Return to Video

WW2 Enigma Machine

  • 0:06 - 0:09
    On August 5th, 1857,
  • 0:09 - 0:15
    a 4,300 km long cable was laid across the Atlantic Ocean,
  • 0:15 - 0:18
    it provided a link between Britain and the Americas,
  • 0:18 - 0:22
    further strengthening their social and economic alliances.
  • 0:22 - 0:24
    Now information could be represented
  • 0:24 - 0:26
    as a pattern of electrical pulses,
  • 0:26 - 0:30
    and sent across the world almost instantaneously.
  • 0:30 - 0:32
    Stock tickers, and money transfers,
  • 0:32 - 0:35
    these were commercial applications invented by Western Union
  • 0:35 - 0:38
    which ushered in a new era of global communication.
  • 0:38 - 0:40
    Please stand by for this announcement.
  • 0:40 - 0:43
    Germany has invaded Poland.
  • 0:43 - 0:45
    And it has bombed many towns.
  • 0:45 - 0:49
    General mobilization has been ordered in Britain and France.
  • 0:51 - 0:56
    And consequently this country is at war with Germany.
  • 0:56 - 1:00
    Throughout the world, which is the real cause of the war
  • 1:00 - 1:04
    that today threatens the freedom of mankind.
  • 1:04 - 1:11
    (Italian words)
  • 1:11 - 1:18
    (Japanese words)
  • 1:18 - 1:20
    The Japanese has attacked Pearl Harbor Hawaii by air.
  • 1:20 - 1:22
    President Roosevelt has just announced.
  • 1:22 - 1:25
    (German words)
  • 1:25 - 1:27
    During World War II, Germany, Italy, and Japan
  • 1:27 - 1:30
    were far outnumbered by the allies.
  • 1:30 - 1:33
    Their only conceivable path to victory
  • 1:33 - 1:37
    was the ability to launch widespread surprise attacks.
  • 1:37 - 1:39
    So the goal of encryption technology
  • 1:39 - 1:41
    was to automate the one time pad
  • 1:41 - 1:44
    using an encryption machine.
  • 1:44 - 1:47
    Ideally, this machine would accept an input letter,
  • 1:47 - 1:51
    apply a random shift, and output the encrypted letter.
  • 1:52 - 1:56
    However, all machine follow the same principle.
  • 1:56 - 1:59
    They begin in some initial configuration known as a state.
  • 1:59 - 2:04
    They accept some input. They do an operation with the input,
  • 2:04 - 2:08
    and then they produce an output.
  • 2:08 - 2:11
    The operation from the initial state to final state
  • 2:11 - 2:15
    is always predictable, and repeatable.
  • 2:15 - 2:17
    So the goal was to produce identical machines
  • 2:17 - 2:20
    that output a scrambled sequence of shifts,
  • 2:20 - 2:28
    which took a long time to repeat.
  • 2:28 - 2:30
    Therefore Alice and Bob could generate
  • 2:30 - 2:34
    an identical shift sequence as follows:
  • 2:34 - 2:36
    First, they need to share identical machines,
  • 2:36 - 2:38
    and agree on an initial position
  • 2:38 - 2:42
    which is defined as the key setting.
  • 2:42 - 2:47
    Then, they align their machines to the same position
  • 2:47 - 2:50
    and finally cycle through the identical operations
  • 2:50 - 2:54
    to achieve identical sequences.
  • 2:54 - 2:57
    Now, the state-of-the-art technology of the time
  • 2:57 - 3:01
    was called a rotor encryption machine.
  • 3:01 - 3:04
    We're all familiar with the mechanical process of an odometer,
  • 3:04 - 3:09
    which takes a long time to finally repeat its cycle.
  • 3:09 - 3:14
    Now imagine we scramble the numbers on the wheels of the odometer.
  • 3:14 - 3:15
    When it ticks forward,
  • 3:15 - 3:17
    a new shift could be generated
  • 3:17 - 3:20
    by adding up each number on the rotors.
  • 3:20 - 3:24
    This is the rough idea behind rotor encryption machines.
  • 3:24 - 3:27
    For example, the message "Attack northwest"
  • 3:27 - 3:33
    would be encrypted as follows:
  • 3:33 - 3:35
    Notice how a new shift is used
  • 3:35 - 3:38
    at each position in the message.
