Solving the Enigma How the Western Allies Cracked the German Secret Codes During WW II.

Slides:



Advertisements
Similar presentations
Origin and Nature of the Allied Cryptographic Advantage During World War II By Grant Musick.
Advertisements

The Beginning of Allied Successes Against Enigma Chris Christensen Department of Mathematics and Statistics Northern Kentucky University.
Ciphers and Permutations. Monoalphabetic Cipher is simply a permutation abcdefghijklmnopqrstuvwxyz SATBUCVDWEXFYGZRQPONMLKJIH Cycle Form (ASOZHDB) (CTNGVLF)
By Megan Goatley. history one of the last of a top World War Two codebreaking team at Bletchley Park codebreaker Jerry Roberts dies aged 93, Capt Roberts,
Cryptology Making & Breaking Codes & Ciphers. AJ 1152 Cryptology Cryptography –Science of creating codes or ciphers Cryptanalysis –Science of breaking.
On a sheet of paper… Judge whether you think countries such as Great Britain and France should have appeased or intervened in the aggressive actions Germany.
The political and military leaders of the countries that went to war in 1939 believed that they had learned the lessons of WWI. Some, however, had learned.
Code Breaking during the Second World War An Introduction By Gary J Becea.
The History and Technology of the Enigma Cipher Machine The History and Technology of the Enigma Cipher Machine Ralph Simpson
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
 starter activity Churchill said that the Battle of the Atlantic was ‘the only thing that frightened me.’ What do you think he meant? Click picture to.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 4: Captain Ridley’s Shooting Party.
Enigma? Several Images from Wikipedia (an online encyclopedia)
Chris Christensen Department of Mathematics and Statistics Northern Kentucky University.
Modern Cryptography.
A Glimpse of the History of Cryptography
Cryptography in World War II
Chris Christensen Department of Mathematics and Statistics Northern Kentucky University.
Title: Contributing to Mankind With Political and Military Victories. By: H.Serkan TASOLUK.
Enigma 1 Enigma Enigma 2 Enigma  Developed and patented (in 1918) by Arthur Scherbius  Many variations on basic design  Eventually adopted by Germany.
World War II ( ) killed more people, destroyed more property, disrupted more lives, and probably had more far- reaching consequences than any.
WWII Battles & Important Events. The European Theater.
U-Boats were undersea boats that attacked allied ships. The U-Boat.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
When the Battle Started  The battle started on June 10, 1940 but the real air war didn’t start until August 12,  It involved the British (RAF)
PAGE #8 RECLAIMING EUROPE. REMEMBER... What event brings the U.S. into this war? The U.S. brings fresh troops to the fight Who is the only allied country.
Section III: The War Expands Pages Section III: The War Expands Pages This section is about: This section is about: Hitler’s campaigns.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Battle of Britain Britain stood alone to fight the Germans Winston Churchill (Britain Prime Minister) will not surrender Hitler turns his plans on Great.
Alan Turing Presented By: Tyler Romero CSCE Spring 2014.
Alan Turing and Code Breaking
Famous Firsts in Computation MSE 2400 Evolution & Learning
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
The Turing machine Olena Lastivka. Definition Turing machine is a theoretical device that manipulates symbols on a strip of tape according to a table.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
1.History of a remarkable Man Call “Alan Turing”. 2.Study Life. 3.Work life during the world war 2 period. 4.His achievement after the world war. 5.His.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
CSCI 5857: Encoding and Encryption
Enigma Plymstock School History Department. The Battle of the Atlantic The Battle of the Atlantic Since the evacuation of the British Army from the beaches.
Alan M. Turing ( ) A Natalie Cluck Presentation.
19-2 Learning Targets Explain why Hitler was able to take over Austria and Czechoslovakia Describe the early events of the war and why Britain was able.
David Evans CS551: Security and Privacy University of Virginia Computer Science Lecture 3: Striving for Confusion Structures.
Cryptography in WWII Explanation of the German Enigma Machine
Encryption of WWII Philip Gebhardt 10/24/2011. Interest.
“IT IS A RIDDLE, WRAPPED IN A MYSTERY, INSIDE AN ENIGMA” * By: Michaela Wontroba Mr Kuniega; PD 5,6,7.
The United States in WWII The War in Europe and North Africa Sec. 1.
CS 150 – Computing: From Ada to the Web Cryptography.
The Battle of the Atlantic The other attack on the United States.
Turing’s Bombes. Solve Enigma using known plaintext Depending on German patterns, e.g. weather reports Sometimes setup by seeding/farming Depended on.
The cracking of Enigma in World War II John Bibb Harry Caplan Abhishek Chhikara Vladimir Grantcharov Aditi Kulkarni Nigel Lawrence Andrew Muldowney Hou.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
By, Amanda Rydzynski O’Brien Computer Skills
WWII: The War in Europe, Poland to the Battle of the Atlantic EQ2 How did WWII play out in Europe?
Chris Christensen Department of Mathematics and Statistics Northern Kentucky University.
Introduction World War I ended in Twenty-one years later, in 1939, World War II began. What caused the war to begin? What did Americans do during.
The Mathematics Behind
Battle Of Britain. Britain Stood Alone With the fall of France, Great Britain stood alone against the Nazis. The new British Prime minister, Winston Churchill.
Chapter 16 – World War II ( ) Section 1 – Hitler’s Lightning War Main Idea: Using the sudden, mass attack called blitzkrieg, Germany overran much.
History and Background Part 3: Polyalphabetic Ciphers
Other Fronts of WW2: EQ: What was happening in other parts of the world during the Second World War?
ANALYZING DOCUMENTS: THE EVENTS OF WORLD WAR II: WAR IN EUROPE TASK:
In this lesson we will understand:
Enigma Machine.
Rotor Ciphers.
32.1-Lightning War in Europe
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Enigma Cipher Machine By: Amber Churchwell.
WORLD OF WONDERS : THE ENIGMA MACHINE
Modern Cryptography.
Presentation transcript:

