This is quite helpful. I have read and seen a great deal about the cracking of the Enigma; this video helped me to understand the challenges and the breakthroughs of Turing and his colleagues.
Hahah I thought that too :) But then he actually does that throughout the whole lecture :P Isn't that sweet of him? :P I watched this for the first time in 2010.... It had about 1000 views then. now it's 1/3rd of a million.
This is an awesome explanation! Only things missing (which are important details) are the ring-settings which determine when a rotor steps and the double-stepping mechanism. A normal odometer triggers the next ring after it gets to zero again, so at the 10th click (starting at 0). Using the ring-settings of an Enigma rotor you can change when this triggering of the next rotor starts, which makes for even more combinations. Apart from that we also have something called double-stepping which is a flaw of the mechanical setup of the rotor rotation mechanism using ratchets and pawls. When the second rotor rotates a click, the first one will too and the same is the case for the third rotor (near the reflector), so basically there are a few ring-settings less (for instance: if the second rotor steps, the first will too, but that means the possibility of only the second rotor is stepped is not there DURING encryption. In initial setup that setting is there). You need to have an actual Enigma mechanism to understand this. The number of non-used ring-settings is very small, so you can basically neglect it, or maybe not? Maybe, you can even find out the ring-settings because of this double-stepping flaw. Each flaw is a potential attack vector. I love the Enigma and basically all mechanical encryption devices. I dont like digital encryption, for the sake of liking a specific type of technology. Digital encryption is mechanical too in a sense, as a switch is an implementation of an abstract mechanical principle basically, a seesaw mechanism. As a transistor is a switch, we can conclude that a processor is mechanical. The fact the seesaw mechanism is driven by electrons and doesnt make it any different. Wait for quantum encryption where we really have non-mechanical concepts, like a situation where a switch can simultaneously be in a on and off position, this is not possible for an abstract switch definition being either on/off, hence our current computers are simply fast mechanical systems and the real next leap and change is quantum mechanics (where as I stated, mechanics is not a correct term, I would use quantum system for instance).
The U-571 mentioned and listed on the board was the name of the eponymous U-boat in the movie released in 2000. However the real U-571 was never captured by the Allies, nor was her Enigma Machine ever taken. The events in the film are loosely based on the British capture of U-110 and her Enigma and cipher keys.
Also completely missed out that the Polish only managed to crack the German army and airforce enigma transmissions (they couldn't decrypt navy transmissions), and that their methods of cracking it become unusable 6 months later when the Germans changed their encryption procedures. While Turing and the British did gain information from the Polish, they created a new method of hacking the transmissions that was useable to decrypt German navy transmissions and also still worked after the germans changed their procedures. I guess this is the usual case of mericans wanting to gloss over the fact that the british had much to do with WW2 at all......
@@cirrus1964 Many methods and it WAS NOT Turing that was responsable for all codebreaking ! he created the Bombe They used cribs ! Rodding. they used operator weakness and lazyness. They transmitted operator prompts and even stealing code books
There was one more variable in the Enigma. The operator also had to set up at which rotor position would it advance the next rotor. Not necessarily Z moves the next rotor but maybe A or G, etc. Maybe that was in one of the improved versions of the Enigma but either way it added a whole lot more keys to it.
Cryptologic mathematician at the NSA. Clearly very clever indeed. But doesn't think to simply clip the microphone further up his tie. It's interesting how great minds work!
one of the greatest minds in cryptology... but couldn't "decrypt" the fact that If you took a minute of your time to move the mic will save you the rest of the lecture holding it in place
That's more a stubborn/awkward thing. He probably felt too awkward to move it, after he'd already held it up for a minute or so. By then it would be really awkward to just move it 20 minutes into the lecture. The stubbornness comes from not caving in to the awkwardness. It's kind of like if you go to a drive-thru, and the line seems long. You may say "I should just go somewhere else", but you decide from stubbornness/laziness to wait. Well, now you've been waiting for 2 minutes and still haven't moved. Is it too late to just get out of line? Well, you'd have to wait until you get a few spots ahead to actually pull out (maybe you're blocked in now). By that time is it worth it? After all by then you've moved up a bit and can now order at the speaker........ but the line is still going so slow, it still may just be faster to go somewhere else.... but you already have so much time invested in it.... do you stay? Who know after you order the line may go fast... but judging from the information you already have, it's not. But after waiting 20 minutes in line is it even worth it anymore to go somewhere else? If it would only take 10 min to go somewhere else that would be better than waiting 20 more minutes in this line.... but we don't know how much time is left, or if the place we want to go will even be that fast! So in the end you, and most people, just wait it out. If you decide from the get go (i.e. before you really get into the line) to leave, that's different. I've done it, a lot of people have done it. But I've also done the above where I know I should leave and cut my wait time, but I'm too stubborn, lazy, and don't have enough information (who knows if the other restaurant isn't just as busy), and I just wait for an eternity... It's kind of like that. Logic dictates X, and most of us would choose X given enough time and knowledge. But in the moment, without knowing exactly what's going to happen, or not caring right then, we instead just keep with Y instead of changing to X.
The problem is not only how far up the microphone is. If he pulls the microphone higher, he places it closer to his mouth, but also more into the "shadow" of his chin. Notice when the lady uses his microphone. She has to be almost perfectly in front of the mic to be amplified.
Part of what you re talking about is called "sunk cost fallacy". The speaker moving up the microphone is different because if the higher position works, there is no ambiguity about having made the right decision. Awkwardness may have been part of the reason he kept with his chosen strategy.
Non-mathematician. Zero interest in (typical?) algebra, never mind abstract algebra. That guy made things interesting enough for non-mathematicians to grasp. Good talk. +1
I think his casual tone---seems to imply, that the Enigma machine was nothing to be in awe of. In other words, he's basing his views and attitudes from the perspective, that 75 years of advance and improvement has been gained. FROM THIS AMAZING MACHINE.
There were actually five rotors in the early Enigmas - you picked three from the five. So you had 5*4*3 = 60 ways of doing that - not just the six you'd have if you were just ordering three rotors. Later on it went to eight, with three chosen. And the German Navy added a fourth rotor.
The Powerhouse Museum in Sydney has an Enigma machine, and 20 odd years I was able to visit the storage area and have a closer look at it - as a WW2 buff, it was a great thrill!
@5:02 Error: both K and H translate to Y in his solution. Guessing that there is a typo, and 'XH' should have been 'XK', or that 'CYCIK' should have been 'CYCIH'
Very interesting video but neglects to mention an extremely fundamental flaw in the Enigma machine that helped in breaking it was that a character can NEVER be encrypted to itself.
4:00 That's exactly the level of encryption you get with the enigma IF and only IF you only need to worry about the plugboards and you have correctly worked out the rotor settings. And only having to work out the rotor settings reduces the amount of combinations for brute forcing. If you know part of the plain text, you only need to work out rotor settings where the letters come out the same as each other respective of where they are the same in the plain text message. For example, if the message is always known to start with hello, then you know a good chance letter at position 3 & 4 should be the same after the correct rotor settings and there is only like 17576 rotor settings to go through which is possible brute force using modern computers today.
In the attack on Coventry, the British were aware that a major attack was going to take place, but the code name used to identify the target was unknown, so a general warning went out, placing all of the civil defence on high alert. However the claim that the British might have evacuated Coventry if they had known it was the target is nonsense, no town was ever evacuated because it was under threat from bombing. The British had already evacuated all the women and children from the major towns who were willing to go, any further evacuation would have impared the war effort more than the bombing would have, so it was never an option
In one of the books about the work going on in Bletchley Park, it mentions that it was possible that the code breakers knew about the Blitz on Coventry, but no more than four hours prior to the attack. It is unclear in that book, which city was to be bombed. Another source said that the Airforce codes meant that the code for London, was exactly the same as for Oxford. This is another reason why the British did not react, as it was likely to be unclear which city would be Blitzed in under four hours. I have not seen any sources which say that anyone had found out, or if they had not. There is however evidence that the code breakers of Bletchley park, kept information away from the Admiralty, and were choosing which of the convoys to allow through, and which ones were allowed to be attacked. This was purely to let the German military think that the British have not cracked the Enigma codes.
