His gift is that he can take something extrodinarily complex, and not only explain it in layman's terms but with respect to his audiences intelligence, with a little wit mixed in. Very hard to do.
Definitely knows his stuff on computer technology, in fact I know few people that know as much as I do. I often use his video's to explain stuff to people. Very handy.
The "German spy" was actually an agent -- Hans Thilo-Schmidt, who handed over the operating manual for the Heer version of Enigma, the Enigma 1, to French intelligence in 1931. He didn't defect, but continued to work as an agent until his arrest and execution by the Gestapo in 1943. He never handed over the actual device, which would have been quickly missed. The operating manual is a description of the procedures for using the device. It didn't describe the internals, particularly the rotor wirings (ie, the permutations) necessary as the first stage in breaking its code. French intelligence shared the information with the Poles and the English. Only the poles, in their three-man cipher bureau, were able to reconstruct the wirings using permutation algebra, with the reconstruction method also suggesting the Polish technique of breaking it.
Sending out the RAF to bomb specific targets in the hope of generating a message which contained specific coordinates they could then decrypt, was called "gardening".
And the weird thing about that is that the aircrew themselves referred to it as "gardening", although the majority probably thought of it in relation to the sowing of magnetic mines. Not that "gardening" was without its dangers as the aircraft frequently with new "sprog" crews, could often be intercepted and shot down.
What specific targets was the "RAF" capable of being sent out to "bomb" in 1939? How many "bombing" missions did the "RAF" fly during the "Phoney War"?
A few relatives and I at a family reunion were talking about our experiences, and one fellow in his early nineties told us something unexpected - during WWII he was stationed in Washington DC in a group working on decrypting the Enigma machine. For secrecy reasons he couldn't and didn't divulge anything, but it was interesting to learn he had worked on such an important project. He's gone now, nevertheless I will never forget that little bit of exposure.
The Poles had their own codes and cipher bureau. Biuro Szyfrow (Cipher Bureau) or BS for short. BS was based in Warsaw Poland. Last chapter of the1978 Brian Johnson book "The Secret War" is devoted to breaking the Enigma codes. Copy of the original Polish bomba sketched by Marian Rejewski is included. Jerzy Rozicki and Henryk Zygalski are also mentioned in the chapter.
Being from the USA and from growing up almost right next to the NCR facility that is referenced I would like to thank him for mentioning that. In sooo many of the videos and talk about the bombe, there is little to no comment about the USA's input into this effort. I am glad to see that the efforts here in the States and specifically in the NCR facility have not been totally forgotten.
This 2 part set is the very best scientific rundown of the enigma saga I've ever seen anywhere. Much more informative than the history channel program on the subject! Also, very good digital diagrams and charts showing the physical reality...
I live 15 minutes from Building 26 at NCR where Joseph Desch worked at NCR in conjunction with US Office of Intelligence to build Bombes and decode Enigma ciphers. He also developed some new techniques to speed up the process of decoding the messages by using his expertise in electronics development to add electronic systems in place of some mechanical components. Smart guy. The building was razed about 10 years ago. The building was purchased by Univ. Dayton and as the campus sits across the street from the building they used it to expand campus footprint. Desch also graduated from there. Despite the enigma eventually being cracked, its still a marvel of ingenuity and engineering for late 1930s technology. In many ways so complex, yet in other ways so simple by merely using the leverage of multipliers to increase "possible combinations". What does the military use now? Is it all sophisticated digital encryption such as a military grade version of SSL or PGP?
At the first minutes, I thought that he ridiculed Enigma, but a few minutes later I acknowledged that „military enigma“, esp. Navy enigma, was a tough target to break. Only by gathering code books from weather ships etc. it could be solved sometimes, while many messages remained encrpyted. I like that he gives credit to the Poles and Paul Alexander, who really deserve it for embracing on this quest.
Andrew Gleeson part 3: Trial over homosexuality, Chemical castration and self- ‘topping’ of Alan Turing. Handover of Bletchley and the computer industry to the USA and jubilation of the codebreakers with obscure awards and sworn secrecy until 1970s.
Absolutely fabulous videos. While understanding the math, you pull it all together in a fabulous presentation that is completely captivating. Well done!
The rebuilt Bombe machine is also at The National Museum of Computing NOT at the Bletchley Park museum. The two are next to each other but are different organisations.
That clumsiness, combined with the fact that he was experimenting with gold-plating spoons (a process which requires potassium cyanide) when he died, means that many people now believe Turing’s death was an accident rather than suicide. The apple that he supposedly laced with cyanide was never actually tested, and his symptoms were apparently more consistent with cyanide inhalation rather than ingestion.
That's overstating the case. The techniques used at Bletchley Park were invented at Bletchley Park. The techniques the Poles used became useless as the Germans changed the Enigma machine and procedures. The British bombe was a British design that operated on different principles than the bomba designed and used by the Poles, even though the name of the former was based on the name of the latter. The British had to continually reinvent the wheel. If they had only had the Polish techniques, no messages would have been decrypted during the war period. The four rotor uboat Enigma didn't even exist at the time that Poland was overrun. Breaking that machine was what saved Britain from being starved out of the war by having all their supply ships sunk. By getting into that code, they were able to keep their convoys much safer and get the vital supplies they needed. The Poles made no direct contribution to accomplishing that task. What the Poles did supply was the basic hardware design, the early techniques for the simpler machines and procedures and, possibly most importantly, the idea that spending resources trying to decrypt Enigma traffic was far from a colossal waste of time*. You've got to be in it to win it and the Poles proved that getting in it could pay off. * Apparently the Germans came to the conclusion that trying to break the British encryption would be a colossal waste of time and so never made a serious effort.
