Let's honour great Polish mathematicians (Jerzy Różycki, Henryk Zygalski, Marian Rajewski) who broke the first Enigma giving Turning the basis, so they are not erased from history
3 жыл бұрын
exactly, this is so overlooked
@DunderKlomp3 жыл бұрын
If you go to Bletchley Park, you'll see their contribution is well-recognized. Gays FTW!
@deadcatthinks67253 жыл бұрын
The 2 Zlote coin has an enigma wheel on one face
@Jan-eh7nf3 жыл бұрын
@@DunderKlomp I've been at Bletchley Park Computing Museum 3 years ago and found ZERO (literally) mention about any Polish contribution.
@johndavid3603 жыл бұрын
* Turing
@PhilKulak3 жыл бұрын
What a testament to Turing's brilliance: it's not even trivial 80 years later.
@GapWim3 жыл бұрын
Indeed. But also to Arthur Scherbius, the inventor of the enigma machine itself: it’s not even trivial 80 years later.
@izzyr95903 жыл бұрын
No joke. I’m a computer science student. After watching “the imitation game” I searched up “how does Enigma work” and I thought “ah it must be so easy to understand and decode now!”. Nope.
@kopasdupas3 жыл бұрын
It's an achievement of many people, including Marian Rejewski, who broke the simpler version of Enigma in 1930. His work was then used by Turing & Park as a foundation for newer Enigma in 1941.
@projecttitanomega3 жыл бұрын
Not to mention, Mike could code this up on his laptop, pre-built and bought at a store, in a high-level coding language. Turning *built* his computer. Imagine not simply having to write the code, but having to also physically construct a machine solely to run it. No using pre-built chips, no machine code, no assembly code, no standardization, no reference for building such a machine or any help from other learned people, as at the time, no such machine had ever really been built and there were no people who knew how to build it. He was a once in a generation genius.
@Sakkura13 жыл бұрын
@@projecttitanomega The "bomb" computers were a Polish design, not something Turing came up with.
@Saturate08063 жыл бұрын
Someone has to finish Code Bullet's projects...
@hetsmiecht10293 жыл бұрын
Lol
@elizabethfransen3983 жыл бұрын
I was about to say!
@domninin3 жыл бұрын
Now I finally know
@nullentrophy3 жыл бұрын
Lol
@Crazy17933 жыл бұрын
Haha yess!
@mattiiejwheis1350 Жыл бұрын
We cracked enigma a few years ago in our class with our teacher and it was so much fun. He really tried to explain everything and we actually understood it. It was such a great feeling to see this video and remember everything I learned
@jackass123455 Жыл бұрын
at my school we had a sort of computer club wher we could play call of duty (the original back IN 04, 05) to gain entry you had to get a password that was encrypted with an enigma machine. the clue was HELP (this was the start postion leters of the wheels) and the plug board was pre defined was kinda fun trying to figure it out
@andrewpinedo18835 ай бұрын
Your class was cool.
@m.cigledy67693 жыл бұрын
One thing that wasn't mentioned was how difficult it would be to decipher if you didn't start out already knowing that it was an enigma cypher.
@gezzuzzful Жыл бұрын
you just to steal the machine
@Bunny99s Жыл бұрын
@@gezzuzzful Well, that's not what he said. Of course knowing how enigma works (i.e. stealing an enigma machine) is the fundament to break the code. The point here is, how do you know if the encrypted message is actually an enigma cypher? Imagine I give you some encrypted message right now. How do you know if this was encrypted with enigma or maybe RSA or AES. Maybe just a simple Caesar cipher or a simple pre-shared-key xor cypher. All your attempts to crack it as if its an enigma cypher would not really help you.
@blackjacktrial Жыл бұрын
Also how difficult to decipher it would be if you didn't know what language was encrypted. If you decide Swahili or Martian successfully, it's still useless to you if you can't recognise it.
@dj1NM3 Жыл бұрын
@@Bunny99s It would be abundantly clear that it wasn't a Caeser-shift cypher, if it's a known English (or American) message which fails the ETOAN frequency test. After that, I suspect that it would be a bit of a guessing-game as to what encryption system was used and I doubt that the 5-letter cluster WW2 vintage formatting would be used, as it would most likely be sent as a solid block of characters instead. A modern, digital spin on Enigma could use different sized "virtual rotors" and rather than merely 26 positions (just the English letters in one case), could have upper-case, lower-case, numbers 0-9, space and all the commonly used punctuation marks, making rotors with about 70 positions each. Then there's the possibility of eliminating the "tell" of no symbol being encyphered as itself, but whether that's considered to matter when there's now about 24million possible rotor setting combinations from one arrangement of just 4 rotors, compared to the original 4-rotor Naval Enigma with about 0.5million possible rotor setting combination from one arrangement of 26-position rotors. This is also ignoring the "reflector", which doubles the exponent (70^8 or 26^8 instead of "merely" 70^4 or 26^4) by running the circuit back through the rotors. I would also hazard a cautious guess that some loon could even construct a physical version of a 70-position rotor machine, just for the heck of it.
@operator8014 Жыл бұрын
Lol!
@Liggliluff3 жыл бұрын
What I take from this video is that, if you get one of them correct, it'll be slightly better.
@muizzsiddique3 жыл бұрын
How many times has he said that throughout the video? I thought I was going crazy.
@pies7653 жыл бұрын
Hmm, I think he should have made that more clear honestly, kinda vague.
@AlePazzaglia3 жыл бұрын
@@pies765 Basically he said that if you get one of them correctly, the IoC will tend to get slightly better
@MartinSFesty3 жыл бұрын
@@AlePazzaglia WHAT?
@MoritzvonSchweinitz3 жыл бұрын
Well, yes. That is the most important vulnerability of the Enigma scheme, and the biggest difference to modern schemes.
@umka75363 жыл бұрын
Dr. Mike Pound is definitely my favorite speaker on the Computerphile. His ability to explain complex problems in a very easy to get way is outstanding.
@sammiller66313 жыл бұрын
Pound's strategy of repeating "if you get one of them correct, it'll be slightly better." over and over might work for you, but the high energy of Professor Moriarty makes for a more engaging Computerphile for me.
@lanboost27733 жыл бұрын
Agreed, it also helps that he talks about more interesting topics imo
@EndrewsXeudon3 жыл бұрын
And he saved middle earth!
@x0rn3123 жыл бұрын
Which one is Professor Moriarty? I'm a big fan of Mike and Dave-but I think they are all great
@JohnSmith-pu8rd3 жыл бұрын
most suspicious too
@AlexSchmid-TheAceofSpades3 жыл бұрын
" I implemted an enigma machine because it was fun." This is the mark of a true programmer.
@Warlock_UK3 жыл бұрын
I mean this is why I'm watching this whole video and am not even slightly bored.