Going over a bump and the CD continuing is not error correction, its pre-buffering. Reading over a scratch in the optical media is error correction :P Bouncing the laser way off the track isn't error recoverable because you cant read the error recovery data either :P
Well, you didn't mention that the visible ring on the rotor could be adjusted by an offset relative to the wiring. The visible ring controlled when the rotor turned over its neighbor, and the wiring was independent of that. The offset for each rotor was also part of the daily setup. And, you didn't mention the double step. I guess it's not really that important - it weakens the code space size a little, but it's not really germane to understanding how the thing works. But in fact it DOESN'T work exactly like an odometer. The offsets, though, were important - that added another factor of 26^3 to the size of the configuration space.
59:00 Hubris turned against the nazis. They NEVER considered their Enigma cipher could have been broken. They would explain it every other possible way except the cipher being broken every day a couple of hours after 7:00 AM. Credit goes to the Polish mathematician that found an ALGORITHM to break Enigma. An algorithm means that it is not brute force (trying out every possible configuration of rotors, plugboard, etc....) but a shortcut that reduces drastically the number of possible configurations to be tried out. But the Polish mathematicians stopped there: they didn't know how to implement the algorithm they had discovered. Even if it was a shortcut, it was still too many calculations to be done manually, even by hundreds of people crunching numbers with pencil and paper, in an efficient way (before the nazis changed the configuration every day at 7:00 AM, only 24 hours from the first intercepted message to find the configuration for that day). The credit for inventing an electromechanical device that could implement the Polish algorithm and find the configuration in a couple of hours after 7:00 AM goes to Alan Turing.
The problem is not only how far up the microphone is. If he pulls the microphone higher, he places it closer to his mouth, but also more into the "shadow" of his chin.
Luca Gandolfo how about just unclipping it? I can't believe the host of this gathering or anyone else for that matter would let him go on without suggesting at least that. little help!
mhern57 I don't know... All i can say, is that this type of microphone are less used respect the model with a little metallic arc that goes on the side of the head. 😉
+Ron Covil weren't ring settings a little more infrastructure, in that it wasn't a regular daily setting, more of a field modification? greatly increased permutations, no doubt.
@Channellock12 the best - and slower and complicated - was the One Time Pad. The rotored Enigma was improved to become the Type X machine with 5 rotors and plug boards. Then, the Rockex machines, one regular tape en clair but coded by a second tape. Today they mostly use a sort of teletype with scramblers.
The germans cracked the allied codes through the war as well- and the allies never knew that either, however the US changed the system in 1943 locking the Germans out after that. They knew the merchant code and thus were able to track allied convoy routes.
That simply isn't true. The Americans had no crypt analysis as it was disbanded at the end of the First World War and relied on the British to get them back up to speed. German agents in America reported the departure of convoys to their controllers, no need for code breaking!
Yes, the Y is encrypted as H as well as as K (hm, this sounds weird). Funny/tragically enough in many a text or video about cracking Enigma there is a crib 'Keine besonderen Ereignisse' that is spelled as 'Keine besondere Ereignisse' , without the 'n'. One starts to wonder.... I hope Alan Turning wasn't plagued by this.
The very best codes to encrypt are from languages you don't know. There were a number of American tribes whose codes were never broken (although it's ironic ,as it was the Europeans that wiped out most of the North American Indians).
+Paul L That is "Security by Obscurity", which is something you do not want in cryptology. The strength of such an "unknown language code" relies solely on the enemy having no knowledge of the algorithm, in this case the language. At the moment they get a person speaking this language (e.g. by someone defecting or being kidnapped and being forced) the algorythm is known and your whole system is broken. Good codes rely on the secrecy of the key not the algorythm, so even if your algorithm is known, your system is secure as long as the keys are. This is called Kerckhoff's principle and is the basis of any modern cypher like e.g. AES.
Geographus666 OK show off. (Only joking.) I still don't understand the public key system, but I understand that it is a very good system PGP relies on that system as far as I know(?). One of the only other things I know about encryption is that prime numbers are used for most bank transactions. If someone can crack primes then the banking system would be up a paddle without a creek.
I would have liked to have asked a question about different cultures and the messages sent - were any of them frivolous or just plain communication? EG: Did they send salutations or gossip?
The British invented the electronic digital computer specifically to crack the Enigma. After WW2, they moved them out of Bletchley Park but kept them totally secret. No commercial use was considered. (1) because the military dong think like that. (2) because the Soviets used Enigma and Britain continued to crack their codes.
05:36 I solved it before this point, but It bothered me why is "Y" supposed to be encoded by two different letters: "H" and "K". Looks like some kind of a typographic error to me :P
The one time pad refers to coding using teleprinter traffic which is what the German Lorenz coding machine used - this was the preferred machine of Hitler and the High Command. It had nothing to do with Enigma. The Typex was the coding machine that British Intelligence used and the Germans never broke that. Although Rockex was up and running by 1943 it wasn't used in the same quantities as Typex.
6 cables = 12 connections = 26*25*24...*17*16*15 = 4,626,053,752,320,000 this means that there would be 487,845,124,504,657,920,000 keys. How did he get only 100,391,791,500 cable combinations?
Seth Lester The official formula for unique combinations is (26!/14!/6!/(2^6)), the issue is that you are still double counting a lot of essentially equivalent keys on the switchboard, you have to divide out all the repeats. the 6! is simply all the unique orderings of the 6 plugs that lead to the same equivalent switchboards and the 2^6 means that each of the 6 plugs can be in either direction. Hope it helps!
There are certain British codebreakers who wrote some very spurious claims after the war finished. The fact is that Dilly Knox was close to breaking the Military Enigma when we got certain info from the Poles and that enabled Knox to break the Military version in Jan 1940. Had it not been for that info it would probably have taken Knox another 6-12 months to break it - not 2 years. As for 1 messsage in 7, also not true. I know, I work at Bletchley Park and have access to the archive info there.
Also Polish were sent German enigma by post mistake as two towns one in Poland and Germany have same name . A lot of myths and cover ups with security services that is their stock in trade .
No but that was mid 1943 nearly 3/4 of the way through the war. The Germans always had access to the merchant code and that told them when and where the the convoys were going....and they could always trianglulate the convoy position using the transmittions from patrol bombers and convoys.
All military enigmas had an issued set of 8 rotors but the machines were only designed by rotor capable installation "slots" to use only 3 of those rotors at any one time, selected daily and installed in the enigma in the order required by that days enigma setting.....In January of 1942, the German Navy changed all their Atlantic Fleet (UBoats, weather ships and ocean trawlers, resupply ships) enigmas. Their 3-rotor capable enigmas were exchanged for new 4-rotor capable enigmas......(the original sets of 8 actual rotors were NOT changed nor were any "new" rotors issued as each separate rotor had been, by design, been independently wired....! In February 1942, the German Atlantic fleet was ordered to institute using their new 4 rotor capable enigmas using that days new setting/rotor order. That order when it was instituted, blacked out Bletchley Parks ability to "read" any German Atlantic fleet enigma message. The German Navy, based on available supply then instituted the same change from the 3-rotor to the 4-rotor enigma......it was later in the fall of 1942 that the British managed to "acquire" by a secret "pinch" new 4-rotor enigma use codes from the sinking German UBoat 559, although after boarding that sinking sub, two of the Royal Navy boarding party were drowned when, just after passing up to another member of that boarding party, that captured 4-rotor enigma material. It was taken back to Bletchley Park when that new "pinched" enigma material analysis allowed them to "break" back into the new German 4-rotor system, greatly relieving British and US cryptological efforts to finally defeat the very critical Atlantic Uboat threats to allied convoys.....
szili76 Enigmas were first issued with five interchangeable rotors, with in use rack space for three, then newer models of the naval enigma were issued with eight interchangeable rotors with rack space for three.....then the new German naval enigma, (prior to 1 Feb 1942) was issued with eight interchangeable roots, with rack space for four (4) rotors......the German Army, German Air Force used their own enigma models, some with plug boards like the naval enigma had, but some without the plugboard.....German government departments, their diplomatic service, the SS, the railway system, the labour organization etc etc, all used different enigma models and, every service/department etc all used rotors, and each of those rotors were all independently and separately wired.....at war's end, the combined US and UK Ultra Top Secret Target Intelligence Committee (TICOM) searched throughout Europe for everything related to cryptography, seizing almost every resource, cryptographic staff member, cipher machines, codes, ciphers, files, etc....see the newly declassified on-line TICOM Archives for details.......and the Enigma was the lower level, tactical German cipher MACHINE, NOT a code.....the Germans used four (4) completely different cipher machines....their highest Top Secret strategic level cipher machine was the Lorenz (code named Tunny by Bletchley Park) also described by the Germans as a "Geheimschreiber" or "Secret writer" used only by Hitler and the German general staff for all highest level command and control purposes, issuing operational plans and orders......the enigma was a 3-4 rotor double encryption cipher machine while the Lorenz was a 12 rotor triple encyphering machine married to a high speed telex typewriter system....it's numerical permutation capability was over 4 Quadrillion, million, million, million, while the enigmas was only 1/4 that......after Bletchley Park cryptographer Bill Tutte "broke" into the Lorenz, without ever having seen one.....a high speed, memory based, digital computer was designed and built by Tommy Flowers (who also financially contributed to its manufacture out of his own pocket, (he being an engineer with the British Post Office, not a Bletchley Park staff member), and then installed it and put it into operational use at Bletchley.....it was called "Collosus", and post war was continued in use by the Government Communications Headquarters, (GCHQ)......and NO....Alan Turing was NOT at all involved with cracking Lorenz nor conceiving Collossus......!
