The Paper Enigma Machine

Similar documents
Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

CS408 Cryptography & Internet Security

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

The Swiss cipher machine NeMa

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

ENIGMA RELOADED I N T E R N A T I O N A L E V E N T

Exploring the Enigma [The MATH Connection]

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

Appendix B: Project Literature Review

The reduction in the number of flip-flops in a sequential circuit is referred to as the state-reduction problem.

Instruction manual. Midi Fiber Dome. Instruction manual

Bionic Elephant Trunk. Assembly Instructions

Materials: Programming Objectives:

The reduced Enigma. Keywords: Education, Enigma, Public Understanding of Cryptography, reduced Enigma

PA Substitution Cipher

Bill of Materials: Super Simple Water Level Control PART NO

Experimental Procedure

Tip: Faller Mittelstadt Apartments with Controlled LED Lighting Date: , Addition

The reduced Enigma. Harold Thimbleby * Gresham Professor of Geometry. Gresham College Barnard s Inn Hall Holborn LONDON, EC1N 2HH

cs281: Introduction to Computer Systems Lab07 - Sequential Circuits II: Ant Brain

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

WATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak

Most people familiar with codes and cryptography have at least heard of the German

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

Multi-Key v2.4 Multi-Function Amplifier Keying Interface

An Introduction to Cryptography

Instructions. Cable with Armor F CAUTION. October Rev A

IEFIS G3 Inputs, outputs and Alarms

Everybody has seen Telechron clocks and even. US Navy Warren Telechron Clock System. by Robert Simon (CA)

cryptography, plaintext; ciphertext. key,

Procedure: Procedures: DIME TEAM: Drop # (circle one) Date: In Lab (either on Level 4, Level 6, or in shop): Installation: Functional Check

ENGR 1000, Introduction to Engineering Design

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

Dear Railway Modeller,

VITALink Taped Splice Straight Through Crimp

Appendix Cryptograms

The perforator machine below shows in the front, the three keys. The left is for dots, the centre is for space and the right is for dashes.

HYPERLINE UTP/STP Cable Strippers and Cutters

PC-250. SMD Taped Parts Counter Operator s Manual. ISO 9001:2008 Certified. V-TEK, Incorporated 751 Summit Avenue Mankato, MN USA

Sherlock Holmes and the adventures of the dancing men

A Directional Indicator with a Symbol Based Interface for improvised Safety-Enhanced Directional Indicators using Matrix LED

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

APPLICATION NOTE # Monitoring DTMF Digits Transmitted by a Phone

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Assembly instructions

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

Introduction. The Clock Hardware. A Unique LED Clock Article by Craig A. Lindley

A0304 A0304. Audio Out. Audio In. 15 VDC IR In. IR In A0304. Audio & IR Control CAT5 Transceiver

ELECTRONIC GAME KIT TEACHING RESOURCES. Version 2.0 BUILD YOUR OWN MEMORY & REACTIONS

General Wiring and Installation Guidelines. Typical Mounting Installations Electrical Connections General Guidelines Common Questions & Answers

Update to 8 June 2011 Press Release

Gazer VI700A-SYNC/IN and VI700W- SYNC/IN INSTALLATION MANUAL

4:1 Mux Symbol 4:1 Mux Circuit

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

AB-114 / AB-202 AB-404 / AB-301 AB-T2454 Multi-room audio distribution system AB-202

Nixie Clock Type Frank 3

DLM471S-5.1 MULTICHANNEL AUDIO LEVEL MASTER OPERATION MANUAL IB B. (Mounted in RMS400 Rack Mount & Power Supply) (One of 4 Typical Cards)

Endurance Robotics PT-3

Embrace 2.5 Backlit Push-Fit Tension Fabric Display

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

Installing a Wire Mesh Pulling Grip on All-Dielectric DX Armored Fiber Optic Cables

Connection manual manual-en-connection-mmmi-parrot-bury.v1.1

QUICK PATCH Coaxial Patch Panels

SCIR. Infrared Illuminator Powerful Indoor/Outdoor IR Spotlight SCIR

WARNING. The information contained has been scrupulously checked. However AUTINOR declines al1 responsibility for error or omission.

sequenza 1000/1250 al manuale di istruzioni instruction manual 1^ edizione, ottobre st edition october 1996

Azatrax Model Railroad Track Signal Control - Single Track

The NorCal SMT Dummy Load Assembly and Operating Manual Rev. 1.0 January 4, 2005

The Martin Wood Lecture Theatre. Notes for Speakers on the use of the Audio/Visual equipment

GENUINE PARTS CAUTION

2179-CD Series Fiber Optic Splice Closure. Installation Instructions

One channel multiswitch EMS-16-R EMS-16-G EMS-24-G

1- Disconnect your Car battery by disconnecting the negative ground terminal from the battery, to prevent shock, or damage to you car.

