The Enigma Code

Поділитися
Вставка
  • Опубліковано 31 січ 2010
  • An elementary introduction to the way the famous Enigma code used by the Germans during WWII. David Perry explains some of the history and the mathematics behind the code.
    This is part of an outreach program
    sponsored by NSF-VIGRE at UC Davis.

КОМЕНТАРІ • 334

  • @billdomb
    @billdomb Рік тому +3

    There are LOTS of lectures/vids on Enigma, but this is the BEST to understand the real decoding process.

  • @uiscepreston
    @uiscepreston 2 роки тому +4

    This guy is a trooper, holding his tie up for an hour.

  • @jimbond8927
    @jimbond8927 7 років тому +10

    This is quite helpful. I have read and seen a great deal about the cracking of the Enigma; this video helped me to understand the challenges and the breakthroughs of Turing and his colleagues.

  • @WJack97224
    @WJack97224 5 років тому +9

    Excellent talk. Thank you David Perry. Good on ya mate. And thanks for posting this lecture.

  • @KipIngram
    @KipIngram 3 місяці тому

    Oh man - you didn't even mention the other big weakness: no letter can ever possibly map to itself. That was very important too.

  • @cumberland1234
    @cumberland1234 2 роки тому +4

    Brilliant explanation, I have wondered for a long time how these machines work, most videos I’ve seen don’t go as in depth. Thanks for uploading.

  • @Varianna12
    @Varianna12 9 років тому +1

    Super course! Have been waiting for this.

  • @kupfeli
    @kupfeli 2 роки тому +5

    This is an awesome explanation! Only things missing (which are important details) are the ring-settings which determine when a rotor steps and the double-stepping mechanism. A normal odometer triggers the next ring after it gets to zero again, so at the 10th click (starting at 0). Using the ring-settings of an Enigma rotor you can change when this triggering of the next rotor starts, which makes for even more combinations. Apart from that we also have something called double-stepping which is a flaw of the mechanical setup of the rotor rotation mechanism using ratchets and pawls. When the second rotor rotates a click, the first one will too and the same is the case for the third rotor (near the reflector), so basically there are a few ring-settings less (for instance: if the second rotor steps, the first will too, but that means the possibility of only the second rotor is stepped is not there DURING encryption. In initial setup that setting is there). You need to have an actual Enigma mechanism to understand this.
    The number of non-used ring-settings is very small, so you can basically neglect it, or maybe not? Maybe, you can even find out the ring-settings because of this double-stepping flaw. Each flaw is a potential attack vector.
    I love the Enigma and basically all mechanical encryption devices. I dont like digital encryption, for the sake of liking a specific type of technology. Digital encryption is mechanical too in a sense, as a switch is an implementation of an abstract mechanical principle basically, a seesaw mechanism. As a transistor is a switch, we can conclude that a processor is mechanical. The fact the seesaw mechanism is driven by electrons and doesnt make it any different.
    Wait for quantum encryption where we really have non-mechanical concepts, like a situation where a switch can simultaneously be in a on and off position, this is not possible for an abstract switch definition being either on/off, hence our current computers are simply fast mechanical systems and the real next leap and change is quantum mechanics (where as I stated, mechanics is not a correct term, I would use quantum system for instance).

  • @richardball8365
    @richardball8365 2 роки тому +7

    Cryptologic mathematician at the NSA. Clearly very clever indeed. But doesn't think to simply clip the microphone further up his tie. It's interesting how great minds work!

    • @frederickbowdler8169
      @frederickbowdler8169 Рік тому

      Or take a hammer to the enigma we should just have jammed German radio from beginning of the war with cheap jazz music drive em crazy.

    • @stargazer7644
      @stargazer7644 5 днів тому

      Farther up his tie is still under his chin. He's holding the mic in front of his mouth.

  • @cooldawg2009
    @cooldawg2009 3 роки тому +9

    This was amazing, thank you so much. And thanks for keeping the mood very light, it made your explanations that much easier to follow

  • @BuddhatheBlackDog
    @BuddhatheBlackDog 9 років тому +8

    Good job David Perry.

  • @adriaansmit4389
    @adriaansmit4389 10 років тому +93

    I thought he was joking when he said that he would be going to hold his tie up during that whole lecture

    • @LightningJackFlash
      @LightningJackFlash 5 років тому +3

      Hahah I thought that too :) But then he actually does that throughout the whole lecture :P Isn't that sweet of him? :P I watched this for the first time in 2010.... It had about 1000 views then. now it's 1/3rd of a million.

    • @Torchl146
      @Torchl146 2 роки тому +4

      bro didn't you listen hes a cryptologic mathematician he likes complex solutions and doesn't live in the real world that much :D

  • @Tsynique
    @Tsynique 9 років тому +9

    There was one more variable in the Enigma. The operator also had to set up at which rotor position would it advance the next rotor. Not necessarily Z moves the next rotor but maybe A or G, etc. Maybe that was in one of the improved versions of the Enigma but either way it added a whole lot more keys to it.

  • @asd36f
    @asd36f 5 років тому

    The Powerhouse Museum in Sydney has an Enigma machine, and 20 odd years I was able to visit the storage area and have a closer look at it - as a WW2 buff, it was a great thrill!

  • @Rachel-Pham
    @Rachel-Pham Рік тому

    ive been recommended this for a reason

  • @alanthomas8836
    @alanthomas8836 10 років тому +16

    The U-571 mentioned and listed on the board was the name of the eponymous U-boat in the movie released in 2000. However the real U-571 was never captured by the Allies, nor was her Enigma Machine ever taken. The events in the film are loosely based on the British capture of U-110 and her Enigma and cipher keys.