For much of the pre-war period, they were only using 3 rotors. That is why the Polish Bombe was such an effective machine - it could simultaneously run all six ordering of the rotors. Yes, _during_ WW2, the standard Army/Luftwaffe Enigma used 3 of 5 rotors (and also used 10 plugboard wires), but when Enigma was initially broken, there were only 3 rotors in use.
58:30 I think that the saddest thing is that people had to be sacrificed because otherwise the Germans would have known we cracked their codes. But imagine we did let them know we cracked their codes (!?) What would they do then as a code ?
ZER0 The British, continuing the original enigma work by the Polish cypher mathematicians, "broke into" the revised Enigma MACHINE.....knowing then how it functioned, they worked on reducing the astronomical number of possible permutations, based on mathematical analysis, human technical transmission errors by German enigma operators (repeating encrypted texts in plain language etc), various captured German code books (short weather code, short code, officers code etc, etc) the Atlantic UBoat grid location tables, wiring enigmas in series (this first British "bombe" replicating what the Poles did and showed the British how to do) secretly "acquiring" the enigma technical details held/registered in the British Patent Office, using captured enigma rotors (full set) and captured enigmas, using captured Luftwaffe enigma code books, "acquiring" trashed enigma messages from two German army offices, sending Bombers on specially targetted missions and using the German air defense enigma messages to match up by name, those targets, employing a very large series of "Y" radio intercept stations, "grid-locking" UBoats as part of the British/Canadian and US Direction-finding (HF-DF) "triangular fixing" radio system, using broken Japanese diplomatic codes (the Japanese Military attache in Berlin used to make very frequent, highly technical and very reliable intelligence reports back to Tokyo).....capture of short weather code books from "pinches" made from captured German trawlers, weather ships, UBoat resupply ships etc).....planting disinformation "lost" messages/where they would be easily "discovered and recovered" by German military and intelligence agencies, using British controlled double agents to spoon-feed the Germans a "barium meal" of partly true, mostly false intelligence reports, conducting clandestine commando raids used as tactical cover for special intelligence units "pinches" of enigma (and Lorenz) cypher materials, codes and related documents. There were many other cypher acquisition tactics used.....as now previously ULTRA Top Secret highly classified files are now being declassified and released into public archives......a most recent book: "The Third Reich Is Listening-German code breaking 1939-45" by author Christian Jennings, published and released in October 2018, now reveals the German code breaking successes/failures......!
I read that an Enigma machine was sent by mistake to someone in Poland and it was recognized and then reverse engineered and then carefully reassembled and returned to the sender. Is that a myth?
NO, IT IS NOT MYTH. THE GERMAN DIPLOMATIC TEAM IN WARSAW WAS WAITING FOR A PACKAGE. THEY WENT TO THE POST OFFICE OR WHATEVER IT WAS CALL ASKING IF A PACKAGE ARRIVE, SEVERAL TIMES. POLISH OFFICIALS BECAME SUSPICIOUS AND ALERTED POLISH INTELLIGENCE AND SINCE IT WAS A FRIDAY AND THE POST OFFICE WAS CLOSED ON WEEKENDS, THE THREE CRYPTO SPECIALIST OPEN THE PACKAGE, AND FOUND AN ENIGMA MACHINE. THEY QUICKLY RECORDED ALL THE INFORMATION NEED, REWRAPPED THE PACKAGE IN TIME FOR THE MONDAY MORNING SUSPECTED APPROACH OF THE GERMANS DEMANDING THEIR PACKAGE. iT TOOK THEM THREE WEEKS TO SOLVE THE WIRING SETUP AND, BINGO, THEY COULD DECIPHER MANNY OF THE MESSAGES. THIS WORK ALLOWED THE POLES TO LEARN THE GERMAN TERMINOLOGY WHICH IDENTIFIED GERMAN UNITS, TANK TYPES, FUEL NEEDS, TROOP LOCATIONS, TO INCLUDE THEIR NEEDS, SUCH AS FOOD, CLOTHING AMMUNITION, COMMANDER RANK AND THEIR CODE IDENTIFIERS AND SO MUCH MORE LEAVING THE BRITS THE SIMPLE DUTY TO KEEP IT CURRENT WHEN CHANGED, THAT WITH ALL THIS INFORMATION TO START WITH. ALL THE GERMAN ARMY COULD BE MONITORED DAILY.
The solution is wrong the answer would have to be be "can attain UP remaining on the level" since the Y was already used, the only other 2 letter word left that can make sense is UP.
They used the top row of the keyboard as numbers, and indicated that they were going to send a number by typing Y. So, for example, if they wanted to type the number 54, they would type YTR.
actually the machine was desgined to find the settings of a particular day. Now the rotors rotate checking each of the possible rotor settings (eliminating some of the settings as a letter cannot be encoded into itself and for other reasons). Whenever the desired settings is reached the internal circuit faces an open circuit so the electricity for the next move of the rotors is cut and the rotors , i.e. Christopher(the bombe actually, I really dont know from where the director got that name and the story of Turings' friend, perhaps to present the homosexual nature of him?) stops. By the positions of the rotors one can easyli do the rest of the job of decoding the messages, keeping in mind that theres an Enigma was available at the Bletchly Park
Thanks. But how does the machine recognise a setting is "desired" and therefore choose to open the circuit? How could it recognise when a right character or word fit the original message?
It actually does not open the circuits like we open our windows when we wish. The rotors and all the moving parts faces each circuit representing each of the settings when they are rotating and as it is impossible to build 150 million^3 circuits you can understand most of the circuits was made by combining different moving parts of the machine. When ever the Bombe is tasked to find a settings it starts brute attack on the possible settings with the help of the clues inserted in the machine.Now the rotors started rotating and all the moving parts forms different circuits on each step of the rotors thereby checking the settings. The principle of Operation of the machine lies in "whenever the desired circuit(equivalent to the desired settings) is reached the combination of these moving parts will create a loophole somewhere(i.e. opening the circuit) and the conduction of current will be stopped." The mechanism was built that way. I cant explain you with further more technical details as I am just a rookie in Cryptography. Have a nice day.
Yes, Turing's bombe was built from the beginning around the assumption that there would be a crib. It wasn't a last-hour flash of insight as dramatized in the movie. It's the whole reason the machine needs rows and rows of wheels on it to begin with. And don't get me started on "Christopher." Bletchley Park did build the first fully programmable electronic computer in the world, but it was a different machine from the bombe and neither one was named Christopher.
I was under the impression that when you use 3-letter "encryption codes" each 3-letter code is permanently assigned to a work commonly used in whatever "industry" or "military service" and in the interests of brevity, simplicity and "speed" the "vocabulary" is kept very small and the actual ENCRYPTION is done so that day to day OR message to message the machines at BOTH ENDS are reset to a new "circuit" and UNUSED 3-digit "codes" are used and are entered as the "code" and the "clear text" at the other end is STILL just a 3-digit "code sequence" that any outside party trying to "decrypt" the messages has to have the DICTIONARY FOR or "cracking the code" doesn't mean jack shit. Any comments on Enigma machines being widely used commercially produced machines found all over the world long before WWII? How does "Enigma" relate to TELEPHONES? Or TELETYPES? Any comments on the similarity of a 3-letter "code message" used by a military force to 3-letter STOCK SYMBOLS used for "international business" going back to the invention of the STOCK TICKER?
I wonder if he chooses not to repeat the questions asked so that we have to break the code and figure out what the fuck the question was. Regardless, really cool presentation.
It is true that many of the perceived faults in the Enigma were in its implementation rather than innate to the machine. However, it takes more brains to crack a difficult cypher than it does to create one.