@alainbesseleer65163 жыл бұрын
Haha, I did the same, and it was fun indeed. But I wasn't able the write code to crack Enigma yet. As mentioned in the video, a brute force attack will take too long, even with modern computers.
@Hr1s7i3 жыл бұрын
@@alainbesseleer6516 An average laptop has like what, 4-6 cores? Try this with a basic workstation that has something like 64 cores slugging through the computations at 4ghz. Just based on the amount of alu available and their sheer size given nowadays they can operate with 64 bit values, you can do quite a bit more than you'd assume and it's relatively affordable (for cracking the enigma at least... forget anything short of a chunk from the national budget to crack a decent modern encryption).
@PiezPiedPy3 жыл бұрын
@@Hr1s7i Even better use compute shaders and a stack of GPU's and you will be looking at thousands of cores to do the work of decryption. Also don't use a sequential brute force.
@JorgetePanete3 жыл бұрын
implemented*
@DeHerg3 жыл бұрын
18:30 "In the war the limited messages to something like 200 characters" Oh great it's Twitter all over again.
@FrVitoBe3 жыл бұрын
I 2 try to decipher Twitter messages with enigma for the real message
@nickryan34173 жыл бұрын
Also because having to reliably type and transcribe for transmission a several hundred character message was a serious chore. There were rules about not re-sending the same message, due to errors, however because on occasion this was not adhered to the security was compromised. The smarts of all the people working on decrypting these messages was staggering.
@irrelevant_noob3 жыл бұрын
@DeHerg *14:31
@timothyj19623 жыл бұрын
I worked with something similar in the Army as a Radio Teletype operator. It was called a KW-7. You were handed a slip of paper and on it was pairs of numbers I believe it was 1 to 32. In the KW-7 there was something called the "Block". The block had 32 wires which you would arrange into sockets on the block according to that slip of paper. Once you set these wires in the block, you put the block into the main crypto body, close and lock the lid, then run a system check. In order for it work properly, you would key up the radio, and hold a button for 15 seconds to sync with other receiving stations. At the time, the machine was classified as Confidential, once keyed it was classified as secret. Unfortunately the system was compromised by the Walker Spy Ring. Not only did this group sell the key lists for almost 20 years. But gave them the design specifications. The crypto essentially was rendered ineffective. I was basically out of a job and was reduced in my speciatly as a single channel radio operator. If this interests you. Look up the AN/GRC-142, AN-GRC-122, AN/VSC-2, and the AN/VSC3. Very cool stuff in its time. All museum pieces now. The KW-7 is no longer classified.
@DBProductions12345-m3 жыл бұрын
Pound is the best speaker on this channel, pound for pound, no contest. Insta watch.
@sanferrera3 жыл бұрын
He is great! One of my favourites is the one where he cracks passwords. Super interesting!
@JanStrojil3 жыл бұрын
I second that. There are some really good speakers here, but he just combines incredible energy, understanding, humour. Love his videos.
@TheVergile3 жыл бұрын
Rob Miles tho
@zukacs3 жыл бұрын
d
@s33wagz3 жыл бұрын
Lol, pound for pound
@jasonc3a3 жыл бұрын
I love how at 6:50 the transition and lighting makes it look like a whole day has passed while MP has been churning out ciphertext lol
@asailijhijr3 жыл бұрын
The fact or property that getting some settings right improves the metrics means that your approach resembles single-pin picking of a lock.
@alpardal3 жыл бұрын
Yep, it also resembles evolution: a big change by itself it's really unlikely, but small accumulative changes make you progress little by little in the right direction
@jasonc3a3 жыл бұрын
@@alpardal Lies! Miles don't exist! Everything is inches!
@khleta43343 жыл бұрын
This is the Lockpicking Lawyer and what I have for you today is this Enigma...
@man1001113 жыл бұрын
@barutaji two is binding...
@Alex_Deam3 жыл бұрын
@@alpardal also hence 'fitness function'
@asciimation3 жыл бұрын
I am glad your code implements the double stepping correctly. As you say implementing Enigma in code is really just array manipulation. I've done a few versions including one in 80s home computer BASIC! The algorithm for Enigma is really quite simple. The Turing/Welchman Bombe, the machine they actually used in WW2 to crack Enigma, is much more complicated. Reverse engineering that, really understanding how it works then making my own was one of my most satisfying projects. Welchman's contribution of the diagonal board to Turing's original design was brilliant. And Welchman was also responsible for coming up with the idea of traffic analysis. I always feel a bit sad that Turing's name is always mentioned but Welchman is nearly unheard of. And yes, as others have rightly pointed out all that work was made possible but the work of the three Polish mathematicians and the Frenchman Bertrand who somehow managed to co-ordinate things between the English, French and Poles. One other difficulty is real Enigma messages were not just plain text. They contained a lot of military jargon and acronyms. Very cool video and well explained, thank you!
@20chocsaday10 ай бұрын
The local library had a book about ciphers in the 1970s. Enigma machines and their post-war sale was also discussed. At the back he had written a message which had been through a virtual Enigma machine. He told the readers how to write the program which would decrypt it.
@hackcraft_3 жыл бұрын
"well, the weakness of Enigma is that if we get some of these things right, even if the others are wrong, we get a little bit closer to the answer, usually."
@jordananderson27283 жыл бұрын
He addresses that at 20:30, mentioning how with a 128-bit or 256-bit encryption, even if you get the first bit correct you'll still have random noise. The fact that Enigma *did* show marked improvement with correctly guessed settings meant that it was inherently insecure to a degree.
@martinwragg82463 жыл бұрын
Not so obvious if you connect 10 stecker plugs, the IOC will hardly change if you guess 1 plug correctly. Without any stecker plugs connected you can crack 100 character text in a few minutes on a laptop.
@Execuor3 жыл бұрын
@@martinwragg8246 fyi Stecker means plug.
@martinwragg82463 жыл бұрын
@@Execuor thanks, I did know, just what I call them. 😉
@modalmixture3 жыл бұрын
Is there a cryptographic term for this property?
@ToadyEN3 жыл бұрын
14:36 “I’m lazy” - programmes enigma machine decoder in spare time 😂
@costa_marco3 жыл бұрын
Programmers have a different definition for "laziness": expend 8 hours automating a solution to a job that would take 1 hour to do by hand, just in case you have to do it again in the future. The reasoning: I am lazy... 🤷♂️
@RealCadde3 жыл бұрын
@@costa_marco And that's why programmers are so much more efficient than most others when it comes to doing stuff on computers. Your regular guy would manually update a spreadsheet by printing out a list of things that needs to be updated on a piece of paper, tediously going over every entry. A programmer would spend 2 hours making an interpreter of the other document to automate that process. Instant 20,000% efficiency for the foreseeable future. And you'd be amazed at how many there are out there sitting at computer keyboards day in and day out doing it manually.
