Cracking Enigma in 2021 - Computerphile

  Рет қаралды 2,403,854

Computerphile

Computerphile

3 жыл бұрын

Enigma is known as the WWII cipher, but how does it hold up in 2021? Dr Mike Pound implemented it and shows how it stacks up against his laptop.
Mikes Code:
bit.ly/C_Mike_enigma
Cryptool v2 is here:
bit.ly/C_Cryptool
The original paper that Mike's attack is based off
web.archive.org/web/200607200...
/ computerphile
/ computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

Пікірлер: 2 000
@Liggliluff
@Liggliluff 3 жыл бұрын
What I take from this video is that, if you get one of them correct, it'll be slightly better.
@muizzsiddique
@muizzsiddique 3 жыл бұрын
How many times has he said that throughout the video? I thought I was going crazy.
@pies765
@pies765 3 жыл бұрын
Hmm, I think he should have made that more clear honestly, kinda vague.
@AlePazzaglia
@AlePazzaglia 3 жыл бұрын
@@pies765 Basically he said that if you get one of them correctly, the IoC will tend to get slightly better
@MartinSFesty
@MartinSFesty 3 жыл бұрын
@@AlePazzaglia WHAT?
@MoritzvonSchweinitz
@MoritzvonSchweinitz 3 жыл бұрын
Well, yes. That is the most important vulnerability of the Enigma scheme, and the biggest difference to modern schemes.
@Saturate0806
@Saturate0806 3 жыл бұрын
Someone has to finish Code Bullet's projects...
@hetsmiecht1029
@hetsmiecht1029 3 жыл бұрын
Lol
@elizabethfransen398
@elizabethfransen398 3 жыл бұрын
I was about to say!
@domninin
@domninin 3 жыл бұрын
Now I finally know
@nullentrophy
@nullentrophy 3 жыл бұрын
Lol
@Crazy1793
@Crazy1793 3 жыл бұрын
Haha yess!
@humanNumer1
@humanNumer1 3 жыл бұрын
Let's honour great Polish mathematicians (Jerzy Różycki, Henryk Zygalski, Marian Rajewski) who broke the first Enigma giving Turning the basis, so they are not erased from history
@NiedzwiedzWojtekMusic
@NiedzwiedzWojtekMusic 3 жыл бұрын
exactly, this is so overlooked
@DunderKlomp
@DunderKlomp 3 жыл бұрын
If you go to Bletchley Park, you'll see their contribution is well-recognized. Gays FTW!
@deadcatthinks6725
@deadcatthinks6725 2 жыл бұрын
The 2 Zlote coin has an enigma wheel on one face
@Jan-eh7nf
@Jan-eh7nf 2 жыл бұрын
@@DunderKlomp I've been at Bletchley Park Computing Museum 3 years ago and found ZERO (literally) mention about any Polish contribution.
@johndavid360
@johndavid360 2 жыл бұрын
* Turing
@AlexSchmid-TheAceofSpades
@AlexSchmid-TheAceofSpades 3 жыл бұрын
" I implemted an enigma machine because it was fun." This is the mark of a true programmer.
@Warlock_UK
@Warlock_UK 3 жыл бұрын
I mean this is why I'm watching this whole video and am not even slightly bored.
@alainbesseleer6516
@alainbesseleer6516 3 жыл бұрын
Haha, I did the same, and it was fun indeed. But I wasn't able the write code to crack Enigma yet. As mentioned in the video, a brute force attack will take too long, even with modern computers.
@Hr1s7i
@Hr1s7i 3 жыл бұрын
@@alainbesseleer6516 An average laptop has like what, 4-6 cores? Try this with a basic workstation that has something like 64 cores slugging through the computations at 4ghz. Just based on the amount of alu available and their sheer size given nowadays they can operate with 64 bit values, you can do quite a bit more than you'd assume and it's relatively affordable (for cracking the enigma at least... forget anything short of a chunk from the national budget to crack a decent modern encryption).
@PiezPiedPy
@PiezPiedPy 3 жыл бұрын
@@Hr1s7i Even better use compute shaders and a stack of GPU's and you will be looking at thousands of cores to do the work of decryption. Also don't use a sequential brute force.
@JorgetePanete
@JorgetePanete 3 жыл бұрын
implemented*
@PhilKulak
@PhilKulak 3 жыл бұрын
What a testament to Turing's brilliance: it's not even trivial 80 years later.
@GapWim
@GapWim 3 жыл бұрын
Indeed. But also to Arthur Scherbius, the inventor of the enigma machine itself: it’s not even trivial 80 years later.
@izzyr9590
@izzyr9590 3 жыл бұрын
No joke. I’m a computer science student. After watching “the imitation game” I searched up “how does Enigma work” and I thought “ah it must be so easy to understand and decode now!”. Nope.
@kopasdupas
@kopasdupas 3 жыл бұрын
It's an achievement of many people, including Marian Rejewski, who broke the simpler version of Enigma in 1930. His work was then used by Turing & Park as a foundation for newer Enigma in 1941.
@projecttitanomega
@projecttitanomega 3 жыл бұрын
Not to mention, Mike could code this up on his laptop, pre-built and bought at a store, in a high-level coding language. Turning *built* his computer. Imagine not simply having to write the code, but having to also physically construct a machine solely to run it. No using pre-built chips, no machine code, no assembly code, no standardization, no reference for building such a machine or any help from other learned people, as at the time, no such machine had ever really been built and there were no people who knew how to build it. He was a once in a generation genius.
@Sakkura1
@Sakkura1 3 жыл бұрын
@@projecttitanomega The "bomb" computers were a Polish design, not something Turing came up with.
@ToadyEN
@ToadyEN 3 жыл бұрын
14:36 “I’m lazy” - programmes enigma machine decoder in spare time 😂
@costa_marco
@costa_marco 3 жыл бұрын
Programmers have a different definition for "laziness": expend 8 hours automating a solution to a job that would take 1 hour to do by hand, just in case you have to do it again in the future. The reasoning: I am lazy... 🤷‍♂️
@RealCadde
@RealCadde 3 жыл бұрын
@@costa_marco And that's why programmers are so much more efficient than most others when it comes to doing stuff on computers. Your regular guy would manually update a spreadsheet by printing out a list of things that needs to be updated on a piece of paper, tediously going over every entry. A programmer would spend 2 hours making an interpreter of the other document to automate that process. Instant 20,000% efficiency for the foreseeable future. And you'd be amazed at how many there are out there sitting at computer keyboards day in and day out doing it manually.
@Anvilshock
@Anvilshock 3 жыл бұрын
@@RealCadde Except xkcd 1319 ;)
@taragnor
@taragnor 3 жыл бұрын
Yeah pretty much the first question any programmer asks "Can I get some machine to do this process for me?"
@Restil
@Restil 3 жыл бұрын
The laziness he's referring to is not the time spent programming the decoder, but the time he'd have to spend waiting for it to produce a response. 3 rotors takes a few seconds. 5 rotors would take hours or days.
@m.cigledy6769
@m.cigledy6769 2 жыл бұрын
One thing that wasn't mentioned was how difficult it would be to decipher if you didn't start out already knowing that it was an enigma cypher.
