Probably everyone has heard about the German Enigma cipher machine. Not least due to the fact that writers and screenwriters love her story, and the father of the modern computer, Alan Turing, is involved in breaking her cipher.

During the war, he, like many other mathematicians (as well as linguists, Egyptologists, chess players, and even compilers of crossword puzzles), worked at the so-called Government School of Codes and Ciphers, located on the Bletchley Park estate in England and was the operational and intellectual center of work on intercept and decrypt enemy communications.

Enigma cipher machine

In a nutshell, the story goes something like this: Enigma was the most advanced encryption machine at that time, which made it possible to protect the communications of the fleet and the army of Nazi Germany in such a way that hacking seemed an impossible task. However, Polish and British cryptanalysts managed to find a way to decipher the Enigma messages, which gave the coalition a significant advantage in the war, according to Churchill and Eisenhower - decisive.

You can learn more about how Enigma worked, and in this video you can even see how it works:

In the very general view the scheme looks something like this: when the operator, while typing a message, pressed a key with a letter on the keyboard, the signal passed through the electrical circuit formed by several rotors with contacts, and another letter lit up on the panel with letters, which had to be included in the encrypted message. The rotors turned after each input of each character, and the next time the same letter was coded for a different one.

The creation of the Bomba cryptanalytic machine, which made it possible to put the hacking of Enigma messages on stream, was the result of not only scientific and analytical work, but also the mistakes of the German side

The creation of the Bomba cryptanalytic machine, which made it possible to put the hacking of Enigma messages on stream, was the result of a combination of not only colossal scientific and analytical work, but also the mistakes of the German side in working with Enigma, the capture of various copies of the machine and cipher pads, and also special operations that allowed cryptanalysts to work with messages whose source text contained known words.

What is the instructive story of "Enigma" for us today? The machine itself is no longer of practical interest from the point of view of modern ideas about information security, however, many of the lessons of the history of Enigma are still relevant today:

1. Do not rely on your own technological superiority. The German side had every reason to consider the Enigma absolutely reliable, but the Allies created their own machine, which had sufficient "power" to sort through in a short time possible options"Enigma" settings in search of the correct and decipher messages. It was a technological leap that was hard to predict. Today we know quite accurately what the “Bomb” is called for all modern cryptography: .

2. Sometimes it is difficult to guess what exactly will be the “weak link” in a well-thought-out information protection scheme. The impossibility of matching the letter in the original message and its encrypted version may seem like an insignificant detail or even the right decision, but this is what helped to set up a machine rejection of inapplicable key options - you just had to discard all options that gave at least one letter match in the original and encrypted versions.

3. Never be lazy to complicate the key. For most users, this tip comes first. At one time, the addition of an extra rotor to the naval modification of the Enigma paralyzed the work of cryptanalysts for half a year, and it was possible to start decrypting the messages of the improved machine only after capturing its copy from a sunken submarine. As you can easily see with our password checking service, just one extra character can increase the time it takes to guess your password by an order of magnitude.

4. The human factor plays a huge role even in high-tech systems. It is not known whether Enigma would have been able to crack if it were not for various minor errors and indulgences that its operators allowed themselves. Apparently, the persistence with which German command was looking for other explanations for the unexpected insight of the allies, instead of admitting the thought of compromising the Enigma.

5. Information superiority is a double-edged weapon. Almost the most difficult task for the Allied command was to use the data obtained from the decryption of Enigma messages in such a way as not to reveal to the enemy the very fact of access to encrypted messages. Sometimes this was solved with the help of special operations to create alternative explanations for success (flight of a reconnaissance aircraft before attacking a convoy, leaking information about an allegedly valuable source of intelligence data), sometimes it was necessary to simply abandon some steps (it was necessary to allow the bombing of Coventry by German aircraft, as if nothing was known about its preparation).

We improve our technologies, increase computing power day by day, but the basic principles of working with information and protecting it change much more slowly, and the past still carries many useful lessons.

Wars are fought with weapons. However, only weapons are not enough. Whoever has the information wins! You need to get someone else's information, and protect your own. This special kind the struggle is ongoing.

The ancient Egyptians protected their secrets with hieroglyphic ciphers, the Romans with the Caesar cipher, the Venetians with Alberti cipher discs. With the development of technology, the flow of information increased, and manual encryption became a serious burden, and did not provide proper reliability. There were encryption machines. The most famous among them is Enigma, which became widespread in Nazi Germany. In fact, Enigma is a whole family of 60 electromechanical rotary encryption devices that worked in the first half of the 20th century in commercial structures, armies and services in many countries. A number of books and films such as the Hollywood blockbuster Enigma introduced us to the German military Enigma (Enigma Wehrmacht). She has a bad reputation, because English cryptanalysts were able to read her messages, and the Nazis got it sideways.

In this story there were brilliant ideas, unique technological achievements, the most complex military operations, neglect human lives, courage, betrayal. She showed how the ability to anticipate the actions of the enemy neutralizes the brute force of the weapon.

The appearance of "Mystery"

In 1917, the Dutchman Koch patented an electric rotary encryption device to protect commercial information. In 1918, the German Sherbius bought this patent, modified it and built the Enigma cipher machine (from the Greek ανιγμα - “mystery”). Having created the company Chiffriermaschinen AG, the businessman from Berlin began to raise demand for his not yet secret novelty, exhibiting it in 1923 at the international postal congress in Bern, a year later - in Stockholm. The "riddle" was advertised by the German press, radio, the Austrian Institute of Criminology, but there were almost no people who wanted to buy it - it was a little expensive. Piece "Enigma" went to Sweden, the Netherlands, Japan, Italy, Spain, USA. In 1924, the British took the car, registered it with their patent office, and their cryptographic service (Room 40) looked into its insides.