The British contributions to Enigma cryptanalysis are not denigrated by adding more details than in any previously-published book I've read about what the Poles did with the cryptanalysis, and certainly not the amazing story of how the codebreakers made their way from Poland to France, and then out of occupied France -- XYZ was an amazing read, and I highly recommend it to everyone who cares about the history!
Although the Enigma code was cracked by Englishman Alan Turing and his team at Bletchley Park during WWII, the Poles indeed had their crucial starting contribution
Why do you stubbornly persist with your stupid lies? Why do you feed people with it? You know perfectly well three Polish mathematical geniuses (M. Rejewski, H. Zygalski and J. Różycki) broke the Enigma code already in 1931 and later on gave the entire necessary data to you on the plate to use it. The Bomb was was not Turing's but 100% Rejewskiĺ design. Without it the only thing you were capable of would be just to stick your middle fingers in your asses and wiggle them a little. Nothing else. Why are you always steel someone else's achievements for your own undeserved glory? How did you treat the Polish pilots during the victory parade in 1946? Shame on you, English unscrupulously ungrateful egoistic lying leech.
Turing's Bombe was named after the Polish machines, but vastly more complex. The fact is, the Poles were forced to give up since the Enigma became too tough to crack by their techniques.
The enigma was a "code machine" NOT a "code" ! It was capable of sending and receiving encyphered codes.....they Germans used quite a few "codes". Also the enigma code machine was a lower level, tactical use, code machine albeit of complexity.....the Germans used the Lorenz (12 rotor teletypewriter system) which was extremely complex, much, much, much more so than the enigma.....!
IT'S THE ONLY THING THE ENGLISH CAN CITE FOR THEIR EFFORT IN FIGHTING GERMANY. ENGLAND GOT THEIR ASS KICK OFF THE FRENCH COAST. THE BRITS ARE LUCK HITLER TURNED HIS FORCES ELSE WHERE. SURE THEY MADE BOMBING RUNS AT NIGHT, RARELY HITTING ANYTHING. WHEN THE BRITONS LOOK BACK, THEY REALLY CAN'T FIND ANYTHING WORTH WHILE TO TALK ABOUT, SO THEY CONCOCT THIS STORY TO BOOST THEIR IMPORTANCE IN THE FIGHT. AND AS FOR THE FRENCH, THEY HAVEN'T WON A WAR SINCE BOOTING THE ENGLISH OUT OF NORTHERN FRANCE BACK IN THE 16TH CENTURY. iT'S BEEN SAID CHURCHILL HAD ALL THE DECIPHERING EQUIPMENT DESTROYED AFTER THE WAR. DID HE REALLY.🤔
I am guessing you made a miscalculation when you glossed over the plug board. The plug-in board is basically 26! which is an absolutely massive number if it was all 26 letters, but it is only 10 pairs, so we can divide those out. Also, it does not matter what order the pairs are in, and it does matter what order the actual individual pairs are in. 26! is then divided by 6!10! and 2^10 So at the end of the day it is: 3 out of 5 possible routers: 60 possible combinations 26^3 for the number of options on each router (total of 3): 17576 possible combinations and the plugin board amounts to: 403291460000000000000000000 DIVIDED BY 2675441664000 So the final calculation is 150738274516158 (plug in board) X 60 (rotator configurations) X 17576(combinations of those rotators) = 158,962,554,773,760,150,279 possible ways to interpret enigma If you did one of these combinations every second through reduction, it would take you about 5 trillion years to break the code. Of course, You will never see a word that starts with xdrft, so that number can be reduced, but even then, it would still take millions if not billions of years.
You've factored in that it doesn't matter which way round the cables are, but you forgot to factor in that the order of the plug cables is irrelevant, so A-B,C-D gets the same result as C-D,A-B. So you need to divide your result by the possible cable permutations, which is 6!
dave28lax I did not intend any offense by my comment, nor to diminish your previous comment. If I had understood in time that nC2 denotes n *(n-1)/2, I would not have posted anything. (But why such a tone? Did I offend you? Let me post, maybe someone else finds it helpful?)
i dont see why the plug board creates so much extra complexity, whether you swap letters one time or 10 times, the end result is still just one swap, just a different letter and it will be that same letter for the full duration of the day
If I understood right, it's because the plugboard isn't really there to create complexity for the ciphertext, it's there to significantly expand the number of potential daily keys. So while it's probably not mixing up the encrypted text all that much, the important number to look at isn't that just 6 sets of letters are swapped, but that there are over 100 billion ways to place the 6 cables in the 26 holes in the plugboard. That makes it so there's 100 billion times more ways now to arrange the board every day, i.e. 100 billion times more potential daily keys. Without the plugboard, there are just ~100,000 possible daily configurations/keys, and that's a small enough number to brute force by trying all possible configurations each day. With the plugboard, there's suddenly >10 quadrillion possible configurations/keys each day, which is no longer brute-forceable. So it's about expanding the key space and blocking brute force attacks, not obfuscating the text too much -- the rotors already take care of enough obfuscation. I think!
There are LOTS of lectures/vids on Enigma, but this is the BEST to understand the real decoding process.
This guy is a trooper, holding his tie up for an hour.
This is quite helpful. I have read and seen a great deal about the cracking of the Enigma; this video helped me to understand the challenges and the breakthroughs of Turing and his colleagues.
I thought he was joking when he said that he would be going to hold his tie up during that whole lecture
Hahah I thought that too :) But then he actually does that throughout the whole lecture :P Isn't that sweet of him? :P I watched this for the first time in 2010.... It had about 1000 views then. now it's 1/3rd of a million.
bro didn't you listen hes a cryptologic mathematician he likes complex solutions and doesn't live in the real world that much :D
Excellent talk. Thank you David Perry. Good on ya mate. And thanks for posting this lecture.
Brilliant explanation, I have wondered for a long time how these machines work, most videos I’ve seen don’t go as in depth. Thanks for uploading.
This is an awesome explanation! Only things missing (which are important details) are the ring-settings which determine when a rotor steps and the double-stepping mechanism. A normal odometer triggers the next ring after it gets to zero again, so at the 10th click (starting at 0). Using the ring-settings of an Enigma rotor you can change when this triggering of the next rotor starts, which makes for even more combinations. Apart from that we also have something called double-stepping which is a flaw of the mechanical setup of the rotor rotation mechanism using ratchets and pawls. When the second rotor rotates a click, the first one will too and the same is the case for the third rotor (near the reflector), so basically there are a few ring-settings less (for instance: if the second rotor steps, the first will too, but that means the possibility of only the second rotor is stepped is not there DURING encryption. In initial setup that setting is there). You need to have an actual Enigma mechanism to understand this.
The number of non-used ring-settings is very small, so you can basically neglect it, or maybe not? Maybe, you can even find out the ring-settings because of this double-stepping flaw. Each flaw is a potential attack vector.
I love the Enigma and basically all mechanical encryption devices. I dont like digital encryption, for the sake of liking a specific type of technology. Digital encryption is mechanical too in a sense, as a switch is an implementation of an abstract mechanical principle basically, a seesaw mechanism. As a transistor is a switch, we can conclude that a processor is mechanical. The fact the seesaw mechanism is driven by electrons and doesnt make it any different.
Wait for quantum encryption where we really have non-mechanical concepts, like a situation where a switch can simultaneously be in a on and off position, this is not possible for an abstract switch definition being either on/off, hence our current computers are simply fast mechanical systems and the real next leap and change is quantum mechanics (where as I stated, mechanics is not a correct term, I would use quantum system for instance).
The U-571 mentioned and listed on the board was the name of the eponymous U-boat in the movie released in 2000. However the real U-571 was never captured by the Allies, nor was her Enigma Machine ever taken. The events in the film are loosely based on the British capture of U-110 and her Enigma and cipher keys.
Also completely missed out that the Polish only managed to crack the German army and airforce enigma transmissions (they couldn't decrypt navy transmissions), and that their methods of cracking it become unusable 6 months later when the Germans changed their encryption procedures. While Turing and the British did gain information from the Polish, they created a new method of hacking the transmissions that was useable to decrypt German navy transmissions and also still worked after the germans changed their procedures.
I guess this is the usual case of mericans wanting to gloss over the fact that the british had much to do with WW2 at all......
How did Turing decode messages before these codebooks where found? As far as I understood, these books only confirmed what they already knew.