This yank thanks you. I now know what I can tell my dad about my great, great grandfather. He never understood why he was told that gg grandad said he helped build bombs and to tell no one. Thank you for deciphering this.
18:53 The Americans had their work cut out for them. They also had to work on deciphering Axis codes for the Pacific Theater of the War, which used the JN machines. Bletchley held that work at Hut 7. The reason the Americans also had to work on deciphering codes produced with those machines is because it was the Pacific Theater that got them into the war on December 7, 1941, “a date which will live in infamy,” i.e. the attack on Pearl Harbor.
Just to note, what kinda blows my mind.. is that the techniques even developed because of the machine was literally only gained because, before the war, a traitor betrayed the machine & handed it over. (which makes it all the more tragic honestly.. given why the war itself was sparked, and that the only success was gained from a turncoat. Giving the grounds of starting and a very solid direction to go with the encryption) One wonders what would have been made of the war if this exceptionally vital start wasn't gained so early.
I haven't quite watched the entire video yet, but I really want to hear from the German side at the time in this whole mess of cryptography and with what was going on to decrypt it by Allied forces.
They somewhat covered a few aspects from the German side at the time in previous videos, notably how the Navy didn't trust _anyone_, even their other military divisions like the army and airforce, and demanded more secure Enigma machines.
I always thought The Bombe was named that way for the same reason the first tank was named to sound like a water tank, so that if any eavesdroppers or spies overheard that there was work being done on a new "Bomb", they wouldn't think much of it. Its nonetheless interesting that it was actually named as a nod to the polish Bomba which itself has a lot of speculation about its name's origin.
Much of what went on was clouded, deliberately, by disinformation in order to hide the techniques used to decrypt messages. Even Turing's involvement was subject to this, apparently. It was only recently (turn of the millennium?) that the 'truth' of what they actually did was released. Even then, much was omitted or redacted. It is all fascinating stuff, especially as you never know which bits are true and which bits are skins of the onion.
What I read about the Polish Bomba was, that the name came from the sound that it made when it would stop on a configuration and drop something on the ground as a result
All these enigma videos are making me wonder just what the computational complexity of enigma actually is... Was it merely difficult for the time, or would you still struggle to decrypt it even with modern computer technology?
I think the key was as mentioned in the video, Letters will not represent themselves. Knowing that these days would be easy on a computer. Without knowing that it would take a lot more work.
The Enigma, in it´s best naval configuration without all the mistakes made by the german army, could still occupay a modern computer for a while. The keyspace was between 77 bit to 88 bit. The last few thousend enigma massages are still in the process of being decrypted. Btw. the german wikipedia article is gigantic if you speak german by chance :)
Well there's 2 different questions there. The computational complexity hasn't changed, and if you didn't have any ideas about heuristics (ie. this letter has % chance of appearing here) you would have to take some sort of brute force approach even today. The difference is that we can try it so frequent that it wouldn't take long on today's HW.
Regarding the loyal adherence to secrecy, I read in one book that a woman (name not remembered) went after the war to Buckingham Palace to get a decoration.. When the reason for the decoration had been read out, her husband said to her "So that's what you did in the war!"
Hugh Alexander went on, after the war, to be head of section 'H' at GCHQ. Those were the Russian-code breakers. He was their top cryptanalyst. Read Peter Wrights 'Spycatcher'. It's fascinating. (Although, take his suspicions about Roger Hollis with a pinch of salt. He got it wrong there.)
Fascinating. I never knew America was involved in decrypting enigma messages. And what a shame Enigma was kept a secret for so long, the participants couldn't be interviewed and their work recognized. Because winning WW2 where 70 million died and made what the world it is today, is a big deal.
The reason for keeping it top secret for the next 40-50 years was that many of the techniques developed at Bletchley were just as important during the cold war. The need for secrecy didn't just end in 1945.
I can't find any information about the underwater cable mentioned at the end of the video and used to "submit" jobs to other machines running in the USA. It sounds really interesting.
hmmm it almost feels like they were doing some sort of quantum cryptanalysis with those perforated sheets.. by sliding them over each other, checking every combination simultaneously
I think primitive salting came along much later in the war. Since they didn't know their code was being read they didn't have the incentive/data to figure out how to make it stronger in that way. If they knew the British techniques, that would have given them a big boost in protecting against it.
It was named after an Italian ice cream. However, there was some concern that using the "bombe" name might lead to the Germans assuming they were producing the A-bomb at Bletchley.
