C (1926) model. The reflector is a key feature of the Enigma machines.

Model C was smaller and more portable than its predecessors. It lacked a typewriter, relying instead on the operator reading the lamps; hence the alternative name of "glowlamp Enigma" to distinguish from models A and B. The Enigma C quickly became extinct, giving way to the Enigma D (1927). This version was widely used, with copies going to Sweden, the Netherlands, England, Japan, Italy, Spain, USA and Poland.

Missing image
Enigmas.jpg
A selection of seven Enigma machines and paraphernalia exhibited at the USA's National Cryptologic Museum. From left to right, the models are: 1) Commercial Enigma; 2) Enigma T; 3) Enigma G; 4) Unidentified; 5) Luftwaffe (Air Force) Enigma; 6) Heer (Army) Enigma; 7) Kriegsmarine (Naval) Enigma — M4.

Military Enigma

Several copies of commercial Enigmas were purchased by the German Navy, leading to adoption of an adapted machine by the Navy in 1926, termed the Funkschlssel C (Radio cipher C); the machine was revised slightly in 1933.

On 15 July 1928, the German Army (Reichswehr) introduced their own version of the Enigma — the Enigma G, revised to the Enigma I in June 1930. There was also a typewriter version, the Enigma II. The most important change introduced was the addition of the plugboard. This version became known as the Wehrmacht, or Services Enigma, and was used extensively by the German military services and other government organisations, both prior to and during World War II. The machine's dimensions were 28×34×15 cm (weighing around 12 kg).

An Enigma model T (Tirpitz) — a modified commercial Enigma K manufactured for use by the Japanese.
Enlarge
An Enigma model T (Tirpitz) — a modified commercial Enigma K manufactured for use by the Japanese.

By 1930, the Army suggested that the Navy adopt their machine, giving the reasons of increased security (with the plugboard) and easier interservice communication. The Navy eventually agreed and in August 1934 brought into service the Navy version of the Army Enigma, designated Funkschlssel M or M3. While the Army version used only three rotors, the Navy specified a choice of three from a possible five. In 1939 the Army went to a 3 rotors out of 5 system and changed their indicator procedures, leaving the Poles with too much work to keep up. This was one of the reasons for passing information and equipment on to British and French in July of that year. Still later, the Navy went to 3 rotors out of a possible 8. In August 1935 the Air Force also introduced the Wehrmacht Enigma for their communications. A four rotor Enigma was introduced by the Navy for U-boat traffic on 1 February 1942, called M4 (the network was known as Triton, or Shark to the Allies). The extra rotor was fitted in the same space by splitting the reflector into a combination of a thin reflector and a thin fourth rotor.

The Abwehr used a notable variant of the Enigma, known as the Abwehr Enigma, counter machine or the Zahlwerk Enigma, a four-wheel unsteckered machine with multiple notches on the rotors.

Other countries also used Enigma machines. The Italian Navy adopted the commercial Enigma as "Navy Cipher D"; the Spanish also used commercial Enigma during their Civil War. British codebreakers succeeded in breaking these machines, which lacked a plugboard. The Swiss used a version of Enigma called model K or Swiss K, for military and diplomatic use, which was very similar to the commercial Enigma D. The machine was broken by a number of parties, including Germany, France, Britain and the United States (the latter codenamed it INDIGO). An Enigma T model (codenamed Tirpitz) was manufactured for use by the Japanese.

It has been estimated that 100,000 Enigma machines were constructed, 40,000 of those during World War II. After the end of the Second World War, the Allies sold captured Enigma machines, still widely considered secure, to a number of developing countries.

Enigma derivatives

Missing image
Japanese-enigma.jpg
The Japanese developed an Enigma clone, codenamed GREEN by American cryptographers, although it was little used.

The Enigma was influential in the field of cipher machine design, and a number of other rotor machines are derived from it. The British Typex was originally designed from the Enigma patents — Typex even includes features from the patent descriptions that were omitted from the actual Enigma machine. Due to the need for secrecy about its cipher systems, no royalties were paid for the use of the patents by the British government. A Japanese Enigma clone was codenamed GREEN by American cryptographers. Little-used, it contained four rotors mounted vertically. In the US, cryptologist William Friedman designed the M-325, a machine similar to Enigma in logical operation, although not in construction.

Tatjana van Vark's Enigma-inspired rotor machine, constructed in 2002. The rotors of this machine contain 40 contacts, compared to the original Enigma's 26.
Enlarge
Tatjana van Vark's Enigma-inspired rotor machine, constructed in 2002. The rotors of this machine contain 40 contacts, compared to the original Enigma's 26.