@@cirrus1964 Many methods and it WAS NOT Turing that was responsable for all codebreaking ! he created the Bombe
They used cribs ! Rodding. they used operator weakness and lazyness. They transmitted operator prompts and even stealing code books
There was one more variable in the Enigma. The operator also had to set up at which rotor position would it advance the next rotor. Not necessarily Z moves the next rotor but maybe A or G, etc. Maybe that was in one of the improved versions of the Enigma but either way it added a whole lot more keys to it.
Cryptologic mathematician at the NSA. Clearly very clever indeed. But doesn't think to simply clip the microphone further up his tie. It's interesting how great minds work!
Or take a hammer to the enigma we should just have jammed German radio from beginning of the war with cheap jazz music drive em crazy.
Farther up his tie is still under his chin. He's holding the mic in front of his mouth.
@@frederickbowdler8169 That is not so simple ! at best could only disrupt a small percentage
This was amazing, thank you so much. And thanks for keeping the mood very light, it made your explanations that much easier to follow
Oh man - you didn't even mention the other big weakness: no letter can ever possibly map to itself. That was very important too.
Good job David Perry.
one of the greatest minds in cryptology... but couldn't "decrypt" the fact that If you took a minute of your time to move the mic will save you the rest of the lecture holding it in place
That's more a stubborn/awkward thing.
He probably felt too awkward to move it, after he'd already held it up for a minute or so. By then it would be really awkward to just move it 20 minutes into the lecture. The stubbornness comes from not caving in to the awkwardness.
It's kind of like if you go to a drive-thru, and the line seems long. You may say "I should just go somewhere else", but you decide from stubbornness/laziness to wait. Well, now you've been waiting for 2 minutes and still haven't moved. Is it too late to just get out of line? Well, you'd have to wait until you get a few spots ahead to actually pull out (maybe you're blocked in now). By that time is it worth it? After all by then you've moved up a bit and can now order at the speaker........ but the line is still going so slow, it still may just be faster to go somewhere else.... but you already have so much time invested in it.... do you stay? Who know after you order the line may go fast... but judging from the information you already have, it's not. But after waiting 20 minutes in line is it even worth it anymore to go somewhere else? If it would only take 10 min to go somewhere else that would be better than waiting 20 more minutes in this line.... but we don't know how much time is left, or if the place we want to go will even be that fast! So in the end you, and most people, just wait it out.
If you decide from the get go (i.e. before you really get into the line) to leave, that's different. I've done it, a lot of people have done it. But I've also done the above where I know I should leave and cut my wait time, but I'm too stubborn, lazy, and don't have enough information (who knows if the other restaurant isn't just as busy), and I just wait for an eternity...
It's kind of like that. Logic dictates X, and most of us would choose X given enough time and knowledge. But in the moment, without knowing exactly what's going to happen, or not caring right then, we instead just keep with Y instead of changing to X.
The problem is not only how far up the microphone is.
If he pulls the microphone higher, he places it closer to his mouth, but also more into the "shadow" of his chin.
Notice when the lady uses his microphone. She has to be almost perfectly in front of the mic to be amplified.
Part of what you re talking about is called "sunk cost fallacy".
The speaker moving up the microphone is different because if the higher position works, there is no ambiguity about having made the right decision.
Awkwardness may have been part of the reason he kept with his chosen strategy.
Non-mathematician. Zero interest in (typical?) algebra, never mind abstract algebra. That guy made things interesting enough for non-mathematicians to grasp. Good talk. +1
I think his casual tone---seems to imply, that the Enigma machine was nothing to be in awe of. In other words, he's basing his views and attitudes from the perspective, that 75 years of advance and improvement has been gained. FROM THIS AMAZING MACHINE.
There were actually five rotors in the early Enigmas - you picked three from the five. So you had 5*4*3 = 60 ways of doing that - not just the six you'd have if you were just ordering three rotors. Later on it went to eight, with three chosen. And the German Navy added a fourth rotor.
The Powerhouse Museum in Sydney has an Enigma machine, and 20 odd years I was able to visit the storage area and have a closer look at it - as a WW2 buff, it was a great thrill!
The movie _Das Boot_ also depicts the use of an Enigma machine.
That bloody tie! Why didn`t he just move the mic higher?
ive been recommended this for a reason
Excellent video
I was in Turkey 1957-1959 and Det 3 was the unit that worked with NSA, I was just a support person.
@5:02 Error: both K and H translate to Y in his solution. Guessing that there is a typo, and 'XH' should have been 'XK', or that 'CYCIK' should have been 'CYCIH'
Any one have idea wer to find the second part this lecture?? I'm really looking for more insightful video on how enigma was broken...
Very interesting video but neglects to mention an extremely fundamental flaw in the Enigma machine that helped in breaking it was that a character can NEVER be encrypted to itself.
4:00 That's exactly the level of encryption you get with the enigma IF and only IF you only need to worry about the plugboards and you have correctly worked out the rotor settings. And only having to work out the rotor settings reduces the amount of combinations for brute forcing. If you know part of the plain text, you only need to work out rotor settings where the letters come out the same as each other respective of where they are the same in the plain text message. For example, if the message is always known to start with hello, then you know a good chance letter at position 3 & 4 should be the same after the correct rotor settings and there is only like 17576 rotor settings to go through which is possible brute force using modern computers today.
Would have been great to compare the enigma code to other coding platforms that existed back in WWII.
In the attack on Coventry, the British were aware that a major attack was going to take place, but the code name used to identify the target was unknown, so a general warning went out, placing all of the civil defence on high alert.
However the claim that the British might have evacuated Coventry if they had known it was the target is nonsense, no town was ever evacuated because it was under threat from bombing. The British had already evacuated all the women and children from the major towns who were willing to go, any further evacuation would have impared the war effort more than the bombing would have, so it was never an option
Super course! Have been waiting for this.
In one of the books about the work going on in Bletchley Park, it mentions that it was possible that the code breakers knew about the Blitz on Coventry, but no more than four hours prior to the attack. It is unclear in that book, which city was to be bombed.
Another source said that the Airforce codes meant that the code for London, was exactly the same as for Oxford. This is another reason why the British did not react, as it was likely to be unclear which city would be Blitzed in under four hours.
I have not seen any sources which say that anyone had found out, or if they had not. There is however evidence that the code breakers of Bletchley park, kept information away from the Admiralty, and were choosing which of the convoys to allow through, and which ones were allowed to be attacked. This was purely to let the German military think that the British have not cracked the Enigma codes.
I can't believe he held his tie that long.
Going over a bump and the CD continuing is not error correction, its pre-buffering. Reading over a scratch in the optical media is error correction :P Bouncing the laser way off the track isn't error recoverable because you cant read the error recovery data either :P
Yeah he got that wrong!
There actually was a mistake/typo in his initial puzzle as the symbols representing Y in the solution were shown to be both K and H
it was UP not BY. "can attain UP remaining on the level" is the only possible answer that makes sense.
How did the information deciphered get distributed with out getting cracked ..... what encryption did the allies use to share the information?
Great lecture!
Well, you didn't mention that the visible ring on the rotor could be adjusted by an offset relative to the wiring. The visible ring controlled when the rotor turned over its neighbor, and the wiring was independent of that. The offset for each rotor was also part of the daily setup.
And, you didn't mention the double step. I guess it's not really that important - it weakens the code space size a little, but it's not really germane to understanding how the thing works. But in fact it DOESN'T work exactly like an odometer.
The offsets, though, were important - that added another factor of 26^3 to the size of the configuration space.
59:00 Hubris turned against the nazis. They NEVER considered their Enigma cipher could have been broken. They would explain it every other possible way except the cipher being broken every day a couple of hours after 7:00 AM. Credit goes to the Polish mathematician that found an ALGORITHM to break Enigma. An algorithm means that it is not brute force (trying out every possible configuration of rotors, plugboard, etc....) but a shortcut that reduces drastically the number of possible configurations to be tried out. But the Polish mathematicians stopped there: they didn't know how to implement the algorithm they had discovered. Even if it was a shortcut, it was still too many calculations to be done manually, even by hundreds of people crunching numbers with pencil and paper, in an efficient way (before the nazis changed the configuration every day at 7:00 AM, only 24 hours from the first intercepted message to find the configuration for that day). The credit for inventing an electromechanical device that could implement the Polish algorithm and find the configuration in a couple of hours after 7:00 AM goes to Alan Turing.
Read about Rajewski's cryptographic bomb that enables the automation of Enigma decryption :)
@Channellock12 I believe it was a machine called the M-209 and a lot of Navajo code talkers..
for a brilliant guy re clipping his tie higher up seems to defeat him!
The problem is not only how far up the microphone is.