And they are simple. This is a kind of electric typewriter: a keyboard with 26 letters of the Latin alphabet, a register for 26 light bulbs with letters, a patch panel, a 4.5 volt battery, a coding system in the form of rotors with encryption disks (3-4 working plus 0-8 replaceable). The rotors are interconnected like gears in an odometer (car odometer). But here, unlike the odometer, the rightmost disk, when entering a letter, rotates by a variable step, the value of which is set according to the schedule. Having made a full turn, it transfers the turn by a step to the next rotor, etc. The right disk is the fastest, and the gear ratio of the gearbox is variable, i.e. the switching scheme changes with each letter entered (the same letter is encrypted in differently). The rotors are marked with an alphabet, which allows you to change their initial setting according to predetermined rules. The highlight of Enigma is a reflector, a statically fixed rotor, which, having received a signal from rotating rotors, sends it back and in a 3-rotor machine the signal is converted 7 times.
The operator works like this: he presses the key with the next letter of the encrypted message - the lamp corresponding (only at the moment!) To this letter lights up on the register - the operator, seeing the letter on the lamp, enters it into the encryption text. He does not need to understand the encryption process, it is done completely automatically. The output is complete abracadabra, which goes away as a radiogram to the addressee. It can be read only by "one of your own" who has a synchronously tuned "Enigma", i.e. who knows exactly which rotors and in what order are used for encryption; his machine decrypts the message automatically, too, in reverse order.
The "riddle" dramatically accelerated the communication process, eliminating the use of tables, cipher notebooks, transcoding logs, long hours of painstaking work, and inevitable errors.
From the point of view of mathematics, such encryption is the result of permutations that cannot be traced without knowing the starting position of the rotors. The encryption function E of the simplest 3-rotor Enigma is expressed by the formula E = P (pi Rp-i) (pj Mp-j) (pk Lp-k)U (pk L-1 p-k) (pj M-1 p-j) ( pi R-1 p-i) P-1, where P is the plugboard, U is the reflector, L, M, R are the actions of the three rotors, the middle and left rotors are j and k rotations of M and L. After each key press, the transformation changes .
Enigma was quite simple and reliable for its time. Her appearance puzzled none of Germany's possible adversaries, except for Polish intelligence. The German military and the Foreign Ministry, ignoring the novelty, continued to work manually (ADFGX method, code books).
And then in 1923 the British Admiralty released The History of the First World War, telling the whole world about their advantage in that war thanks to breaking the German code. In 1914, the Russians, having sunk the German cruiser Magdeburg, fished out the corpse of an officer clutching a magazine with a naval code to his chest. The discovery was shared with an ally England.

The German military elite, having experienced shock and analyzed the course of hostilities after that incident, concluded that such a fatal leak of information should no longer be allowed. "Enigma" immediately became in demand, massively purchased by the military, disappeared from free sale. And when Hitler started cooking new war, the encryption miracle was included in the mandatory program. Increasing the security of communication, the designers constantly added new elements to the machine. Even in the first 3-rotor model, each letter has 17576 variants (26x26x26). When using 3 of the 5 working rotors in a random order, the number of options is already 1054560. The addition of the 4th working rotor complicates encryption by orders of magnitude; when using interchangeable rotors, the number of options is already measured in the billions. This convinced the German military.

Blitzkrieg gun

Enigma is just one type of electromechanical disk encoder. But here is its mass character ... From 1925 until the end of World War II, about 100 thousand cars were produced.
This is the whole point: the encryption technology of other countries was piecemeal, working in the special services, for behind closed doors. "Enigma" - a blitzkrieg weapon - fought in the field at levels above the division, on board a bomber, ship, submarine; was in every port, on every major railway. station, in every SS brigade, every Gestapo headquarters. Quantity turned into quality. A not too complicated device became a dangerous weapon, and the fight against it was fundamentally more important than the interception of a separate, even very secret, but still not mass correspondence. Compact in comparison with foreign counterparts, the car could be quickly destroyed in case of danger.

The first - Model A - was large, heavy (65x45x35 cm, 50 kg), similar to a cash register. Model B already looked like an ordinary typewriter. The reflector appeared in 1926 on a truly portable Model C (28x34x15 cm, 12 kg). These were commercial devices with encryption without much resistance to hacking, there was no interest in them. It appeared in 1927 with the Model D, which then worked on the railway and in occupied Eastern Europe. In 1928, Enigma G appeared, aka Enigma I, aka Wehrmacht Enigma; having a patch panel, it was distinguished by enhanced cryptographic resistance and worked in the ground forces and the Air Force.
But the first "Enigma" began to use the German Navy. It was a Funkschlüssel C model from 1925. In 1934, the fleet adopted a naval modification of the army vehicle (Funkschlüssel M or M3). The army team used only 3 rotors at that time, and in the M3, for greater safety, it was possible to choose 3 out of 5 rotors. In 1938, 2 more rotors were added to the kit, in 1939, 1 more, so it became possible to choose 3 out of 8 rotors. And in February 1942, the German submarine fleet was equipped with a 4-rotor M4. Portability was preserved: the reflector and the 4th rotor were thinner than usual. Among the massive "Enigma" M4 was the most secure. She had a printer (Schreibmax) as a remote panel in the commander's cabin, and the signalman worked with ciphertext, without access to secret data.
But there was also special-special equipment. Abwehr (military intelligence) used the 4-rotor Enigma G. The level of encryption was so high that other German authorities could not read it. For the sake of portability (27x25x16 cm), Abwehr abandoned the patch panel. As a result, the British managed to break into the protection of the machine, which greatly complicated the work of German agents in Britain. "Enigma T" ("Tirpitz Machine") was created specifically for communication with an ally, Japan. With 8 rotors, reliability was very high, but the machine was hardly used. Based on the M4, the M5 model was developed with a set of 12 rotors (4 working / 8 replaceable). And on the M10 there was a printer for open / closed texts. Both machines had another innovation - a rotor for filling gaps, which greatly increased the reliability of encryption. The Army and Air Force encrypted messages in groups of 5 characters, the Navy - 4 characters each. To complicate the deciphering of intercepts by the enemy, the texts contained no more than 250 characters; long ones were broken into pieces and encrypted with different keys. To increase protection, the text was clogged with "garbage" ("letter salad"). It was planned to rearm all types of troops on the M5 and M10 in the summer of 1945, but time has passed.

"Rejewski's bomb"

So, the neighbors were "blinded" about Germany's military preparations. The activity of the radio communications of the Germans increased many times over, and it became impossible to decipher the intercepts. The Poles were the first to be alarmed. Watching a dangerous neighbor, in February 1926 they suddenly could not read the codes of the German Navy, and since July 1928, the codes of the Reichswehr. It became clear: they switched to machine encryption. On January 29, the Warsaw customs found a “lost” parcel. Berlin's tough request to return it drew attention to the box. There was a commercial "Enigma". Only after studying it was given to the Germans, but this did not help to reveal their tricks, and they already had a reinforced version of the car. Especially for the fight against Enigma, Poland's military intelligence created a "Cipher Bureau" from the best mathematicians who spoke fluent German. They were lucky only after 4 years of marking time. Luck came in the person of an officer of the German Ministry of Defense, "bought" in 1931 by the French. Hans-Thilo Schmidt ("agent Ashe"), responsible for the destruction of obsolete codes of the then 3-rotor Enigma, sold them to the French. Got them and instructions for it. The ruined aristocrat needed money and was offended by his homeland, which did not appreciate his merits in the First World War. French and British intelligence did not show any interest in this data and handed it over to the Polish allies. In 1932, the talented mathematician Marian Rejewski and his team hacked into the miracle machine: "Ashe's documents became manna from heaven: all the doors opened instantly." France supplied the Poles with agent information until the war itself, and they managed to create an Enigma imitator machine, calling it a “bomb” (a popular ice cream variety in Poland). Its core was 6 Enigmas connected to a network, capable of sorting through all 17576 positions of three rotors in 2 hours, i.e. all possible key options. Her strength was enough to open the keys of the Reichswehr and the Air Force, but it was not possible to split the keys of the Navy. "Bombs" were made by AVA Wytwurnia Radiotechniczna (it was she who reproduced the German "Enigma" in 1933 - 70 pieces!). 37 days before the start of World War II, the Poles passed on their knowledge to the allies, giving one “bomb” each. The French, crushed by the Wehrmacht, lost the car, but the British made a more advanced cyclometer machine out of theirs, which became the main tool of the Ultra program. This Enigma counter-program was Britain's best-kept secret. The messages decrypted here were labeled Ultra, which is higher than Top secret.