Windows and Mirrors Biography and Autobiography

MAGNETIC CARD READER DESIGN KIT TECHNICAL SPECIFICATION

How would you go about creating the presentation?

Tube Cricket Build Guide

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

KBR-M -WARNING- -SPECIFICATIONS-

Z14SRP 4 Function Decoder with NMRA 8 pin plug

Bruce Chubb s Computer/Model Railroad Interface (C/MRI) 101- The Basics

IMPORTANT! Special Instructions for the TracVision M3DX Conversion System ( )

Step 1. 2x Kep Nut 1x Left Motor Assembly

Cabinet War Rooms SIGSALY. The A-3 scrambler

( InfoSystems Translation )

1. Turing Joins the Government Code and Cypher School

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

While the parts are already inventoried at the factory, please verify the inventory check as you go:

(Skip to step 11 if you are already familiar with connecting to the Tribot)

7 SEGMENT LED DISPLAY KIT

The membership approved Carl Bulger s motion that we make no changes to the Constitution and By-Laws.

Optical Distribution Box 300 Installation Guide. Version : R0.0

PRODUCT MANUAL. DMX BOSS Wi-Fi Controller. Product Description

Transportation Engineering -II Dr. Rajat Rastogi Department of Civil Engineering Indian Institute of Technology - Roorkee

Gazer VI700A-SYNC2 and VI700W- SYNC2 INSTALLATION MANUAL

K9123, K9134, K9135 Remote Programming Instructions and Specifications

DIAS power supply and DIC 221 fibre optic cable coupling module

Transcription:

The Paper Enigma Machine http://mckoss.com/crypto/enigma.htm Mike Koss mike04@mckoss.com Wednesday, April 28, 2004 Introduction Having been fascinated with codes and secret writing since I was young, I had a special fascination for the mechanical cryptographic machines I read about in Martin Gardner s Codes, Ciphers, and Secret Writing, and in David Kahn s The Code Breakers. While there are several museums where you can see some of these devices they are usually placed behind a glass case where you cannot see for yourself how they work. With the advent of the Internet, it became possible for people with obscure hobbies like collecting cryptographic machines to find others with similar interests and a market was born on sites like ebay. I first realized that I could own an Enigma of my own via a Bletchley Park email mailing list. A collector in Washington D.C. emailed the list indicating he had an Enigma to sell. We agreed on a price and I flew to Washington (from Seattle) to inspect the machine. We also took it to the National Cryptological Museum (http://www.nsa.gov/museum/) to check it for authenticity. Satisfied, I returned home to Seattle with my first historical cryptographic machine. I found replacement bulbs and wired up a battery so I could put the machine though its paces. Over the years, I ve enjoyed demonstrating the workings of the Enigma to friends, and I have taken it to local area schools to lecture on the workings and historical significance of the Enigma. In 2003, I had the pleasure of lecturing to the MIT Alumni Club of Puget Sound. Knowing my audience would be very technical, I wanted to do more than have a simple show and tell. These folks would want to get their hands dirty and actually learn the inner workings of the machine. There are several Enigma simulators available on the Web, but I wanted to be able to create a tangible kit that each participant could build and use on their own. Thus was born, The Paper Enigma. The Paper Enigma requires only a pair of scissors to assemble a working replica of the German Enigma machine; messages encoded on one can be decoded on the other! The Paper Enigma is simplified in two respects. First, it lacks a plug board (stecker) which adds an additional layer of a single transposition cipher to the Enigma. While this innovation, added to the military version of the Enigma, added Page 1 of 5

an extra layer of complexity to the original Enigma, it does not change the fundamental operation of the machine. Second, there are no ring settings. These merely allow the inner wiring of each rotor to be rotated with respect to the outer indicator settings. The only cryptographic effect is that the rotors will roll-over at a different position. I ve left this off for simplicity as it does not change the basic workings of the machine. The fundamental operation of the Enigma is quite simple. When a keyboard letter is pressed, an electrical contact is made on one of 26 wires entering on the right hand side of the rotor system. That signal is then carried through the three rotors from right to left. The internal wiring of a rotor simply permutes each of the 26 input contacts on the right to one of the 26 output contacts on the left. After traveling from right to left through all three rotors, the signal is then reflected by a fixed permutation (via a reflecting rotor ) and then travels in reverse through all three wheels again (this time from left to right). The 26 contacts are connected to light bulbs so that the ultimate code letter is illuminated on a lamp for as long as the keyboard key is held down. The right hand rotor rotates to the next letter position when each key is pressed, thus changing the final alphabet permutation for every letter of the message. The other rotors can also rotate as explained below. An excellent technical description of the workings of the Enigma can be found at Tony Sale s web site: http://www.codesandciphers.org.uk/enigma/. How to use the Paper Enigma Each part of the Enigma machine is modeled by a corresponding component of the Paper Enigma: Page 2 of 5