@gezzuzzful
@gezzuzzful Жыл бұрын
you just to steal the machine
@Bunny99s
@Bunny99s Жыл бұрын
@@gezzuzzful Well, that's not what he said. Of course knowing how enigma works (i.e. stealing an enigma machine) is the fundament to break the code. The point here is, how do you know if the encrypted message is actually an enigma cypher? Imagine I give you some encrypted message right now. How do you know if this was encrypted with enigma or maybe RSA or AES. Maybe just a simple Caesar cipher or a simple pre-shared-key xor cypher. All your attempts to crack it as if its an enigma cypher would not really help you.
@blackjacktrial
@blackjacktrial Жыл бұрын
Also how difficult to decipher it would be if you didn't know what language was encrypted. If you decide Swahili or Martian successfully, it's still useless to you if you can't recognise it.
@dj1NM3
@dj1NM3 Жыл бұрын
@@Bunny99s It would be abundantly clear that it wasn't a Caeser-shift cypher, if it's a known English (or American) message which fails the ETOAN frequency test. After that, I suspect that it would be a bit of a guessing-game as to what encryption system was used and I doubt that the 5-letter cluster WW2 vintage formatting would be used, as it would most likely be sent as a solid block of characters instead. A modern, digital spin on Enigma could use different sized "virtual rotors" and rather than merely 26 positions (just the English letters in one case), could have upper-case, lower-case, numbers 0-9, space and all the commonly used punctuation marks, making rotors with about 70 positions each. Then there's the possibility of eliminating the "tell" of no symbol being encyphered as itself, but whether that's considered to matter when there's now about 24million possible rotor setting combinations from one arrangement of just 4 rotors, compared to the original 4-rotor Naval Enigma with about 0.5million possible rotor setting combination from one arrangement of 26-position rotors. This is also ignoring the "reflector", which doubles the exponent (70^8 or 26^8 instead of "merely" 70^4 or 26^4) by running the circuit back through the rotors. I would also hazard a cautious guess that some loon could even construct a physical version of a 70-position rotor machine, just for the heck of it.
@operator8014
@operator8014 Жыл бұрын
Lol!
@hackcraft_
@hackcraft_ 3 жыл бұрын
"well, the weakness of Enigma is that if we get some of these things right, even if the others are wrong, we get a little bit closer to the answer, usually."
@jordananderson2728
@jordananderson2728 3 жыл бұрын
He addresses that at 20:30, mentioning how with a 128-bit or 256-bit encryption, even if you get the first bit correct you'll still have random noise. The fact that Enigma *did* show marked improvement with correctly guessed settings meant that it was inherently insecure to a degree.
@martinwragg8246
@martinwragg8246 3 жыл бұрын
Not so obvious if you connect 10 stecker plugs, the IOC will hardly change if you guess 1 plug correctly. Without any stecker plugs connected you can crack 100 character text in a few minutes on a laptop.
@Execuor
@Execuor 3 жыл бұрын
@@martinwragg8246 fyi Stecker means plug.
@martinwragg8246
@martinwragg8246 3 жыл бұрын
@@Execuor thanks, I did know, just what I call them. 😉
@modalmixture
@modalmixture 3 жыл бұрын
Is there a cryptographic term for this property?
@umka7536
@umka7536 3 жыл бұрын
Dr. Mike Pound is definitely my favorite speaker on the Computerphile. His ability to explain complex problems in a very easy to get way is outstanding.
@sammiller6631
@sammiller6631 3 жыл бұрын
Pound's strategy of repeating "if you get one of them correct, it'll be slightly better." over and over might work for you, but the high energy of Professor Moriarty makes for a more engaging Computerphile for me.
@lanboost2773
@lanboost2773 3 жыл бұрын
Agreed, it also helps that he talks about more interesting topics imo
@EndrewsXeudon
@EndrewsXeudon 3 жыл бұрын
And he saved middle earth!
@x0rn312
@x0rn312 3 жыл бұрын
Which one is Professor Moriarty? I'm a big fan of Mike and Dave-but I think they are all great
@JohnSmith-pu8rd
@JohnSmith-pu8rd 2 жыл бұрын
most suspicious too
@mattiiejwheis1350
@mattiiejwheis1350 Жыл бұрын
We cracked enigma a few years ago in our class with our teacher and it was so much fun. He really tried to explain everything and we actually understood it. It was such a great feeling to see this video and remember everything I learned
@jackass123455
@jackass123455 Жыл бұрын
at my school we had a sort of computer club wher we could play call of duty (the original back IN 04, 05) to gain entry you had to get a password that was encrypted with an enigma machine. the clue was HELP (this was the start postion leters of the wheels) and the plug board was pre defined was kinda fun trying to figure it out
@DeHerg
@DeHerg 3 жыл бұрын
18:30 "In the war the limited messages to something like 200 characters" Oh great it's Twitter all over again.
@FrVitoBe
@FrVitoBe 2 жыл бұрын
I 2 try to decipher Twitter messages with enigma for the real message
@nickryan3417
@nickryan3417 2 жыл бұрын
Also because having to reliably type and transcribe for transmission a several hundred character message was a serious chore. There were rules about not re-sending the same message, due to errors, however because on occasion this was not adhered to the security was compromised. The smarts of all the people working on decrypting these messages was staggering.
@irrelevant_noob
@irrelevant_noob 2 жыл бұрын
@DeHerg *14:31
@asciimation
@asciimation 3 жыл бұрын
I am glad your code implements the double stepping correctly. As you say implementing Enigma in code is really just array manipulation. I've done a few versions including one in 80s home computer BASIC! The algorithm for Enigma is really quite simple. The Turing/Welchman Bombe, the machine they actually used in WW2 to crack Enigma, is much more complicated. Reverse engineering that, really understanding how it works then making my own was one of my most satisfying projects. Welchman's contribution of the diagonal board to Turing's original design was brilliant. And Welchman was also responsible for coming up with the idea of traffic analysis. I always feel a bit sad that Turing's name is always mentioned but Welchman is nearly unheard of. And yes, as others have rightly pointed out all that work was made possible but the work of the three Polish mathematicians and the Frenchman Bertrand who somehow managed to co-ordinate things between the English, French and Poles. One other difficulty is real Enigma messages were not just plain text. They contained a lot of military jargon and acronyms. Very cool video and well explained, thank you!
@20chocsaday
@20chocsaday 3 ай бұрын
The local library had a book about ciphers in the 1970s. Enigma machines and their post-war sale was also discussed. At the back he had written a message which had been through a virtual Enigma machine. He told the readers how to write the program which would decrypt it.
@GastevAleksei
@GastevAleksei 3 жыл бұрын
Mike Pound? Enigma machine? Now this video is lit!
@TotallyTacotrap
@TotallyTacotrap 2 жыл бұрын
I like your pfp
@alexrossouw7702
@alexrossouw7702 3 жыл бұрын
Enigma machine: "zmnag ttygt lmrus cd!" Alan Turing: "fkxs."
@temkin9298
@temkin9298 3 жыл бұрын
Is that possible to decrypte or not?