Bletchley Park: Station X

After the First World War, the British reduced their cryptologists. The war with the Nazis began - and all forces had to be urgently mobilized. In August 1939, a group of code-breaking specialists drove into the Bletchley Park estate 50 miles from London under the guise of a company of hunters. Here, in the decryption center Station X, which was under the personal control of Churchill, all information from radio intercept stations in the UK and beyond converged. The British Tabulating Machines built here the first Turing bomb decryption machine (this was the main British cracker), the core of which was 108 electromagnetic drums. She went through all the options for the cipher key with a known structure of the decrypted message or part of the plaintext. Each drum, rotating at a speed of 120 revolutions per minute, tested 26 letter variants in one complete revolution. During operation, the machine (3.0 x2.1 x0.61 m, weight 1 ton) ticked like a clockwork, which confirmed its name. For the first time in history, the ciphers mass-produced by the machine were solved by the machine itself.


"Enigma" auf U-Boot U-124

To work, it was necessary to know the physical principles of the Enigma to the smallest detail, and the Germans constantly changed it. The British command set the task: by all means to get new copies of the machine. A targeted hunt began. First, on a Junkers shot down in Norway, they took the Enigma-Luftwaffe with a set of keys. The Wehrmacht, smashing France, advanced so quickly that one communications company overtook its own and was captured. The Enigma collection was replenished with the army one. They were dealt with quickly: Wehrmacht and Luftwaffe ciphers began to fall on the table of the British headquarters almost simultaneously with the German one. Desperately needed the most complex - the marine M3. Why? The main front for the British was the sea front. Hitler tried to strangle them with a blockade, blocking the supply of food, raw materials, fuel, equipment, and ammunition to the island country. His weapon was the submarine fleet of the Reich. The group tactics of the “wolf packs” terrified the Anglo-Saxons, their losses were huge. They knew about the existence of the M3: 2 rotors were captured on the U-33 submarine, and instructions for it on the U-13. During a commando raid on the Lofoten Islands (Norway), aboard the German Crab patrol, they captured 2 rotors from the M3 and the keys for February, the Germans managed to drown the car. Moreover, quite by accident it turned out that German non-military ships were sailing in the Atlantic, carrying special communications on board. So, the destroyer of the Royal Navy "Griffin" inspected the supposedly Dutch fishing vessel "Polaris" off the coast of Norway. The crew, which consisted of strong guys, managed to throw two bags overboard, the British caught one of them. There were documents for the encryption device.
In addition, during the war, the international exchange of weather data ceased - and converted "fishermen" went from the Reich to the ocean. They had Enigma on board and settings for every day for 2-3 months, depending on the duration of the voyage. They regularly transmitted the weather, and it was easy to find them. Special operational groups of the Royal Navy came out to intercept the "meteorologists". Fast destroyers literally took the enemy "on the gun." Shooting, they tried not to sink the "German", but to drive his crew into a panic and prevent the destruction of special equipment. On May 7, 1941, the Munich trawler was intercepted, but the radio operator managed to throw the Enigma and the May Keys overboard. But in the captain's safe, they found the keys for June, a short-range cipher book, a weather code log, and a Navy coordinate grid. To conceal the capture, the English press wrote: "Our ships in the battle with the German" Munich "captured its crew, which left the ship, flooding it." Mining helped: the time from intercepting a message to decrypting it was reduced from 11 days to 4 hours! But now the keys expired, new ones were needed.

Captain Lemp's Mistake


Surrender of the German submarine U-110 to the British. May 9, 1941

The main catch was made on May 8, 1941, during the capture of the submarine U-110, Lieutenant Commander Julius Lemp, who attacked convoy OV-318. Having bombed U-110, the escort ships forced her to surface. The captain of the destroyer HMS Bulldog went to ram, but when he saw that the Germans were jumping overboard in a panic, he turned away in time. Entering the half-submerged boat, the boarding party discovered that the crew had not even attempted to destroy the secret communications equipment. At this time, another ship picked up the surviving Germans from the water and locked them in the hold to hide what was happening. It was very important.
On the U-110 they took: a serviceable Enigma M3, a set of rotors, keys for April-June, encryption instructions, radiograms, magazines (personnel, navigation, signal, radio communications), sea charts, minefield diagrams in the North Sea and coast of France, instruction manual for type IXB boats. The booty was compared with the victory in the Battle of Trafalgar, experts called it "a gift from heaven." The awards to the sailors were presented by King George VI himself: “You deserve more, but now I can’t do it” (through the award system, German agents could have come to the fact of the loss of the car). A subscription was taken from everyone, the capture of U-110 was not disclosed until 1958.
The gutted boat was sunk for the sake of secrecy. Captain Lemp is dead. Interrogation of the rest of the Germans revealed that they were unaware of the loss of the secret. Just in case, measures were taken to misinform, with the prisoners they complained and regretted: "It was not possible to land on the boat, it suddenly sank." For the sake of secrecy, they even coded her capture: "Operation Primula." Shocked by his success, the First Sea Lord Pound radioed: “Congratulations from the bottom of my heart. Your flower of rare beauty.
Trophies from the U-110 brought a lot of good. With the latest information, the Bletchley Park burglars began to regularly read communications between Reich U-boat headquarters and boats in the ocean, cracking most of the messages protected by the Hydra cipher. This helped to open other codes of the Navy: “Neptune” (for heavy ships), “Zuid” and “Medusa” (for the Mediterranean Sea), etc. It was possible to defeat the German network of reconnaissance and supply vessels for the submarine fleet (“cash cows” in the Atlantic). ). The operational intelligence center found out the details of the German coastal navigation, mining schemes for coastal waters, the timing of submarine raids, etc. Sea convoys began to bypass the “wolf packs”: from June to August, the “Doenitz wolves” found only 4% of the convoys in the Atlantic, from September to December - 18%. And the Germans, believing that the U-110 had taken their secret into the abyss, did not change the communication system. Admiral Dönitz: "Lemp did his duty and died like a hero." However, after the release of Roskilde's book The Secret Capture in 1959, the hero became in the eyes of German veterans a scoundrel who tarnished his honor: “He did not comply with the order to destroy secret materials! Hundreds of our boats were sunk, thousands of submariners died in vain”, “if he hadn’t died at the hands of the British, we should have shot him.”
And in February 1942, the 4-rotor M4 replaced the 3-rotor M3 on boats. Bletchley Park hit the wall again. It remained to hope for the capture of a new car, which happened on October 30, 1942. On this day, Lieutenant Commander Heidtmann's U-559, northeast of Port Said, was badly damaged by British depth charges. Seeing that the boat was sinking, the crew jumped overboard without destroying the encryption technology. She was found by sailors from the destroyer Petard. As soon as they handed over the prey to the boarding group that came to the rescue, the mangled boat suddenly turned over, and two daredevils (Colin Grazier, Antony Fasson) went with it to a kilometer depth.
The booty was the M4 and the "Short Call Sign Log"/"Short Weather Code" pamphlets, printed with solvent ink on pink blotting paper, which the radio operator must throw into the water at the first sign of danger. It was with their help that on December 13, 1942, the codes were opened, which immediately gave the headquarters accurate data on the positions of 12 German boats. After a 9-month black-out, the reading of ciphergrams began again, which was not interrupted until the end of the war. From now on, the destruction of the "wolf packs" in the Atlantic was only a matter of time.