    • @carpy1970
      @carpy1970 6 років тому +2

      Also completely missed out that the Polish only managed to crack the German army and airforce enigma transmissions (they couldn't decrypt navy transmissions), and that their methods of cracking it become unusable 6 months later when the Germans changed their encryption procedures. While Turing and the British did gain information from the Polish, they created a new method of hacking the transmissions that was useable to decrypt German navy transmissions and also still worked after the germans changed their procedures.
      I guess this is the usual case of mericans wanting to gloss over the fact that the british had much to do with WW2 at all......

    • @cirrus1964
      @cirrus1964 5 років тому +1

      How did Turing decode messages before these codebooks where found? As far as I understood, these books only confirmed what they already knew.

  • @Drokuz
    @Drokuz 12 років тому

    Awesome video, it was very well explained. Thanks for sharing!

  • @staninjapan07
    @staninjapan07 4 роки тому

    Thanks very much, I thoroughly enjoyed that.

  • @localbod
    @localbod 13 років тому +1

    Thanks for sharing.Very informative.

  • @camieabz
    @camieabz 5 років тому +2

    Non-mathematician. Zero interest in (typical?) algebra, never mind abstract algebra. That guy made things interesting enough for non-mathematicians to grasp. Good talk. +1

  • @KipIngram
    @KipIngram 3 місяці тому

    There were actually five rotors in the early Enigmas - you picked three from the five. So you had 5*4*3 = 60 ways of doing that - not just the six you'd have if you were just ordering three rotors. Later on it went to eight, with three chosen. And the German Navy added a fourth rotor.

  • @MrDaiseymay
    @MrDaiseymay 6 років тому

    I think his casual tone---seems to imply, that the Enigma machine was nothing to be in awe of. In other words, he's basing his views and attitudes from the perspective, that 75 years of advance and improvement has been gained. FROM THIS AMAZING MACHINE.

  • @won20529jun
    @won20529jun 4 роки тому +1

    Great lecture!

  • @sau002
    @sau002 4 роки тому +2

    Excellent video

  • @PuI2ePLaYaZ
    @PuI2ePLaYaZ 7 років тому +10

    one of the greatest minds in cryptology... but couldn't "decrypt" the fact that If you took a minute of your time to move the mic will save you the rest of the lecture holding it in place

    • @tyraelarchangel183
      @tyraelarchangel183 7 років тому +2

      That's more a stubborn/awkward thing.
      He probably felt too awkward to move it, after he'd already held it up for a minute or so. By then it would be really awkward to just move it 20 minutes into the lecture. The stubbornness comes from not caving in to the awkwardness.
      It's kind of like if you go to a drive-thru, and the line seems long. You may say "I should just go somewhere else", but you decide from stubbornness/laziness to wait. Well, now you've been waiting for 2 minutes and still haven't moved. Is it too late to just get out of line? Well, you'd have to wait until you get a few spots ahead to actually pull out (maybe you're blocked in now). By that time is it worth it? After all by then you've moved up a bit and can now order at the speaker........ but the line is still going so slow, it still may just be faster to go somewhere else.... but you already have so much time invested in it.... do you stay? Who know after you order the line may go fast... but judging from the information you already have, it's not. But after waiting 20 minutes in line is it even worth it anymore to go somewhere else? If it would only take 10 min to go somewhere else that would be better than waiting 20 more minutes in this line.... but we don't know how much time is left, or if the place we want to go will even be that fast! So in the end you, and most people, just wait it out.
      If you decide from the get go (i.e. before you really get into the line) to leave, that's different. I've done it, a lot of people have done it. But I've also done the above where I know I should leave and cut my wait time, but I'm too stubborn, lazy, and don't have enough information (who knows if the other restaurant isn't just as busy), and I just wait for an eternity...
      It's kind of like that. Logic dictates X, and most of us would choose X given enough time and knowledge. But in the moment, without knowing exactly what's going to happen, or not caring right then, we instead just keep with Y instead of changing to X.

    • @dozog
      @dozog 7 років тому

      The problem is not only how far up the microphone is.
      If he pulls the microphone higher, he places it closer to his mouth, but also more into the "shadow" of his chin.
      Notice when the lady uses his microphone. She has to be almost perfectly in front of the mic to be amplified.

    • @dozog
      @dozog 7 років тому

      Part of what you re talking about is called "sunk cost fallacy".
      The speaker moving up the microphone is different because if the higher position works, there is no ambiguity about having made the right decision.
      Awkwardness may have been part of the reason he kept with his chosen strategy.

  • @b43xoit
    @b43xoit 10 років тому +5

    The movie _Das Boot_ also depicts the use of an Enigma machine.

  • @granskare
    @granskare 7 років тому +1

    I was in Turkey 1957-1959 and Det 3 was the unit that worked with NSA, I was just a support person.

  • @roncarney9158
    @roncarney9158 3 роки тому +1

    That bloody tie! Why didn`t he just move the mic higher?

  • @papoocanada
    @papoocanada 12 років тому

    @Channellock12
    the best - and slower and complicated - was the One Time Pad.
    The rotored Enigma was improved to become the Type X machine with 5 rotors and plug boards.
    Then, the Rockex machines, one regular tape en clair but coded by a second tape.
    Today they mostly use a sort of teletype with scramblers.