@timothyj1962
@timothyj1962 3 жыл бұрын
I worked with something similar in the Army as a Radio Teletype operator. It was called a KW-7. You were handed a slip of paper and on it was pairs of numbers I believe it was 1 to 32. In the KW-7 there was something called the "Block". The block had 32 wires which you would arrange into sockets on the block according to that slip of paper. Once you set these wires in the block, you put the block into the main crypto body, close and lock the lid, then run a system check. In order for it work properly, you would key up the radio, and hold a button for 15 seconds to sync with other receiving stations. At the time, the machine was classified as Confidential, once keyed it was classified as secret. Unfortunately the system was compromised by the Walker Spy Ring. Not only did this group sell the key lists for almost 20 years. But gave them the design specifications. The crypto essentially was rendered ineffective. I was basically out of a job and was reduced in my speciatly as a single channel radio operator. If this interests you. Look up the AN/GRC-142, AN-GRC-122, AN/VSC-2, and the AN/VSC3. Very cool stuff in its time. All museum pieces now. The KW-7 is no longer classified.
@zamalek4079
@zamalek4079 3 жыл бұрын
The known plaintext at the beginning was the salute that referenced their leader. His ego ultimately led to enigma being cracked during the war.
@yestfmf
@yestfmf 3 жыл бұрын
A great deal of the solution is also from laziness on the part of the germans. Instead of using new codes, they used variations of the same codes. Once the english knew this, they could play with variations and find the key fairly easily.
@matthewmayton1845
@matthewmayton1845 3 жыл бұрын
I think the Kriegsmarine did change the codes once and it took the Allies months to decipher again (or was it adding another rotor). Though they never really change the codes afterwards. One of the flaws with the German's was they believed the Allies could not decipher enigma. If they believed the Allies could, the Germans would most likely have changed the codes (assuming they could to begin with). Instead, Germany focused too much on just espionage.
@stargazer7644
@stargazer7644 2 жыл бұрын
@@matthewmayton1845 The Enigma codes were changed every day at midnight. The Germans also had a way to do it every hour, but they rarely did that. What you're referring to was when the Navy added a 4th rotor, but by then the codebreaking was so advanced it didn't add much of a problem.
@asailijhijr
@asailijhijr 3 жыл бұрын
The fact or property that getting some settings right improves the metrics means that your approach resembles single-pin picking of a lock.
@alpardal
@alpardal 3 жыл бұрын
Yep, it also resembles evolution: a big change by itself it's really unlikely, but small accumulative changes make you progress little by little in the right direction
@jasonc3a
@jasonc3a 3 жыл бұрын
@@alpardal Lies! Miles don't exist! Everything is inches!
@khleta4334
@khleta4334 3 жыл бұрын
This is the Lockpicking Lawyer and what I have for you today is this Enigma...
@barutaji
@barutaji 3 жыл бұрын
@@khleta4334 cracking enigma: A click on three... Ok, nothing on four...
@man100111
@man100111 3 жыл бұрын
@@barutaji two is binding...
@WhoShortsVids
@WhoShortsVids 3 жыл бұрын
Pound is the best speaker on this channel, pound for pound, no contest. Insta watch.
@sanferrera
@sanferrera 3 жыл бұрын
He is great! One of my favourites is the one where he cracks passwords. Super interesting!
@JanStrojil
@JanStrojil 3 жыл бұрын
I second that. There are some really good speakers here, but he just combines incredible energy, understanding, humour. Love his videos.
@TheVergile
@TheVergile 3 жыл бұрын
Rob Miles tho
@zukacs
@zukacs 3 жыл бұрын
d
@s33wagz
@s33wagz 3 жыл бұрын
Lol, pound for pound
@reyblais4858
@reyblais4858 3 жыл бұрын
Anytime I hear about Turing, it always makes me sad to think how he was treated after all his accomplishments.
@tonytungsten4278
@tonytungsten4278 2 жыл бұрын
Do people without any accomplishments deserve to be treated worse?
@technus147
@technus147 2 жыл бұрын
@@tonytungsten4278 than people with accomplishments? yes, otherwise we'd give everyone a nobel prize
@jackass123455
@jackass123455 Жыл бұрын
@@tonytungsten4278 he wasn't treated any beter than anyother homosexual male of the time. the dude was chemically castrated and arrested. eventually (potentially) killing himself via cyanide poisoning.
@mr.pavone9719
@mr.pavone9719 5 ай бұрын
​@@tonytungsten4278Are you a fan of participation trophies?
@ryhol5417
@ryhol5417 Жыл бұрын
The history of codebreakers, and the skill. It’s amazing. Love the video
@jasonc3a
@jasonc3a 3 жыл бұрын
I love how at 6:50 the transition and lighting makes it look like a whole day has passed while MP has been churning out ciphertext lol
@h-0058
@h-0058 3 жыл бұрын
You know that the Enigma Machine was great when it is being talked about even today
@iHack-ms5nr
@iHack-ms5nr 3 жыл бұрын
Yes! I'm taking second year ICT, and we were just watching The Imititation Game today (A movie about Turing breaking the Enigma cipher)
@xplinux22
@xplinux22 3 жыл бұрын
@@iHack-ms5nr I loved that movie so much. Granted, there was a lot of movie dramatization and some factual liberties taken, but it's a terrific film that does a great job of piquing viewers' interest about cryptography and WWII.
@michaelsommers2356
@michaelsommers2356 3 жыл бұрын
Enigma is talked about so much because its breaking was so importance in the war. There were other, better machines, such as the American SIGABA or the British TYPEX, that are not talked about, because they don't have such a compelling story, and because their details are still secret (or they were the last time I checked).
@peterfireflylund
@peterfireflylund 3 жыл бұрын
The Enigma was simple enough to (almost) explain and the breaking of it was declassified a long time ago. The Tunny break was only declassified recently (and it was much more complicated). There was no public information until recently about the British codes (and how easily most of them were broken by the Germans). And the Enigma has Turing, of course.
@michaelsommers2356
@michaelsommers2356 3 жыл бұрын
@@peterfireflylund Documents on the Lorenz break were declassified by the NSA in 1996. Is that recent?
@securatyyy
@securatyyy 3 жыл бұрын
Everyone be really nice to this guy cause he would make a great supervillain.
@bokamosokelopang1694
@bokamosokelopang1694 3 жыл бұрын
Dfn
@AceDeclan
@AceDeclan 3 жыл бұрын
Why?
@crusaderanimation6967
@crusaderanimation6967 2 жыл бұрын
@@AceDeclan Because he seem to be nice and smart so you wouldn't know he is villain until end of movie.
@RamansSon
@RamansSon 2 жыл бұрын
@@crusaderanimation6967 because he has a snake pet and the only people who has snake pet are animal lovers or serial killer
@x0rn312
@x0rn312 3 жыл бұрын
What I love about Professor Pound is that not only is he hilarious - he is also a humble genius
@Oodelally
@Oodelally 3 жыл бұрын
Visiting Bletchley park is such a splendid experience
@AlRoderick
@AlRoderick 3 жыл бұрын
I'd love to do the same for the Lorentz cypher. I really want to know more about that, no one talks about it nearly to the same degree as enigma but it was the real challenge that they needed a proper computer to crack.
@hotshot17225
@hotshot17225 3 жыл бұрын
Came here to say that! After reading extensively about Lorenz, the process of cracking it and the people involved, I - and excuse me - shat myself upon realization of how incredibly brilliant Bill Tutte (and a lot of others) was.
@madlad255
@madlad255 3 жыл бұрын
1:05 Speaker: "Enigma machine" Subtitles: "Knitting machine" Damn, why are we trying to crack a knitting machine?