Immediately after rising from the water, German submariners completely undressed and selected all clothes in order to search for documents of interest to intelligence (for example, the code tables of the Enigma cipher machine).


A whole technology of such operations has been developed. The boat was forced to surface with bombs and started shelling from machine guns so that the Germans, remaining on board, would not start flooding. In the meantime, a boarding party was heading towards it, aiming to look for “something like a typewriter next to the radio station”, “discs with a diameter of 6 inches”, any magazines, books, papers. It was necessary to act quickly, and this was not always possible. Often people died without getting anything new.
In total, the British captured 170 Enigmas, including 3-4 naval M4s. This made it possible to speed up the decryption process. With the simultaneous inclusion of 60 "bombs" (i.e. 60 sets of 108 drums), the search for a solution was reduced from 6 hours to 6 minutes. This already made it possible to respond quickly to revealed information. At the peak of the war, 211 "bombs" worked around the clock, reading up to 3 thousand German ciphers daily. They were served in shifts by 1,675 female operators and 265 mechanics.
When Station X could no longer cope with the huge flow of radio intercepts, some of the work was transferred to the United States. By the spring of 1944, 96 "Turing bombs" were working there, and an entire decryption factory had appeared. In the American model, with its 2000 rpm, respectively, the decryption was 15 times faster. Confrontation with the M4 has become a routine. Actually, this is where the fight against Enigma ended.

Effects

Breaking the Enigma codes provided the Anglo-Saxons with access to almost all the secret information of the Third Reich (all armed forces, SS, SD, Foreign Ministry, post office, transport, economy), gave great strategic advantages, helped to win victories with little bloodshed.
"Battle of Britain" (1940): Hardly fending off German air pressure, in April the British began to read Luftwaffe radio messages. This helped them properly manage their last reserves, and they won the battle. Without the Enigma hack, a German invasion of England would have been very likely.
"Battle of the Atlantic" (1939-1945): not taking the enemy from the air, Hitler strangled him with a blockade. In 1942, 1006 ships were sunk with a displacement of 5.5 million gross tons. It seemed that just a little bit more and Britain would fall to its knees. But the British, reading the cipher communication of the "wolves", began to drown them mercilessly and won the battle.
Operation Overlord (1945): before landing in Normandy, the Allies knew from the transcript about ALL German countermeasures to repel the landing, every day they received accurate data on positions and defense forces.
The Germans constantly improved the Enigma. Operators were trained to destroy it in case of danger. During the war, the keys were changed every 8 hours. Cipher documents dissolved in water. The creators of the "Riddle" were also right: it is impossible in principle to decipher its messages manually. But what if the enemy opposes this machine with his own? But he did just that; capturing new copies of technology, he improved his "anti-Enigma".
The Germans themselves facilitated his work. So, they had an “indicator procedure”: at the beginning of the ciphergram, a setting was sent twice (number of rotors / their starting positions), where a regular similarity between the 1st and 4th, 2nd and 5th, 3rd and 6 characters. The Poles noticed this as early as 1932 and cracked the code. Weather reports were a significant security flaw. The divers received them from the base "securely" encrypted. On land, the same data was encrypted in the usual way - and now the crackers already have a set of known combinations in their hands, and it is already clear which rotors work, how the key is built. Decoding was facilitated by the standard language of messages, where expressions and words were often repeated. So, every day at 6:00 the weather service gave an encrypted forecast. The word "weather" was obligatory, and the clumsy German grammar put it in its exact place in the sentence. Also: the Germans often used the words "vaterland" and "reich". The British had employees with relatives German(native speakers). Putting themselves in the place of the enemy cipher clerk, they went through a lot of ciphers for the presence of these words - and brought the victory over Enigma closer. It also helped that at the beginning of the session, the radio operator always indicated the call sign of the boat. Knowing all their call signs, the British determined the rotary scheme, obtaining approximate cipher combinations of some characters. "Coercive information" was used. So, the British bombed the port of Calais, and the Germans gave an encryption, and in it - already known words! Decryption was facilitated by the laziness of some radio operators, who did not change the settings for 2-3 days.

