Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption Programming

Enigma Code-Breaking Machine Rebuilt At Cambridge (techxplore.com) 34

Cambridge Engineering alumnus Hal Evans has built a fully-functioning replica of a 1930s Polish cyclometer -- an electromechanical cryptologic device that was designed to assist in the decryption of German Enigma ciphertext. The replica currently resides in King's College, Cambridge. TechXplore reports: Work on the hardware-based replica began in 2018, as part of Hal's fourth year Master's project under the supervision of King's College Fellow and Senior Tutor Dr. Tim Flack. The aim was to investigate further into cryptologist Marian Rejewski's cyclometer -- an early forerunner to Cambridge University mathematician Alan Turing's machine, known as the Bombe, which was used to crack the German Enigma code during the Second World War. Hal said he chose to work on the cyclometer as it was the very first machine used to assist the decryption effort. To his knowledge, the replica is the first fully-functioning hardware-based electromechanical cyclometer to exist since the years preceding the Second World War. The original machines would have been destroyed in 1939 to prevent them from falling into the hands of German invaders.

Rejewski's cyclometer exploited the German's procedure at the time of double encipherment of the Enigma message key, and semi-automated the process for calculating what were known as 'characteristics' for every possible Enigma rotor starting position. There were more than 100,000 of these rotor starting positions, and they each needed their characteristic to be calculated and catalogued in a card index system. The cyclometer therefore eliminated the arduous task of calculating these characteristics by hand. The machine consisted of, in effect, two interlinked Enigma systems side-by-side -- one offset by three positions relative to the other -- and 26 lamps and switches to cover the alphabet. On operation, a certain number of bulbs illuminated, indicating the lengths of the characteristics. These were recorded for every single possible rotor starting position to create an immense look-up catalogue. Once this was completed, obtaining the daily Enigma rotor starting settings to decode messages was a simple matter of intercepting enough messages and referencing the catalogue, taking only a matter of minutes.

This discussion has been archived. No new comments can be posted.

Enigma Code-Breaking Machine Rebuilt At Cambridge

Comments Filter:
  • Imagine adding a gear or two to the cipher AND combining with a 2nd new complication.

    -r

    • Re:...unbreakable? (Score:5, Informative)

      by UnknowingFool ( 672806 ) on Tuesday July 14, 2020 @11:06AM (#60297200)

      That’s what the German Navy did towards the end of the war for their Uboats models. They required a 4th wheel to the settings and added 3 more wheels to the pool. So instead of picking 3 out of 5 possible wheels, it was now 4 out of 8. Also all the code books were changed. Bletchley Park was unable to decode Uboat messages for 10 months. Then it was discovered that while the Uboats upgraded their Enigma to M4 machines, their land based counterparts did not and still used M3 machines. There had to be backwards compatibility with the new versions and the old. Painstaking analysis of these ship to shore messages were able to reverse engineer these new wheels.

    • Adding more mechanisms would make breaking more difficult however the main flaw with Enigma is that a letter could never be encrypted to itself. So an "A" in an encrypted message could never be an "A" in the original message. The British saw this and developed a system similar to Enigma but without the flaw. German code breakers found British messages impossible to break.
  • by backslashdot ( 95548 ) on Tuesday July 14, 2020 @11:34AM (#60297290)

    Where's the Nazi flag guy?

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (10) Sorry, but that's too useful.

Working...