{"id":27415,"date":"2014-11-14T15:46:15","date_gmt":"2014-11-14T20:46:15","guid":{"rendered":"http:\/\/www.opensource.im\/?p=27415"},"modified":"2014-11-14T15:46:15","modified_gmt":"2014-11-14T20:46:15","slug":"how-did-the-enigma-machine-work","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/how-did-the-enigma-machine-work.php","title":{"rendered":"How did the Enigma machine work?"},"content":{"rendered":"<p><p>  Enigma machine. Photograph: Linda Nylind for the Guardian<\/p>\n<p>    Like all the best cryptography, the Enigma machine is simple to    describe, but infuriating to break.  <\/p>\n<p>    Straddling the border between mechanical and electrical, Enigma    looked from the outside like an oversize typewriter. Enter the    first letter of your message on the keyboard and a letter    lights up showing what it has replaced within the encrypted    message. At the other end, the process is the same: type in the    ciphertext and the letters which light are the decoded    missive.  <\/p>\n<p>    Inside the box, the system is built around three physical    rotors. Each takes in a letter and outputs it as a different    one. That letter passes through all three rotors, bounces off a    reflector at the end, and passes back through all three    rotors in the other direction.  <\/p>\n<p>    The board lights up to show the encrypted output, and the first    of the three rotors clicks round one position  changing the    output even if the second letter input is the same as the first    one.  <\/p>\n<p>    When the first rotor has turned through all 26 positions, the    second rotor clicks round, and when thats made it round all    the way, the third does the same, leading to more than 17,000    different combinations before the encryption process repeats    itself. Adding to the scrambling was a plugboard, sitting    between the main rotors and the input and output, which swapped    pairs of letters. In the earliest machines, up to six pairs    could be swapped in that way; later models pushed it to 10, and    added a fourth rotor.  <\/p>\n<p>    Despite the complexity, all the operators needed was    information about the starting position, and order, of the    three rotors, plus the positions of the plugs in the board.    From there, decoding is as simple as typing the cyphertext back    into the machine. Thanks to the reflector, decoding was the    same as encoding the text, but in reverse.  <\/p>\n<p>    But that reflector also led to the flaw in Enigma, and the    basis on which all codebreaking efforts were founded: no letter    would ever be encoded as itself. With that knowledge, as well    as an educated guess at what might be encrypted in some of the    messages (common phrases included Keine besonderen    Ereignisse, or nothing to report and An die Gruppe, or to    the group), it was possible to eliminate thousands of    potential rotor positions.  <\/p>\n<p>    Eventually, the team at Bletchley Park built a machine, the    Bombe, which could handle that logical analysis. But the final    steps were always performed manually: the job of the Bombe was    merely to reduce the number of combinations that the    cryptanalysts had to examine.  <\/p>\n<p>    Even as the Allied code-breaking team were working on Enigma,    the Axis was improving its machines, adding more and different    rotors, and minimising operator error. Eventually, the Enigma    was superseded by the Lorenz. These required yet more    codebreaking in Britain, and more automation to do it  leading    to the production of Colossus, the worlds first digital    programmable computer.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.theguardian.com\/c\/34708\/f\/663828\/s\/407cfc08\/sc\/4\/l\/0L0Stheguardian0N0Ctechnology0C20A140Cnov0C140Chow0Edid0Eenigma0Emachine0Ework0Eimitation0Egame\/story01.htm\/RK=0\/RS=Bx0ycwfKTNnM_h2p1bmyQm.PGwM-\" title=\"How did the Enigma machine work?\">How did the Enigma machine work?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Enigma machine. Photograph: Linda Nylind for the Guardian Like all the best cryptography, the Enigma machine is simple to describe, but infuriating to break. Straddling the border between mechanical and electrical, Enigma looked from the outside like an oversize typewriter. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-27415","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27415"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=27415"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27415\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=27415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=27415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=27415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}