Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Bomba (cryptography)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Polish decryption device}} {{about|the Polish decryption device|the later British decryption device at Bletchley Park|Bombe}} [[File:Bomba full.jpg|thumb|Diagram of Rejewski's cryptologic bomb. For clarity, only one set of three rotors is shown (1); in reality, there were six such sets. An electric motor (2) turns the rotors. 3: Switches.]] {{Cipher Bureau}} The '''''bomba''''', or '''''bomba kryptologiczna''''' (Polish for "'''bomb'''" or "'''cryptologic bomb'''"), was a special-purpose machine designed around October 1938 by [[Cipher Bureau (Poland)|Polish Cipher Bureau]] cryptologist [[Marian Rejewski]] to break German [[Enigma machine|Enigma-machine]] ciphers. ==Etymology== How the machine came to be called a "bomb" has been an object of fascination and speculation. One theory, most likely apocryphal, originated with Polish engineer and army officer Tadeusz Lisicki (who knew Rejewski and his colleague [[Henryk Zygalski]] in wartime Britain but was never associated with the [[Biuro Szyfrów|Cipher Bureau]]). He claimed that [[Jerzy Różycki]] (the youngest of the three Enigma cryptologists, and who had died in a Mediterranean passenger-ship sinking in January 1942) named the "bomb" after an [[Bombe glacée|ice-cream dessert]] of that name. This story seems implausible, since Lisicki had not known Różycki. Rejewski himself stated that the device had been dubbed a "bomb" "for lack of a better idea".<ref>[[Marian Rejewski]], "Appendix D: How the Polish Mathematicians Broke Enigma" in {{harvp|Kozaczuk|1984|p=267}}.</ref> Perhaps the most credible explanation is given by a Cipher Bureau technician, Czesław Betlewski: workers at B.S.-4, the Cipher Bureau's German section, christened the machine a "[[bomb]]" (also, alternatively, a "[[washing machine]]" or a "[[Mangle (machine)|mangle]]") because of the characteristic muffled noise that it produced when operating.{{sfnp|Kozaczuk|1984|p=63, note 1}} A top-secret U.S. Army report dated 15 June 1945 stated: {{blockquote|A machine called the "[[bombe]]" is used to expedite the solution. The first [[machine]] was built by the Poles and was a hand operated multiple enigma machine. When a possible solution was reached a part would fall off the machine onto the floor with a loud noise. Hence the name "bombe".<ref>{{cite web |url=http://www.codesandciphers.org.uk/documents/bmbrpt/bmbpg001.HTM |archive-url=https://web.archive.org/web/20090722155542/http://www.codesandciphers.org.uk/documents/bmbrpt/bmbpg001.HTM |archive-date=2009-07-22 |url-status=dead |title=The US 6812 Division Bombe Report Eastcote 1944 |website=Codesandciphers.org.uk}}</ref> }} The U.S. Army's above description of the Polish ''bomba'' is both vague and inaccurate, as is clear from the device's description at the end of the second paragraph of the "[[Bomba (cryptography)#History|History]]" section, below: "Each bomb... essentially constituted an ''electrically powered'' aggregate of ''six'' Enigmas..." Determination of a solution involved no disassembly ("a part... fall[ing] off") of the device. ==Background== The German Enigma used a combination [[key (cryptography)|key]] to control the operation of the machine: rotor order, which rotors to install, which ring setting for each rotor, which initial setting for each rotor, and the settings of the ''stecker'' plugboard. The rotor settings were trigrams (for example, "NJR") to indicate the way the operator was to set the machine. German Enigma operators were issued lists of these keys, one key for each day. For added security, however, each individual message was encrypted using an additional key modification. The operator randomly selected a trigram rotor setting for each [[message]] (for example, "PDN"). This message key would be typed twice ("PDNPDN") and [[encrypt]]ed, using the daily key (all the rest of those settings). At this point each operator would reset his machine to the message key, which would then be used for the rest of the message. Because the configuration of the Enigma's rotor set changed with each depression of a key, the repetition would not be obvious in the [[ciphertext]] since the same [[plaintext]] letters would encrypt to different ciphertext letters. (For example, "PDNPDN" might become "ZRSJVL.") This procedure, which seemed reasonably secure to the Germans, was nonetheless a [[cryptography|cryptographic]] malpractice, since the first insights into Enigma encryption could be inferred from seeing how the same character string was encrypted differently two times in a row. ==History== [[File:Enigma-plugboard.jpg|thumb|Enigma's plugboard, with two cables connected (ten were used during [[World War II]]). This enhancement greatly increased the system's security.]] {{EnigmaSeries}} Using the knowledge that the first three letters of a message were the same as the second three, Polish mathematician–[[cryptologist]] [[Marian Rejewski]] was able to determine the internal wiring of the Enigma machine and thus to reconstruct the logical structure of the device. Only general traits of the machine were suspected, from the example of the commercial Enigma variant, which the Germans were known to have been using for diplomatic communications. The military versions were sufficiently different to present an entirely new problem. Having done that much, it was still necessary to check each of the potential daily keys to break an encrypted message (i.e., a "ciphertext"). With many thousands of such possible keys, and with the growing complexity of the Enigma machine and its keying procedures, this was becoming an increasingly daunting task. In order to mechanize and speed up the process, Rejewski, a civilian mathematician working at the Polish General Staff's Cipher Bureau in [[Warsaw]], invented the ''"bomba kryptologiczna"'' (cryptologic bomb), probably in October 1938. Each bomb (six were built in Warsaw for the Cipher Bureau before September 1939) essentially constituted an electrically powered aggregate of six Enigmas and took the place of some one hundred workers.