Cracking Enigma in 2021 - Computerphile

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии • 2 тыс.

  • @humanNumer1
    @humanNumer1 3 года назад +6040

    Let's honour great Polish mathematicians (Jerzy Różycki, Henryk Zygalski, Marian Rajewski) who broke the first Enigma giving Turning the basis, so they are not erased from history

    •  3 года назад +201

      exactly, this is so overlooked

    • @DunderKlomp
      @DunderKlomp 3 года назад +221

      If you go to Bletchley Park, you'll see their contribution is well-recognized. Gays FTW!

    • @deadcatthinks6725
      @deadcatthinks6725 3 года назад +66

      The 2 Zlote coin has an enigma wheel on one face

    • @Jan-eh7nf
      @Jan-eh7nf 3 года назад +133

      @@DunderKlomp I've been at Bletchley Park Computing Museum 3 years ago and found ZERO (literally) mention about any Polish contribution.

    • @johndavid360
      @johndavid360 3 года назад +41

      * Turing

  • @Liggliluff
    @Liggliluff 3 года назад +2597

    What I take from this video is that, if you get one of them correct, it'll be slightly better.

    • @muizzsiddique
      @muizzsiddique 3 года назад +321

      How many times has he said that throughout the video? I thought I was going crazy.

    • @pies765
      @pies765 3 года назад +161

      Hmm, I think he should have made that more clear honestly, kinda vague.

    • @AlePazzaglia
      @AlePazzaglia 3 года назад +96

      @@pies765 Basically he said that if you get one of them correctly, the IoC will tend to get slightly better

    • @MartinSFesty
      @MartinSFesty 3 года назад +39

      @@AlePazzaglia WHAT?

    • @MoritzvonSchweinitz
      @MoritzvonSchweinitz 3 года назад +40

      Well, yes. That is the most important vulnerability of the Enigma scheme, and the biggest difference to modern schemes.

  • @PhilKulak
    @PhilKulak 3 года назад +3277

    What a testament to Turing's brilliance: it's not even trivial 80 years later.

    • @GapWim
      @GapWim 3 года назад +525

      Indeed. But also to Arthur Scherbius, the inventor of the enigma machine itself: it’s not even trivial 80 years later.

    • @izzyr9590
      @izzyr9590 3 года назад +264

      No joke. I’m a computer science student. After watching “the imitation game” I searched up “how does Enigma work” and I thought “ah it must be so easy to understand and decode now!”. Nope.

    • @kopasdupas
      @kopasdupas 3 года назад +221

      It's an achievement of many people, including Marian Rejewski, who broke the simpler version of Enigma in 1930. His work was then used by Turing & Park as a foundation for newer Enigma in 1941.

    • @projecttitanomega
      @projecttitanomega 3 года назад +305

      Not to mention, Mike could code this up on his laptop, pre-built and bought at a store, in a high-level coding language.
      Turning *built* his computer.
      Imagine not simply having to write the code, but having to also physically construct a machine solely to run it.
      No using pre-built chips, no machine code, no assembly code, no standardization, no reference for building such a machine or any help from other learned people, as at the time, no such machine had ever really been built and there were no people who knew how to build it.
      He was a once in a generation genius.

    • @Sakkura1
      @Sakkura1 3 года назад +98

      @@projecttitanomega The "bomb" computers were a Polish design, not something Turing came up with.

  • @mattiiejwheis1350
    @mattiiejwheis1350 2 года назад +186

    We cracked enigma a few years ago in our class with our teacher and it was so much fun. He really tried to explain everything and we actually understood it. It was such a great feeling to see this video and remember everything I learned

    • @jackass123455
      @jackass123455 Год назад +5

      at my school we had a sort of computer club wher we could play call of duty (the original back IN 04, 05) to gain entry you had to get a password that was encrypted with an enigma machine. the clue was HELP (this was the start postion leters of the wheels) and the plug board was pre defined was kinda fun trying to figure it out

    • @andrewpinedo1883
      @andrewpinedo1883 6 месяцев назад

      Your class was cool.

  • @DeHerg
    @DeHerg 3 года назад +117

    18:30 "In the war the limited messages to something like 200 characters"
    Oh great it's Twitter all over again.

    • @FrVitoBe
      @FrVitoBe 3 года назад

      I 2 try to decipher Twitter messages with enigma for the real message

    • @nickryan3417
      @nickryan3417 3 года назад +1

      Also because having to reliably type and transcribe for transmission a several hundred character message was a serious chore. There were rules about not re-sending the same message, due to errors, however because on occasion this was not adhered to the security was compromised. The smarts of all the people working on decrypting these messages was staggering.

    • @irrelevant_noob
      @irrelevant_noob 3 года назад

      @DeHerg *14:31

  • @Saturate0806
    @Saturate0806 3 года назад +3440

    Someone has to finish Code Bullet's projects...

  • @umka7536
    @umka7536 3 года назад +959

    Dr. Mike Pound is definitely my favorite speaker on the Computerphile. His ability to explain complex problems in a very easy to get way is outstanding.

    • @sammiller6631
      @sammiller6631 3 года назад +21

      Pound's strategy of repeating "if you get one of them correct, it'll be slightly better." over and over might work for you, but the high energy of Professor Moriarty makes for a more engaging Computerphile for me.

    • @lanboost2773
      @lanboost2773 3 года назад +1

      Agreed, it also helps that he talks about more interesting topics imo

    • @EndrewsXeudon
      @EndrewsXeudon 3 года назад +1

      And he saved middle earth!

    • @x0rn312
      @x0rn312 3 года назад +1

      Which one is Professor Moriarty? I'm a big fan of Mike and Dave-but I think they are all great

    • @JohnSmith-pu8rd
      @JohnSmith-pu8rd 3 года назад

      most suspicious too

  • @AlexSchmid-TheAceofSpades
    @AlexSchmid-TheAceofSpades 3 года назад +2028

    " I implemted an enigma machine because it was fun."
    This is the mark of a true programmer.

    • @Warlock_UK
      @Warlock_UK 3 года назад +33

      I mean this is why I'm watching this whole video and am not even slightly bored.

    • @alainbesseleer6516
      @alainbesseleer6516 3 года назад +10

      Haha, I did the same, and it was fun indeed. But I wasn't able the write code to crack Enigma yet. As mentioned in the video, a brute force attack will take too long, even with modern computers.

    • @Hr1s7i
      @Hr1s7i 3 года назад +15

      @@alainbesseleer6516 An average laptop has like what, 4-6 cores? Try this with a basic workstation that has something like 64 cores slugging through the computations at 4ghz. Just based on the amount of alu available and their sheer size given nowadays they can operate with 64 bit values, you can do quite a bit more than you'd assume and it's relatively affordable (for cracking the enigma at least... forget anything short of a chunk from the national budget to crack a decent modern encryption).

    • @PiezPiedPy
      @PiezPiedPy 3 года назад +10

      @@Hr1s7i Even better use compute shaders and a stack of GPU's and you will be looking at thousands of cores to do the work of decryption. Also don't use a sequential brute force.

    • @JorgetePanete
      @JorgetePanete 3 года назад +2

      implemented*

  • @m.cigledy6769
    @m.cigledy6769 3 года назад +417

    One thing that wasn't mentioned was how difficult it would be to decipher if you didn't start out already knowing that it was an enigma cypher.

    • @gezzuzzful
      @gezzuzzful Год назад +12

      you just to steal the machine

    • @Bunny99s
      @Bunny99s Год назад +46

      @@gezzuzzful Well, that's not what he said. Of course knowing how enigma works (i.e. stealing an enigma machine) is the fundament to break the code. The point here is, how do you know if the encrypted message is actually an enigma cypher? Imagine I give you some encrypted message right now. How do you know if this was encrypted with enigma or maybe RSA or AES. Maybe just a simple Caesar cipher or a simple pre-shared-key xor cypher. All your attempts to crack it as if its an enigma cypher would not really help you.