  • @agentdark64
    @agentdark64 Рік тому

    4:00 That's exactly the level of encryption you get with the enigma IF and only IF you only need to worry about the plugboards and you have correctly worked out the rotor settings. And only having to work out the rotor settings reduces the amount of combinations for brute forcing. If you know part of the plain text, you only need to work out rotor settings where the letters come out the same as each other respective of where they are the same in the plain text message. For example, if the message is always known to start with hello, then you know a good chance letter at position 3 & 4 should be the same after the correct rotor settings and there is only like 17576 rotor settings to go through which is possible brute force using modern computers today.

  • @ZanagKraun
    @ZanagKraun 13 років тому

    @Channellock12 I believe it was a machine called the M-209 and a lot of Navajo code talkers..

  • @RedcoatT
    @RedcoatT 9 років тому +2

    In the attack on Coventry, the British were aware that a major attack was going to take place, but the code name used to identify the target was unknown, so a general warning went out, placing all of the civil defence on high alert.
    However the claim that the British might have evacuated Coventry if they had known it was the target is nonsense, no town was ever evacuated because it was under threat from bombing. The British had already evacuated all the women and children from the major towns who were willing to go, any further evacuation would have impared the war effort more than the bombing would have, so it was never an option

  • @ChrisOBrien666
    @ChrisOBrien666 2 роки тому

    Very interesting video but neglects to mention an extremely fundamental flaw in the Enigma machine that helped in breaking it was that a character can NEVER be encrypted to itself.

  • @MarKiv987
    @MarKiv987 12 років тому +2

    Any one have idea wer to find the second part this lecture?? I'm really looking for more insightful video on how enigma was broken...

  • @petermostyneccleston2884
    @petermostyneccleston2884 Рік тому

    In one of the books about the work going on in Bletchley Park, it mentions that it was possible that the code breakers knew about the Blitz on Coventry, but no more than four hours prior to the attack. It is unclear in that book, which city was to be bombed.
    Another source said that the Airforce codes meant that the code for London, was exactly the same as for Oxford. This is another reason why the British did not react, as it was likely to be unclear which city would be Blitzed in under four hours.
    I have not seen any sources which say that anyone had found out, or if they had not. There is however evidence that the code breakers of Bletchley park, kept information away from the Admiralty, and were choosing which of the convoys to allow through, and which ones were allowed to be attacked. This was purely to let the German military think that the British have not cracked the Enigma codes.

  • @JimTLonW6
    @JimTLonW6 12 років тому

    Very interesting, and it does, at long last, answer my question why a letter couldn't cipher to itself.

  • @DutchManticore
    @DutchManticore 13 років тому

    @SacredSocietyAP
    It's something a lot of teachers do.
    Teachers at my university also mess around with their microphone/mic.clips all the time.

  • @DinHamburg
    @DinHamburg 7 років тому

    are there other videos with this guy ?

  • @matambale
    @matambale 3 роки тому +3

    @5:02 Error: both K and H translate to Y in his solution. Guessing that there is a typo, and 'XH' should have been 'XK', or that 'CYCIK' should have been 'CYCIH'

  • @fritsvanzanten3573
    @fritsvanzanten3573 3 роки тому

    Can we see part 2 somewhere?

  • @pedroruiz193
    @pedroruiz193 2 роки тому +2

    59:00 Hubris turned against the nazis. They NEVER considered their Enigma cipher could have been broken. They would explain it every other possible way except the cipher being broken every day a couple of hours after 7:00 AM. Credit goes to the Polish mathematician that found an ALGORITHM to break Enigma. An algorithm means that it is not brute force (trying out every possible configuration of rotors, plugboard, etc....) but a shortcut that reduces drastically the number of possible configurations to be tried out. But the Polish mathematicians stopped there: they didn't know how to implement the algorithm they had discovered. Even if it was a shortcut, it was still too many calculations to be done manually, even by hundreds of people crunching numbers with pencil and paper, in an efficient way (before the nazis changed the configuration every day at 7:00 AM, only 24 hours from the first intercepted message to find the configuration for that day). The credit for inventing an electromechanical device that could implement the Polish algorithm and find the configuration in a couple of hours after 7:00 AM goes to Alan Turing.

    • @memonic1
      @memonic1 2 роки тому +2

      Read about Rajewski's cryptographic bomb that enables the automation of Enigma decryption :)

  • @daftpunk3401
    @daftpunk3401 4 роки тому +1

    Great video and I searched for more but unfortunately couldn't find any other David's materials, even if he did some cryptology lecturing years ago.

  • @Eric-ye5yz
    @Eric-ye5yz 3 роки тому

    How did the information deciphered get distributed with out getting cracked ..... what encryption did the allies use to share the information?

  • @jimbob1427
    @jimbob1427 4 роки тому

    Interesting talk 👍

  • @jasonguyperson
    @jasonguyperson 12 років тому

    I can't believe he held his tie that long.

  • @filipdurczewski1326
    @filipdurczewski1326 5 років тому +4

    Well done Poland

  • @HeatherWalt
    @HeatherWalt 10 років тому +1

    Would have been great to compare the enigma code to other coding platforms that existed back in WWII.

  • @florianritter7871
    @florianritter7871 2 роки тому

    Could it be “vigenere” this 8-letters on 21:48?

  • @cluxseltoot
    @cluxseltoot 9 років тому

    I would have liked to have asked a question about different cultures and the messages sent - were any of them frivolous or just plain communication? EG: Did they send salutations or gossip?