@Nekuzir
@Nekuzir 3 жыл бұрын
Fun fact, stitch patterns in sewing machines used punch card programming before computers existed
@madlad255
@madlad255 3 жыл бұрын
@@Nekuzir Damn, I didn't know that, thanks for the fact!
@andrewgoss1682
@andrewgoss1682 3 жыл бұрын
Gram gram been spending too much time making sweaters
@dowskivisionmagicaloracle8593
@dowskivisionmagicaloracle8593 3 жыл бұрын
Videos like this are why I love the computerphile channel!
@sssveny
@sssveny 3 жыл бұрын
Video’s about mike programming for fun are always gold
@luisfiliperosa7511
@luisfiliperosa7511 3 жыл бұрын
Every video with Dr Mike Pound is absolute bliss. Thanks mate.
@ragnarsdad6065
@ragnarsdad6065 3 жыл бұрын
there was a project on the BOiNC platform trying to crack Enigma messages using brute force decryption, the messages had been intercepted during the war but never decoded. They did manage to crack a few but it took an awful lot of computer power to do so.
@codegeek98
@codegeek98 3 жыл бұрын
I'm sure "an awful lot" back then could be completed in a few days on a single thread of JS running on a semi-smart-phone's toy web browser
@ragnarsdad6065
@ragnarsdad6065 3 жыл бұрын
@@codegeek98 The project (enigma@home) managed to decrypt 4 messages using brute force decryption method. it took over 360,000 years of compute power (based on an AMD Athlon Xp 3500+ single thread processor) to decrypt all 4 message.
@tomstech4390
@tomstech4390 3 жыл бұрын
@@ragnarsdad6065 were they all done? Os it still going? Have many 6, 8, 16 core cpus spare atm.
@f.f.s.d.o.a.7294
@f.f.s.d.o.a.7294 3 жыл бұрын
@@tomstech4390 Just beware the power bill. I used to run Seti@Home, then Boinc aggressively in my business. It was fun. Then I came to appreciate the effect on the power bill.
@steemlenn8797
@steemlenn8797 3 жыл бұрын
@@tomstech4390 afaik enigma@home is still running? Even if not there are many math projects on the BOINC network - or other stuff. Like nedicine research. You can even get paid in cryptocoins if you use Gridcoin (for most of those projects).
@delzabrown
@delzabrown 3 жыл бұрын
I have no idea how I didn't know this channel existed even though I've been subscribes to numberphile for 3+ years
@astropgn
@astropgn 3 жыл бұрын
Moral of the story: Use enigma only if you want to encrypt your tweets.
@emoulson
@emoulson 3 жыл бұрын
And only really tweets before the character count was doubled
@yosefmacgruber1920
@yosefmacgruber1920 3 жыл бұрын
Twitter is pretty much pointless now without President Trump's tweets.
@gayMath
@gayMath 3 жыл бұрын
@@yosefmacgruber1920 ???
@yosefmacgruber1920
@yosefmacgruber1920 3 жыл бұрын
@@gayMath Twitter and FB should be banned for their evil censorship. Or seized and turned into a utility. Did you not know about Twitter censoring truth-tellers, President Trump, and tampering with elections? Twitter has already been banned in a few countries due to that.
@papakaruuu6119
@papakaruuu6119 3 жыл бұрын
@@yosefmacgruber1920 wtf are you smoking i want some
@darkwinter6028
@darkwinter6028 3 жыл бұрын
The other thing you can reasonably assume; which a modern computer can take advantage of; is that the message will be in German (both in it’s vocabulary and grammar)...
@thatcherfreeman
@thatcherfreeman 3 жыл бұрын
One challenge is that a lot of the messages from ww2 had loads of abbreviations and shorthand, so that'd serve to make it more difficult
@darkwinter6028
@darkwinter6028 3 жыл бұрын
@@thatcherfreeman To an extent; yes; however much of that can be figured out and added to the dictionary.... for example, dropping vowels.
@sircalvin
@sircalvin 3 жыл бұрын
another thing used was plaintext attacking a very famous line at the bottom of most messages, which i wont put here because i dont want youtube flagging this comment
@darkwinter6028
@darkwinter6028 3 жыл бұрын
@@sircalvin Yeah... something about hailing the guy in charge... 😉
@stephaniesadie832
@stephaniesadie832 2 жыл бұрын
Many of the american encrypts were translated into Navajo and Lacota beforehand. The Axis never cracked those messages.
@motabarjavaid5482
@motabarjavaid5482 3 жыл бұрын
Mike is the reason I subscribed to Computerphile. Love the way of his explanation
@karelvandervelden8819
@karelvandervelden8819 3 жыл бұрын
After having worked later generation machines (KL-7) in the seventies as a navy radio-operator I marvel at the simplicity of this explanation. Thanks.
@krisk7
@krisk7 3 жыл бұрын
Worth noting that they could start guessing about rotors and all because before the war Polish secret service got a hold of one of the first versions of Enigma, then Polish mathematicians (Marian Rajewski) cracked it without computers and shared the machine and algorithms with British secret service. This facilitated immensely breaking subsequent Enigma versions.
@john1v6
@john1v6 3 жыл бұрын
Very true. The Polish contribution was important. Rajewski and his colleagues did some great work.
@89Sawik
@89Sawik 3 жыл бұрын
I would say was crucial as they provided decrypting algorithm. What Turing did (and it was amazing by itself) was building and electromechanical automaton, which was able to crack codes quick enough to use intercepted intelligence. The third or fourth iteration of enigma's encrypting algorithm become too hard to crack manually. In fact some of the first messages cracked by Poles directly predicted war and even Marshall Piłsudski tried to convince Charles de Gaulle to perform attack on Germany, before it will be too late. That may be one of the reasons, why this truth is not spoken widely.
@telawiw329
@telawiw329 3 жыл бұрын
Face the truth, Jerzy Rozycki, Henryk Zygalski and Marian Rejewski broke the code, wrote algorithms, then tried to come up with some engineering tools to speed braking code up. All having no knowledge about secret military cutting edge technology at that time, called computers. All what Turing made was to build a machine where the numerical methods and algorithms invented by Poles could be efficiently executed. That how the Allies won the war, then as a "thank you" they sold us out to Stalin. Humiliated Poles not inviting us to the victory parade!!! We like the Chinese do not forget this
@MrGoatflakes
@MrGoatflakes 3 жыл бұрын
They also made the first bombe
@Ashitaka255
@Ashitaka255 3 жыл бұрын
@@telawiw329 moron. Turing is the father of modern computer science. He's far beyond just an engineer who built a machine. That was Tommy Flowers. Turing didn't use the Polish algorithms.
@NaviYT
@NaviYT 3 жыл бұрын
Thank you, I’ve been waiting for someone to make a video about doing this in modern times, with better computing. Literally perfect!
@YAZlakhdar
@YAZlakhdar 3 жыл бұрын
Follow up video in 10 years: "Cracking Enigma in 30 milliseconds using brute force on a Quantum Computer" Edit: turns out I was probably too conservative, not 30 sec but just a fraction of a second.
@DesertCookie
@DesertCookie 3 жыл бұрын
More like one millisecond.