    • @blackjacktrial
      @blackjacktrial Год назад +22

      Also how difficult to decipher it would be if you didn't know what language was encrypted. If you decide Swahili or Martian successfully, it's still useless to you if you can't recognise it.

    • @dj1NM3
      @dj1NM3 Год назад +10

      @@Bunny99s It would be abundantly clear that it wasn't a Caeser-shift cypher, if it's a known English (or American) message which fails the ETOAN frequency test.
      After that, I suspect that it would be a bit of a guessing-game as to what encryption system was used and I doubt that the 5-letter cluster WW2 vintage formatting would be used, as it would most likely be sent as a solid block of characters instead.
      A modern, digital spin on Enigma could use different sized "virtual rotors" and rather than merely 26 positions (just the English letters in one case), could have upper-case, lower-case, numbers 0-9, space and all the commonly used punctuation marks, making rotors with about 70 positions each. Then there's the possibility of eliminating the "tell" of no symbol being encyphered as itself, but whether that's considered to matter when there's now about 24million possible rotor setting combinations from one arrangement of just 4 rotors, compared to the original 4-rotor Naval Enigma with about 0.5million possible rotor setting combination from one arrangement of 26-position rotors. This is also ignoring the "reflector", which doubles the exponent (70^8 or 26^8 instead of "merely" 70^4 or 26^4) by running the circuit back through the rotors.
      I would also hazard a cautious guess that some loon could even construct a physical version of a 70-position rotor machine, just for the heck of it.

    • @operator8014
      @operator8014 Год назад +1

      Lol!

  • @asciimation
    @asciimation 3 года назад +40

    I am glad your code implements the double stepping correctly. As you say implementing Enigma in code is really just array manipulation. I've done a few versions including one in 80s home computer BASIC! The algorithm for Enigma is really quite simple. The Turing/Welchman Bombe, the machine they actually used in WW2 to crack Enigma, is much more complicated. Reverse engineering that, really understanding how it works then making my own was one of my most satisfying projects. Welchman's contribution of the diagonal board to Turing's original design was brilliant. And Welchman was also responsible for coming up with the idea of traffic analysis. I always feel a bit sad that Turing's name is always mentioned but Welchman is nearly unheard of. And yes, as others have rightly pointed out all that work was made possible but the work of the three Polish mathematicians and the Frenchman Bertrand who somehow managed to co-ordinate things between the English, French and Poles. One other difficulty is real Enigma messages were not just plain text. They contained a lot of military jargon and acronyms. Very cool video and well explained, thank you!

    • @20chocsaday
      @20chocsaday 10 месяцев назад +1

      The local library had a book about ciphers in the 1970s. Enigma machines and their post-war sale was also discussed.
      At the back he had written a message which had been through a virtual Enigma machine. He told the readers how to write the program which would decrypt it.

  • @DBProductions12345-m
    @DBProductions12345-m 3 года назад +1168

    Pound is the best speaker on this channel, pound for pound, no contest. Insta watch.

    • @sanferrera
      @sanferrera 3 года назад +23

      He is great! One of my favourites is the one where he cracks passwords. Super interesting!

    • @JanStrojil
      @JanStrojil 3 года назад +33

      I second that. There are some really good speakers here, but he just combines incredible energy, understanding, humour. Love his videos.

    • @TheVergile
      @TheVergile 3 года назад +10

      Rob Miles tho

    • @zukacs
      @zukacs 3 года назад +1

      d

    • @s33wagz
      @s33wagz 3 года назад +5

      Lol, pound for pound

  • @asailijhijr
    @asailijhijr 3 года назад +330

    The fact or property that getting some settings right improves the metrics means that your approach resembles single-pin picking of a lock.

    • @alpardal
      @alpardal 3 года назад +38

      Yep, it also resembles evolution: a big change by itself it's really unlikely, but small accumulative changes make you progress little by little in the right direction

    • @jasonc3a
      @jasonc3a 3 года назад +7

      @@alpardal Lies! Miles don't exist! Everything is inches!

    • @khleta4334
      @khleta4334 3 года назад +73

      This is the Lockpicking Lawyer and what I have for you today is this Enigma...

    • @man100111
      @man100111 3 года назад +19

      @barutaji two is binding...

    • @Alex_Deam
      @Alex_Deam 3 года назад +3

      @@alpardal also hence 'fitness function'

  • @hackcraft_
    @hackcraft_ 3 года назад +377

    "well, the weakness of Enigma is that if we get some of these things right, even if the others are wrong, we get a little bit closer to the answer, usually."

    • @jordananderson2728
      @jordananderson2728 3 года назад +45

      He addresses that at 20:30, mentioning how with a 128-bit or 256-bit encryption, even if you get the first bit correct you'll still have random noise. The fact that Enigma *did* show marked improvement with correctly guessed settings meant that it was inherently insecure to a degree.

    • @martinwragg8246
      @martinwragg8246 3 года назад +6

      Not so obvious if you connect 10 stecker plugs, the IOC will hardly change if you guess 1 plug correctly.
      Without any stecker plugs connected you can crack 100 character text in a few minutes on a laptop.

    • @Execuor
      @Execuor 3 года назад +4

      @@martinwragg8246 fyi Stecker means plug.

    • @martinwragg8246
      @martinwragg8246 3 года назад +2

      @@Execuor thanks, I did know, just what I call them. 😉

    • @modalmixture
      @modalmixture 3 года назад

      Is there a cryptographic term for this property?

  • @zamalek4079
    @zamalek4079 3 года назад +25

    The known plaintext at the beginning was the salute that referenced their leader. His ego ultimately led to enigma being cracked during the war.

    • @yestfmf
      @yestfmf 3 года назад +6

      A great deal of the solution is also from laziness on the part of the germans. Instead of using new codes, they used variations of the same codes. Once the english knew this, they could play with variations and find the key fairly easily.

    • @matthewmayton1845
      @matthewmayton1845 3 года назад +8

      I think the Kriegsmarine did change the codes once and it took the Allies months to decipher again (or was it adding another rotor). Though they never really change the codes afterwards. One of the flaws with the German's was they believed the Allies could not decipher enigma. If they believed the Allies could, the Germans would most likely have changed the codes (assuming they could to begin with). Instead, Germany focused too much on just espionage.

    • @stargazer7644
      @stargazer7644 3 года назад +1

      @@matthewmayton1845 The Enigma codes were changed every day at midnight. The Germans also had a way to do it every hour, but they rarely did that. What you're referring to was when the Navy added a 4th rotor, but by then the codebreaking was so advanced it didn't add much of a problem.

  • @timothyj1962
    @timothyj1962 3 года назад +27

    I worked with something similar in the Army as a Radio Teletype operator. It was called a KW-7. You were handed a slip of paper and on it was pairs of numbers I believe it was 1 to 32. In the KW-7 there was something called the "Block". The block had 32 wires which you would arrange into sockets on the block according to that slip of paper. Once you set these wires in the block, you put the block into the main crypto body, close and lock the lid, then run a system check. In order for it work properly, you would key up the radio, and hold a button for 15 seconds to sync with other receiving stations. At the time, the machine was classified as Confidential, once keyed it was classified as secret. Unfortunately the system was compromised by the Walker Spy Ring. Not only did this group sell the key lists for almost 20 years. But gave them the design specifications. The crypto essentially was rendered ineffective. I was basically out of a job and was reduced in my speciatly as a single channel radio operator. If this interests you. Look up the AN/GRC-142, AN-GRC-122, AN/VSC-2, and the AN/VSC3. Very cool stuff in its time. All museum pieces now. The KW-7 is no longer classified.