<ref>Marian Rejewski, "Appendix E: The Mathematical Solution of the Enigma Cipher" in {{harvp|Kozaczuk|1984|p=290}}.</ref> The bomb method was based, like the Poles' earlier [["grill" method]], on the fact that the plug connections in the commutator ("plugboard") did not change all the letters. But while the grill method required unchanged ''pairs'' of letters, the bomb method required only unchanged letters. Hence it could be applied even though the number of plug connections in this period was between five and eight. In mid-November 1938, the bombs were ready, and the reconstructing of daily keys now took about two hours.<ref>Marian Rejewski, "Appendix C: Summary of Our Methods for Reconstructing ENIGMA and Reconstructing Daily Keys, and of German Efforts to Frustrate Those Methods in {{harvp|Kozaczuk|1984|p=242}}.</ref> Up to July 25, 1939, the Poles had been breaking Enigma messages for over six and a half years without telling their [[France|French]] and [[United Kingdom|British]] [[Allies of World War II|allies]]. On December 15, 1938, two new rotors, IV and V, were introduced (three of the now five rotors being selected for use in the machine at a time). As Rejewski wrote in a 1979 critique of appendix 1, volume 1 (1979), of the official history of ''British Intelligence in the Second World War'', "we quickly found the [wirings] within the [new rotors], but [their] introduction [...] raised the number of possible sequences of drums from 6 to 60 [...] and hence also raised tenfold the work of finding the keys. Thus the change was not qualitative but quantitative. We would have had to markedly increase the personnel to operate the bombs, to produce the [[perforated sheets]] (60 series of 26 sheets each were now needed, whereas up to the meeting on July 25, 1939, we had only two such series ready) and to manipulate the sheets."<ref name = Rejewski80>{{cite journal |author=Marian Rejewski |title=Remarks on Appendix 1 to ''British Intelligence in the Second World War'' by F. H. Hinsley |translator=[[Christopher Kasparek]] |journal=[[Cryptologia]] |volume=6 |number=1 |date=January 1982 |pages=75–83, etc. p. 80}}</ref> [[Harry Hinsley]] suggested in ''British Intelligence in the Second World War'' that the Poles decided to share their Enigma-breaking techniques and equipment with the French and British in July 1939 because they had encountered insuperable technical difficulties. Rejewski rejected this: "No, it was not [cryptologic] difficulties [...] that prompted us to work with the British and French, but only the deteriorating political situation. If we had had no difficulties at all we would still, or even the more so, have shared our achievements with our allies as [[Polish contribution to World War II|our contribution to the struggle against Germany]]."<ref name = Rejewski80/> ==See also== * {{anli|Cryptanalysis of the Enigma}} * {{anli|Zygalski sheets}} {{clear}} ==Notes== {{reflist}} ===Works cited=== * {{cite book |last=Kozaczuk |first=Władysław |author-link=Władysław Kozaczuk |title=Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two |editor-last=Kasparek |editor-first=Christopher |editor-link=Christopher Kasparek |translator=Christopher Kasparek |place=Frederick, Maryland |publisher=University Publications of America |year=1984 |isbn=0-89093-547-5}} ==Further reading== * {{cite web |url=http://home.earthlink.net/~nbrass1/1enigma.htm |archive-url=https://web.archive.org/web/20130913071626/http://home.earthlink.net/~nbrass1/1enigma.htm |archive-date=2013-09-13 |title=Codebreaking and Secret Weapons in World War II |first=Bill |last=Momsen |year=2007 |ref=none}} * {{cite journal |last=Rejewski |first=Marian |author-link=Marian Rejewski |title=How Polish Mathematicians Deciphered the Enigma |journal=Annals of the History of Computing |volume=3 |number=3 |date=July 1981 |pages=213–234 |ref=none}} ==External links== *[http://www.alpha60.de/research/bomba_krypt/bomba.html Bomba Kryptologiczna Simulator], David Link {{DISPLAYTITLE:''Bomba'' (cryptography)}} [[Category:1930s computers]] [[Category:Computer-related introductions in 1938]] [[Category:Cryptanalytic devices]] [[Category:One-of-a-kind computers]] [[Category:Science and technology in Poland]] [[Category:Cipher Bureau (Poland)]] [[Category:Polish inventions]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:About
(
edit
)
Template:Anli
(
edit
)
Template:Blockquote
(
edit
)
Template:Cipher Bureau
(
edit
)
Template:Cite book
(
edit
)
Template:Cite journal
(
edit
)
Template:Cite web
(
edit
)
Template:Clear
(
edit
)
Template:EnigmaSeries
(
edit
)
Template:Harvp
(
edit
)
Template:Reflist
(
edit
)
Template:Sfnp
(
edit
)
Template:Short description
(
edit
)