The Nazis were let down by a penchant for complex technical solutions where it was safer to get by with simpler methods. They didn't even know about the Ultra program. Fixated on the idea of ​​Aryan superiority, they considered the Enigma impenetrable, and the knowledge of the enemy - the result of espionage and betrayal. They managed to get into the London-Washington government communications network, read all the intercepts. Having revealed the codes of sea convoys, they directed "wolf packs" of submarines at them, which cost the Anglo-Saxons 30,000 lives of sailors. However, with an exemplary order in the organization of affairs, they did not have a single decryption service. This was done by 6 departments, not only not working together, but also hiding their skills from fellow competitors. The communication system for resistance to hacking was evaluated not by cryptographers, but by technicians. Yes, there were investigations into the suspicions of a leak along the Enigma line, but the specialists could not open the eyes of the authorities to the problem. “The Reich’s chief submariner, Admiral Doenitz, never understood that it was not radar, not direction finding, but reading cipher messages that made it possible to find and destroy their boats” (post-war report by the Army Security Agency / USA).
It is said that without the cracking of the Nazis' master cipher machine, the war would have lasted two years longer, cost more victims, and may not have been ended without the atomic bombing of Germany. But this is an exaggeration. Of course, it is more pleasant to play by looking at the opponent's cards, and deciphering is very important. However, she did not defeat the Nazis. Indeed, from February to December 42, without having a single decryption, the Allies destroyed 82 German submarines. And on land, the Germans in a huge number of operations sent information by wire, courier, dogs or pigeons. During the Second World War, half of all information and orders were transmitted in such ways.
... In the summer of 45, the guys from TICOM (Target Intelligence Committee, Anglo-American office for the seizure of German information technologies) confiscated and removed the latest Enigmas and their specialists. But the car (Schlüsselkasten 43) continued to be produced: in October - 1000, in January of the 46th - already 10,000 pieces! Its hacking remained a secret, and the myth of the absolute reliability of the product of "German genius" has spread all over the planet. Thousands of Enigmas were sold by the Anglo-Saxons to dozens of countries of the British Commonwealth of Nations on all continents. They worked there until 1975, and the "benefactors" read the secrets of any government.
Enigma was used by many: the Spaniards - commercial, the Italian Navy - Navy Cipher D, the Swiss - Enigma K. The Japanese clone of Enigma was the 4-rotor GREEN. The British made their Typex according to the drawings and even from the details of the Enigma, pirated using the patent.
Today, there are up to 400 working copies of Enigma in the world, and anyone who wishes can purchase it for 18-30 thousand euros.

Chatterbox will be shot!

The effort to cover up the Ultra program was unprecedented. After gutting, German ships and submarines were sunk so that the enemy would not guess about their capture. The prisoners were isolated for years, their letters home were intercepted. Their sailors-talkers were exiled to serve in darkness like the Falkland Islands. The received intelligence was refined / distorted, and only then transferred to the troops. The full mastery of the "Riddle" was hidden throughout the war, even from the "big brother" of the United States. Knowing from the encryption about the forthcoming bombing of Coventry on November 14, 1940, the population of the city was not evacuated so that the Germans would not guess that they were being “read”. It cost the lives of half a thousand citizens.
At the height of the war, up to 12 thousand people worked in the Ultra program: mathematicians, engineers, linguists, translators, military experts, chess players, puzzle specialists, operators. Two-thirds of the staff were wrens (Women's Royal Naval Service) female soldiers. While doing their tiny part of the job, no one knew what they were doing in general, and the word "Enigma" had never been heard. People who did not know what was happening behind the next door were constantly reminded: "For chatting about work - execution." Only 30 years later, after the removal of secrecy, some of them dared to admit what they did during the war. A. Turing wrote a book about breaking Enigma: the British government did not allow its release until 1996!
The Nazis did not have their own "mole" in Bletchley Park. But for the USSR, what was happening there was no secret. Moscow received small doses of information of the "ultra" category on the direct orders of Churchill, despite the protests of his headquarters. In addition, British intelligence officer John Cairncross, who had access to classified data, supplied the Russians with them without restriction, including Enigma decryptions.

The success of the Enigma crackers was based on just a few brilliant ideas that came out at the right time. Without them, Enigma would have remained a Riddle. Stuart Milner-Berry, British chess champion, one of the main burglars of Bletchley Park: "There has been no such example since ancient times: the war was conducted in such a way that one opponent could constantly read the most important messages of the army and navy of the other."
After the war, the "Turing bombs" were destroyed for security reasons. After 60 years, the Enigma & Friends society tried to recreate one of them. Only the assembly of components took 2 years, and the assembly of the machine itself took 10 years.

  • Cryptography
  • In this community, I found many articles about the famous Enigma cipher machine, but none of them described a detailed algorithm for its operation. Surely many will say that this does not need to be advertised, but I hope that it will be useful for someone to know about it. How did it all start? During the First World War, the Playfair cipher was very popular. Its essence was that the letters of the Latin alphabet were written in a 5x5 square, after which the letters of the original alphabet were divided into pairs. Further, using the square as a key, these bigrams were replaced by others according to a certain algorithm. The advantage of this cipher was that it did not require additional devices, and, as a rule, by the time the message was decrypted, it had already lost its relevance. Another method of secret writing was the Jefferson cipher.

    This device consisted of a certain number of disks strung on a single axis (usually, there were 36 disks). Each of them was divided into 26 parts, each of which denoted a letter. The letters on the disks were arranged randomly. The operator, by rotating the disks, typed the desired message, and then rewrote another line. The person who received this message must have had exactly the same device with exactly the same arrangement of letters. Both methods were relatively good for those times, but given that humanity had already entered the 20th century, it became necessary to mechanize the encryption process. In 1920, the Dutch inventor Alexander Koch invented the first rotary cipher machine. Then, German inventors received a patent for it, who improved it and put it into production, under the name "Enigma" (from Greek - riddle). Thus, this typewriter was acquired by many firms that wished to keep their correspondence secret. This was the whole genius of Enigma - everyone knew the encryption algorithm, but no one could find the right key, since the number of possible combinations exceeded 15 quadrillion. If you want to know how Enigma was cracked, I advise you to read the book by Simon Singh "The Book of Ciphers". Summing up all of the above, I want to say that the Enigma cipher was a kind of mixture of the Jefferson cipher and the Caesar cipher.

    So, let's start studying the algorithm. This site has a very good simulator, which in an accessible and visual form shows the whole process in its entirety. Let's analyze the principle of operation of the three-rotor Enigma. It had three compartments for placing three rotors and an additional compartment for placing a reflector. In total, eight rotors and four reflectors were made during the Second World War, but only as many as the machine was designed for could be used at the same time. Each rotor had 26 sections, which corresponded to a separate letter of the alphabet, as well as 26 contacts for interaction with neighboring rotors. As soon as the operator pressed the desired letter, the electrical circuit was closed, as a result of which an encrypted letter appeared. The circuit was closed by a reflector.

    The figure shows an illustration of pressing the "A" key, followed by decoding into the letter "G". After entering the letter, the rightmost rotor moved forward, thereby changing the key. So how did one letter change to another? As I said, eight different rotors were developed for the Enigma. Inside each of them, 26 different commutations were installed. Detailed specifications are provided for each of them. For example, if the input of the first rotor was the letter "N", then the output should be only "W" and no other letter. If this letter had landed on the second rotor, it would have been converted to a "T" by now, and so on. That is, each rotor performed a clearly defined task in terms of communication. What role did the rings play? Consider the following example. Install the rotors III, II and I, and the order of the rings "C", "U" and "Q".