If he pulls the microphone higher, he places it closer to his mouth, but also more into the "shadow" of his chin.
Rob Harris You have to put the microphone ahead ( in line with the sound waves), doesn't matter a lot how much closer...
Luca Gandolfo
how about just unclipping it? I can't believe the host of this gathering or anyone else for that matter would let him go on without suggesting at least that.
little help!
mhern57 I don't know... All i can say, is that this type of microphone are less used respect the model with a little metallic arc that goes on the side of the head. 😉
... I'm a double non-alumnus of F&M College. His confusion with microphones does not therefore surprise me.
He forgot about the Ring Settings. Each ring on the rotors was rotated too.
+Ron Covil weren't ring settings a little more infrastructure, in that it wasn't a regular daily setting, more of a field modification? greatly increased permutations, no doubt.
The ring setting IS the rotor setting.
All this intelligence yet he still speaks into his tie!
@Channellock12
the best - and slower and complicated - was the One Time Pad.
The rotored Enigma was improved to become the Type X machine with 5 rotors and plug boards.
Then, the Rockex machines, one regular tape en clair but coded by a second tape.
Today they mostly use a sort of teletype with scramblers.
Can we see part 2 somewhere?
Thanks for sharing.Very informative.
Surely when you press A a switch is thrown which blanks out the A light bulb and that is why an A never translates as A. Am I correct.?
Did nobody think to come on and adjust his mic?
Awesome video, it was very well explained. Thanks for sharing!
The germans cracked the allied codes through the war as well- and the allies never knew that either, however the US changed the system in 1943 locking the Germans out after that.
They knew the merchant code and thus were able to track allied convoy routes.
That simply isn't true.
The Americans had no crypt analysis as it was disbanded at the end of the First World War and relied on the British to get them back up to speed.
German agents in America reported the departure of convoys to their controllers, no need for code breaking!
Very interesting, and it does, at long last, answer my question why a letter couldn't cipher to itself.
I remember watching it for the first time in 2010, when it had about 1000 views ;)
Most of these views came after the movie "The Imitation Game" which inspired people's historical curiosity.
@@Trifecta3x3 ... and that movie was 50% bollocks.
Nicely ironic an American explaining how the British Poles and French cracked the code
are there other videos with this guy ?
Great video and I searched for more but unfortunately couldn't find any other David's materials, even if he did some cryptology lecturing years ago.
This guy is so intelligent ... why does he not detach the microphone from his tie?
Could it be “vigenere” this 8-letters on 21:48?
So... How did they do numbers? I would not want to put Lat/Long in plaintext. And spelling it all out seems odd.
Thanks very much, I thoroughly enjoyed that.
It come down to the author who wrote the book on a 100 ways a cat can catch a rat and 100 ways a rat can escape a rat
There is a flaw in the Cryptogram as CYCIK is either CYCIH or XH should be XK
Yes, the Y is encrypted as H as well as as K (hm, this sounds weird). Funny/tragically enough in many a text or video about cracking Enigma there is a crib 'Keine besonderen Ereignisse' that is spelled as 'Keine besondere Ereignisse' , without the 'n'. One starts to wonder.... I hope Alan Turning wasn't plagued by this.
The very best codes to encrypt are from languages you don't know. There were a number of American tribes whose codes were never broken (although it's ironic ,as it was the Europeans that wiped out most of the North American Indians).
+Paul L That is "Security by Obscurity", which is something you do not want in cryptology.
The strength of such an "unknown language code" relies solely on the enemy having no knowledge of the algorithm, in this case the language. At the moment they get a person speaking this language (e.g. by someone defecting or being kidnapped and being forced) the algorythm is known and your whole system is broken. Good codes rely on the secrecy of the key not the algorythm, so even if your algorithm is known, your system is secure as long as the keys are. This is called Kerckhoff's principle and is the basis of any modern cypher like e.g. AES.
Geographus666 OK show off. (Only joking.) I still don't understand the public key system, but I understand that it is a very good system PGP relies on that system as far as I know(?). One of the only other things I know about encryption is that prime numbers are used for most bank transactions. If someone can crack primes then the banking system would be up a paddle without a creek.
I would have liked to have asked a question about different cultures and the messages sent - were any of them frivolous or just plain communication? EG: Did they send salutations or gossip?
If he only knew that clip mic has a alligator clip on it...............that's why they call it a bloody clip mic!
The British invented the electronic digital computer specifically to crack the Enigma. After WW2, they moved them out of Bletchley Park but kept them totally secret. No commercial use was considered. (1) because the military dong think like that. (2) because the Soviets used Enigma and Britain continued to crack their codes.
05:36 I solved it before this point, but It bothered me why is "Y" supposed to be encoded by two different letters: "H" and "K". Looks like some kind of a typographic error to me :P
i fucking wasted 15 minutes cause of that shit.
I found that too, and assumed a mistake was made somewhere: either the original encrypter, the typesetter, or the presenter.
the real answer to the puzzle is "man can attain UP remaining on the level"
The one time pad refers to coding using teleprinter traffic which is what the German Lorenz coding machine used - this was the preferred machine of Hitler and the High Command. It had nothing to do with Enigma. The Typex was the coding machine that British Intelligence used and the Germans never broke that. Although Rockex was up and running by 1943 it wasn't used in the same quantities as Typex.
6 cables = 12 connections = 26*25*24...*17*16*15 = 4,626,053,752,320,000
this means that there would be 487,845,124,504,657,920,000 keys.
How did he get only 100,391,791,500 cable combinations?
Seth Lester
The official formula for unique combinations is (26!/14!/6!/(2^6)), the issue is that you are still double counting a lot of essentially equivalent keys on the switchboard, you have to divide out all the repeats.
the 6! is simply all the unique orderings of the 6 plugs that lead to the same equivalent switchboards
and the 2^6 means that each of the 6 plugs can be in either direction.
Hope it helps!
Thank you, I knew there had to be some sort of oversight.
But K and H are both encrypted as Y in the first puzzle?
jqbtube in his next slide he shows that Y is encrypted to H so its a mistake. confused the hell out of me when i tried to solve it in 5 minutes.
jqbtube 8uyy7
There are certain British codebreakers who wrote some very spurious claims after the war finished. The fact is that Dilly Knox was close to breaking the Military Enigma when we got certain info from the Poles and that enabled Knox to break the Military version in Jan 1940. Had it not been for that info it would probably have taken Knox another 6-12 months to break it - not 2 years. As for 1 messsage in 7, also not true. I know, I work at Bletchley Park and have access to the archive info there.
Also Polish were sent German enigma by post mistake as two towns one in Poland and Germany have same name . A lot of myths and cover ups with security services that is their stock in trade .
Well done Poland
No but that was mid 1943 nearly 3/4 of the way through the war. The Germans always had access to the merchant code and that told them when and where the the convoys were going....and they could always trianglulate the convoy position using the transmittions from patrol bombers and convoys.
5 rotors!!! They had 5 rotors to choose 3 from. Get it? Place for 3 rotors in the machine but 5 different rotors to choose from.
All military enigmas had an issued set of 8 rotors but the machines were only designed by rotor capable installation "slots" to use only 3 of those rotors at any one time, selected daily and installed in the enigma in the order required by that days enigma setting.....In January of 1942, the German Navy changed all their Atlantic Fleet (UBoats, weather ships and ocean trawlers, resupply ships) enigmas. Their 3-rotor capable enigmas were exchanged for new 4-rotor capable enigmas......(the original sets of 8 actual rotors were NOT changed nor were any "new" rotors issued as each separate rotor had been, by design, been independently wired....! In February 1942, the German Atlantic fleet was ordered to institute using their new 4 rotor capable enigmas using that days new setting/rotor order. That order when it was instituted, blacked out Bletchley Parks ability to "read" any German Atlantic fleet enigma message. The German Navy, based on available supply then instituted the same change from the 3-rotor to the 4-rotor enigma......it was later in the fall of 1942 that the British managed to "acquire" by a secret "pinch" new 4-rotor enigma use codes from the sinking German UBoat 559, although after boarding that sinking sub, two of the Royal Navy boarding party were drowned when, just after passing up to another member of that boarding party, that captured 4-rotor enigma material. It was taken back to Bletchley Park when that new "pinched" enigma material analysis allowed them to "break" back into the new German 4-rotor system, greatly relieving British and US cryptological efforts to finally defeat the very critical Atlantic Uboat threats to allied convoys.....