***** How about doing another video on the "Geheimfernschreiber" (Siemens & Halske T52) which was an even more complex crypto machine used by the Germans and cracked by Swedish mathematician and cryptographer Arne Beurling in 2 weeks using pen and paper? The story of the Enigma is well known but I think the story of "G-skrivaren" deserves a bit more recognition than it currently receives. =)
I think this is the machine that Bletchley Park referred to as "Sturgeon" ? I think BP spent some time on it but concluded that there was a much bigger quantity of useful intelligence from regular Lorenz machine traffic. Sean and I have got Lorenz and Colossus firmly on our "to do" list.
ProfDaveB Yes apparently most of the information the allies could intercept that was sent using this machine was also sent via the enigma so not worth the effort. The information sent to Norway via lines through Sweden was useful for Sweden and Finland (and Russia due to a leak). The fact that Beurling cracked it in two weeks without having any information other than the encrypted messages to go on is rather amazing. It is also a rather interesting encryption technique and apparently the most complex used by the Germans if the article on Wikipedia is to be believed.
the approach from the staff of bletchley park, regarding the cracking of the enigma, was brilliant indeed . which were the cryptographic methods that the allies were using to transfer their messages ???? were the germans trying to break them ???
The British made a machine called "Typex", which was also based on the pre-wartime commercial Enigma. It was more secure, and easier to use because it printed the encoded message directly onto tape, instead of having to copy it down. The Germans made some attempts at cracking it, but apparently gave up, thinking it was too complicated.
Alpharius Omegon No, hashes are a different kind of cryptography compared to the cyphertext generated via DES or AES. Unlike cyphertext, hash generation cannot be reversed back into plaintext. The process of hashing causes pieces of the plaintext data to be truncated (lost) and pieces are added to the resultant text to ensure that all hashes generated are of equal length. Hashes are a little more complicated, and because of the rules that are changed, hashes have different purpose, strengths, and weaknesses.
Fascinating. The Japanese codes were also cracked, what coding method did they use? And what codes did the allies use and did the German's try to crack them? Or did the allies just use carrier pigeons?
There were a number of planned pinches like that weather reporting ship, another was during a Commando raid in Norway I think. Plus the occasional pinch from a sinking U-Boat. The ships and U-Boats would carry books with the rotor settings for two months so if they could be captured early then it could give a way into the settings for up to about a month and a half.
I got confused about the rotor count - last video it was said that the naval enigma eventually had eight rotors to choose three from. Now the prof says there were three and four rotor "huts". So the naval version had four rotors inside it? Or to choose from? The method that Turing (working in the "four rotor hut") came up with helped to see what the first two rotors were, and the third could be left to the bomb to solve. But shouln't they have been working on that four rotor version?
German Navy Enigma used 3 rotors chosen from 8 for general cipher traffic. The 4-rotor version was introduced for U-boats . The 4th rotor was different from the rest and consisted of a thin rotor combined with a modified version of the reflector block. If you use your search engine to find "Wikipedia Cryptanalysis of Enigma" you'll find all the details in section 5.10 of that article.
Correct me if I am wrong but it doesn't actually seem to me that the plug board would add that much security. It seems that it would be susceptible to simple frequency analysis.
MrGoatflakes [Edited] If you know the rotor settings then adding the plug board does nothing that can't be cracked in a few seconds by frequency analysis. But the very point of the rotors is that by constantly moving they prevent frequency analysis - the length of the swap cipher is effectively longer than the message. But the rotors are a known design and are mechanically limited, so if you combined looking for key words, or some other trick, with the known rotor constructions, then you could conceivably lock onto the correct rotor settings without using frequency analysis. What the plug board does is simply multiply up the number of outputs that any one rotor setting can produce, thus making it hugely harder to deduce which rotors and settings have been used. So it has the rotors preventing frequency analysis and the plug board providing big number permutations.
chrisofnottingham right, so in theory all you have to do is try a rotor setting and then subject it to frequency analysis and see if it matches the frequency analysis of normal traffic, then you know you have the right or near right rotor setting, but in practice you have to do this after you have tried each setting, so it isn't practical. Or at least that's how I interpreted that :p
MrGoatflakes I think that's right (tho I'm no expert). Bearing in mind the computing power available at the time, it meant that you couldn't just try rotor settings until German text came out, you needed to do another layer of processing every time.
Manually going after the Enigma -- Ha! you had better chances of shining a laser into the night's sky, hitting an alien and expecting him to shine one back at you.
"so we would send the menu to the Americans and they would load menu on their bombe and give us the result. I guess you would call them programs now." Computers running programs before we had words for them.
Assuming Hans-Milo Schmidt handed over the Wehrmacht version's operating manual to French in 1931, they still break it. If the Germans had managed to keep the internals a secret for the entire war, then probably no. But for most variants, machines and cryptographic materials were eventually captured, even for the jealously guarded U-boat enigma variant (U-571). But as a complete black-box, it would have been very difficult without "pinches" (captured material) and waiting for pinches would have slowed down the allies considerably.
Excellent video, well explained. The mind boggles how a group of people can think up of a mchine like that that can work out the codes without computers, internet or calculators. There weren't half some clever folk back then The worlds first digital programmable computer, a British invention The Jet engine, a British invention The world wide web, a British invention.