@Anvilshock3 жыл бұрын
@@RealCadde Except xkcd 1319 ;)
@taragnor3 жыл бұрын
Yeah pretty much the first question any programmer asks "Can I get some machine to do this process for me?"
@Restil3 жыл бұрын
The laziness he's referring to is not the time spent programming the decoder, but the time he'd have to spend waiting for it to produce a response. 3 rotors takes a few seconds. 5 rotors would take hours or days.
@zamalek40793 жыл бұрын
The known plaintext at the beginning was the salute that referenced their leader. His ego ultimately led to enigma being cracked during the war.
@yestfmf3 жыл бұрын
A great deal of the solution is also from laziness on the part of the germans. Instead of using new codes, they used variations of the same codes. Once the english knew this, they could play with variations and find the key fairly easily.
@matthewmayton18453 жыл бұрын
I think the Kriegsmarine did change the codes once and it took the Allies months to decipher again (or was it adding another rotor). Though they never really change the codes afterwards. One of the flaws with the German's was they believed the Allies could not decipher enigma. If they believed the Allies could, the Germans would most likely have changed the codes (assuming they could to begin with). Instead, Germany focused too much on just espionage.
@stargazer76443 жыл бұрын
@@matthewmayton1845 The Enigma codes were changed every day at midnight. The Germans also had a way to do it every hour, but they rarely did that. What you're referring to was when the Navy added a 4th rotor, but by then the codebreaking was so advanced it didn't add much of a problem.
@GastevAleksei3 жыл бұрын
Mike Pound? Enigma machine? Now this video is lit!
@TotallyTacotrap3 жыл бұрын
I like your pfp
@x0rn3123 жыл бұрын
What I love about Professor Pound is that not only is he hilarious - he is also a humble genius
@reyblais48583 жыл бұрын
Anytime I hear about Turing, it always makes me sad to think how he was treated after all his accomplishments.
@tonytungsten42782 жыл бұрын
Do people without any accomplishments deserve to be treated worse?
@technus1472 жыл бұрын
@@tonytungsten4278 than people with accomplishments? yes, otherwise we'd give everyone a nobel prize
@jackass123455 Жыл бұрын
@@tonytungsten4278 he wasn't treated any beter than anyother homosexual male of the time. the dude was chemically castrated and arrested. eventually (potentially) killing himself via cyanide poisoning.
@mr.pavone9719 Жыл бұрын
@@tonytungsten4278Are you a fan of participation trophies?
@Oodelally3 жыл бұрын
Visiting Bletchley park is such a splendid experience
@h-00583 жыл бұрын
You know that the Enigma Machine was great when it is being talked about even today
@iHack-ms5nr3 жыл бұрын
Yes! I'm taking second year ICT, and we were just watching The Imititation Game today (A movie about Turing breaking the Enigma cipher)
@xplinux223 жыл бұрын
@@iHack-ms5nr I loved that movie so much. Granted, there was a lot of movie dramatization and some factual liberties taken, but it's a terrific film that does a great job of piquing viewers' interest about cryptography and WWII.
@irene13073 жыл бұрын
actually, there were much better rotary machines, but nobody talks about them, because they are just not as famous as Enigma.
@michaelsommers23563 жыл бұрын
Enigma is talked about so much because its breaking was so importance in the war. There were other, better machines, such as the American SIGABA or the British TYPEX, that are not talked about, because they don't have such a compelling story, and because their details are still secret (or they were the last time I checked).
@peterfireflylund3 жыл бұрын
The Enigma was simple enough to (almost) explain and the breaking of it was declassified a long time ago. The Tunny break was only declassified recently (and it was much more complicated). There was no public information until recently about the British codes (and how easily most of them were broken by the Germans). And the Enigma has Turing, of course.
@AlRoderick3 жыл бұрын
I'd love to do the same for the Lorentz cypher. I really want to know more about that, no one talks about it nearly to the same degree as enigma but it was the real challenge that they needed a proper computer to crack.
@hotshot172253 жыл бұрын
Came here to say that! After reading extensively about Lorenz, the process of cracking it and the people involved, I - and excuse me - shat myself upon realization of how incredibly brilliant Bill Tutte (and a lot of others) was.
@marjotoska2 жыл бұрын
I had a minor heart attack when he said "it took a bit of effort to come up with the code". I've been trying for 2 hrs to finish a substitution cipher and was nowhere near close lmao. There's levels to this and it is humbling to know.
@0bits_12 жыл бұрын
Yeah, a couple of years ago I created a small program in C++ that was based on the 'logic' behind Enigma. It took me about a couple of weeks to get it working as intended. In my code, in essence, a string variable would be run through a series of functions (the digital equivalent to the Rotors) that used integers to increment/decrement each character in the string (using the integer as a shift) before passing the variable to the next function, which would repeat the process with a different 'shift', for however many times the user would want to encrypt the string, so that - ultimately - the encrypted text that was put out would be protected by the fact that, A: you could have as many 'Rotors' as required, thereby increasing the number of potential true characters that each letter could decrypt to, and B: were you to successfully decrypt the text once or twice, it would only therefore decrypt to the previously encrypted version of the string and not the true, original plaintext. Back then, I created a Decryptor that was configured as a mirror opposite to the Encryptor, with the assumption being that you could only decrypt the text correctly if you had the Decryptor. I didn't know nearly as much as I do nowadays about coding and cryptography (and I STILL wouldn't trust my skills in that department, I'm still barely an amateur). However, knowing more about Hacking nowadays, I realise that all you would need to do in order to crack the above-mentioned encryption method would be to analyse the code of the Encryptor and simply create an altered version of it in order to decrypt the text. It's a fun thing to try with coding though and I'd highly recommend it to anyone for purely educational purposes in order to practise playing around with integers and variables. Definitely leave hardcore Cryptography to the guys and gals who know their stuff in this field, it's so dangerous if you don't know what you're doing with it.
@karelvandervelden88193 жыл бұрын
After having worked later generation machines (KL-7) in the seventies as a navy radio-operator I marvel at the simplicity of this explanation. Thanks.
@darkwinter60283 жыл бұрын
The other thing you can reasonably assume; which a modern computer can take advantage of; is that the message will be in German (both in it’s vocabulary and grammar)...
@thatcherfreeman3 жыл бұрын
One challenge is that a lot of the messages from ww2 had loads of abbreviations and shorthand, so that'd serve to make it more difficult
@darkwinter60283 жыл бұрын
@@thatcherfreeman To an extent; yes; however much of that can be figured out and added to the dictionary.... for example, dropping vowels.
