Return to Video

WW2 Enigma Machine

  • 0:06 - 0:09
    - [Voiceover] On August 5th, 1857,
  • 0:09 - 0:12
    a 4,300 kilometer-long cable was laid
  • 0:12 - 0:15
    across the Atlantic Ocean.
  • 0:15 - 0:18
    It provided a link between
    Britain and the Americas,
  • 0:18 - 0:21
    further strengthening their
    social and economic alliances.
  • 0:21 - 0:24
    Now information could be represented as
  • 0:24 - 0:27
    a pattern of electrical
    pulses and sent across
  • 0:27 - 0:30
    the world almost instantaneously.
  • 0:30 - 0:32
    Stock tickers and money transfers -
  • 0:32 - 0:35
    these were commercial applications
    invented by Western Union
  • 0:35 - 0:38
    which ushered in a new era
    of global communication.
  • 0:38 - 0:40
    - [Radio] Stand by for this announcement.
  • 0:40 - 0:45
    Germany has invaded Poland
    and has bombed many times.
  • 0:45 - 0:47
    General mobilization has been ordered
  • 0:47 - 0:50
    in Britain and in France.
  • 0:52 - 0:54
    - [Voiceover] And
    consequently, this country
  • 0:54 - 0:57
    is at war with Germany.
  • 0:57 - 1:00
    - [Voiceover] ...which is
    the real cause of the war
  • 1:00 - 1:03
    that today threatens
    the freedom of mankind.
  • 1:03 - 1:07
    (shouting in Italian)
  • 1:11 - 1:15
    (speaking in Japanese)
  • 1:17 - 1:18
    - [Voiceover] The Japanese have attacked
  • 1:18 - 1:20
    Pearl Harbor, Hawaii by air,
  • 1:20 - 1:22
    President Roosevelt has just announced.
  • 1:22 - 1:24
    (shouting in German)
  • 1:24 - 1:26
    - [Voiceover] During
    World War Two, Germany,
  • 1:26 - 1:30
    Italy, and Japan were far
    outnumbered by the allies.
  • 1:30 - 1:33
    Their only conceivable path to victory
  • 1:33 - 1:37
    was the ability to launch
    widespread surprise attacks.
  • 1:37 - 1:39
    So the goal of encryption
    technology was to
  • 1:39 - 1:44
    automate the one-time pad
    using an encryption machine.
  • 1:44 - 1:47
    Ideally, this machine would
    accept an input letter,
  • 1:47 - 1:52
    apply a random shift, and
    output the encrypted letter.
  • 1:52 - 1:55
    However, all machines
    follow the same principle.
  • 1:55 - 1:59
    They begin in some initial
    configuration known as a state,
  • 1:59 - 2:03
    they accept some input,
    they do an operation
  • 2:03 - 2:08
    with the input, and then
    they produce an output.
  • 2:08 - 2:11
    The operation from initial
    state to final state
  • 2:11 - 2:15
    is always predictable and repeatable.
  • 2:15 - 2:17
    So the goal was to
    produce identical machines
  • 2:17 - 2:20
    that output a scrambled
    sequence of shifts,
  • 2:20 - 2:24
    which took a long time to repeat.
  • 2:24 - 2:28
    (mechanical ticking)
  • 2:28 - 2:30
    Therefore, Alice and Bob could generate
  • 2:30 - 2:33
    an identical shift sequence as follows:
  • 2:33 - 2:36
    First they need to
    share identical machines
  • 2:36 - 2:38
    and agree on an initial position,
  • 2:38 - 2:42
    which is defined as the key setting.
  • 2:42 - 2:45
    Then they align their
    machines to the same position,
  • 2:47 - 2:50
    and finally cycle through
    the identical operations
  • 2:50 - 2:53
    to achieve identical sequences.
  • 2:54 - 2:56
    Now the state-of-the-art
    technology at the time
  • 2:56 - 3:00
    was called a rotor encryption machine.
  • 3:00 - 3:03
    We are all familiar with
    the mechanical process
  • 3:03 - 3:06
    of an odometer, which takes a long time
  • 3:06 - 3:09
    to finally repeat its cycle.
  • 3:09 - 3:11
    Now imagine we scramble the numbers
  • 3:11 - 3:14
    on the wheels of the odometer.
  • 3:14 - 3:17
    When it ticks forward, a
    new shift could be generated
  • 3:17 - 3:20
    by adding up each number on the rotors.
  • 3:20 - 3:24
    This is the rough idea behind
    rotor encryption machines.
  • 3:24 - 3:27
    For example, the message,
    "Attack Northwest"
  • 3:27 - 3:30
    would be encrypted as follows.