  • @ToadyEN
    @ToadyEN 3 года назад +904

    14:36 “I’m lazy”
    - programmes enigma machine decoder in spare time 😂

    • @costa_marco
      @costa_marco 3 года назад +207

      Programmers have a different definition for "laziness": expend 8 hours automating a solution to a job that would take 1 hour to do by hand, just in case you have to do it again in the future. The reasoning: I am lazy... 🤷‍♂️

    • @RealCadde
      @RealCadde 3 года назад +45

      @@costa_marco And that's why programmers are so much more efficient than most others when it comes to doing stuff on computers.
      Your regular guy would manually update a spreadsheet by printing out a list of things that needs to be updated on a piece of paper, tediously going over every entry.
      A programmer would spend 2 hours making an interpreter of the other document to automate that process.
      Instant 20,000% efficiency for the foreseeable future.
      And you'd be amazed at how many there are out there sitting at computer keyboards day in and day out doing it manually.

    • @Anvilshock
      @Anvilshock 3 года назад +17

      @@RealCadde Except xkcd 1319 ;)

    • @taragnor
      @taragnor 3 года назад +19

      Yeah pretty much the first question any programmer asks "Can I get some machine to do this process for me?"

    • @Restil
      @Restil 3 года назад +15

      The laziness he's referring to is not the time spent programming the decoder, but the time he'd have to spend waiting for it to produce a response. 3 rotors takes a few seconds. 5 rotors would take hours or days.

  • @jasonc3a
    @jasonc3a 3 года назад +69

    I love how at 6:50 the transition and lighting makes it look like a whole day has passed while MP has been churning out ciphertext lol

  • @GastevAleksei
    @GastevAleksei 3 года назад +440

    Mike Pound? Enigma machine? Now this video is lit!

  • @reyblais4858
    @reyblais4858 3 года назад +155

    Anytime I hear about Turing, it always makes me sad to think how he was treated after all his accomplishments.

    • @tonytungsten4278
      @tonytungsten4278 2 года назад +3

      Do people without any accomplishments deserve to be treated worse?

    • @technus147
      @technus147 2 года назад +34

      @@tonytungsten4278 than people with accomplishments? yes, otherwise we'd give everyone a nobel prize

    • @jackass123455
      @jackass123455 Год назад

      @@tonytungsten4278 he wasn't treated any beter than anyother homosexual male of the time. the dude was chemically castrated and arrested. eventually (potentially) killing himself via cyanide poisoning.

    • @mr.pavone9719
      @mr.pavone9719 Год назад +5

      ​@@tonytungsten4278Are you a fan of participation trophies?

  • @x0rn312
    @x0rn312 3 года назад +12

    What I love about Professor Pound is that not only is he hilarious - he is also a humble genius

  • @h-0058
    @h-0058 3 года назад +435

    You know that the Enigma Machine was great when it is being talked about even today

    • @iHack-ms5nr
      @iHack-ms5nr 3 года назад +16

      Yes! I'm taking second year ICT, and we were just watching The Imititation Game today (A movie about Turing breaking the Enigma cipher)

    • @xplinux22
      @xplinux22 3 года назад +27

      @@iHack-ms5nr I loved that movie so much. Granted, there was a lot of movie dramatization and some factual liberties taken, but it's a terrific film that does a great job of piquing viewers' interest about cryptography and WWII.

    • @irene1307
      @irene1307 3 года назад +19

      actually, there were much better rotary machines, but nobody talks about them, because they are just not as famous as Enigma.

    • @michaelsommers2356
      @michaelsommers2356 3 года назад +42

      Enigma is talked about so much because its breaking was so importance in the war. There were other, better machines, such as the American SIGABA or the British TYPEX, that are not talked about, because they don't have such a compelling story, and because their details are still secret (or they were the last time I checked).

    • @peterfireflylund
      @peterfireflylund 3 года назад +11

      The Enigma was simple enough to (almost) explain and the breaking of it was declassified a long time ago. The Tunny break was only declassified recently (and it was much more complicated). There was no public information until recently about the British codes (and how easily most of them were broken by the Germans).
      And the Enigma has Turing, of course.

  • @alexrossouw7702
    @alexrossouw7702 3 года назад +52

    Enigma machine: "zmnag ttygt lmrus cd!"
    Alan Turing: "fkxs."

    • @temkin9298
      @temkin9298 3 года назад +1

      Is that possible to decrypte or not?

  • @AlRoderick
    @AlRoderick 3 года назад +106

    I'd love to do the same for the Lorentz cypher. I really want to know more about that, no one talks about it nearly to the same degree as enigma but it was the real challenge that they needed a proper computer to crack.

    • @hotshot17225
      @hotshot17225 3 года назад +14

      Came here to say that! After reading extensively about Lorenz, the process of cracking it and the people involved, I - and excuse me - shat myself upon realization of how incredibly brilliant Bill Tutte (and a lot of others) was.

  • @justincase5228
    @justincase5228 Год назад +2

    A particular collection of jumpers in the front of the machine would result in a characteristic collection of letter-rings: A->W->Z, B->X->Y->E->R, etc. This was one of the contributions of the Poles, they delivered this strategy to the Brits right before Poland was invaded. You could analyze a new day's message like this and hack the jumper settings. This then allowed Turing and team to just focus on the rotor combinations and using the German crib WETTER ("weather") which would appear in the first message of the day at a particular offset.

  • @boredincan
    @boredincan 3 года назад +80

    The Polish then the British mathematicians that cracked Enigma are some of the most amazing thinkers of our time.
    I got lost during this video, but I understood enough to be very impressed. This is the best example of "standing on the shoulders of giants". Awesome all around.

    • @nirfz
      @nirfz 2 года назад

      I know that the polish cracked the code, but i don't know more about it, but while the british mathematicians around Mr. Turing were impressive, they still had the advantage of captured enigmas and captured documents of which rotors to use when. (Not at the start, but it helped them immensely)
      Still i think it was impressive that while here in the video he knew how an enigma machine works and could use his own language, it still took longer than i expected. Now imagine, not knowing how it works (the rotors and plugs and the turning) as well as having to decipher a foreign language. (And then using the Navy version with 6 rotors)

  • @Oodelally
    @Oodelally 3 года назад +24

    Visiting Bletchley park is such a splendid experience

  • @luisfiliperosa7511
    @luisfiliperosa7511 3 года назад +58

    Every video with Dr Mike Pound is absolute bliss. Thanks mate.

  • @krisk7
    @krisk7 3 года назад +106

    Worth noting that they could start guessing about rotors and all because before the war Polish secret service got a hold of one of the first versions of Enigma, then Polish mathematicians (Marian Rajewski) cracked it without computers and shared the machine and algorithms with British secret service. This facilitated immensely breaking subsequent Enigma versions.

    • @john1v6
      @john1v6 3 года назад +13

      Very true. The Polish contribution was important. Rajewski and his colleagues did some great work.

    • @89Sawik
      @89Sawik 3 года назад +26

      I would say was crucial as they provided decrypting algorithm. What Turing did (and it was amazing by itself) was building and electromechanical automaton, which was able to crack codes quick enough to use intercepted intelligence. The third or fourth iteration of enigma's encrypting algorithm become too hard to crack manually.
      In fact some of the first messages cracked by Poles directly predicted war and even Marshall Piłsudski tried to convince Charles de Gaulle to perform attack on Germany, before it will be too late. That may be one of the reasons, why this truth is not spoken widely.