  • @leoschrickel611
    @leoschrickel611 6 років тому

    There actually was a mistake/typo in his initial puzzle as the symbols representing Y in the solution were shown to be both K and H

    • @brown3394
      @brown3394 3 роки тому

      it was UP not BY. "can attain UP remaining on the level" is the only possible answer that makes sense.

  • @ZER0--
    @ZER0-- 9 років тому

    58:00 There were machines with have eventually 10 rotors.

  • @frederickbowdler8169
    @frederickbowdler8169 Рік тому

    Surely when you press A a switch is thrown which blanks out the A light bulb and that is why an A never translates as A. Am I correct.?

  • @franzbernasek4058
    @franzbernasek4058 4 роки тому +1

    Great , Super

  • @cluxseltoot
    @cluxseltoot 7 років тому +1

    All this intelligence yet he still speaks into his tie!

  • @mike94560
    @mike94560 3 роки тому

    So... How did they do numbers? I would not want to put Lat/Long in plaintext. And spelling it all out seems odd.

  • @rigomiller6524
    @rigomiller6524 7 років тому

    h and k both = y in the cryptogram example at 5:45

  • @jurjenvanderhoek316
    @jurjenvanderhoek316 5 років тому +1

    This guy is so intelligent ... why does he not detach the microphone from his tie?

  • @dylanwhostones
    @dylanwhostones 11 років тому

    No but that was mid 1943 nearly 3/4 of the way through the war. The Germans always had access to the merchant code and that told them when and where the the convoys were going....and they could always trianglulate the convoy position using the transmittions from patrol bombers and convoys.

  • @papoocanada
    @papoocanada 11 років тому

    we were still using all of them as late as 1970 in Canada. Typex was fun, so noisy , bang bang bang. 10-4
    nnnn

  • @neilonaniet
    @neilonaniet 2 роки тому

    Did nobody think to come on and adjust his mic?

  • @LightningJackFlash
    @LightningJackFlash 8 років тому +11

    I remember watching it for the first time in 2010, when it had about 1000 views ;)

    • @Trifecta3x3
      @Trifecta3x3 6 років тому +2

      Most of these views came after the movie "The Imitation Game" which inspired people's historical curiosity.

    • @James_Bowie
      @James_Bowie 4 роки тому +1

      @@Trifecta3x3 ... and that movie was 50% bollocks.

  • @rexmundi2237
    @rexmundi2237 7 років тому +1

    Le Chiffre aka "the cipher" is the bad guy in James Bond novel Casino Royale.

  • @davidelliott5843
    @davidelliott5843 3 роки тому

    The British invented the electronic digital computer specifically to crack the Enigma. After WW2, they moved them out of Bletchley Park but kept them totally secret. No commercial use was considered. (1) because the military dong think like that. (2) because the Soviets used Enigma and Britain continued to crack their codes.

  • @iprice77
    @iprice77 10 років тому +2

    Going over a bump and the CD continuing is not error correction, its pre-buffering. Reading over a scratch in the optical media is error correction :P Bouncing the laser way off the track isn't error recoverable because you cant read the error recovery data either :P

    • @rods6405
      @rods6405 2 роки тому

      Yeah he got that wrong!

  • @KipIngram
    @KipIngram 3 місяці тому

    Well, you didn't mention that the visible ring on the rotor could be adjusted by an offset relative to the wiring. The visible ring controlled when the rotor turned over its neighbor, and the wiring was independent of that. The offset for each rotor was also part of the daily setup.
    And, you didn't mention the double step. I guess it's not really that important - it weakens the code space size a little, but it's not really germane to understanding how the thing works. But in fact it DOESN'T work exactly like an odometer.
    The offsets, though, were important - that added another factor of 26^3 to the size of the configuration space.

  • @penklislawnmowing4508
    @penklislawnmowing4508 9 років тому

    It come down to the author who wrote the book on a 100 ways a cat can catch a rat and 100 ways a rat can escape a rat

  • @TheArdvaark
    @TheArdvaark 11 років тому

    The one time pad refers to coding using teleprinter traffic which is what the German Lorenz coding machine used - this was the preferred machine of Hitler and the High Command. It had nothing to do with Enigma. The Typex was the coding machine that British Intelligence used and the Germans never broke that. Although Rockex was up and running by 1943 it wasn't used in the same quantities as Typex.

  • @marcinpasnicki248
    @marcinpasnicki248 2 роки тому +1

    If you want to learn more about breaking the Enigma you should read XYZ by Dermot Turing

    • @PreservationEnthusiast
      @PreservationEnthusiast 2 роки тому

      Too much about the Poles and the French in that. The English were the ones who did the really clever stuff!

    • @marcinpasnicki248
      @marcinpasnicki248 2 роки тому

      @@PreservationEnthusiast You are probably right after all they just built larger version of Polish bomba.

    • @DraperPierce
      @DraperPierce 2 роки тому +1

      The British contributions to Enigma cryptanalysis are not denigrated by adding more details than in any previously-published book I've read about what the Poles did with the cryptanalysis, and certainly not the amazing story of how the codebreakers made their way from Poland to France, and then out of occupied France -- XYZ was an amazing read, and I highly recommend it to everyone who cares about the history!

  • @dylanwhostones
    @dylanwhostones 12 років тому

    The germans cracked the allied codes through the war as well- and the allies never knew that either, however the US changed the system in 1943 locking the Germans out after that.
    They knew the merchant code and thus were able to track allied convoy routes.