    Let's press the "A" key. The rightmost rotor will turn forward one step, i.e., the letter "Q" will turn into "R". The rotor in the middle will also turn forward to the letter "V", but I will talk about this a little later. So, our letter "A" begins its journey from the first compartment, in which rotor I is installed and on which the letter "R" is already set. Already before getting to the first rotor, the letter undergoes its first transformation, namely: addition with the letter "R" modulo 26. In fact, this is the Caesar cipher. If you number all the letters from 0 to 25, then the letter "A" will be just the same zero. So the result of the addition will be the letter "R". Further, you and I know that in the first compartment the rotor is I, and its design is based on the fact that the letter "R" always turns into "U". Now the second compartment with the rotor II is in turn. Again, before hitting the second rotor, now the letter “U” changes according to a slightly different algorithm: difference values ​​of the next rotor and the previous one. Let me explain. On the second rotor, the letter “V” awaits us, and on the previous one, “R”, their difference is equal to four letters, and it is they that are added to our letter “U”. Therefore, the letter "Y" enters the second rotor. Further, according to the table, we find that in the second rotor, the letter “Y” corresponds to “O”. Then again we look at the difference between the letters "C" and "V", - it is equal to seven. So, the letter "O" is shifted by seven positions and we get "V". In rotor III, "V" becomes "M". Before hitting the reflector, the letter "C" is subtracted from our letter, transforming it into the letter "K". Next comes the reflection. If you notice, then in each rotor large cyclic groups are formed, for example: (A - E - L - T - P - H - Q - X - R - U), and in the reflector they are divided into pairs: (A - Y) (B - R)(C - U) etc. This is done so that later it can be decrypted. Assume that reflector B is installed, in which "K" is replaced by "N" (and vice versa). Half way done. Now we again add the value of the letter "C", thus obtaining the letter "P". Here, on the contrary, in the line of the third rotor we find “P” and look at which letter it would appear when you press it. This is the letter "H". The transformation in the third rotor is completed. Now the difference between the letters “C” and “V” is subtracted from this letter, that is, seven. We get the letter "A". In the second rotor, it turns into itself, so we leave it unchanged. Next, subtract the difference between the letters "V" and "R", that is, four and get the letter "W". In the first rotor, its reverse transformation is displayed in the letter "N". It remains only to subtract the letter "R" from it and get the desired letter "W". As you can see, the algorithm of the machine was not as complicated as it seemed. To improve the cipher, the Germans introduced a patch panel that allowed the letters to be swapped in pairs. If we connect the letters “Q” and “W”, then when we enter the same “A”, we would get “Q”, since in fact it should be “W”, but it is replaced by the letter “Q”. Here is the attached action plan.


    It remains only to tell about the displacement of the rotors relative to each other. The right rotor always turned one step when the key was pressed. For example, for rotor I, this position is equal to the letter "R". That is why, in our example, the second rotor turned: the first rotor went through the letter "R". Further, having passed through a certain position, the right rotor set in motion the left one by one step. In more advanced models, the left rotor scrolled two or even three times.

    In conclusion, I will say that

    Your attention is a review material (let's say, without details) about the principle of operation of the fairly well-known Enigma encryption machine.

    Many have heard that in World War II, the German side used a special encryption machine, Enigma, for encryption.
    According to sources, this device was a new word in cryptography of that time.

    How did she work?

    Substitution cipher

    To begin with, you should know what a “Replacement Cipher” is. This is the usual replacement of one letter for another. Those. in such a cipher, instead of the letter "A", for example, "T" is used, instead of "B" - "S", etc.

    Breaking such a cipher is quite simple. In the presence of a more or less long encrypted message, it is possible to perform a frequency analysis and compare it with the frequency of the use of letters in the language. Those. if there are many letters “T” in the message encrypted with the replacement cipher, then this is a clear sign that some kind of vowel is hidden behind this letter (for example, “A” or “O”, because usually these letters are the most frequent in the language) .

    Enigma device

    Enigma was like a dynamic Caesar cipher. Those. Initially, a certain initial value was set on the drums (a kind of random seed), which was the key. Further, when typing letters, each letter was encrypted with a Caesar cipher, and then this cipher changed to another.

    The change of the cipher was provided with the help of rotors.

    The rotors were disks that had 26 contacts on each side, connected inside the rotor in a certain (random) way. It was passing through the rotor that the signal was converted from the letter "A" to the letter "T", etc.

    There were several rotors and they turned after typing each character (in the manner of a drum counter).

    In addition, there was also a patch panel into which you could insert wires that changed letters in pairs. Those. by inserting the wire with one end into the “A” socket, and with the other end into the “E”, you swapped these letters.

    The principle of operation can be understood by looking at the circuit diagram:

    The number of rotors varied in different years and for different purposes (for example, Enigmas with a large number of rotors were used in the navy).

    To complicate hacking, operators coded frequently used words (names) differently each time. For example, the word "Minensuchboot" could be written as "MINENSUCHBOOT", "MINBOOT", "MMMBOOT" or "MMM354"

    Accessories.

    As with any popular device, there were a large number of accessories for the Enigma (yes, it started already then). For example, there were auto-printing devices (in the normal version, coding was done by lighting up lights, the values ​​​​of which the operator had to write down).

    In addition, there were remote printers (on wires, of course). So that the operator who drives the encrypted message into the machine does not have access to the decrypted one.

    At almost any time of the year, the English countryside looks the same: green meadows, cows, medieval-looking houses and a wide sky - sometimes gray, sometimes dazzling blue. It was just transitioning from Mode 1 to the rarer Mode 2 as the commuter train sped me to Bletchley Station. It is hard to imagine that, surrounded by these picturesque hills, the foundations were laid computer science and cryptography. However, the upcoming walk through the most interesting museum dispelled all possible doubts.

    Such a picturesque place, of course, was not chosen by the British by chance: an inconspicuous barracks with green roofs, located in a remote village, is just what was needed to hide a top-secret military facility, where they were constantly working on breaking the ciphers of the Axis countries. Bletchley Park may not be impressive from the outside, but the work that was done here helped turn the tide of the war.

    Cryptohuts

    In wartime, Bletchley Park was entered through the main gate, presenting a pass to the guards, and now they buy a ticket at the entrance. I lingered there a little longer to look at the adjoining gift shop and temporary exhibition dedicated to World War I intelligence technologies (which is also a very interesting topic, by the way). But the main thing lay ahead.

    Actually, Bletchley Park is about twenty long one-story buildings, which are called hut in English, and are usually translated into Russian as “house”. I called them “huts” to myself, combining one with the other. In addition to them, there is a mansion (aka Mansion), where the command worked and distinguished guests were received, as well as several auxiliary buildings: former stables, a garage, residential buildings for staff.