That's not really as weird as it seems. Circa 1930 the UK was one of the main global powers ie it had a lot of resources and a lot of people. The statistical probability that either the UK or the US would be first was always higher than say Portugal. It makes perfect sense considering the resources available.
before ww2 French, Brits and Soviets tried to break enigma code. Without any success. Poles cracked enigma and they laid down blueprints to Turing's invention.
By watching this, I've started being more interested in what the Allies, or in this case the British, were using to cipher their messages. All the captured german messages had to come back to the Bletchley park eventually. How? Was there a parallel Allied enigma machine?
Primarily they used dispatch riders between the y stations (radio intercept stations) and station x (Bletchley). This cut down on the risk of anyone noticing "strange" communications between the locations.
Thomas, that perhaps is correct for that particular case, but my question was more in global terms. How did the Alias communicate with their forces? They could not dispatch riders to talk to their submarines ;) They had to have some kind of cipher on their own...
***** Sorry I misunderstood. There were various machines used by the different allied powers the British used a "super enigma" (though it differed substantially) that was able to encode a number as its self called i think the x machine. What was used depended on the "level" of the communication, at the bottom end they used simple substitution ciphers, code books etc. There is some good stuff on Wikipedia that links from the enigma/bletchley pages.
MichaelKingsfordGray The book he is talking about is most certainly "The code book", by Simon Singh. I do recommend it, it explains the history of cryptography in a very divulgative manner.
If the germans send in the beginning and the end of the message a random number larger than 24 of random characters wouldn't that made it almost impossible to crack?
I could listen to this man speak on any subject for hours
His gift is that he can take something extrodinarily complex, and not only explain it in layman's terms but with respect to his audiences intelligence, with a little wit mixed in. Very hard to do.
Extremely charming. Makes working from home difficult :)
You're easily impressed.
Professor Brailsford Is a fantastic narrator. I love his enthusiasm!
Definitely knows his stuff on computer technology, in fact I know few people that know as much as I do. I often use his video's to explain stuff to people. Very handy.
He has the priceless gift of distilling information down without dumbing it down.
The "German spy" was actually an agent -- Hans Thilo-Schmidt, who handed over the operating manual for the Heer version of Enigma, the Enigma 1, to French intelligence in 1931. He didn't defect, but continued to work as an agent until his arrest and execution by the Gestapo in 1943. He never handed over the actual device, which would have been quickly missed.
The operating manual is a description of the procedures for using the device. It didn't describe the internals, particularly the rotor wirings (ie, the permutations) necessary as the first stage in breaking its code. French intelligence shared the information with the Poles and the English. Only the poles, in their three-man cipher bureau, were able to reconstruct the wirings using permutation algebra, with the reconstruction method also suggesting the Polish technique of breaking it.
Great info!
Thank you
Also worth noting: Hans was sort of the black sheep of the family, and his more successful brother got him the job
that it took the Gestapo until 1943 to find the spy is testament to their ineffectiveness.
The Polish did amazingly well in decrypting some of the Enigma code with only one machine.
Sending out the RAF to bomb specific targets in the hope of generating a message which contained specific coordinates they could then decrypt, was called "gardening".
And the weird thing about that is that the aircrew themselves referred to it as "gardening", although the majority probably thought of it in relation to the sowing of magnetic mines. Not that "gardening" was without its dangers as the aircraft frequently with new "sprog" crews, could often be intercepted and shot down.
What specific targets was the "RAF" capable of being sent out to "bomb" in 1939? How many "bombing" missions did the "RAF" fly during the "Phoney War"?
Are you implying that the first world war did not happen?
Mark Fryer nn
Kinda reminds me of Joe Rochford sending out the clear text about the water purifier on Midway.
A few relatives and I at a family reunion were talking about our experiences, and one fellow in his early nineties told us something unexpected - during WWII he was stationed in Washington DC in a group working on decrypting the Enigma machine. For secrecy reasons he couldn't and didn't divulge anything, but it was interesting to learn he had worked on such an important project. He's gone now, nevertheless I will never forget that little bit of exposure.
I'm really glad that Professor Brailsford mentioned about Poles
The Poles had their own codes and cipher bureau. Biuro Szyfrow (Cipher Bureau) or BS for short. BS was based in Warsaw Poland. Last chapter of the1978 Brian Johnson book "The Secret War" is devoted to breaking the Enigma codes. Copy of the original Polish bomba sketched by Marian Rejewski is included. Jerzy Rozicki and Henryk Zygalski are also mentioned in the chapter.
love listening to this guy speak
Being from the USA and from growing up almost right next to the NCR facility that is referenced I would like to thank him for mentioning that. In sooo many of the videos and talk about the bombe, there is little to no comment about the USA's input into this effort. I am glad to see that the efforts here in the States and specifically in the NCR facility have not been totally forgotten.
where was the NCR facility???
@@josephbrady6760 Dayton, Ohio
This video is about 1 hour too short, i love this professor
To find a man that can explain this in such detail and order .... This guy is a genius and such a great guy ! TY
This 2 part set is the very best scientific rundown of the enigma saga I've ever seen anywhere. Much more informative than the history channel program on the subject! Also, very good digital diagrams and charts showing the physical reality...