  • 3:33 - 3:35
    Notice how a new shift is used
  • 3:35 - 3:38
    at each position in the message.
  • 3:38 - 3:42
    With three rotors, each with 26 numbers,
  • 3:42 - 3:44
    the length of the
    sequence before repeating
  • 3:44 - 3:48
    is 26 times 26 times 26.
  • 3:48 - 3:50
    This is equivalent to
    having a list of shifts
  • 3:50 - 3:55
    17,576 numbers long.
  • 3:56 - 3:59
    Understand that each rotor position
  • 3:59 - 4:03
    is equivalent to a
    location in this sequence.
  • 4:03 - 4:07
    The initial machine state
    is known as the key setting,
  • 4:07 - 4:11
    and the collection of
    all possible key settings
  • 4:11 - 4:14
    defines the key space.
  • 4:14 - 4:17
    This key space increases
    if the number of ways
  • 4:17 - 4:20
    to initially configure
    the machine increases.
  • 4:20 - 4:24
    For example, if the
    rotors can be rearranged
  • 4:24 - 4:28
    then the order can be
    selected in six ways.
  • 4:30 - 4:33
    Let's visualize the key
    space at this point.
  • 4:33 - 4:38
    First we choose from one of
    six possible rotor orderings,
  • 4:38 - 4:43
    then we select an initial
    position from the rotor sequence.
  • 4:45 - 4:50
    This give us a key space with
    over 100,000 key settings.
  • 4:50 - 4:53
    Remember, every machine configuration
  • 4:53 - 4:56
    is a point in this space.
  • 4:56 - 4:59
    When we select a key
    setting, we are selecting
  • 4:59 - 5:02
    a starting point in this space,
  • 5:02 - 5:06
    which then determines the
    rest of the shift sequence.
  • 5:06 - 5:07
    Give away the key setting
  • 5:07 - 5:10
    and you give away the entire sequence.
  • 5:10 - 5:13
    The security of rotor machines depends on
  • 5:13 - 5:16
    both the size of this key space
  • 5:16 - 5:20
    and the randomness of the key setting.
  • 5:20 - 5:22
    During World War Two,
    one of the most important
  • 5:22 - 5:24
    encryption technologies used by the
  • 5:24 - 5:28
    German military was known as the Enigma.
  • 5:28 - 5:30
    It was an eletro-mechanical rotor machine
  • 5:30 - 5:32
    invented by a German engineer at
  • 5:32 - 5:34
    the end of World War One.
  • 5:34 - 5:39
    Each rotor wheel had electrical
    contacts on either side
  • 5:39 - 5:42
    with a maze of wirings within.
  • 5:42 - 5:44
    So at each rotor position,
  • 5:44 - 5:47
    there was an electrical
    path from every input letter
  • 5:47 - 5:49
    to every output letter.
  • 5:49 - 5:53
    When the rotor advanced,
    an entirely new path
  • 5:53 - 5:55
    was defined for each letter.
  • 5:57 - 5:59
    During the war, they continually tried to
  • 5:59 - 6:02
    increase the key space of the Enigma
  • 6:02 - 6:04
    in order to make it stronger.
  • 6:04 - 6:06
    For example, some changes
    they made were to add
  • 6:06 - 6:10
    a fourth rotor wheel and
    increase the number of
  • 6:10 - 6:14
    possible rotors you could
    put in the machine to 60.
  • 6:14 - 6:17
    This had the effect of massively
    increasing the key space.
  • 6:17 - 6:18
    Near the end of the war,
  • 6:18 - 6:20
    the Enigma could be set up in over
  • 6:20 - 6:24
    150 million, million, million ways.
  • 6:25 - 6:28
    Guessing the key setting which
    was used for a given message
  • 6:28 - 6:30
    was about as likely as
    guessing the outcome
  • 6:30 - 6:33
    of 26 dice rolls.
  • 6:33 - 6:36
    This gave the Germans
    confidence that the Allies,
  • 6:36 - 6:38
    even if they had a copy of the Enigma,
  • 6:38 - 6:42
    could never check all
    possible key settings.
  • 6:42 - 6:45
    For two parties to
    communicate using the Enigma,
  • 6:45 - 6:49
    it required that they first
    shared the daily key settings.
  • 6:49 - 6:51
    This allowed them to align their machines
  • 6:51 - 6:54
    to the same position.
  • 6:54 - 6:57
    This protocol changed over
    and over during the war,
  • 6:57 - 6:59
    but generally involved
    distributing key sheets
  • 6:59 - 7:02
    in advance to all operators.