    Those same houses
    Homestead in all its glory
    Inside the estate looks richer than the huts

    Each house has its own number, and these numbers have historical meaning, you will definitely meet them in any story about Bletchley Park. In the sixth, for example, intercepted messages were received, in the eighth they were engaged in cryptanalysis (Alan Turing worked there), in the eleventh there were computers - “bombs”. The fourth house was later allocated for work on the Enigma version, which was used in the navy, the seventh - for the Japanese variation on the Enigma theme and other ciphers, in the fifth, transmissions intercepted in Italy, Spain and Portugal were analyzed, as well as German police encryption. Well, and so on.

    You can visit the houses in any order. The decor in most of them is very similar: old furniture, old things, tattered notebooks, posters and maps from the Second World War. All this, of course, did not lie here for eighty years: the houses first passed from one state organization to another, then they were abandoned, and only in 2014 the restorers meticulously restored them, saving them from demolition and turning them into a museum.

    This, as is customary in England, was approached not only carefully, but also with fiction: in many rooms, voices of actors and sounds are heard from hidden speakers that give the impression that work is in full swing around. You walk in and hear the sound of a typewriter, someone's footsteps and a radio in the distance, and then you "eavesdrop" on someone's lively conversation about a recently intercepted cipher.

    But the real curiosity is projections. For example, this man, who, as it were, is sitting at the table, greeted me and briefly spoke about the local order.


    In many rooms, twilight reigns - so that projections can be better seen

    The most interesting thing, of course, was to look at the desktop of Alan Turing. His office is located in the eighth house and looks very modest.


    This is what Alan Turing's desk looked like

    Well, you can look at Turing's creation itself - the machine for decoding the Enigma - in house number 11 - in the same place where the very first model of the "bomb" was assembled at one time.

    Cryptological bomb

    This may be news to you, but Alan Turing was not the first to decipher Enigma by brute force. His work is preceded by research by the Polish cryptographer Marian Rejewski. By the way, it was he who called the decryption machine a “bomb”.

    The Polish "bomb" was much simpler. Pay attention to the rotors on top

    Why "bomb"? There are several different versions. For example, according to one, the sort of ice cream beloved by Reevsky and colleagues was allegedly called that, which was sold in a cafe not far from the encryption bureau of the Polish General Staff, and they borrowed this name. A much simpler explanation is that in Polish the word "bomb" can be used for an exclamation like "eureka!". Well, a very simple option: the car was ticking like a bomb.

    Shortly before the capture of Poland by Germany, Polish engineers handed over to the British all the developments related to the decoding of German ciphers, including the drawings of the "bomb", as well as a working copy of the "Enigma" - not a German, but a Polish clone, which they managed to develop before the invasion. The rest of the Poles' developments were destroyed so that Hitler's intelligence did not suspect anything.

    The problem was that the Polish version of the "bomb" was designed only for the Enigma I machine with three fixed rotors. Even before the start of the war, the Germans commissioned improved versions of the Enigma, where the rotors were replaced every day. This made the Polish version completely unusable.

    If you've watched The Imitation Game, you're already pretty familiar with Bletchley Park. However, the director could not resist and made several digressions from the real historical events. In particular, Turing did not create a prototype of the "bomb" with his own hand and never called her "Christopher".


    Popular English actor Cryptocode Podbirac as Alan Turing

    Based on the Polish machine and the theoretical work of Alan Turing, the British Tabulating Machine Company engineers created the "bombs" that were supplied to Bletchley Park and other secret facilities. By the end of the war, there were already 210 cars, but with the end of hostilities, all the "bombs" were destroyed on the orders of Winston Churchill.

    Why did the British authorities need to destroy such a beautiful data center? The fact is that the “bomb” is not a universal computer - it is designed exclusively for decoding messages encrypted by Enigma. Once this was no longer needed, the machines also became unnecessary, and their components could be sold.

    Another reason may have been a premonition that Soviet Union in the future will not be the best friend of the UK. What if the USSR (or anywhere else) started using technology similar to Enigma? Then it is better not to demonstrate to anyone the ability to open its ciphers quickly and automatically.

    Only two "bombs" survived from wartime - they were transferred to GCHQ, the UK Government Communications Center (consider modern analogue Bletchley Park). They say they were dismantled in the sixties. But GCHQ graciously agreed to provide the museum in Bletchley with old drawings of the "bombs" - alas, not in the best condition and not entirely. Nevertheless, enthusiasts managed to restore them, and then create several reconstructions. They are now in the museum.

    Interestingly, during the war, the production of the first "bomb" took about twelve months, but the reenactors from the BCS Computer Conservation Society, starting in 1994, worked for about twelve years. Which, of course, is not surprising, given that they had no resources at their disposal other than their savings and garages.

    How did Enigma work?

    So, "bombs" were used to decrypt the messages that were obtained at the output after Enigma encryption. But how exactly does she do it? Of course, we will not analyze its electromechanical circuit in detail, but it is interesting to learn the general principle of operation. At least it was interesting for me to listen and write down this story from the words of a museum worker.

    The design of the "bomb" is largely due to the design of the "Enigma" itself. Actually, we can assume that the “bomb” is a few dozen “Enigmas” put together in such a way as to sort through the possible settings of the encryption machine.

    The simplest "Enigma" is three-rotor. It was widely used in the Wehrmacht, and its design suggested that it could be used by an ordinary soldier, and not by a mathematician or engineer. It works very simply: if the operator presses, say, P, a light will turn on under one of the letters on the panel, for example, under the letter Q. It remains only to convert to Morse code and transmit.

    An important point: if you press P again, there is very little chance of getting Q again. Because every time you press the button, the rotor moves one position and changes the configuration of the electrical circuit. Such a cipher is called polyalphabetic.


    Look at the three rotors at the top. If you, for example, enter Q on the keyboard, then Q will first be replaced by Y, then by S, by N, then reflected (it will turn out K), changed again three times and the output will be U. Thus, Q will be encoded as U. But what if you type U? Get Q! So the cipher is symmetrical. This was very convenient for military applications: if two places had Enigmas with the same settings, messages could be freely transferred between them.

    This scheme, however, has a big drawback: when you enter the letter Q, due to the reflection at the end, under no circumstances could you get Q. German engineers knew about this feature, but did not attach much importance to it, but the British found an opportunity to exploit it . How did the British know about the insides of the Enigma? The fact is that it was based on a completely non-secret development. The first patent for it was filed in 1919 and described a machine for banks and financial institutions that allowed the exchange of encrypted messages. It was sold on the open market, and British intelligence managed to acquire several copies. By their own example, by the way, the British Typex cipher machine was also made, in which the above-described flaw was corrected.


    The very first Typex model. As many as five rotors!