I live 15 minutes from Building 26 at NCR where Joseph Desch worked at NCR in conjunction with US Office of Intelligence to build Bombes and decode Enigma ciphers. He also developed some new techniques to speed up the process of decoding the messages by using his expertise in electronics development to add electronic systems in place of some mechanical components. Smart guy. The building was razed about 10 years ago. The building was purchased by Univ. Dayton and as the campus sits across the street from the building they used it to expand campus footprint. Desch also graduated from there. Despite the enigma eventually being cracked, its still a marvel of ingenuity and engineering for late 1930s technology. In many ways so complex, yet in other ways so simple by merely using the leverage of multipliers to increase "possible combinations". What does the military use now? Is it all sophisticated digital encryption such as a military grade version of SSL or PGP?
I think you'll find that Enigma IS a digital encryption system.
Professor Brailsford is the David Attenborough of computing what an amazing gentleman!
At the first minutes, I thought that he ridiculed Enigma, but a few minutes later I acknowledged that „military enigma“, esp. Navy enigma, was a tough target to break. Only by gathering code books from weather ships etc. it could be solved sometimes, while many messages remained encrpyted. I like that he gives credit to the Poles and Paul Alexander, who really deserve it for embracing on this quest.
Fantastic telling of a great story. Can't wait for part 3.
Andrew Gleeson part 3: Trial over homosexuality, Chemical castration and self- ‘topping’ of Alan Turing. Handover of Bletchley and the computer industry to the USA and jubilation of the codebreakers with obscure awards and sworn secrecy until 1970s.
Absolutely fabulous videos. While understanding the math, you pull it all together in a fabulous presentation that is completely captivating. Well done!
Thank you very much for the correct explanation of the history of Enigma.
More long two part episodes, please. I love these 15+ minute videos.
Who on this earth would 'thumbs down' this video?! Aliens?! Brady, your work is top notch and Professor Brailsford is just awesome.
Sorry, Sean Riley! Actually your work!
Superb presentation of the facts. Such an impressive effort and rich history. Thank you.
Listening to this man speak is a delight
*****, whatever you've done in your shooting with Prof.B. looks really good; props!
I could listen to this guy all day, everyday
Thank you for this series on "Enigma" professor Brailsford! :)
Beautifully presented, and reasonably intelligible to non mathematicians like me...thankyou!
Wonderful description, fascinating style of delivery, fantastic video. More pls!
wonderful video...I could listen to Professor Brailsford all day.
the national museum of computing an Bletchley is an amazing place to visit, seeing colossus in action is mind blowing
The rebuilt Bombe machine is also at The National Museum of Computing NOT at the Bletchley Park museum. The two are next to each other but are different organisations.
That clumsiness, combined with the fact that he was experimenting with gold-plating spoons (a process which requires potassium cyanide) when he died, means that many people now believe Turing’s death was an accident rather than suicide. The apple that he supposedly laced with cyanide was never actually tested, and his symptoms were apparently more consistent with cyanide inhalation rather than ingestion.
It’s amazing that some of this information was still declassified until 2010!
RESPECT to Simon Singh who told me about these things years ago also. Love the book.
Appreciate the details, that you gave the graphics enigma a German keyboard.
@1:45--If you didn't catch it, Polish intelligence was very much responsible for the success and later notoriety of Bletchley Park.
That's overstating the case. The techniques used at Bletchley Park were invented at Bletchley Park. The techniques the Poles used became useless as the Germans changed the Enigma machine and procedures. The British bombe was a British design that operated on different principles than the bomba designed and used by the Poles, even though the name of the former was based on the name of the latter. The British had to continually reinvent the wheel. If they had only had the Polish techniques, no messages would have been decrypted during the war period. The four rotor uboat Enigma didn't even exist at the time that Poland was overrun. Breaking that machine was what saved Britain from being starved out of the war by having all their supply ships sunk. By getting into that code, they were able to keep their convoys much safer and get the vital supplies they needed. The Poles made no direct contribution to accomplishing that task.
What the Poles did supply was the basic hardware design, the early techniques for the simpler machines and procedures and, possibly most importantly, the idea that spending resources trying to decrypt Enigma traffic was far from a colossal waste of time*. You've got to be in it to win it and the Poles proved that getting in it could pay off.
* Apparently the Germans came to the conclusion that trying to break the British encryption would be a colossal waste of time and so never made a serious effort.
Felt like listening to your old granpa talking about "My time". Very interesting series!
Alan Turing is my hero! Big fan of computation theory too
I could listen to him talk all day.
Wow, Alan Turing is truly a hero! I bet he was rewarded well for his very important role in the war! :/
Well, they did About the opposite of that :/
I would not recommend betting on that.
He was prosecuted as a homosexual after the war. The whole enigma story was secret until the 1970's.
Mark Mayonnaise he topped himself, after being prosecuted.
@@StephenButlerOne and chemically castrated.
Can't wait for the Colossus video(s)!
This yank thanks you. I now know what I can tell my dad about my great, great grandfather. He never understood why he was told that gg grandad said he helped build bombs and to tell no one. Thank you for deciphering this.
Very interesing dicussion. My thanks to those who developed the video.
