Abstract
In spite of a relatively large number of publications about breaking Enigma by the Allies before and during the World War II, this subject remains relatively unknown not only to the general public, but also to people professionally involved in cryptological research. For example, the story of Enigma is rarely a part of a modern textbook on cryptology or a modern course on cryptography and network security. There exist multiple reasons for this situation. First, there are still a few unresolved issues, resulting from conflicting reports, the lack of reliable sources, and a long period required for declassifying documents related to any cryptological activity during the World War II. Secondly, the issue is highly political, and there is little consensus in weighing the contribution of all involved countries. Thirdly, many contemporary cryptologists honestly believe that there is little to learn from the analysis of old cryptosystems, because of the tremendous progress in theory and practice of cryptography and a little similarity between old and modern ciphers. In this paper we confront these opinions by presenting a look at the current state of knowledge about cryptological methods and devices used to break Enigma. We introduce all major players involved in these activities, and we make an effort to weigh their original contributions. Finally, we show that the story of Enigma can still provide contemporary cryptographers with many useful lessons regarding the way of organizing and building any large-scale security system.
Chapter PDF
Similar content being viewed by others
References
F. L. Bauer, Decrypted Secrets: Methods and Maxims of Cryptology, 2nd edition, Springer-Verlag, Berlin 2000.
G. Bertrand, Enigma ou la plus grande enigme de la guerre 1939–1945, Plon, Paris, 1973.
Bletchley Park, web page available at http://www.bletchleypark.org.uk/
G. Bloch and R. Erskine, “Enigma: The Dropping of the Double Encipherment,” Cryptologia, vol. 10, no. 3, Jul. 1986.
R. Erskine, Enigma, web page available at http://uboat.net/technical/enigma.htm.
K. Gaj, German Cipher Machine Enigma — Methods of Breaking, Wydawnictwa Komunikacji i Lacznosci, Warszawa, 1989 (in Polish).
F. H. Hinsley, British Intelligence in the Second World War, 2 volumes, London: Her Majesty’s Stationery Office, 1979, 1981.
A. Hodges, Alan Turing: The Enigma, London, Burnett Books, 1983.
A. Hodges, The Alan Turing Home Page, available at http://www.turing.org.uk/turing/
D. Kahn, The Codebreakers: The Story of Secret Writing, 2nd edition, Scribner, New York, 1996.
D. Kahn, Seizing the Enigma, Houghton Mifflin, Boston, MA, 1991.
R. Kippenhahn, Verschluesselte Botschaften. Geheimschrift, Enigma und Chipkarte, Rowohlt Verlag, Reinbek bei Hamburg, 1997.
W. Kozaczuk, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two, Edited and Translated by Christopher Kasparek, Frederick, Maryland: University Publications of America, Inc., 1984.
L. Maziakowski, Enigma Cipher Machine — History of Solving, web page available at http://home.us.net/~encore/Enigma/enigma.html
A. R. Miller, The Cryptographic Mathematics of Enigma, Center for Cryptologic History, National Security Agency, 1996.
W. Momsen, Codebreaking and Secret Weapons in World War II, available at http://home.earthlink.net/~nbrass1/enigma.htm
A. Orlowski, “The mystery of Enigma,” VI National Conference on Applications of Cryptography — Proceedings, Warsaw, Poland, pp. K–103:K-107 (in Polish).
M. Rejewski, “An application of the theory of permutations in breaking the Enigma cipher”, Applications of Mathematicae, Polish Academy of Sciences, vol. 16, pp. 543–559, 1977.
M. Rejewski, Enigma (1930–40). Method and history of solving the German machine cipher. Unpublished Manuscript (in Polish).
T. Sale, Codes and Ciphers in the Second World War: The history, science and engineering of cryptanalysis in World War II, web page available at http://www.codesandciphers.org.uk/
H. Sebag-Montefiore, Enigma: The Battle for the Code, John Wiley & Sons, New York, 2000.
S. Singh, The CodeBook, The Evolution of Secrecy from Mary Queen of Scots to Quantum Cryptography, Doubleday, New York, 1999.
M. Smith, Station X: Decoding Nazi Secrets, TVBooks, New York, 1999.
A. M. Turing, Turing’s Treatise on Enigma, Unpublished Manuscript.
G. Welchman, The Hut Six Story, McGraw Hill, New York, 1982.
G. Welchman, “From Polish Bomba to British Bombe. The Birth of Ultra,” Intelligence and National Security I, no. 1 (Jan.), pp. 71–110, 1986.
J. E. Wilcox, Solving the Enigma: History of the Cryptanalytic Bombe, Center for Cryptologic History, National Security Agency, 2001.
F. W. Winterbotham, The Ultra Secret, Weidenfeld & Nicolson, London, 1974.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 International Association for Cryptologic Research
About this paper
Cite this paper
Gaj, K., Orłowski, A. (2003). Facts and Myths of Enigma: Breaking Stereotypes. In: Biham, E. (eds) Advances in Cryptology — EUROCRYPT 2003. EUROCRYPT 2003. Lecture Notes in Computer Science, vol 2656. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39200-9_7
Download citation
DOI: https://doi.org/10.1007/3-540-39200-9_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-14039-9
Online ISBN: 978-3-540-39200-2
eBook Packages: Springer Book Archive