  • 3:38 - 3:42
    With 3 rotors, each with 26 numbers,
  • 3:42 - 3:48
    the length of the sequence before repeating is 26x26x26.
  • 3:48 - 3:49
    This is equivalent to having
  • 3:49 - 3:56
    a list of shifts 17,576 numbers long.
  • 3:56 - 3:59
    Understand that each rotor position
  • 3:59 - 4:03
    is equivalent to a location in the sequence.
  • 4:03 - 4:07
    The initial machine state is known as the key setting,
  • 4:07 - 4:11
    and the collection of all possible key settings
  • 4:11 - 4:14
    defines the key space.
  • 4:14 - 4:16
    This key space increases
  • 4:16 - 4:20
    if the number of ways to initially configure the machine increases.
  • 4:20 - 4:24
    For example, if the rotors can be rearranged,
  • 4:24 - 4:27
    then the order can be selected in 6 ways.
  • 4:30 - 4:33
    Let's visualize the key space at this point.
  • 4:33 - 4:38
    First, we choose from 1 of 6 possible rotor orderings.
  • 4:38 - 4:45
    Then we select an initial position from the rotor sequence.
  • 4:45 - 4:50
    This gives us a key space with over a 100,000 key settings.
  • 4:50 - 4:53
    Remember, every machine configuration
  • 4:53 - 4:56
    is a point in this space.
  • 4:56 - 4:58
    When we select a key setting,
  • 4:58 - 5:02
    we're selecting a starting point in this space,
  • 5:02 - 5:06
    which then determines the rest of the shift sequence.
  • 5:06 - 5:07
    Give away the key setting,
  • 5:07 - 5:10
    and you give away the entire sequence.
  • 5:10 - 5:12
    The security of rotor machines
  • 5:12 - 5:16
    depends on both the size of this key space,
  • 5:16 - 5:20
    and the randomness of the key setting.
  • 5:20 - 5:21
    During World War II,
  • 5:21 - 5:24
    one of the most important encryption technologies
  • 5:24 - 5:28
    used by the German military was known as the Enigma.
  • 5:28 - 5:31
    It was an electromechanical rotor machine
  • 5:31 - 5:34
    invented by a German engineer at the end of the World War I.
  • 5:34 - 5:38
    Each rotor wheel had electrical contacts
  • 5:38 - 5:42
    on either side with a maze of wirings within.
  • 5:42 - 5:46
    So at each rotor position, there's an electrical path
  • 5:46 - 5:49
    from every input letter to every output letter.
  • 5:49 - 5:51
    When the rotor advanced,
  • 5:51 - 5:57
    an entirely new path was defined for each letter.
  • 5:57 - 5:58
    During the war,
  • 5:58 - 6:01
    they continually tried to increase the key space of the Enigma,
  • 6:01 - 6:04
    in order to make it stronger.
  • 6:04 - 6:06
    For example, some changes they made
  • 6:06 - 6:09
    were to add a fourth rotor wheel,
  • 6:09 - 6:11
    and increase the number of possible rotors
  • 6:11 - 6:14
    you could put into the machine to 60.
  • 6:14 - 6:17
    This has the effect of massively increasing the key space.
  • 6:17 - 6:18
    Near the end of the war,
  • 6:18 - 6:19
    the Enigma could be set up in
  • 6:19 - 6:24
    over 150 million million million ways.
  • 6:24 - 6:28
    Guessing the key setting which was used for a given message
  • 6:28 - 6:33
    was about as likely as guessing the outcome of 26 dice rolls.
  • 6:33 - 6:35
    This gave the German confidence that the allies,
  • 6:35 - 6:39
    even if they have the copy of the Enigma,
  • 6:39 - 6:42
    could never check all possible key settings.
  • 6:42 - 6:45
    For two parties to communicate using the Enigma,
  • 6:45 - 6:49
    it required that they first shared the daily key settings.
  • 6:49 - 6:54
    This allowed them to align their machines to the same position.
  • 6:54 - 6:57
    This protocol changed over and over during the war,
  • 6:57 - 7:00
    but generally involved distributing key sheets in advance
  • 7:00 - 7:02
    to all operators.