    • @telawiw329
      @telawiw329 3 года назад +20

      Face the truth, Jerzy Rozycki, Henryk Zygalski and Marian Rejewski broke the code, wrote algorithms, then tried to come up with some engineering tools to speed braking code up. All having no knowledge about secret military cutting edge technology at that time, called computers. All what Turing made was to build a machine where the numerical methods and algorithms invented by Poles could be efficiently executed. That how the Allies won the war, then as a "thank you" they sold us out to Stalin. Humiliated Poles not inviting us to the victory parade!!! We like the Chinese do not forget this

    • @MrGoatflakes
      @MrGoatflakes 3 года назад +3

      They also made the first bombe

    • @Ashitaka255
      @Ashitaka255 3 года назад +1

      @@telawiw329 moron. Turing is the father of modern computer science. He's far beyond just an engineer who built a machine. That was Tommy Flowers. Turing didn't use the Polish algorithms.

  • @marjotoska
    @marjotoska 2 года назад +8

    I had a minor heart attack when he said "it took a bit of effort to come up with the code". I've been trying for 2 hrs to finish a substitution cipher and was nowhere near close lmao. There's levels to this and it is humbling to know.

    • @0bits_1
      @0bits_1 2 года назад +2

      Yeah, a couple of years ago I created a small program in C++ that was based on the 'logic' behind Enigma. It took me about a couple of weeks to get it working as intended. In my code, in essence, a string variable would be run through a series of functions (the digital equivalent to the Rotors) that used integers to increment/decrement each character in the string (using the integer as a shift) before passing the variable to the next function, which would repeat the process with a different 'shift', for however many times the user would want to encrypt the string, so that - ultimately - the encrypted text that was put out would be protected by the fact that, A: you could have as many 'Rotors' as required, thereby increasing the number of potential true characters that each letter could decrypt to, and B: were you to successfully decrypt the text once or twice, it would only therefore decrypt to the previously encrypted version of the string and not the true, original plaintext.
      Back then, I created a Decryptor that was configured as a mirror opposite to the Encryptor, with the assumption being that you could only decrypt the text correctly if you had the Decryptor. I didn't know nearly as much as I do nowadays about coding and cryptography (and I STILL wouldn't trust my skills in that department, I'm still barely an amateur).
      However, knowing more about Hacking nowadays, I realise that all you would need to do in order to crack the above-mentioned encryption method would be to analyse the code of the Encryptor and simply create an altered version of it in order to decrypt the text.
      It's a fun thing to try with coding though and I'd highly recommend it to anyone for purely educational purposes in order to practise playing around with integers and variables. Definitely leave hardcore Cryptography to the guys and gals who know their stuff in this field, it's so dangerous if you don't know what you're doing with it.

  • @securatyyy
    @securatyyy 3 года назад +442

    Everyone be really nice to this guy cause he would make a great supervillain.

    • @bokamosokelopang1694
      @bokamosokelopang1694 3 года назад +1

      Dfn

    • @AceDeclan
      @AceDeclan 3 года назад +1

      Why?

    • @crusaderanimation6967
      @crusaderanimation6967 3 года назад +6

      @@AceDeclan Because he seem to be nice and smart so you wouldn't know he is villain until end of movie.

    • @RamansSon
      @RamansSon 2 года назад +4

      @@crusaderanimation6967 because he has a snake pet and the only people who has snake pet are animal lovers or serial killer

  • @darkwinter6028
    @darkwinter6028 3 года назад +47

    The other thing you can reasonably assume; which a modern computer can take advantage of; is that the message will be in German (both in it’s vocabulary and grammar)...

    • @thatcherfreeman
      @thatcherfreeman 3 года назад +13

      One challenge is that a lot of the messages from ww2 had loads of abbreviations and shorthand, so that'd serve to make it more difficult

    • @darkwinter6028
      @darkwinter6028 3 года назад +5

      @@thatcherfreeman To an extent; yes; however much of that can be figured out and added to the dictionary.... for example, dropping vowels.

    • @sircalvin
      @sircalvin 3 года назад +8

      another thing used was plaintext attacking a very famous line at the bottom of most messages, which i wont put here because i dont want youtube flagging this comment

    • @darkwinter6028
      @darkwinter6028 3 года назад +6

      @@sircalvin Yeah... something about hailing the guy in charge... 😉

    • @stephaniesadie832
      @stephaniesadie832 3 года назад

      Many of the american encrypts were translated into Navajo and Lacota beforehand. The Axis never cracked those messages.

  • @sssveny
    @sssveny 3 года назад +11

    Video’s about mike programming for fun are always gold

  • @delzabrown
    @delzabrown 3 года назад +5

    I have no idea how I didn't know this channel existed even though I've been subscribes to numberphile for 3+ years

  • @ragnarsdad6065
    @ragnarsdad6065 3 года назад +74

    there was a project on the BOiNC platform trying to crack Enigma messages using brute force decryption, the messages had been intercepted during the war but never decoded. They did manage to crack a few but it took an awful lot of computer power to do so.

    • @codegeek98
      @codegeek98 3 года назад +2

      I'm sure "an awful lot" back then could be completed in a few days on a single thread of JS running on a semi-smart-phone's toy web browser

    • @ragnarsdad6065
      @ragnarsdad6065 3 года назад +37

      @@codegeek98 The project (enigma@home) managed to decrypt 4 messages using brute force decryption method. it took over 360,000 years of compute power (based on an AMD Athlon Xp 3500+ single thread processor) to decrypt all 4 message.

    • @tomstech4390
      @tomstech4390 3 года назад +2

      @@ragnarsdad6065 were they all done? Os it still going? Have many 6, 8, 16 core cpus spare atm.

    • @f.f.s.d.o.a.7294
      @f.f.s.d.o.a.7294 3 года назад +9

      @@tomstech4390 Just beware the power bill. I used to run Seti@Home, then Boinc aggressively in my business. It was fun. Then I came to appreciate the effect on the power bill.

    • @steemlenn8797
      @steemlenn8797 3 года назад +1

      @@tomstech4390 afaik enigma@home is still running? Even if not there are many math projects on the BOINC network - or other stuff. Like nedicine research.
      You can even get paid in cryptocoins if you use Gridcoin (for most of those projects).

  • @ryhol5417
    @ryhol5417 Год назад +5

    The history of codebreakers, and the skill. It’s amazing. Love the video

  • @jishcatg
    @jishcatg 3 года назад +81

    This reminds me of the movie trope where some malicious program is trying to crack an encryption key and it gets 1 character of the key at a time to progressively find the whole key. I remember this at the end of "War Games" but I think I've seen it many times where "hackers" are trying to infiltrate a system.

    • @mitchellfolbe8729
      @mitchellfolbe8729 3 года назад +19

      And some actor has to shout out, "It has 3 symbols.", "It has 4 symbols. Two more and we're doomed!", etc. with ever greater urgency

    • @kentix417
      @kentix417 2 года назад +1

      That actually didn't happen in War Games. It wasn't cracking one key, it was finding ten different keys, one at a time. It didn't really explain how it was doing that, if I remember correctly.

    • @Muhahahahaz
      @Muhahahahaz Год назад

      Ikr? I’m always like… That’s not how encryption works!
      But apparently it did a long time ago 😅

    • @esmeecampbell7396
      @esmeecampbell7396 Год назад

      ​@@kentix417worryingly the nuclear codes at one point actually was "0000 0000" (because they wanted it to be memorable in an emergency 😂)
      so the computer would have probably got it on its first try...