@sircalvin3 жыл бұрын
another thing used was plaintext attacking a very famous line at the bottom of most messages, which i wont put here because i dont want youtube flagging this comment
@darkwinter60283 жыл бұрын
@@sircalvin Yeah... something about hailing the guy in charge... 😉
@stephaniesadie8323 жыл бұрын
Many of the american encrypts were translated into Navajo and Lacota beforehand. The Axis never cracked those messages.
@kaydot68893 жыл бұрын
I was just about to sit down and eat lunch and look what I find in my subscription box... another trip to pound town!
@krisk73 жыл бұрын
Worth noting that they could start guessing about rotors and all because before the war Polish secret service got a hold of one of the first versions of Enigma, then Polish mathematicians (Marian Rajewski) cracked it without computers and shared the machine and algorithms with British secret service. This facilitated immensely breaking subsequent Enigma versions.
@john1v63 жыл бұрын
Very true. The Polish contribution was important. Rajewski and his colleagues did some great work.
@89Sawik3 жыл бұрын
I would say was crucial as they provided decrypting algorithm. What Turing did (and it was amazing by itself) was building and electromechanical automaton, which was able to crack codes quick enough to use intercepted intelligence. The third or fourth iteration of enigma's encrypting algorithm become too hard to crack manually. In fact some of the first messages cracked by Poles directly predicted war and even Marshall Piłsudski tried to convince Charles de Gaulle to perform attack on Germany, before it will be too late. That may be one of the reasons, why this truth is not spoken widely.
@telawiw3293 жыл бұрын
Face the truth, Jerzy Rozycki, Henryk Zygalski and Marian Rejewski broke the code, wrote algorithms, then tried to come up with some engineering tools to speed braking code up. All having no knowledge about secret military cutting edge technology at that time, called computers. All what Turing made was to build a machine where the numerical methods and algorithms invented by Poles could be efficiently executed. That how the Allies won the war, then as a "thank you" they sold us out to Stalin. Humiliated Poles not inviting us to the victory parade!!! We like the Chinese do not forget this
@MrGoatflakes3 жыл бұрын
They also made the first bombe
@Ashitaka2553 жыл бұрын
@@telawiw329 moron. Turing is the father of modern computer science. He's far beyond just an engineer who built a machine. That was Tommy Flowers. Turing didn't use the Polish algorithms.
@ragnarsdad60653 жыл бұрын
there was a project on the BOiNC platform trying to crack Enigma messages using brute force decryption, the messages had been intercepted during the war but never decoded. They did manage to crack a few but it took an awful lot of computer power to do so.
@codegeek983 жыл бұрын
I'm sure "an awful lot" back then could be completed in a few days on a single thread of JS running on a semi-smart-phone's toy web browser
@ragnarsdad60653 жыл бұрын
@@codegeek98 The project (enigma@home) managed to decrypt 4 messages using brute force decryption method. it took over 360,000 years of compute power (based on an AMD Athlon Xp 3500+ single thread processor) to decrypt all 4 message.
@tomstech43903 жыл бұрын
@@ragnarsdad6065 were they all done? Os it still going? Have many 6, 8, 16 core cpus spare atm.
@f.f.s.d.o.a.72943 жыл бұрын
@@tomstech4390 Just beware the power bill. I used to run Seti@Home, then Boinc aggressively in my business. It was fun. Then I came to appreciate the effect on the power bill.
@steemlenn87973 жыл бұрын
@@tomstech4390 afaik enigma@home is still running? Even if not there are many math projects on the BOINC network - or other stuff. Like nedicine research. You can even get paid in cryptocoins if you use Gridcoin (for most of those projects).
@justincase5228 Жыл бұрын
A particular collection of jumpers in the front of the machine would result in a characteristic collection of letter-rings: A->W->Z, B->X->Y->E->R, etc. This was one of the contributions of the Poles, they delivered this strategy to the Brits right before Poland was invaded. You could analyze a new day's message like this and hack the jumper settings. This then allowed Turing and team to just focus on the rotor combinations and using the German crib WETTER ("weather") which would appear in the first message of the day at a particular offset.
@sssveny3 жыл бұрын
Video’s about mike programming for fun are always gold
@delzabrown3 жыл бұрын
I have no idea how I didn't know this channel existed even though I've been subscribes to numberphile for 3+ years
@alexrossouw77023 жыл бұрын
Enigma machine: "zmnag ttygt lmrus cd!" Alan Turing: "fkxs."
@temkin92983 жыл бұрын
Is that possible to decrypte or not?
@EddiePedalo3 жыл бұрын
You just explained how to crack the enigma code, in under 20 minutes, to me, who failed GCSE maths, and I understood all of it. That is more impressive than cracking the code. Bravo.
@boredincan3 жыл бұрын
The Polish then the British mathematicians that cracked Enigma are some of the most amazing thinkers of our time. I got lost during this video, but I understood enough to be very impressed. This is the best example of "standing on the shoulders of giants". Awesome all around.
@nirfz2 жыл бұрын
I know that the polish cracked the code, but i don't know more about it, but while the british mathematicians around Mr. Turing were impressive, they still had the advantage of captured enigmas and captured documents of which rotors to use when. (Not at the start, but it helped them immensely) Still i think it was impressive that while here in the video he knew how an enigma machine works and could use his own language, it still took longer than i expected. Now imagine, not knowing how it works (the rotors and plugs and the turning) as well as having to decipher a foreign language. (And then using the Navy version with 6 rotors)
@jishcatg3 жыл бұрын
This reminds me of the movie trope where some malicious program is trying to crack an encryption key and it gets 1 character of the key at a time to progressively find the whole key. I remember this at the end of "War Games" but I think I've seen it many times where "hackers" are trying to infiltrate a system.
@mitchellfolbe87293 жыл бұрын
And some actor has to shout out, "It has 3 symbols.", "It has 4 symbols. Two more and we're doomed!", etc. with ever greater urgency
@kentix4172 жыл бұрын
That actually didn't happen in War Games. It wasn't cracking one key, it was finding ten different keys, one at a time. It didn't really explain how it was doing that, if I remember correctly.
@Muhahahahaz Жыл бұрын
Ikr? I’m always like… That’s not how encryption works! But apparently it did a long time ago 😅
@esmeecampbell7396 Жыл бұрын
@@kentix417worryingly the nuclear codes at one point actually was "0000 0000" (because they wanted it to be memorable in an emergency 😂) so the computer would have probably got it on its first try...
@ryhol5417 Жыл бұрын
The history of codebreakers, and the skill. It’s amazing. Love the video
@mceajc3 жыл бұрын
I now have a slightly better understanding of exactly what Colossus was doing - statistical analysis of cracked code in order to better guess the settings. My admiration of those mathematicians, engineers, linguists and logicians only ever grows.
@paulwomack58663 жыл бұрын
Colussus was used against Tunny, not Enigma. Enigma cracking was implemented by Turing's Bombe.