Solving the Enigma How the Western Allies Cracked the German Secret Codes During WW II

Vital to Allied Effort Winston Churchill called the cracking of the German Enigma codes “the secret weapon that won the war.” The intelligence discovered by reading the German’s Enigma traffic—codenamed “Ultra” by the British—was decisive throughout the war. Ultra led to victories in the U-Boat struggle and the battles against Rommel in North Africa.

Description of the Enigma Machine The Enigma used 3 rotors to scramble the plaintext. The Enigma operator typed a letter on the keyboard and wrote down the letter that was lit on the lamp board.

Close-up of Rotor Window

Enigma Rotors

Enigma Flaws The Enigma machine had only one design weakness. A letter would never be encrypted as itself. E.g. ‘A’ would never be transposed to ‘A’. The German encryption procedures was the real weakness. Gordon Welchman: “The machine as it was would have been impregnable if it had been used properly.” Welchman pointed out twelve serious errors in procedure that, if corrected, would “have stopped us cold”.

General Procedure, Clerk used codebook to retrieve settings for current month/week/day. First setting determined rotor order and ring settings: III,I, II; XAG (trigram) Second trigram determined the initial position of the rotors. E.g. FJI Clerk would choose a third trigram randomly, type it in twice and write down the results. Clerk chooses: QOP Output:UMHWGB These six letters were sent at the beginning of the message. Clerk would then change the rotors to match his random trigram (QOP in the example) and encrypt the rest of the message.

Exploiting the Flaw The stupidity of this is stunning. Every message had three pairs of letters that were the same! In 1933 the Polish Cipher Bureau, led by mathematician Marian Rejewski, began to break Enigma messages. Rejewski looked for messages with repeated pairs of letters, called “indicators”. Example: “RXW RAP” Built a catalog of rotor settings that could create different indicators. Each indicator reduced the number of possible rotor settings by roughly 40%.

Perforated Sheets By 1938 the size of the indicator catalog was becoming sizable. Henryk Zygalski designed perforated sheets that helped sort through the known indicators. When a message with an indicator was found, a sheet was stacked on top of other sheets on a glass table with a light underneath. Anywhere that light shown through was a possible solution.

Polish Bombe The PCB designed machines, called “Bombe” by the British, to take the possible solutions and run through them mechanically. In 1938, using the sheets and the bombe, the Poles were reading 70% of Enigma traffic. British version of the bombe

Poles Reveal All to Allies Later in 1938 the Germans added two more rotors to the original set of three. Three were still used in the Enigma but the permutations of the rotors increased from 6 to 60. The PCB didn’t have the resources to deal with the added complexity. The Poles invited Britain and France to a meeting in Warsaw in July ’39. Neither ally had had a single success in cracking Enigma. PCB provided them with replica Enigma machines and instructions on how to create the sheets. Britain read its first Enigma message in January, 1940.

The Germans Wise Up…Sort Of In May, 1940, Germany changed its encoding procedures to eliminate the repeating of the random trigram. Britain’s codebreakers, located in Bletchley Park (BP) were no longer able to read messages but this time they knew it could be accomplished! Germans didn’t eliminate other practices.

Cribs Alan Turing and Gordon Welchman improved the bombe to work faster but it needed plaintext to compare to ciphertext. Turing came up with the idea of “cribs”, plaintext that was thought to be contained in a ciphertext. An example is a weather report. Past decrypts provided the cribs. The flaw in the Enigma machine (letters are never transposed to themselves) helped codebreakers look for cribs.

Narrowing Down the Possibilities Even Turing’s bombe would take too long if it had to run through all permutations. Something else was needed to rule out as many as possible. Many clever little tricks. “Herivel Tip”: Cryptologist John Herivel realized that lazy clerks would choose a random trigram that was very close to the ring settings.

Conclusion By end of the war BP could read almost all Enigma messages within a few hours. Around 500K total messages read. Germany never realized its secrets were compromised, possibly because of “aggressive” mentality. Side topics: French Enigma spy; U-Boat captures; giving Ultra intelligence to Russia without revealing the source. Wikipedia has a lot of information.