Ciphers: the Enigma Code
Image by Michael Himbeault
Learn about the infamous Enigma machine and how its “unbreakable” code was finally defeated.
In the past few issues, we’ve covered a wide range of different ciphers and codes. This issue, we’re going to be looking at one of the most famous codes in wartime history; the Enigma code.
When you think of wars, you may initially think of fights mainly taking place with soldiers, tanks and boats. The truth is, there’s another, more hidden layer to warfare than just armies! When two countries fight, they may engage in operations to extract important information from the enemy. The idea is, if you know what your enemy is doing, you can better use your army to attack and defend the opposition.
One way of getting this information is to listen in on what the enemy is saying. This is usually done by finding the communications channels being used and secretly listening in. A good military will know of this method of attack, however, and will encrypt their message in a form of code. The ones used by the Germans in World War 2 was called the ‘Enigma Code’, and cracking it was a huge feat of computing at the time!
The Enigma Code was invented by Arthur Scherbius in 1918, and took the world by storm due to its use in World War 2. The Germans used a very complicated machine called an Engima Machine in order to encrypt their messages. The Polish managed to find out how to decrypt the messages, but the Germans then stepped up their security by changing the cipher every day. This meant that the Allies had to re-crack the code every day in order to stay on top!
It was a very daunting task, but it was by no means impossible. An Englishman called Alan Turing decided to step up to the challenge. He, along with fellow codebreaker Gordon Welchman, created a decryption machine called the Bombe, which had the task of decrypting the Enigma messages as quickly as possible.
Alan Turing worked with his colleagues in Bletchley Park. There, they would try to work out how to decrypt the Enigma Code every time it changed. There were a few clues they discovered when trying to decrypt the cipher; for one, the Enigma Machine was built in a way where a letter could not be encrypted into itself (for example, the letter ‘A’ would never be encrypted into an ‘A’, a ‘B’ into a ‘B’, and so on.) This cut down on a lot of different answers to decrypting the Enigma Code, as any solution where a letter was encrypted into itself could be ruled out.
The Germans were very confident in their code, using it for ground, sea, and air communications. This meant that, when Alan Turing and his Bombe managed to begin busting the code, the Allies had access to a lot of the German’s information. Turing’s contribution to the war effort was very large; so much so that the prime minister of the time, Winston Churchill, personally commended Turing and said the war would have been much harder were it not for Turing’s efforts. Not every war hero is a soldier, after all!
Of course, these days, we know all about how the Enigma code worked. There are even sites on the internet that allow you to encode and decode messages like the Germans did during World War 2. Check the top link in the additional links for this article, then scroll to the bottom until you see the encoder and decoder. Set the positions to ‘B’, ‘C’, ‘A’, and ‘D’, then type the following into the ‘Encrypted Text’ box and click ‘Decrypt’ to find out what it says:
w$6)v.d/cwg
If you want to send a reply, what message would you send back? To work this out, type your message into the ‘Inputted text’ box and click ‘Encrypt’. To test it, try typing ‘Let’s meet up today’ into the box and clicking ‘Encrypt’, then check your result to the answers below!
Answers
w$6)v.d/cwg = ‘Hello There’
Let’s meet up today = $$b@s.+bch,$b!o3u6l
Learn More
Count On: Codebreaking: The Enigma Cipher
http://www.counton.org/explorer/codebreaking/enigma-cipher.php
Imperial War Museums: How Alan Turing Cracked The Enigma Code
https://www.iwm.org.uk/history/how-alan-turing-cracked-the-enigma-code
Khan Academy: The Enigma encryption machine
Also In The June 2018 Issue

Stuck in a maze? Not anymore! Here are tips and tricks for beating the most convoluted labyrinths.

Code up your digital turtle mascot and watch him dash around the screen in this simple Python coding activity.

A phone and tablet app exposes the invisible waves that connect our computers.

How AI technology is helping fans keep the magic alive for one more chapter.

Use Scratch to become the architect of your very own digital metropolis.

It’s free, open source, and comes with a snazzy graphics and physics engine for both 2D and 3D games.

Use SketchUp to create dizzying patterns and shapes, Escher-style.

Whiz around your computer’s folders and modify files at lightning speed like a pro.

Why use three languages to make a stunning web page when you can use just one?

Use micro:bit and cardboard to create a Jedi knight that sounds the alarm when evil approaches!

Learn about the infamous Enigma machine and how its “unbreakable” code was finally defeated.

Take your 3D-printed gizmos to the next level with harder, sleeker, and stronger material.

How 3D printers are helping us learn more about prehistoric reptiles.

How daily coding puzzles with constant feedback can be a useful tool to help students master text-based languages.

Scientists draw inspiration from nature to create remarkable specialized robots.

Find it, mine it, and use it to automate machines.

Links from the bottom of all the June 2018 articles, collected in one place for you to print, share, or bookmark.

Interesting stories about computer science, software programming, and technology for June 2018.