@mceajc3 жыл бұрын
@@paulwomack5866 where Tunny = the intercepted code from a Lorentz cipher machine. Highly recommend anyone go to the Bletchley museum of they are in the area. Sadly I went when the computing museum was closed, but the working Colossus machine was whirring about. Superbly knowledgeable your guides, but now I see some of the attacks that can be used, the actual working their behind it makes so much sense.
@adamsbja3 жыл бұрын
If I remember right what Bombe was doing was plaintext decryption rather than statistical. "Okay, we have a large number of possible combinations, but which ones can deliver the plaintext we think it starts with and not throw any errors down the line?" Then that much smaller subset of combinations would be tested with other analysis and against other messages (remember that they wouldn't change the code for each message so if you cracked one you cracked them all until the code cycled). I don't know if they used the computer for that or went back to doing it by hand once they had a workable subset.
@MrGoatflakes3 жыл бұрын
@@paulwomack5866 as much as I admire Turing, he did not invent the bombe, the Polish did.
@paulwomack58663 жыл бұрын
@@MrGoatflakes The Polish invented the bomba, the device used at Blethchley was a more advanced development by Turing and Welch, using the bomba as a basis
@securatyyy3 жыл бұрын
Everyone be really nice to this guy cause he would make a great supervillain.
@bokamosokelopang16943 жыл бұрын
Dfn
@AceDeclan3 жыл бұрын
Why?
@crusaderanimation69673 жыл бұрын
@@AceDeclan Because he seem to be nice and smart so you wouldn't know he is villain until end of movie.
@RamansSon2 жыл бұрын
@@crusaderanimation6967 because he has a snake pet and the only people who has snake pet are animal lovers or serial killer
@youtubevanced49003 жыл бұрын
We always hear about how brilliant Turing and his team were because they were able to crack the code. I'd love to see something about the dude that invented it. Must of been just as clever to come up with the machine.
@vksasdgaming94723 жыл бұрын
Arthur Scherbius was his name. Machine was patented 1928 and was commercial system. Of course that was its first version.
@kreiseltower3 жыл бұрын
@@vksasdgaming9472 I don't know too much about this. But I assume that you could just take the basic idea and make it arbitrarily more complicated by adding more rotors, plugs etc. that it easily could have been made unsolvable.
@vksasdgaming94723 жыл бұрын
@@kreiseltower New plugs and rotors were method to make encryption more complex. In practice fact that military communications follows protocol made it easier. If every message begins with or includes known expression it is easier to break. Informally worded messages might have been unsolvable as there simply was no way to guess what there was being said.
@MrSb1923 жыл бұрын
I had actually implemented the Enigma as well as the Turing Welchman Bombe 2 years ago for a cryptography project in college. Java based. It was fun and frustrating. But I've forgotten mostly how the bombe worked...
@melkiorwiseman52342 жыл бұрын
My understanding is that it was an electro-mechanical dedicated computer which tried to "brute force" the encryption key by looking for a recognised sequence of characters in its output. It was made out of dozens of chained telephone-exchange style "uniselectors" which each had 26 positions.
@luisfiliperosa75113 жыл бұрын
Every video with Dr Mike Pound is absolute bliss. Thanks mate.
@kuhluhOG3 жыл бұрын
If you think about the fact that they made these things ~80 years ago, purely mechanical, carry-able and operateable by an average person, it's kinda incredible. Not just that, but there are also 3 things which REALLY helped them to crack it and it was still hard: - they sold a (dumbed down) version before the war commercially - they needed to captured one - after they added more wheels (at some point they kinda noticed and it basically broke the decryption for some time) they needed to capture one again
@gcewing3 жыл бұрын
That's another thing that's better about modern ciphers. They're still hard to crack even if the enemy has full knowledge of the algorithm. The only thing that needs to be kept secret is the key.
@kilijanek3 жыл бұрын
Well, not quite. Commercial version was simplified, had less rotors and few minor differences. Enigma was cracked in 1933 by Polish mathematicians (French declared it impossible to break, British gave up independent work on breaking encryption and relayed on work of Polish Cipher Bearau). It wasn't decoded in real time, but with few hours/days delay - using Zygalski sheets, by hand. When Germany added more rotors, there was a case, when they sent by regular post device to embassy in Warsaw. Thanks to postal service workers (who delayed delivery from Friday to Monday), Poles got like 24h to study new design. What is worth mentioning: knowledge how Enigma is operating is not much of a help to break encryption. The most critical part to break encryption was set of rotors, ring settings. Without those it is far more difficult to predict result of encryption.
@kuhluhOG3 жыл бұрын
@@kilijanek that's why I said "dumbed down" version
@kilijanek3 жыл бұрын
@@kuhluhOG I apologize for my reaction, but I hear far too many times that Turing or US Marines were cause Enigma was broken at all (yeah, too many talks with egocentric Americans T_T )... and that is not true. In his genius, Alan Turing automated and improved process of decryption of Enigma - which is a great achievement itself. Breaking Enigma predates work done by Turing almost for a decade. Aaaaand ofc, US did almost nothing besides using decrypted messages :D
@kuhluhOG3 жыл бұрын
@@kilijanek well, the US also built more of the decryption machines, but yeah, the US didn't do anything more
@baldeepbirak3 жыл бұрын
Great explanation of the process involved. Shows how hard it was back in the day.
@BillAnt Жыл бұрын
Indeed, and it was all done with mechanical wheels, yet it was and still is pretty effective if done properly.
@samuelweller33943 жыл бұрын
"Now some people say that there's no way of doing integer factorisation in polynomial time .. but actually ... I've implemented that as well"
@fischerhansen56473 жыл бұрын
Hahaha :) Yeah, halfway through all his implementations I started to wonder where he got all the time and motivation.
@TomGalonska3 жыл бұрын
I'd listen to Mike Pound talk about anything CS related. But Mike talking about Enigma: Instant click!
@OElitecorp3 жыл бұрын
I wrote my undergraduate dissertation on ciphertext only cryptanalysis of the enigma machine. Wrote a tool in Java to perform it too. Was a really fun project, such interesting history - helped living in Bletchley too!
@DIREWOLFx753 жыл бұрын
"this isn't something one does by hand right, not quickly" I'll give you one name: Arne Beurling. On his own, without any computation assist, without access to any hardware ( unlike Bletchley park, which had a copy of the early Enigma that was brought out from Poland ), he cracked the Geheimschreiber, which was roughly the Enigma for teleprinters, in 2 weeks.
@stephaniesadie8323 жыл бұрын
This is true, but to be fair the identicle feat was later replicated by Bill Tutte at Bletchley Park with the Lorenz teleprinter device
@YAZlakhdar3 жыл бұрын
Follow up video in 10 years: "Cracking Enigma in 30 milliseconds using brute force on a Quantum Computer" Edit: turns out I was probably too conservative, not 30 sec but just a fraction of a second.