  • @mceajc
    @mceajc 3 года назад +71

    I now have a slightly better understanding of exactly what Colossus was doing - statistical analysis of cracked code in order to better guess the settings. My admiration of those mathematicians, engineers, linguists and logicians only ever grows.

    • @paulwomack5866
      @paulwomack5866 3 года назад +13

      Colussus was used against Tunny, not Enigma. Enigma cracking was implemented by Turing's Bombe.

    • @mceajc
      @mceajc 3 года назад +6

      @@paulwomack5866 where Tunny = the intercepted code from a Lorentz cipher machine. Highly recommend anyone go to the Bletchley museum of they are in the area. Sadly I went when the computing museum was closed, but the working Colossus machine was whirring about. Superbly knowledgeable your guides, but now I see some of the attacks that can be used, the actual working their behind it makes so much sense.

    • @adamsbja
      @adamsbja 3 года назад +4

      If I remember right what Bombe was doing was plaintext decryption rather than statistical. "Okay, we have a large number of possible combinations, but which ones can deliver the plaintext we think it starts with and not throw any errors down the line?" Then that much smaller subset of combinations would be tested with other analysis and against other messages (remember that they wouldn't change the code for each message so if you cracked one you cracked them all until the code cycled). I don't know if they used the computer for that or went back to doing it by hand once they had a workable subset.

    • @MrGoatflakes
      @MrGoatflakes 3 года назад +2

      @@paulwomack5866 as much as I admire Turing, he did not invent the bombe, the Polish did.

    • @paulwomack5866
      @paulwomack5866 3 года назад +6

      @@MrGoatflakes The Polish invented the bomba, the device used at Blethchley was a more advanced development by Turing and Welch, using the bomba as a basis

  • @kuhluhOG
    @kuhluhOG 3 года назад +15

    If you think about the fact that they made these things ~80 years ago, purely mechanical, carry-able and operateable by an average person, it's kinda incredible.
    Not just that, but there are also 3 things which REALLY helped them to crack it and it was still hard:
    - they sold a (dumbed down) version before the war commercially
    - they needed to captured one
    - after they added more wheels (at some point they kinda noticed and it basically broke the decryption for some time) they needed to capture one again

    • @gcewing
      @gcewing 3 года назад

      That's another thing that's better about modern ciphers. They're still hard to crack even if the enemy has full knowledge of the algorithm. The only thing that needs to be kept secret is the key.

    • @kilijanek
      @kilijanek 3 года назад +2

      Well, not quite. Commercial version was simplified, had less rotors and few minor differences.
      Enigma was cracked in 1933 by Polish mathematicians (French declared it impossible to break, British gave up independent work on breaking encryption and relayed on work of Polish Cipher Bearau). It wasn't decoded in real time, but with few hours/days delay - using Zygalski sheets, by hand.
      When Germany added more rotors, there was a case, when they sent by regular post device to embassy in Warsaw. Thanks to postal service workers (who delayed delivery from Friday to Monday), Poles got like 24h to study new design.
      What is worth mentioning: knowledge how Enigma is operating is not much of a help to break encryption. The most critical part to break encryption was set of rotors, ring settings. Without those it is far more difficult to predict result of encryption.

    • @kuhluhOG
      @kuhluhOG 3 года назад +1

      @@kilijanek that's why I said "dumbed down" version

    • @kilijanek
      @kilijanek 3 года назад +1

      @@kuhluhOG I apologize for my reaction, but I hear far too many times that Turing or US Marines were cause Enigma was broken at all (yeah, too many talks with egocentric Americans T_T )... and that is not true.
      In his genius, Alan Turing automated and improved process of decryption of Enigma - which is a great achievement itself.
      Breaking Enigma predates work done by Turing almost for a decade. Aaaaand ofc, US did almost nothing besides using decrypted messages :D

    • @kuhluhOG
      @kuhluhOG 3 года назад

      @@kilijanek well, the US also built more of the decryption machines, but yeah, the US didn't do anything more

  • @karelvandervelden8819
    @karelvandervelden8819 3 года назад +2

    After having worked later generation machines (KL-7) in the seventies as a navy
    radio-operator I marvel at the simplicity of this explanation. Thanks.

  • @madlad255
    @madlad255 3 года назад +32

    1:05
    Speaker: "Enigma machine"
    Subtitles: "Knitting machine"
    Damn, why are we trying to crack a knitting machine?

    • @Nekuzir
      @Nekuzir 3 года назад +3

      Fun fact, stitch patterns in sewing machines used punch card programming before computers existed

    • @madlad255
      @madlad255 3 года назад +2

      @@Nekuzir Damn, I didn't know that, thanks for the fact!

    • @andrewgoss1682
      @andrewgoss1682 3 года назад +1

      Gram gram been spending too much time making sweaters

  • @TomGalonska
    @TomGalonska 3 года назад +16

    I'd listen to Mike Pound talk about anything CS related. But Mike talking about Enigma: Instant click!

  • @Eagle0600
    @Eagle0600 3 года назад +32

    At 10:47, when you say 26×3, surely you mean 26^3, since each rotor can individually be in one of 26 positions?

    • @merrymonarch
      @merrymonarch 3 года назад

      The number was a colossal, so yes

    • @stargazer7644
      @stargazer7644 3 года назад

      @@merrymonarch Before the introduction of the plug board, there were only 1,054,560 combinations on the original machines. Hardly colossal. It was the addition of the plug board on the military machines that ran it up to 1.5*10^14 combinations.

    • @merrymonarch
      @merrymonarch 3 года назад

      @@stargazer7644 fair point. Collosal is subjective. You're right about the plug board too. I think I read somewhere that if they'd added an extra rota it would have been too much for the computers they had at Bletchley

    • @stanrogers5613
      @stanrogers5613 3 года назад +1

      That is the total number of combinations, yes - but we can "break" one wheel at a time, so we don't need to try all of the combinations. The number of tests required is just 26 per wheel, so 23×3, not 23^3.

  • @ToyotaCharlie
    @ToyotaCharlie 3 года назад +30

    The automatically generated subtitles are killing me 😂 "churning bombs" and "knitting machines" 🙈

  • @youtubevanced4900
    @youtubevanced4900 3 года назад +17

    We always hear about how brilliant Turing and his team were because they were able to crack the code.
    I'd love to see something about the dude that invented it.
    Must of been just as clever to come up with the machine.

    • @vksasdgaming9472
      @vksasdgaming9472 3 года назад +5

      Arthur Scherbius was his name. Machine was patented 1928 and was commercial system. Of course that was its first version.

    • @kreiseltower
      @kreiseltower 3 года назад

      @@vksasdgaming9472 I don't know too much about this. But I assume that you could just take the basic idea and make it arbitrarily more complicated by adding more rotors, plugs etc. that it easily could have been made unsolvable.

    • @vksasdgaming9472
      @vksasdgaming9472 3 года назад

      @@kreiseltower New plugs and rotors were method to make encryption more complex. In practice fact that military communications follows protocol made it easier. If every message begins with or includes known expression it is easier to break. Informally worded messages might have been unsolvable as there simply was no way to guess what there was being said.

  • @kiwidiesel
    @kiwidiesel 2 года назад +24

    I still feel just as dumb after watching this as I did before hand, however it was very interesting.

    • @DasHemdchen
      @DasHemdchen Год назад +1

      He doesn‘t go into details such as how to calculate the IoC, the number of possibilities etc., and how he came to know of the rotor properties (which input generates which output letter) and the notches. Statistical language analysis seems to be the key to solve crypto.

  • @kaydot6889
    @kaydot6889 3 года назад +16

    I was just about to sit down and eat lunch and look what I find in my subscription box... another trip to pound town!