A unique rotor machine was constructed in 2002 by Netherlands-based Tatjana van Vark [2] (http://www.tatjavanvark.nl/index.html). This unusual device is inspired by Enigma, but makes use of 40-point rotors, allowing letters, numbers and some punctuation; each rotor contains 509 parts [3] (http://www.tatjavanvark.nl/tvv1/pht10.html).



Missing image
Enigma1.jpg
Polish-produced double of a German Enigma machine.

Surviving Enigmas

The effort to break the Enigma was not disclosed until the 1970s. Since then, interest in the Enigma machine has grown considerably and a number of Enigmas are on public display in museums in the US and Europe. The Deutsches Museum in Munich has both the three and four-wheel German military variants, as well as several older civilian versions. There are also examples in the NSA's National Cryptologic Museum at Fort Meade in the United States, at Bletchley Park in the United Kingdom, as well as a number of other locations in Germany, the US, the UK, and a few other countries in Europe. A number are also in private hands [4] (http://www.eclipse.net/~dhamer/location.htm).

Occasionally, Enigma machines are sold at auction; prices of US$20,000 are not unusual [5] (http://www.eclipse.net/~dhamer/enigma_p.htm).

Replicas of the machine are available in various forms, including an exact reconstructed copy of the Naval M4 model, an Enigma implemented in electronics (Enigma-E), various computer software simulators and paper-and-scissors analogues.

Fiction

Robert Harris' 1996 novel Enigma is set against the backdrop of World War II Bletchley Park and cryptologists working to read Enigma. A film of the book was released in 2001 starring Kate Winslet and Dougray Scott. See: Enigma (2001 film).

Neal Stephenson's novel Cryptonomicon's World War II stage is also set against the backdrop of the uses of military cryptography, featuring the Enigma and Bletchley Park among other things.

An interactive fiction game Jigsaw by Graham Nelson contains a puzzle in which the player must decrypt a message with a simplified version of the Enigma. The puzzle is generally accepted as the most annoying one in the game, which is perhaps some measure of how hard it was to decrypt messages produced by the original machine(s).

Jonathan Mostow's U-571, a film released in 2000, describes a fictional voyage of American submariners who have hijacked a German submarine in hopes of obtaining the Enigma. The machine used in the film was in fact not a prop, but an authentic Enigma obtained from a collector.

See also

  • Pałac Saski (Warsaw), where German Enigma ciphers were first broken (December 1932).

World War II Era Encryption Devices:

References

  • Kris Gaj, Arkadiusz Orlowski: Facts and Myths of Enigma: Breaking Stereotypes. EUROCRYPT 2003: 106–122. Online version (PDF) (http://ece.gmu.edu/courses/ECE543/viewgraphs_F03/EUROCRYPT_2003.pdf).
  • David Hamer, "Enigma: Actions Involved in the ‘Double-Stepping’ of the Middle Rotor," Cryptologia, vol. 21(1), January 1997, pp. 47–50. Online version (PDF) (http://www.eclipse.net/~dhamer/downloads/rotorpdf.zip).
  • David H. Hamer, Geoff Sullivan and Frode Weierud, "Enigma Variations: an Extended Family of Machines," Cryptologia 22(3), July 1998. Online version (PDF) (http://www.eclipse.net/~dhamer/downloads/enigvar1.zip).
  • David Kahn, Seizing the Enigma: the Race to Break the German U-Boat Codes, 1939-1943, Houghton Mifflin, 1991, ISBN 0-395-42739-8.
  • Władysław Kozaczuk, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two, edited and translated by Christopher Kasparek, Frederick, MD, University Publications of America, 1984. (This remains the standard reference on the Polish part in the Enigma-decryption epic.)
  • Wladyslaw Kozaczuk and Jerzy Straszak, Enigma: How the Poles Broke the Nazi Code, New York, Hippocrene Books, 2004, ISBN 078180941X.
  • Louis Kruh and Cipher Deavours, "The Commercial Enigma: Beginnings of Machine Cryptography," Cryptologia, 26(1), pp. 1–16, 2002. Online version (PDF) (http://www.dean.usma.edu/math/pubs/cryptologia/extras/KruhDeavoursV26N1pp1-16.PDF).
  • Tom Perera, The Story of the ENIGMA: History, Technology and Deciphering, 2nd Edition, CD-ROM, 2004, Artifax Books, ISBN 1890024066 [6] (http://w1tp.com/enigma/ecds.htm).

