Deutsch | » English
by Daniel Palloks
-new- Universal Enigma (v2.0 EN)|
12 models | Custom combinations | Enigma-Uhr
|—————— Legacy versions —————–|
Enigma M4 (Version 1.6 EN)|
Enigma G//s (Abwehr) (German v1.6)|
Enigma I & M3 (German v1.6)|
The Enigma is probably the most famous electromechanical device (or rather, series of devices) for message encrypting. It was used to a great extent by Germany during World War II. The successful reverse engineering of the machine in Poland and the codebreaking activities at Bletchley Park (UK) involving thousands of people, among them several ingenious mathematicians, have become legend.
Enigma operates as a rotor machine to achieve polyalphabetic substitution. This means the letter substitution scheme is not fixed but changes with the propagation of Enigma's rotating ciphering wheels and thus, the letter's position in a text. The wheels advance stepwise with every keystroke, thereby triggering, in some positions, the adjacent wheel to the left to perform a step as well, pretty much as in a mechanical counter. Inside a wheel each letter position is biuniquely rendered to another position through a fixed set of wires. By combining and rotating the wheels however, a very complex substitution code is obtained. Furthermore, the inner wiring as a whole can be rotated with respect to the outer letter positions – and the trigger notches (this is known as "ring setting"). In some models, pairs of letters can additionally be permuted by interconnecting plugs ("stecker") on a plugboard via cables. Finally, towards the end of WWII an external device called Enigma-Uhr, or Stecker-Uhr, was introduced that allowed the stecker connections' in- and outputs to be scrambled in complex, even non-reciprocal patterns. The Uhr thus acted on the stecker I/Os very much like a settable, non-rotating cipher wheel.
Enigmas are equipped with a typewriter-like keyboard for input, while output is shown on a lampboard that in its layout resembles the keyboard. With every keystroke, the signal is routed first through the plugboard (if present), then through the fixed entry wheel, crossing the rotor wheels and arriving at the reflector wheel. From there it is sent back on a different path – but with all rotor positions still the same – through the rotors, the entry wheel and again the plugboard until it reaches the lampboard where it lights the bulb corresponding to the substitute letter. This symmetrized signal path and the resulting symmetric (involutory) encryption make it possible to decipher a message using the same key setting it was encrypted with. At the same time, involution was one of the principal flaws in the Enigma's encryption concept.
There was a variety of Enigma models available for civilian and military use, as well as special setups for export. Even within a model line there were sometimes variants with altered specifiations. An "Enigma family tree" can be found in the Links section.
The best-known models today are Enigmas I ("Service Enigma"), M3 ("Naval Enigma"), M4 ("Shark") and G ("Abwehr"). There are separate simulations for each of them on this website.
Enigmas I and M3 came with three rotor wheels, and fixed entry wheel (ETW) and reflector (RFL / German: UKW). They were used by the German Army including, in the case of the M3, the Navy with the exception of the submarine fleet. The latter used the more advanced M4, with an additional adjustable (but non-rotating) wheel in combination with a thinner reflector – a setup that in preset configuration was "backward compatible" to the I/M3.
In contrast to the other models, the Abwehr Enigma G, a technical gem used mainly by German counter-intelligence, was driven by a gear box rather than a lever mechanism. It also had a rotating reflector/UKW and wheels with multiple notches, but no plugboard. The stand-alone Enigma G simulation on this website reproduces model G-312, on display at the museum in Bletchley Park. In April 2000 this machine was briefly pilfered in a quite spectacular coup, but not by me.
All Enigma models fall into either of two categories with respect to the wheel stepping mechanism: lever-induced stepping, i.e. pawls and ratchets (which leads to a typical stepping anomaly of the middle rotor, known as double-stepping, see Features) – and gear-driven, with regular stepping, like a mechanical counter. Within each category only minor differences remain, such as wiring schemes or settable/non-settable UKW.