  • @DumblyDorr
    @DumblyDorr 3 года назад +27

    Awesome video! Love getting that kind of accessible explanation :D ... Also, tiny PSA: „Zuse“ is pronounced „tsoo-suh“, not „Zeus“ ;)

  • @MrSb192
    @MrSb192 3 года назад +20

    I had actually implemented the Enigma as well as the Turing Welchman Bombe 2 years ago for a cryptography project in college. Java based. It was fun and frustrating. But I've forgotten mostly how the bombe worked...

    • @melkiorwiseman5234
      @melkiorwiseman5234 2 года назад

      My understanding is that it was an electro-mechanical dedicated computer which tried to "brute force" the encryption key by looking for a recognised sequence of characters in its output. It was made out of dozens of chained telephone-exchange style "uniselectors" which each had 26 positions.

  • @YAZlakhdar
    @YAZlakhdar 3 года назад +135

    Follow up video in 10 years: "Cracking Enigma in 30 milliseconds using brute force on a Quantum Computer"
    Edit: turns out I was probably too conservative, not 30 sec but just a fraction of a second.

    • @DesertCookie
      @DesertCookie 3 года назад +1

      More like one millisecond.

    • @YAZlakhdar
      @YAZlakhdar 3 года назад +4

      @@DesertCookie hopefully 🤗 I'd already be impressed with solving 150,000,000,000,000 combinations in 30 sec, which means 5 trillion combinations per sec... but maybe a 3000 qubits trapped ion quantum computer with no errors could do much better 🤷🏻‍♂️ tbh I have no idea.

    • @draygoes
      @draygoes 3 года назад

      @@YAZlakhdar How weird is it that "with no errors" was the first part of that sentence that didn't register as somehow possible one day?

    • @YAZlakhdar
      @YAZlakhdar 3 года назад +2

      @@draygoes actually very low error rates are already achieved in some Trapped ion QCs with up to 32 fully connected qubits... and we're only in 2021! Imagine what will be achieved in 10-20 years, not to mention further down the line... Think about all the things that people in the 1950's would have deemed impossible, which are now possible or even plain boring for us. I'm sure they'll figure it out ;)

    • @YAZlakhdar
      @YAZlakhdar 3 года назад

      @@DesertCookie actually after looking up the processing power of current state-of-the-art supercomputer, and given the nature of quantum computers, I agree with you that it should be much faster than 30 sec... potentially even a millisecond. Crazy

  • @samuelweller3394
    @samuelweller3394 3 года назад +56

    "Now some people say that there's no way of doing integer factorisation in polynomial time .. but actually ...
    I've implemented that as well"

    • @fischerhansen5647
      @fischerhansen5647 3 года назад +1

      Hahaha :) Yeah, halfway through all his implementations I started to wonder where he got all the time and motivation.

  • @DIREWOLFx75
    @DIREWOLFx75 3 года назад +13

    "this isn't something one does by hand right, not quickly"
    I'll give you one name: Arne Beurling. On his own, without any computation assist, without access to any hardware ( unlike Bletchley park, which had a copy of the early Enigma that was brought out from Poland ), he cracked the Geheimschreiber, which was roughly the Enigma for teleprinters, in 2 weeks.

    • @stephaniesadie832
      @stephaniesadie832 3 года назад +2

      This is true, but to be fair the identicle feat was later replicated by Bill Tutte at Bletchley Park with the Lorenz teleprinter device

  • @NaviYT
    @NaviYT 3 года назад +7

    Thank you, I’ve been waiting for someone to make a video about doing this in modern times, with better computing. Literally perfect!

  • @OElitecorp
    @OElitecorp 3 года назад +12

    I wrote my undergraduate dissertation on ciphertext only cryptanalysis of the enigma machine. Wrote a tool in Java to perform it too. Was a really fun project, such interesting history - helped living in Bletchley too!

  • @dowskivisionmagicaloracle8593
    @dowskivisionmagicaloracle8593 3 года назад +1

    Videos like this are why I love the computerphile channel!

  • @michaelkayser4194
    @michaelkayser4194 Год назад +2

    I haven't finished watching the video yet but around 11:20 you're referring to "26 x 3" multiple times -- surely though this should be "26 ^ 3", in other words, if there are 26 valid configurations of a rotor, and three rotors to configure, the total number of configurations is 26 x 26 x 26?
    The video is awesome just wanted to point that out (or maybe I'm missing something).

  • @PiezPiedPy
    @PiezPiedPy 3 года назад +173

    The way Alan was treated at the time was absolutely disgusting, especially after what he had done.

    • @jag1963
      @jag1963 3 года назад +21

      Britains most shameful hour for sure.

    • @evilcanuck
      @evilcanuck 3 года назад +34

      @@jag1963 i don't know owning slaves and the genocide of the indigenous peoples of the Americas is pretty up there

    • @tomx641
      @tomx641 3 года назад +8

      @@evilcanuck Those things were done by people who live in the Americas, not Britain.

    • @evilcanuck
      @evilcanuck 3 года назад +17

      @@tomx641 who came from Britain

    • @ComicGladiator
      @ComicGladiator 3 года назад +9

      @@evilcanuck Are you self-hating, or do you come from people without sin?

  • @astropgn
    @astropgn 3 года назад +191

    Moral of the story: Use enigma only if you want to encrypt your tweets.

    • @emoulson
      @emoulson 3 года назад +7

      And only really tweets before the character count was doubled

    • @yosefmacgruber1920
      @yosefmacgruber1920 3 года назад +9

      Twitter is pretty much pointless now without President Trump's tweets.

    • @gayMath
      @gayMath 3 года назад +7

      @@yosefmacgruber1920 ???

    • @yosefmacgruber1920
      @yosefmacgruber1920 3 года назад +3

      @@gayMath
      Twitter and FB should be banned for their evil censorship. Or seized and turned into a utility. Did you not know about Twitter censoring truth-tellers, President Trump, and tampering with elections? Twitter has already been banned in a few countries due to that.

    • @papakaruuu6119
      @papakaruuu6119 3 года назад +16

      @@yosefmacgruber1920 wtf are you smoking i want some

  • @january1may
    @january1may 3 года назад +33

    Sounds like Enigma decryption is the kind of thing where an evolutionary/genetic algorithm would work _really_ well. I wonder if anyone had tried that yet - it has to be an interesting experiment!

    • @gschadalavada8980
      @gschadalavada8980 Год назад

      Hi I’m curious, what are those algorithms you’ve mentioned?

    • @marcelreiter181
      @marcelreiter181 Год назад

      ​@@gschadalavada8980 Usually you start with a bunch of algorithms which are just guessing. However, some will guess better than others. Keep the better ones, mutate their guesses (automatically) a little and repeat, until you have one you're happy with. Just youtube them, there's lots of really cool videos on them :)

    • @jjoganic
      @jjoganic Год назад

      In effect, he is doing precisely that by hand. Notice that he mentioned fitness functions specifically. Whereas the GA would be evaluating the entire solution space starting from a random draw and fiddling with the details, the presenter has chosen to stage the work such that he can evaluate one entire domain comprehensively before moving on to the next one. You could do that with a GA as well, and in my experience, it would converge to the proper solution faster than if you did the whole solution in one pass.

  • @maddogmorgan1
    @maddogmorgan1 Год назад +1

    When I was Signals Corps back in the dim dark days we used OTLP's then encrypted that for transmission don't think all the computers in the world will help break that.

  • @victoryfirst2878
    @victoryfirst2878 3 года назад

    This has to be the best explanation of the Enigma machine I have seen so far. Well done fella.

  • @EddiePedalo
    @EddiePedalo 3 года назад +3

    You just explained how to crack the enigma code, in under 20 minutes, to me, who failed GCSE maths, and I understood all of it. That is more impressive than cracking the code. Bravo.