szili76 Enigmas were first issued with five interchangeable rotors, with in use rack space for three, then newer models of the naval enigma were issued with eight interchangeable rotors with rack space for three.....then the new German naval enigma, (prior to 1 Feb 1942) was issued with eight interchangeable roots, with rack space for four (4) rotors......the German Army, German Air Force used their own enigma models, some with plug boards like the naval enigma had, but some without the plugboard.....German government departments, their diplomatic service, the SS, the railway system, the labour organization etc etc, all used different enigma models and, every service/department etc all used rotors, and each of those rotors were all independently and separately wired.....at war's end, the combined US and UK Ultra Top Secret Target Intelligence Committee (TICOM) searched throughout Europe for everything related to cryptography, seizing almost every resource, cryptographic staff member, cipher machines, codes, ciphers, files, etc....see the newly declassified on-line TICOM Archives for details.......and the Enigma was the lower level, tactical German cipher MACHINE, NOT a code.....the Germans used four (4) completely different cipher machines....their highest Top Secret strategic level cipher machine was the Lorenz (code named Tunny by Bletchley Park) also described by the Germans as a "Geheimschreiber" or "Secret writer" used only by Hitler and the German general staff for all highest level command and control purposes, issuing operational plans and orders......the enigma was a 3-4 rotor double encryption cipher machine while the Lorenz was a 12 rotor triple encyphering machine married to a high speed telex typewriter system....it's numerical permutation capability was over 4 Quadrillion, million, million, million, while the enigmas was only 1/4 that......after Bletchley Park cryptographer Bill Tutte "broke" into the Lorenz, without ever having seen one.....a high speed, memory based, digital computer was designed and built by Tommy Flowers (who also financially contributed to its manufacture out of his own pocket, (he being an engineer with the British Post Office, not a Bletchley Park staff member), and then installed it and put it into operational use at Bletchley.....it was called "Collosus", and post war was continued in use by the Government Communications Headquarters, (GCHQ)......and NO....Alan Turing was NOT at all involved with cracking Lorenz nor conceiving Collossus......!
For much of the pre-war period, they were only using 3 rotors. That is why the Polish Bombe was such an effective machine - it could simultaneously run all six ordering of the rotors. Yes, _during_ WW2, the standard Army/Luftwaffe Enigma used 3 of 5 rotors (and also used 10 plugboard wires), but when Enigma was initially broken, there were only 3 rotors in use.
Le Chiffre aka "the cipher" is the bad guy in James Bond novel Casino Royale.
58:30 I think that the saddest thing is that people had to be sacrificed because otherwise the Germans would have known we cracked their codes.
But imagine we did let them know we cracked their codes (!?) What would they do then as a code ?
8 źZzz0
566uwu7ùew5aybs3 .
Hazel Mira ?
Paul L LOL
The Geheimschreiber ("Fish"). But that was cracked as well.
ZER0 The British, continuing the original enigma work by the Polish cypher mathematicians, "broke into" the revised Enigma MACHINE.....knowing then how it functioned, they worked on reducing the astronomical number of possible permutations, based on mathematical analysis, human technical transmission errors by German enigma operators (repeating encrypted texts in plain language etc), various captured German code books (short weather code, short code, officers code etc, etc) the Atlantic UBoat grid location tables, wiring enigmas in series (this first British "bombe" replicating what the Poles did and showed the British how to do) secretly "acquiring" the enigma technical details held/registered in the British Patent Office, using captured enigma rotors (full set) and captured enigmas, using captured Luftwaffe enigma code books, "acquiring" trashed enigma messages from two German army offices, sending Bombers on specially targetted missions and using the German air defense enigma messages to match up by name, those targets, employing a very large series of "Y" radio intercept stations, "grid-locking" UBoats as part of the British/Canadian and US Direction-finding (HF-DF) "triangular fixing" radio system, using broken Japanese diplomatic codes (the Japanese Military attache in Berlin used to make very frequent, highly technical and very reliable intelligence reports back to Tokyo).....capture of short weather code books from "pinches" made from captured German trawlers, weather ships, UBoat resupply ships etc).....planting disinformation "lost" messages/where they would be easily "discovered and recovered" by German military and intelligence agencies, using British controlled double agents to spoon-feed the Germans a "barium meal" of partly true, mostly false intelligence reports, conducting clandestine commando raids used as tactical cover for special intelligence units "pinches" of enigma (and Lorenz) cypher materials, codes and related documents. There were many other cypher acquisition tactics used.....as now previously ULTRA Top Secret highly classified files are now being declassified and released into public archives......a most recent book: "The Third Reich Is Listening-German code breaking 1939-45" by author Christian Jennings, published and released in October 2018, now reveals the German code breaking successes/failures......!
Good lecture, but his 'word whisker' - 'Okay ...' - was driving me nuts by the end, in no small part because I used to do the same during lessons.
What if you use the keyword's hash as the Vigenére keyword?
That is *exactly* what I was thinking.
SirCutRy because you said it twice
The British had a computer to help them with decryption. COLOSSUS.
I read that an Enigma machine was sent by mistake to someone in Poland and it was recognized and then reverse engineered and then carefully reassembled and returned to the sender. Is that a myth?
NO, IT IS NOT MYTH. THE GERMAN DIPLOMATIC TEAM IN WARSAW WAS WAITING FOR A PACKAGE. THEY WENT TO THE POST OFFICE OR WHATEVER IT WAS CALL ASKING IF A PACKAGE ARRIVE, SEVERAL TIMES. POLISH OFFICIALS BECAME SUSPICIOUS AND ALERTED POLISH INTELLIGENCE AND SINCE IT WAS A FRIDAY AND THE POST OFFICE WAS CLOSED ON WEEKENDS, THE THREE CRYPTO SPECIALIST OPEN THE PACKAGE, AND FOUND AN ENIGMA MACHINE. THEY QUICKLY RECORDED ALL THE INFORMATION NEED, REWRAPPED THE PACKAGE IN TIME FOR THE MONDAY MORNING SUSPECTED APPROACH OF THE GERMANS DEMANDING THEIR PACKAGE. iT TOOK THEM THREE WEEKS TO SOLVE THE WIRING SETUP AND, BINGO, THEY COULD DECIPHER MANNY OF THE MESSAGES. THIS WORK ALLOWED THE POLES TO LEARN THE GERMAN TERMINOLOGY WHICH IDENTIFIED GERMAN UNITS, TANK TYPES, FUEL NEEDS, TROOP LOCATIONS, TO INCLUDE THEIR NEEDS, SUCH AS FOOD, CLOTHING AMMUNITION, COMMANDER RANK AND THEIR CODE IDENTIFIERS AND SO MUCH MORE LEAVING THE BRITS THE SIMPLE DUTY TO KEEP IT CURRENT WHEN CHANGED, THAT WITH ALL THIS INFORMATION TO START WITH. ALL THE GERMAN ARMY COULD BE MONITORED DAILY.
He sounded so ashamed when he said "I work at the NSA"
@SacredSocietyAP
It's something a lot of teachers do.
Teachers at my university also mess around with their microphone/mic.clips all the time.
The solution is wrong the answer would have to be be "can attain UP remaining on the level" since the Y was already used, the only other 2 letter word left that can make sense is UP.
So how did the enigma do numbers?
They used the top row of the keyboard as numbers, and indicated that they were going to send a number by typing Y. So, for example, if they wanted to type the number 54, they would type YTR.
Does anyone know...since machines dont know launguage, how did Turing's machine "Christopher" know when to stop?
actually the machine was desgined to find the settings of a particular day. Now the rotors rotate checking each of the possible rotor settings (eliminating some of the settings as a letter cannot be encoded into itself and for other reasons). Whenever the desired settings is reached the internal circuit faces an open circuit so the electricity for the next move of the rotors is cut and the rotors , i.e. Christopher(the bombe actually, I really dont know from where the director got that name and the story of Turings' friend, perhaps to present the homosexual nature of him?) stops. By the positions of the rotors one can easyli do the rest of the job of decoding the messages, keeping in mind that theres an Enigma was available at the Bletchly Park
Thanks. But how does the machine recognise a setting is "desired" and therefore choose to open the circuit? How could it recognise when a right character or word fit the original message?
It actually does not open the circuits like we open our windows when we wish. The rotors and all the moving parts faces each circuit representing each of the settings when they are rotating and as it is impossible to build 150 million^3 circuits you can understand most of the circuits was made by combining different moving parts of the machine. When ever the Bombe is tasked to find a settings it starts brute attack on the possible settings with the help of the clues inserted in the machine.Now the rotors started rotating and all the moving parts forms different circuits on each step of the rotors thereby checking the settings. The principle of Operation of the machine lies in "whenever the desired circuit(equivalent to the desired settings) is reached the combination of these moving parts will create a loophole somewhere(i.e. opening the circuit) and the conduction of current will be stopped." The mechanism was built that way. I cant explain you with further more technical details as I am just a rookie in Cryptography. Have a nice day.