@YAZlakhdar
@YAZlakhdar 3 жыл бұрын
@@DesertCookie hopefully 🤗 I'd already be impressed with solving 150,000,000,000,000 combinations in 30 sec, which means 5 trillion combinations per sec... but maybe a 3000 qubits trapped ion quantum computer with no errors could do much better 🤷🏻‍♂️ tbh I have no idea.
@draygoes
@draygoes 3 жыл бұрын
@@YAZlakhdar How weird is it that "with no errors" was the first part of that sentence that didn't register as somehow possible one day?
@YAZlakhdar
@YAZlakhdar 3 жыл бұрын
@@draygoes actually very low error rates are already achieved in some Trapped ion QCs with up to 32 fully connected qubits... and we're only in 2021! Imagine what will be achieved in 10-20 years, not to mention further down the line... Think about all the things that people in the 1950's would have deemed impossible, which are now possible or even plain boring for us. I'm sure they'll figure it out ;)
@YAZlakhdar
@YAZlakhdar 3 жыл бұрын
@@DesertCookie actually after looking up the processing power of current state-of-the-art supercomputer, and given the nature of quantum computers, I agree with you that it should be much faster than 30 sec... potentially even a millisecond. Crazy
@baldeepbirak
@baldeepbirak 3 жыл бұрын
Great explanation of the process involved. Shows how hard it was back in the day.
@BillAnt
@BillAnt 9 ай бұрын
Indeed, and it was all done with mechanical wheels, yet it was and still is pretty effective if done properly.
@jishcatg
@jishcatg 3 жыл бұрын
This reminds me of the movie trope where some malicious program is trying to crack an encryption key and it gets 1 character of the key at a time to progressively find the whole key. I remember this at the end of "War Games" but I think I've seen it many times where "hackers" are trying to infiltrate a system.
@mitchellfolbe8729
@mitchellfolbe8729 3 жыл бұрын
And some actor has to shout out, "It has 3 symbols.", "It has 4 symbols. Two more and we're doomed!", etc. with ever greater urgency
@kentix417
@kentix417 Жыл бұрын
That actually didn't happen in War Games. It wasn't cracking one key, it was finding ten different keys, one at a time. It didn't really explain how it was doing that, if I remember correctly.
@Muhahahahaz
@Muhahahahaz Жыл бұрын
Ikr? I’m always like… That’s not how encryption works! But apparently it did a long time ago 😅
@esmeecampbell7396
@esmeecampbell7396 6 ай бұрын
​@@kentix417worryingly the nuclear codes at one point actually was "0000 0000" (because they wanted it to be memorable in an emergency 😂) so the computer would have probably got it on its first try...
@kaydot6889
@kaydot6889 3 жыл бұрын
I was just about to sit down and eat lunch and look what I find in my subscription box... another trip to pound town!
@samuelweller3394
@samuelweller3394 3 жыл бұрын
"Now some people say that there's no way of doing integer factorisation in polynomial time .. but actually ... I've implemented that as well"
@fischerhansen5647
@fischerhansen5647 3 жыл бұрын
Hahaha :) Yeah, halfway through all his implementations I started to wonder where he got all the time and motivation.
@victoryfirst2878
@victoryfirst2878 3 жыл бұрын
This has to be the best explanation of the Enigma machine I have seen so far. Well done fella.
@DumblyDorr
@DumblyDorr 3 жыл бұрын
Awesome video! Love getting that kind of accessible explanation :D ... Also, tiny PSA: „Zuse“ is pronounced „tsoo-suh“, not „Zeus“ ;)
@TomGalonska
@TomGalonska 3 жыл бұрын
I'd listen to Mike Pound talk about anything CS related. But Mike talking about Enigma: Instant click!
@marjotoska
@marjotoska 2 жыл бұрын
I had a minor heart attack when he said "it took a bit of effort to come up with the code". I've been trying for 2 hrs to finish a substitution cipher and was nowhere near close lmao. There's levels to this and it is humbling to know.
@0bits_1
@0bits_1 Жыл бұрын
Yeah, a couple of years ago I created a small program in C++ that was based on the 'logic' behind Enigma. It took me about a couple of weeks to get it working as intended. In my code, in essence, a string variable would be run through a series of functions (the digital equivalent to the Rotors) that used integers to increment/decrement each character in the string (using the integer as a shift) before passing the variable to the next function, which would repeat the process with a different 'shift', for however many times the user would want to encrypt the string, so that - ultimately - the encrypted text that was put out would be protected by the fact that, A: you could have as many 'Rotors' as required, thereby increasing the number of potential true characters that each letter could decrypt to, and B: were you to successfully decrypt the text once or twice, it would only therefore decrypt to the previously encrypted version of the string and not the true, original plaintext. Back then, I created a Decryptor that was configured as a mirror opposite to the Encryptor, with the assumption being that you could only decrypt the text correctly if you had the Decryptor. I didn't know nearly as much as I do nowadays about coding and cryptography (and I STILL wouldn't trust my skills in that department, I'm still barely an amateur). However, knowing more about Hacking nowadays, I realise that all you would need to do in order to crack the above-mentioned encryption method would be to analyse the code of the Encryptor and simply create an altered version of it in order to decrypt the text. It's a fun thing to try with coding though and I'd highly recommend it to anyone for purely educational purposes in order to practise playing around with integers and variables. Definitely leave hardcore Cryptography to the guys and gals who know their stuff in this field, it's so dangerous if you don't know what you're doing with it.
@boredincan
@boredincan 3 жыл бұрын
The Polish then the British mathematicians that cracked Enigma are some of the most amazing thinkers of our time. I got lost during this video, but I understood enough to be very impressed. This is the best example of "standing on the shoulders of giants". Awesome all around.
@nirfz
@nirfz 2 жыл бұрын
I know that the polish cracked the code, but i don't know more about it, but while the british mathematicians around Mr. Turing were impressive, they still had the advantage of captured enigmas and captured documents of which rotors to use when. (Not at the start, but it helped them immensely) Still i think it was impressive that while here in the video he knew how an enigma machine works and could use his own language, it still took longer than i expected. Now imagine, not knowing how it works (the rotors and plugs and the turning) as well as having to decipher a foreign language. (And then using the Navy version with 6 rotors)
@kuhluhOG
@kuhluhOG 3 жыл бұрын
If you think about the fact that they made these things ~80 years ago, purely mechanical, carry-able and operateable by an average person, it's kinda incredible. Not just that, but there are also 3 things which REALLY helped them to crack it and it was still hard: - they sold a (dumbed down) version before the war commercially - they needed to captured one - after they added more wheels (at some point they kinda noticed and it basically broke the decryption for some time) they needed to capture one again
@gcewing
@gcewing 3 жыл бұрын
That's another thing that's better about modern ciphers. They're still hard to crack even if the enemy has full knowledge of the algorithm. The only thing that needs to be kept secret is the key.
@kilijanek
@kilijanek 3 жыл бұрын
Well, not quite. Commercial version was simplified, had less rotors and few minor differences. Enigma was cracked in 1933 by Polish mathematicians (French declared it impossible to break, British gave up independent work on breaking encryption and relayed on work of Polish Cipher Bearau). It wasn't decoded in real time, but with few hours/days delay - using Zygalski sheets, by hand. When Germany added more rotors, there was a case, when they sent by regular post device to embassy in Warsaw. Thanks to postal service workers (who delayed delivery from Friday to Monday), Poles got like 24h to study new design. What is worth mentioning: knowledge how Enigma is operating is not much of a help to break encryption. The most critical part to break encryption was set of rotors, ring settings. Without those it is far more difficult to predict result of encryption.