Electrical Rotor Real Enigma Paper Enigma Paper Strip: Each connection made in a physical rotor is indicated by matching letters in the left and right hand column of a rotor strip. Note that each paper rotor has two copies of the alphabet printed on it. The reason being that we can always position the strip so that a particular letter can be at the top row of the machine and we still have 25 letters below it to line up with all the input/output rows. Reflecting Rotor Rotor position indicator (windows) Keyboard and Lamps Connections of the reflector are indicated by matching letters in the left hand column (marked Reflector ). The top row (printed with gray background) aligns with the left-hand column letters of each rotor to indicate rotor positions. Right hand column of letters (marked Input/Output ). To assemble the Paper Enigma, simply cut out the three rotor strips and place each one over the columns marked Left Rotor, Center Rotor, and Right Rotor. Operation To use the Paper Enigma, one need know only how to emulate the motion of the rotors after each letter, and be able to trace the path of the letter permutations through the rotor strips. It s probably easiest to follow a specific example (this example is printed on the Paper Enigma in light gray). 1. First position the rotors into their selected columns and starting positions. In our example, we ll use rotors I, II, and III in order, and start at positions M, C, and K. In a real Enigma, the rotor wheels would be inserted into the machine, and then rotated until M, C and K were visible on the indicator windows above each rotor. In the paper Enigma, we position the strips so that the indicated left-hand letter of each rotor is over the first row (next to input/output letter A ). Page 3 of 5

2. The first step of encoding any letter is to Advance the Rotors. This is done before encoding each letter even the first one. The right-most rotor is always shifted up one letter. So, in our example, rotor III is shifted up to the L position. The rotors on the Enigma move something like an odometer but not quite! In an odometer, we would expect the sequence 189 -> 190 -> 191. On an Enigma, we would have the corresponding sequence 189 -> 190 -> 201(!) The reason being that an Enigma machine does not contain a true carry mechanism. Rather, each rotor has a notch on its left hand side. When the notch rotates into the roll-over position, both the notched wheel AND the wheel to the left are moved one letter ahead. In the Paper Enigma, the notches are indicated with small upward pointing arrows along the left edge. When the starting position for a letter has an arrow in the first row, move that rotor and the one to its left up one position. Note that in no circumstance should any rotor advance more than one position between two successive letter encodings; either the right wheel will move by itself, or the right wheel and the middle wheel will move together, or all three wheels will advance one letter. Page 4 of 5

3. Now it is a simple matter to trace the path of the permutations through the machine. Starting at the input letter on the right (in this case, E ), note the letter on the right-most rotor III (another E ). Find the matching E in the left hand column of rotor III. 4. That E lines up with the letter Y on the right hand column of the center rotor II. Find Y in the left hand column. 5. Y lines up with V in left-most rotor I. Locate V in the left hand column. 6. V lines up with J in the reflector. Find the other letter J in the reflector. 7. Now we trace the signal path back through the rotors form left to right. J in the reflector lines up with a J in rotor I. 8. J lines up with P in rotor II. 9. P lines up with D in rotor III. 10. Finally D lines up with Q in the Input/Output column. Our output letter is Q. To encode (or decode) a whole message, repeat the above steps for each letter. Note that the Enigma can be used to decode any message by simply starting the machine in the same configuration as the encoding. Enigma encodings are symmetrical; if A encodes to X, then X will encode to A by following the reverse path through the rotors. Starting from the position above (rotors I-II-III starting at positions M-C-K) try decoding this sample message: QMJIDO MZWZJFJR. Availability The Paper Enigma is available as a free download from http://mckoss.com/crypto/enigma.htm. All you need are a pair of scissors and you too can have a working model of the famous World War II German Enigma machine. Biographical Sketch Mike Koss is a software engineer living in the Seattle area. He received his MS in computer science from MIT in 1983, including a study of cryptology under Professor Ron Rivest. Besides feeding his ebay addiction with antique cryptographic machines, Mr. Koss s interests include programming instruction and web-based application development. He is currently president of the MIT Alumni Club of Puget Sound. Page 5 of 5