Since any serious codebreaker wants to be girded for what's out there, while at the same time creating and maintaining separate simulations for all the model variants would be pretty dull, this website offers, as of version 2.0, the "Universal Enigma". It contains almost every model whose specifications are presently known. Moreover, it is also equipped with a Stecker-Uhr. There was of course no such Enigma for real, historically! However, bundling everything into a single entity has the benefit of making all models available at any time and in a compact way, which makes it possible to easily switch between them and compare their features and functionality. Any selected model preset will behave exactly as in a separate simulation, including possible limitations for wheel selection, reflector type and so on. But in addition to this, a "custom" mode allows for free combination of all features and functionalities (including wheel stepping mechanism!) and thereby for the creation of entirely new Enigma models.
… and additionally the Enigma-Uhr ("Stecker-Uhr"), an interesting external add-on for models equipped with a plugboard. (→ Introduction / Some Help)
:I "Services" (Army; Air Force)
M3 (Army; Navy)
M4 "Shark" (U-Boats)
K "Swiss K"
N "Norenigma" (Norway)
R "Rocket" (Railway)
T "Tirpitz" (Japan)
:A-865 "Zählwerk" (1928)
G-111 (Hungary / Munich)
G-260 (Abwehr in Argentina)
G-312 (Abwehr / Bletchley Park)
[ Changelog ]
Enigma's cryptographic key consists of the following parts:
The first three make up the daily key, laid out in a code book and known to both sender and recipient. The wheels' initial positions were assigned individually to each message, and are called the message key.
Being unknown to the recipient, the message key had to be included in the transmission and therefore, had to be encrypted itself. This was done using the common daily key as follows:
Having received the transmission, the recipient would now follow the same procedure (involution!): set the machine to the daily key, adjust wheel positions according to the first group (WPOS), type in the second group (IPXH), thus obtaining the message key (CODE). This would then be set as starting position for the wheels, so the message could be deciphered.
* * *
Since the wheels only contain letters A to Z, only these can be encrypted. Numbers and other characters have to be either spelled, omitted, or represented (preferably by rarely used letters or letter combinations).
To make decryption harder (cycle detection), the length of a message had been restricted to 250 characters. After that the message key was to be changed. Longer messages were split up in parts to be coded with different message keys.
Sometimes the message key was altered within a running message part; this would be indicated in the plain text by a pre-arranged code (e.g. "CYDE" for "set leftmost rotor on position 'D' now").
NB: In the simulations one would want to use 'QWERTZU' input mode in such a case, as it allows for re-adjusting the wheel positions with text already input. The new wheel settings affect only subsequent input.
It was important to vary the structure of messages, especially when parts of the content, such as proper names or the message header ("From... To...") were likely to be deduced. Abbreviations had to be varied for the same reason. Or, for example, while X was commonly used to denote a full stop in clear text, it had to be omitted at the very end of a message. Such precautions were not always observed, though, a fact that played greatly into the hands of the codebreakers.
The Enigma I (aka Wehrmacht Enigma or Services Enigma) can bee seen as a predecessor of the M3. Already in use with the Reichswehr in 1930, it remained the most widely-used model until the end of World War II.
Enigmas of type I and M3 are compatible if the following is being considered:
-- Tip: The combined simulations "Enigma I & M3" and "Universal Enigma" have the old reflector UKW A included as well.
Model M3 (and thus, also Enigma I) can be emulated within the M4. For this the reflectors have to be made "compatible" by either of the following settings:
Copyright © 2007-2016 by Daniel Palloks. -- This software and source code may be used, distributed and modified freely as long as (1) my authorship remains acknowledged, (2) any modification is properly indicated, (3) the freeware/ open source status and the conditions for distribution and modification remain unchanged. A copy of this statement must be distributed together with the software. -- This software is provided "as is". The author will not be liable for any damage - direct, indirect or consequential - resulting from the use of this software.
I am not responsible for the contents of external web pages reached via links from this site.
The Enigma logo graphic is in the public domain (source: Wikimedia Commons).
© Daniel Palloks 2009-2016
Last change: 11 Mar 2016
HTML 4.01 Strict