Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Cryptanalysis of the Enigma
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Operating shortcomings=== Apart from some less-than-ideal inherent characteristics of the Enigma, in practice the system's greatest weakness was the large numbers of messages and some ways that Enigma was used. The basic principle of this sort of enciphering machine is that it should deliver a stream of transformations that are difficult for a cryptanalyst to predict. Some of the instructions to operators, and operator sloppiness, had the opposite effect. Without these operating shortcomings, Enigma would almost certainly not have been broken.<ref>{{Harvnb|Churchhouse|2002|p=122}}</ref> The shortcomings that Allied cryptanalysts exploited included: * The production of an early Enigma training manual containing an example of plaintext and its genuine ciphertext, together with the relevant message key. When Rejewski was given this in December 1932, it "made [his reconstruction of the Enigma machine] somewhat easier".<ref name="Rejewski84P243"/> * Repetition of the message key as described in [[#Rejewski's characteristics method|Rejewski's characteristics method]], above. (This helped in Rejewski's [[Marian Rejewski#Solving the wiring|solving Enigma's wiring]] in 1932, and was continued until May 1940.) * Repeatedly using the same stereotypical expressions in messages, an early example of what Bletchley Park would later term [[crib (cryptanalysis)|cribs]]. Rejewski wrote that "... we relied on the fact that the greater number of messages began with the letters ''ANX''—German for "to", followed by ''X'' as a spacer".<ref>{{Harvnb|Rejewski|1984c|pp=243–44}}</ref> * The use of easily guessed keys such as ''AAA'' or ''BBB'', or sequences that reflected the layout of the Enigma keyboard, such as "three [typing] keys that stand next to each other [o]r diagonally [from each other]..."<ref>{{Harvnb|Rejewski|Woytak|1984b|p=235}}</ref> At Bletchley Park such occurrences were called ''cillies''.<ref name="David Kahn 1991 p. 113">{{Harvnb|Kahn|1991|p=113}}</ref><ref>{{Harvnb|Sebag-Montefiore|2004|p=92}}</ref> Cillies in the operation of the four-rotor ''Abwehr'' Enigma included four-letter names and German obscenities. Sometimes, with multi-part messages, the operator would not enter a key for a subsequent part of a message, merely leaving the rotors as they were at the end of the previous part, to become the message key for the next part.<ref>{{Harvnb|Copeland|2004|p=235}}</ref> * Having only three different rotors for the three positions in the scrambler. (This continued until December 1938, when it was increased to five and then eight for naval traffic in 1940.) * Using only six plugboard leads, leaving 14 letters ''unsteckered''. (This continued until January 1939 when the number of leads was increased, leaving only a small number of letters unsteckered.) Other useful shortcomings that were discovered by the British and later the American cryptanalysts included the following, many of which depended on frequent solving of a particular network: * The practice of re-transmitting a message in an identical, or near-identical, form on different cipher networks. If a message was transmitted using both a low-level cipher that Bletchley Park broke by hand, and Enigma, the decrypt provided an excellent crib for Enigma decipherment.<ref>{{Harvnb|Alexander|c. 1945}} "Background" Para. 38</ref> * For machines where there was a choice of more rotors than there were slots for them, a rule on some networks stipulated that no rotor should be in the same slot in the scrambler as it had been for the immediately preceding configuration. This reduced the number of wheel orders that had to be tried.<ref>{{Harvnb|Bauer|2007|p=441}}</ref> * Not allowing a wheel order to be repeated on a monthly setting sheet. This meant that when the keys were being found on a regular basis, economies in excluding possible wheel orders could be made.<ref name="Taunt 1993 108">{{Harvnb|Taunt|1993|p=108}}</ref> * The stipulation, for Air Force operators, that no letter should be connected on the plugboard to its neighbour in the alphabet. This reduced the problem of identifying the plugboard connections and was automated in some Bombes with a Consecutive Stecker Knock-Out (CSKO) device.<ref>{{Harvnb|Budiansky|2000|p=240}}</ref> * The sloppy practice that [[John Herivel]] anticipated soon after his arrival at Bletchley Park in January 1940. He thought about the practical actions that an Enigma operator would have to make, and the short-cuts he might employ. He thought that, after setting the alphabet rings to the prescribed setting, and closing the lid, the operator might not turn the rotors by more than a few places in selecting the first part of the indicator. Initially this did not seem to be the case, but after the changes of May 1940, what became known as the [[Herivel tip]] proved to be most useful.<ref name="David Kahn 1991 p. 113"/><ref>{{Harvnb|Welchman|1997|pp=98–100}}</ref><ref>John Herivel, cited by {{Harvnb|Smith|2007|pp=50–51}}</ref> * The practice of re-using some of the columns of wheel orders, ring settings, or plugboard connections from previous months. The resulting analytical short-cut was christened at Bletchley Park ''Parkerismus'' after Reg Parker, who had, through his meticulous record-keeping, spotted this phenomenon.<ref>{{Harvnb|Welchman|1997|pp=130, 131, 167}}</ref> * The re-use of a permutation in the German Air Force METEO code as the Enigma ''stecker'' permutation for the day.<ref>{{Harvnb|Bauer|2007|p=442}}</ref> [[Mavis Lever]], a member of [[Dilly Knox]]'s team, recalled an occasion when there was an unusual message, from the Italian Navy, whose exploitation led to the British victory at the [[Battle of Cape Matapan]]. {{blockquote|The one snag with Enigma of course is the fact that if you press ''A'', you can get every other letter but ''A''. I picked up this message and—one was so used to looking at things and making instant decisions—I thought: 'Something's gone. What has this chap done? There is not a single ''L'' in this message.' My chap had been told to send out a dummy message and he had just had a fag [cigarette] and pressed the last key on the keyboard, the ''L''. So that was the only letter that didn't come out. We had got the biggest crib we ever had, the encypherment was ''LLLL'', right through the message and that gave us the new wiring for the wheel [rotor]. That's the sort of thing we were trained to do. Instinctively look for something that had gone wrong or someone who had done something silly and torn up the rule book.<ref>{{Harvnb|Smith|2007|pp=59, 60}}</ref>}} Postwar debriefings of [[German code breaking in World War II|German cryptographic specialists]], conducted as part of project [[TICOM]], tend to support the view that the Germans were well aware that the un-steckered Enigma was theoretically solvable, but thought that the steckered Enigma had not been solved.{{sfn|Huttenhain|Fricke|1945|pp=4,5}}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)