@kuhluhOG
@kuhluhOG 3 жыл бұрын
@@kilijanek that's why I said "dumbed down" version
@kilijanek
@kilijanek 3 жыл бұрын
@@kuhluhOG I apologize for my reaction, but I hear far too many times that Turing or US Marines were cause Enigma was broken at all (yeah, too many talks with egocentric Americans T_T )... and that is not true. In his genius, Alan Turing automated and improved process of decryption of Enigma - which is a great achievement itself. Breaking Enigma predates work done by Turing almost for a decade. Aaaaand ofc, US did almost nothing besides using decrypted messages :D
@kuhluhOG
@kuhluhOG 3 жыл бұрын
@@kilijanek well, the US also built more of the decryption machines, but yeah, the US didn't do anything more
@mceajc
@mceajc 3 жыл бұрын
I now have a slightly better understanding of exactly what Colossus was doing - statistical analysis of cracked code in order to better guess the settings. My admiration of those mathematicians, engineers, linguists and logicians only ever grows.
@paulwomack5866
@paulwomack5866 3 жыл бұрын
Colussus was used against Tunny, not Enigma. Enigma cracking was implemented by Turing's Bombe.
@mceajc
@mceajc 3 жыл бұрын
@@paulwomack5866 where Tunny = the intercepted code from a Lorentz cipher machine. Highly recommend anyone go to the Bletchley museum of they are in the area. Sadly I went when the computing museum was closed, but the working Colossus machine was whirring about. Superbly knowledgeable your guides, but now I see some of the attacks that can be used, the actual working their behind it makes so much sense.
@adamsbja
@adamsbja 3 жыл бұрын
If I remember right what Bombe was doing was plaintext decryption rather than statistical. "Okay, we have a large number of possible combinations, but which ones can deliver the plaintext we think it starts with and not throw any errors down the line?" Then that much smaller subset of combinations would be tested with other analysis and against other messages (remember that they wouldn't change the code for each message so if you cracked one you cracked them all until the code cycled). I don't know if they used the computer for that or went back to doing it by hand once they had a workable subset.
@MrGoatflakes
@MrGoatflakes 3 жыл бұрын
@@paulwomack5866 as much as I admire Turing, he did not invent the bombe, the Polish did.
@paulwomack5866
@paulwomack5866 3 жыл бұрын
@@MrGoatflakes The Polish invented the bomba, the device used at Blethchley was a more advanced development by Turing and Welch, using the bomba as a basis
@justincase5228
@justincase5228 Жыл бұрын
A particular collection of jumpers in the front of the machine would result in a characteristic collection of letter-rings: A->W->Z, B->X->Y->E->R, etc. This was one of the contributions of the Poles, they delivered this strategy to the Brits right before Poland was invaded. You could analyze a new day's message like this and hack the jumper settings. This then allowed Turing and team to just focus on the rotor combinations and using the German crib WETTER ("weather") which would appear in the first message of the day at a particular offset.
@youtubevanced4900
@youtubevanced4900 3 жыл бұрын
We always hear about how brilliant Turing and his team were because they were able to crack the code. I'd love to see something about the dude that invented it. Must of been just as clever to come up with the machine.
@vksasdgaming9472
@vksasdgaming9472 3 жыл бұрын
Arthur Scherbius was his name. Machine was patented 1928 and was commercial system. Of course that was its first version.
@kreiseltower
@kreiseltower 3 жыл бұрын
@@vksasdgaming9472 I don't know too much about this. But I assume that you could just take the basic idea and make it arbitrarily more complicated by adding more rotors, plugs etc. that it easily could have been made unsolvable.
@vksasdgaming9472
@vksasdgaming9472 3 жыл бұрын
@@kreiseltower New plugs and rotors were method to make encryption more complex. In practice fact that military communications follows protocol made it easier. If every message begins with or includes known expression it is easier to break. Informally worded messages might have been unsolvable as there simply was no way to guess what there was being said.
@NuclearCraftMod
@NuclearCraftMod 3 жыл бұрын
Great idea for a video! I had been thinking about this in the past, but wasn't actually sure how to test it or even categorise the strengths or weaknesses of Enigma in modern cryptographic terms.
@T33K3SS3LCH3N
@T33K3SS3LCH3N 3 жыл бұрын
"Let's look very briefly at what a knitting machine is" - thanks subtitles.
@pauzc5210
@pauzc5210 3 жыл бұрын
I was just thinking about this and now this comes up! Amazing Video!!! Thank you for all the interesting information you share
@ToyotaCharlie
@ToyotaCharlie 3 жыл бұрын
The automatically generated subtitles are killing me 😂 "churning bombs" and "knitting machines" 🙈
@MrSb192
@MrSb192 3 жыл бұрын
I had actually implemented the Enigma as well as the Turing Welchman Bombe 2 years ago for a cryptography project in college. Java based. It was fun and frustrating. But I've forgotten mostly how the bombe worked...
@melkiorwiseman5234
@melkiorwiseman5234 Жыл бұрын
My understanding is that it was an electro-mechanical dedicated computer which tried to "brute force" the encryption key by looking for a recognised sequence of characters in its output. It was made out of dozens of chained telephone-exchange style "uniselectors" which each had 26 positions.
@Eagle0600
@Eagle0600 3 жыл бұрын
At 10:47, when you say 26×3, surely you mean 26^3, since each rotor can individually be in one of 26 positions?
@merrymonarch
@merrymonarch 3 жыл бұрын
The number was a colossal, so yes
@stargazer7644
@stargazer7644 2 жыл бұрын
@@merrymonarch Before the introduction of the plug board, there were only 1,054,560 combinations on the original machines. Hardly colossal. It was the addition of the plug board on the military machines that ran it up to 1.5*10^14 combinations.
@merrymonarch
@merrymonarch 2 жыл бұрын
@@stargazer7644 fair point. Collosal is subjective. You're right about the plug board too. I think I read somewhere that if they'd added an extra rota it would have been too much for the computers they had at Bletchley
@stanrogers5613
@stanrogers5613 2 жыл бұрын
That is the total number of combinations, yes - but we can "break" one wheel at a time, so we don't need to try all of the combinations. The number of tests required is just 26 per wheel, so 23×3, not 23^3.
@jerryhuang7194
@jerryhuang7194 3 ай бұрын
Cracking Enigma then: a national priority Cracking Enigma now: a fun activity at the dinner table
@andrewcohen426
@andrewcohen426 8 ай бұрын
truly a great explanation. thanks
@kiwidiesel
@kiwidiesel Жыл бұрын
I still feel just as dumb after watching this as I did before hand, however it was very interesting.
@DasHemdchen
@DasHemdchen Жыл бұрын
He doesn‘t go into details such as how to calculate the IoC, the number of possibilities etc., and how he came to know of the rotor properties (which input generates which output letter) and the notches. Statistical language analysis seems to be the key to solve crypto.
@markwilliams5654
@markwilliams5654 3 жыл бұрын
how ironic they sent Alan to prison and now he's on a bank note
@Snagabott
@Snagabott 3 жыл бұрын
I wonder which ones of our moral panics will seem unjust to viewers 70 years hence.