    The standard Enigma had three rotors, but you could choose from five options in total and install each of them in any slot. This is exactly what is reflected in the second column - the numbers of the rotors in the order in which they are supposed to be put in the car. Thus, already at this stage, it was possible to get sixty options for settings. Next to each rotor is a ring with the letters of the alphabet (in some versions of the machine - the corresponding numbers). The settings for these rings are in the third column. The widest column is already an invention of German cryptographers, which was not in the original Enigma. Here are the settings that are set using the plug-in panel by pairing the letters. This confuses the whole scheme and turns it into a difficult puzzle. If you look at the bottom line of our table (the first day of the month), then the settings will be as follows: rotors III, I and IV are placed in the machine from left to right, the rings next to them are set at 18, 24 and 15, and then the letters N are connected on the panel with plugs and P, J and V and so on. When all these factors are taken into account, there are about 107,458,687,327,300,000,000,000 possible combinations - more than seconds have passed since the Big Bang. It is not surprising that the Germans considered this car extremely reliable.

    There were many variants of the Enigma, in particular, a version with four rotors was used on submarines.

    Enigma hack

    Breaking the cipher, as usual, allowed the unreliability of people, their mistakes and predictability.

    The Enigma manual says to choose three of the five rotors. Each of the three horizontal sections of the "bomb" can test one possible position, that is, one machine can run three out of sixty possible combinations at a time. To check everything, you need either twenty "bombs" or twenty consecutive checks.

    However, the Germans made a pleasant surprise to the English cryptographers. They introduced a rule that the same position of the rotors should not be repeated within a month, and also for two days in a row. It sounds like it was supposed to increase reliability, but in reality it had the opposite effect. It turned out that by the end of the month, the number of combinations that needed to be checked was significantly reduced.

    The second thing that helped with the decryption was traffic analysis. The British listened to and recorded the encrypted messages of Hitler's army from the very beginning of the war. There was no talk of decoding then, but sometimes the very fact of communication is important, plus such characteristics as the frequency at which the message was transmitted, its length, time of day, and so on. Also, using triangulation, it was possible to determine where the message was sent from.

    A good example is the transmissions that came from the North Sea every day from the same locations, at the same time, on the same frequency. What could it be? It turned out that these were meteorological ships, which daily glorified weather data. What words can be contained in such a transmission? Of course, "weather forecast"! Such guesses pave the way for a method that today we call a plaintext attack, and in those days they called "clues" (cribs).

    Since we know that "Enigma" never produces the same letters as the original message, we need to match the "hint" successively with each substring of the same length and see if there are any matches. If not, then it is a candidate string. For example, if we check the clue “weather in the Bay of Biscay” (Wettervorhersage Biskaya), then we first write it out against the encrypted string.

    Q F Z W R W I V T Y R E * S* X B F O G K U H Q B A I S E Z

    W E T T E R V O R H E R * S* A G E B I S K A Y A

    We see that the letter S is encrypted into itself. This means that the hint needs to be shifted by one character and checked again. In this case, several letters will match at once - move more. Matches R. Move twice more until we hit a potentially valid substring.

    If we were dealing with a substitution cipher, then this could be the end of it. But since this is a polyalphabetic cipher, we need the settings and initial positions of the Enigma rotors. It was them who were picked up with the help of "bombs". To do this, a pair of letters must first be numbered.

    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

    R W I V T Y R E S X B F O G K U H Q B A I S E

    W E T T E R V O R H E R S A G E B I S K A Y A

    And then, based on this table, draw up the so-called "menu" - a diagram that shows which letter of the original message (that is, "hints") into which letter is supposedly encrypted and in what position. According to this scheme, the “bomb” is configured.


    Each of the reels can take one of 26 positions - one for each letter of the alphabet being sifted through. Behind each of the drums there are 26 contacts, which are connected by thick cables in such a way that the machine searches for the plug-in panel settings that give successive matches of the letters of the encrypted string with the hint.

    Since the structure of the "bomb" does not take into account the switching device inside the "Enigma", it gives out several options in the course of work, which the operator must check. Some of them will not work simply because in Enigma only one plug can be connected to one socket. If the settings are not suitable, the operator starts the machine again to get the next option. In about fifteen minutes, the "bomb" will go through all the options for the selected position of the reels. If it is guessed correctly, then it remains to select the settings of the rings - already without automation (we will not dive into details). Then, on English Typex machines modified for compatibility with Enigma, the encryptions were translated into clear text.

    Thus, operating with a whole fleet of "bombs", the British, by the end of the war, received actual settings every day before breakfast. In total, the Germans had about fifty channels, many of which broadcast much more interesting things than the weather forecast.

    Allowed to touch

    In the Bletchley Park Museum, you can not only look around, but also touch the decoding with your own hands. Including - with the help of touchscreen tables. Each of them gives his task. In this, for example, it is proposed to combine the sheets of Banbury (Banburismus). This is an early method of deciphering the Enigma, which was used before the creation of the "bombs". Alas, it was impossible to decipher something in this way during the day, and at midnight all the successes turned into a pumpkin due to another change in settings.

    Fake "data center" in Hut 11

    What is in house number 11, where there used to be a "server room", if all the "bombs" were destroyed in the last century? To be honest, I still hoped in the depths of my soul to come here and find everything in the same form as it once was. Alas, no, but the hall is still not empty.

    Here are such iron structures with plywood sheets. Some show life-size photographs of the "bombs", others show quotes from the stories of those who worked here. They were mostly women, including from the WAF - the women's service of the RAF. The quote in the picture tells us that switching loops and looking after the "bombs" was not an easy task at all, but exhausting daily work. By the way, another series of projections is hidden between the dummies. The girl tells her friend that she had no idea where she would serve, and is completely amazed by what is happening in Bletchley. Well, I was also amazed by the unusual exhibit!

    I spent a total of five hours at Bletchley Park. This was barely enough to take a good look at the central part and catch a glimpse of everything else. It was so interesting that I did not even notice how time passed until my legs began to ache and ask to go back - if not to the hotel, then at least to the train.

    And besides the houses, dimly lit offices, restored "bombs" and long stands with accompanying texts, there was something to see. I already mentioned about the hall dedicated to espionage during the First World War, there was also a hall about the decryption of Lorenz and the creation of the Colossus computer. By the way, in the museum I also found the Colossus itself, or rather the part that the reenactors managed to build.

    The most hardy already outside the territory of Bletchley Park is waiting for a small museum of computer history, where you can get acquainted with how computing technology developed after Turing. I also looked there, but I already walked at a fast pace. I have already seen enough of BBC Micro and Spectrum in other places - you can do it, for example, at the Chaos Constructions festival in St. Petersburg. But you won’t find a live “bomb” anywhere.


    close