    • @jimwilson946
      @jimwilson946 2 роки тому

      That simply isn't true.
      The Americans had no crypt analysis as it was disbanded at the end of the First World War and relied on the British to get them back up to speed.
      German agents in America reported the departure of convoys to their controllers, no need for code breaking!

  • @ZER0--
    @ZER0-- 9 років тому +1

    The very best codes to encrypt are from languages you don't know. There were a number of American tribes whose codes were never broken (although it's ironic ,as it was the Europeans that wiped out most of the North American Indians).

    • @Geographus666
      @Geographus666 8 років тому +1

      +Paul L That is "Security by Obscurity", which is something you do not want in cryptology.
      The strength of such an "unknown language code" relies solely on the enemy having no knowledge of the algorithm, in this case the language. At the moment they get a person speaking this language (e.g. by someone defecting or being kidnapped and being forced) the algorythm is known and your whole system is broken. Good codes rely on the secrecy of the key not the algorythm, so even if your algorithm is known, your system is secure as long as the keys are. This is called Kerckhoff's principle and is the basis of any modern cypher like e.g. AES.

    • @ZER0--
      @ZER0-- 8 років тому

      Geographus666 OK show off. (Only joking.) I still don't understand the public key system, but I understand that it is a very good system PGP relies on that system as far as I know(?). One of the only other things I know about encryption is that prime numbers are used for most bank transactions. If someone can crack primes then the banking system would be up a paddle without a creek.

  • @drdeak
    @drdeak 10 років тому +1

    If he only knew that clip mic has a alligator clip on it...............that's why they call it a bloody clip mic!

  • @gamesmusichax8359
    @gamesmusichax8359 9 років тому +5

    "Work for NSA". "$20 is expensive". You poor man... Joking aside, people at the NSA should be making more money anyway, for what they do.

    • @unvergebeneid
      @unvergebeneid 9 років тому +1

      Right, all that industrial espionage is probably making the US hundreds of billions so they deserve being paid well.

    • @MothaLuva
      @MothaLuva 6 років тому

      GamesMusicHax They should be put against a wall for what they do.

    • @Dragonblaster1
      @Dragonblaster1 6 років тому

      Di Pudriano You have no idea what they do, so enough of the fake outrage.

  • @torch2k
    @torch2k 6 років тому

    Good lecture, but his 'word whisker' - 'Okay ...' - was driving me nuts by the end, in no small part because I used to do the same during lessons.

  • @diegorodrigues8287
    @diegorodrigues8287 10 років тому

    He is good in solve problems

  • @haflam.
    @haflam. 9 років тому

    Briljant, hold up mike for an hour!

  • @robharris5467
    @robharris5467 9 років тому +37

    for a brilliant guy re clipping his tie higher up seems to defeat him!

    • @dozog
      @dozog 7 років тому +9

      The problem is not only how far up the microphone is.
      If he pulls the microphone higher, he places it closer to his mouth, but also more into the "shadow" of his chin.

    • @19shadowmaster77
      @19shadowmaster77 7 років тому +1

      Rob Harris You have to put the microphone ahead ( in line with the sound waves), doesn't matter a lot how much closer...

    • @mhern57
      @mhern57 7 років тому +2

      Luca Gandolfo
      how about just unclipping it? I can't believe the host of this gathering or anyone else for that matter would let him go on without suggesting at least that.
      little help!

    • @19shadowmaster77
      @19shadowmaster77 7 років тому

      mhern57 I don't know... All i can say, is that this type of microphone are less used respect the model with a little metallic arc that goes on the side of the head. 😉

    • @ANTINUTZI
      @ANTINUTZI 6 років тому +1

      ... I'm a double non-alumnus of F&M College. His confusion with microphones does not therefore surprise me.

  • @rlingren
    @rlingren 7 років тому

    Its interesting that no one asked how they made a space or sent numbers or Lat and Long. Obviously it is easy with a full typewriter keyboard, WWII technology, I can think of several ways to encode numbers and symbols like ° ' " . but all require sequences of letters that are in aggregate much longer than the numbers they replace. It seems really inefficient and they were all about efficiency, and does anyone know why the 4 letter spaces 4 letter spaces sequence ? thanks

    • @patbates3835
      @patbates3835 5 років тому

      WE USE TO SPELL THE NUMBER IN TEXT FORM IN THE ARMY

  • @deeremeyer1749
    @deeremeyer1749 6 років тому

    I was under the impression that when you use 3-letter "encryption codes" each 3-letter code is permanently assigned to a work commonly used in whatever "industry" or "military service" and in the interests of brevity, simplicity and "speed" the "vocabulary" is kept very small and the actual ENCRYPTION is done so that day to day OR message to message the machines at BOTH ENDS are reset to a new "circuit" and UNUSED 3-digit "codes" are used and are entered as the "code" and the "clear text" at the other end is STILL just a 3-digit "code sequence" that any outside party trying to "decrypt" the messages has to have the DICTIONARY FOR or "cracking the code" doesn't mean jack shit. Any comments on Enigma machines being widely used commercially produced machines found all over the world long before WWII? How does "Enigma" relate to TELEPHONES? Or TELETYPES? Any comments on the similarity of a 3-letter "code message" used by a military force to 3-letter STOCK SYMBOLS used for "international business" going back to the invention of the STOCK TICKER?

  • @WJack97224
    @WJack97224 7 років тому

    I read that an Enigma machine was sent by mistake to someone in Poland and it was recognized and then reverse engineered and then carefully reassembled and returned to the sender. Is that a myth?