@ComicalFlask
@ComicalFlask 3 жыл бұрын
@@Snagabott - Factory farming
@gianluca.g
@gianluca.g 3 жыл бұрын
@@Snagabott Assange case
@memeier9894
@memeier9894 3 жыл бұрын
Too many to name...
@kgb4150
@kgb4150 3 жыл бұрын
@@Snagabott Social justice, probably
@DIREWOLFx75
@DIREWOLFx75 3 жыл бұрын
"this isn't something one does by hand right, not quickly" I'll give you one name: Arne Beurling. On his own, without any computation assist, without access to any hardware ( unlike Bletchley park, which had a copy of the early Enigma that was brought out from Poland ), he cracked the Geheimschreiber, which was roughly the Enigma for teleprinters, in 2 weeks.
@stephaniesadie832
@stephaniesadie832 2 жыл бұрын
This is true, but to be fair the identicle feat was later replicated by Bill Tutte at Bletchley Park with the Lorenz teleprinter device
@Nightcorehardy
@Nightcorehardy 3 жыл бұрын
The code bullet video we've been waiting for.....
@PiezPiedPy
@PiezPiedPy 3 жыл бұрын
The way Alan was treated at the time was absolutely disgusting, especially after what he had done.
@jag1963
@jag1963 3 жыл бұрын
Britains most shameful hour for sure.
@evilcanuck
@evilcanuck 3 жыл бұрын
@@jag1963 i don't know owning slaves and the genocide of the indigenous peoples of the Americas is pretty up there
@tomx641
@tomx641 3 жыл бұрын
@@evilcanuck Those things were done by people who live in the Americas, not Britain.
@evilcanuck
@evilcanuck 3 жыл бұрын
@@tomx641 who came from Britain
@ComicGladiator
@ComicGladiator 3 жыл бұрын
@@evilcanuck Are you self-hating, or do you come from people without sin?
@john1v6
@john1v6 3 жыл бұрын
Great video. Nice mention of Konrad Zuse too.
@danceswithdirt7197
@danceswithdirt7197 3 жыл бұрын
Mike Pound is great! Love the videos with him in.
@UkuleleHungary
@UkuleleHungary 8 ай бұрын
Absolutely fantastic video!
@OElitecorp
@OElitecorp 3 жыл бұрын
I wrote my undergraduate dissertation on ciphertext only cryptanalysis of the enigma machine. Wrote a tool in Java to perform it too. Was a really fun project, such interesting history - helped living in Bletchley too!
@danielstephenson7558
@danielstephenson7558 3 жыл бұрын
Great video. Would love a tutorial to recreate the Enigma Machine in code. Code Bullet started one but never finished it.
@Kilroyan
@Kilroyan 3 жыл бұрын
This was so interesting, thank you for sharing!
@mitch3384
@mitch3384 3 ай бұрын
I haven't seen that printer paper in a loooong time.. that brings back some very warm, fuzzy memories.
@christianborss4850
@christianborss4850 3 жыл бұрын
Great video! When you explained your algorithm, I was wondering how you can avoid that you run into a local maximum. But apperently it happens. Any suggestions how to improve it besides starting again with a different seed and see if you end up with a better fitness?
@robertforster8984
@robertforster8984 2 жыл бұрын
You usually don’t have to throw out all your settings.
@aceroadholder2185
@aceroadholder2185 3 жыл бұрын
As an example of Enigma being difficult to break if the message is no longer than 50-60 characters there are still U-Boat messages that have never been broken. A short message along with the Kreigsmarine Enigma machines that added an additional rotor are very difficult to decipher.
@thepuzzlebox6620
@thepuzzlebox6620 3 жыл бұрын
There was nothing preventing them from manually scrambling their messages on top of the Enigma encoding. All it would take is a manual alphabet switching system that changes based on the number of messages that have been sent. Turing could never have accounted for it.
@stanrogers5613
@stanrogers5613 3 жыл бұрын
Part of the problem with U-boat Enigma messages is that they weren't merely enciphered, they were also encoded. That is, the original message won't necessarily contain _any_ plaintext, so there's no way to know when you've deciphered it.
@apollyon1
@apollyon1 3 жыл бұрын
this is absolutely incredible.
@pompeymonkey3271
@pompeymonkey3271 3 жыл бұрын
Deconstructing entropy of a cypher. Most excellent!
@NiekNooijens
@NiekNooijens 3 жыл бұрын
I'm just wondering. Can you brute-force all combinations fast enough in parallel using a GPU? Cause you're basically doing the same program (decrypting using a random setting, then calculating the output's "quality") millions of times. So an Nvidia 3090 has 10496CUDA-cores and can boost up to 1.7GHz. Lets assume you can do a bruteforce attempt per 4 clock-cycles per-cuda-core. then you're already guessing 4,460,800,000,000 guesses each second. I think you could easily try every combination in under a day...
@duffman18
@duffman18 Жыл бұрын
He's said in other videos that they do indeed use high end graphics cards for this, in fact they have tons of them all working at the same time, together, in a big server. Dunno how you do that, get graphics cards to link with each other like that. But yeah he's said that's what they do, at that university. And so different classes and groups and academics have to book a time slot when they can use the dozens of graphics cards in parallel to brute force something or to use a more sophisticated method to crack a code or to model a complex system like the weather, or anything like that that academics do. The physicists use them a lot too, to model systems like perhaps individual atoms and things like that. Which makes a lot of sense, considering they computer science was originally a branch of physics, and remained there way for decades until the 70s and 80s where computer science began being seen as a separate subject altogether. But yeah, it's still linked heavily with physics.
@thomaswalder4808
@thomaswalder4808 4 ай бұрын
@@duffman18 "Dunno how you do that, get graphics cards to link with each other like that. " They not have to be linked if brute force is used. Each graphic card can work on a distinct subrange of the possible settings without the need to communicate with other graphic cards
@darthollie
@darthollie 3 жыл бұрын
New drinking game - every time he mentions the fact that getting it slightly right yields somewhat comprehensible results instead of random nonsense, you drink
@guyh3403
@guyh3403 3 жыл бұрын
I treid tooo listn bt gott ddrnk...
@sharkuc
@sharkuc 3 жыл бұрын
@@guyh3403 Looks like you've almost got your rotor/plugboard settings right. Keep going.
@djmips
@djmips 3 жыл бұрын
You did learn that bit though didn't you. XD
@pepesworld2995
@pepesworld2995 2 жыл бұрын
man i'm really enjoying this. its great how the hiezenburg uncertainty principal pops up everywhere: short message means you dont have enough information on the frequencies of letters.
@1Cruzer4u
@1Cruzer4u 2 жыл бұрын
Absolutely Fascinating! The magnitude of their intelligence is astounding.
@january1may
@january1may 3 жыл бұрын
Sounds like Enigma decryption is the kind of thing where an evolutionary/genetic algorithm would work _really_ well. I wonder if anyone had tried that yet - it has to be an interesting experiment!
@gschadalavada8980
@gschadalavada8980 Жыл бұрын
Hi I’m curious, what are those algorithms you’ve mentioned?