18:53 The Americans had their work cut out for them. They also had to work on deciphering Axis codes for the Pacific Theater of the War, which used the JN machines. Bletchley held that work at Hut 7. The reason the Americans also had to work on deciphering codes produced with those machines is because it was the Pacific Theater that got them into the war on December 7, 1941, “a date which will live in infamy,” i.e. the attack on Pearl Harbor.
Just to note, what kinda blows my mind.. is that the techniques even developed because of the machine was literally only gained because, before the war, a traitor betrayed the machine & handed it over.
(which makes it all the more tragic honestly.. given why the war itself was sparked, and that the only success was gained from a turncoat. Giving the grounds of starting and a very solid direction to go with the encryption)
One wonders what would have been made of the war if this exceptionally vital start wasn't gained so early.
The last few minutes describe what's basically distributed computing, decades before arpanet was in anyone's dreams
I haven't quite watched the entire video yet, but I really want to hear from the German side at the time in this whole mess of cryptography and with what was going on to decrypt it by Allied forces.
Yeah, that would be an interesting video.
They somewhat covered a few aspects from the German side at the time in previous videos, notably how the Navy didn't trust _anyone_, even their other military divisions like the army and airforce, and demanded more secure Enigma machines.
GothAlice, I want to go beyond that and into detail on what their suspicions where, why, and how they came to be for example :)
I'm sure they would have been more paranoid than that? Maybe not naval, but definitely air-force and army.
mPky1, good point ;) But to be fair, I'm only going by what he has spoken of in the videos. I do not know him as an individual.
Insanely smart.
How the world would seem like a weird place for people like Alan Turing.
What a team.
I always thought The Bombe was named that way for the same reason the first tank was named to sound like a water tank, so that if any eavesdroppers or spies overheard that there was work being done on a new "Bomb", they wouldn't think much of it. Its nonetheless interesting that it was actually named as a nod to the polish Bomba which itself has a lot of speculation about its name's origin.
Much of what went on was clouded, deliberately, by disinformation in order to hide the techniques used to decrypt messages. Even Turing's involvement was subject to this, apparently. It was only recently (turn of the millennium?) that the 'truth' of what they actually did was released. Even then, much was omitted or redacted. It is all fascinating stuff, especially as you never know which bits are true and which bits are skins of the onion.
What I read about the Polish Bomba was, that the name came from the sound that it made when it would stop on a configuration and drop something on the ground as a result
The professor is very interesting!
He must be from the same area as the actor who plays Dr. Mallard on NCIS!
All these enigma videos are making me wonder just what the computational complexity of enigma actually is...
Was it merely difficult for the time, or would you still struggle to decrypt it even with modern computer technology?
It would be child play nowadays
I think the key was as mentioned in the video, Letters will not represent themselves. Knowing that these days would be easy on a computer. Without knowing that it would take a lot more work.
The Enigma, in it´s best naval configuration without all the mistakes made by the german army, could still occupay a modern computer for a while. The keyspace was between 77 bit to 88 bit. The last few thousend enigma massages are still in the process of being decrypted. Btw. the german wikipedia article is gigantic if you speak german by chance :)
Well there's 2 different questions there. The computational complexity hasn't changed, and if you didn't have any ideas about heuristics (ie. this letter has % chance of appearing here) you would have to take some sort of brute force approach even today.
The difference is that we can try it so frequent that it wouldn't take long on today's HW.
"Write a program to break Enigma" is a pretty normal exercise for an undergraduate cryptography course these days.
Regarding the loyal adherence to secrecy, I read in one book that a woman (name not remembered) went after the war to Buckingham Palace to get a decoration.. When the reason for the decoration had been read out, her husband said to her "So that's what you did in the war!"
Hugh Alexander went on, after the war, to be head of section 'H' at GCHQ. Those were the Russian-code breakers. He was their top cryptanalyst. Read Peter Wrights 'Spycatcher'. It's fascinating. (Although, take his suspicions about Roger Hollis with a pinch of salt. He got it wrong there.)
Fascinating. I never knew America was involved in decrypting enigma messages. And what a shame Enigma was kept a secret for so long, the participants couldn't be interviewed and their work recognized. Because winning WW2 where 70 million died and made what the world it is today, is a big deal.
The reason for keeping it top secret for the next 40-50 years was that many of the techniques developed at Bletchley were just as important during the cold war. The need for secrecy didn't just end in 1945.
I can't find any information about the underwater cable mentioned at the end of the video and used to "submit" jobs to other machines running in the USA. It sounds really interesting.
hmmm it almost feels like they were doing some sort of quantum cryptanalysis with those perforated sheets.. by sliding them over each other, checking every combination simultaneously
Thank you for posting this - such important history.
#TakeThat!
Inputting "salt" and already coded messages (attack=foo, retreat=boo) could screw the encoding business...
id imagine they did.
I think primitive salting came along much later in the war. Since they didn't know their code was being read they didn't have the incentive/data to figure out how to make it stronger in that way. If they knew the British techniques, that would have given them a big boost in protecting against it.
The Japanese did from the start. They enciphered codes... that was part of the problem in that you had to crack the cypher and then the codes.
Utterly mind blowing.
This is fascinating history trivia, goodness
"bomba" in Polish is just "a bomb" in English ;) Just saying. Great material. Thanks!