    • @patbates3835
      @patbates3835 5 років тому +1

      NO, IT IS NOT MYTH. THE GERMAN DIPLOMATIC TEAM IN WARSAW WAS WAITING FOR A PACKAGE. THEY WENT TO THE POST OFFICE OR WHATEVER IT WAS CALL ASKING IF A PACKAGE ARRIVE, SEVERAL TIMES. POLISH OFFICIALS BECAME SUSPICIOUS AND ALERTED POLISH INTELLIGENCE AND SINCE IT WAS A FRIDAY AND THE POST OFFICE WAS CLOSED ON WEEKENDS, THE THREE CRYPTO SPECIALIST OPEN THE PACKAGE, AND FOUND AN ENIGMA MACHINE. THEY QUICKLY RECORDED ALL THE INFORMATION NEED, REWRAPPED THE PACKAGE IN TIME FOR THE MONDAY MORNING SUSPECTED APPROACH OF THE GERMANS DEMANDING THEIR PACKAGE. iT TOOK THEM THREE WEEKS TO SOLVE THE WIRING SETUP AND, BINGO, THEY COULD DECIPHER MANNY OF THE MESSAGES. THIS WORK ALLOWED THE POLES TO LEARN THE GERMAN TERMINOLOGY WHICH IDENTIFIED GERMAN UNITS, TANK TYPES, FUEL NEEDS, TROOP LOCATIONS, TO INCLUDE THEIR NEEDS, SUCH AS FOOD, CLOTHING AMMUNITION, COMMANDER RANK AND THEIR CODE IDENTIFIERS AND SO MUCH MORE LEAVING THE BRITS THE SIMPLE DUTY TO KEEP IT CURRENT WHEN CHANGED, THAT WITH ALL THIS INFORMATION TO START WITH. ALL THE GERMAN ARMY COULD BE MONITORED DAILY.

  • @rcovil
    @rcovil 8 років тому +4

    He forgot about the Ring Settings. Each ring on the rotors was rotated too.

    • @robertrannin2076
      @robertrannin2076 8 років тому

      +Ron Covil weren't ring settings a little more infrastructure, in that it wasn't a regular daily setting, more of a field modification? greatly increased permutations, no doubt.

    • @clayz1
      @clayz1 4 роки тому

      The ring setting IS the rotor setting.

  • @jbalmyetsh7095
    @jbalmyetsh7095 6 років тому +1

    There is a flaw in the Cryptogram as CYCIK is either CYCIH or XH should be XK

    • @fritsvanzanten3573
      @fritsvanzanten3573 3 роки тому

      Yes, the Y is encrypted as H as well as as K (hm, this sounds weird). Funny/tragically enough in many a text or video about cracking Enigma there is a crib 'Keine besonderen Ereignisse' that is spelled as 'Keine besondere Ereignisse' , without the 'n'. One starts to wonder.... I hope Alan Turning wasn't plagued by this.

  • @petermitchell6348
    @petermitchell6348 2 роки тому

    The British had a computer to help them with decryption. COLOSSUS.

  • @TheArdvaark
    @TheArdvaark 11 років тому

    There are certain British codebreakers who wrote some very spurious claims after the war finished. The fact is that Dilly Knox was close to breaking the Military Enigma when we got certain info from the Poles and that enabled Knox to break the Military version in Jan 1940. Had it not been for that info it would probably have taken Knox another 6-12 months to break it - not 2 years. As for 1 messsage in 7, also not true. I know, I work at Bletchley Park and have access to the archive info there.

    • @frederickbowdler8169
      @frederickbowdler8169 Рік тому

      Also Polish were sent German enigma by post mistake as two towns one in Poland and Germany have same name . A lot of myths and cover ups with security services that is their stock in trade .

  • @bonbonpony
    @bonbonpony 8 років тому +2

    05:36 I solved it before this point, but It bothered me why is "Y" supposed to be encoded by two different letters: "H" and "K". Looks like some kind of a typographic error to me :P

    • @BunnyFacedAssasin
      @BunnyFacedAssasin 7 років тому

      i fucking wasted 15 minutes cause of that shit.

    • @mrewan6221
      @mrewan6221 4 роки тому

      I found that too, and assumed a mistake was made somewhere: either the original encrypter, the typesetter, or the presenter.

    • @brown3394
      @brown3394 3 роки тому

      the real answer to the puzzle is "man can attain UP remaining on the level"

  • @lohphat
    @lohphat 5 років тому

    The kenngruppen weren't explained. The actual encryption key selection was more complicated and varied across military branches. users.telenet.be/d.rijmenants/en/enigmaproc.htm

  • @brown3394
    @brown3394 3 роки тому +1

    The solution is wrong the answer would have to be be "can attain UP remaining on the level" since the Y was already used, the only other 2 letter word left that can make sense is UP.

  • @dylanwhostones
    @dylanwhostones 11 років тому

    Commercial version was easy from what I've read. The military machine was more difficult to understand. British code breakers have admitted the whole effort would have been put back two years had it not been for the Poles. War could have been lost by then.
    In the Med both the British and Italians were only able to decode about one message in 7 in 1941. The rest of the transmittions went unintercepted. Same was true of decoding German & British naval messages at that time .

  • @SirCutRy
    @SirCutRy 10 років тому

    What if you use the keyword's hash as the Vigenére keyword?

    • @SirCutRy
      @SirCutRy 10 років тому +1

      That is *exactly* what I was thinking.