  • @Iris-jw3ci
    @Iris-jw3ci 3 года назад +5

    Everyone always forgets Marian rejewski who cracked the enigma BEFORE ALLEN TURING

  • @baldeepbirak
    @baldeepbirak 3 года назад +11

    Great explanation of the process involved. Shows how hard it was back in the day.

    • @BillAnt
      @BillAnt Год назад

      Indeed, and it was all done with mechanical wheels, yet it was and still is pretty effective if done properly.

  • @motabarjavaid5482
    @motabarjavaid5482 3 года назад +1

    Mike is the reason I subscribed to Computerphile. Love the way of his explanation

  • @jeffdege4786
    @jeffdege4786 Год назад +2

    The plug board is static, as in it doesn't change from one character to the next. The result is that the plug board applies a simple substitution to the input and the output of the rotors. Which means that they have no effect on the IoC.

    • @schmetterling4477
      @schmetterling4477 Год назад

      Yes, it's just obfuscation and therefor not secure, even though 13! gives approx. 6 billion plugboard combinations. That sounds a lot and probably provides a false sense of security to the occasional user. I am pretty sure, however, that the designers were aware of the flaw.

  • @NiekNooijens
    @NiekNooijens 3 года назад +23

    I'm just wondering.
    Can you brute-force all combinations fast enough in parallel using a GPU? Cause you're basically doing the same program (decrypting using a random setting, then calculating the output's "quality") millions of times.
    So an Nvidia 3090 has 10496CUDA-cores and can boost up to 1.7GHz. Lets assume you can do a bruteforce attempt per 4 clock-cycles per-cuda-core. then you're already guessing 4,460,800,000,000 guesses each second.
    I think you could easily try every combination in under a day...

    • @duffman18
      @duffman18 Год назад +2

      He's said in other videos that they do indeed use high end graphics cards for this, in fact they have tons of them all working at the same time, together, in a big server. Dunno how you do that, get graphics cards to link with each other like that. But yeah he's said that's what they do, at that university. And so different classes and groups and academics have to book a time slot when they can use the dozens of graphics cards in parallel to brute force something or to use a more sophisticated method to crack a code or to model a complex system like the weather, or anything like that that academics do. The physicists use them a lot too, to model systems like perhaps individual atoms and things like that. Which makes a lot of sense, considering they computer science was originally a branch of physics, and remained there way for decades until the 70s and 80s where computer science began being seen as a separate subject altogether. But yeah, it's still linked heavily with physics.

    • @thomaswalder4808
      @thomaswalder4808 11 месяцев назад +1

      @@duffman18 "Dunno how you do that, get graphics cards to link with each other like that. "
      They not have to be linked if brute force is used. Each graphic card can work on a distinct subrange of the possible settings without the need to communicate with other graphic cards

  • @ynotnilknarf39
    @ynotnilknarf39 3 года назад +6

    I used to visit an elderly chap who worked for BTM in Letchworth right at the start of WWII as a design engineer (possibly not the correct job description), he knew 'Doc' Keen and Edward Travis for sure.
    He lived here all his life, went on to be a senior manager for ICL.
    All we have left of 1/1 is in the name of two of the residential streets on the old site where the Bombes were made, that being Pascal Way and Tabbs Close.
    He was still very guarded about his work there right up to his death only a few years ago at the age of 98, absolte gent he was and played down his efforts.

  • @T33K3SS3LCH3N
    @T33K3SS3LCH3N 3 года назад +7

    "Let's look very briefly at what a knitting machine is" - thanks subtitles.

  • @ju2705s
    @ju2705s 2 года назад +1

    How difficult would it be for 80 years and without to know the logical behavier of the enigma and the fact, that the comfig can change at any time and you have not the time to analyse. I am deeply impressed of this technology.

    • @RedwoodRhiadra
      @RedwoodRhiadra 2 года назад +1

      Fortunately, they knew how the Enigma *worked* - there was a civilian version available commercially before the war, and they captured plenty of the military machines in the early months, since essentially every unit had one. So it was mostly a matter of figuring out how to break the daily settings quickly.
      The Lorentz machine (aka the Tunny cipher), though, was only used between secure high command centers, and none of them were captured or even seen by the Allies until very late in the war or afterwards. *That* one they had to work out from first principles and statistical analysis (and a mistake by one of the operators sending *almost* the same message twice with the same key.) And then they had to build Colossus to break the changing keys.

  • @ImNotGam
    @ImNotGam 3 года назад

    The CodeBullet video we were waiting for

  • @markwilliams5654
    @markwilliams5654 3 года назад +213

    how ironic they sent Alan to prison and now he's on a bank note

    • @Snagabott
      @Snagabott 3 года назад +60

      I wonder which ones of our moral panics will seem unjust to viewers 70 years hence.

    • @ComicalFlask
      @ComicalFlask 3 года назад +26

      @@Snagabott - Factory farming

    • @gianluca.g
      @gianluca.g 3 года назад +29

      @@Snagabott Assange case

    • @memeier9894
      @memeier9894 3 года назад +7

      Too many to name...

    • @kgb4150
      @kgb4150 3 года назад +18

      @@Snagabott Social justice, probably

  • @NuclearCraftMod
    @NuclearCraftMod 3 года назад +8

    Great idea for a video! I had been thinking about this in the past, but wasn't actually sure how to test it or even categorise the strengths or weaknesses of Enigma in modern cryptographic terms.

  • @baomao7243
    @baomao7243 3 года назад +7

    The “sequential” cracking of PINs or codes is always shown in spy thriller movies. It always bugged me because I thought, “Get real. Is there ANY security system that actually allows that?” Now I know !!
    GREAT video explanation. TGFH* .
    (* Thank Goodness For Hashing!)

  • @Nightcorehardy
    @Nightcorehardy 3 года назад +1

    The code bullet video we've been waiting for.....

  • @JonTheGeek
    @JonTheGeek 2 года назад

    Alan Turing would be proud. I'm sad I missed this being uploaded on my birthday! I was probably in blechly for this.

  • @transkryption
    @transkryption 3 года назад +3

    You didn't participate in enigma@home? The distributed computing project to crack the last 3 undecrypted enigma messages?
    It's finished now though.

  • @nicolasmiller1915
    @nicolasmiller1915 3 года назад +6

    If you find this interesting, give “The Code Book” by Simon Singh a read.

  • @drskelebone
    @drskelebone 3 года назад +39

    It'd be great to do a follow up talking about how to correct things. If you know "JBROPOSE" should be "IPROPOSE", can you feed that back through the system to correct the solution more? I'm wondering about how that error propagates to later strings, where the true words aren't as obvious.

    • @whiteraven2149
      @whiteraven2149 3 года назад +6

      I could be wrong, but just swapping the plugboard configuration might help. So in your example just connect I to J and B to P

    • @thecakeredux
      @thecakeredux 3 года назад +4

      He mentioned that, knowing the plain text, he can put it in and it "pretty much breaks through it right away". Now what he doesn't specify is if the entire plain text needs to be known or if pieces are enough, but I suspect pieces would be enough already. Knowing more and more actually present letters of the message improves the accuracy of the statistical methods.

    • @vdinh143
      @vdinh143 3 года назад +1

      @@thecakeredux knowing pieces of the plaintext is enough because the entire encryption rule applies both to that segment of plaintext as well as the rest of it. Knowing the plaintext does break Enigma, and how you come to know that plaintext (be it espionage or random struck of luck) is irrelevant.

    • @mrfrenzy.
      @mrfrenzy. 3 года назад

      You just need to go through the rotor settings again with the correct plugboard.