@DesertCookie3 жыл бұрын
More like one millisecond.
@YAZlakhdar3 жыл бұрын
@@DesertCookie hopefully 🤗 I'd already be impressed with solving 150,000,000,000,000 combinations in 30 sec, which means 5 trillion combinations per sec... but maybe a 3000 qubits trapped ion quantum computer with no errors could do much better 🤷🏻♂️ tbh I have no idea.
@draygoes3 жыл бұрын
@@YAZlakhdar How weird is it that "with no errors" was the first part of that sentence that didn't register as somehow possible one day?
@YAZlakhdar3 жыл бұрын
@@draygoes actually very low error rates are already achieved in some Trapped ion QCs with up to 32 fully connected qubits... and we're only in 2021! Imagine what will be achieved in 10-20 years, not to mention further down the line... Think about all the things that people in the 1950's would have deemed impossible, which are now possible or even plain boring for us. I'm sure they'll figure it out ;)
@YAZlakhdar3 жыл бұрын
@@DesertCookie actually after looking up the processing power of current state-of-the-art supercomputer, and given the nature of quantum computers, I agree with you that it should be much faster than 30 sec... potentially even a millisecond. Crazy
@january1may3 жыл бұрын
Sounds like Enigma decryption is the kind of thing where an evolutionary/genetic algorithm would work _really_ well. I wonder if anyone had tried that yet - it has to be an interesting experiment!
@gschadalavada8980 Жыл бұрын
Hi I’m curious, what are those algorithms you’ve mentioned?
@marcelreiter181 Жыл бұрын
@@gschadalavada8980 Usually you start with a bunch of algorithms which are just guessing. However, some will guess better than others. Keep the better ones, mutate their guesses (automatically) a little and repeat, until you have one you're happy with. Just youtube them, there's lots of really cool videos on them :)
@jjoganic Жыл бұрын
In effect, he is doing precisely that by hand. Notice that he mentioned fitness functions specifically. Whereas the GA would be evaluating the entire solution space starting from a random draw and fiddling with the details, the presenter has chosen to stage the work such that he can evaluate one entire domain comprehensively before moving on to the next one. You could do that with a GA as well, and in my experience, it would converge to the proper solution faster than if you did the whole solution in one pass.
@ToyotaCharlie3 жыл бұрын
The automatically generated subtitles are killing me 😂 "churning bombs" and "knitting machines" 🙈
@PiezPiedPy3 жыл бұрын
The way Alan was treated at the time was absolutely disgusting, especially after what he had done.
@jag19633 жыл бұрын
Britains most shameful hour for sure.
@evilcanuck3 жыл бұрын
@@jag1963 i don't know owning slaves and the genocide of the indigenous peoples of the Americas is pretty up there
@tomx6413 жыл бұрын
@@evilcanuck Those things were done by people who live in the Americas, not Britain.
@evilcanuck3 жыл бұрын
@@tomx641 who came from Britain
@ComicGladiator3 жыл бұрын
@@evilcanuck Are you self-hating, or do you come from people without sin?
@DumblyDorr3 жыл бұрын
Awesome video! Love getting that kind of accessible explanation :D ... Also, tiny PSA: „Zuse“ is pronounced „tsoo-suh“, not „Zeus“ ;)
@kiwidiesel Жыл бұрын
I still feel just as dumb after watching this as I did before hand, however it was very interesting.
@DasHemdchen Жыл бұрын
He doesn‘t go into details such as how to calculate the IoC, the number of possibilities etc., and how he came to know of the rotor properties (which input generates which output letter) and the notches. Statistical language analysis seems to be the key to solve crypto.
@victoryfirst28783 жыл бұрын
This has to be the best explanation of the Enigma machine I have seen so far. Well done fella.
@Eagle06003 жыл бұрын
At 10:47, when you say 26×3, surely you mean 26^3, since each rotor can individually be in one of 26 positions?
@merrymonarch3 жыл бұрын
The number was a colossal, so yes
@stargazer76443 жыл бұрын
@@merrymonarch Before the introduction of the plug board, there were only 1,054,560 combinations on the original machines. Hardly colossal. It was the addition of the plug board on the military machines that ran it up to 1.5*10^14 combinations.
@merrymonarch3 жыл бұрын
@@stargazer7644 fair point. Collosal is subjective. You're right about the plug board too. I think I read somewhere that if they'd added an extra rota it would have been too much for the computers they had at Bletchley
@stanrogers56133 жыл бұрын
That is the total number of combinations, yes - but we can "break" one wheel at a time, so we don't need to try all of the combinations. The number of tests required is just 26 per wheel, so 23×3, not 23^3.
@madlad2553 жыл бұрын
1:05 Speaker: "Enigma machine" Subtitles: "Knitting machine" Damn, why are we trying to crack a knitting machine?
@Nekuzir3 жыл бұрын
Fun fact, stitch patterns in sewing machines used punch card programming before computers existed
@madlad2553 жыл бұрын
@@Nekuzir Damn, I didn't know that, thanks for the fact!
@andrewgoss16823 жыл бұрын
Gram gram been spending too much time making sweaters
@NaviYT3 жыл бұрын
Thank you, I’ve been waiting for someone to make a video about doing this in modern times, with better computing. Literally perfect!
@motabarjavaid54823 жыл бұрын
Mike is the reason I subscribed to Computerphile. Love the way of his explanation
@gizmostudioshd3 жыл бұрын
I'm not smart enough to understand half of whats going on, but for whatever reason, it fascinates me and gets me hooked, watching the whole thing.
@astropgn3 жыл бұрын
Moral of the story: Use enigma only if you want to encrypt your tweets.
@emoulson3 жыл бұрын
And only really tweets before the character count was doubled
@yosefmacgruber19203 жыл бұрын
Twitter is pretty much pointless now without President Trump's tweets.
@gayMath3 жыл бұрын
@@yosefmacgruber1920 ???
@yosefmacgruber19203 жыл бұрын
@@gayMath Twitter and FB should be banned for their evil censorship. Or seized and turned into a utility. Did you not know about Twitter censoring truth-tellers, President Trump, and tampering with elections? Twitter has already been banned in a few countries due to that.
@papakaruuu61193 жыл бұрын
@@yosefmacgruber1920 wtf are you smoking i want some
@Iris-jw3ci3 жыл бұрын
Everyone always forgets Marian rejewski who cracked the enigma BEFORE ALLEN TURING
@NuclearCraftMod3 жыл бұрын
Great idea for a video! I had been thinking about this in the past, but wasn't actually sure how to test it or even categorise the strengths or weaknesses of Enigma in modern cryptographic terms.