    • @iisagodonearth
      @iisagodonearth 10 років тому

      SirCutRy because you said it twice

  • @ri4078
    @ri4078 7 років тому +3

    Although the Enigma code was cracked by Englishman Alan Turing and his team at Bletchley Park during WWII, the Poles indeed had their crucial starting contribution

    • @wladyslawbukowski
      @wladyslawbukowski 6 років тому

      Why do you stubbornly persist with your stupid lies? Why do you feed people with it? You know perfectly well three Polish mathematical geniuses (M. Rejewski, H. Zygalski and J. Różycki) broke the Enigma code already in 1931 and later on gave the entire necessary data to you on the plate to use it. The Bomb was was not Turing's but 100% Rejewskiĺ design. Without it the only thing you were capable of would be just to stick your middle fingers in your asses and wiggle them a little. Nothing else. Why are you always steel someone else's achievements for your own undeserved glory? How did you treat the Polish pilots during the victory parade in 1946? Shame on you, English unscrupulously ungrateful egoistic lying leech.

    • @Dragonblaster1
      @Dragonblaster1 6 років тому +1

      Turing's Bombe was named after the Polish machines, but vastly more complex. The fact is, the Poles were forced to give up since the Enigma became too tough to crack by their techniques.

    • @scottfuller5194
      @scottfuller5194 5 років тому

      The enigma was a "code machine" NOT a "code" ! It was capable of sending and receiving encyphered codes.....they Germans used quite a few "codes". Also the enigma code machine was a lower level, tactical use, code machine albeit of complexity.....the Germans used the Lorenz (12 rotor teletypewriter system) which was extremely complex, much, much, much more so than the enigma.....!

    • @patbates3835
      @patbates3835 5 років тому +1

      IT'S THE ONLY THING THE ENGLISH CAN CITE FOR THEIR EFFORT IN FIGHTING GERMANY. ENGLAND GOT THEIR ASS KICK OFF THE FRENCH COAST. THE BRITS ARE LUCK HITLER TURNED HIS FORCES ELSE WHERE. SURE THEY MADE BOMBING RUNS AT NIGHT, RARELY HITTING ANYTHING. WHEN THE BRITONS LOOK BACK, THEY REALLY CAN'T FIND ANYTHING WORTH WHILE TO TALK ABOUT, SO THEY CONCOCT THIS STORY TO BOOST THEIR IMPORTANCE IN THE FIGHT. AND AS FOR THE FRENCH, THEY HAVEN'T WON A WAR SINCE BOOTING THE ENGLISH OUT OF NORTHERN FRANCE BACK IN THE 16TH CENTURY. iT'S BEEN SAID CHURCHILL HAD ALL THE DECIPHERING EQUIPMENT DESTROYED AFTER THE WAR. DID HE REALLY.🤔

  • @donkelley4835
    @donkelley4835 3 роки тому +2

    Interesting that he uses the "Socratic Method" of teaching by asking questions.

  • @ZER0--
    @ZER0-- 9 років тому +2

    58:30 I think that the saddest thing is that people had to be sacrificed because otherwise the Germans would have known we cracked their codes.
    But imagine we did let them know we cracked their codes (!?) What would they do then as a code ?

    • @hazelmira2224
      @hazelmira2224 9 років тому

      8 źZzz0
      566uwu7ùew5aybs3 .

    • @ZER0--
      @ZER0-- 9 років тому

      Hazel Mira ?

    • @taotoo2
      @taotoo2 9 років тому

      Paul L LOL

    • @Dragonblaster1
      @Dragonblaster1 6 років тому

      The Geheimschreiber ("Fish"). But that was cracked as well.

    • @scottfuller5194
      @scottfuller5194 5 років тому

      ZER0 The British, continuing the original enigma work by the Polish cypher mathematicians, "broke into" the revised Enigma MACHINE.....knowing then how it functioned, they worked on reducing the astronomical number of possible permutations, based on mathematical analysis, human technical transmission errors by German enigma operators (repeating encrypted texts in plain language etc), various captured German code books (short weather code, short code, officers code etc, etc) the Atlantic UBoat grid location tables, wiring enigmas in series (this first British "bombe" replicating what the Poles did and showed the British how to do) secretly "acquiring" the enigma technical details held/registered in the British Patent Office, using captured enigma rotors (full set) and captured enigmas, using captured Luftwaffe enigma code books, "acquiring" trashed enigma messages from two German army offices, sending Bombers on specially targetted missions and using the German air defense enigma messages to match up by name, those targets, employing a very large series of "Y" radio intercept stations, "grid-locking" UBoats as part of the British/Canadian and US Direction-finding (HF-DF) "triangular fixing" radio system, using broken Japanese diplomatic codes (the Japanese Military attache in Berlin used to make very frequent, highly technical and very reliable intelligence reports back to Tokyo).....capture of short weather code books from "pinches" made from captured German trawlers, weather ships, UBoat resupply ships etc).....planting disinformation "lost" messages/where they would be easily "discovered and recovered" by German military and intelligence agencies, using British controlled double agents to spoon-feed the Germans a "barium meal" of partly true, mostly false intelligence reports, conducting clandestine commando raids used as tactical cover for special intelligence units "pinches" of enigma (and Lorenz) cypher materials, codes and related documents. There were many other cypher acquisition tactics used.....as now previously ULTRA Top Secret highly classified files are now being declassified and released into public archives......a most recent book: "The Third Reich Is Listening-German code breaking 1939-45" by author Christian Jennings, published and released in October 2018, now reveals the German code breaking successes/failures......!