External links

Images
Descriptions
Simulators and replicas
Miscellaneous
  • David Hamer's Enigma pages (http://www.eclipse.net/~dhamer/Enigma1.htm) — includes a list of known surviving Enigmas and selling prices

Template:Cipher machinesda:Enigma de:Enigma (Maschine) es:Enigma (mquina) fi:Enigma fr:Machine Enigma he:אניגמה it:Enigma (crittografia) ja:エニグマ (暗号機) nl:Enigma (codeermachine) pl:Enigma (maszyna szyfrująca) pt:Mquina Enigma sv:Enigma (krypteringsmaskin)

Navigation

Academic Kids Menu

  • Art and Cultures
    • Art (http://www.academickids.com/encyclopedia/index.php/Art)
    • Architecture (http://www.academickids.com/encyclopedia/index.php/Architecture)
    • Cultures (http://www.academickids.com/encyclopedia/index.php/Cultures)
    • Music (http://www.academickids.com/encyclopedia/index.php/Music)
    • Musical Instruments (http://academickids.com/encyclopedia/index.php/List_of_musical_instruments)
  • Biographies (http://www.academickids.com/encyclopedia/index.php/Biographies)
  • Clipart (http://www.academickids.com/encyclopedia/index.php/Clipart)
  • Geography (http://www.academickids.com/encyclopedia/index.php/Geography)
    • Countries of the World (http://www.academickids.com/encyclopedia/index.php/Countries)
    • Maps (http://www.academickids.com/encyclopedia/index.php/Maps)
    • Flags (http://www.academickids.com/encyclopedia/index.php/Flags)
    • Continents (http://www.academickids.com/encyclopedia/index.php/Continents)
  • History (http://www.academickids.com/encyclopedia/index.php/History)
    • Ancient Civilizations (http://www.academickids.com/encyclopedia/index.php/Ancient_Civilizations)
    • Industrial Revolution (http://www.academickids.com/encyclopedia/index.php/Industrial_Revolution)
    • Middle Ages (http://www.academickids.com/encyclopedia/index.php/Middle_Ages)
    • Prehistory (http://www.academickids.com/encyclopedia/index.php/Prehistory)
    • Renaissance (http://www.academickids.com/encyclopedia/index.php/Renaissance)
    • Timelines (http://www.academickids.com/encyclopedia/index.php/Timelines)
    • United States (http://www.academickids.com/encyclopedia/index.php/United_States)
    • Wars (http://www.academickids.com/encyclopedia/index.php/Wars)
    • World History (http://www.academickids.com/encyclopedia/index.php/History_of_the_world)
  • Human Body (http://www.academickids.com/encyclopedia/index.php/Human_Body)
  • Mathematics (http://www.academickids.com/encyclopedia/index.php/Mathematics)
  • Reference (http://www.academickids.com/encyclopedia/index.php/Reference)
  • Science (http://www.academickids.com/encyclopedia/index.php/Science)
    • Animals (http://www.academickids.com/encyclopedia/index.php/Animals)
    • Aviation (http://www.academickids.com/encyclopedia/index.php/Aviation)
    • Dinosaurs (http://www.academickids.com/encyclopedia/index.php/Dinosaurs)
    • Earth (http://www.academickids.com/encyclopedia/index.php/Earth)
    • Inventions (http://www.academickids.com/encyclopedia/index.php/Inventions)
    • Physical Science (http://www.academickids.com/encyclopedia/index.php/Physical_Science)
    • Plants (http://www.academickids.com/encyclopedia/index.php/Plants)
    • Scientists (http://www.academickids.com/encyclopedia/index.php/Scientists)
  • Social Studies (http://www.academickids.com/encyclopedia/index.php/Social_Studies)
    • Anthropology (http://www.academickids.com/encyclopedia/index.php/Anthropology)
    • Economics (http://www.academickids.com/encyclopedia/index.php/Economics)
    • Government (http://www.academickids.com/encyclopedia/index.php/Government)
    • Religion (http://www.academickids.com/encyclopedia/index.php/Religion)
    • Holidays (http://www.academickids.com/encyclopedia/index.php/Holidays)
  • Space and Astronomy
    • Solar System (http://www.academickids.com/encyclopedia/index.php/Solar_System)
    • Planets (http://www.academickids.com/encyclopedia/index.php/Planets)
  • Sports (http://www.academickids.com/encyclopedia/index.php/Sports)
  • Timelines (http://www.academickids.com/encyclopedia/index.php/Timelines)
  • Weather (http://www.academickids.com/encyclopedia/index.php/Weather)
  • US States (http://www.academickids.com/encyclopedia/index.php/US_States)

Information

  • Home Page (http://academickids.com/encyclopedia/index.php)
  • Contact Us (http://www.academickids.com/encyclopedia/index.php/Contactus)

  • Clip Art (http://classroomclipart.com)
Toolbox
Personal tools