  • 7:02 - 7:06
    Each day, the operator would cut off the daily settings,
  • 7:06 - 7:09
    and this would tell them the daily configuration of their machine,
  • 7:09 - 7:13
    such as what rotors to use and the order of the rotors.
  • 7:13 - 7:16
    This key setting was then to be destroyed after use.
  • 7:18 - 7:22
    However one vital step was left to the operator.
  • 7:22 - 7:26
    They were to select a random initial position of each rotor
  • 7:26 - 7:28
    before communication began,
  • 7:28 - 7:30
    and a very simple mistake was made
  • 7:30 - 7:33
    by some fatigued operators.
  • 7:33 - 7:35
    We make this exact same mistake
  • 7:35 - 7:38
    every time we set a bike lock combination,
  • 7:38 - 7:40
    because we tend to rotate the cylinders
  • 7:40 - 7:43
    only a few clicks from the initial state,
  • 7:43 - 7:47
    or we reused a common password.
  • 7:47 - 7:51
    This destroyed the uniform distribution of the initial rotor position,
  • 7:51 - 7:53
    and after repeated observations,
  • 7:53 - 7:55
    it allowed the allies
  • 7:55 - 8:00
    to reverse engineer the rotor wirings completely.
  • 8:00 - 8:03
    The second major error was a design error,
  • 8:03 - 8:05
    not a procedural one.
  • 8:05 - 8:07
    The Enigma was designed
  • 8:07 - 8:11
    so that an input letter would never encrypt to itself.
  • 8:11 - 8:13
    So given an encrypted letter, such as L,
  • 8:13 - 8:16
    you can now eliminate the possibility that
  • 8:16 - 8:19
    L was the original letter.
  • 8:19 - 8:21
    What they thought was a strength
  • 8:21 - 8:27
    was actually a weakness in design,
  • 8:27 - 8:29
    and this lead to a code-breaking machine,
  • 8:29 - 8:31
    initially designed by the Poles,
  • 8:31 - 8:34
    and later improved by the British-American effort.
  • 8:34 - 8:38
    The Bombe was multiple Enigma rotors chained together,
  • 8:38 - 8:42
    allowing it to rapidly test different key settings.
  • 8:42 - 8:44
    It took advantage of the fact that
  • 8:44 - 8:47
    common words were known to be in the original message,
  • 8:47 - 8:50
    such as weather, and these came to be known as crypts.
  • 8:50 - 8:53
    For a given messaging crypt,
  • 8:53 - 8:54
    the Bombe could scan through
  • 8:54 - 8:58
    all possible rotor positions and orders,
  • 8:58 - 9:02
    in order to find possible key settings in a matter of minutes.
  • 9:02 - 9:03
    This machine allowed the allies
  • 9:03 - 9:07
    to read German commands within hours of them being issued.
  • 9:07 - 9:09
    It was a fatal blow to their combat strategy,
  • 9:09 - 9:13
    as the allies could anticipate their next move.
  • 9:13 - 9:15
    One fact remains,
  • 9:15 - 9:20
    this initial attempts at automating the one time pad failed.
  • 9:20 - 9:22
    If the operators had instead rolled dice
  • 9:22 - 9:25
    to decide their initial rotor positions,
  • 9:25 - 9:26
    the starting points in the sequence
  • 9:26 - 9:30
    could have been uniformly distributed.
  • 9:30 - 9:31
    This would have prevented
  • 9:31 - 9:34
    the reverse engineering of the rotor wirings,
  • 9:34 - 9:35
    and if the Enigma allows the letters to
  • 9:35 - 9:37
    be encrypted to themselves,
  • 9:37 - 9:41
    the Bombe couldn't have taken advantage of crypts,
  • 9:41 - 9:45
    and this would require the allies to check the entire key space,
  • 9:45 - 9:49
    which was impossible even with the fastest computer.
  • 9:49 - 9:52
    Repetition reduced the key space.
  • 9:52 - 9:54
    Otherwise the outcome of World War II
  • 9:54 - 10:01
    could have been drastically different.
Title:
WW2 Enigma Machine
Video Language:
English
Duration:
10:01
Kateřina Halfarová edited English, British subtitles for WW2 Enigma Machine

English, British subtitles

Revisions