  • 7:02 - 7:06
    Each day, the operator would
    cut off the daily settings
  • 7:06 - 7:08
    and this would tell them
    the daily configuration
  • 7:08 - 7:11
    of their machines, such
    as what rotors to use
  • 7:11 - 7:13
    and the order of the rotors.
  • 7:13 - 7:17
    This key setting was then
    to be destroyed after use.
  • 7:18 - 7:22
    However, one vital step
    was left to the operator.
  • 7:22 - 7:25
    They were to select a
    random initial position
  • 7:25 - 7:28
    of each rotor before communication began.
  • 7:28 - 7:30
    And a very simple mistake was made
  • 7:30 - 7:33
    by some fatigued operators.
  • 7:33 - 7:35
    We make this exact same mistake every time
  • 7:35 - 7:37
    we set a bike lock combination,
  • 7:37 - 7:40
    because we tend to rotate the cylinders
  • 7:40 - 7:43
    only a few clicks from the initial state,
  • 7:43 - 7:47
    or we reuse a common password.
  • 7:47 - 7:49
    This destroyed the uniform distribution
  • 7:49 - 7:51
    of the initial rotor position,
  • 7:51 - 7:53
    and after repeated observations,
  • 7:53 - 7:56
    it allowed the Allies to reverse engineer
  • 7:56 - 7:59
    the rotor wirings completely.
  • 8:00 - 8:03
    The second major error was a design error,
  • 8:03 - 8:05
    not a procedural one.
  • 8:05 - 8:08
    The Enigma was designed
    so that an input letter
  • 8:08 - 8:10
    would never encrypt to itself.
  • 8:10 - 8:13
    So given an encrypted letter, such as L,
  • 8:13 - 8:17
    You can now eliminate
    the possibility that L
  • 8:17 - 8:19
    was the original letter.
  • 8:19 - 8:21
    What they thought was a strength
  • 8:21 - 8:24
    was actually a weakness in design.
  • 8:24 - 8:27
    (water dripping)
  • 8:27 - 8:29
    And this led to a code breaking machine,
  • 8:29 - 8:31
    initially designed by the Poles
  • 8:31 - 8:34
    and later improved by the
    British-American effort.
  • 8:34 - 8:38
    The Bombe was multiple Enigma
    rotors chained together,
  • 8:38 - 8:42
    allowing it to rapidly test
    different key settings.
  • 8:42 - 8:44
    It took advantage of the
    fact that common words
  • 8:44 - 8:47
    were known to be in the original message,
  • 8:47 - 8:48
    such as weather.
  • 8:48 - 8:51
    And these came to be known as cribs.
  • 8:51 - 8:53
    For a given message in crib,
  • 8:53 - 8:55
    the Bombe could scan through all possible
  • 8:55 - 8:58
    rotor positions and
    orders in order to find
  • 8:58 - 9:02
    possible key settings
    in a matter of minutes.
  • 9:02 - 9:04
    This machine allowed the Allies to read
  • 9:04 - 9:07
    German commands within
    hours of them being issued.
  • 9:07 - 9:09
    It was a fatal blow to
    their combat strategy,
  • 9:09 - 9:13
    as the Allies could
    anticipate their next move.
  • 9:13 - 9:15
    One fact remains:
  • 9:15 - 9:17
    This initial attempt at automating
  • 9:17 - 9:20
    the one-time pad failed.
  • 9:20 - 9:22
    If the operators had instead rolled dice
  • 9:22 - 9:25
    to decide their initial rotor positions,
  • 9:25 - 9:26
    the starting point in the sequence
  • 9:26 - 9:29
    could have been uniformly distributed.
  • 9:29 - 9:32
    This would have prevented
    the reverse engineering
  • 9:32 - 9:33
    of the rotor wirings.
  • 9:33 - 9:36
    And if the Enigma allowed
    letters to be encrypted
  • 9:36 - 9:39
    to themselves, the bombe could not
  • 9:39 - 9:41
    have taken advantage of cribs.
  • 9:41 - 9:43
    And this would've required the Allies to
  • 9:43 - 9:45
    check the entire key space,
  • 9:45 - 9:49
    which was impossible even
    with the fastest computer.
  • 9:49 - 9:52
    Repetition reduced the key space.
  • 9:52 - 9:54
    Otherwise, the outcome of World War Two
  • 9:54 - 9:58
    could've been drastically different.
Title:
WW2 Enigma Machine
Video Language:
English
Duration:
10:01
Report Bot edited English subtitles for WW2 Enigma Machine

English subtitles

Revisions