    • @michaelarmer256
      @michaelarmer256 3 года назад

      i suspsect leaving the computer to it these days if the code is all there having a human going in and checking it and saying no that must be that might be slower but maybe at that first point a human or an ai might do a better job of guessing the correct text than running the scrip to find the actual correct words.

  • @mitch3384
    @mitch3384 10 месяцев назад

    I haven't seen that printer paper in a loooong time.. that brings back some very warm, fuzzy memories.

  • @pepesworld2995
    @pepesworld2995 3 года назад

    man i'm really enjoying this. its great how the hiezenburg uncertainty principal pops up everywhere: short message means you dont have enough information on the frequencies of letters.

  • @aceroadholder2185
    @aceroadholder2185 3 года назад +10

    As an example of Enigma being difficult to break if the message is no longer than 50-60 characters there are still U-Boat messages that have never been broken. A short message along with the Kreigsmarine Enigma machines that added an additional rotor are very difficult to decipher.

    • @thepuzzlebox6620
      @thepuzzlebox6620 3 года назад

      There was nothing preventing them from manually scrambling their messages on top of the Enigma encoding. All it would take is a manual alphabet switching system that changes based on the number of messages that have been sent.
      Turing could never have accounted for it.

    • @stanrogers5613
      @stanrogers5613 3 года назад +6

      Part of the problem with U-boat Enigma messages is that they weren't merely enciphered, they were also encoded. That is, the original message won't necessarily contain _any_ plaintext, so there's no way to know when you've deciphered it.

  • @hikaru-live
    @hikaru-live 3 года назад +23

    I think there are still a few Enigma messages left undecrypted out there. This approach may be used, with plugboard implemented, to crack those and give a more complete image of WW2.

    • @keziahradley5897
      @keziahradley5897 2 года назад +1

      If you find any give 'em to me xD I built my own version of this, might be fun :)

    • @LakadMatatag2702
      @LakadMatatag2702 2 года назад

      All of the undecrypted Enigma messages have been decoded.

  • @xoblyxanier
    @xoblyxanier 3 года назад +4

    That seems to be the most uncomfortable chair ever!
    Great video though ;)

  • @gizmostudioshd
    @gizmostudioshd 3 года назад

    I'm not smart enough to understand half of whats going on, but for whatever reason, it fascinates me and gets me hooked, watching the whole thing.

  • @chrismayer3919
    @chrismayer3919 Год назад +1

    Sounds like a overly complicated Occams Razor method for the process of elimination. (Keep firing, and you’ll eventually hit the bullseye)

  • @gwaptiva
    @gwaptiva 3 года назад +25

    wasn't the 3-rotor enigma cracked by the Polish?

    • @michaelsommers2356
      @michaelsommers2356 3 года назад +9

      Yes, in 1932. But a change the Germans made in 1938 rendered their procedure ineffective.

    • @wernerviehhauser94
      @wernerviehhauser94 3 года назад +4

      Look up Marian Rejewski

  • @KuittheGeek
    @KuittheGeek 3 года назад +3

    I'm definitely going to start using the phrase, "How English is this?" when correcting grammar. I love the concept of how close is something to a language and just referring to it as "How language is this?". This was a great video. Very informative.

    • @oooBASTIooo
      @oooBASTIooo 3 года назад

      This has nothing to do with grammar. The Index of coincidence is obviously all about how the words are written, i.e. the syntax.

  • @ajrhodes3262
    @ajrhodes3262 3 года назад +8

    I’ve actually used an enigma machine, not a kit, a real one!! The NSA brought one to a cyber camp I did when I was a teenager!! It was actually really cool!! Cheers!!

    • @michaelsommers2356
      @michaelsommers2356 3 года назад +2

      They have one on display that you can type on in the National Cryptologic Museum outside DC.

    • @ajrhodes3262
      @ajrhodes3262 3 года назад

      @@michaelsommers2356 yeah, they had a pretty cool one 🙂🙂

    • @Robstafarian
      @Robstafarian 3 года назад +1

      Much as I love computers and cryptography, I feel quite strongly that the NSA should be kept away from children.

  • @diegosolis9681
    @diegosolis9681 3 года назад

    This can could narrate paint drying and still make it exciting! What a talent for teaching!

  • @RetroRobotRadio
    @RetroRobotRadio 3 года назад

    I once had an Enigma simulator program for my Commodore 64. This wasn't a program meant to break an Enugma code, but it did simulate and Enigma machine. It came on a floppy disk that was part of a magazine subscription to Loadstar.

  • @darthollie
    @darthollie 3 года назад +27

    New drinking game - every time he mentions the fact that getting it slightly right yields somewhat comprehensible results instead of random nonsense, you drink

    • @guyh3403
      @guyh3403 3 года назад +3

      I treid tooo listn bt gott ddrnk...

    • @sharkuc
      @sharkuc 3 года назад +6

      @@guyh3403 Looks like you've almost got your rotor/plugboard settings right. Keep going.

    • @djmips
      @djmips 3 года назад

      You did learn that bit though didn't you. XD

  • @danielstephenson7558
    @danielstephenson7558 3 года назад +5

    Great video. Would love a tutorial to recreate the Enigma Machine in code.
    Code Bullet started one but never finished it.

  • @tensevo
    @tensevo 2 года назад +5

    Lessons for thought:
    Authorities tried to "cancel" Turing.
    Turing went "off script" (rogue) in order to protect the fact it had been cracked.
    Brilliant story

  • @HackCart
    @HackCart 2 года назад

    Why nobody is honouring scientists who made Enigma. What a brilliance it was.

  • @rustycherkas8229
    @rustycherkas8229 2 года назад

    The "space" of possible Enigma configurations is huge (some sources suggest 159 quadrillion possibilities).
    Much is made of Enigma's "reflector flaw" that precluded any letter coding to itself.
    Exploiting this "flaw" to prune away vast tracts of the possibility space and reduce the search space for the device configuration seems to be significant.
    Preparation of a "payload message" (in either direction) was not a trivial operation (using predefined coded terms, using "XX" for SP, etc.)
    Imagine the day's "Grundstellung" also included a few small numbers (eg: 5, 9, 7) that were different each day.
    Imagine the enciphering officer circles these letters of the message: the 5th (+5), 14th (+9), 21st (+7), 26th (+5) and so on to the end of the message.
    Imagine that, while using the device, any circled letter bypasses Enigma, being copied unaltered from input to output.
    Thus, some letters of any message WOULD represent themselves; "A" --> "A"... There'd have been no flaw to exploit to shrink the possibility space...
    I would appreciate comments on this (seemingly trivial) procedural alteration to how Enigma ciphers may have been made more uncrackable (in the 1940s)...

  • @lucidmoses
    @lucidmoses 3 года назад +7

    This episode was fantastic. I wonder if using a modern GPU would be better. Each core doing a set and testing them.

  • @lombardind
    @lombardind 3 года назад +13

    Every time he finishes a sentence he adjusts his right shoulder. I can't stop watching that.

    • @djmips
      @djmips 3 года назад +1

      haha, it's his energy, he can't wait to stop talking and start writing / coding.

  • @mschorer
    @mschorer 3 года назад +3

    The enigma is a very clever piece of gear. I programmed one for the iPad and for that had to dive deep into the mechanics of that maschine. The weak point was the switch board which the Germans put in to make it more secure. The contrary was the case.

  • @AustralianMurderTurtle
    @AustralianMurderTurtle 2 года назад

    I appreciate how the subtitles declared it a knitting machine.

  • @apersonaplace
    @apersonaplace 3 года назад +1

    I swear I could listen to this dude talk about anything for 4+ hours.