It was named after an Italian ice cream. However, there was some concern that using the "bombe" name might lead to the Germans assuming they were producing the A-bomb at Bletchley.
Do i have ocd ?? I just kept looking at his shirt collar out of the sweater and thinking about putting it in ..
I call it CDO, it must be in alphabetical order or I get a twitch.
Spoiler alert sßs
I was hoping he would fix that collar......
I love the Raspberry Pi bear in the both Computerphile Enigma videos!
"The Secret in Building 26" is a great book on NCR's Bombe program!
Excellent stuff, found out several things I didn't know!
***** How about doing another video on the "Geheimfernschreiber" (Siemens & Halske T52) which was an even more complex crypto machine used by the Germans and cracked by Swedish mathematician and cryptographer Arne Beurling in 2 weeks using pen and paper? The story of the Enigma is well known but I think the story of "G-skrivaren" deserves a bit more recognition than it currently receives. =)
I think this is the machine that Bletchley Park referred to as "Sturgeon" ? I think BP spent some time on it but concluded that there was a much bigger quantity of useful intelligence from regular Lorenz machine traffic. Sean and I have got Lorenz and Colossus firmly on our "to do" list.
ProfDaveB Yes apparently most of the information the allies could intercept that was sent using this machine was also sent via the enigma so not worth the effort. The information sent to Norway via lines through Sweden was useful for Sweden and Finland (and Russia due to a leak). The fact that Beurling cracked it in two weeks without having any information other than the encrypted messages to go on is rather amazing. It is also a rather interesting encryption technique and apparently the most complex used by the Germans if the article on Wikipedia is to be believed.
is there a video you can point to anywhere?
@@profdaveb6384 - Thank you so much for producing these videos.
wow. amazing. thank you for sharing this history.
the approach from the staff of bletchley park, regarding the cracking of the enigma, was brilliant indeed . which were the cryptographic methods that the allies were using to transfer their messages ???? were the germans trying to break them ???
The British made a machine called "Typex", which was also based on the pre-wartime commercial Enigma. It was more secure, and easier to use because it printed the encoded message directly onto tape, instead of having to copy it down.
The Germans made some attempts at cracking it, but apparently gave up, thinking it was too complicated.
I love these videos, thank you very much.
“I don’t know allow the details,”
Great! Then logically I’ll know even less!
Forgive my naive question: Is that machine essentially doing the same thing as mining for Bitcoin on SHA-256?
Alpharius Omegon No, hashes are a different kind of cryptography compared to the cyphertext generated via DES or AES. Unlike cyphertext, hash generation cannot be reversed back into plaintext. The process of hashing causes pieces of the plaintext data to be truncated (lost) and pieces are added to the resultant text to ensure that all hashes generated are of equal length. Hashes are a little more complicated, and because of the rules that are changed, hashes have different purpose, strengths, and weaknesses.
At 5:20 the professor says "Alan" instead of Andrew (Hodges)
Truly Fascinating stuff.
Excellent video
"Bomba" - a bomb in Slavic languages. I imagine someone asked a guy what he caries and to be secretive and keep inquisitive guy away he said "bomba".
Fascinating. The Japanese codes were also cracked, what coding method did they use? And what codes did the allies use and did the German's try to crack them? Or did the allies just use carrier pigeons?
Everyone used rotor machines at that time for their high level codes. They were the state of the art in cryptography.
What the documentary does not say is that the british raided a weather ship and took a enigma machine.
There were a number of planned pinches like that weather reporting ship, another was during a Commando raid in Norway I think. Plus the occasional pinch from a sinking U-Boat. The ships and U-Boats would carry books with the rotor settings for two months so if they could be captured early then it could give a way into the settings for up to about a month and a half.
Yes, they already had working copies of the machines. What was most valuable were the code books.
Love these videos, but the colour correction on this one is *greeeeeeen*!
He's probably in the Matrix.
John von Horn At least that's where you _think_ you're from ;)
It ain't easy being green!
Nice film great story
Respect for Poles! Good chap
I see...said the blind man.
Subscribed!
I got confused about the rotor count - last video it was said that the naval enigma eventually had eight rotors to choose three from. Now the prof says there were three and four rotor "huts". So the naval version had four rotors inside it? Or to choose from? The method that Turing (working in the "four rotor hut") came up with helped to see what the first two rotors were, and the third could be left to the bomb to solve. But shouln't they have been working on that four rotor version?
German Navy Enigma used 3 rotors chosen from 8 for general cipher traffic. The 4-rotor version was introduced for U-boats . The 4th rotor was different from the rest
and consisted of a thin rotor combined with a modified version of the reflector block. If you use your search engine to find "Wikipedia Cryptanalysis of Enigma" you'll find all the details in section 5.10 of that article.
ProfDaveB
Ah, so the 4th rotor was not like the others. Thanks for the answer prof!
@@luppa79 For one thing, it didn't rotate.
how does Professor Brailsford remember all of these stories? he even remembers names and dates
I suspect he loves history as much as maths... especially when it involves maths.
@Iafiv Iv Agreed, the dates and figures don't come to you overnight but it helps if you are passionate about the subject.