  • @sun11motty87
    @sun11motty87 7 років тому

    So how did the enigma do numbers?

    • @highwaysbyways4281
      @highwaysbyways4281 7 років тому +3

      They used the top row of the keyboard as numbers, and indicated that they were going to send a number by typing Y. So, for example, if they wanted to type the number 54, they would type YTR.

  • @minimushrooom
    @minimushrooom 9 років тому +1

    But K and H are both encrypted as Y in the first puzzle?

    • @shawn98ag2
      @shawn98ag2 9 років тому

      jqbtube in his next slide he shows that Y is encrypted to H so its a mistake. confused the hell out of me when i tried to solve it in 5 minutes.

    • @hazelmira2224
      @hazelmira2224 9 років тому

      jqbtube 8uyy7

  • @YOGSFANSKane
    @YOGSFANSKane 7 років тому +1

    28:15

  • @bf3knifer
    @bf3knifer 3 місяці тому

    i dont see why the plug board creates so much extra complexity, whether you swap letters one time or 10 times, the end result is still just one swap, just a different letter and it will be that same letter for the full duration of the day

    • @ASMReading_
      @ASMReading_ 2 місяці тому

      If I understood right, it's because the plugboard isn't really there to create complexity for the ciphertext, it's there to significantly expand the number of potential daily keys. So while it's probably not mixing up the encrypted text all that much, the important number to look at isn't that just 6 sets of letters are swapped, but that there are over 100 billion ways to place the 6 cables in the 26 holes in the plugboard. That makes it so there's 100 billion times more ways now to arrange the board every day, i.e. 100 billion times more potential daily keys. Without the plugboard, there are just ~100,000 possible daily configurations/keys, and that's a small enough number to brute force by trying all possible configurations each day. With the plugboard, there's suddenly >10 quadrillion possible configurations/keys each day, which is no longer brute-forceable. So it's about expanding the key space and blocking brute force attacks, not obfuscating the text too much -- the rotors already take care of enough obfuscation. I think!

  • @CallumDavage1
    @CallumDavage1 9 років тому

    He sounded so ashamed when he said "I work at the NSA"

  • @penklislawnmowing4508
    @penklislawnmowing4508 9 років тому

    It is better to be the historian who knows how the Enigma code was cracked than trying to crack it.

    • @barrydevries7880
      @barrydevries7880 9 років тому

      I guess you need to be a mathematician to fully understand how it was cracked

  • @KANASR66
    @KANASR66 7 років тому +1

    they talk about how genius are the code breaker and Alan Turing,,,, and build a huge machine to decrypt the enigma code

    • @vanyastaleva415
      @vanyastaleva415 7 років тому +4

      I think both are great! If you know a movie about Arthur Scherbius, please share the link here

    • @Dragonblaster1
      @Dragonblaster1 6 років тому

      It is true that many of the perceived faults in the Enigma were in its implementation rather than innate to the machine. However, it takes more brains to crack a difficult cypher than it does to create one.

  • @sergeolenek7414
    @sergeolenek7414 3 роки тому

    interesting, very

  • @lqr824
    @lqr824 3 роки тому

    40:11 "There aren't going to be messages longer than..." But in a single day there might be several thousand messages encrypted with the daily cipher, no? Does that not suffice to use letter frequency to figure out what the daily setting's first letter's map is? That should give you enough letters to get the frequency counts you need to simply approach statistically? Granted, for further characters positions we'll have fewer and fewer messages with so many characters, but why weren't at least short messages broken this way? (Or were they?)

    • @Jasooonthemachine
      @Jasooonthemachine 3 роки тому

      I don’t think it would have been possible to apply frequency analysis on messages sent on different machines on the same day as each machine would have had a different key. The key is the main defence against frequency analysis.

    • @lqr824
      @lqr824 3 роки тому

      @@Jasooonthemachine How would each message have had a different key? The recipient must know the key in order to decipher. A key based on the date would be the same key for each message. A key based on time could vary more but make retransmission require a complete re-encoding. I'm no expert but the impression I got is that a book said on date X/Y/ZZZZ, you use rotors 1 3 5 8 9 at positions d n e o d, and for each message you must reset to that starting point??

    • @rustycherkas8229
      @rustycherkas8229 2 роки тому +1

      The "Gov't issue config settings for today" (that water soluble ink stuff) tells ALL operators how to initially configure the machine each day, all day... Each operator, for each message(!), must think up 3 "random" letters. The operator encrypts those 3 letters (twice) to get a string of 6 encrypted letters. The last 3 of those are ignored for the moment; the first 3 are the "key" to decrypting the message. Operators were instructed to NEVER use the same key twice when encrypting (especially re-encrypting) any message. Some did, some didn't... The operator sets the rotors to match those first 3 letters... This is the "encryption seed" for the machine to encrypt this one message by lighting indicator lightbulbs whose values are the "cyphertext"... The radio transmission (morse code) of the cyphertext would be prefaced with those six (encrypted) letters followed by the cyphertext. The listening British can write down all the cyphertext they receive and KNOW that those first 3 letters are the key to decrypting the whole message... but, what were the German's "daily configuration" settings that encrypted those 3 letters from plain text??? If the British knew those configuration settings for each day, they'd be mirroring exactly what the intended German receivers would be doing... But, the Germans didn't share each days settings with the British, leaving only 10 quadrillion possibilities to try...