@marcelreiter181
@marcelreiter181 Жыл бұрын
​@@gschadalavada8980 Usually you start with a bunch of algorithms which are just guessing. However, some will guess better than others. Keep the better ones, mutate their guesses (automatically) a little and repeat, until you have one you're happy with. Just youtube them, there's lots of really cool videos on them :)
@jjoganic
@jjoganic Жыл бұрын
In effect, he is doing precisely that by hand. Notice that he mentioned fitness functions specifically. Whereas the GA would be evaluating the entire solution space starting from a random draw and fiddling with the details, the presenter has chosen to stage the work such that he can evaluate one entire domain comprehensively before moving on to the next one. You could do that with a GA as well, and in my experience, it would converge to the proper solution faster than if you did the whole solution in one pass.
@Iris-jw3ci
@Iris-jw3ci 3 жыл бұрын
Everyone always forgets Marian rejewski who cracked the enigma BEFORE ALLEN TURING
@Fanchiotti
@Fanchiotti 2 жыл бұрын
Frodo is really smart on his explanations. Thanks!
@andrebalsa203
@andrebalsa203 3 жыл бұрын
Fascinating video, thank you.
@EddiePedalo
@EddiePedalo 3 жыл бұрын
You just explained how to crack the enigma code, in under 20 minutes, to me, who failed GCSE maths, and I understood all of it. That is more impressive than cracking the code. Bravo.
@hikaru-live
@hikaru-live 2 жыл бұрын
I think there are still a few Enigma messages left undecrypted out there. This approach may be used, with plugboard implemented, to crack those and give a more complete image of WW2.
@keziahradley5897
@keziahradley5897 2 жыл бұрын
If you find any give 'em to me xD I built my own version of this, might be fun :)
@LakadMatatag2702
@LakadMatatag2702 2 жыл бұрын
All of the undecrypted Enigma messages have been decoded.
@jeffrice238
@jeffrice238 2 жыл бұрын
Fascinating! And really nice explanation.
@TonyyStarrkk1994
@TonyyStarrkk1994 3 жыл бұрын
I like finding videos I didn't know I wanted to watch. Great job algorithm.
@ynotnilknarf39
@ynotnilknarf39 3 жыл бұрын
I used to visit an elderly chap who worked for BTM in Letchworth right at the start of WWII as a design engineer (possibly not the correct job description), he knew 'Doc' Keen and Edward Travis for sure. He lived here all his life, went on to be a senior manager for ICL. All we have left of 1/1 is in the name of two of the residential streets on the old site where the Bombes were made, that being Pascal Way and Tabbs Close. He was still very guarded about his work there right up to his death only a few years ago at the age of 98, absolte gent he was and played down his efforts.
@jarodbaker2328
@jarodbaker2328 3 жыл бұрын
mans just explained the weakness of enigma 180 times before getting to the point.
@ImNotGam
@ImNotGam 2 жыл бұрын
The CodeBullet video we were waiting for
@Z4KIUS
@Z4KIUS Жыл бұрын
this video shows cracking the specific cyphertext while having fully understood the machine you somehow managed to get even knowing the general idea but not knowing all the internal wirings would make it basically impossible
@drskelebone
@drskelebone 3 жыл бұрын
It'd be great to do a follow up talking about how to correct things. If you know "JBROPOSE" should be "IPROPOSE", can you feed that back through the system to correct the solution more? I'm wondering about how that error propagates to later strings, where the true words aren't as obvious.
@whiteraven2149
@whiteraven2149 3 жыл бұрын
I could be wrong, but just swapping the plugboard configuration might help. So in your example just connect I to J and B to P
@felixmerz6229
@felixmerz6229 3 жыл бұрын
He mentioned that, knowing the plain text, he can put it in and it "pretty much breaks through it right away". Now what he doesn't specify is if the entire plain text needs to be known or if pieces are enough, but I suspect pieces would be enough already. Knowing more and more actually present letters of the message improves the accuracy of the statistical methods.
@vdinh143
@vdinh143 3 жыл бұрын
@@felixmerz6229 knowing pieces of the plaintext is enough because the entire encryption rule applies both to that segment of plaintext as well as the rest of it. Knowing the plaintext does break Enigma, and how you come to know that plaintext (be it espionage or random struck of luck) is irrelevant.
@mrfrenzy.
@mrfrenzy. 2 жыл бұрын
You just need to go through the rotor settings again with the correct plugboard.
@michaelarmer256
@michaelarmer256 2 жыл бұрын
i suspsect leaving the computer to it these days if the code is all there having a human going in and checking it and saying no that must be that might be slower but maybe at that first point a human or an ai might do a better job of guessing the correct text than running the scrip to find the actual correct words.
@lucidmoses
@lucidmoses 3 жыл бұрын
This episode was fantastic. I wonder if using a modern GPU would be better. Each core doing a set and testing them.
@etziowingeler3173
@etziowingeler3173 3 жыл бұрын
Absolutely class this video, I love it!!
@ronchappel4812
@ronchappel4812 3 жыл бұрын
I'd read about some of these techniques before but it's fun to see it done with a modern computer.
@xoblyxanier
@xoblyxanier 3 жыл бұрын
That seems to be the most uncomfortable chair ever! Great video though ;)
@KuittheGeek
@KuittheGeek 3 жыл бұрын
I'm definitely going to start using the phrase, "How English is this?" when correcting grammar. I love the concept of how close is something to a language and just referring to it as "How language is this?". This was a great video. Very informative.
@oooBASTIooo
@oooBASTIooo 2 жыл бұрын
This has nothing to do with grammar. The Index of coincidence is obviously all about how the words are written, i.e. the syntax.
@diegosolis9681
@diegosolis9681 2 жыл бұрын
This can could narrate paint drying and still make it exciting! What a talent for teaching!
@HackCart
@HackCart 2 жыл бұрын
Why nobody is honouring scientists who made Enigma. What a brilliance it was.
Turing's Enigma Problem (Part 1) - Computerphile
19:00
Computerphile
Рет қаралды 1,3 МЛН
How TOR Works- Computerphile
14:19
Computerphile
Рет қаралды 1,7 МЛН
Спаси её волосы🙏🏻
00:40
БРУНО
Рет қаралды 1,4 МЛН
Não pode Comprar Tudo 5
00:29
DUDU e CAROL
Рет қаралды 65 МЛН
ChatGPT Jailbreak - Computerphile
11:41
Computerphile
Рет қаралды 272 М.
How did the Enigma Machine work?
19:26
Jared Owen
Рет қаралды 7 МЛН
How This Pen Changed The World
9:17
Primal Space
Рет қаралды 139 М.
How Enigma was cracked
19:29
Ingenious
Рет қаралды 66 М.
Turing breaks Enigma - The Imitation Game (2014)
6:15
Weyland
Рет қаралды 1,8 МЛН
Fast Inverse Square Root - A Quake III Algorithm
20:08
Nemean
Рет қаралды 4,8 МЛН
How AI 'Understands' Images (CLIP) - Computerphile
18:05
Computerphile
Рет қаралды 56 М.
LogJam Attack - Computerphile
18:47
Computerphile
Рет қаралды 177 М.
Future Computers Will Be Radically Different (Analog Computing)
21:42
Flaw in the Enigma Code - Numberphile
10:58
Numberphile
Рет қаралды 4,8 МЛН
Спаси её волосы🙏🏻
00:40
БРУНО
Рет қаралды 1,4 МЛН