@dowskivisionmagicaloracle85933 жыл бұрын
Videos like this are why I love the computerphile channel!
@T33K3SS3LCH3N3 жыл бұрын
"Let's look very briefly at what a knitting machine is" - thanks subtitles.
@baomao72433 жыл бұрын
The “sequential” cracking of PINs or codes is always shown in spy thriller movies. It always bugged me because I thought, “Get real. Is there ANY security system that actually allows that?” Now I know !! GREAT video explanation. TGFH* . (* Thank Goodness For Hashing!)
@ynotnilknarf393 жыл бұрын
I used to visit an elderly chap who worked for BTM in Letchworth right at the start of WWII as a design engineer (possibly not the correct job description), he knew 'Doc' Keen and Edward Travis for sure. He lived here all his life, went on to be a senior manager for ICL. All we have left of 1/1 is in the name of two of the residential streets on the old site where the Bombes were made, that being Pascal Way and Tabbs Close. He was still very guarded about his work there right up to his death only a few years ago at the age of 98, absolte gent he was and played down his efforts.
@KuittheGeek3 жыл бұрын
I'm definitely going to start using the phrase, "How English is this?" when correcting grammar. I love the concept of how close is something to a language and just referring to it as "How language is this?". This was a great video. Very informative.
@oooBASTIooo3 жыл бұрын
This has nothing to do with grammar. The Index of coincidence is obviously all about how the words are written, i.e. the syntax.
@jeffdege4786 Жыл бұрын
The plug board is static, as in it doesn't change from one character to the next. The result is that the plug board applies a simple substitution to the input and the output of the rotors. Which means that they have no effect on the IoC.
@schmetterling4477 Жыл бұрын
Yes, it's just obfuscation and therefor not secure, even though 13! gives approx. 6 billion plugboard combinations. That sounds a lot and probably provides a false sense of security to the occasional user. I am pretty sure, however, that the designers were aware of the flaw.
@RetroRobotRadio3 жыл бұрын
I once had an Enigma simulator program for my Commodore 64. This wasn't a program meant to break an Enugma code, but it did simulate and Enigma machine. It came on a floppy disk that was part of a magazine subscription to Loadstar.
@NiekNooijens3 жыл бұрын
I'm just wondering. Can you brute-force all combinations fast enough in parallel using a GPU? Cause you're basically doing the same program (decrypting using a random setting, then calculating the output's "quality") millions of times. So an Nvidia 3090 has 10496CUDA-cores and can boost up to 1.7GHz. Lets assume you can do a bruteforce attempt per 4 clock-cycles per-cuda-core. then you're already guessing 4,460,800,000,000 guesses each second. I think you could easily try every combination in under a day...
@duffman18 Жыл бұрын
He's said in other videos that they do indeed use high end graphics cards for this, in fact they have tons of them all working at the same time, together, in a big server. Dunno how you do that, get graphics cards to link with each other like that. But yeah he's said that's what they do, at that university. And so different classes and groups and academics have to book a time slot when they can use the dozens of graphics cards in parallel to brute force something or to use a more sophisticated method to crack a code or to model a complex system like the weather, or anything like that that academics do. The physicists use them a lot too, to model systems like perhaps individual atoms and things like that. Which makes a lot of sense, considering they computer science was originally a branch of physics, and remained there way for decades until the 70s and 80s where computer science began being seen as a separate subject altogether. But yeah, it's still linked heavily with physics.
@thomaswalder480811 ай бұрын
@@duffman18 "Dunno how you do that, get graphics cards to link with each other like that. " They not have to be linked if brute force is used. Each graphic card can work on a distinct subrange of the possible settings without the need to communicate with other graphic cards
@hikaru-live3 жыл бұрын
I think there are still a few Enigma messages left undecrypted out there. This approach may be used, with plugboard implemented, to crack those and give a more complete image of WW2.
@keziahradley58972 жыл бұрын
If you find any give 'em to me xD I built my own version of this, might be fun :)
@LakadMatatag27022 жыл бұрын
All of the undecrypted Enigma messages have been decoded.
@ajrhodes32623 жыл бұрын
I’ve actually used an enigma machine, not a kit, a real one!! The NSA brought one to a cyber camp I did when I was a teenager!! It was actually really cool!! Cheers!!
@michaelsommers23563 жыл бұрын
They have one on display that you can type on in the National Cryptologic Museum outside DC.
@ajrhodes32623 жыл бұрын
@@michaelsommers2356 yeah, they had a pretty cool one 🙂🙂
@Robstafarian3 жыл бұрын
Much as I love computers and cryptography, I feel quite strongly that the NSA should be kept away from children.
@pepesworld29953 жыл бұрын
man i'm really enjoying this. its great how the hiezenburg uncertainty principal pops up everywhere: short message means you dont have enough information on the frequencies of letters.
@maddogmorgan1 Жыл бұрын
When I was Signals Corps back in the dim dark days we used OTLP's then encrypted that for transmission don't think all the computers in the world will help break that.
@nicolasmiller19153 жыл бұрын
If you find this interesting, give “The Code Book” by Simon Singh a read.
@aceroadholder21853 жыл бұрын
As an example of Enigma being difficult to break if the message is no longer than 50-60 characters there are still U-Boat messages that have never been broken. A short message along with the Kreigsmarine Enigma machines that added an additional rotor are very difficult to decipher.
@thepuzzlebox66203 жыл бұрын
There was nothing preventing them from manually scrambling their messages on top of the Enigma encoding. All it would take is a manual alphabet switching system that changes based on the number of messages that have been sent. Turing could never have accounted for it.
@stanrogers56133 жыл бұрын
Part of the problem with U-boat Enigma messages is that they weren't merely enciphered, they were also encoded. That is, the original message won't necessarily contain _any_ plaintext, so there's no way to know when you've deciphered it.
@markwilliams56543 жыл бұрын
how ironic they sent Alan to prison and now he's on a bank note
@Snagabott3 жыл бұрын
I wonder which ones of our moral panics will seem unjust to viewers 70 years hence.
@ComicalFlask3 жыл бұрын
@@Snagabott - Factory farming
@gianluca.g3 жыл бұрын
@@Snagabott Assange case
@memeier98943 жыл бұрын
Too many to name...
@kgb41503 жыл бұрын
@@Snagabott Social justice, probably
@mitch338410 ай бұрын
I haven't seen that printer paper in a loooong time.. that brings back some very warm, fuzzy memories.
@diegosolis96813 жыл бұрын
This can could narrate paint drying and still make it exciting! What a talent for teaching!
@theadamtron3 жыл бұрын
I think whats interesting about cracking enigma at bletchley park was predicting the content that would be sent such as weather reports that would end with the same text or humans always using the same settings/keys. This allowed them to build up a picture of the settings for that day.