I have a feeling the movie was not quite accurate...as I am sure they did not expect the machine to find a solution without the crib.
Yes, Turing's bombe was built from the beginning around the assumption that there would be a crib. It wasn't a last-hour flash of insight as dramatized in the movie. It's the whole reason the machine needs rows and rows of wheels on it to begin with.
And don't get me started on "Christopher." Bletchley Park did build the first fully programmable electronic computer in the world, but it was a different machine from the bombe and neither one was named Christopher.
I was under the impression that when you use 3-letter "encryption codes" each 3-letter code is permanently assigned to a work commonly used in whatever "industry" or "military service" and in the interests of brevity, simplicity and "speed" the "vocabulary" is kept very small and the actual ENCRYPTION is done so that day to day OR message to message the machines at BOTH ENDS are reset to a new "circuit" and UNUSED 3-digit "codes" are used and are entered as the "code" and the "clear text" at the other end is STILL just a 3-digit "code sequence" that any outside party trying to "decrypt" the messages has to have the DICTIONARY FOR or "cracking the code" doesn't mean jack shit. Any comments on Enigma machines being widely used commercially produced machines found all over the world long before WWII? How does "Enigma" relate to TELEPHONES? Or TELETYPES? Any comments on the similarity of a 3-letter "code message" used by a military force to 3-letter STOCK SYMBOLS used for "international business" going back to the invention of the STOCK TICKER?
I wonder if he chooses not to repeat the questions asked so that we have to break the code and figure out what the fuck the question was.
Regardless, really cool presentation.
Briljant, hold up mike for an hour!
What is a Win -vnzuoted :
That is actually one of my relatives
Interesting that he uses the "Socratic Method" of teaching by asking questions.
we were still using all of them as late as 1970 in Canada. Typex was fun, so noisy , bang bang bang. 10-4
nnnn
they talk about how genius are the code breaker and Alan Turing,,,, and build a huge machine to decrypt the enigma code
I think both are great! If you know a movie about Arthur Scherbius, please share the link here
It is true that many of the perceived faults in the Enigma were in its implementation rather than innate to the machine. However, it takes more brains to crack a difficult cypher than it does to create one.
It is better to be the historian who knows how the Enigma code was cracked than trying to crack it.
I guess you need to be a mathematician to fully understand how it was cracked
What is it that is Okay - This comes up repeatedly. Is this a keyword. A ceasar shift.
If you want to learn more about breaking the Enigma you should read XYZ by Dermot Turing
Too much about the Poles and the French in that. The English were the ones who did the really clever stuff!
@@PreservationEnthusiast You are probably right after all they just built larger version of Polish bomba.
The British contributions to Enigma cryptanalysis are not denigrated by adding more details than in any previously-published book I've read about what the Poles did with the cryptanalysis, and certainly not the amazing story of how the codebreakers made their way from Poland to France, and then out of occupied France -- XYZ was an amazing read, and I highly recommend it to everyone who cares about the history!
Although the Enigma code was cracked by Englishman Alan Turing and his team at Bletchley Park during WWII, the Poles indeed had their crucial starting contribution
Why do you stubbornly persist with your stupid lies? Why do you feed people with it? You know perfectly well three Polish mathematical geniuses (M. Rejewski, H. Zygalski and J. Różycki) broke the Enigma code already in 1931 and later on gave the entire necessary data to you on the plate to use it. The Bomb was was not Turing's but 100% Rejewskiĺ design. Without it the only thing you were capable of would be just to stick your middle fingers in your asses and wiggle them a little. Nothing else. Why are you always steel someone else's achievements for your own undeserved glory? How did you treat the Polish pilots during the victory parade in 1946? Shame on you, English unscrupulously ungrateful egoistic lying leech.
Turing's Bombe was named after the Polish machines, but vastly more complex. The fact is, the Poles were forced to give up since the Enigma became too tough to crack by their techniques.
The enigma was a "code machine" NOT a "code" ! It was capable of sending and receiving encyphered codes.....they Germans used quite a few "codes". Also the enigma code machine was a lower level, tactical use, code machine albeit of complexity.....the Germans used the Lorenz (12 rotor teletypewriter system) which was extremely complex, much, much, much more so than the enigma.....!
IT'S THE ONLY THING THE ENGLISH CAN CITE FOR THEIR EFFORT IN FIGHTING GERMANY. ENGLAND GOT THEIR ASS KICK OFF THE FRENCH COAST. THE BRITS ARE LUCK HITLER TURNED HIS FORCES ELSE WHERE. SURE THEY MADE BOMBING RUNS AT NIGHT, RARELY HITTING ANYTHING. WHEN THE BRITONS LOOK BACK, THEY REALLY CAN'T FIND ANYTHING WORTH WHILE TO TALK ABOUT, SO THEY CONCOCT THIS STORY TO BOOST THEIR IMPORTANCE IN THE FIGHT. AND AS FOR THE FRENCH, THEY HAVEN'T WON A WAR SINCE BOOTING THE ENGLISH OUT OF NORTHERN FRANCE BACK IN THE 16TH CENTURY. iT'S BEEN SAID CHURCHILL HAD ALL THE DECIPHERING EQUIPMENT DESTROYED AFTER THE WAR. DID HE REALLY.🤔
Looks like I'm dense. Why isn't the number of possible plug combinations 26C2 x 24C2 x 22C2 x 20C2 x 18C2 x 16C2 = 7.23x10^13?
I am guessing you made a miscalculation when you glossed over the plug board.
The plug-in board is basically 26! which is an absolutely massive number if it was all 26 letters, but it is only 10 pairs, so we can divide those out. Also, it does not matter what order the pairs are in, and it does matter what order the actual individual pairs are in.
26! is then divided by 6!10! and 2^10
So at the end of the day it is:
3 out of 5 possible routers:
60 possible combinations
26^3 for the number of options on each router (total of 3):
17576 possible combinations
and the plugin board amounts to:
403291460000000000000000000
DIVIDED BY
2675441664000
So the final calculation is 150738274516158 (plug in board) X 60 (rotator configurations) X 17576(combinations of those rotators)
= 158,962,554,773,760,150,279 possible ways to interpret enigma
If you did one of these combinations every second through reduction, it would take you about 5 trillion years to break the code. Of course, You will never see a word that starts with xdrft, so that number can be reduced, but even then, it would still take millions if not billions of years.
You've factored in that it doesn't matter which way round the cables are, but you forgot to factor in that the order of the plug cables is irrelevant, so A-B,C-D gets the same result as C-D,A-B. So you need to divide your result by the possible cable permutations, which is 6!
Aaaah, okay. Thank you!
The number 100'391'791'500 is 26! / (14! * 2^6 * 6!).
Then of course 100'391'791'500 * 17576 * 6 = 10'586'916'764'424'000
dave28lax I did not intend any offense by my comment, nor to diminish your previous comment. If I had understood in time that nC2 denotes n *(n-1)/2, I would not have posted anything. (But why such a tone? Did I offend you? Let me post, maybe someone else finds it helpful?)
Interesting talk 👍
i dont see why the plug board creates so much extra complexity, whether you swap letters one time or 10 times, the end result is still just one swap, just a different letter and it will be that same letter for the full duration of the day
If I understood right, it's because the plugboard isn't really there to create complexity for the ciphertext, it's there to significantly expand the number of potential daily keys. So while it's probably not mixing up the encrypted text all that much, the important number to look at isn't that just 6 sets of letters are swapped, but that there are over 100 billion ways to place the 6 cables in the 26 holes in the plugboard. That makes it so there's 100 billion times more ways now to arrange the board every day, i.e. 100 billion times more potential daily keys. Without the plugboard, there are just ~100,000 possible daily configurations/keys, and that's a small enough number to brute force by trying all possible configurations each day. With the plugboard, there's suddenly >10 quadrillion possible configurations/keys each day, which is no longer brute-forceable. So it's about expanding the key space and blocking brute force attacks, not obfuscating the text too much -- the rotors already take care of enough obfuscation. I think!
58:00 There were machines with have eventually 10 rotors.
Didn't he mix H and K in the initial problem? Both are for Y. But of course it's perfectly OK.