Correct me if I am wrong but it doesn't actually seem to me that the plug board would add that much security. It seems that it would be susceptible to simple frequency analysis.
MrGoatflakes [Edited]
If you know the rotor settings then adding the plug board does nothing that can't be cracked in a few seconds by frequency analysis. But the very point of the rotors is that by constantly moving they prevent frequency analysis - the length of the swap cipher is effectively longer than the message.
But the rotors are a known design and are mechanically limited, so if you combined looking for key words, or some other trick, with the known rotor constructions, then you could conceivably lock onto the correct rotor settings without using frequency analysis.
What the plug board does is simply multiply up the number of outputs that any one rotor setting can produce, thus making it hugely harder to deduce which rotors and settings have been used. So it has the rotors preventing frequency analysis and the plug board providing big number permutations.
chrisofnottingham right, so in theory all you have to do is try a rotor setting and then subject it to frequency analysis and see if it matches the frequency analysis of normal traffic, then you know you have the right or near right rotor setting, but in practice you have to do this after you have tried each setting, so it isn't practical. Or at least that's how I interpreted that :p
MrGoatflakes I think that's right (tho I'm no expert). Bearing in mind the computing power available at the time, it meant that you couldn't just try rotor settings until German text came out, you needed to do another layer of processing every time.
Manually going after the Enigma -- Ha! you had better chances of shining a laser into the night's sky, hitting an alien and expecting him to shine one back at you.
"so we would send the menu to the Americans and they would load menu on their bombe and give us the result.
I guess you would call them programs now."
Computers running programs before we had words for them.
Great episode!
Thank you for this video
The lightbuoy pinch was "Erloschen ist Leuchttonne".
I have to wonder, if there hadn't been a "civilian" version available demonstrating the fundamentals of the machine, would they EVER have cracked it?
Assuming Hans-Milo Schmidt handed over the Wehrmacht version's operating manual to French in 1931, they still break it. If the Germans had managed to keep the internals a secret for the entire war, then probably no. But for most variants, machines and cryptographic materials were eventually captured, even for the jealously guarded U-boat enigma variant (U-571). But as a complete black-box, it would have been very difficult without "pinches" (captured material) and waiting for pinches would have slowed down the allies considerably.
Yep. They (Bletchley) worked out the function of the much more complex 'lorenz' cipher without ever having seen a physical example of it.
Excellent video, well explained. The mind boggles how a group of people can think up of a mchine like that that can work out the codes without computers, internet or calculators. There weren't half some clever folk back then
The worlds first digital programmable computer, a British invention
The Jet engine, a British invention
The world wide web, a British invention.
That's not really as weird as it seems. Circa 1930 the UK was one of the main global powers ie it had a lot of resources and a lot of people. The statistical probability that either the UK or the US would be first was always higher than say Portugal. It makes perfect sense considering the resources available.
Thank you!
before ww2 French, Brits and Soviets tried to break enigma code. Without any success. Poles cracked enigma and they laid down blueprints to Turing's invention.
Crazy to think that could computing goes back to WWII.
Have a look at what Babbage proposed for his second machine and his programmer Ada Lovelace.
Fantastic. Sadly can’t get ‘extra bits ‘ to open.
He used proper Polish pluralization, too!
This guy's pretty cool.
Actually he didn't. One bomba, two bomby, six bomb, sixty bomb. "Bomby" is only for 2-4.
imagine how many nsa flags go off as you watch this video.... "bomb"! xD
bomb....pressure in Poland.... polish bomber.....
and then think about the machine used to break enigma....
thats too much for my math skills
It's the DHS that looks for keywords, and “bomb” is one of them.
The NSA uses a spam filter.
I think born of the NSA was when UK shared their information about Enigma. Too lazy to Google this.
I think 30,000 of the views of this video were actually NSA agents - because cracking the Enigma is like the pinacle of Intelligence Agency history.
By watching this, I've started being more interested in what the Allies, or in this case the British, were using to cipher their messages. All the captured german messages had to come back to the Bletchley park eventually. How?
Was there a parallel Allied enigma machine?
Primarily they used dispatch riders between the y stations (radio intercept stations) and station x (Bletchley). This cut down on the risk of anyone noticing "strange" communications between the locations.
Thomas, that perhaps is correct for that particular case, but my question was more in global terms.
How did the Alias communicate with their forces? They could not dispatch riders to talk to their submarines ;)
They had to have some kind of cipher on their own...
***** Sorry I misunderstood. There were various machines used by the different allied powers the British used a "super enigma" (though it differed substantially) that was able to encode a number as its self called i think the x machine. What was used depended on the "level" of the communication, at the bottom end they used simple substitution ciphers, code books etc. There is some good stuff on Wikipedia that links from the enigma/bletchley pages.
Thomas Newberry Sorry, make that the "Type X" machine
MichaelKingsfordGray
The book he is talking about is most certainly "The code book", by Simon Singh. I do recommend it, it explains the history of cryptography in a very divulgative manner.
If the germans send in the beginning and the end of the message a random number larger than 24 of random characters wouldn't that made it almost impossible to crack?
Never really understood why machine did not change an A into an A
Thank you i want more!!!
Imagine solving this without a computer. What a pain-in-the-ass