@mschorer3 жыл бұрын
The enigma is a very clever piece of gear. I programmed one for the iPad and for that had to dive deep into the mechanics of that maschine. The weak point was the switch board which the Germans put in to make it more secure. The contrary was the case.
@lombardind3 жыл бұрын
Every time he finishes a sentence he adjusts his right shoulder. I can't stop watching that.
@djmips3 жыл бұрын
haha, it's his energy, he can't wait to stop talking and start writing / coding.
@peter_piper3 жыл бұрын
When he was talking about letter frequency in short messages I kept thinking of Doyles "The Dancing Men" !
@HackCart2 жыл бұрын
Why nobody is honouring scientists who made Enigma. What a brilliance it was.
@xoblyxanier3 жыл бұрын
That seems to be the most uncomfortable chair ever! Great video though ;)
@drskelebone3 жыл бұрын
It'd be great to do a follow up talking about how to correct things. If you know "JBROPOSE" should be "IPROPOSE", can you feed that back through the system to correct the solution more? I'm wondering about how that error propagates to later strings, where the true words aren't as obvious.
@whiteraven21493 жыл бұрын
I could be wrong, but just swapping the plugboard configuration might help. So in your example just connect I to J and B to P
@thecakeredux3 жыл бұрын
He mentioned that, knowing the plain text, he can put it in and it "pretty much breaks through it right away". Now what he doesn't specify is if the entire plain text needs to be known or if pieces are enough, but I suspect pieces would be enough already. Knowing more and more actually present letters of the message improves the accuracy of the statistical methods.
@vdinh1433 жыл бұрын
@@thecakeredux knowing pieces of the plaintext is enough because the entire encryption rule applies both to that segment of plaintext as well as the rest of it. Knowing the plaintext does break Enigma, and how you come to know that plaintext (be it espionage or random struck of luck) is irrelevant.
@mrfrenzy.3 жыл бұрын
You just need to go through the rotor settings again with the correct plugboard.
@michaelarmer2563 жыл бұрын
i suspsect leaving the computer to it these days if the code is all there having a human going in and checking it and saying no that must be that might be slower but maybe at that first point a human or an ai might do a better job of guessing the correct text than running the scrip to find the actual correct words.
@starlite5283 жыл бұрын
The way you're doing this decryption seem familiar. It reminds me of the WOPR computer from the movie Wargames breaking the nuclear codes one character at a time.
@stephaniesadie8323 жыл бұрын
That ofc was nonsense, because it was only a 12? character code and it wasnt a recognisable language word, it was a random word, hence it couldnt be guessed one letter at a time.
@AustralianMurderTurtle2 жыл бұрын
I appreciate how the subtitles declared it a knitting machine.
@Nightcorehardy3 жыл бұрын
The code bullet video we've been waiting for.....
@lucidmoses3 жыл бұрын
This episode was fantastic. I wonder if using a modern GPU would be better. Each core doing a set and testing them.
@danielstephenson75583 жыл бұрын
Great video. Would love a tutorial to recreate the Enigma Machine in code. Code Bullet started one but never finished it.
@jarodbaker23283 жыл бұрын
mans just explained the weakness of enigma 180 times before getting to the point.
@JonTheGeek2 жыл бұрын
Alan Turing would be proud. I'm sad I missed this being uploaded on my birthday! I was probably in blechly for this.
@ju2705s2 жыл бұрын
How difficult would it be for 80 years and without to know the logical behavier of the enigma and the fact, that the comfig can change at any time and you have not the time to analyse. I am deeply impressed of this technology.
@RedwoodRhiadra2 жыл бұрын
Fortunately, they knew how the Enigma *worked* - there was a civilian version available commercially before the war, and they captured plenty of the military machines in the early months, since essentially every unit had one. So it was mostly a matter of figuring out how to break the daily settings quickly. The Lorentz machine (aka the Tunny cipher), though, was only used between secure high command centers, and none of them were captured or even seen by the Allies until very late in the war or afterwards. *That* one they had to work out from first principles and statistical analysis (and a mistake by one of the operators sending *almost* the same message twice with the same key.) And then they had to build Colossus to break the changing keys.
@darthollie3 жыл бұрын
New drinking game - every time he mentions the fact that getting it slightly right yields somewhat comprehensible results instead of random nonsense, you drink
@guyh34033 жыл бұрын
I treid tooo listn bt gott ddrnk...
@sharkuc3 жыл бұрын
@@guyh3403 Looks like you've almost got your rotor/plugboard settings right. Keep going.
@djmips3 жыл бұрын
You did learn that bit though didn't you. XD
@yorgle3 жыл бұрын
Huh.... I never knew Enigma had the property where if it was mostly right, you got a mostly right output. neat!
@patrickpaganini3 жыл бұрын
Yes, I still don't quite understand that ... I would have thought it would be right or wrong. Even with plug board in correct place, I would have thought that rotors in wrong place would turn out garbage.
@paulwomack58663 жыл бұрын
@@patrickpaganini It's not readable (so it is "garbage" from that POV), but it has improved/detectable statistical properties
@patrickpaganini3 жыл бұрын
@@paulwomack5866 Did each rotor only transform a few letters? If each rotor transformed every letter, I don't see how partially correct rotor positions would have helped the statistical analysis.
@patrickpaganini3 жыл бұрын
@@paulwomack5866 Ahh I get it now. Every wheel placement and every position is brute forced. The message decrypted with the correct wheel settings will actually have some correct letters in the output, since the plugboard doesn't alter all letters. If the plugboard had the ability to transform all letters, this attach would not be possible.
@gwaptiva3 жыл бұрын
wasn't the 3-rotor enigma cracked by the Polish?
@michaelsommers23563 жыл бұрын
Yes, in 1932. But a change the Germans made in 1938 rendered their procedure ineffective.
@wernerviehhauser943 жыл бұрын
Look up Marian Rejewski
@jukio022 жыл бұрын
It's crazy how easy it is to crack enigma is today. I did a few codes already today, it was so simple.
@leemoore52122 жыл бұрын
How easy would it be if you didn't know the rotor wirings ? ie same machine, same fixed reflector, 10 plugs, 5 rotors pick 3, but you don't know the internal wiring of the rotors ? How would you go about it ?
@evinchester78203 жыл бұрын
One of the things at helped break the codes, was that there was a station that every day, had nothing to report. So their message was, "Station 5. Nothing to report". That became the "Key" to cracking the code everyday. Same message. No change. They could then figure out the placement of that day of the rotor positions. Then one day, they could not crack the code. What had happened? it took them a bit but they then realized that they had added a rotor or two. That caused them to have to rethink the everyday same message. But the soon cracked it and were back in business. Where it started to diminish in usability was when the Germans ended up back inside Germany. They stopped using the machine and just used the telephone. But it did take a couple of years off the war in Europe.