How Enigma machine was cracked | Bombe machine | Part-2
ฝัง
- เผยแพร่เมื่อ 28 พ.ค. 2024
- Welcome to Enigma Series. We have built from scratch a complete Enigma machine and a Bombe machine (the machine which Alan turning built) in software to be able to see them working inside out and understand every aspect of these incredible machines.
In this video:
0:00 Introduction
1:11 Finding loops in the crib
2:30 Bombe Rotors
4:30 Rotor sets
5:22 Connecting Bombe rotors in loops
5:42 Full-size bombe machine in action
#enigma #ww2 #cryptography #technology #history - วิทยาศาสตร์และเทคโนโลยี
This and previous introduction are the best videos i have found to explain in a technical way the bombe machine. Congrats and thank you!
Thanks for your comment! Glad it helped :)
The correct pronunciation is Bombe. Sorry for the mistake. 🤕
Amazing series of videos! Any chance of you sharing this simulation?
Best video on this topic. The simulation was great.
Thank you! Means a lot!
I'm confused about the stepping action of your bombe. In the animation, the yellow rotors step anytime the red rotor goes from A->Z. But that isn't necessarily the position the enigma stepped for that configuration and ring setting. So the relative configurations may be off if the second and third rotors are stepped wrong? I remember reading that a crib wouldn't work if there was a turnover in the middle, so would it make more sense to keep the second and third rotors in sync across the bombe, and just rotate the red rotors relative to each other?
In practice, this was a much less problem as it seems.
If you get a solution wich decrypts the first 12 letters to something which looked like it was valid german but suddenly turns into gibberish at the 13th letter, you know that the used turnover point (the ring position) from ring1 to ring 2 is most likely wrong and needs to be adjusted. Just do it and try again. There are only 26 possible ring positions to check, no big deal for the machine. After all you knew that the setting was correct for the first 12 letters, just the turnover needs adjustment.
Also: They did not use just 1 single transmission for the cracking, but multiple messages of the day. If 1 crib didn't work, another one from a different transmission might work.
Also: The turnover from the 2nd ring to the 3rd almost never mattered as most messages were not long enough to have the 3rd ring turn away from its initial position at all.
Excellent!
I don't understand wich cable your supposed to power on the first time and if you need to switch between cable
For each tested rotor position, you try all of the cables in sequence to figure out if one of them does not power all of them.
Wonderful job and very well explained!!! Please, do more videos like these!
Thank you! Your kind words will motivate me to keep going :)
صعب لكن استمر
هل هذا الجهاز لتشفير الرسائل
هناك طرق اسهل للتشفير
لكن فك شفرة جهاز كهذا كان يستلزم حصول الحلفاء على نسخة متطابقة منه
وربما تمت عن طريق الخيانات .
متابعك من اليمن
I keep wondering, cracking one crib/menu this way reveals the message key for the encryption. But every message had another key as I understand. So how to get to the daily setting because that would be the actual goal wouldn't it?
They needed a guess/crib every day :) One way was through the weather forecast which had repeatable/predictable words.
@@Ingeniousideas Right, so, let me take the weather forecast example then. I presume it had its own message key. Which key was cracked then, the message key or the daily key? See where I'm getting at?
Thanks for the other reply btw. And let me say the videos where really helpful for my understanding of the topic and I appreciate them imensly.
@@Timmerdetimmerdetim
The goal of the bomba was not to crack a specific key. The goal was to find an initial rotor setting, which would decrypt the message.
The procedure for the sender of the message of how to come up with the enigma settings depending on the tabulated daily key and how to create the message key is not important. Each message began with additional information for the regular receiver on how to reverse that process such that eventually he had the setting with which to decypher the message body.
For the cracker however this was not important, since they were not interested in the letters of each of the keys used, but in a setting which simply would decypher the message body, no matter in which way the sender reached that setting.
what software do you use to create the bombe machine virtually?
p.s Excellent video!
Thank you! 😊 this one is created in Visual Basic.
Bhai yeh ai voice kyu lga rakhi gaiw hai
Really excellent work. I don’t think the pronunciation of bomb matters at all. Some suggestions are that it is “bomb” because the ticking of the device is like a time-bomb or “bomb-err” because the rotating drums look like a French ice cream pudding.
Thank you! 🙂 And good info about bombe. Didn't know this.
Wasn't it to give recognition to the Polish mathematicans who worked out how the early commercial grade machines worked. They built a simple bombe to decrypt messages from these machines. The germans then increased the complexity of the enigma machines to make them secure enough for military use.
Can you please explain us the Diagonal Board?
Yes I will try to add that part in the series.
Can you release the source code that you used for this?
rumah editor bring me to here
This is a super cool video, so you think it would be possible to use relay computation to do this?
Thanks for your comment! I’m not really familiar with relay computation. Can’t say :)
Are we really going to have to listen to it pronounced as bom-bay every time… going to be a long 11 min.