Skip to main content

The Coming of the Machines: 1918–1945

  • Chapter
  • First Online:
A Brief History of Cryptology and Cryptographic Algorithms

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 2397 Accesses

Abstract

The volume of cipher traffic that was made possible by radio showed the need for vastly increased security, speed and accuracy in both enciphering and deciphering messages. The use of mechanical and electromechanical machines to do the encipherment was a logical outgrowth of this need. The first electromechanical rotor cipher machines began to appear right after World War I and the next three decades saw their steady improvement in both complexity and speed. The Enigma, the Typex and the M-134C/SIGABA were the epitome of these machines and the efforts to create and cryptanalyze them led us into the computer age. This chapter examines the history of cipher machines in the 20th century and looks in some detail at the cryptographic construction of the Enigma and the M-134C/SIGABA.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Patent 6,097,812, granted 1 August 2000.

  2. 2.

    Patent 6,175,625, granted 16 January 2001.

  3. 3.

    Patent 6,130,946, granted 10 October 2000.

References

  1. Budiansky, Stephen. 2000. Battle of wits: The complete story of codebreaking in World War II. New York: Free Press.

    Google Scholar 

  2. Clark, Ronald. 1977. The man who broke purple. Boston: Little, Brown and Company.

    Google Scholar 

  3. Hodges, Andrew. 1983. Alan turing: The Enigma. New York: Simon and Schuster.

    Google Scholar 

  4. Kahn, David. 1967. The codebreakers; The story of secret writing. New York: Macmillan.

    Google Scholar 

  5. Miller, A. Ray. 1996. The cryptographic mathematics of Enigma, ed. Center for cryptologic history. Fort George G. Meade, Md.: National Security Agency.

    Google Scholar 

  6. Rowlett, Frank. R. 1998. The story of magic: Memoirs of an American cryptologic pioneer. Laguna Hills, CA: Aegean Park Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John F. Dooley .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Dooley, J.F. (2013). The Coming of the Machines: 1918–1945. In: A Brief History of Cryptology and Cryptographic Algorithms. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-01628-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01628-3_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-01627-6

  • Online ISBN: 978-3-319-01628-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics