CINXE.COM
Enigma machine - Wikipedia
<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Enigma machine - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"4426a6ac-4436-4d04-8069-575f278d05bf","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Enigma_machine","wgTitle":"Enigma machine","wgCurRevisionId":1259187132,"wgRevisionId":1259187132,"wgArticleId":9256,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["CS1 maint: multiple names: authors list","Webarchive template wayback links","CS1 German-language sources (de)","Articles with short description","Short description matches Wikidata","Use dmy dates from January 2021","CS1 errors: periodical ignored","CS1 French-language sources (fr)","Commons category link is on Wikidata","Enigma machine","Broken stream ciphers","Cryptographic hardware","Encryption devices","Military communications of Germany", "Military equipment introduced in the 1920s","Products introduced in 1918","Rotor machines","Signals intelligence of World War II","World War II military equipment of Germany"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Enigma_machine","wgRelevantArticleId":9256,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":90000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false, "wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q150758","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","ext.math.styles":"ready","mediawiki.page.gallery.styles":"ready","ext.tmh.player.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready", "ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","mediawiki.page.gallery","mediawiki.page.media","ext.tmh.player","ext.scribunto.logs","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&modules=ext.cite.styles%7Cext.math.styles%7Cext.tmh.player.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cmediawiki.page.gallery.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&only=styles&skin=vector-2022"> <script async="" src="/w/load.php?lang=en&modules=startup&only=scripts&raw=1&skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&modules=site.styles&only=styles&skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/b/bd/Enigma_%28crittografia%29_-_Museo_scienza_e_tecnologia_Milano.jpg"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="1309"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/b/bd/Enigma_%28crittografia%29_-_Museo_scienza_e_tecnologia_Milano.jpg/800px-Enigma_%28crittografia%29_-_Museo_scienza_e_tecnologia_Milano.jpg"> <meta property="og:image:width" content="800"> <meta property="og:image:height" content="872"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/b/bd/Enigma_%28crittografia%29_-_Museo_scienza_e_tecnologia_Milano.jpg/640px-Enigma_%28crittografia%29_-_Museo_scienza_e_tecnologia_Milano.jpg"> <meta property="og:image:width" content="640"> <meta property="og:image:height" content="698"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Enigma machine - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Enigma_machine"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Enigma_machine&action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Enigma_machine"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Enigma_machine rootpage-Enigma_machine skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page's font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&returnto=Enigma+machine" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&returnto=Enigma+machine" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&returnto=Enigma+machine" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&returnto=Enigma+machine" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-History" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#History"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>History</span> </div> </a> <button aria-controls="toc-History-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle History subsection</span> </button> <ul id="toc-History-sublist" class="vector-toc-list"> <li id="toc-Breaking_Enigma" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Breaking_Enigma"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.1</span> <span>Breaking Enigma</span> </div> </a> <ul id="toc-Breaking_Enigma-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Design" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Design"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Design</span> </div> </a> <button aria-controls="toc-Design-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Design subsection</span> </button> <ul id="toc-Design-sublist" class="vector-toc-list"> <li id="toc-Electrical_pathway" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Electrical_pathway"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.1</span> <span>Electrical pathway</span> </div> </a> <ul id="toc-Electrical_pathway-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Rotors" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Rotors"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2</span> <span>Rotors</span> </div> </a> <ul id="toc-Rotors-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Stepping" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Stepping"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.3</span> <span>Stepping</span> </div> </a> <ul id="toc-Stepping-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Turnover" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Turnover"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.4</span> <span>Turnover</span> </div> </a> <ul id="toc-Turnover-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Entry_wheel" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Entry_wheel"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.5</span> <span>Entry wheel</span> </div> </a> <ul id="toc-Entry_wheel-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Reflector" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Reflector"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.6</span> <span>Reflector</span> </div> </a> <ul id="toc-Reflector-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Plugboard" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Plugboard"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.7</span> <span>Plugboard</span> </div> </a> <ul id="toc-Plugboard-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Accessories" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Accessories"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.8</span> <span>Accessories</span> </div> </a> <ul id="toc-Accessories-sublist" class="vector-toc-list"> <li id="toc-Schreibmax" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Schreibmax"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.8.1</span> <span><i>Schreibmax</i></span> </div> </a> <ul id="toc-Schreibmax-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Fernlesegerät" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Fernlesegerät"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.8.2</span> <span><i>Fernlesegerät</i></span> </div> </a> <ul id="toc-Fernlesegerät-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Uhr" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Uhr"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.8.3</span> <span><i>Uhr</i></span> </div> </a> <ul id="toc-Uhr-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Mathematical_analysis" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Mathematical_analysis"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.9</span> <span>Mathematical analysis</span> </div> </a> <ul id="toc-Mathematical_analysis-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Operation" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Operation"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Operation</span> </div> </a> <button aria-controls="toc-Operation-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Operation subsection</span> </button> <ul id="toc-Operation-sublist" class="vector-toc-list"> <li id="toc-Basic_operation" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Basic_operation"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1</span> <span>Basic operation</span> </div> </a> <ul id="toc-Basic_operation-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Details" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Details"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2</span> <span>Details</span> </div> </a> <ul id="toc-Details-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Indicator" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Indicator"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.3</span> <span>Indicator</span> </div> </a> <ul id="toc-Indicator-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Additional_details" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Additional_details"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.4</span> <span>Additional details</span> </div> </a> <ul id="toc-Additional_details-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Example_enciphering_process" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Example_enciphering_process"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.5</span> <span>Example enciphering process</span> </div> </a> <ul id="toc-Example_enciphering_process-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Models" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Models"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Models</span> </div> </a> <button aria-controls="toc-Models-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Models subsection</span> </button> <ul id="toc-Models-sublist" class="vector-toc-list"> <li id="toc-Commercial_Enigma" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Commercial_Enigma"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1</span> <span>Commercial Enigma</span> </div> </a> <ul id="toc-Commercial_Enigma-sublist" class="vector-toc-list"> <li id="toc-Enigma_Handelsmaschine_(1923)" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Enigma_Handelsmaschine_(1923)"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1.1</span> <span>Enigma Handelsmaschine (1923)</span> </div> </a> <ul id="toc-Enigma_Handelsmaschine_(1923)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Schreibende_Enigma_(1924)" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Schreibende_Enigma_(1924)"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1.2</span> <span>Schreibende Enigma (1924)</span> </div> </a> <ul id="toc-Schreibende_Enigma_(1924)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Glühlampenmaschine,_Enigma_A_(1924)" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Glühlampenmaschine,_Enigma_A_(1924)"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1.3</span> <span>Glühlampenmaschine, Enigma A (1924)</span> </div> </a> <ul id="toc-Glühlampenmaschine,_Enigma_A_(1924)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Enigma_B_(1924)" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Enigma_B_(1924)"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1.4</span> <span>Enigma B (1924)</span> </div> </a> <ul id="toc-Enigma_B_(1924)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Enigma_C_(1926)" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Enigma_C_(1926)"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1.5</span> <span>Enigma C (1926)</span> </div> </a> <ul id="toc-Enigma_C_(1926)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Enigma_D_(1927)" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Enigma_D_(1927)"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1.6</span> <span>Enigma D (1927)</span> </div> </a> <ul id="toc-Enigma_D_(1927)-sublist" class="vector-toc-list"> <li id="toc-"Navy_Cipher_D"" class="vector-toc-list-item vector-toc-level-4"> <a class="vector-toc-link" href="#"Navy_Cipher_D""> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1.6.1</span> <span>"Navy Cipher D"</span> </div> </a> <ul id="toc-"Navy_Cipher_D"-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Enigma_H_(1929)" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Enigma_H_(1929)"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1.7</span> <span>Enigma H (1929)</span> </div> </a> <ul id="toc-Enigma_H_(1929)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Enigma_K" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Enigma_K"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1.8</span> <span>Enigma K</span> </div> </a> <ul id="toc-Enigma_K-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Military_Enigma" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Military_Enigma"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2</span> <span>Military Enigma</span> </div> </a> <ul id="toc-Military_Enigma-sublist" class="vector-toc-list"> <li id="toc-Funkschlüssel_C" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Funkschlüssel_C"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2.1</span> <span>Funkschlüssel C</span> </div> </a> <ul id="toc-Funkschlüssel_C-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Enigma_G_(1928–1930)" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Enigma_G_(1928–1930)"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2.2</span> <span>Enigma G (1928–1930)</span> </div> </a> <ul id="toc-Enigma_G_(1928–1930)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Wehrmacht_Enigma_I_(1930–1938)" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Wehrmacht_Enigma_I_(1930–1938)"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2.3</span> <span>Wehrmacht Enigma I (1930–1938)</span> </div> </a> <ul id="toc-Wehrmacht_Enigma_I_(1930–1938)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-M3_(1934)" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#M3_(1934)"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2.4</span> <span>M3 (1934)</span> </div> </a> <ul id="toc-M3_(1934)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Two_extra_rotors_(1938)" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Two_extra_rotors_(1938)"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2.5</span> <span>Two extra rotors (1938)</span> </div> </a> <ul id="toc-Two_extra_rotors_(1938)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-M4_(1942)" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#M4_(1942)"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2.6</span> <span>M4 (1942)</span> </div> </a> <ul id="toc-M4_(1942)-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> </ul> </li> <li id="toc-Surviving_machines" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Surviving_machines"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Surviving machines</span> </div> </a> <ul id="toc-Surviving_machines-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Derivatives" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Derivatives"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Derivatives</span> </div> </a> <ul id="toc-Derivatives-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Simulators" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Simulators"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Simulators</span> </div> </a> <ul id="toc-Simulators-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Explanatory_notes" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Explanatory_notes"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>Explanatory notes</span> </div> </a> <ul id="toc-Explanatory_notes-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>References</span> </div> </a> <button aria-controls="toc-References-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle References subsection</span> </button> <ul id="toc-References-sublist" class="vector-toc-list"> <li id="toc-Citations" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Citations"> <div class="vector-toc-text"> <span class="vector-toc-numb">10.1</span> <span>Citations</span> </div> </a> <ul id="toc-Citations-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-General_and_cited_references" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#General_and_cited_references"> <div class="vector-toc-text"> <span class="vector-toc-numb">10.2</span> <span>General and cited references</span> </div> </a> <ul id="toc-General_and_cited_references-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Further_reading" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Further_reading"> <div class="vector-toc-text"> <span class="vector-toc-numb">11</span> <span>Further reading</span> </div> </a> <ul id="toc-Further_reading-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">12</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Enigma machine</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 57 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-57" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">57 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-af mw-list-item"><a href="https://af.wikipedia.org/wiki/Enigma-masjien" title="Enigma-masjien – Afrikaans" lang="af" hreflang="af" data-title="Enigma-masjien" data-language-autonym="Afrikaans" data-language-local-name="Afrikaans" class="interlanguage-link-target"><span>Afrikaans</span></a></li><li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D8%A2%D9%84%D8%A9_%D8%A5%D9%86%D8%AC%D9%85%D8%A7" title="آلة إنجما – Arabic" lang="ar" hreflang="ar" data-title="آلة إنجما" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-hyw mw-list-item"><a href="https://hyw.wikipedia.org/wiki/%D4%B7%D5%B6%D5%AB%D5%AF%D5%B4%D5%A1_%D5%84%D5%A5%D6%84%D5%A5%D5%B6%D5%A1%D5%B6" title="Էնիկմա Մեքենան – Western Armenian" lang="hyw" hreflang="hyw" data-title="Էնիկմա Մեքենան" data-language-autonym="Արեւմտահայերէն" data-language-local-name="Western Armenian" class="interlanguage-link-target"><span>Արեւմտահայերէն</span></a></li><li class="interlanguage-link interwiki-as mw-list-item"><a href="https://as.wikipedia.org/wiki/%E0%A6%8F%E0%A6%A8%E0%A6%BF%E0%A6%97%E0%A7%8D%E2%80%8C%E0%A6%AE%E0%A6%BE_%E0%A6%AF%E0%A6%A8%E0%A7%8D%E0%A6%A4%E0%A7%8D%E0%A7%B0" title="এনিগ্মা যন্ত্ৰ – Assamese" lang="as" hreflang="as" data-title="এনিগ্মা যন্ত্ৰ" data-language-autonym="অসমীয়া" data-language-local-name="Assamese" class="interlanguage-link-target"><span>অসমীয়া</span></a></li><li class="interlanguage-link interwiki-az mw-list-item"><a href="https://az.wikipedia.org/wiki/Eniqma_ma%C5%9F%C4%B1n%C4%B1" title="Eniqma maşını – Azerbaijani" lang="az" hreflang="az" data-title="Eniqma maşını" data-language-autonym="Azərbaycanca" data-language-local-name="Azerbaijani" class="interlanguage-link-target"><span>Azərbaycanca</span></a></li><li class="interlanguage-link interwiki-bg badge-Q17437796 badge-featuredarticle mw-list-item" title="featured article badge"><a href="https://bg.wikipedia.org/wiki/%D0%95%D0%BD%D0%B8%D0%B3%D0%BC%D0%B0_(%D0%BC%D0%B0%D1%88%D0%B8%D0%BD%D0%B0)" title="Енигма (машина) – Bulgarian" lang="bg" hreflang="bg" data-title="Енигма (машина)" data-language-autonym="Български" data-language-local-name="Bulgarian" class="interlanguage-link-target"><span>Български</span></a></li><li class="interlanguage-link interwiki-bs mw-list-item"><a href="https://bs.wikipedia.org/wiki/Enigma_(ma%C5%A1ina)" title="Enigma (mašina) – Bosnian" lang="bs" hreflang="bs" data-title="Enigma (mašina)" data-language-autonym="Bosanski" data-language-local-name="Bosnian" class="interlanguage-link-target"><span>Bosanski</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/M%C3%A0quina_Enigma" title="Màquina Enigma – Catalan" lang="ca" hreflang="ca" data-title="Màquina Enigma" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Enigma" title="Enigma – Czech" lang="cs" hreflang="cs" data-title="Enigma" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-da mw-list-item"><a href="https://da.wikipedia.org/wiki/Enigma" title="Enigma – Danish" lang="da" hreflang="da" data-title="Enigma" data-language-autonym="Dansk" data-language-local-name="Danish" class="interlanguage-link-target"><span>Dansk</span></a></li><li class="interlanguage-link interwiki-de badge-Q17437796 badge-featuredarticle mw-list-item" title="featured article badge"><a href="https://de.wikipedia.org/wiki/Enigma_(Maschine)" title="Enigma (Maschine) – German" lang="de" hreflang="de" data-title="Enigma (Maschine)" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/Enigma" title="Enigma – Estonian" lang="et" hreflang="et" data-title="Enigma" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-el mw-list-item"><a href="https://el.wikipedia.org/wiki/Enigma_(%CF%83%CF%85%CF%83%CE%BA%CE%B5%CF%85%CE%AE)" title="Enigma (συσκευή) – Greek" lang="el" hreflang="el" data-title="Enigma (συσκευή)" data-language-autonym="Ελληνικά" data-language-local-name="Greek" class="interlanguage-link-target"><span>Ελληνικά</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Enigma_(m%C3%A1quina)" title="Enigma (máquina) – Spanish" lang="es" hreflang="es" data-title="Enigma (máquina)" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-eo mw-list-item"><a href="https://eo.wikipedia.org/wiki/Enigma" title="Enigma – Esperanto" lang="eo" hreflang="eo" data-title="Enigma" data-language-autonym="Esperanto" data-language-local-name="Esperanto" class="interlanguage-link-target"><span>Esperanto</span></a></li><li class="interlanguage-link interwiki-eu mw-list-item"><a href="https://eu.wikipedia.org/wiki/Enigma_(kriptografia)" title="Enigma (kriptografia) – Basque" lang="eu" hreflang="eu" data-title="Enigma (kriptografia)" data-language-autonym="Euskara" data-language-local-name="Basque" class="interlanguage-link-target"><span>Euskara</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D9%85%D8%A7%D8%B4%DB%8C%D9%86_%D8%A7%D9%86%DB%8C%DA%AF%D9%85%D8%A7" title="ماشین انیگما – Persian" lang="fa" hreflang="fa" data-title="ماشین انیگما" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/Enigma_(machine)" title="Enigma (machine) – French" lang="fr" hreflang="fr" data-title="Enigma (machine)" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-gl mw-list-item"><a href="https://gl.wikipedia.org/wiki/M%C3%A1quina_Enigma" title="Máquina Enigma – Galician" lang="gl" hreflang="gl" data-title="Máquina Enigma" data-language-autonym="Galego" data-language-local-name="Galician" class="interlanguage-link-target"><span>Galego</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EC%97%90%EB%8B%88%EA%B7%B8%EB%A7%88_%EA%B8%B0%EA%B3%84" title="에니그마 기계 – Korean" lang="ko" hreflang="ko" data-title="에니그마 기계" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-hy mw-list-item"><a href="https://hy.wikipedia.org/wiki/%D4%B7%D5%B6%D5%AB%D5%A3%D5%B4%D5%A1" title="Էնիգմա – Armenian" lang="hy" hreflang="hy" data-title="Էնիգմա" data-language-autonym="Հայերեն" data-language-local-name="Armenian" class="interlanguage-link-target"><span>Հայերեն</span></a></li><li class="interlanguage-link interwiki-hi mw-list-item"><a href="https://hi.wikipedia.org/wiki/%E0%A4%8F%E0%A4%A8%E0%A4%BF%E0%A4%97%E0%A5%8D%E0%A4%AE%E0%A4%BE_(%E0%A4%AE%E0%A4%B6%E0%A5%80%E0%A4%A8)" title="एनिग्मा (मशीन) – Hindi" lang="hi" hreflang="hi" data-title="एनिग्मा (मशीन)" data-language-autonym="हिन्दी" data-language-local-name="Hindi" class="interlanguage-link-target"><span>हिन्दी</span></a></li><li class="interlanguage-link interwiki-hr mw-list-item"><a href="https://hr.wikipedia.org/wiki/Enigma_(stroj)" title="Enigma (stroj) – Croatian" lang="hr" hreflang="hr" data-title="Enigma (stroj)" data-language-autonym="Hrvatski" data-language-local-name="Croatian" class="interlanguage-link-target"><span>Hrvatski</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Mesin_Enigma" title="Mesin Enigma – Indonesian" lang="id" hreflang="id" data-title="Mesin Enigma" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Enigma_(crittografia)" title="Enigma (crittografia) – Italian" lang="it" hreflang="it" data-title="Enigma (crittografia)" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%90%D7%A0%D7%99%D7%92%D7%9E%D7%94" title="אניגמה – Hebrew" lang="he" hreflang="he" data-title="אניגמה" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-ka mw-list-item"><a href="https://ka.wikipedia.org/wiki/%E1%83%94%E1%83%9C%E1%83%98%E1%83%92%E1%83%9B%E1%83%90_(%E1%83%9B%E1%83%90%E1%83%9C%E1%83%A5%E1%83%90%E1%83%9C%E1%83%90)" title="ენიგმა (მანქანა) – Georgian" lang="ka" hreflang="ka" data-title="ენიგმა (მანქანა)" data-language-autonym="ქართული" data-language-local-name="Georgian" class="interlanguage-link-target"><span>ქართული</span></a></li><li class="interlanguage-link interwiki-lv mw-list-item"><a href="https://lv.wikipedia.org/wiki/Enigma_(%C5%A1ifr%C4%93%C5%A1anas_ma%C5%A1%C4%ABna)" title="Enigma (šifrēšanas mašīna) – Latvian" lang="lv" hreflang="lv" data-title="Enigma (šifrēšanas mašīna)" data-language-autonym="Latviešu" data-language-local-name="Latvian" class="interlanguage-link-target"><span>Latviešu</span></a></li><li class="interlanguage-link interwiki-lb mw-list-item"><a href="https://lb.wikipedia.org/wiki/Enigma" title="Enigma – Luxembourgish" lang="lb" hreflang="lb" data-title="Enigma" data-language-autonym="Lëtzebuergesch" data-language-local-name="Luxembourgish" class="interlanguage-link-target"><span>Lëtzebuergesch</span></a></li><li class="interlanguage-link interwiki-hu badge-Q17437796 badge-featuredarticle mw-list-item" title="featured article badge"><a href="https://hu.wikipedia.org/wiki/Enigma_(g%C3%A9p)" title="Enigma (gép) – Hungarian" lang="hu" hreflang="hu" data-title="Enigma (gép)" data-language-autonym="Magyar" data-language-local-name="Hungarian" class="interlanguage-link-target"><span>Magyar</span></a></li><li class="interlanguage-link interwiki-ms mw-list-item"><a href="https://ms.wikipedia.org/wiki/Mesin_Enigma" title="Mesin Enigma – Malay" lang="ms" hreflang="ms" data-title="Mesin Enigma" data-language-autonym="Bahasa Melayu" data-language-local-name="Malay" class="interlanguage-link-target"><span>Bahasa Melayu</span></a></li><li class="interlanguage-link interwiki-nl badge-Q17437796 badge-featuredarticle mw-list-item" title="featured article badge"><a href="https://nl.wikipedia.org/wiki/Enigma_(codeermachine)" title="Enigma (codeermachine) – Dutch" lang="nl" hreflang="nl" data-title="Enigma (codeermachine)" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E3%82%A8%E3%83%8B%E3%82%B0%E3%83%9E_(%E6%9A%97%E5%8F%B7%E6%A9%9F)" title="エニグマ (暗号機) – Japanese" lang="ja" hreflang="ja" data-title="エニグマ (暗号機)" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Enigma_(krypteringsmaskin)" title="Enigma (krypteringsmaskin) – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Enigma (krypteringsmaskin)" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-oc mw-list-item"><a href="https://oc.wikipedia.org/wiki/Enigma_(maquina)" title="Enigma (maquina) – Occitan" lang="oc" hreflang="oc" data-title="Enigma (maquina)" data-language-autonym="Occitan" data-language-local-name="Occitan" class="interlanguage-link-target"><span>Occitan</span></a></li><li class="interlanguage-link interwiki-uz mw-list-item"><a href="https://uz.wikipedia.org/wiki/Enigma" title="Enigma – Uzbek" lang="uz" hreflang="uz" data-title="Enigma" data-language-autonym="Oʻzbekcha / ўзбекча" data-language-local-name="Uzbek" class="interlanguage-link-target"><span>Oʻzbekcha / ўзбекча</span></a></li><li class="interlanguage-link interwiki-ps mw-list-item"><a href="https://ps.wikipedia.org/wiki/%D8%A7%D9%86%DB%8C%DA%AB%D9%85%D8%A7_%D9%85%D8%A7%D8%B4%DB%8C%D9%86" title="انیګما ماشین – Pashto" lang="ps" hreflang="ps" data-title="انیګما ماشین" data-language-autonym="پښتو" data-language-local-name="Pashto" class="interlanguage-link-target"><span>پښتو</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Enigma" title="Enigma – Polish" lang="pl" hreflang="pl" data-title="Enigma" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Enigma_(m%C3%A1quina)" title="Enigma (máquina) – Portuguese" lang="pt" hreflang="pt" data-title="Enigma (máquina)" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ro badge-Q17437798 badge-goodarticle mw-list-item" title="good article badge"><a href="https://ro.wikipedia.org/wiki/Ma%C8%99ina_Enigma" title="Mașina Enigma – Romanian" lang="ro" hreflang="ro" data-title="Mașina Enigma" data-language-autonym="Română" data-language-local-name="Romanian" class="interlanguage-link-target"><span>Română</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%AD%D0%BD%D0%B8%D0%B3%D0%BC%D0%B0" title="Энигма – Russian" lang="ru" hreflang="ru" data-title="Энигма" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sq mw-list-item"><a href="https://sq.wikipedia.org/wiki/Enigma_(makin%C3%AB)" title="Enigma (makinë) – Albanian" lang="sq" hreflang="sq" data-title="Enigma (makinë)" data-language-autonym="Shqip" data-language-local-name="Albanian" class="interlanguage-link-target"><span>Shqip</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Enigma_machine" title="Enigma machine – Simple English" lang="en-simple" hreflang="en-simple" data-title="Enigma machine" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-sk badge-Q17437798 badge-goodarticle mw-list-item" title="good article badge"><a href="https://sk.wikipedia.org/wiki/Enigma_(%C5%A1ifrovac%C3%AD_stroj)" title="Enigma (šifrovací stroj) – Slovak" lang="sk" hreflang="sk" data-title="Enigma (šifrovací stroj)" data-language-autonym="Slovenčina" data-language-local-name="Slovak" class="interlanguage-link-target"><span>Slovenčina</span></a></li><li class="interlanguage-link interwiki-sl badge-Q17437796 badge-featuredarticle mw-list-item" title="featured article badge"><a href="https://sl.wikipedia.org/wiki/Enigma_(naprava)" title="Enigma (naprava) – Slovenian" lang="sl" hreflang="sl" data-title="Enigma (naprava)" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-ckb mw-list-item"><a href="https://ckb.wikipedia.org/wiki/%D9%85%D8%A7%D8%B4%DB%8E%D9%86%DB%8C_%D8%A6%DB%8E%D9%86%DB%8C%DA%AF%D9%85%D8%A7" title="ماشێنی ئێنیگما – Central Kurdish" lang="ckb" hreflang="ckb" data-title="ماشێنی ئێنیگما" data-language-autonym="کوردی" data-language-local-name="Central Kurdish" class="interlanguage-link-target"><span>کوردی</span></a></li><li class="interlanguage-link interwiki-sr mw-list-item"><a href="https://sr.wikipedia.org/wiki/%D0%95%D0%BD%D0%B8%D0%B3%D0%BC%D0%B0" title="Енигма – Serbian" lang="sr" hreflang="sr" data-title="Енигма" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Enigma_(salauslaite)" title="Enigma (salauslaite) – Finnish" lang="fi" hreflang="fi" data-title="Enigma (salauslaite)" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-sv mw-list-item"><a href="https://sv.wikipedia.org/wiki/Enigma_(kryptoapparat)" title="Enigma (kryptoapparat) – Swedish" lang="sv" hreflang="sv" data-title="Enigma (kryptoapparat)" data-language-autonym="Svenska" data-language-local-name="Swedish" class="interlanguage-link-target"><span>Svenska</span></a></li><li class="interlanguage-link interwiki-th mw-list-item"><a href="https://th.wikipedia.org/wiki/%E0%B9%80%E0%B8%84%E0%B8%A3%E0%B8%B7%E0%B9%88%E0%B8%AD%E0%B8%87%E0%B9%80%E0%B8%AD%E0%B8%99%E0%B8%B4%E0%B8%81%E0%B8%A1%E0%B8%B2" title="เครื่องเอนิกมา – Thai" lang="th" hreflang="th" data-title="เครื่องเอนิกมา" data-language-autonym="ไทย" data-language-local-name="Thai" class="interlanguage-link-target"><span>ไทย</span></a></li><li class="interlanguage-link interwiki-tcy mw-list-item"><a href="https://tcy.wikipedia.org/wiki/%E0%B2%8E%E0%B2%A8%E0%B2%BF%E0%B2%97%E0%B3%8D%E0%B2%AE" title="ಎನಿಗ್ಮ – Tulu" lang="tcy" hreflang="tcy" data-title="ಎನಿಗ್ಮ" data-language-autonym="ತುಳು" data-language-local-name="Tulu" class="interlanguage-link-target"><span>ತುಳು</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/Enigma_makinesi" title="Enigma makinesi – Turkish" lang="tr" hreflang="tr" data-title="Enigma makinesi" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%95%D0%BD%D1%96%D0%B3%D0%BC%D0%B0_(%D0%B0%D0%B2%D1%82%D0%BE%D0%BC%D0%B0%D1%82)" title="Енігма (автомат) – Ukrainian" lang="uk" hreflang="uk" data-title="Енігма (автомат)" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-ur mw-list-item"><a href="https://ur.wikipedia.org/wiki/%D8%A7%D9%86%DB%8C%DA%AF%D9%85%D8%A7_%D9%85%D8%B4%DB%8C%D9%86" title="انیگما مشین – Urdu" lang="ur" hreflang="ur" data-title="انیگما مشین" data-language-autonym="اردو" data-language-local-name="Urdu" class="interlanguage-link-target"><span>اردو</span></a></li><li class="interlanguage-link interwiki-vi mw-list-item"><a href="https://vi.wikipedia.org/wiki/M%C3%A1y_Enigma" title="Máy Enigma – Vietnamese" lang="vi" hreflang="vi" data-title="Máy Enigma" data-language-autonym="Tiếng Việt" data-language-local-name="Vietnamese" class="interlanguage-link-target"><span>Tiếng Việt</span></a></li><li class="interlanguage-link interwiki-zh-yue mw-list-item"><a href="https://zh-yue.wikipedia.org/wiki/%E5%95%9E%E8%AC%8E%E6%A9%9F" title="啞謎機 – Cantonese" lang="yue" hreflang="yue" data-title="啞謎機" data-language-autonym="粵語" data-language-local-name="Cantonese" class="interlanguage-link-target"><span>粵語</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E6%81%A9%E5%B0%BC%E6%A0%BC%E7%8E%9B%E5%AF%86%E7%A0%81%E6%9C%BA" title="恩尼格玛密码机 – Chinese" lang="zh" hreflang="zh" data-title="恩尼格玛密码机" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q150758#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Enigma_machine" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Enigma_machine" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Enigma_machine"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Enigma_machine&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Enigma_machine&action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Enigma_machine"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Enigma_machine&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Enigma_machine&action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Enigma_machine" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Enigma_machine" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Enigma_machine&oldid=1259187132" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Enigma_machine&action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&page=Enigma_machine&id=1259187132&wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FEnigma_machine"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FEnigma_machine"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&page=Enigma_machine&action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Enigma_machine&printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Enigma_machine" hreflang="en"><span>Wikimedia Commons</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q150758" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">German cipher machine</div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">This article is about the Enigma machine itself. For the Allied cracking of the machine, see <a href="/wiki/Cryptanalysis_of_the_Enigma" title="Cryptanalysis of the Enigma">Cryptanalysis of the Enigma</a>.</div> <p class="mw-empty-elt"> </p> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma_(crittografia)_-_Museo_scienza_e_tecnologia_Milano.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/b/bd/Enigma_%28crittografia%29_-_Museo_scienza_e_tecnologia_Milano.jpg/220px-Enigma_%28crittografia%29_-_Museo_scienza_e_tecnologia_Milano.jpg" decoding="async" width="220" height="240" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/b/bd/Enigma_%28crittografia%29_-_Museo_scienza_e_tecnologia_Milano.jpg/330px-Enigma_%28crittografia%29_-_Museo_scienza_e_tecnologia_Milano.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/b/bd/Enigma_%28crittografia%29_-_Museo_scienza_e_tecnologia_Milano.jpg/440px-Enigma_%28crittografia%29_-_Museo_scienza_e_tecnologia_Milano.jpg 2x" data-file-width="1039" data-file-height="1133" /></a><figcaption>Military Model Enigma I, in use from 1930</figcaption></figure> <style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1246091330">.mw-parser-output .sidebar{width:22em;float:right;clear:right;margin:0.5em 0 1em 1em;background:var(--background-color-neutral-subtle,#f8f9fa);border:1px solid var(--border-color-base,#a2a9b1);padding:0.2em;text-align:center;line-height:1.4em;font-size:88%;border-collapse:collapse;display:table}body.skin-minerva .mw-parser-output .sidebar{display:table!important;float:right!important;margin:0.5em 0 1em 1em!important}.mw-parser-output .sidebar-subgroup{width:100%;margin:0;border-spacing:0}.mw-parser-output .sidebar-left{float:left;clear:left;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-none{float:none;clear:both;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-outer-title{padding:0 0.4em 0.2em;font-size:125%;line-height:1.2em;font-weight:bold}.mw-parser-output .sidebar-top-image{padding:0.4em}.mw-parser-output .sidebar-top-caption,.mw-parser-output .sidebar-pretitle-with-top-image,.mw-parser-output .sidebar-caption{padding:0.2em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-pretitle{padding:0.4em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-title,.mw-parser-output .sidebar-title-with-pretitle{padding:0.2em 0.8em;font-size:145%;line-height:1.2em}.mw-parser-output .sidebar-title-with-pretitle{padding:0.1em 0.4em}.mw-parser-output .sidebar-image{padding:0.2em 0.4em 0.4em}.mw-parser-output .sidebar-heading{padding:0.1em 0.4em}.mw-parser-output .sidebar-content{padding:0 0.5em 0.4em}.mw-parser-output .sidebar-content-with-subgroup{padding:0.1em 0.4em 0.2em}.mw-parser-output .sidebar-above,.mw-parser-output .sidebar-below{padding:0.3em 0.8em;font-weight:bold}.mw-parser-output .sidebar-collapse .sidebar-above,.mw-parser-output .sidebar-collapse .sidebar-below{border-top:1px solid #aaa;border-bottom:1px solid #aaa}.mw-parser-output .sidebar-navbar{text-align:right;font-size:115%;padding:0 0.4em 0.4em}.mw-parser-output .sidebar-list-title{padding:0 0.4em;text-align:left;font-weight:bold;line-height:1.6em;font-size:105%}.mw-parser-output .sidebar-list-title-c{padding:0 0.4em;text-align:center;margin:0 3.3em}@media(max-width:640px){body.mediawiki .mw-parser-output .sidebar{width:100%!important;clear:both;float:none!important;margin-left:0!important;margin-right:0!important}}body.skin--responsive .mw-parser-output .sidebar a>img{max-width:none!important}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media print{body.ns-0 .mw-parser-output .sidebar{display:none!important}}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><table class="sidebar nomobile nowraplinks"><tbody><tr><th class="sidebar-title">The Enigma cipher machine</th></tr><tr><td class="sidebar-image"><span typeof="mw:File"><a href="/wiki/File:Enigma-logo.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/3/37/Enigma-logo.svg/100px-Enigma-logo.svg.png" decoding="async" width="100" height="44" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/3/37/Enigma-logo.svg/150px-Enigma-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/3/37/Enigma-logo.svg/200px-Enigma-logo.svg.png 2x" data-file-width="702" data-file-height="308" /></a></span></td></tr><tr><th class="sidebar-heading"> <a class="mw-selflink selflink">Enigma machine</a></th></tr><tr><td class="sidebar-content"> <div class="hlist"> <ul><li><a href="/wiki/Enigma_rotor_details" title="Enigma rotor details">Enigma rotors</a></li></ul> </div></td> </tr><tr><th class="sidebar-heading"> <a href="/wiki/Cryptanalysis_of_the_Enigma" title="Cryptanalysis of the Enigma">Breaking Enigma</a></th></tr><tr><td class="sidebar-content"> <div class="hlist"> <ul><li><a href="/wiki/Cipher_Bureau_(Poland)" title="Cipher Bureau (Poland)">Polish Cipher Bureau</a> <ul><li><a href="/wiki/Polish_Enigma_double" title="Polish Enigma double">Doubles</a></li> <li><a href="/wiki/Grill_(cryptology)" title="Grill (cryptology)">Grill</a></li> <li><a href="/wiki/Clock_(cryptography)" title="Clock (cryptography)">Clock</a></li> <li><a href="/wiki/Cyclometer" title="Cyclometer">Cyclometer</a></li> <li><a href="/wiki/Bomba_(cryptography)" title="Bomba (cryptography)">Bomba</a></li> <li><a href="/wiki/Zygalski_sheets" title="Zygalski sheets">Zygalski sheets</a></li></ul></li> <li><a href="/wiki/Bletchley_Park" title="Bletchley Park">Bletchley Park</a> <ul><li><a href="/wiki/Banburismus" title="Banburismus">Banburismus</a></li> <li><a href="/wiki/John_Herivel" title="John Herivel">Herivel tip</a></li> <li><a href="/wiki/Known-plaintext_attack" title="Known-plaintext attack">Crib</a></li> <li><a href="/wiki/Bombe" title="Bombe">Bombe</a></li> <li><a href="/wiki/Hut_3" title="Hut 3">Hut 3</a></li> <li><a href="/wiki/Hut_4" title="Hut 4">Hut 4</a></li> <li><a href="/wiki/Hut_6" title="Hut 6">Hut 6</a></li> <li><a href="/wiki/Hut_8" title="Hut 8">Hut 8</a></li></ul></li> <li><a href="/wiki/PC_Bruno" title="PC Bruno">PC Bruno</a></li> <li><a href="/wiki/Cadix" title="Cadix">Cadix</a></li></ul> </div></td> </tr><tr><th class="sidebar-heading"> Related</th></tr><tr><td class="sidebar-content"> <div class="hlist"> <ul><li><a href="/wiki/Ultra_(cryptography)" title="Ultra (cryptography)">Ultra</a></li></ul> </div></td> </tr><tr><td class="sidebar-navbar"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Enigma_series" title="Template:Enigma series"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Enigma_series" title="Template talk:Enigma series"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Enigma_series" title="Special:EditPage/Template:Enigma series"><abbr title="Edit this template">e</abbr></a></li></ul></div></td></tr></tbody></table> <p>The <b>Enigma machine</b> is a <a href="/wiki/Cipher" title="Cipher">cipher</a> device developed and used in the early- to mid-20th century to protect <a href="/wiki/Commerce" title="Commerce">commercial</a>, diplomatic, and military communication. It was employed extensively by <a href="/wiki/Nazi_Germany" title="Nazi Germany">Nazi Germany</a> during <a href="/wiki/World_War_II" title="World War II">World War II</a>, in all branches of the <a href="/wiki/Wehrmacht" title="Wehrmacht">German military</a>. The Enigma machine was considered so secure that it was used to encipher the most top-secret messages.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup> </p><p>The Enigma has an electromechanical <a href="/wiki/Rotor_machine" title="Rotor machine">rotor mechanism</a> that scrambles the 26 letters of the alphabet. In typical use, one person enters text on the Enigma's keyboard and another person writes down which of the 26 lights above the keyboard illuminated at each key press. If <a href="/wiki/Plaintext" title="Plaintext">plaintext</a> is entered, the illuminated letters are the <a href="/wiki/Ciphertext" title="Ciphertext">ciphertext</a>. Entering ciphertext transforms it back into readable plaintext. The rotor mechanism changes the electrical connections between the keys and the lights with each keypress. </p><p>The security of the system depends on machine settings that were generally changed daily, based on secret key lists distributed in advance, and on other settings that were changed for each message. The receiving station would have to know and use the exact settings employed by the transmitting station to decrypt a message. </p><p>Although Nazi Germany introduced a series of improvements to the Enigma over the years that hampered decryption efforts, they did not prevent <a href="/wiki/Second_Polish_Republic" title="Second Polish Republic">Poland</a> from cracking the machine as early as December 1932 and reading messages prior to and into the war. Poland's sharing of their achievements enabled the <a href="/wiki/Allies_of_World_War_II" title="Allies of World War II">Allies</a> to exploit Enigma-enciphered messages as a major source of intelligence.<sup id="cite_ref-FOOTNOTEComer2021_2-0" class="reference"><a href="#cite_note-FOOTNOTEComer2021-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup> Many commentators say the flow of <a href="/wiki/Ultra_(cryptography)" title="Ultra (cryptography)">Ultra</a> <a href="/wiki/Communications_intelligence" class="mw-redirect" title="Communications intelligence">communications intelligence</a> from the decrypting of Enigma, <a href="/wiki/Lorenz_cipher" title="Lorenz cipher">Lorenz</a>, and other ciphers shortened the war substantially and may even have altered its outcome.<sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup> </p> <style data-mw-deduplicate="TemplateStyles:r886046785">.mw-parser-output .toclimit-2 .toclevel-1 ul,.mw-parser-output .toclimit-3 .toclevel-2 ul,.mw-parser-output .toclimit-4 .toclevel-3 ul,.mw-parser-output .toclimit-5 .toclevel-4 ul,.mw-parser-output .toclimit-6 .toclevel-5 ul,.mw-parser-output .toclimit-7 .toclevel-6 ul{display:none}</style><div class="toclimit-3"><meta property="mw:PageProp/toc" /></div> <div class="mw-heading mw-heading2"><h2 id="History">History</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=1" title="Edit section: History"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The Enigma machine was invented by German engineer <a href="/wiki/Arthur_Scherbius" title="Arthur Scherbius">Arthur Scherbius</a> at the end of <a href="/wiki/World_War_I" title="World War I">World War I</a>.<sup id="cite_ref-Singh2011_4-0" class="reference"><a href="#cite_note-Singh2011-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup> The German firm Scherbius & Ritter, co-founded by Scherbius, patented ideas for a cipher machine in 1918 and began marketing the finished product under the brand name <i>Enigma</i> in 1923, initially targeted at commercial markets.<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup> Early models were used commercially from the early 1920s, and adopted by military and government services of several countries, most notably <a href="/wiki/Nazi_Germany" title="Nazi Germany">Nazi Germany</a> before and during <a href="/wiki/World_War_II" title="World War II">World War II</a>.<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup> </p><p>Several Enigma models were produced,<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup> but the <a href="/wiki/Wehrmacht" title="Wehrmacht">German military</a> models, having a <a href="/wiki/Plugboard" title="Plugboard">plugboard</a>, were the most complex. Japanese and Italian models were also in use.<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup> With its adoption (in slightly modified form) by the German Navy in 1926 and the German Army and Air Force soon after, the name <i>Enigma</i> became widely known in military circles. Pre-war German military planning emphasized fast, mobile forces and tactics, later known as <a href="/wiki/Blitzkrieg" title="Blitzkrieg">blitzkrieg</a>, which depend on radio communication for command and coordination. Since adversaries would likely intercept radio signals, messages had to be protected with secure encipherment. Compact and easily portable, the Enigma machine filled that need. </p> <div class="mw-heading mw-heading3"><h3 id="Breaking_Enigma">Breaking Enigma</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=2" title="Edit section: Breaking Enigma"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Cryptanalysis_of_the_Enigma" title="Cryptanalysis of the Enigma">Cryptanalysis of the Enigma</a></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Poland_Bydgoszcz_Rejewski_monument.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/8/8b/Poland_Bydgoszcz_Rejewski_monument.jpg/290px-Poland_Bydgoszcz_Rejewski_monument.jpg" decoding="async" width="290" height="218" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/8b/Poland_Bydgoszcz_Rejewski_monument.jpg/435px-Poland_Bydgoszcz_Rejewski_monument.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/8b/Poland_Bydgoszcz_Rejewski_monument.jpg/580px-Poland_Bydgoszcz_Rejewski_monument.jpg 2x" data-file-width="2560" data-file-height="1920" /></a><figcaption>A memorial in <a href="/wiki/Bydgoszcz" title="Bydgoszcz">Bydgoszcz</a>, Poland, to <a href="/wiki/Marian_Rejewski" title="Marian Rejewski">Marian Rejewski</a>, the mathematician who, in 1932, first broke Enigma and, in July 1939, helped educate the French and British about Polish methods of Enigma decryption</figcaption></figure> <p><a href="/wiki/French_Third_Republic" title="French Third Republic">French</a> spy <a href="/wiki/Hans-Thilo_Schmidt" title="Hans-Thilo Schmidt">Hans-Thilo Schmidt</a> obtained access to German cipher materials that included the daily keys used in September and October 1932. Those keys included the plugboard settings. The French passed the material to <a href="/wiki/Second_Polish_Republic" title="Second Polish Republic">Poland</a>. Around December 1932, <a href="/wiki/Marian_Rejewski" title="Marian Rejewski">Marian Rejewski</a>, a Polish mathematician and <a href="/wiki/Cryptanalysis" title="Cryptanalysis">cryptologist</a> at the <a href="/wiki/Biuro_Szyfr%C3%B3w" class="mw-redirect" title="Biuro Szyfrów">Polish Cipher Bureau</a>, used the theory of permutations,<sup id="cite_ref-FOOTNOTERejewski1980_9-0" class="reference"><a href="#cite_note-FOOTNOTERejewski1980-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup> and flaws in the German military-message encipherment procedures, to break message keys of the plugboard Enigma machine.<sup id="cite_ref-FOOTNOTEVázquezJiménez–Seral2018_10-0" class="reference"><a href="#cite_note-FOOTNOTEVázquezJiménez–Seral2018-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> Rejewski used the French supplied material and the message traffic that took place in September and October to solve for the unknown rotor wiring. Consequently, the Polish mathematicians were able to build their own Enigma machines, dubbed "<a href="/wiki/Polish_Enigma_double" title="Polish Enigma double">Enigma doubles</a>". Rejewski was aided by fellow mathematician-cryptologists <a href="/wiki/Jerzy_R%C3%B3%C5%BCycki" title="Jerzy Różycki">Jerzy Różycki</a> and <a href="/wiki/Henryk_Zygalski" title="Henryk Zygalski">Henryk Zygalski</a>, both of whom had been recruited with Rejewski from <a href="/wiki/Adam_Mickiewicz_University_in_Pozna%C5%84" title="Adam Mickiewicz University in Poznań">Poznań University</a>, which had been selected for its students' knowledge of the German language, since that area was held by <a href="/wiki/German_Empire" title="German Empire">Germany</a> prior to World War I. The Polish Cipher Bureau developed techniques to defeat the plugboard and find all components of the daily key, which enabled the Cipher Bureau to read German Enigma messages starting from January 1933.<sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup> </p><p>Over time, the German cryptographic procedures improved, and the Cipher Bureau developed techniques and designed mechanical devices to continue reading Enigma traffic. As part of that effort, the Poles exploited quirks of the rotors, compiled catalogues, built a <a href="/wiki/Cyclometer" title="Cyclometer">cyclometer</a> (invented by Rejewski) to help make a catalogue with 100,000 entries, invented and produced <a href="/wiki/Zygalski_sheets" title="Zygalski sheets">Zygalski sheets</a>, and built the electromechanical cryptologic <a href="/wiki/Bomba_(cryptography)" title="Bomba (cryptography)"><i>bomba</i></a> (invented by Rejewski) to search for rotor settings. In 1938 the Poles had six <i>bomby</i> (plural of <i>bomba</i>), but when that year the Germans added two more rotors, ten times as many <i>bomby</i> would have been needed to read the traffic.<sup id="cite_ref-FOOTNOTEKozaczuk198463_12-0" class="reference"><a href="#cite_note-FOOTNOTEKozaczuk198463-12"><span class="cite-bracket">[</span>12<span class="cite-bracket">]</span></a></sup> </p><p>On 26 and 27 July 1939,<sup id="cite_ref-FOOTNOTEErskine2006294–305_13-0" class="reference"><a href="#cite_note-FOOTNOTEErskine2006294–305-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> in <a href="/wiki/Pyry,_Warsaw" title="Pyry, Warsaw">Pyry</a>, just south of <a href="/wiki/Warsaw" title="Warsaw">Warsaw</a>, the Poles initiated French and British <a href="/wiki/Military_intelligence" title="Military intelligence">military intelligence</a> representatives into the Polish <a href="/wiki/Cryptanalysis_of_the_Enigma" title="Cryptanalysis of the Enigma">Enigma-decryption techniques</a> and equipment, including Zygalski sheets and the cryptologic bomb, and promised each delegation a Polish-reconstructed Enigma (the devices were soon delivered).<sup id="cite_ref-FOOTNOTEKozaczuk198459–60,_236_14-0" class="reference"><a href="#cite_note-FOOTNOTEKozaczuk198459–60,_236-14"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup> </p><p>In September 1939, British Military Mission 4, which included <a href="/wiki/Colin_Gubbins" title="Colin Gubbins">Colin Gubbins</a> and <a href="/wiki/Vera_Atkins" title="Vera Atkins">Vera Atkins</a>, went to Poland, intending to evacuate cipher-breakers <a href="/wiki/Marian_Rejewski" title="Marian Rejewski">Marian Rejewski</a>, <a href="/wiki/Jerzy_R%C3%B3%C5%BCycki" title="Jerzy Różycki">Jerzy Różycki</a>, and <a href="/wiki/Henryk_Zygalski" title="Henryk Zygalski">Henryk Zygalski</a> from the country. The cryptologists, however, had been evacuated by their own superiors into Romania, at the time a Polish-allied country. On the way, for security reasons, the Polish Cipher Bureau personnel had deliberately destroyed their records and equipment. From Romania they traveled on to France, where they resumed their cryptological work, collaborating by teletype with the <a href="/wiki/UK" class="mw-redirect" title="UK">British</a>, who began work on decrypting German Enigma messages, using the Polish equipment and techniques.<sup id="cite_ref-FOOTNOTEKozaczuk198469–94_15-0" class="reference"><a href="#cite_note-FOOTNOTEKozaczuk198469–94-15"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup> </p><p><a href="/wiki/Gordon_Welchman" title="Gordon Welchman">Gordon Welchman</a>, who became head of <a href="/wiki/Hut_6" title="Hut 6">Hut 6</a> at Bletchley Park, wrote: "Hut 6 <a href="/wiki/Ultra_(cryptography)" title="Ultra (cryptography)">Ultra</a> would never have got off the ground if we had not learned from the Poles, in the nick of time, the details both of the German military version of the commercial Enigma machine, and of the operating procedures that were in use." The Polish transfer of theory and technology at Pyry formed the crucial basis for the subsequent World War II British Enigma-decryption effort at <a href="/wiki/Bletchley_Park" title="Bletchley Park">Bletchley Park</a>, where Welchman worked.<sup id="cite_ref-FOOTNOTEWelchman1982289_16-0" class="reference"><a href="#cite_note-FOOTNOTEWelchman1982289-16"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup> </p><p>During the war, British cryptologists decrypted a vast number of messages enciphered on Enigma. The intelligence gleaned from this source, codenamed "<a href="/wiki/Ultra_(cryptography)" title="Ultra (cryptography)">Ultra</a>" by the British, was a substantial aid to the <a href="/wiki/Allies_of_World_War_II" title="Allies of World War II">Allied</a> war effort.<sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span class="cite-bracket">[</span>a<span class="cite-bracket">]</span></a></sup> </p><p>Though Enigma had some cryptographic weaknesses, in practice it was German procedural flaws, operator mistakes, failure to systematically introduce changes in encipherment procedures, and Allied capture of key tables and hardware that, during the war, enabled Allied cryptologists to succeed.<sup id="cite_ref-FOOTNOTEKahn1991_18-0" class="reference"><a href="#cite_note-FOOTNOTEKahn1991-18"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-FOOTNOTEStripp1993_19-0" class="reference"><a href="#cite_note-FOOTNOTEStripp1993-19"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup> </p><p>The <a href="/wiki/Abwehr" title="Abwehr">Abwehr</a> used different versions of Enigma machines. In November 1942, during <a href="/wiki/Operation_Torch" title="Operation Torch">Operation Torch</a>, a machine was captured which had no plugboard and the three rotors had been changed to rotate 11, 15, and 19 times rather than once every 26 letters, plus a plate on the left acted as a fourth rotor.<sup id="cite_ref-Flem11_20-0" class="reference"><a href="#cite_note-Flem11-20"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup> From October 1944, the German Abwehr used the <a href="/wiki/Schl%C3%BCsselger%C3%A4t_41" title="Schlüsselgerät 41">Schlüsselgerät 41</a>.<sup id="cite_ref-NSA-German_21-0" class="reference"><a href="#cite_note-NSA-German-21"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup> </p><p>The Abwehr code had been broken on 8 December 1941 by <a href="/wiki/Dilly_Knox" title="Dilly Knox">Dilly Knox</a>. Agents sent messages to the Abwehr in a simple code which was then sent on using an Enigma machine. The simple codes were broken and helped break the daily Enigma cipher. This breaking of the code enabled the <a href="/wiki/Double-Cross_System" title="Double-Cross System">Double-Cross System</a> to operate.<sup id="cite_ref-Flem11_20-1" class="reference"><a href="#cite_note-Flem11-20"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Design">Design</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=3" title="Edit section: Design"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Bundesarchiv_Bild_183-2007-0705-502,_Chiffriermaschine_%22Enigma%22.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/7/7b/Bundesarchiv_Bild_183-2007-0705-502%2C_Chiffriermaschine_%22Enigma%22.jpg/170px-Bundesarchiv_Bild_183-2007-0705-502%2C_Chiffriermaschine_%22Enigma%22.jpg" decoding="async" width="170" height="116" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/7/7b/Bundesarchiv_Bild_183-2007-0705-502%2C_Chiffriermaschine_%22Enigma%22.jpg/255px-Bundesarchiv_Bild_183-2007-0705-502%2C_Chiffriermaschine_%22Enigma%22.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/7/7b/Bundesarchiv_Bild_183-2007-0705-502%2C_Chiffriermaschine_%22Enigma%22.jpg/340px-Bundesarchiv_Bild_183-2007-0705-502%2C_Chiffriermaschine_%22Enigma%22.jpg 2x" data-file-width="800" data-file-height="544" /></a><figcaption>Enigma in use, 1943</figcaption></figure> <p>Like other rotor machines, the Enigma machine is a combination of mechanical and electrical subsystems. The mechanical subsystem consists of a <a href="/wiki/Alphanumeric_keyboard" class="mw-redirect" title="Alphanumeric keyboard">keyboard</a>; a set of rotating disks called <i>rotors</i> arranged adjacently along a <a href="/wiki/Axle" title="Axle">spindle</a>; one of various stepping components to turn at least one rotor with each key press, and a series of lamps, one for each letter. These design features are the reason that the Enigma machine was originally referred to as the rotor-based cipher machine during its intellectual inception in 1915.<sup id="cite_ref-Enigma_History_22-0" class="reference"><a href="#cite_note-Enigma_History-22"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Electrical_pathway">Electrical pathway</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=4" title="Edit section: Electrical pathway"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-left" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma_wiring_kleur.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/5/53/Enigma_wiring_kleur.svg/290px-Enigma_wiring_kleur.svg.png" decoding="async" width="290" height="410" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/53/Enigma_wiring_kleur.svg/435px-Enigma_wiring_kleur.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/53/Enigma_wiring_kleur.svg/580px-Enigma_wiring_kleur.svg.png 2x" data-file-width="708" data-file-height="1000" /></a><figcaption>Enigma wiring diagram with arrows and the numbers 1 to 9 showing how current flows from key depression to a lamp being lit. The <i>A</i> key is encoded to the <i>D</i> lamp. D yields A, but A never yields A; this property was due to a patented feature unique to the Enigmas, and could be exploited by cryptanalysts in some situations.</figcaption></figure> <p>An electrical pathway is a route for current to travel. By manipulating this phenomenon the Enigma machine was able to scramble messages.<sup id="cite_ref-Enigma_History_22-1" class="reference"><a href="#cite_note-Enigma_History-22"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> The mechanical parts act by forming a varying <a href="/wiki/Electrical_network" title="Electrical network">electrical circuit</a>. When a key is pressed, one or more rotors rotate on the spindle. On the sides of the rotors are a series of electrical contacts that, after rotation, line up with contacts on the other rotors or fixed wiring on either end of the spindle. When the rotors are properly aligned, each key on the keyboard is connected to a unique electrical pathway through the series of contacts and internal wiring. Current, typically from a battery, flows through the pressed key, into the newly configured set of circuits and back out again, ultimately lighting one display <a href="/wiki/Electric_light" title="Electric light">lamp</a>, which shows the output letter. For example, when encrypting a message starting <i>ANX...</i>, the operator would first press the <i>A</i> key, and the <i>Z</i> lamp might light, so <i>Z</i> would be the first letter of the <a href="/wiki/Ciphertext" title="Ciphertext">ciphertext</a>. The operator would next press <i>N</i>, and then <i>X</i> in the same fashion, and so on. </p> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma-action.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/6/6c/Enigma-action.svg/170px-Enigma-action.svg.png" decoding="async" width="170" height="193" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/6/6c/Enigma-action.svg/255px-Enigma-action.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/6/6c/Enigma-action.svg/340px-Enigma-action.svg.png 2x" data-file-width="633" data-file-height="720" /></a><figcaption>The scrambling action of Enigma's rotors is shown for two consecutive letters with the right-hand rotor moving one position between them.</figcaption></figure> <p>Current flows from the battery (1) through a depressed bi-directional keyboard switch (2) to the plugboard (3). Next, it passes through the (unused in this instance, so shown closed) plug "A" (3) via the entry wheel (4), through the wiring of the three (Wehrmacht Enigma) or four (<i><a href="/wiki/Kriegsmarine" title="Kriegsmarine">Kriegsmarine</a></i> M4 and <i>Abwehr</i> variants) installed rotors (5), and enters the reflector (6). The reflector returns the current, via an entirely different path, back through the rotors (5) and entry wheel (4), proceeding through plug "S" (7) connected with a cable (8) to plug "D", and another bi-directional switch (9) to light the appropriate lamp.<sup id="cite_ref-Rijmenants_23-0" class="reference"><a href="#cite_note-Rijmenants-23"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> </p><p>The repeated changes of electrical path through an Enigma scrambler implement a <a href="/wiki/Polyalphabetic_cipher" title="Polyalphabetic cipher">polyalphabetic substitution cipher</a> that provides Enigma's security. The diagram on the right shows how the electrical pathway changes with each key depression, which causes rotation of at least the right-hand rotor. Current passes into the set of rotors, into and back out of the reflector, and out through the rotors again. The greyed-out lines are other possible paths within each rotor; these are hard-wired from one side of each rotor to the other. The letter <i>A</i> encrypts differently with consecutive key presses, first to <i>G</i>, and then to <i>C</i>. This is because the right-hand rotor steps (rotates one position) on each key press, sending the signal on a completely different route. Eventually other rotors step with a key press. </p> <div class="mw-heading mw-heading3"><h3 id="Rotors">Rotors</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=5" title="Edit section: Rotors"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma_rotors_with_alphabet_rings.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/d/dd/Enigma_rotors_with_alphabet_rings.jpg/220px-Enigma_rotors_with_alphabet_rings.jpg" decoding="async" width="220" height="179" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/d/dd/Enigma_rotors_with_alphabet_rings.jpg/330px-Enigma_rotors_with_alphabet_rings.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/d/dd/Enigma_rotors_with_alphabet_rings.jpg/440px-Enigma_rotors_with_alphabet_rings.jpg 2x" data-file-width="4034" data-file-height="3275" /></a><figcaption>Enigma rotor assembly. In the Enigma I, three movable rotors are sandwiched between two fixed wheels: the entry wheel, on the right, and the reflector on the left.</figcaption></figure> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Enigma_rotor_details" title="Enigma rotor details">Enigma rotor details</a></div> <p>The rotors (alternatively <i>wheels</i> or <i>drums</i>, <i>Walzen</i> in German) form the heart of an Enigma machine. Each rotor is a disc approximately 10 cm (3.9 in) in diameter made from <a href="/wiki/Ebonite" title="Ebonite">Ebonite</a> or <a href="/wiki/Bakelite" title="Bakelite">Bakelite</a> with 26 <a href="/wiki/Brass" title="Brass">brass</a>, spring-loaded, <a href="/wiki/Electrical_contact" title="Electrical contact">electrical contact</a> pins arranged in a circle on one face, with the other face housing 26 corresponding <a href="/wiki/Electrical_contacts" class="mw-redirect" title="Electrical contacts">electrical contacts</a> in the form of circular plates. The pins and contacts represent the <a href="/wiki/Alphabet" title="Alphabet">alphabet</a> — typically the 26 letters A–Z, as will be assumed for the rest of this description. When the rotors are mounted side by side on the spindle, the pins of one rotor rest against the plate contacts of the neighbouring rotor, forming an electrical connection. Inside the body of the rotor, 26 wires connect each pin on one side to a contact on the other in a complex pattern. Most of the rotors are identified by Roman numerals, and each issued copy of rotor I, for instance, is wired identically to all others. The same is true for the special thin beta and gamma rotors used in the <a href="/wiki/Enigma-M4" title="Enigma-M4">M4</a> naval variant. </p> <figure class="mw-default-size mw-halign-left" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma-rotors.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/1/18/Enigma-rotors.jpg/220px-Enigma-rotors.jpg" decoding="async" width="220" height="140" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/1/18/Enigma-rotors.jpg/330px-Enigma-rotors.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/1/18/Enigma-rotors.jpg/440px-Enigma-rotors.jpg 2x" data-file-width="595" data-file-height="379" /></a><figcaption>Three Enigma rotors and the shaft, on which they are placed when in use</figcaption></figure> <p>By itself, a rotor performs only a very simple type of <a href="/wiki/Encryption" title="Encryption">encryption</a>, a simple <a href="/wiki/Substitution_cipher" title="Substitution cipher">substitution cipher</a>. For example, the pin corresponding to the letter <i>E</i> might be wired to the contact for letter <i>T</i> on the opposite face, and so on. Enigma's security comes from using several rotors in series (usually three or four) and the regular stepping movement of the rotors, thus implementing a polyalphabetic substitution cipher. </p><p>Each rotor can be set to one of 26 starting positions when placed in an Enigma machine. After insertion, a rotor can be turned to the correct position by hand, using the grooved finger-wheel which protrudes from the internal Enigma cover when closed. In order for the operator to know the rotor's position, each has an <i>alphabet tyre</i> (or letter ring) attached to the outside of the rotor disc, with 26 characters (typically letters); one of these is visible through the window for that slot in the cover, thus indicating the rotational position of the rotor. In early models, the alphabet ring was fixed to the rotor disc. A later improvement was the ability to adjust the alphabet ring relative to the rotor disc. The position of the ring was known as the <i>Ringstellung</i> ("ring setting"), and that setting was a part of the initial setup needed prior to an operating session. In modern terms it was a part of the <a href="/wiki/Initialization_vector" title="Initialization vector">initialization vector</a>. </p> <figure class="mw-default-size mw-halign-left" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma_rotors_and_spindle_showing_contacts_rachet_and_notch.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/d/d8/Enigma_rotors_and_spindle_showing_contacts_rachet_and_notch.jpg/220px-Enigma_rotors_and_spindle_showing_contacts_rachet_and_notch.jpg" decoding="async" width="220" height="117" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/d/d8/Enigma_rotors_and_spindle_showing_contacts_rachet_and_notch.jpg/330px-Enigma_rotors_and_spindle_showing_contacts_rachet_and_notch.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/d/d8/Enigma_rotors_and_spindle_showing_contacts_rachet_and_notch.jpg/440px-Enigma_rotors_and_spindle_showing_contacts_rachet_and_notch.jpg 2x" data-file-width="3134" data-file-height="1662" /></a><figcaption>Two Enigma rotors showing electrical contacts, stepping ratchet (on the left) and notch (on the right-hand rotor opposite <b>D</b>)</figcaption></figure> <p>Each rotor contains one or more notches that control rotor stepping. In the military variants, the notches are located on the alphabet ring. </p><p>The Army and Air Force Enigmas were used with several rotors, initially three. On 15 December 1938, this changed to five, from which three were chosen for a given session. Rotors were marked with <a href="/wiki/Roman_numerals" title="Roman numerals">Roman numerals</a> to distinguish them: I, II, III, IV and V, all with single turnover notches located at different points on the alphabet ring. This variation was probably intended as a security measure, but ultimately allowed the Polish <a href="/wiki/Clock_(cryptography)" title="Clock (cryptography)">Clock Method</a> and British <a href="/wiki/Banburismus" title="Banburismus">Banburismus</a> attacks. </p><p>The Naval version of the <i><a href="/wiki/Wehrmacht" title="Wehrmacht">Wehrmacht</a></i> Enigma had always been issued with more rotors than the other services: At first six, then seven, and finally eight. The additional rotors were marked VI, VII and VIII, all with different wiring, and had two notches, resulting in more frequent turnover. The four-rotor Naval Enigma (M4) machine accommodated an extra rotor in the same space as the three-rotor version. This was accomplished by replacing the original reflector with a thinner one and by adding a thin fourth rotor. That fourth rotor was one of two types, <i>Beta</i> or <i>Gamma</i>, and never stepped, but could be manually set to any of 26 positions. One of the 26 made the machine perform identically to the three-rotor machine. </p> <div class="mw-heading mw-heading3"><h3 id="Stepping">Stepping</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=6" title="Edit section: Stepping"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>To avoid merely implementing a simple (solvable) substitution cipher, every key press caused one or more rotors to step by one twenty-sixth of a full rotation, before the electrical connections were made. This changed the substitution alphabet used for encryption, ensuring that the cryptographic substitution was different at each new rotor position, producing a more formidable polyalphabetic substitution cipher. The stepping mechanism varied slightly from model to model. The right-hand rotor stepped once with each keystroke, and other rotors stepped less frequently. </p> <div class="mw-heading mw-heading3"><h3 id="Turnover">Turnover</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=7" title="Edit section: Turnover"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma_ratchet.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/6/6a/Enigma_ratchet.png/220px-Enigma_ratchet.png" decoding="async" width="220" height="147" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/6/6a/Enigma_ratchet.png/330px-Enigma_ratchet.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/6/6a/Enigma_ratchet.png/440px-Enigma_ratchet.png 2x" data-file-width="600" data-file-height="400" /></a><figcaption>The Enigma stepping motion seen from the side away from the operator. All three ratchet pawls (green) push in unison as a key is depressed. For the first rotor (1), which to the operator is the right-hand rotor, the ratchet (red) is always engaged, and steps with each keypress. Here, the middle rotor (2) is engaged, because the notch in the first rotor is aligned with the pawl; it will step (<i>turn over</i>) with the first rotor. The third rotor (3) is not engaged, because the notch in the second rotor is not aligned to the pawl, so it will not engage with the rachet.</figcaption></figure> <p>The advancement of a rotor other than the left-hand one was called a <i>turnover</i> by the British. This was achieved by a <a href="/wiki/Ratchet_(device)" title="Ratchet (device)">ratchet and pawl</a> mechanism. Each rotor had a ratchet with 26 teeth and every time a key was pressed, the set of spring-loaded pawls moved forward in unison, trying to engage with a ratchet. The alphabet ring of the rotor to the right normally prevented this. As this ring rotated with its rotor, a notch machined into it would eventually align itself with the pawl, allowing it to engage with the ratchet, and advance the rotor on its left. The right-hand pawl, having no rotor and ring to its right, stepped its rotor with every key depression.<sup id="cite_ref-doublestepping_24-0" class="reference"><a href="#cite_note-doublestepping-24"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup> For a single-notch rotor in the right-hand position, the middle rotor stepped once for every 26 steps of the right-hand rotor. Similarly for rotors two and three. For a two-notch rotor, the rotor to its left would turn over twice for each rotation. </p><p>The first five rotors to be introduced (I–V) contained one notch each, while the additional naval rotors VI, VII and VIII each had two notches. The position of the notch on each rotor was determined by the letter ring which could be adjusted in relation to the core containing the interconnections. The points on the rings at which they caused the next wheel to move were as follows.<sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup> </p> <table class="wikitable" style="margin: 1em auto 1em auto"> <caption>Position of turnover notches </caption> <tbody><tr> <th style="width:130pt;">Rotor </th> <th style="width:130pt;">Turnover position(s) </th> <th style="width:130pt;">BP mnemonic </th></tr> <tr style="text-align:center;"> <td>I</td> <td style="text-align:center;">R</td> <td style="text-align:center;">Royal </td></tr> <tr style="text-align:center;"> <td>II</td> <td style="text-align:center;">F</td> <td style="text-align:center;">Flags </td></tr> <tr style="text-align:center;"> <td>III</td> <td style="text-align:center;">W</td> <td style="text-align:center;">Wave </td></tr> <tr style="text-align:center;"> <td>IV</td> <td style="text-align:center;">K</td> <td style="text-align:center;">Kings </td></tr> <tr style="text-align:center;"> <td>V</td> <td style="text-align:center;">A</td> <td style="text-align:center;">Above </td></tr> <tr> <td style="text-align:center;">VI, VII and VIII</td> <td style="text-align:center;">A and N</td> <td> </td></tr></tbody></table> <p>The design also included a feature known as <i>double-stepping</i>. This occurred when each pawl aligned with both the ratchet of its rotor and the rotating notched ring of the neighbouring rotor. If a pawl engaged with a ratchet through alignment with a notch, as it moved forward it pushed against both the ratchet and the notch, advancing both rotors. In a three-rotor machine, double-stepping affected rotor two only. If, in moving forward, the ratchet of rotor three was engaged, rotor two would move again on the subsequent keystroke, resulting in two consecutive steps. Rotor two also pushes rotor one forward after 26 steps, but since rotor one moves forward with every keystroke anyway, there is no double-stepping.<sup id="cite_ref-doublestepping_24-1" class="reference"><a href="#cite_note-doublestepping-24"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup> This double-stepping caused the rotors to deviate from <a href="/wiki/Odometer" title="Odometer">odometer</a>-style regular motion. </p><p>With three wheels and only single notches in the first and second wheels, the machine had a period of 26×25×26 = 16,900 (not 26×26×26, because of double-stepping).<sup id="cite_ref-doublestepping_24-2" class="reference"><a href="#cite_note-doublestepping-24"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup> Historically, messages were limited to a few hundred letters, and so there was no chance of repeating any combined rotor position during a single session, denying cryptanalysts valuable clues. </p><p>To make room for the Naval fourth rotors, the reflector was made much thinner. The fourth rotor fitted into the space made available. No other changes were made, which eased the changeover. Since there were only three pawls, the fourth rotor never stepped, but could be manually set into one of 26 possible positions. </p><p> A device that was designed, but not implemented before the war's end, was the <i>Lückenfüllerwalze</i> (gap-fill wheel) that implemented irregular stepping. It allowed field configuration of notches in all 26 positions. If the number of notches was a <a href="/wiki/Coprime_integers" title="Coprime integers">relative prime</a> of 26 and the number of notches were different for each wheel, the stepping would be more unpredictable. Like the Umkehrwalze-D it also allowed the internal wiring to be reconfigured.<sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup></p><div style="clear:both;" class=""></div> <div class="mw-heading mw-heading3"><h3 id="Entry_wheel">Entry wheel</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=8" title="Edit section: Entry wheel"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The current entry wheel (<i>Eintrittswalze</i> in German), or entry <a href="/wiki/Stator" title="Stator">stator</a>, connects the <a href="/wiki/Plugboard" title="Plugboard">plugboard</a> to the rotor assembly. If the plugboard is not present, the entry wheel instead connects the keyboard and lampboard to the rotor assembly. While the exact wiring used is of comparatively little importance to security, it proved an obstacle to Rejewski's progress during his study of the rotor wirings. The commercial Enigma connects the keys in the order of their sequence on a <a href="/wiki/QWERTZ" title="QWERTZ">QWERTZ</a> keyboard: <i>Q</i>→<i>A</i>, <i>W</i>→<i>B</i>, <i>E</i>→<i>C</i> and so on. The military Enigma connects them in straight alphabetical order: <i>A</i>→<i>A</i>, <i>B</i>→<i>B</i>, <i>C</i>→<i>C</i>, and so on. It took inspired guesswork for Rejewski to penetrate the modification. </p> <div class="mw-heading mw-heading3"><h3 id="Reflector">Reflector</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=9" title="Edit section: Reflector"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-left" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma_insides.agr.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/b/ba/Enigma_insides.agr.jpg/220px-Enigma_insides.agr.jpg" decoding="async" width="220" height="165" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/b/ba/Enigma_insides.agr.jpg/330px-Enigma_insides.agr.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/b/ba/Enigma_insides.agr.jpg/440px-Enigma_insides.agr.jpg 2x" data-file-width="3264" data-file-height="2448" /></a><figcaption>Internal mechanism of an Enigma machine showing the type B reflector and rotor stack</figcaption></figure> <p>With the exception of models <i>A</i> and <i>B</i>, the last rotor came before a 'reflector' (German: <i>Umkehrwalze</i>, meaning 'reversal rotor'), a patented feature<sup id="cite_ref-Korn_27-0" class="reference"><a href="#cite_note-Korn-27"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> unique to Enigma among the period's various rotor machines. The reflector connected outputs of the last rotor in pairs, redirecting current back through the rotors by a different route. The reflector ensured that Enigma would be <a href="/wiki/Involution_(mathematics)" title="Involution (mathematics)">self-reciprocal</a>; thus, with two identically configured machines, a message could be encrypted on one and decrypted on the other, without the need for a bulky mechanism to switch between encryption and decryption modes. The reflector allowed a more compact design, but it also gave Enigma the property that no letter ever encrypted to itself. This was a severe cryptological flaw that was subsequently exploited by codebreakers. </p><p>In Model 'C', the reflector could be inserted in one of two different positions. In Model 'D', the reflector could be set in 26 possible positions, although it did not move during encryption. In the <i>Abwehr</i> Enigma, the reflector stepped during encryption in a manner similar to the other wheels. </p><p> In the German Army and Air Force Enigma, the reflector was fixed and did not rotate; there were four versions. The original version was marked 'A',<sup id="cite_ref-FOOTNOTEMarksWeierud2000_28-0" class="reference"><a href="#cite_note-FOOTNOTEMarksWeierud2000-28"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup> and was replaced by <i>Umkehrwalze B</i> on 1 November 1937. A third version, <i>Umkehrwalze C</i> was used briefly in 1940, possibly by mistake, and was solved by <a href="/wiki/Hut_6" title="Hut 6">Hut 6</a>.<sup id="cite_ref-FOOTNOTEMarks2001101–141_29-0" class="reference"><a href="#cite_note-FOOTNOTEMarks2001101–141-29"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup> The fourth version, first observed on 2 January 1944, had a rewireable reflector, called <i>Umkehrwalze D</i>, nick-named Uncle Dick by the British, allowing the Enigma operator to alter the connections as part of the key settings.</p><div style="clear:both;" class=""></div> <div class="mw-heading mw-heading3"><h3 id="Plugboard">Plugboard</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=10" title="Edit section: Plugboard"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma-plugboard.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/2/27/Enigma-plugboard.jpg/220px-Enigma-plugboard.jpg" decoding="async" width="220" height="150" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/2/27/Enigma-plugboard.jpg/330px-Enigma-plugboard.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/2/27/Enigma-plugboard.jpg/440px-Enigma-plugboard.jpg 2x" data-file-width="921" data-file-height="627" /></a><figcaption>The plugboard (<i>Steckerbrett</i>) was positioned at the front of the machine, below the keys. When in use during World War II, there were ten connections. In this photograph, just two pairs of letters have been swapped (A↔J and S↔O).</figcaption></figure> <p>The plugboard (<i>Steckerbrett</i> in German) permitted variable wiring that could be reconfigured by the operator. It was introduced on German Army versions in 1928,<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">[</span>29<span class="cite-bracket">]</span></a></sup> and was soon adopted by the <i><a href="/wiki/Reichsmarine" title="Reichsmarine">Reichsmarine</a></i> (German Navy). The plugboard contributed more cryptographic strength than an extra rotor, as it had 150 trillion possible settings (see below).<sup id="cite_ref-158,962,555,217,826,360,000_31-0" class="reference"><a href="#cite_note-158,962,555,217,826,360,000-31"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> Enigma without a plugboard (known as <i>unsteckered Enigma</i>) could be solved relatively straightforwardly using hand methods; these techniques were generally defeated by the plugboard, driving Allied cryptanalysts to develop special machines to solve it. </p><p>A cable placed onto the plugboard connected letters in pairs; for example, <i>E</i> and <i>Q</i> might be a steckered pair. The effect was to swap those letters before and after the main rotor scrambling unit. For example, when an operator pressed <i>E</i>, the signal was diverted to <i>Q</i> before entering the rotors. Up to 13 steckered pairs might be used at one time, although only 10 were normally used. </p><p>Current flowed from the keyboard through the plugboard, and proceeded to the entry-rotor or <i>Eintrittswalze</i>. Each letter on the plugboard had two jacks. Inserting a plug disconnected the upper jack (from the keyboard) and the lower jack (to the entry-rotor) of that letter. The plug at the other end of the crosswired cable was inserted into another letter's jacks, thus switching the connections of the two letters. </p> <div class="mw-heading mw-heading3"><h3 id="Accessories">Accessories</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=11" title="Edit section: Accessories"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma-printer-2.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/7/77/Enigma-printer-2.jpg/220px-Enigma-printer-2.jpg" decoding="async" width="220" height="165" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/7/77/Enigma-printer-2.jpg/330px-Enigma-printer-2.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/7/77/Enigma-printer-2.jpg/440px-Enigma-printer-2.jpg 2x" data-file-width="2048" data-file-height="1536" /></a><figcaption>The <i>Schreibmax</i> was a printing unit which could be attached to the Enigma, removing the need for laboriously writing down the letters indicated on the light panel.</figcaption></figure> <p>Other features made various Enigma machines more secure or more convenient.<sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">[</span>31<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Schreibmax"><i>Schreibmax</i></h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=12" title="Edit section: Schreibmax"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Some M4 Enigmas used the <i>Schreibmax</i>, a small <a href="/wiki/Printer_(computing)" title="Printer (computing)">printer</a> that could print the 26 letters on a narrow paper ribbon. This eliminated the need for a second operator to read the lamps and transcribe the letters. The <i>Schreibmax</i> was placed on top of the Enigma machine and was connected to the lamp panel. To install the printer, the lamp cover and light bulbs had to be removed. It improved both convenience and operational security; the printer could be installed remotely such that the signal officer operating the machine no longer had to see the decrypted <a href="/wiki/Plaintext" title="Plaintext">plaintext</a>. </p> <div class="mw-heading mw-heading4"><h4 id="Fernlesegerät"><span id="Fernleseger.C3.A4t"></span><i>Fernlesegerät</i></h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=13" title="Edit section: Fernlesegerät"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Another accessory was the remote lamp panel <i>Fernlesegerät</i>. For machines equipped with the extra panel, the wooden case of the Enigma was wider and could store the extra panel. A lamp panel version could be connected afterwards, but that required, as with the <i>Schreibmax</i>, that the lamp panel and light bulbs be removed.<sup id="cite_ref-Rijmenants_23-1" class="reference"><a href="#cite_note-Rijmenants-23"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> The remote panel made it possible for a person to read the decrypted plaintext without the operator seeing it. </p> <div class="mw-heading mw-heading4"><h4 id="Uhr"><i>Uhr</i></h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=14" title="Edit section: Uhr"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma-uhr-box.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/4/45/Enigma-uhr-box.jpg/170px-Enigma-uhr-box.jpg" decoding="async" width="170" height="263" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/45/Enigma-uhr-box.jpg/255px-Enigma-uhr-box.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/45/Enigma-uhr-box.jpg/340px-Enigma-uhr-box.jpg 2x" data-file-width="711" data-file-height="1098" /></a><figcaption>The Enigma Uhr attachment</figcaption></figure> <p>In 1944, the <i>Luftwaffe</i> introduced a plugboard switch, called the <i>Uhr</i> (clock), a small box containing a switch with 40 positions. It replaced the standard plugs. After connecting the plugs, as determined in the daily key sheet, the operator turned the switch into one of the 40 positions, each producing a different combination of plug wiring. Most of these plug connections were, unlike the default plugs, not pair-wise.<sup id="cite_ref-Rijmenants_23-2" class="reference"><a href="#cite_note-Rijmenants-23"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> In one switch position, the <i>Uhr</i> did not swap letters, but simply emulated the 13 stecker wires with plugs. </p> <div class="mw-heading mw-heading3"><h3 id="Mathematical_analysis">Mathematical analysis</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=15" title="Edit section: Mathematical analysis"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The Enigma transformation for each letter can be specified mathematically as a product of <a href="/wiki/Permutation" title="Permutation">permutations</a>.<sup id="cite_ref-FOOTNOTERejewski1980_9-1" class="reference"><a href="#cite_note-FOOTNOTERejewski1980-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup> Assuming a three-rotor German Army/Air Force Enigma, let <span class="texhtml mvar" style="font-style:italic;">P</span> denote the plugboard transformation, <span class="texhtml mvar" style="font-style:italic;">U</span> denote that of the reflector (<span class="mwe-math-element"><span class="mwe-math-mathml-inline mwe-math-mathml-a11y" style="display: none;"><math xmlns="http://www.w3.org/1998/Math/MathML" alttext="{\displaystyle U=U^{-1}}"> <semantics> <mrow class="MJX-TeXAtom-ORD"> <mstyle displaystyle="true" scriptlevel="0"> <mi>U</mi> <mo>=</mo> <msup> <mi>U</mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mn>1</mn> </mrow> </msup> </mstyle> </mrow> <annotation encoding="application/x-tex">{\displaystyle U=U^{-1}}</annotation> </semantics> </math></span><img src="https://wikimedia.org/api/rest_v1/media/math/render/svg/94c054f014bee9e8ae4f9d56da78ddeb23811dc5" class="mwe-math-fallback-image-inline mw-invert skin-invert" aria-hidden="true" style="vertical-align: -0.338ex; width:9.055ex; height:2.676ex;" alt="{\displaystyle U=U^{-1}}"></span>), and <span class="texhtml mvar" style="font-style:italic;">L</span>, <span class="texhtml mvar" style="font-style:italic;">M</span>, <span class="texhtml mvar" style="font-style:italic;">R</span> denote those of the left, middle and right rotors respectively. Then the encryption <span class="texhtml mvar" style="font-style:italic;">E</span> can be expressed as </p> <dl><dd><span class="mwe-math-element"><span class="mwe-math-mathml-inline mwe-math-mathml-a11y" style="display: none;"><math xmlns="http://www.w3.org/1998/Math/MathML" alttext="{\displaystyle E=PRMLUL^{-1}M^{-1}R^{-1}P^{-1}.}"> <semantics> <mrow class="MJX-TeXAtom-ORD"> <mstyle displaystyle="true" scriptlevel="0"> <mi>E</mi> <mo>=</mo> <mi>P</mi> <mi>R</mi> <mi>M</mi> <mi>L</mi> <mi>U</mi> <msup> <mi>L</mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mn>1</mn> </mrow> </msup> <msup> <mi>M</mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mn>1</mn> </mrow> </msup> <msup> <mi>R</mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mn>1</mn> </mrow> </msup> <msup> <mi>P</mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mn>1</mn> </mrow> </msup> <mo>.</mo> </mstyle> </mrow> <annotation encoding="application/x-tex">{\displaystyle E=PRMLUL^{-1}M^{-1}R^{-1}P^{-1}.}</annotation> </semantics> </math></span><img src="https://wikimedia.org/api/rest_v1/media/math/render/svg/9ca4f88540d717ad770f2ac36735eac115a21f01" class="mwe-math-fallback-image-inline mw-invert skin-invert" aria-hidden="true" style="vertical-align: -0.338ex; width:31.836ex; height:2.676ex;" alt="{\displaystyle E=PRMLUL^{-1}M^{-1}R^{-1}P^{-1}.}"></span></dd></dl> <p>After each key press, the rotors turn, changing the transformation. For example, if the right-hand rotor <span class="texhtml mvar" style="font-style:italic;">R</span> is rotated <span class="texhtml mvar" style="font-style:italic;">n</span> positions, the transformation becomes </p> <dl><dd><span class="mwe-math-element"><span class="mwe-math-mathml-inline mwe-math-mathml-a11y" style="display: none;"><math xmlns="http://www.w3.org/1998/Math/MathML" alttext="{\displaystyle \rho ^{n}R\rho ^{-n},}"> <semantics> <mrow class="MJX-TeXAtom-ORD"> <mstyle displaystyle="true" scriptlevel="0"> <msup> <mi>ρ<!-- ρ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mi>n</mi> </mrow> </msup> <mi>R</mi> <msup> <mi>ρ<!-- ρ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mi>n</mi> </mrow> </msup> <mo>,</mo> </mstyle> </mrow> <annotation encoding="application/x-tex">{\displaystyle \rho ^{n}R\rho ^{-n},}</annotation> </semantics> </math></span><img src="https://wikimedia.org/api/rest_v1/media/math/render/svg/16f5788e74b9027244d766fb6fac4cd726f5a4ae" class="mwe-math-fallback-image-inline mw-invert skin-invert" aria-hidden="true" style="vertical-align: -0.838ex; width:8.53ex; height:3.009ex;" alt="{\displaystyle \rho ^{n}R\rho ^{-n},}"></span></dd></dl> <p>where <span class="texhtml mvar" style="font-style:italic;">ρ</span> is the <a href="/wiki/Cyclic_permutation" title="Cyclic permutation">cyclic permutation</a> mapping A to B, B to C, and so forth. Similarly, the middle and left-hand rotors can be represented as <span class="texhtml mvar" style="font-style:italic;">j</span> and <span class="texhtml mvar" style="font-style:italic;">k</span> rotations of <span class="texhtml mvar" style="font-style:italic;">M</span> and <span class="texhtml mvar" style="font-style:italic;">L</span>. The encryption transformation can then be described as </p> <dl><dd><span class="mwe-math-element"><span class="mwe-math-mathml-inline mwe-math-mathml-a11y" style="display: none;"><math xmlns="http://www.w3.org/1998/Math/MathML" alttext="{\displaystyle E=P\left(\rho ^{n}R\rho ^{-n}\right)\left(\rho ^{j}M\rho ^{-j}\right)\left(\rho ^{k}L\rho ^{-k}\right)U\left(\rho ^{k}L^{-1}\rho ^{-k}\right)\left(\rho ^{j}M^{-1}\rho ^{-j}\right)\left(\rho ^{n}R^{-1}\rho ^{-n}\right)P^{-1}.}"> <semantics> <mrow class="MJX-TeXAtom-ORD"> <mstyle displaystyle="true" scriptlevel="0"> <mi>E</mi> <mo>=</mo> <mi>P</mi> <mrow> <mo>(</mo> <mrow> <msup> <mi>ρ<!-- ρ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mi>n</mi> </mrow> </msup> <mi>R</mi> <msup> <mi>ρ<!-- ρ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mi>n</mi> </mrow> </msup> </mrow> <mo>)</mo> </mrow> <mrow> <mo>(</mo> <mrow> <msup> <mi>ρ<!-- ρ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mi>j</mi> </mrow> </msup> <mi>M</mi> <msup> <mi>ρ<!-- ρ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mi>j</mi> </mrow> </msup> </mrow> <mo>)</mo> </mrow> <mrow> <mo>(</mo> <mrow> <msup> <mi>ρ<!-- ρ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mi>k</mi> </mrow> </msup> <mi>L</mi> <msup> <mi>ρ<!-- ρ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mi>k</mi> </mrow> </msup> </mrow> <mo>)</mo> </mrow> <mi>U</mi> <mrow> <mo>(</mo> <mrow> <msup> <mi>ρ<!-- ρ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mi>k</mi> </mrow> </msup> <msup> <mi>L</mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mn>1</mn> </mrow> </msup> <msup> <mi>ρ<!-- ρ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mi>k</mi> </mrow> </msup> </mrow> <mo>)</mo> </mrow> <mrow> <mo>(</mo> <mrow> <msup> <mi>ρ<!-- ρ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mi>j</mi> </mrow> </msup> <msup> <mi>M</mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mn>1</mn> </mrow> </msup> <msup> <mi>ρ<!-- ρ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mi>j</mi> </mrow> </msup> </mrow> <mo>)</mo> </mrow> <mrow> <mo>(</mo> <mrow> <msup> <mi>ρ<!-- ρ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mi>n</mi> </mrow> </msup> <msup> <mi>R</mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mn>1</mn> </mrow> </msup> <msup> <mi>ρ<!-- ρ --></mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mi>n</mi> </mrow> </msup> </mrow> <mo>)</mo> </mrow> <msup> <mi>P</mi> <mrow class="MJX-TeXAtom-ORD"> <mo>−<!-- − --></mo> <mn>1</mn> </mrow> </msup> <mo>.</mo> </mstyle> </mrow> <annotation encoding="application/x-tex">{\displaystyle E=P\left(\rho ^{n}R\rho ^{-n}\right)\left(\rho ^{j}M\rho ^{-j}\right)\left(\rho ^{k}L\rho ^{-k}\right)U\left(\rho ^{k}L^{-1}\rho ^{-k}\right)\left(\rho ^{j}M^{-1}\rho ^{-j}\right)\left(\rho ^{n}R^{-1}\rho ^{-n}\right)P^{-1}.}</annotation> </semantics> </math></span><img src="https://wikimedia.org/api/rest_v1/media/math/render/svg/e4244f8b3fb7118985e4f0b4b6accd4b7f5677b7" class="mwe-math-fallback-image-inline mw-invert skin-invert" aria-hidden="true" style="vertical-align: -1.005ex; width:82.674ex; height:3.343ex;" alt="{\displaystyle E=P\left(\rho ^{n}R\rho ^{-n}\right)\left(\rho ^{j}M\rho ^{-j}\right)\left(\rho ^{k}L\rho ^{-k}\right)U\left(\rho ^{k}L^{-1}\rho ^{-k}\right)\left(\rho ^{j}M^{-1}\rho ^{-j}\right)\left(\rho ^{n}R^{-1}\rho ^{-n}\right)P^{-1}.}"></span></dd></dl> <p>Combining three rotors from a set of five, each of the 3 rotor settings with 26 positions, and the plugboard with ten pairs of letters connected, the military Enigma has 158,962,555,217,826,360,000 different settings (nearly 159 <a href="/wiki/Names_of_large_numbers" title="Names of large numbers">quintillion</a> or about 67 <a href="/wiki/Bit" title="Bit">bits</a>).<sup id="cite_ref-158,962,555,217,826,360,000_31-1" class="reference"><a href="#cite_note-158,962,555,217,826,360,000-31"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> </p> <ul><li>Choose 3 rotors from a set of 5 rotors = 5 x 4 x 3 = 60</li> <li>26 positions per rotor = 26 x 26 x 26 = 17,576</li> <li>Plugboard = 26! / ( 6! x 10! x 2^10) = 150,738,274,937,250</li> <li>Multiply each of the above = 158,962,555,217,826,360,000</li></ul> <div class="mw-heading mw-heading2"><h2 id="Operation">Operation</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=16" title="Edit section: Operation"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Basic_operation">Basic operation</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=17" title="Edit section: Basic operation"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><span><video id="mwe_player_0" poster="//upload.wikimedia.org/wikipedia/commons/thumb/f/f7/Encrypting_and_decrypting_using_an_enigma_machine.webm/220px--Encrypting_and_decrypting_using_an_enigma_machine.webm.jpg" controls="" preload="none" data-mw-tmh="" class="mw-file-element" width="220" height="124" data-durationhint="254" data-mwtitle="Encrypting_and_decrypting_using_an_enigma_machine.webm" data-mwprovider="wikimediacommons" resource="/wiki/File:Encrypting_and_decrypting_using_an_enigma_machine.webm"><source src="//upload.wikimedia.org/wikipedia/commons/transcoded/f/f7/Encrypting_and_decrypting_using_an_enigma_machine.webm/Encrypting_and_decrypting_using_an_enigma_machine.webm.480p.vp9.webm" type="video/webm; codecs="vp9, opus"" data-transcodekey="480p.vp9.webm" data-width="854" data-height="480" /><source src="//upload.wikimedia.org/wikipedia/commons/transcoded/f/f7/Encrypting_and_decrypting_using_an_enigma_machine.webm/Encrypting_and_decrypting_using_an_enigma_machine.webm.720p.vp9.webm" type="video/webm; codecs="vp9, opus"" data-transcodekey="720p.vp9.webm" data-width="1280" data-height="720" /><source src="//upload.wikimedia.org/wikipedia/commons/f/f7/Encrypting_and_decrypting_using_an_enigma_machine.webm" type="video/webm; codecs="vp8, vorbis"" data-width="1280" data-height="720" /><source src="//upload.wikimedia.org/wikipedia/commons/transcoded/f/f7/Encrypting_and_decrypting_using_an_enigma_machine.webm/Encrypting_and_decrypting_using_an_enigma_machine.webm.144p.mjpeg.mov" type="video/quicktime" data-transcodekey="144p.mjpeg.mov" data-width="256" data-height="144" /><source src="//upload.wikimedia.org/wikipedia/commons/transcoded/f/f7/Encrypting_and_decrypting_using_an_enigma_machine.webm/Encrypting_and_decrypting_using_an_enigma_machine.webm.240p.vp9.webm" type="video/webm; codecs="vp9, opus"" data-transcodekey="240p.vp9.webm" data-width="426" data-height="240" /><source src="//upload.wikimedia.org/wikipedia/commons/transcoded/f/f7/Encrypting_and_decrypting_using_an_enigma_machine.webm/Encrypting_and_decrypting_using_an_enigma_machine.webm.360p.webm" type="video/webm; codecs="vp8, vorbis"" data-transcodekey="360p.webm" data-width="640" data-height="360" /><source src="//upload.wikimedia.org/wikipedia/commons/transcoded/f/f7/Encrypting_and_decrypting_using_an_enigma_machine.webm/Encrypting_and_decrypting_using_an_enigma_machine.webm.360p.vp9.webm" type="video/webm; codecs="vp9, opus"" data-transcodekey="360p.vp9.webm" data-width="640" data-height="360" /></video></span><figcaption>Enciphering and deciphering using an Enigma machine</figcaption></figure> <p>A German Enigma operator would be given a plaintext message to encrypt. After setting up his machine, he would type the message on the Enigma keyboard. For each letter pressed, one lamp lit indicating a different letter according to a <a href="/wiki/Pseudorandomness" title="Pseudorandomness">pseudo-random</a> substitution determined by the electrical pathways inside the machine. The letter indicated by the lamp would be recorded, typically by a second operator, as the <a href="/wiki/Cyphertext" class="mw-redirect" title="Cyphertext">cyphertext</a> letter. The action of pressing a key also moved one or more rotors so that the next key press used a different electrical pathway, and thus a different substitution would occur even if the same plaintext letter were entered again. For each key press there was rotation of at least the right hand rotor and less often the other two, resulting in a different <a href="/wiki/Pseudorandomness" title="Pseudorandomness">substitution alphabet</a> being used for every letter in the message. This process continued until the message was completed. The cyphertext recorded by the second operator would then be transmitted, usually by radio in <a href="/wiki/Morse_code" title="Morse code">Morse code</a>, to an operator of another Enigma machine. This operator would type in the cyphertext and — as long as all the settings of the deciphering machine were identical to those of the enciphering machine — for every key press the reverse substitution would occur and the plaintext message would emerge. </p> <div class="mw-heading mw-heading3"><h3 id="Details">Details</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=18" title="Edit section: Details"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Kenngruppenheft.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/8/82/Kenngruppenheft.jpg/220px-Kenngruppenheft.jpg" decoding="async" width="220" height="141" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/82/Kenngruppenheft.jpg/330px-Kenngruppenheft.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/82/Kenngruppenheft.jpg/440px-Kenngruppenheft.jpg 2x" data-file-width="1676" data-file-height="1071" /></a><figcaption>German Kenngruppenheft (a U-boat <a href="/wiki/Codebook" title="Codebook">codebook</a> with grouped key codes)</figcaption></figure> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma_keylist_3_rotor.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/6/61/Enigma_keylist_3_rotor.jpg/220px-Enigma_keylist_3_rotor.jpg" decoding="async" width="220" height="154" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/6/61/Enigma_keylist_3_rotor.jpg/330px-Enigma_keylist_3_rotor.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/6/61/Enigma_keylist_3_rotor.jpg/440px-Enigma_keylist_3_rotor.jpg 2x" data-file-width="1000" data-file-height="701" /></a><figcaption>Monthly key list number 649 for the German Air Force Enigma, including settings for the reconfigurable reflector (which only change once every eight days)</figcaption></figure> <p>In use, the Enigma required a list of daily key settings and auxiliary documents. In German military practice, communications were divided into separate networks, each using different settings. These communication nets were termed <i>keys</i> at <a href="/wiki/Bletchley_Park" title="Bletchley Park">Bletchley Park</a>, and were assigned <a href="/wiki/Code_name" title="Code name">code names</a>, such as <i>Red</i>, <i>Chaffinch</i>, and <i>Shark</i>. Each unit operating in a network was given the same settings list for its Enigma, valid for a period of time. The procedures for German Naval Enigma were more elaborate and more secure than those in other services and employed auxiliary <a href="/wiki/Codebook" title="Codebook">codebooks</a>. Navy codebooks were printed in red, water-soluble ink on pink paper so that they could easily be destroyed if they were endangered or if the vessel was sunk. </p><p>An Enigma machine's setting (its <a href="/wiki/Key_(cryptography)" title="Key (cryptography)">cryptographic key</a> in modern terms; <i>Schlüssel</i> in German) specified each operator-adjustable aspect of the machine: </p> <ul><li>Wheel order (<i>Walzenlage</i>) – the choice of rotors and the order in which they are fitted.</li> <li>Ring settings (<i>Ringstellung</i>) – the position of each alphabet ring relative to its rotor wiring.</li> <li>Plug connections (<i>Steckerverbindungen</i>) – the pairs of letters in the plugboard that are connected together.</li> <li>In very late versions, the wiring of the reconfigurable reflector.</li> <li>Starting position of the rotors (<i>Grundstellung</i>) – chosen by the operator, should be different for each message.</li></ul> <p>For a message to be correctly encrypted and decrypted, both sender and receiver had to configure their Enigma in the same way; rotor selection and order, ring positions, plugboard connections and starting rotor positions must be identical. Except for the starting positions, these settings were established beforehand, distributed in key lists and changed daily. For example, the settings for the 18th day of the month in the German Luftwaffe Enigma key list number 649 (see image) were as follows: </p> <ul><li>Wheel order: IV, II, V</li> <li>Ring settings: 15, 23, 26</li> <li>Plugboard connections: EJ OY IV AQ KW FX MT PS LU BD</li> <li>Reconfigurable reflector wiring: IU AS DV GL FT OX EZ CH MR KN BQ PW</li> <li>Indicator groups: lsa zbw vcj rxn</li></ul> <p>Enigma was designed to be secure even if the rotor wiring was known to an opponent, although in practice considerable effort protected the wiring configuration. If the wiring is secret, the total number of possible configurations has been calculated to be around <span class="nowrap"><span data-sort-value="7114300000000000000♠"></span>3<span style="margin-left:0.25em;margin-right:0.15em;">×</span>10<sup>114</sup></span> (approximately 380 bits); with known wiring and other operational constraints, this is reduced to around <span class="nowrap"><span data-sort-value="7023100000000000000♠"></span>10<sup>23</sup></span> (76 bits).<sup id="cite_ref-engima_cryptographic_mathematics_33-0" class="reference"><a href="#cite_note-engima_cryptographic_mathematics-33"><span class="cite-bracket">[</span>32<span class="cite-bracket">]</span></a></sup> Because of the large number of possibilities, users of Enigma were confident of its security; it was not then feasible for an adversary to even begin to try a <a href="/wiki/Brute-force_attack" title="Brute-force attack">brute-force attack</a>. </p> <div class="mw-heading mw-heading3"><h3 id="Indicator">Indicator</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=19" title="Edit section: Indicator"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Cryptanalysis#Indicator" title="Cryptanalysis">Cryptanalysis § Indicator</a></div> <p>Most of the key was kept constant for a set time period, typically a day. A different initial rotor position was used for each message, a concept similar to an <a href="/wiki/Initialization_vector" title="Initialization vector">initialisation vector</a> in modern cryptography. The reason is that encrypting many messages with identical or near-identical settings (termed in cryptanalysis as being <i>in <a href="/wiki/Cryptanalysis#Depth" title="Cryptanalysis">depth</a></i>), would enable an attack using a statistical procedure such as <a href="/wiki/William_F._Friedman" title="William F. Friedman">Friedman's</a> <a href="/wiki/Index_of_coincidence" title="Index of coincidence">Index of coincidence</a>.<sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> The starting position for the rotors was transmitted just before the ciphertext, usually after having been enciphered. The exact method used was termed the <i>indicator procedure</i>. Design weakness and operator sloppiness in these indicator procedures were two of the main weaknesses that made cracking Enigma possible. </p> <figure class="mw-default-size mw-halign-left" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma-rotor-windows.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/a/a1/Enigma-rotor-windows.jpg/220px-Enigma-rotor-windows.jpg" decoding="async" width="220" height="163" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/a/a1/Enigma-rotor-windows.jpg/330px-Enigma-rotor-windows.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/a/a1/Enigma-rotor-windows.jpg/440px-Enigma-rotor-windows.jpg 2x" data-file-width="2266" data-file-height="1682" /></a><figcaption>With the inner lid down, the Enigma was ready for use. The finger wheels of the rotors protruded through the lid, allowing the operator to set the rotors, and their current position, here <i>RDKP</i>, was visible to the operator through a set of windows.</figcaption></figure> <p>One of the earliest <i>indicator procedures</i> for the Enigma was cryptographically flawed and allowed Polish cryptanalysts to make the initial breaks into the plugboard Enigma. The procedure had the operator set his machine in accordance with the secret settings that all operators on the net shared. The settings included an initial position for the rotors (the <i>Grundstellung</i>), say, <i>AOH</i>. The operator turned his rotors until <i>AOH</i> was visible through the rotor windows. At that point, the operator chose his own arbitrary starting position for the message he would send. An operator might select <i>EIN</i>, and that became the <i>message setting</i> for that encryption session. The operator then typed <i>EIN</i> into the machine twice, this producing the encrypted indicator, for example <i>XHTLOA</i>. This was then transmitted, at which point the operator would turn the rotors to his message settings, <i>EIN</i> in this example, and then type the plaintext of the message. </p><p>At the receiving end, the operator set the machine to the initial settings (<i>AOH</i>) and typed in the first six letters of the message (<i>XHTLOA</i>). In this example, <i>EINEIN</i> emerged on the lamps, so the operator would learn the <i>message setting</i> that the sender used to encrypt this message. The receiving operator would set his rotors to <i>EIN</i>, type in the rest of the ciphertext, and get the deciphered message. </p><p>This indicator scheme had two weaknesses. First, the use of a global initial position (<i>Grundstellung</i>) meant all message keys used the same polyalphabetic substitution. In later indicator procedures, the operator selected his initial position for encrypting the indicator and sent that initial position in the clear. The second problem was the repetition of the indicator, which was a serious security flaw. The message setting was encoded twice, resulting in a relation between first and fourth, second and fifth, and third and sixth character. These security flaws enabled the Polish Cipher Bureau to break into the pre-war Enigma system as early as 1932. The early indicator procedure was subsequently described by German cryptanalysts as the "faulty indicator technique".<sup id="cite_ref-FOOTNOTEHuttenhainFricke19454,_5_35-0" class="reference"><a href="#cite_note-FOOTNOTEHuttenhainFricke19454,_5-35"><span class="cite-bracket">[</span>34<span class="cite-bracket">]</span></a></sup> </p><p>During World War II, codebooks were only used each day to set up the rotors, their ring settings and the plugboard. For each message, the operator selected a random start position, let's say <i>WZA</i>, and a random message key, perhaps <i>SXT</i>. He moved the rotors to the <i>WZA</i> start position and encoded the message key <i>SXT</i>. Assume the result was <i>UHL</i>. He then set up the message key, <i>SXT</i>, as the start position and encrypted the message. Next, he transmitted the start position, <i>WZA</i>, the encoded message key, <i>UHL</i>, and then the ciphertext. The receiver set up the start position according to the first trigram, <i>WZA</i>, and decoded the second trigram, <i>UHL</i>, to obtain the <i>SXT</i> message setting. Next, he used this <i>SXT</i> message setting as the start position to decrypt the message. This way, each ground setting was different and the new procedure avoided the security flaw of double encoded message settings.<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup> </p><p>This procedure was used by <i>Wehrmacht</i> and <i>Luftwaffe</i> only. The <i>Kriegsmarine</i> procedures on sending messages with the Enigma were far more complex and elaborate. Prior to encryption the message was encoded using the <i><a href="/wiki/Kurzsignale" title="Kurzsignale">Kurzsignalheft</a></i> code book. The <i>Kurzsignalheft</i> contained tables to convert sentences into four-letter groups. A great many choices were included, for example, logistic matters such as refuelling and rendezvous with supply ships, positions and grid lists, harbour names, countries, weapons, weather conditions, enemy positions and ships, date and time tables. Another codebook contained the <i><a href="/wiki/Discriminant_Book" title="Discriminant Book">Kenngruppen</a></i> and <i>Spruchschlüssel</i>: the key identification and message key.<sup id="cite_ref-37" class="reference"><a href="#cite_note-37"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Additional_details">Additional details</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=20" title="Edit section: Additional details"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The Army Enigma machine used only the 26 alphabet characters. Punctuation was replaced with rare character combinations. A space was omitted or replaced with an X. The X was generally used as full-stop. </p><p>Some punctuation marks were different in other parts of the armed forces. The <i>Wehrmacht</i> replaced a comma with ZZ and the question mark with FRAGE or FRAQ. </p><p>The <i>Kriegsmarine</i> replaced the comma with Y and the question mark with UD. The combination CH, as in "<i>Acht</i>" (eight) or "<i>Richtung</i>" (direction), was replaced with Q (AQT, RIQTUNG). Two, three and four zeros were replaced with CENTA, MILLE and MYRIA. </p><p>The <i>Wehrmacht</i> and the <i>Luftwaffe</i> transmitted messages in groups of five characters and counted the letters. </p><p>The <i>Kriegsmarine</i> used four-character groups and counted those groups. </p><p> Frequently used names or words were varied as much as possible. Words like <i>Minensuchboot</i> (minesweeper) could be written as MINENSUCHBOOT, MINBOOT or MMMBOOT. To make cryptanalysis harder, messages were limited to 250 characters. Longer messages were divided into several parts, each using a different message key.<sup id="cite_ref-38" class="reference"><a href="#cite_note-38"><span class="cite-bracket">[</span>37<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span class="cite-bracket">[</span>38<span class="cite-bracket">]</span></a></sup></p><div style="clear:both;" class=""></div> <div class="mw-heading mw-heading3"><h3 id="Example_enciphering_process">Example enciphering process</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=21" title="Edit section: Example enciphering process"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The character substitutions by the Enigma machine as a whole can be expressed as a string of letters with each position occupied by the character that will replace the character at the corresponding position in the alphabet. For example, a given machine configuration that enciphered A to L, B to U, C to S, ..., and Z to J could be represented compactly as </p> <pre>LUSHQOXDMZNAIKFREPCYBWVGTJ </pre> <p>and the enciphering of a particular character by that configuration could be represented by highlighting the enciphered character as in </p> <pre>D > LUS(H)QOXDMZNAIKFREPCYBWVGTJ </pre> <p>Since the operation of an Enigma machine enciphering a message is a series of such configurations, each associated with a single character being enciphered, a sequence of such representations can be used to represent the operation of the machine as it enciphers a message. For example, the process of enciphering the first sentence of the main body of the famous "Dönitz message"<sup id="cite_ref-40" class="reference"><a href="#cite_note-40"><span class="cite-bracket">[</span>39<span class="cite-bracket">]</span></a></sup> to </p> <pre>RBBF PMHP HGCZ XTDY GAHG UFXG EWKB LKGJ </pre> <p>can be represented as </p> <pre>0001 F > KGWNT(R)BLQPAHYDVJIFXEZOCSMU CDTK 25 15 16 26 0002 O > UORYTQSLWXZHNM(B)VFCGEAPIJDK CDTL 25 15 16 01 0003 L > HLNRSKJAMGF(B)ICUQPDEYOZXWTV CDTM 25 15 16 02 0004 G > KPTXIG(F)MESAUHYQBOVJCLRZDNW CDUN 25 15 17 03 0005 E > XDYB(P)WOSMUZRIQGENLHVJTFACK CDUO 25 15 17 04 0006 N > DLIAJUOVCEXBN(M)GQPWZYFHRKTS CDUP 25 15 17 05 0007 D > LUS(H)QOXDMZNAIKFREPCYBWVGTJ CDUQ 25 15 17 06 0008 E > JKGO(P)TCIHABRNMDEYLZFXWVUQS CDUR 25 15 17 07 0009 S > GCBUZRASYXVMLPQNOF(H)WDKTJIE CDUS 25 15 17 08 0010 I > XPJUOWIY(G)CVRTQEBNLZMDKFAHS CDUT 25 15 17 09 0011 S > DISAUYOMBPNTHKGJRQ(C)LEZXWFV CDUU 25 15 17 10 0012 T > FJLVQAKXNBGCPIRMEOY(Z)WDUHST CDUV 25 15 17 11 0013 S > KTJUQONPZCAMLGFHEW(X)BDYRSVI CDUW 25 15 17 12 0014 O > ZQXUVGFNWRLKPH(T)MBJYODEICSA CDUX 25 15 17 13 0015 F > XJWFR(D)ZSQBLKTVPOIEHMYNCAUG CDUY 25 15 17 14 0016 O > FSKTJARXPECNUL(Y)IZGBDMWVHOQ CDUZ 25 15 17 15 0017 R > CEAKBMRYUVDNFLTXW(G)ZOIJQPHS CDVA 25 15 18 16 0018 T > TLJRVQHGUCXBZYSWFDO(A)IEPKNM CDVB 25 15 18 17 0019 B > Y(H)LPGTEBKWICSVUDRQMFONJZAX CDVC 25 15 18 18 0020 E > KRUL(G)JEWNFADVIPOYBXZCMHSQT CDVD 25 15 18 19 0021 K > RCBPQMVZXY(U)OFSLDEANWKGTIJH CDVE 25 15 18 20 0022 A > (F)CBJQAWTVDYNXLUSEZPHOIGMKR CDVF 25 15 18 21 0023 N > VFTQSBPORUZWY(X)HGDIECJALNMK CDVG 25 15 18 22 0024 N > JSRHFENDUAZYQ(G)XTMCBPIWVOLK CDVH 25 15 18 23 0025 T > RCBUTXVZJINQPKWMLAY(E)DGOFSH CDVI 25 15 18 24 0026 Z > URFXNCMYLVPIGESKTBOQAJZDH(W) CDVJ 25 15 18 25 0027 U > JIOZFEWMBAUSHPCNRQLV(K)TGYXD CDVK 25 15 18 26 0028 G > ZGVRKO(B)XLNEIWJFUSDQYPCMHTA CDVL 25 15 18 01 0029 E > RMJV(L)YQZKCIEBONUGAWXPDSTFH CDVM 25 15 18 02 0030 B > G(K)QRFEANZPBMLHVJCDUXSOYTWI CDWN 25 15 19 03 0031 E > YMZT(G)VEKQOHPBSJLIUNDRFXWAC CDWO 25 15 19 04 0032 N > PDSBTIUQFNOVW(J)KAHZCEGLMYXR CDWP 25 15 19 05 </pre> <p>where the letters following each mapping are the letters that appear at the windows at that stage (the only state changes visible to the operator) and the numbers show the underlying physical position of each rotor. </p><p>The character mappings for a given configuration of the machine are in turn the result of a series of such mappings applied by each pass through a component of the machine: the enciphering of a character resulting from the application of a given component's mapping serves as the input to the mapping of the subsequent component. For example, the 4th step in the enciphering above can be expanded to show each of these stages using the same representation of mappings and highlighting for the enciphered character: </p> <pre> G > ABCDEF(G)HIJKLMNOPQRSTUVWXYZ   P EFMQAB(G)UINKXCJORDPZTHWVLYS         AE.BF.CM.DQ.HU.JN.LX.PR.SZ.VW   1 OFRJVM(A)ZHQNBXPYKCULGSWETDI  N  03  VIII   2 (N)UKCHVSMDGTZQFYEWPIALOXRJB  U  17  VI   3 XJMIYVCARQOWH(L)NDSUFKGBEPZT  D  15  V   4 QUNGALXEPKZ(Y)RDSOFTVCMBIHWJ  C  25  β   R RDOBJNTKVEHMLFCWZAXGYIPS(U)Q         c   4 EVTNHQDXWZJFUCPIAMOR(B)SYGLK         β   3 H(V)GPWSUMDBTNCOKXJIQZRFLAEY         V   2 TZDIPNJESYCUHAVRMXGKB(F)QWOL         VI   1 GLQYW(B)TIZDPSFKANJCUXREVMOH         VIII   P E(F)MQABGUINKXCJORDPZTHWVLYS         AE.BF.CM.DQ.HU.JN.LX.PR.SZ.VW F < KPTXIG(F)MESAUHYQBOVJCLRZDNW </pre> <p>Here the enciphering begins trivially with the first "mapping" representing the keyboard (which has no effect), followed by the plugboard, configured as AE.BF.CM.DQ.HU.JN.LX.PR.SZ.VW which has no effect on 'G', followed by the VIII rotor in the 03 position, which maps G to A, then the VI rotor in the 17 position, which maps A to N, ..., and finally the plugboard again, which maps B to F, producing the overall mapping indicated at the final step: G to F. </p><p>This model has 4 rotors (lines 1 through 4) and the reflector (line R) also permutes (garbles) letters. </p> <div class="mw-heading mw-heading2"><h2 id="Models">Models</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=22" title="Edit section: Models"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The Enigma family included multiple designs. The earliest were commercial models dating from the early 1920s. Starting in the mid-1920s, the German military began to use Enigma, making a number of security-related changes. Various nations either adopted or adapted the design for their own cipher machines. </p> <table style="margin: 1em auto 0 auto;"> <tbody><tr> <td><figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Enigmas.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/f/f3/Enigmas.jpg/440px-Enigmas.jpg" decoding="async" width="440" height="189" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/f3/Enigmas.jpg/660px-Enigmas.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/f3/Enigmas.jpg/880px-Enigmas.jpg 2x" data-file-width="1642" data-file-height="705" /></a><figcaption>A selection of seven Enigma machines and paraphernalia exhibited at the U.S. <a href="/wiki/National_Cryptologic_Museum" title="National Cryptologic Museum">National Cryptologic Museum</a>. From left to right, the models are: 1) Commercial Enigma; 2) Enigma T; 3) Enigma G; 4) Unidentified; 5) <i>Luftwaffe</i> (Air Force) Enigma; 6) <i>Heer</i> (Army) Enigma; 7) <i>Kriegsmarine</i> (Naval) Enigma — M4.</figcaption></figure> </td></tr></tbody></table> <p>An estimated 40,000 Enigma machines were constructed.<sup id="cite_ref-FOOTNOTEBauer2000123_41-0" class="reference"><a href="#cite_note-FOOTNOTEBauer2000123-41"><span class="cite-bracket">[</span>40<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">[</span>41<span class="cite-bracket">]</span></a></sup> After the end of World War II, the Allies sold captured Enigma machines, still widely considered secure, to developing countries.<sup id="cite_ref-FOOTNOTEBauer2000112_43-0" class="reference"><a href="#cite_note-FOOTNOTEBauer2000112-43"><span class="cite-bracket">[</span>42<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Commercial_Enigma">Commercial Enigma</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=23" title="Edit section: Commercial Enigma"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:Scherbius-1928-patent.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/b/b3/Scherbius-1928-patent.png/320px-Scherbius-1928-patent.png" decoding="async" width="320" height="203" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/b/b3/Scherbius-1928-patent.png/480px-Scherbius-1928-patent.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/b/b3/Scherbius-1928-patent.png/640px-Scherbius-1928-patent.png 2x" data-file-width="641" data-file-height="406" /></a><figcaption>Scherbius Enigma patent, <span><a rel="nofollow" class="external text" href="https://patents.google.com/patent/US1657411">U.S. patent 1,657,411</a></span>, granted in 1928</figcaption></figure> <p>On 23 February 1918,<sup id="cite_ref-44" class="reference"><a href="#cite_note-44"><span class="cite-bracket">[</span>43<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Arthur_Scherbius" title="Arthur Scherbius">Arthur Scherbius</a> applied for a <a href="/wiki/Patent" title="Patent">patent</a> for a ciphering machine that used <a href="/wiki/Rotor_machine" title="Rotor machine">rotors</a>.<sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup> Scherbius and <a href="/w/index.php?title=E._Richard_Ritter&action=edit&redlink=1" class="new" title="E. Richard Ritter (page does not exist)">E. Richard Ritter</a> founded the firm of Scherbius & Ritter. They approached the <a href="/wiki/Reichsmarine" title="Reichsmarine">German Navy</a> and Foreign Office with their design, but neither agency was interested. Scherbius & Ritter then assigned the patent rights to Gewerkschaft Securitas, who founded the <i>Chiffriermaschinen Aktien-Gesellschaft</i> (Cipher Machines Stock Corporation) on 9 July 1923; Scherbius and Ritter were on the board of directors. </p> <div class="mw-heading mw-heading4"><h4 id="Enigma_Handelsmaschine_(1923)"><span id="Enigma_Handelsmaschine_.281923.29"></span>Enigma Handelsmaschine (1923)</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=24" title="Edit section: Enigma Handelsmaschine (1923)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Chiffriermaschinen AG began advertising a rotor machine, <i>Enigma Handelsmaschine</i>, which was exhibited at the Congress of the <a href="/wiki/Universal_Postal_Union" title="Universal Postal Union">International Postal Union</a> in 1924. The machine was heavy and bulky, incorporating a <a href="/wiki/Typewriter" title="Typewriter">typewriter</a>. It measured 65×45×38 cm and weighed about 50 kilograms (110 lb). </p> <div class="mw-heading mw-heading4"><h4 id="Schreibende_Enigma_(1924)"><span id="Schreibende_Enigma_.281924.29"></span>Schreibende Enigma (1924)</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=25" title="Edit section: Schreibende Enigma (1924)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>This was also a model with a type writer. There were a number of problems associated with the printer and the construction was not stable until 1926. Both early versions of Enigma lacked the reflector and had to be switched between enciphering and deciphering. </p> <div class="mw-heading mw-heading4"><h4 id="Glühlampenmaschine,_Enigma_A_(1924)"><span id="Gl.C3.BChlampenmaschine.2C_Enigma_A_.281924.29"></span>Glühlampenmaschine, Enigma A (1924)</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=26" title="Edit section: Glühlampenmaschine, Enigma A (1924)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The reflector, suggested by Scherbius' colleague Willi Korn,<sup id="cite_ref-Korn_27-1" class="reference"><a href="#cite_note-Korn-27"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> was introduced with the glow lamp version. </p><p>The machine was also known as the military Enigma. It had two rotors and a manually rotatable reflector. The typewriter was omitted and glow lamps were used for output. The operation was somewhat different from later models. Before the next key pressure, the operator had to press a button to advance the right rotor one step. </p> <div class="mw-heading mw-heading4"><h4 id="Enigma_B_(1924)"><span id="Enigma_B_.281924.29"></span>Enigma B (1924)</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=27" title="Edit section: Enigma B (1924)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma-Gl%C3%BChl%C3%A4mpchen.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/a/af/Enigma-Gl%C3%BChl%C3%A4mpchen.jpg/170px-Enigma-Gl%C3%BChl%C3%A4mpchen.jpg" decoding="async" width="170" height="158" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/a/af/Enigma-Gl%C3%BChl%C3%A4mpchen.jpg/255px-Enigma-Gl%C3%BChl%C3%A4mpchen.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/a/af/Enigma-Gl%C3%BChl%C3%A4mpchen.jpg/340px-Enigma-Gl%C3%BChl%C3%A4mpchen.jpg 2x" data-file-width="2280" data-file-height="2120" /></a><figcaption>Typical glowlamps (with flat tops), as used for Enigma</figcaption></figure> <p>Enigma <i>model B</i> was introduced late in 1924, and was of a similar construction.<sup id="cite_ref-46" class="reference"><a href="#cite_note-46"><span class="cite-bracket">[</span>45<span class="cite-bracket">]</span></a></sup> While bearing the Enigma name, both models <i>A</i> and <i>B</i> were quite unlike later versions: They differed in physical size and shape, but also cryptographically, in that they lacked the reflector. This model of Enigma machine was referred to as the Glowlamp Enigma or <i>Glühlampenmaschine</i> since it produced its output on a lamp panel rather than paper. This method of output was much more reliable and cost effective. Hence this machine was 1/8th the price of its predecessor.<sup id="cite_ref-Enigma_History_22-2" class="reference"><a href="#cite_note-Enigma_History-22"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Enigma_C_(1926)"><span id="Enigma_C_.281926.29"></span>Enigma C (1926)</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=28" title="Edit section: Enigma C (1926)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><i>Model C</i> was the third model of the so-called ″glowlamp Enigmas″ (after A and B) and it again lacked a typewriter.<sup id="cite_ref-Enigma_History_22-3" class="reference"><a href="#cite_note-Enigma_History-22"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Enigma_D_(1927)"><span id="Enigma_D_.281927.29"></span>Enigma D (1927)</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=29" title="Edit section: Enigma D (1927)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <i>Enigma C</i> quickly gave way to <i>Enigma D</i> (1927). This version was widely used, with shipments to Sweden, the Netherlands, United Kingdom, Japan, Italy, Spain, United States and Poland. In 1927 <a href="/wiki/Hugh_Foss" title="Hugh Foss">Hugh Foss</a> at the British <a href="/wiki/Government_Communications_Headquarters" class="mw-redirect" title="Government Communications Headquarters">Government Code and Cypher School</a> was able to show that commercial Enigma machines could be broken, provided suitable cribs were available.<sup id="cite_ref-47" class="reference"><a href="#cite_note-47"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup> Soon, the Enigma D would pioneer the use of a standard keyboard layout to be used in German computing. This "QWERTZ" layout is very similar to the American <a href="/wiki/QWERTY" title="QWERTY">QWERTY</a> keyboard format used in many languages. </p> <div class="mw-heading mw-heading5"><h5 id=""Navy_Cipher_D""><span id=".22Navy_Cipher_D.22"></span>"Navy Cipher D"</h5><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=30" title="Edit section: "Navy Cipher D""><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Other countries used Enigma machines. The <a href="/wiki/Italian_Navy" title="Italian Navy">Italian Navy</a> adopted the commercial Enigma as "Navy Cipher D". The Spanish also used commercial Enigma machines during their <a href="/wiki/Spanish_Civil_War" title="Spanish Civil War">Civil War</a>. British codebreakers succeeded in breaking these machines, which lacked a plugboard.<sup id="cite_ref-FOOTNOTESmith200623_48-0" class="reference"><a href="#cite_note-FOOTNOTESmith200623-48"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> Enigma machines were also used by diplomatic services. </p> <div class="mw-heading mw-heading4"><h4 id="Enigma_H_(1929)"><span id="Enigma_H_.281929.29"></span>Enigma H (1929)</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=31" title="Edit section: Enigma H (1929)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma-8-rotor.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/b/be/Enigma-8-rotor.jpg/170px-Enigma-8-rotor.jpg" decoding="async" width="170" height="255" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/b/be/Enigma-8-rotor.jpg/255px-Enigma-8-rotor.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/b/be/Enigma-8-rotor.jpg/340px-Enigma-8-rotor.jpg 2x" data-file-width="852" data-file-height="1280" /></a><figcaption>A rare 8-rotor printing Enigma model H (1929)</figcaption></figure> <p>There was also a large, eight-rotor printing model, the <i>Enigma H</i>, called <i>Enigma II</i> by the <i><a href="/wiki/Reichswehr" title="Reichswehr">Reichswehr</a></i>. In 1933 the Polish Cipher Bureau detected that it was in use for high-level military communication, but it was soon withdrawn, as it was unreliable and jammed frequently.<sup id="cite_ref-FOOTNOTEKozaczuk198428_49-0" class="reference"><a href="#cite_note-FOOTNOTEKozaczuk198428-49"><span class="cite-bracket">[</span>48<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Enigma_K">Enigma K</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=32" title="Edit section: Enigma K"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The Swiss used a version of Enigma called <i>Model K</i> or <i>Swiss K</i> for military and diplomatic use, which was very similar to commercial <a href="#Enigma_D_(1927)">Enigma D</a>. The machine's code was cracked by Poland, France, the United Kingdom and the United States; the latter code-named it INDIGO. An <i>Enigma T</i> model, code-named <i>Tirpitz</i>, was used by Japan. </p> <div class="mw-heading mw-heading3"><h3 id="Military_Enigma">Military Enigma</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=33" title="Edit section: Military Enigma"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The various services of the <a href="/wiki/Wehrmacht" title="Wehrmacht">Wehrmacht</a> used various Enigma versions, and replaced them frequently, sometimes with ones adapted from other services. Enigma seldom carried high-level strategic messages, which when not urgent went by courier, and when urgent went by other cryptographic systems including the <a href="/wiki/Geheimschreiber" class="mw-redirect" title="Geheimschreiber">Geheimschreiber</a>. </p> <div class="mw-heading mw-heading4"><h4 id="Funkschlüssel_C"><span id="Funkschl.C3.BCssel_C"></span>Funkschlüssel C</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=34" title="Edit section: Funkschlüssel C"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The Reichsmarine was the first military branch to adopt Enigma. This version, named <i>Funkschlüssel C</i> ("Radio cipher C"), had been put into production by 1925 and was introduced into service in 1926.<sup id="cite_ref-FOOTNOTEKahn199139–41,_299_50-0" class="reference"><a href="#cite_note-FOOTNOTEKahn199139–41,_299-50"><span class="cite-bracket">[</span>49<span class="cite-bracket">]</span></a></sup> </p><p>The keyboard and lampboard contained 29 letters — A-Z, Ä, Ö and Ü — that were arranged alphabetically, as opposed to the QWERTZUI ordering.<sup id="cite_ref-FOOTNOTEUlbricht20054_51-0" class="reference"><a href="#cite_note-FOOTNOTEUlbricht20054-51"><span class="cite-bracket">[</span>50<span class="cite-bracket">]</span></a></sup> The rotors had 28 contacts, with the letter <i>X</i> wired to bypass the rotors unencrypted.<sup id="cite_ref-FOOTNOTEStripp1993_19-1" class="reference"><a href="#cite_note-FOOTNOTEStripp1993-19"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup> Three rotors were chosen from a set of five<sup id="cite_ref-FOOTNOTEKahn199140,_299_52-0" class="reference"><a href="#cite_note-FOOTNOTEKahn199140,_299-52"><span class="cite-bracket">[</span>51<span class="cite-bracket">]</span></a></sup> and the reflector could be inserted in one of four different positions, denoted α, β, γ and δ.<sup id="cite_ref-FOOTNOTEBauer2000108_53-0" class="reference"><a href="#cite_note-FOOTNOTEBauer2000108-53"><span class="cite-bracket">[</span>52<span class="cite-bracket">]</span></a></sup> The machine was revised slightly in July 1933.<sup id="cite_ref-FOOTNOTEStripp1993plate_3_54-0" class="reference"><a href="#cite_note-FOOTNOTEStripp1993plate_3-54"><span class="cite-bracket">[</span>53<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Enigma_G_(1928–1930)"><span id="Enigma_G_.281928.E2.80.931930.29"></span>Enigma G (1928–1930)</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=35" title="Edit section: Enigma G (1928–1930)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>By 15 July 1928,<sup id="cite_ref-FOOTNOTEKahn199141,_299_55-0" class="reference"><a href="#cite_note-FOOTNOTEKahn199141,_299-55"><span class="cite-bracket">[</span>54<span class="cite-bracket">]</span></a></sup> the German Army (<i><a href="/wiki/Reichswehr" title="Reichswehr">Reichswehr</a></i>) had introduced their own exclusive version of the Enigma machine, the <i>Enigma G</i>. </p><p>The <i><a href="/wiki/Abwehr" title="Abwehr">Abwehr</a></i> used the <i>Enigma G</i>. This Enigma variant was a four-wheel unsteckered machine with multiple notches on the rotors. This model was equipped with a counter that incremented upon each key press, and so is also known as the "counter machine" or the <i>Zählwerk</i> Enigma. </p> <div class="mw-heading mw-heading4"><h4 id="Wehrmacht_Enigma_I_(1930–1938)"><span id="Wehrmacht_Enigma_I_.281930.E2.80.931938.29"></span>Wehrmacht Enigma I (1930–1938)</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=36" title="Edit section: Wehrmacht Enigma I (1930–1938)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Enigma machine G was modified to the <i>Enigma I</i> by June 1930.<sup id="cite_ref-FOOTNOTEKruhDeavours200297_56-0" class="reference"><a href="#cite_note-FOOTNOTEKruhDeavours200297-56"><span class="cite-bracket">[</span>55<span class="cite-bracket">]</span></a></sup> Enigma I is also known as the <i>Wehrmacht</i>, or "Services" Enigma, and was used extensively by German military services and other government organisations (such as the <a href="/wiki/Deutsche_Reichsbahn#Deutsche_Reichsbahn-Gesellschaft_(1924-1937)" title="Deutsche Reichsbahn">railways</a><sup id="cite_ref-FOOTNOTESmith200073_57-0" class="reference"><a href="#cite_note-FOOTNOTESmith200073-57"><span class="cite-bracket">[</span>56<span class="cite-bracket">]</span></a></sup>) before and during <a href="/wiki/World_War_II" title="World War II">World War II</a>. </p> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Bundesarchiv_Bild_101I-769-0229-10A,_Frankreich,_Guderian,_%22Enigma%22_cropped.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/c/c7/Bundesarchiv_Bild_101I-769-0229-10A%2C_Frankreich%2C_Guderian%2C_%22Enigma%22_cropped.jpg/170px-Bundesarchiv_Bild_101I-769-0229-10A%2C_Frankreich%2C_Guderian%2C_%22Enigma%22_cropped.jpg" decoding="async" width="170" height="230" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/c7/Bundesarchiv_Bild_101I-769-0229-10A%2C_Frankreich%2C_Guderian%2C_%22Enigma%22_cropped.jpg/255px-Bundesarchiv_Bild_101I-769-0229-10A%2C_Frankreich%2C_Guderian%2C_%22Enigma%22_cropped.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/c7/Bundesarchiv_Bild_101I-769-0229-10A%2C_Frankreich%2C_Guderian%2C_%22Enigma%22_cropped.jpg/340px-Bundesarchiv_Bild_101I-769-0229-10A%2C_Frankreich%2C_Guderian%2C_%22Enigma%22_cropped.jpg 2x" data-file-width="478" data-file-height="646" /></a><figcaption><a href="/wiki/Heinz_Guderian" title="Heinz Guderian">Heinz Guderian</a> in the <a href="/wiki/Battle_of_France" title="Battle of France">Battle of France</a>, with an Enigma machine. Note one soldier is keying in text while another writes down the results.</figcaption></figure> <p>The major difference between <i>Enigma I</i> (German Army version from 1930), and commercial Enigma models was the addition of a plugboard to swap pairs of letters, greatly increasing cryptographic strength. </p><p>Other differences included the use of a fixed reflector and the relocation of the stepping notches from the rotor body to the movable letter rings. The machine measured 28 cm × 34 cm × 15 cm (11.0 in × 13.4 in × 5.9 in) and weighed around 12 kg (26 lb).<sup id="cite_ref-FOOTNOTEStripp199383_58-0" class="reference"><a href="#cite_note-FOOTNOTEStripp199383-58"><span class="cite-bracket">[</span>57<span class="cite-bracket">]</span></a></sup> </p><p>In August 1935, the Air Force introduced the Wehrmacht Enigma for their communications.<sup id="cite_ref-FOOTNOTEKruhDeavours200297_56-1" class="reference"><a href="#cite_note-FOOTNOTEKruhDeavours200297-56"><span class="cite-bracket">[</span>55<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="M3_(1934)"><span id="M3_.281934.29"></span>M3 (1934)</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=37" title="Edit section: M3 (1934)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>By 1930, the Reichswehr had suggested that the Navy adopt their machine, citing the benefits of increased security (with the plugboard) and easier interservice communications.<sup id="cite_ref-FOOTNOTEKahn199143_59-0" class="reference"><a href="#cite_note-FOOTNOTEKahn199143-59"><span class="cite-bracket">[</span>58<span class="cite-bracket">]</span></a></sup> The Reichsmarine eventually agreed and in 1934<sup id="cite_ref-60" class="reference"><a href="#cite_note-60"><span class="cite-bracket">[</span>59<span class="cite-bracket">]</span></a></sup> brought into service the Navy version of the Army Enigma, designated <i>Funkschlüssel</i> ' or <i>M3</i>. While the Army used only three rotors at that time, the Navy specified a choice of three from a possible five.<sup id="cite_ref-FOOTNOTEKruhDeavours200298_61-0" class="reference"><a href="#cite_note-FOOTNOTEKruhDeavours200298-61"><span class="cite-bracket">[</span>60<span class="cite-bracket">]</span></a></sup> </p> <figure class="mw-default-size mw-halign-left" typeof="mw:File/Thumb"><a href="/wiki/File:Bundesarchiv_Bild_101I-241-2173-09,_Russland,_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/7/74/Bundesarchiv_Bild_101I-241-2173-09%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg/220px-Bundesarchiv_Bild_101I-241-2173-09%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg" decoding="async" width="220" height="140" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/7/74/Bundesarchiv_Bild_101I-241-2173-09%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg/330px-Bundesarchiv_Bild_101I-241-2173-09%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/7/74/Bundesarchiv_Bild_101I-241-2173-09%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg/440px-Bundesarchiv_Bild_101I-241-2173-09%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg 2x" data-file-width="800" data-file-height="510" /></a><figcaption>Enigma in use on the Russian front</figcaption></figure> <div class="mw-heading mw-heading4"><h4 id="Two_extra_rotors_(1938)"><span id="Two_extra_rotors_.281938.29"></span>Two extra rotors (1938)</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=38" title="Edit section: Two extra rotors (1938)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In December 1938, the Army issued two extra rotors so that the three rotors were chosen from a set of five.<sup id="cite_ref-FOOTNOTEKruhDeavours200297_56-2" class="reference"><a href="#cite_note-FOOTNOTEKruhDeavours200297-56"><span class="cite-bracket">[</span>55<span class="cite-bracket">]</span></a></sup> In 1938, the Navy added two more rotors, and then another in 1939 to allow a choice of three rotors from a set of eight.<sup id="cite_ref-FOOTNOTEKruhDeavours200298_61-1" class="reference"><a href="#cite_note-FOOTNOTEKruhDeavours200298-61"><span class="cite-bracket">[</span>60<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="M4_(1942)"><span id="M4_.281942.29"></span>M4 (1942)</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=39" title="Edit section: M4 (1942)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Cryptanalysis_of_the_Enigma#M4_(German_Navy_4-rotor_Enigma)" title="Cryptanalysis of the Enigma">Cryptanalysis of the Enigma § M4 (German Navy 4-rotor Enigma)</a></div> <p>A four-rotor Enigma was introduced by the Navy for U-boat traffic on 1 February 1942, called <i><a href="/wiki/Cryptanalysis_of_the_Enigma#M4_(German_Navy_4-rotor_Enigma)" title="Cryptanalysis of the Enigma">M4</a></i> (the network was known as <i>Triton</i>, or <i>Shark</i> to the Allies). The extra rotor was fitted in the same space by splitting the reflector into a combination of a thin reflector and a thin fourth rotor. </p> <ul class="gallery mw-gallery-packed"> <li class="gallerybox" style="width: 112px"> <div class="thumb" style="width: 110px;"><span typeof="mw:File"><a href="/wiki/File:Enigma-G.jpg" class="mw-file-description" title="Enigma G, used by the Abwehr, had four rotors, no plugboard, and multiple notches on the rotors."><img alt="Enigma G, used by the Abwehr, had four rotors, no plugboard, and multiple notches on the rotors." src="//upload.wikimedia.org/wikipedia/commons/thumb/4/49/Enigma-G.jpg/165px-Enigma-G.jpg" decoding="async" width="110" height="160" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/49/Enigma-G.jpg/247px-Enigma-G.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/49/Enigma-G.jpg/329px-Enigma-G.jpg 2x" data-file-width="828" data-file-height="1206" /></a></span></div> <div class="gallerytext">Enigma G, used by the <i><a href="/wiki/Abwehr" title="Abwehr">Abwehr</a></i>, had four rotors, no plugboard, and multiple notches on the rotors.</div> </li> <li class="gallerybox" style="width: 162px"> <div class="thumb" style="width: 160px;"><span typeof="mw:File"><a href="/wiki/File:Enigma-IMG_0484-black.jpg" class="mw-file-description" title="The German-made Enigma-K used by the Swiss Army had three rotors and a reflector, but no plugboard. It had locally re-wired rotors and an additional lamp panel."><img alt="The German-made Enigma-K used by the Swiss Army had three rotors and a reflector, but no plugboard. It had locally re-wired rotors and an additional lamp panel." src="//upload.wikimedia.org/wikipedia/commons/thumb/3/31/Enigma-IMG_0484-black.jpg/240px-Enigma-IMG_0484-black.jpg" decoding="async" width="160" height="160" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/3/31/Enigma-IMG_0484-black.jpg/360px-Enigma-IMG_0484-black.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/3/31/Enigma-IMG_0484-black.jpg/480px-Enigma-IMG_0484-black.jpg 2x" data-file-width="6000" data-file-height="6000" /></a></span></div> <div class="gallerytext">The German-made Enigma-K used by the Swiss Army had three rotors and a reflector, but no plugboard. It had locally re-wired rotors and an additional lamp panel.</div> </li> <li class="gallerybox" style="width: 170px"> <div class="thumb" style="width: 168px;"><span typeof="mw:File"><a href="/wiki/File:Four-rotor-enigma.jpg" class="mw-file-description" title="An Enigma model T (Tirpitz), a modified commercial Enigma K manufactured for use by the Japanese"><img alt="An Enigma model T (Tirpitz), a modified commercial Enigma K manufactured for use by the Japanese" src="//upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Four-rotor-enigma.jpg/252px-Four-rotor-enigma.jpg" decoding="async" width="168" height="160" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Four-rotor-enigma.jpg/378px-Four-rotor-enigma.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Four-rotor-enigma.jpg/504px-Four-rotor-enigma.jpg 2x" data-file-width="1033" data-file-height="984" /></a></span></div> <div class="gallerytext">An Enigma model T (Tirpitz), a modified commercial Enigma K manufactured for use by the Japanese</div> </li> <li class="gallerybox" style="width: 122px"> <div class="thumb" style="width: 120px;"><span typeof="mw:File"><a href="/wiki/File:Enigma_Decoder_Machine.jpg" class="mw-file-description" title="An Enigma machine in the UK's Imperial War Museum"><img alt="An Enigma machine in the UK's Imperial War Museum" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/0b/Enigma_Decoder_Machine.jpg/180px-Enigma_Decoder_Machine.jpg" decoding="async" width="120" height="160" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/0b/Enigma_Decoder_Machine.jpg/270px-Enigma_Decoder_Machine.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/0b/Enigma_Decoder_Machine.jpg/360px-Enigma_Decoder_Machine.jpg 2x" data-file-width="2592" data-file-height="3456" /></a></span></div> <div class="gallerytext">An Enigma machine in the UK's Imperial War Museum</div> </li> <li class="gallerybox" style="width: 104px"> <div class="thumb" style="width: 102px;"><span typeof="mw:File"><a href="/wiki/File:Bundesarchiv_Bild_101I-241-2173-06,_Russland,_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg" class="mw-file-description" title="Enigma in use in Russia"><img alt="Enigma in use in Russia" src="//upload.wikimedia.org/wikipedia/commons/thumb/e/ef/Bundesarchiv_Bild_101I-241-2173-06%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg/153px-Bundesarchiv_Bild_101I-241-2173-06%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg" decoding="async" width="102" height="160" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/e/ef/Bundesarchiv_Bild_101I-241-2173-06%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg/230px-Bundesarchiv_Bild_101I-241-2173-06%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/e/ef/Bundesarchiv_Bild_101I-241-2173-06%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg/307px-Bundesarchiv_Bild_101I-241-2173-06%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg 2x" data-file-width="512" data-file-height="800" /></a></span></div> <div class="gallerytext">Enigma in use in Russia</div> </li> <li class="gallerybox" style="width: 225.33333333333px"> <div class="thumb" style="width: 223.33333333333px;"><span typeof="mw:File"><a href="/wiki/File:Bundesarchiv_Bild_146-2006-0188,_Verschl%C3%BCsselungsger%C3%A4t_%22Enigma%22.jpg" class="mw-file-description" title="Enigma in radio car of the 7th Panzer Div. staff, August 1941"><img alt="Enigma in radio car of the 7th Panzer Div. staff, August 1941" src="//upload.wikimedia.org/wikipedia/commons/thumb/6/6c/Bundesarchiv_Bild_146-2006-0188%2C_Verschl%C3%BCsselungsger%C3%A4t_%22Enigma%22.jpg/335px-Bundesarchiv_Bild_146-2006-0188%2C_Verschl%C3%BCsselungsger%C3%A4t_%22Enigma%22.jpg" decoding="async" width="224" height="160" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/6/6c/Bundesarchiv_Bild_146-2006-0188%2C_Verschl%C3%BCsselungsger%C3%A4t_%22Enigma%22.jpg/502px-Bundesarchiv_Bild_146-2006-0188%2C_Verschl%C3%BCsselungsger%C3%A4t_%22Enigma%22.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/6/6c/Bundesarchiv_Bild_146-2006-0188%2C_Verschl%C3%BCsselungsger%C3%A4t_%22Enigma%22.jpg/669px-Bundesarchiv_Bild_146-2006-0188%2C_Verschl%C3%BCsselungsger%C3%A4t_%22Enigma%22.jpg 2x" data-file-width="800" data-file-height="574" /></a></span></div> <div class="gallerytext">Enigma in radio car of the 7th Panzer Div. staff, August 1941</div> </li> </ul> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:CMoA_Enigma_Machine_Exhibit_in_Georgia.JPG" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/4/4d/CMoA_Enigma_Machine_Exhibit_in_Georgia.JPG/220px-CMoA_Enigma_Machine_Exhibit_in_Georgia.JPG" decoding="async" width="220" height="165" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/4d/CMoA_Enigma_Machine_Exhibit_in_Georgia.JPG/330px-CMoA_Enigma_Machine_Exhibit_in_Georgia.JPG 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/4d/CMoA_Enigma_Machine_Exhibit_in_Georgia.JPG/440px-CMoA_Enigma_Machine_Exhibit_in_Georgia.JPG 2x" data-file-width="4032" data-file-height="3024" /></a><figcaption>A three-rotor Enigma machine on display at <a href="/wiki/Computer_Museum_of_America" title="Computer Museum of America">Computer Museum of America</a> and its two additional rotors</figcaption></figure> <div class="mw-heading mw-heading2"><h2 id="Surviving_machines">Surviving machines</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=40" title="Edit section: Surviving machines"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-left" typeof="mw:File/Thumb"><a href="/wiki/File:Enigma_and_Decoder_(from_above)_at_Discovery_Park_of_America.jpg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/0e/Enigma_and_Decoder_%28from_above%29_at_Discovery_Park_of_America.jpg/220px-Enigma_and_Decoder_%28from_above%29_at_Discovery_Park_of_America.jpg" decoding="async" width="220" height="220" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/0e/Enigma_and_Decoder_%28from_above%29_at_Discovery_Park_of_America.jpg/330px-Enigma_and_Decoder_%28from_above%29_at_Discovery_Park_of_America.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/0e/Enigma_and_Decoder_%28from_above%29_at_Discovery_Park_of_America.jpg/440px-Enigma_and_Decoder_%28from_above%29_at_Discovery_Park_of_America.jpg 2x" data-file-width="1512" data-file-height="1512" /></a><figcaption>Surviving three-rotor Enigma on display at <a href="/wiki/Discovery_Park_of_America" title="Discovery Park of America">Discovery Park of America</a> in <a href="/wiki/Union_City,_Tennessee" title="Union City, Tennessee">Union City, Tennessee, U.S.</a></figcaption></figure> <p>The effort to break the Enigma was not disclosed until the 1970s. Since then, interest in the Enigma machine has grown. Enigmas are on public display in museums around the world, and several are in the hands of private collectors and computer history enthusiasts.<sup id="cite_ref-ng_62-0" class="reference"><a href="#cite_note-ng-62"><span class="cite-bracket">[</span>61<span class="cite-bracket">]</span></a></sup> </p><p>The <i><a href="/wiki/Deutsches_Museum" title="Deutsches Museum">Deutsches Museum</a></i> in <a href="/wiki/Munich" title="Munich">Munich</a> has both the three- and four-rotor German military variants, as well as several civilian versions. The <i><a href="/w/index.php?title=Deutsches_Spionagemuseum&action=edit&redlink=1" class="new" title="Deutsches Spionagemuseum (page does not exist)">Deutsches Spionagemuseum</a></i> in <a href="/wiki/Berlin" title="Berlin">Berlin</a> also showcases two military variants.<sup id="cite_ref-63" class="reference"><a href="#cite_note-63"><span class="cite-bracket">[</span>62<span class="cite-bracket">]</span></a></sup> Enigma machines are also exhibited at the National Codes Centre in <a href="/wiki/Bletchley_Park" title="Bletchley Park">Bletchley Park</a>, the <a href="/wiki/Government_Communications_Headquarters" class="mw-redirect" title="Government Communications Headquarters">Government Communications Headquarters</a>, the <a href="/wiki/Science_Museum,_London" title="Science Museum, London">Science Museum</a> in <a href="/wiki/London" title="London">London</a>, <a href="/wiki/Discovery_Park_of_America" title="Discovery Park of America">Discovery Park of America</a> in Tennessee, the <a href="/wiki/Polish_Army_Museum" title="Polish Army Museum">Polish Army Museum</a> in Warsaw, the <a href="/wiki/Swedish_Army_Museum" title="Swedish Army Museum">Swedish Army Museum</a> (<i>Armémuseum</i>) in <a href="/wiki/Stockholm" title="Stockholm">Stockholm</a>, the Military Museum of <a href="/wiki/A_Coru%C3%B1a" title="A Coruña">A Coruña</a> in Spain, the Nordland Red Cross War Memorial Museum in <a href="/wiki/Narvik" class="mw-redirect" title="Narvik">Narvik</a>,<sup id="cite_ref-64" class="reference"><a href="#cite_note-64"><span class="cite-bracket">[</span>63<span class="cite-bracket">]</span></a></sup> Norway, <a href="/w/index.php?title=The_Artillery,_Engineers_and_Signals_Museum&action=edit&redlink=1" class="new" title="The Artillery, Engineers and Signals Museum (page does not exist)">The Artillery, Engineers and Signals Museum</a> in <a href="/wiki/H%C3%A4meenlinna" title="Hämeenlinna">Hämeenlinna</a>, Finland<sup id="cite_ref-65" class="reference"><a href="#cite_note-65"><span class="cite-bracket">[</span>64<span class="cite-bracket">]</span></a></sup> the <a href="/wiki/Technical_University_of_Denmark" title="Technical University of Denmark">Technical University of Denmark</a> in Lyngby, Denmark, in <a href="/w/index.php?title=Skanderborg_Bunkerne&action=edit&redlink=1" class="new" title="Skanderborg Bunkerne (page does not exist)">Skanderborg Bunkerne</a> at Skanderborg, Denmark, and at the <a href="/wiki/Australian_War_Memorial" title="Australian War Memorial">Australian War Memorial</a> and in the foyer of the <a href="/wiki/Australian_Signals_Directorate" title="Australian Signals Directorate">Australian Signals Directorate</a>, both in <a href="/wiki/Canberra" title="Canberra">Canberra</a>, Australia. The Jozef Pilsudski Institute in London exhibited a rare <a href="/wiki/Polish_Enigma_double" title="Polish Enigma double">Polish Enigma double</a> assembled in France in 1940.<sup id="cite_ref-66" class="reference"><a href="#cite_note-66"><span class="cite-bracket">[</span>65<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-67" class="reference"><a href="#cite_note-67"><span class="cite-bracket">[</span>66<span class="cite-bracket">]</span></a></sup> In 2020, thanks to the support of the Ministry of Culture and National Heritage, it became the property of the Polish History Museum.<sup id="cite_ref-68" class="reference"><a href="#cite_note-68"><span class="cite-bracket">[</span>67<span class="cite-bracket">]</span></a></sup> </p> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Kriegsmarine_Enigma.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/7/7f/Kriegsmarine_Enigma.png/170px-Kriegsmarine_Enigma.png" decoding="async" width="170" height="209" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/7/7f/Kriegsmarine_Enigma.png/255px-Kriegsmarine_Enigma.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/7/7f/Kriegsmarine_Enigma.png/340px-Kriegsmarine_Enigma.png 2x" data-file-width="1043" data-file-height="1280" /></a><figcaption>A four-rotor <i><a href="/wiki/Kriegsmarine" title="Kriegsmarine">Kriegsmarine</a></i> (German Navy, 1. February 1942 to 1945) Enigma machine on display at the U.S. National Cryptologic Museum</figcaption></figure> <p>In the United States, Enigma machines can be seen at the <a href="/wiki/Computer_History_Museum" title="Computer History Museum">Computer History Museum</a> in <a href="/wiki/Mountain_View,_California" title="Mountain View, California">Mountain View, California</a>, and at the <a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency</a>'s <a href="/wiki/National_Cryptologic_Museum" title="National Cryptologic Museum">National Cryptologic Museum</a> in <a href="/wiki/Fort_Meade" title="Fort Meade">Fort Meade</a>, Maryland, where visitors can try their hand at enciphering and deciphering messages. Two machines that were acquired after the capture of <a href="/wiki/German_submarine_U-505" title="German submarine U-505"><i>U-505</i></a> during World War II are on display alongside the submarine at the <a href="/wiki/Museum_of_Science_and_Industry_(Chicago)" title="Museum of Science and Industry (Chicago)">Museum of Science and Industry</a> in <a href="/wiki/Chicago" title="Chicago">Chicago</a>, Illinois. A three-rotor Enigma is on display at <a href="/wiki/Discovery_Park_of_America" title="Discovery Park of America">Discovery Park of America</a> in <a href="/wiki/Union_City,_Tennessee" title="Union City, Tennessee">Union City, Tennessee</a>. A four-rotor device is on display in the ANZUS Corridor of the <a href="/wiki/The_Pentagon" title="The Pentagon">Pentagon</a> on the second floor, A ring, between corridors 8 and 9. This machine is on loan from Australia. The United States Air Force Academy in Colorado Springs has a machine on display in the Computer Science Department. There is also a machine located at <a href="/wiki/The_National_WWII_Museum" title="The National WWII Museum">The National WWII Museum</a> in New Orleans. <a href="/wiki/The_International_Museum_of_World_War_II" title="The International Museum of World War II">The International Museum of World War II</a> near Boston has seven Enigma machines on display, including a U-boat four-rotor model, one of three surviving examples of an Enigma machine with a printer, one of fewer than ten surviving ten-rotor code machines, an example blown up by a retreating German Army unit, and two three-rotor Enigmas that visitors can operate to encode and decode messages. <a href="/wiki/Computer_Museum_of_America" title="Computer Museum of America">Computer Museum of America</a> in <a href="/wiki/Roswell,_Georgia" title="Roswell, Georgia">Roswell, Georgia</a> has a three-rotor model with two additional rotors. The machine is fully restored and CMoA has the original paperwork for the purchase on 7 March 1936 by the German Army. The <a href="/wiki/National_Museum_of_Computing" class="mw-redirect" title="National Museum of Computing">National Museum of Computing</a> also contains surviving Enigma machines in Bletchley, England.<sup id="cite_ref-69" class="reference"><a href="#cite_note-69"><span class="cite-bracket">[</span>68<span class="cite-bracket">]</span></a></sup> </p> <figure class="mw-default-size mw-halign-left" typeof="mw:File/Thumb"><a href="/wiki/File:Muzeum_2_Wojny_Swiatowej_Gdansk_Enigma_cipher_machine.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Muzeum_2_Wojny_Swiatowej_Gdansk_Enigma_cipher_machine.jpg/220px-Muzeum_2_Wojny_Swiatowej_Gdansk_Enigma_cipher_machine.jpg" decoding="async" width="220" height="391" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Muzeum_2_Wojny_Swiatowej_Gdansk_Enigma_cipher_machine.jpg/330px-Muzeum_2_Wojny_Swiatowej_Gdansk_Enigma_cipher_machine.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Muzeum_2_Wojny_Swiatowej_Gdansk_Enigma_cipher_machine.jpg/440px-Muzeum_2_Wojny_Swiatowej_Gdansk_Enigma_cipher_machine.jpg 2x" data-file-width="2322" data-file-height="4128" /></a><figcaption>A four-rotor <i><a href="/wiki/Kriegsmarine" title="Kriegsmarine">Kriegsmarine</a></i> Enigma machine on display at the <a href="/wiki/Museum_of_the_Second_World_War" title="Museum of the Second World War">Museum of the Second World War</a>, <a href="/wiki/Gda%C5%84sk" title="Gdańsk">Gdańsk</a>, Poland</figcaption></figure> <p>In Canada, a Swiss Army issue Enigma-K, is in Calgary, Alberta. It is on permanent display at the Naval Museum of Alberta inside the Military Museums of Calgary. A four-rotor Enigma machine is on display at the <a href="/wiki/Military_Communications_and_Electronics_Museum" title="Military Communications and Electronics Museum">Military Communications and Electronics Museum</a> at <a href="/wiki/CFB_Kingston" title="CFB Kingston">Canadian Forces Base (CFB) Kingston</a> in <a href="/wiki/Kingston,_Ontario" title="Kingston, Ontario">Kingston, Ontario</a>. </p><p>Occasionally, Enigma machines are sold at auction; prices have in recent years ranged from US$40,000<sup id="cite_ref-70" class="reference"><a href="#cite_note-70"><span class="cite-bracket">[</span>69<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-71" class="reference"><a href="#cite_note-71"><span class="cite-bracket">[</span>70<span class="cite-bracket">]</span></a></sup> to US$547,500<sup id="cite_ref-72" class="reference"><a href="#cite_note-72"><span class="cite-bracket">[</span>71<span class="cite-bracket">]</span></a></sup> in 2017. Replicas are available in various forms, including an exact reconstructed copy of the Naval M4 model, an Enigma implemented in electronics (Enigma-E), various simulators and paper-and-scissors analogues. </p><p>A rare <i>Abwehr</i> Enigma machine, designated G312, was stolen from the Bletchley Park museum on 1 April 2000. In September, a man identifying himself as "The Master" sent a note demanding £25,000 and threatening to destroy the machine if the ransom was not paid. In early October 2000, Bletchley Park officials announced that they would pay the ransom, but the stated deadline passed with no word from the blackmailer. Shortly afterward, the machine was sent anonymously to BBC journalist <a href="/wiki/Jeremy_Paxman" title="Jeremy Paxman">Jeremy Paxman</a>, missing three rotors. </p> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:LGD_8293-2.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/2/27/LGD_8293-2.jpg/220px-LGD_8293-2.jpg" decoding="async" width="220" height="330" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/2/27/LGD_8293-2.jpg/330px-LGD_8293-2.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/2/27/LGD_8293-2.jpg/440px-LGD_8293-2.jpg 2x" data-file-width="2667" data-file-height="4000" /></a><figcaption>Enigma machine - model K 470 on display at the <a href="/wiki/Enigma_Cipher_Centre" title="Enigma Cipher Centre">Enigma Cipher Centre</a>, <a href="/wiki/Pozna%C5%84" title="Poznań">Poznań</a>, Poland</figcaption></figure> <p>In November 2000, an antiques dealer named Dennis Yates was arrested after telephoning <i><a href="/wiki/The_Sunday_Times" title="The Sunday Times">The Sunday Times</a></i> to arrange the return of the missing parts. The Enigma machine was returned to Bletchley Park after the incident. In October 2001, Yates was sentenced to ten months in prison and served three months.<sup id="cite_ref-73" class="reference"><a href="#cite_note-73"><span class="cite-bracket">[</span>72<span class="cite-bracket">]</span></a></sup> </p><p>In October 2008, the Spanish daily newspaper <i><a href="/wiki/El_Pa%C3%ADs" title="El País">El País</a></i> reported that 28 Enigma machines had been discovered by chance in an attic of Army headquarters in Madrid. These four-rotor commercial machines had helped Franco's Nationalists win the <a href="/wiki/Spanish_Civil_War" title="Spanish Civil War">Spanish Civil War</a>, because, though the British cryptologist <a href="/wiki/Dilly_Knox" title="Dilly Knox">Alfred Dilwyn Knox</a> in 1937 broke the cipher generated by Franco's Enigma machines, this was not disclosed to the Republicans, who failed to break the cipher. The Nationalist government continued using its 50 Enigmas into the 1950s. Some machines have gone on display in Spanish military museums,<sup id="cite_ref-74" class="reference"><a href="#cite_note-74"><span class="cite-bracket">[</span>73<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-75" class="reference"><a href="#cite_note-75"><span class="cite-bracket">[</span>74<span class="cite-bracket">]</span></a></sup> including one at the National Museum of Science and Technology (MUNCYT) in La Coruña and one at the <a href="/wiki/Museum_of_the_Army_(Toledo)" title="Museum of the Army (Toledo)">Spanish Army Museum</a>. Two have been given to Britain's GCHQ.<sup id="cite_ref-76" class="reference"><a href="#cite_note-76"><span class="cite-bracket">[</span>75<span class="cite-bracket">]</span></a></sup> </p><p>The <a href="/wiki/Bulgaria" title="Bulgaria">Bulgarian</a> military used Enigma machines with a <a href="/wiki/Cyrillic_script" title="Cyrillic script">Cyrillic</a> keyboard; one is on display in the <a href="/wiki/National_Museum_of_Military_History_(Bulgaria)" class="mw-redirect" title="National Museum of Military History (Bulgaria)">National Museum of Military History</a> in <a href="/wiki/Sofia" title="Sofia">Sofia</a>.<sup id="cite_ref-77" class="reference"><a href="#cite_note-77"><span class="cite-bracket">[</span>76<span class="cite-bracket">]</span></a></sup> </p><p>On 3 December 2020, German divers working on behalf of the <a href="/wiki/World_Wide_Fund_for_Nature" title="World Wide Fund for Nature">World Wide Fund for Nature</a> discovered a destroyed Enigma machine in <a href="/wiki/Flensburg_Firth" title="Flensburg Firth">Flensburg Firth</a> (part of the <a href="/wiki/Baltic_Sea" title="Baltic Sea">Baltic Sea</a>) which is believed to be from a scuttled U-boat.<sup id="cite_ref-78" class="reference"><a href="#cite_note-78"><span class="cite-bracket">[</span>77<span class="cite-bracket">]</span></a></sup> This Enigma machine will be restored by and be the property of the Archaeology Museum of <a href="/wiki/Schleswig_Holstein" class="mw-redirect" title="Schleswig Holstein">Schleswig Holstein</a>.<sup id="cite_ref-79" class="reference"><a href="#cite_note-79"><span class="cite-bracket">[</span>78<span class="cite-bracket">]</span></a></sup> </p><p>An M4 Enigma was salvaged in the 1980s from the German minesweeper R15, which was sunk off the <a href="/wiki/Istria" title="Istria">Istrian</a> coast in 1945. The machine was put on display in the <a href="/wiki/Pivka_Park_of_Military_History" title="Pivka Park of Military History">Pivka Park of Military History</a> in <a href="/wiki/Slovenia" title="Slovenia">Slovenia</a> on 13 April 2023.<sup id="cite_ref-80" class="reference"><a href="#cite_note-80"><span class="cite-bracket">[</span>79<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Derivatives">Derivatives</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=41" title="Edit section: Derivatives"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The Enigma was influential in the field of cipher machine design, spinning off other <a href="/wiki/Rotor_machine" title="Rotor machine">rotor machines</a>. Once the British discovered Enigma's principle of operation, they created the <a href="/wiki/Typex" title="Typex">Typex</a> rotor cipher, which the Germans believed to be unsolvable.<sup id="cite_ref-81" class="reference"><a href="#cite_note-81"><span class="cite-bracket">[</span>80<span class="cite-bracket">]</span></a></sup> Typex was originally derived from the Enigma patents;<sup id="cite_ref-royal_82-0" class="reference"><a href="#cite_note-royal-82"><span class="cite-bracket">[</span>81<span class="cite-bracket">]</span></a></sup> Typex even includes features from the patent descriptions that were omitted from the actual Enigma machine. The British paid no royalties for the use of the patents.<sup id="cite_ref-royal_82-1" class="reference"><a href="#cite_note-royal-82"><span class="cite-bracket">[</span>81<span class="cite-bracket">]</span></a></sup> In the United States, cryptologist <a href="/wiki/William_F._Friedman" title="William F. Friedman">William Friedman</a> designed the <a href="/wiki/M-325" title="M-325">M-325</a> machine,<sup id="cite_ref-LeeuwBergstra2007_83-0" class="reference"><a href="#cite_note-LeeuwBergstra2007-83"><span class="cite-bracket">[</span>82<span class="cite-bracket">]</span></a></sup> starting in 1936,<sup id="cite_ref-84" class="reference"><a href="#cite_note-84"><span class="cite-bracket">[</span>83<span class="cite-bracket">]</span></a></sup> that is logically similar.<sup id="cite_ref-85" class="reference"><a href="#cite_note-85"><span class="cite-bracket">[</span>84<span class="cite-bracket">]</span></a></sup> </p><p>Machines like the <a href="/wiki/SIGABA" title="SIGABA">SIGABA</a>, <a href="/wiki/NEMA_(machine)" title="NEMA (machine)">NEMA</a>, Typex, and so forth, are not considered to be Enigma derivatives as their internal ciphering functions are not mathematically identical to the Enigma transform. </p><p>A unique rotor machine called Cryptograph was constructed in 2002 by Netherlands-based Tatjana van Vark. This device makes use of 40-point rotors, allowing letters, numbers and some punctuation to be used; each rotor contains 509 parts.<sup id="cite_ref-86" class="reference"><a href="#cite_note-86"><span class="cite-bracket">[</span>85<span class="cite-bracket">]</span></a></sup> </p> <ul class="gallery mw-gallery-packed"> <li class="gallerybox" style="width: 199.33333333333px"> <div class="thumb" style="width: 197.33333333333px;"><span typeof="mw:File"><a href="/wiki/File:Japanese_secure_teletype_2.jpg" class="mw-file-description" title="A Japanese Enigma clone, codenamed GREEN by American cryptographers"><img alt="A Japanese Enigma clone, codenamed GREEN by American cryptographers" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/0f/Japanese_secure_teletype_2.jpg/296px-Japanese_secure_teletype_2.jpg" decoding="async" width="198" height="148" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/0f/Japanese_secure_teletype_2.jpg/444px-Japanese_secure_teletype_2.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/0f/Japanese_secure_teletype_2.jpg/592px-Japanese_secure_teletype_2.jpg 2x" data-file-width="2016" data-file-height="1512" /></a></span></div> <div class="gallerytext">A Japanese Enigma clone, codenamed GREEN by American cryptographers</div> </li> <li class="gallerybox" style="width: 234px"> <div class="thumb" style="width: 232px;"><span typeof="mw:File"><a href="/wiki/File:Tatjavanavark-machine.jpg" class="mw-file-description" title="Tatjana van Vark's Enigma-inspired rotor machine"><img alt="Tatjana van Vark's Enigma-inspired rotor machine" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/02/Tatjavanavark-machine.jpg/348px-Tatjavanavark-machine.jpg" decoding="async" width="232" height="148" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/02/Tatjavanavark-machine.jpg/521px-Tatjavanavark-machine.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/02/Tatjavanavark-machine.jpg/695px-Tatjavanavark-machine.jpg 2x" data-file-width="720" data-file-height="460" /></a></span></div> <div class="gallerytext">Tatjana van Vark's Enigma-inspired rotor machine</div> </li> <li class="gallerybox" style="width: 150px"> <div class="thumb" style="width: 148px;"><span typeof="mw:File"><a href="/wiki/File:Enigma_simulator-IMG_0515-black.jpg" class="mw-file-description" title="Electronic implementation of an Enigma machine, sold at the Bletchley Park souvenir shop"><img alt="Electronic implementation of an Enigma machine, sold at the Bletchley Park souvenir shop" src="//upload.wikimedia.org/wikipedia/commons/thumb/b/be/Enigma_simulator-IMG_0515-black.jpg/222px-Enigma_simulator-IMG_0515-black.jpg" decoding="async" width="148" height="148" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/b/be/Enigma_simulator-IMG_0515-black.jpg/333px-Enigma_simulator-IMG_0515-black.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/b/be/Enigma_simulator-IMG_0515-black.jpg/444px-Enigma_simulator-IMG_0515-black.jpg 2x" data-file-width="4992" data-file-height="4992" /></a></span></div> <div class="gallerytext">Electronic implementation of an Enigma machine, sold at the Bletchley Park souvenir shop</div> </li> </ul> <div class="mw-heading mw-heading2"><h2 id="Simulators">Simulators</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=42" title="Edit section: Simulators"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/List_of_Enigma_machine_simulators" title="List of Enigma machine simulators">List of Enigma machine simulators</a></div> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=43" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Alastair_Denniston" title="Alastair Denniston">Alastair Denniston</a></li> <li><a href="/wiki/Arlington_Hall" title="Arlington Hall">Arlington Hall</a></li> <li><a href="/wiki/Arne_Beurling" title="Arne Beurling">Arne Beurling</a></li> <li><a href="/wiki/Beaumanor_Hall" title="Beaumanor Hall">Beaumanor Hall</a>, a stately home used during the Second World War for military intelligence</li> <li><a href="/wiki/Cryptanalysis_of_the_Enigma" title="Cryptanalysis of the Enigma">Cryptanalysis of the Enigma</a></li> <li><a href="/wiki/Erhard_Maertens" title="Erhard Maertens">Erhard Maertens</a>—investigated Enigma security</li> <li><a href="/wiki/Erich_Fellgiebel" title="Erich Fellgiebel">Erich Fellgiebel</a></li> <li><a href="/wiki/SIGABA" title="SIGABA">ECM Mark II</a>—cipher machine used by the Americans in the Second World War</li> <li><a href="/wiki/Fritz_Thiele" title="Fritz Thiele">Fritz Thiele</a></li> <li><a href="/wiki/Gisbert_Hasenjaeger" title="Gisbert Hasenjaeger">Gisbert Hasenjaeger</a>—responsible for Enigma security</li> <li><a href="/wiki/United_States_Naval_Computing_Machine_Laboratory" title="United States Naval Computing Machine Laboratory">United States Naval Computing Machine Laboratory</a></li> <li><a href="/wiki/Typex" title="Typex">Typex</a>—cipher machine used by the British in the Second World War, based on the principles of the commercial Enigma machine</li></ul> <div class="mw-heading mw-heading2"><h2 id="Explanatory_notes">Explanatory notes</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=44" title="Edit section: Explanatory notes"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-lower-alpha"> <div class="mw-references-wrap"><ol class="references"> <li id="cite_note-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-17">^</a></b></span> <span class="reference-text">Much of the German cipher traffic was encrypted on the Enigma machine, and the term "Ultra" has often been used almost synonymously with "<a href="/wiki/Cryptanalysis_of_the_Enigma" title="Cryptanalysis of the Enigma">Enigma decrypts</a>". Ultra also encompassed decrypts of the German <a href="/wiki/Lorenz_cipher" title="Lorenz cipher">Lorenz SZ 40 and 42 machines</a> that were used by the German High Command, and decrypts of <a href="/wiki/C-36_(cipher_machine)" title="C-36 (cipher machine)">Hagelin ciphers</a> and other Italian ciphers and codes, as well as of Japanese ciphers and codes such as <a href="/wiki/Type_B_Cipher_Machine" title="Type B Cipher Machine">Purple</a> and <a href="/wiki/Japanese_naval_codes#JN-25" title="Japanese naval codes">JN-25</a>.</span> </li> </ol></div></div> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=45" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Citations">Citations</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=46" title="Edit section: Citations"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239543626"><div class="reflist"> <div class="mw-references-wrap mw-references-columns"><ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.cryptomuseum.com/crypto/enigma/hist.htm">"EnigmaHistory"</a>. <i>cryptomuseum.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">16 December</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=cryptomuseum.com&rft.atitle=EnigmaHistory&rft_id=https%3A%2F%2Fwww.cryptomuseum.com%2Fcrypto%2Fenigma%2Fhist.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEComer2021-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEComer2021_2-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFComer2021">Comer 2021</a>.</span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKeegan2003" class="citation book cs1">Keegan, John, Sir (2003). <i>Intelligence in War</i>. New York: Alfred A. Knopf.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Intelligence+in+War&rft.place=New+York&rft.pub=Alfred+A.+Knopf&rft.date=2003&rft.aulast=Keegan&rft.aufirst=John%2C+Sir&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_book" title="Template:Cite book">cite book</a>}}</code>: CS1 maint: multiple names: authors list (<a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">link</a>)</span></span> </li> <li id="cite_note-Singh2011-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-Singh2011_4-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSingh2011" class="citation book cs1">Singh, Simon (26 January 2011). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=fbp9V9dkaNkC"><i>The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography</i></a>. Knopf Doubleday Publishing Group. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-307-78784-2" title="Special:BookSources/978-0-307-78784-2"><bdi>978-0-307-78784-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Code+Book%3A+The+Science+of+Secrecy+from+Ancient+Egypt+to+Quantum+Cryptography&rft.pub=Knopf+Doubleday+Publishing+Group&rft.date=2011-01-26&rft.isbn=978-0-307-78784-2&rft.aulast=Singh&rft.aufirst=Simon&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3Dfbp9V9dkaNkC&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.cryptomuseum.com/crypto/enigma/hist.htm">"History of the Enigma"</a>. Crypto Museum<span class="reference-accessdate">. Retrieved <span class="nowrap">1 December</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=History+of+the+Enigma&rft.pub=Crypto+Museum&rft_id=http%3A%2F%2Fwww.cryptomuseum.com%2Fcrypto%2Fenigma%2Fhist.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLord1998–2010" class="citation web cs1">Lord, Bob (1998–2010). <a rel="nofollow" class="external text" href="http://www.ilord.com/enigma-manuals">"Enigma Manual"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">31 May</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Enigma+Manual&rft.date=1998%2F2010&rft.aulast=Lord&rft.aufirst=Bob&rft_id=http%3A%2F%2Fwww.ilord.com%2Fenigma-manuals&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHamerSullivanWeierud1998" class="citation journal cs1">Hamer, David H.; Sullivan, Geoff; Weierud, Frode (July 1998). <a rel="nofollow" class="external text" href="http://www.math.utoledo.edu/~codenth/Cryptanalysis/crypt_machs/ESIM/enigvar2.PDF">"Enigma Variations: An Extended Family of Machines"</a> <span class="cs1-format">(PDF)</span>. <i>Cryptologia</i>. <b>XXII</b> (3): 211–229. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F0161-119891886885">10.1080/0161-119891886885</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0161-1194">0161-1194</a><span class="reference-accessdate">. Retrieved <span class="nowrap">18 February</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cryptologia&rft.atitle=Enigma+Variations%3A+An+Extended+Family+of+Machines&rft.volume=XXII&rft.issue=3&rft.pages=211-229&rft.date=1998-07&rft_id=info%3Adoi%2F10.1080%2F0161-119891886885&rft.issn=0161-1194&rft.aulast=Hamer&rft.aufirst=David+H.&rft.au=Sullivan%2C+Geoff&rft.au=Weierud%2C+Frode&rft_id=http%3A%2F%2Fwww.math.utoledo.edu%2F~codenth%2FCryptanalysis%2Fcrypt_machs%2FESIM%2Fenigvar2.PDF&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.spymuseum.org/exhibition-experiences/about-the-collection/collection-highlights/four-rotor-enigma-machine/">"Four Rotor Enigma Machine"</a>. <i>International Spy Museum</i><span class="reference-accessdate">. Retrieved <span class="nowrap">21 February</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=International+Spy+Museum&rft.atitle=Four+Rotor+Enigma+Machine&rft_id=https%3A%2F%2Fwww.spymuseum.org%2Fexhibition-experiences%2Fabout-the-collection%2Fcollection-highlights%2Ffour-rotor-enigma-machine%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTERejewski1980-9"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTERejewski1980_9-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTERejewski1980_9-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFRejewski1980">Rejewski 1980</a>.</span> </li> <li id="cite_note-FOOTNOTEVázquezJiménez–Seral2018-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEVázquezJiménez–Seral2018_10-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFVázquezJiménez–Seral2018">Vázquez & Jiménez–Seral 2018</a>.</span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text">Władysław Kozaczuk, <i>Enigma: How the German Machine Cipher was Broken, and how it was Read by the Allies in World War Two</i>, edited and translated by Christopher Kasparek, Frederick, Maryland, University Publications of America, 1984, ISBN 978-0-89093-547-7, p. 21.</span> </li> <li id="cite_note-FOOTNOTEKozaczuk198463-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEKozaczuk198463_12-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFKozaczuk1984">Kozaczuk 1984</a>, p. 63.</span> </li> <li id="cite_note-FOOTNOTEErskine2006294–305-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEErskine2006294–305_13-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFErskine2006">Erskine 2006</a>, pp. 294–305.</span> </li> <li id="cite_note-FOOTNOTEKozaczuk198459–60,_236-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEKozaczuk198459–60,_236_14-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFKozaczuk1984">Kozaczuk 1984</a>, pp. 59–60, 236.</span> </li> <li id="cite_note-FOOTNOTEKozaczuk198469–94-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEKozaczuk198469–94_15-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFKozaczuk1984">Kozaczuk 1984</a>, pp. 69–94.</span> </li> <li id="cite_note-FOOTNOTEWelchman1982289-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWelchman1982289_16-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWelchman1982">Welchman 1982</a>, p. 289.</span> </li> <li id="cite_note-FOOTNOTEKahn1991-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEKahn1991_18-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFKahn1991">Kahn 1991</a>.</span> </li> <li id="cite_note-FOOTNOTEStripp1993-19"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEStripp1993_19-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEStripp1993_19-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFStripp1993">Stripp 1993</a>.</span> </li> <li id="cite_note-Flem11-20"><span class="mw-cite-backlink">^ <a href="#cite_ref-Flem11_20-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Flem11_20-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRankin2011" class="citation book cs1">Rankin, Nicholas (2011). <i>Ian Fleming's Commandos: The Story of 30 Assault Unit in WWII</i>. Oxford University Press. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0199782826" title="Special:BookSources/978-0199782826"><bdi>978-0199782826</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Ian+Fleming%27s+Commandos%3A+The+Story+of+30+Assault+Unit+in+WWII&rft.pub=Oxford+University+Press&rft.date=2011&rft.isbn=978-0199782826&rft.aulast=Rankin&rft.aufirst=Nicholas&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-NSA-German-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-NSA-German_21-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20230514055454/https://www.nsa.gov/portals/75/documents/about/cryptologic-heritage/historical-figures-publications/publications/wwii/german_cipher.pdf">"German Cipher Machines of World War II"</a> <span class="cs1-format">(PDF)</span>. <i>Center for Cryptologic History</i>. <a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency</a>. 2014. pp. 22–25. Archived from <a rel="nofollow" class="external text" href="https://www.nsa.gov/Portals/70/documents/about/cryptologic-heritage/historical-figures-publications/publications/wwii/german_cipher.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 14 May 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">21 January</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Center+for+Cryptologic+History&rft.atitle=German+Cipher+Machines+of+World+War+II&rft.pages=22-25&rft.date=2014&rft_id=https%3A%2F%2Fwww.nsa.gov%2FPortals%2F70%2Fdocuments%2Fabout%2Fcryptologic-heritage%2Fhistorical-figures-publications%2Fpublications%2Fwwii%2Fgerman_cipher.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-Enigma_History-22"><span class="mw-cite-backlink">^ <a href="#cite_ref-Enigma_History_22-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Enigma_History_22-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Enigma_History_22-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-Enigma_History_22-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.cryptomuseum.com/crypto/enigma/hist.htm">"Enigma History"</a>. <i>cryptomuseum.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">16 December</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=cryptomuseum.com&rft.atitle=Enigma+History&rft_id=https%3A%2F%2Fwww.cryptomuseum.com%2Fcrypto%2Fenigma%2Fhist.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-Rijmenants-23"><span class="mw-cite-backlink">^ <a href="#cite_ref-Rijmenants_23-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Rijmenants_23-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Rijmenants_23-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text">Rijmenants, Dirk; <a rel="nofollow" class="external text" href="https://www.ciphermachinesandcryptology.com/en/enigmatech.htm">Technical details of the Enigma machine</a> Cipher Machines & Cryptology</span> </li> <li id="cite_note-doublestepping-24"><span class="mw-cite-backlink">^ <a href="#cite_ref-doublestepping_24-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-doublestepping_24-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-doublestepping_24-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHamer1997" class="citation journal cs1">Hamer, David (January 1997). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110719081659/http://www.eclipse.net/~dhamer/downloads/rotorpdf.zip">"Enigma: Actions Involved in the 'Double-Stepping' of the Middle Rotor"</a>. <i>Cryptologia</i>. <b>21</b> (1): 47–50. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F0161-119791885779">10.1080/0161-119791885779</a>. Archived from <a rel="nofollow" class="external text" href="http://www.eclipse.net/~dhamer/downloads/rotorpdf.zip">the original</a> <span class="cs1-format">(zip)</span> on 19 July 2011.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cryptologia&rft.atitle=Enigma%3A+Actions+Involved+in+the+%27Double-Stepping%27+of+the+Middle+Rotor&rft.volume=21&rft.issue=1&rft.pages=47-50&rft.date=1997-01&rft_id=info%3Adoi%2F10.1080%2F0161-119791885779&rft.aulast=Hamer&rft.aufirst=David&rft_id=http%3A%2F%2Fwww.eclipse.net%2F~dhamer%2Fdownloads%2Frotorpdf.zip&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSale" class="citation web cs1"><a href="/wiki/Tony_Sale" title="Tony Sale">Sale, Tony</a>. <a rel="nofollow" class="external text" href="http://www.codesandciphers.org.uk/enigma/rotorspec.htm">"Technical specifications of the Enigma rotors"</a>. <i>Technical Specification of the Enigma</i><span class="reference-accessdate">. Retrieved <span class="nowrap">15 November</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Technical+Specification+of+the+Enigma&rft.atitle=Technical+specifications+of+the+Enigma+rotors&rft.aulast=Sale&rft.aufirst=Tony&rft_id=http%3A%2F%2Fwww.codesandciphers.org.uk%2Fenigma%2Frotorspec.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.cryptomuseum.com/crypto/enigma/lf/index.htm">"Lückenfüllerwalze"</a>. Cryptomuseum.com<span class="reference-accessdate">. Retrieved <span class="nowrap">17 July</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=L%C3%BCckenf%C3%BCllerwalze&rft.pub=Cryptomuseum.com&rft_id=http%3A%2F%2Fwww.cryptomuseum.com%2Fcrypto%2Fenigma%2Flf%2Findex.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-Korn-27"><span class="mw-cite-backlink">^ <a href="#cite_ref-Korn_27-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Korn_27-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDe_LeeuwBergstra2007" class="citation book cs1">De Leeuw, Karl Maria Michael; Bergstra, J A (2007). <i>The history of information security : a comprehensive handbook</i>. Amsterdam: Elsevier. p. 393. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9780080550589" title="Special:BookSources/9780080550589"><bdi>9780080550589</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+history+of+information+security+%3A+a+comprehensive+handbook&rft.place=Amsterdam&rft.pages=393&rft.pub=Elsevier&rft.date=2007&rft.isbn=9780080550589&rft.aulast=De+Leeuw&rft.aufirst=Karl+Maria+Michael&rft.au=Bergstra%2C+J+A&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEMarksWeierud2000-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEMarksWeierud2000_28-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFMarksWeierud2000">Marks & Weierud 2000</a>.</span> </li> <li id="cite_note-FOOTNOTEMarks2001101–141-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEMarks2001101–141_29-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFMarks2001">Marks 2001</a>, pp. 101–141.</span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text">Craig P. Bauer: <i>Secret History – The Story of Cryptology</i>. CRC Press, Boca Raton 2013, p. 248. ISBN 978-1-4665-6186-1.</span> </li> <li id="cite_note-158,962,555,217,826,360,000-31"><span class="mw-cite-backlink">^ <a href="#cite_ref-158,962,555,217,826,360,000_31-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-158,962,555,217,826,360,000_31-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVan_ManenJohan_O._A.2016" class="citation news cs1">Van Manen, Dirk-Jan; Johan O. A., Robertsson (2016). <a rel="nofollow" class="external text" href="https://geoexpro.com/codes-and-ciphers-part-i/">"Codes and Ciphers"</a>. <i>Geo ExPro</i><span class="reference-accessdate">. Retrieved <span class="nowrap">13 October</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Geo+ExPro&rft.atitle=Codes+and+Ciphers&rft.date=2016&rft.aulast=Van+Manen&rft.aufirst=Dirk-Jan&rft.au=Johan+O.+A.%2C+Robertsson&rft_id=https%3A%2F%2Fgeoexpro.com%2Fcodes-and-ciphers-part-i%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFReuvers2008" class="citation web cs1">Reuvers, Paul (2008). <a rel="nofollow" class="external text" href="http://www.jproc.ca/crypto/enigma_acc.html">"Enigma accessories"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">22 July</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Enigma+accessories&rft.date=2008&rft.aulast=Reuvers&rft.aufirst=Paul&rft_id=http%3A%2F%2Fwww.jproc.ca%2Fcrypto%2Fenigma_acc.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-engima_cryptographic_mathematics-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-engima_cryptographic_mathematics_33-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMiller1995" class="citation journal cs1">Miller, A. Ray (January 1995). <a rel="nofollow" class="external text" href="https://www.tandfonline.com/doi/abs/10.1080/0161-119591883773">"The cryptographic mathematics of Enigma"</a>. <i>Cryptologia</i>. <b>19</b> (1): 65–80. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F0161-119591883773">10.1080/0161-119591883773</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cryptologia&rft.atitle=The+cryptographic+mathematics+of+Enigma&rft.volume=19&rft.issue=1&rft.pages=65-80&rft.date=1995-01&rft_id=info%3Adoi%2F10.1080%2F0161-119591883773&rft.aulast=Miller&rft.aufirst=A.+Ray&rft_id=https%3A%2F%2Fwww.tandfonline.com%2Fdoi%2Fabs%2F10.1080%2F0161-119591883773&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFriedman1922" class="citation book cs1"><a href="/wiki/William_F._Friedman" title="William F. Friedman">Friedman, W.F.</a> (1922). <i>The index of coincidence and its applications in cryptology</i>. Department of Ciphers. Publ 22. Geneva, Illinois, USA: Riverbank Laboratories. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/55786052">55786052</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+index+of+coincidence+and+its+applications+in+cryptology&rft.place=Geneva%2C+Illinois%2C+USA&rft.series=Department+of+Ciphers.+Publ+22&rft.pub=Riverbank+Laboratories&rft.date=1922&rft_id=info%3Aoclcnum%2F55786052&rft.aulast=Friedman&rft.aufirst=W.F.&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEHuttenhainFricke19454,_5-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEHuttenhainFricke19454,_5_35-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFHuttenhainFricke1945">Huttenhain & Fricke 1945</a>, pp. 4, 5.</span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text">Rijmenants, Dirk; <a rel="nofollow" class="external text" href="https://www.ciphermachinesandcryptology.com/en/enigmaproc.htm">Enigma message procedures</a> Cipher Machines & Cryptology</span> </li> <li id="cite_note-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-37">^</a></b></span> <span class="reference-text">Rijmenants, Dirk; <a rel="nofollow" class="external text" href="https://www.ciphermachinesandcryptology.com/en/kurzsignale.htm">Kurzsignalen on German U-boats</a> Cipher Machines & Cryptology</span> </li> <li id="cite_note-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-38">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.codesandciphers.org.uk/documents/egenproc/eniggnix.htm">"The translated 1940 <i>Enigma General Procedure</i>"</a>. codesandciphers.org.uk<span class="reference-accessdate">. Retrieved <span class="nowrap">16 October</span> 2006</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+translated+1940+Enigma+General+Procedure&rft.pub=codesandciphers.org.uk&rft_id=http%3A%2F%2Fwww.codesandciphers.org.uk%2Fdocuments%2Fegenproc%2Feniggnix.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-39">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.codesandciphers.org.uk/documents/officer/officerx.htm">"The translated 1940 <i>Enigma Officer and Staff Procedure</i>"</a>. codesandciphers.org.uk<span class="reference-accessdate">. Retrieved <span class="nowrap">16 October</span> 2006</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+translated+1940+Enigma+Officer+and+Staff+Procedure&rft.pub=codesandciphers.org.uk&rft_id=http%3A%2F%2Fwww.codesandciphers.org.uk%2Fdocuments%2Fofficer%2Fofficerx.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-40">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.cryptomuseum.com/crypto/enigma/msg/p1030681.htm">"Message from Dönitz — 1 May 1945"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">27 November</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Message+from+D%C3%B6nitz+%E2%80%94+1+May+1945&rft_id=https%3A%2F%2Fwww.cryptomuseum.com%2Fcrypto%2Fenigma%2Fmsg%2Fp1030681.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEBauer2000123-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBauer2000123_41-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBauer2000">Bauer 2000</a>, p. 123.</span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://cryptocellar.org/enigma/e-history/enigma-reichswehr-wehrmacht-orders.pdf"><i>Reichswehr and Wehrmacht Enigma Orders</i></a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210629133408/https://cryptocellar.org/enigma/e-history/enigma-reichswehr-wehrmacht-orders.pdf">Archived</a> 29 June 2021 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a> in Frode Weierud’s CryptoCellar, accessed 29 June 2021.</span> </li> <li id="cite_note-FOOTNOTEBauer2000112-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBauer2000112_43-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBauer2000">Bauer 2000</a>, p. 112.</span> </li> <li id="cite_note-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-44">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.cdvandt.org/Enigma%20DE416219C1.pdf">"German patent No. 416219 from 23 February 1918"</a> <span class="cs1-format">(PDF)</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=German+patent+No.+416219+from+23+February+1918&rft_id=https%3A%2F%2Fwww.cdvandt.org%2FEnigma%2520DE416219C1.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1041539562">.mw-parser-output .citation{word-wrap:break-word}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}</style><span class="citation patent" id="CITEREFScherbius1928"><a rel="nofollow" class="external text" href="https://worldwide.espacenet.com/textdoc?DB=EPODOC&IDX=US1657411">US 1657411</a>, Scherbius, Arthur, "Ciphering Machine", issued 24 January 1928,  assigned to Chiffriermaschinen AG</span><span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.number=1657411&rft.cc=US&rft.title=Ciphering+Machine&rft.inventor=Scherbius&rft.assignee=Chiffriermaschinen+AG&rft.date=24 January 1928&rft.appldate=6 February 1923&rft.prioritydate=11 February 1922"><span style="display: none;"> </span></span></span> </li> <li id="cite_note-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-46">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20051021083422/http://www.armyradio.com/publish/Articles/The_Enigma_Code_Breach/Pictures/enigma_type_b.jpg">"image of Enigma Type B"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.armyradio.com/publish/Articles/The_Enigma_Code_Breach/Pictures/enigma_type_b.jpg">the original</a> on 21 October 2005.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=image+of+Enigma+Type+B&rft_id=http%3A%2F%2Fwww.armyradio.com%2Fpublish%2FArticles%2FThe_Enigma_Code_Breach%2FPictures%2Fenigma_type_b.jpg&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-47">^</a></b></span> <span class="reference-text">Bletchley Park Trust Museum display</span> </li> <li id="cite_note-FOOTNOTESmith200623-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESmith200623_48-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSmith2006">Smith 2006</a>, p. 23.</span> </li> <li id="cite_note-FOOTNOTEKozaczuk198428-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEKozaczuk198428_49-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFKozaczuk1984">Kozaczuk 1984</a>, p. 28.</span> </li> <li id="cite_note-FOOTNOTEKahn199139–41,_299-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEKahn199139–41,_299_50-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFKahn1991">Kahn 1991</a>, pp. 39–41, 299.</span> </li> <li id="cite_note-FOOTNOTEUlbricht20054-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEUlbricht20054_51-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFUlbricht2005">Ulbricht 2005</a>, p. 4.</span> </li> <li id="cite_note-FOOTNOTEKahn199140,_299-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEKahn199140,_299_52-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFKahn1991">Kahn 1991</a>, pp. 40, 299.</span> </li> <li id="cite_note-FOOTNOTEBauer2000108-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBauer2000108_53-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBauer2000">Bauer 2000</a>, p. 108.</span> </li> <li id="cite_note-FOOTNOTEStripp1993plate_3-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEStripp1993plate_3_54-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFStripp1993">Stripp 1993</a>, plate 3.</span> </li> <li id="cite_note-FOOTNOTEKahn199141,_299-55"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEKahn199141,_299_55-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFKahn1991">Kahn 1991</a>, pp. 41, 299.</span> </li> <li id="cite_note-FOOTNOTEKruhDeavours200297-56"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEKruhDeavours200297_56-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEKruhDeavours200297_56-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-FOOTNOTEKruhDeavours200297_56-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFKruhDeavours2002">Kruh & Deavours 2002</a>, p. 97.</span> </li> <li id="cite_note-FOOTNOTESmith200073-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESmith200073_57-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSmith2000">Smith 2000</a>, p. 73.</span> </li> <li id="cite_note-FOOTNOTEStripp199383-58"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEStripp199383_58-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFStripp1993">Stripp 1993</a>, p. 83.</span> </li> <li id="cite_note-FOOTNOTEKahn199143-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEKahn199143_59-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFKahn1991">Kahn 1991</a>, p. 43.</span> </li> <li id="cite_note-60"><span class="mw-cite-backlink"><b><a href="#cite_ref-60">^</a></b></span> <span class="reference-text"><a href="#CITEREFKahn1991">Kahn 1991</a>, p. 43 says August 1934. <a href="#CITEREFKruhDeavours2002">Kruh & Deavours 2002</a>, p. 15 say October 2004.</span> </li> <li id="cite_note-FOOTNOTEKruhDeavours200298-61"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEKruhDeavours200298_61-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEKruhDeavours200298_61-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFKruhDeavours2002">Kruh & Deavours 2002</a>, p. 98.</span> </li> <li id="cite_note-ng-62"><span class="mw-cite-backlink"><b><a href="#cite_ref-ng_62-0">^</a></b></span> <span class="reference-text">Ng, David. <a rel="nofollow" class="external text" href="http://www.latimes.com/entertainment/arts/culture/la-et-cm-imitation-game-enigma-machine-david-bohnett-20150122-story.html">"Enigma machine from World War II finds unlikely home in Beverly Hills"</a>. <i><a href="/wiki/Los_Angeles_Times" title="Los Angeles Times">Los Angeles Times</a></i>. 22 January 2015.</span> </li> <li id="cite_note-63"><span class="mw-cite-backlink"><b><a href="#cite_ref-63">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="https://www.deutsches-spionagemuseum.de/sammlung/enigma">"Enigma-Maschine: Die Entschlüsselung der Chiffriermaschine"</a>. <i>Deutsches Spionagemuseum</i> (in German)<span class="reference-accessdate">. Retrieved <span class="nowrap">3 February</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Deutsches+Spionagemuseum&rft.atitle=Enigma-Maschine%3A+Die+Entschl%C3%BCsselung+der+Chiffriermaschine&rft_id=https%3A%2F%2Fwww.deutsches-spionagemuseum.de%2Fsammlung%2Fenigma&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-64"><span class="mw-cite-backlink"><b><a href="#cite_ref-64">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.warmuseum.no/no/English/">"War Museum"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=War+Museum&rft_id=http%3A%2F%2Fwww.warmuseum.no%2Fno%2FEnglish%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-65"><span class="mw-cite-backlink"><b><a href="#cite_ref-65">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.viestikiltojenliitto.fi/viestimuseo/_eng/index.html">"The National Signals Museum"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+National+Signals+Museum&rft_id=http%3A%2F%2Fwww.viestikiltojenliitto.fi%2Fviestimuseo%2F_eng%2Findex.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-66"><span class="mw-cite-backlink"><b><a href="#cite_ref-66">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20160423092753/http://thenews.pl/1/10/Artykul/244703,Enigma-exhibition-in-London-pays-tribute-to-Poles">"Enigma exhibition in London pays tribute to Poles"</a>. <i>Polskie Radio dla Zagranicy</i>. Archived from <a rel="nofollow" class="external text" href="http://www.thenews.pl/1/10/Artykul/244703,Enigma-exhibition-in-London-pays-tribute-to-Poles">the original</a> on 23 April 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">5 April</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Polskie+Radio+dla+Zagranicy&rft.atitle=Enigma+exhibition+in+London+pays+tribute+to+Poles&rft_id=http%3A%2F%2Fwww.thenews.pl%2F1%2F10%2FArtykul%2F244703%2CEnigma-exhibition-in-London-pays-tribute-to-Poles&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-67"><span class="mw-cite-backlink"><b><a href="#cite_ref-67">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20160422230532/http://pilsudski.org.uk/en/aktualnosci.php?news=205&wid=13&wai=&year=&back=%252Fen%252F">"13 March 2016, 'Enigma Relay'– how Poles passed the baton to Brits in the run for WWII victory"</a>. <i>J. Piłsudski Institute in London</i>. Archived from <a rel="nofollow" class="external text" href="http://pilsudski.org.uk/en/aktualnosci.php?news=205&wid=13&wai=&year=&back=%252Fen%252F">the original</a> on 22 April 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">5 April</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=J.+Pi%C5%82sudski+Institute+in+London&rft.atitle=13+March+2016%2C+%27Enigma+Relay%27%E2%80%93+how+Poles+passed+the+baton+to+Brits+in+the+run+for+WWII+victory&rft_id=http%3A%2F%2Fpilsudski.org.uk%2Fen%2Faktualnosci.php%3Fnews%3D205%26wid%3D13%26wai%3D%26year%3D%26back%3D%25252Fen%25252F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-68"><span class="mw-cite-backlink"><b><a href="#cite_ref-68">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20211111122950/http://muzhp.pl/pl/c/1887/enigma-w-kolekcji-mhp">"Enigma w kolekcji MHP - Muzeum Historii Polski"</a>. Archived from <a rel="nofollow" class="external text" href="http://muzhp.pl/pl/c/1887/enigma-w-kolekcji-mhp">the original</a> on 11 November 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">11 November</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Enigma+w+kolekcji+MHP+-+Muzeum+Historii+Polski&rft_id=http%3A%2F%2Fmuzhp.pl%2Fpl%2Fc%2F1887%2Fenigma-w-kolekcji-mhp&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-69"><span class="mw-cite-backlink"><b><a href="#cite_ref-69">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.tnmoc.org/">"The National Museum of Computing"</a>. <i>The National Museum of Computing</i><span class="reference-accessdate">. Retrieved <span class="nowrap">16 December</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+National+Museum+of+Computing&rft.atitle=The+National+Museum+of+Computing&rft_id=https%3A%2F%2Fwww.tnmoc.org%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-70"><span class="mw-cite-backlink"><b><a href="#cite_ref-70">^</a></b></span> <span class="reference-text">Hamer, David; <i><a rel="nofollow" class="external text" href="http://www.eclipse.net/~dhamer/location.htm">Enigma machines – known locations*</a></i> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20111104151545/http://www.eclipse.net/~dhamer/location.htm">Archived</a> 4 November 2011 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-71"><span class="mw-cite-backlink"><b><a href="#cite_ref-71">^</a></b></span> <span class="reference-text">Hamer, David; <i><a rel="nofollow" class="external text" href="http://www.eclipse.net/~dhamer/enigma_p.htm">Selling prices of Enigma and NEMA – all prices converted to US$</a></i> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110927033657/http://www.eclipse.net/~dhamer/enigma_p.htm">Archived</a> 27 September 2011 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-72"><span class="mw-cite-backlink"><b><a href="#cite_ref-72">^</a></b></span> <span class="reference-text">Christi's; <i><a rel="nofollow" class="external text" href="https://web.archive.org/web/20170617050627/http://artdaily.com/news/96771/Christie-s-sets-world-auction-record-for-an-Enigma-Machine-sold-to-online-bidder#.WZ80cZN94RF">4 Rotor enigma auction</a></i></span> </li> <li id="cite_note-73"><span class="mw-cite-backlink"><b><a href="#cite_ref-73">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://news.bbc.co.uk/1/hi/uk/1609168.stm">"Man jailed over Enigma machine"</a>. <i>BBC News</i>. 19 October 2001<span class="reference-accessdate">. Retrieved <span class="nowrap">2 May</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=BBC+News&rft.atitle=Man+jailed+over+Enigma+machine&rft.date=2001-10-19&rft_id=http%3A%2F%2Fnews.bbc.co.uk%2F1%2Fhi%2Fuk%2F1609168.stm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-74"><span class="mw-cite-backlink"><b><a href="#cite_ref-74">^</a></b></span> <span class="reference-text">Graham Keeley. <i><a rel="nofollow" class="external text" href="https://archive.today/20100201144500/http://www.timesonline.co.uk/tol/news/world/europe/article5003411.ece">Nazi Enigma machines helped General Franco in Spanish Civil War</a></i>, <a href="/wiki/The_Times" title="The Times">The Times</a>, 24 October 2008, p. 47.</span> </li> <li id="cite_note-75"><span class="mw-cite-backlink"><b><a href="#cite_ref-75">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130611204718/http://www.cripto.es/museo/enigma-esp-fotos.htm">"Taller de Criptografía – Enigmas españolas"</a>. Cripto.es. Archived from <a rel="nofollow" class="external text" href="http://www.cripto.es/museo/enigma-esp-fotos.htm">the original</a> on 11 June 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">8 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Taller+de+Criptograf%C3%ADa+%E2%80%93+Enigmas+espa%C3%B1olas&rft.pub=Cripto.es&rft_id=http%3A%2F%2Fwww.cripto.es%2Fmuseo%2Fenigma-esp-fotos.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-76"><span class="mw-cite-backlink"><b><a href="#cite_ref-76">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.schneier.com/blog/archives/2012/03/rare_spanish_en.html">"Schneier on Security: Rare Spanish Enigma Machine"</a>. Schneier.com. 26 March 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">8 September</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Schneier+on+Security%3A+Rare+Spanish+Enigma+Machine&rft.pub=Schneier.com&rft.date=2012-03-26&rft_id=http%3A%2F%2Fwww.schneier.com%2Fblog%2Farchives%2F2012%2F03%2Frare_spanish_en.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-77"><span class="mw-cite-backlink"><b><a href="#cite_ref-77">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20150113062919/http://www.znam.bg/com/action/showAppArticle?appID=3&encID=2&article=3514226659&sectionID=1">"Communication equipment"</a>. znam.bg. 29 November 2003. Archived from <a rel="nofollow" class="external text" href="http://www.znam.bg/com/action/showAppArticle?appID=3&encID=2&article=3514226659&sectionID=1">the original</a> on 13 January 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">13 January</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Communication+equipment&rft.pub=znam.bg&rft.date=2003-11-29&rft_id=http%3A%2F%2Fwww.znam.bg%2Fcom%2Faction%2FshowAppArticle%3FappID%3D3%26encID%3D2%26article%3D3514226659%26sectionID%3D1&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-78"><span class="mw-cite-backlink"><b><a href="#cite_ref-78">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.reuters.com/article/us-germany-war-enigma-idUSKBN28D25F">"Divers discover Nazi WW2 enigma machine in Baltic Sea"</a>. <i><a href="/wiki/Reuters" title="Reuters">Reuters</a></i>. 3 December 2020. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20201203171005/https://www.reuters.com/article/us-germany-war-enigma-idUSKBN28D25F">Archived</a> from the original on 3 December 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">3 December</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Reuters&rft.atitle=Divers+discover+Nazi+WW2+enigma+machine+in+Baltic+Sea&rft.date=2020-12-03&rft_id=https%3A%2F%2Fwww.reuters.com%2Farticle%2Fus-germany-war-enigma-idUSKBN28D25F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-79"><span class="mw-cite-backlink"><b><a href="#cite_ref-79">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWelle_(www.dw.com)" class="citation web cs1">Welle (www.dw.com), Deutsche. <a rel="nofollow" class="external text" href="https://www.dw.com/en/german-divers-hand-over-enigma-encryption-machine-in-baltic/a-55829171">"German divers hand over Enigma encryption machine in Baltic | DW | 04.12.2020"</a>. <i>DW.COM</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=DW.COM&rft.atitle=German+divers+hand+over+Enigma+encryption+machine+in+Baltic+%7C+DW+%7C+04.12.2020&rft.aulast=Welle+%28www.dw.com%29&rft.aufirst=Deutsche&rft_id=https%3A%2F%2Fwww.dw.com%2Fen%2Fgerman-divers-hand-over-enigma-encryption-machine-in-baltic%2Fa-55829171&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-80"><span class="mw-cite-backlink"><b><a href="#cite_ref-80">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.parkvojaskezgodovine.si/en/23851/">"Revealing of Enigma in the Park of Military History Pivka"</a>. 13 April 2023.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Revealing+of+Enigma+in+the+Park+of+Military+History+Pivka&rft.date=2023-04-13&rft_id=https%3A%2F%2Fwww.parkvojaskezgodovine.si%2Fen%2F23851%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-81"><span class="mw-cite-backlink"><b><a href="#cite_ref-81">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFerris2005" class="citation book cs1">Ferris, John Robert (2005). <i>Intelligence and strategy : selected essays</i>. Cass series - Studies in intelligence. New York, NY: F. Cass. p. 165. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0415361958" title="Special:BookSources/978-0415361958"><bdi>978-0415361958</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/243558411">243558411</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Intelligence+and+strategy+%3A+selected+essays&rft.place=New+York%2C+NY&rft.series=Cass+series+-+Studies+in+intelligence&rft.pages=165&rft.pub=F.+Cass&rft.date=2005&rft_id=info%3Aoclcnum%2F243558411&rft.isbn=978-0415361958&rft.aulast=Ferris&rft.aufirst=John+Robert&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-royal-82"><span class="mw-cite-backlink">^ <a href="#cite_ref-royal_82-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-royal_82-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGreenberg2014" class="citation book cs1">Greenberg, Joel (2014). <i>Gordon Welchman: Bletchley Park's architect of ultra intelligence</i>. London: Pen & Sword Books Ltd. p. 85. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9781473885257" title="Special:BookSources/9781473885257"><bdi>9781473885257</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/1023312315">1023312315</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Gordon+Welchman%3A+Bletchley+Park%27s+architect+of+ultra+intelligence&rft.place=London&rft.pages=85&rft.pub=Pen+%26+Sword+Books+Ltd&rft.date=2014&rft_id=info%3Aoclcnum%2F1023312315&rft.isbn=9781473885257&rft.aulast=Greenberg&rft.aufirst=Joel&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-LeeuwBergstra2007-83"><span class="mw-cite-backlink"><b><a href="#cite_ref-LeeuwBergstra2007_83-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKarl_Maria_Michael_de_LeeuwJan_Bergstra2007" class="citation book cs1">Karl Maria Michael de Leeuw; Jan Bergstra (28 August 2007). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=pQBrsonDp6cC&pg=PA407"><i>The History of Information Security: A Comprehensive Handbook</i></a>. Elsevier Science. pp. 407–. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-08-055058-9" title="Special:BookSources/978-0-08-055058-9"><bdi>978-0-08-055058-9</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+History+of+Information+Security%3A+A+Comprehensive+Handbook&rft.pages=407-&rft.pub=Elsevier+Science&rft.date=2007-08-28&rft.isbn=978-0-08-055058-9&rft.au=Karl+Maria+Michael+de+Leeuw&rft.au=Jan+Bergstra&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DpQBrsonDp6cC%26pg%3DPA407&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-84"><span class="mw-cite-backlink"><b><a href="#cite_ref-84">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMucklow2015" class="citation book cs1">Mucklow, Timothy (2015). <a rel="nofollow" class="external text" href="https://www.nsa.gov/Portals/70/documents/about/cryptologic-heritage/historical-figures-publications/publications/technology/The_SIGABA_ECM_Cipher_Machine_A_Beautiful_Idea3.pdf"><i>The SIGABA / ECM II Cipher Machine: "A Beautiful Idea</i></a> <span class="cs1-format">(PDF)</span>. Fort George G. Meade, MD: Center for Cryptologic History, NSA. p. 16.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+SIGABA+%2F+ECM+II+Cipher+Machine%3A+%22A+Beautiful+Idea&rft.place=Fort+George+G.+Meade%2C+MD&rft.pages=16&rft.pub=Center+for+Cryptologic+History%2C+NSA&rft.date=2015&rft.aulast=Mucklow&rft.aufirst=Timothy&rft_id=https%3A%2F%2Fwww.nsa.gov%2FPortals%2F70%2Fdocuments%2Fabout%2Fcryptologic-heritage%2Fhistorical-figures-publications%2Fpublications%2Ftechnology%2FThe_SIGABA_ECM_Cipher_Machine_A_Beautiful_Idea3.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-85"><span class="mw-cite-backlink"><b><a href="#cite_ref-85">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBauer2007" class="citation book cs1">Bauer, Friedrich Ludwig (2007). <i>Decrypted secrets: methods and maxims of cryptology</i> (4th revision and extended ed.). Berlin: Springer. p. 133. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9783540245025" title="Special:BookSources/9783540245025"><bdi>9783540245025</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/255507974">255507974</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Decrypted+secrets%3A+methods+and+maxims+of+cryptology&rft.place=Berlin&rft.pages=133&rft.edition=4th+revision+and+extended&rft.pub=Springer&rft.date=2007&rft_id=info%3Aoclcnum%2F255507974&rft.isbn=9783540245025&rft.aulast=Bauer&rft.aufirst=Friedrich+Ludwig&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></span> </li> <li id="cite_note-86"><span class="mw-cite-backlink"><b><a href="#cite_ref-86">^</a></b></span> <span class="reference-text">van Vark, Tatjana <i><a rel="nofollow" class="external text" href="http://www.tatjavanvark.nl/tvv1/pht10.html">The coding machine</a></i></span> </li> </ol></div></div> <div class="mw-heading mw-heading3"><h3 id="General_and_cited_references">General and cited references</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=47" title="Edit section: General and cited references"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239549316">.mw-parser-output .refbegin{margin-bottom:0.5em}.mw-parser-output .refbegin-hanging-indents>ul{margin-left:0}.mw-parser-output .refbegin-hanging-indents>ul>li{margin-left:0;padding-left:3.2em;text-indent:-3.2em}.mw-parser-output .refbegin-hanging-indents ul,.mw-parser-output .refbegin-hanging-indents ul li{list-style:none}@media(max-width:720px){.mw-parser-output .refbegin-hanging-indents>ul>li{padding-left:1.6em;text-indent:-1.6em}}.mw-parser-output .refbegin-columns{margin-top:0.3em}.mw-parser-output .refbegin-columns ul{margin-top:0}.mw-parser-output .refbegin-columns li{page-break-inside:avoid;break-inside:avoid-column}@media screen{.mw-parser-output .refbegin{font-size:90%}}</style><div class="refbegin refbegin-columns references-column-width" style="column-width: 30em"> <ul><li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBauer2000" class="citation book cs1">Bauer, F. L. (2000). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=E-epCAAAQBAJ"><i>Decrypted Secrets</i></a> (2nd ed.). Springer. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-3-540-66871-8" title="Special:BookSources/978-3-540-66871-8"><bdi>978-3-540-66871-8</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Decrypted+Secrets&rft.edition=2nd&rft.pub=Springer&rft.date=2000&rft.isbn=978-3-540-66871-8&rft.aulast=Bauer&rft.aufirst=F.+L.&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DE-epCAAAQBAJ&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFComer2021" class="citation web cs1">Comer, Tony (27 January 2021). <a rel="nofollow" class="external text" href="https://rusi.org/commentary/poland-decisive-role-cracking-enigma-and-transforming-uk-sigint-operations">"Poland's Decisive Role in Cracking Enigma and Transforming the UK's SIGINT Operations"</a>. Commentary. <a href="/wiki/RUSI" class="mw-redirect" title="RUSI">RUSI</a><span class="reference-accessdate">. Retrieved <span class="nowrap">20 April</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Poland%27s+Decisive+Role+in+Cracking+Enigma+and+Transforming+the+UK%27s+SIGINT+Operations&rft.series=Commentary&rft.pub=RUSI&rft.date=2021-01-27&rft.aulast=Comer&rft.aufirst=Tony&rft_id=https%3A%2F%2Frusi.org%2Fcommentary%2Fpoland-decisive-role-cracking-enigma-and-transforming-uk-sigint-operations&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFErskine2006" class="citation journal cs1">Erskine, Ralph (December 2006). "The Poles Reveal their Secrets: Alastair Denniston's Account of the July 1939 Meeting at Pyry". <i>Cryptologia</i>. <b>30</b> (4). Philadelphia, Pennsylvania: 294–305. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F01611190600920944">10.1080/01611190600920944</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:13410460">13410460</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cryptologia&rft.atitle=The+Poles+Reveal+their+Secrets%3A+Alastair+Denniston%27s+Account+of+the+July+1939+Meeting+at+Pyry&rft.volume=30&rft.issue=4&rft.pages=294-305&rft.date=2006-12&rft_id=info%3Adoi%2F10.1080%2F01611190600920944&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A13410460%23id-name%3DS2CID&rft.aulast=Erskine&rft.aufirst=Ralph&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHuttenhainFricke1945" class="citation web cs1">Huttenhain, Orr; Fricke (1945). <a rel="nofollow" class="external text" href="https://drive.google.com/file/d/0B7sNVKDp-yiJOWYxZWFmNDgtODUyMS00Y2FiLThkNWItYmQ5N2JmMzEyMzIz/view">"OKW/Chi Cryptanalytic Research on Enigma, Hagelin and Cipher Teleprinter Messages"</a>. TICOM.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=OKW%2FChi+Cryptanalytic+Research+on+Enigma%2C+Hagelin+and+Cipher+Teleprinter+Messages&rft.pub=TICOM&rft.date=1945&rft.aulast=Huttenhain&rft.aufirst=Orr&rft.au=Fricke&rft_id=https%3A%2F%2Fdrive.google.com%2Ffile%2Fd%2F0B7sNVKDp-yiJOWYxZWFmNDgtODUyMS00Y2FiLThkNWItYmQ5N2JmMzEyMzIz%2Fview&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKahn1991" class="citation book cs1"><a href="/wiki/David_Kahn_(writer)" title="David Kahn (writer)">Kahn, David</a> (1991). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=j1MC2d2LPAcC"><i>Seizing the Enigma: The Race to Break the German U-Boats Codes, 1939–1943</i></a>. Houghton Mifflin Company. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-395-42739-2" title="Special:BookSources/978-0-395-42739-2"><bdi>978-0-395-42739-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Seizing+the+Enigma%3A+The+Race+to+Break+the+German+U-Boats+Codes%2C+1939%E2%80%931943&rft.pub=Houghton+Mifflin+Company&rft.date=1991&rft.isbn=978-0-395-42739-2&rft.aulast=Kahn&rft.aufirst=David&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3Dj1MC2d2LPAcC&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKozaczuk1984" class="citation book cs1"><a href="/wiki/W%C5%82adys%C5%82aw_Kozaczuk" title="Władysław Kozaczuk">Kozaczuk, Władysław</a> (1984). <a href="/wiki/Christopher_Kasparek" title="Christopher Kasparek">Kasparek, Christopher</a> (ed.). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=5hJnAAAAMAAJ"><i>Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two</i></a>. Frederick, MD: University Publications of America. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-89093-547-7" title="Special:BookSources/978-0-89093-547-7"><bdi>978-0-89093-547-7</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Enigma%3A+How+the+German+Machine+Cipher+Was+Broken%2C+and+How+It+Was+Read+by+the+Allies+in+World+War+Two&rft.place=Frederick%2C+MD&rft.pub=University+Publications+of+America&rft.date=1984&rft.isbn=978-0-89093-547-7&rft.aulast=Kozaczuk&rft.aufirst=W%C5%82adys%C5%82aw&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3D5hJnAAAAMAAJ&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKozaczuk" class="citation web cs1"><a href="/wiki/W%C5%82adys%C5%82aw_Kozaczuk" title="Władysław Kozaczuk">Kozaczuk, Władysław</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20030717071218/http://www.enigmahistory.org/text.html">"The origins of the Enigma/ULTRA"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.enigmahistory.org/text.html">the original</a> on 17 July 2003.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+origins+of+the+Enigma%2FULTRA&rft.aulast=Kozaczuk&rft.aufirst=W%C5%82adys%C5%82aw&rft_id=http%3A%2F%2Fwww.enigmahistory.org%2Ftext.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKruhDeavours2002" class="citation journal cs1">Kruh, L.; Deavours, C. (2002). "The Commercial Enigma: Beginnings of Machine Cryptography". <i>Cryptologia</i>. <b>26</b>: 1–16. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F0161-110291890731">10.1080/0161-110291890731</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:41446859">41446859</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cryptologia&rft.atitle=The+Commercial+Enigma%3A+Beginnings+of+Machine+Cryptography&rft.volume=26&rft.pages=1-16&rft.date=2002&rft_id=info%3Adoi%2F10.1080%2F0161-110291890731&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A41446859%23id-name%3DS2CID&rft.aulast=Kruh&rft.aufirst=L.&rft.au=Deavours%2C+C.&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMarks2001" class="citation journal cs1">Marks, Philip (April 2001). "Umkehrwalze D: Enigma's Rewirable Reflector - Part I". <i>Cryptologia</i>. <b>25</b> (2): 101–141. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F0161-110191889842">10.1080/0161-110191889842</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0161-1194">0161-1194</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:11111300">11111300</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cryptologia&rft.atitle=Umkehrwalze+D%3A+Enigma%27s+Rewirable+Reflector+-+Part+I&rft.volume=25&rft.issue=2&rft.pages=101-141&rft.date=2001-04&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A11111300%23id-name%3DS2CID&rft.issn=0161-1194&rft_id=info%3Adoi%2F10.1080%2F0161-110191889842&rft.aulast=Marks&rft.aufirst=Philip&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMarksWeierud2000" class="citation journal cs1">Marks, Philip; Weierud, Frode (2000). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120213152736/http://cryptocellar.web.cern.ch/cryptocellar/pubs/ukwa.pdf">"Recovering the Wiring of Enigma's Umkehrwalze A"</a> <span class="cs1-format">(PDF)</span>. <i>Cryptologia</i>. <b>24</b> (1): 55–66. <a href="/wiki/CiteSeerX_(identifier)" class="mw-redirect" title="CiteSeerX (identifier)">CiteSeerX</a> <span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.622.1584">10.1.1.622.1584</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F0161-110091888781">10.1080/0161-110091888781</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:4473786">4473786</a>. Archived from <a rel="nofollow" class="external text" href="http://cryptocellar.web.cern.ch/cryptocellar/pubs/ukwa.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 13 February 2012.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cryptologia&rft.atitle=Recovering+the+Wiring+of+Enigma%27s+Umkehrwalze+A&rft.volume=24&rft.issue=1&rft.pages=55-66&rft.date=2000&rft_id=https%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fsummary%3Fdoi%3D10.1.1.622.1584%23id-name%3DCiteSeerX&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A4473786%23id-name%3DS2CID&rft_id=info%3Adoi%2F10.1080%2F0161-110091888781&rft.aulast=Marks&rft.aufirst=Philip&rft.au=Weierud%2C+Frode&rft_id=http%3A%2F%2Fcryptocellar.web.cern.ch%2Fcryptocellar%2Fpubs%2Fukwa.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRejewski1980" class="citation journal cs1"><a href="/wiki/Marian_Rejewski" title="Marian Rejewski">Rejewski, Marian</a> (1980). <a rel="nofollow" class="external text" href="https://cryptocellar.org/enigma/files/rew80.pdf">"An Application of the Theory of Permutations in Breaking the Enigma Cipher"</a> <span class="cs1-format">(PDF)</span>. <i>Applicationes Mathematicae</i>. <b>16</b> (4): 543–559. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.4064%2Fam-16-4-543-559">10.4064/am-16-4-543-559</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1730-6280">1730-6280</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Applicationes+Mathematicae&rft.atitle=An+Application+of+the+Theory+of+Permutations+in+Breaking+the+Enigma+Cipher&rft.volume=16&rft.issue=4&rft.pages=543-559&rft.date=1980&rft_id=info%3Adoi%2F10.4064%2Fam-16-4-543-559&rft.issn=1730-6280&rft.aulast=Rejewski&rft.aufirst=Marian&rft_id=https%3A%2F%2Fcryptocellar.org%2Fenigma%2Ffiles%2Frew80.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSmith2000" class="citation book cs1"><a href="/wiki/Michael_Smith_(newspaper_reporter)" title="Michael Smith (newspaper reporter)">Smith, Michael</a> (2000). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=Wv4mSVDtA-wC"><i>Station X: The Codebreakers of Bletchley Park</i></a>. Pan. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-7522-7148-4" title="Special:BookSources/978-0-7522-7148-4"><bdi>978-0-7522-7148-4</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Station+X%3A+The+Codebreakers+of+Bletchley+Park&rft.pub=Pan&rft.date=2000&rft.isbn=978-0-7522-7148-4&rft.aulast=Smith&rft.aufirst=Michael&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DWv4mSVDtA-wC&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSmith2006" class="citation book cs1"><a href="/wiki/Michael_Smith_(newspaper_reporter)" title="Michael Smith (newspaper reporter)">Smith, Michael</a> (2006). "How it began: Bletchley Park Goes to War". In <a href="/wiki/Jack_Copeland" title="Jack Copeland">Copeland, B Jack</a> (ed.). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=e6ocfloTkJ4C"><i>Colossus: The Secrets of Bletchley Park's Codebreaking Computers</i></a>. Oxford: Oxford University Press. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-19-284055-4" title="Special:BookSources/978-0-19-284055-4"><bdi>978-0-19-284055-4</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=How+it+began%3A+Bletchley+Park+Goes+to+War&rft.btitle=Colossus%3A+The+Secrets+of+Bletchley+Park%27s+Codebreaking+Computers&rft.place=Oxford&rft.pub=Oxford+University+Press&rft.date=2006&rft.isbn=978-0-19-284055-4&rft.aulast=Smith&rft.aufirst=Michael&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3De6ocfloTkJ4C&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStripp1993" class="citation book cs1">Stripp, Alan (1993). Hinsley, F. H.; Stripp, Alan (eds.). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=j1MC2d2LPAcC"><i>The Enigma Machine: Its Mechanism and Use</i></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Enigma+Machine%3A+Its+Mechanism+and+Use&rft.date=1993&rft.aulast=Stripp&rft.aufirst=Alan&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3Dj1MC2d2LPAcC&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span> <span class="cs1-visible-error citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_book" title="Template:Cite book">cite book</a>}}</code>: </span><span class="cs1-visible-error citation-comment"><code class="cs1-code">|work=</code> ignored (<a href="/wiki/Help:CS1_errors#periodical_ignored" title="Help:CS1 errors">help</a>)</span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFUlbricht2005" class="citation thesis cs1 cs1-prop-foreign-lang-source">Ulbricht, Heinz (2005). <a rel="nofollow" class="external text" href="http://opus.tu-bs.de/opus/volltexte/2005/705/pdf/enigmadiss.pdf"><i>Die Chiffriermaschine Enigma — Trügerische Sicherheit: Ein Beitrag zur Geschichte der Nachrichtendienste</i></a> [<i>The Enigma Cipher Machine — Deceptive Security: A contribution to the history of intelligence services</i>] <span class="cs1-format">(PDF)</span> (Thesis). PhD Thesis (in German). Universitätsbibliothek Braunschweig. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.24355%2Fdbbs.084-200511080100-324">10.24355/dbbs.084-200511080100-324</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adissertation&rft.title=Die+Chiffriermaschine+Enigma+%E2%80%94+Tr%C3%BCgerische+Sicherheit%3A+Ein+Beitrag+zur+Geschichte+der+Nachrichtendienste&rft.inst=Universit%C3%A4tsbibliothek+Braunschweig&rft.date=2005&rft_id=info%3Adoi%2F10.24355%2Fdbbs.084-200511080100-324&rft.aulast=Ulbricht&rft.aufirst=Heinz&rft_id=http%3A%2F%2Fopus.tu-bs.de%2Fopus%2Fvolltexte%2F2005%2F705%2Fpdf%2Fenigmadiss.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVázquezJiménez–Seral2018" class="citation journal cs1">Vázquez, Manuel; Jiménez–Seral, Paz (4 March 2018). "Recovering the military Enigma using permutations—filling in the details of Rejewski's solution". <i>Cryptologia</i>. <b>42</b> (2): 106–134. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F01611194.2016.1257522">10.1080/01611194.2016.1257522</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:4451333">4451333</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cryptologia&rft.atitle=Recovering+the+military+Enigma+using+permutations%E2%80%94filling+in+the+details+of+Rejewski%27s+solution&rft.volume=42&rft.issue=2&rft.pages=106-134&rft.date=2018-03-04&rft_id=info%3Adoi%2F10.1080%2F01611194.2016.1257522&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A4451333%23id-name%3DS2CID&rft.aulast=V%C3%A1zquez&rft.aufirst=Manuel&rft.au=Jim%C3%A9nez%E2%80%93Seral%2C+Paz&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWelchman1982" class="citation book cs1"><a href="/wiki/Gordon_Welchman" title="Gordon Welchman">Welchman, Gordon</a> (1982). <i>The Hut Six Story: Breaking the Enigma Codes</i>. McGraw-Hill. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-07-069180-3" title="Special:BookSources/978-0-07-069180-3"><bdi>978-0-07-069180-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Hut+Six+Story%3A+Breaking+the+Enigma+Codes&rft.pub=McGraw-Hill&rft.date=1982&rft.isbn=978-0-07-069180-3&rft.aulast=Welchman&rft.aufirst=Gordon&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li></ul> </div> <div class="mw-heading mw-heading2"><h2 id="Further_reading">Further reading</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=48" title="Edit section: Further reading"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239549316"><div class="refbegin refbegin-columns references-column-width" style="column-width: 30em"> <ul><li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAldrich2010" class="citation book cs1">Aldrich, Richard James (2010). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=4I2PmCtrHOgC"><i>GCHQ: The Uncensored Story of Britain's Most Secret Intelligence Agency</i></a>. HarperPress. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-00-727847-3" title="Special:BookSources/978-0-00-727847-3"><bdi>978-0-00-727847-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=GCHQ%3A+The+Uncensored+Story+of+Britain%27s+Most+Secret+Intelligence+Agency&rft.pub=HarperPress&rft.date=2010&rft.isbn=978-0-00-727847-3&rft.aulast=Aldrich&rft.aufirst=Richard+James&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3D4I2PmCtrHOgC&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBertrand1973" class="citation book cs1">Bertrand, Gustave (1973). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=o2UNAAAAIAAJ"><i>Enigma: ou, La plus grande énigme de la guerre 1939–1945</i></a>. Plon.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Enigma%3A+ou%2C+La+plus+grande+%C3%A9nigme+de+la+guerre+1939%E2%80%931945&rft.pub=Plon&rft.date=1973&rft.aulast=Bertrand&rft.aufirst=Gustave&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3Do2UNAAAAIAAJ&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCalvocoressi2001" class="citation book cs1"><a href="/wiki/Peter_Calvocoressi" title="Peter Calvocoressi">Calvocoressi, Peter</a> (2001). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=qxiHPwAACAAJ&pg=PA98"><i>Top Secret Ultra</i></a>. M & M Baldwin. pp. 98–103. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-947712-41-9" title="Special:BookSources/978-0-947712-41-9"><bdi>978-0-947712-41-9</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Top+Secret+Ultra&rft.pages=98-103&rft.pub=M+%26+M+Baldwin&rft.date=2001&rft.isbn=978-0-947712-41-9&rft.aulast=Calvocoressi&rft.aufirst=Peter&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DqxiHPwAACAAJ%26pg%3DPA98&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGrime" class="citation web cs1">Grime, James. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130330065120/http://www.numberphile.com/videos/enigma_flaw.html">"The Enigma Flaw"</a>. <i>Numberphile</i>. <a href="/wiki/Brady_Haran" title="Brady Haran">Brady Haran</a>. Archived from <a rel="nofollow" class="external text" href="http://www.numberphile.com/videos/enigma_flaw.html">the original</a> on 30 March 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">7 April</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Numberphile&rft.atitle=The+Enigma+Flaw&rft.aulast=Grime&rft.aufirst=James&rft_id=http%3A%2F%2Fwww.numberphile.com%2Fvideos%2Fenigma_flaw.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li>Heath, Nick, <a rel="nofollow" class="external text" href="https://www.techrepublic.com/article/the-women-who-helped-crack-nazi-codes-at-bletchley-park">Hacking the Nazis: The secret story of the women who broke Hitler's codes</a> TechRepublic, 27 March 2015</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHerivel2008" class="citation book cs1"><a href="/wiki/John_Herivel" title="John Herivel">Herivel, John</a> (2008). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=voM0QwAACAAJ"><i>Herivelismus: And the German Military Enigma</i></a>. M & M Baldwin.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Herivelismus%3A+And+the+German+Military+Enigma&rft.pub=M+%26+M+Baldwin&rft.date=2008&rft.aulast=Herivel&rft.aufirst=John&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DvoM0QwAACAAJ&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKeen2012" class="citation book cs1">Keen, John (1 August 2012). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=tfq7MQEACAAJ"><i>Harold 'Doc' Keen and the Bletchley Park Bombe</i></a>. M & M Baldwin. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-947712-48-8" title="Special:BookSources/978-0-947712-48-8"><bdi>978-0-947712-48-8</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Harold+%27Doc%27+Keen+and+the+Bletchley+Park+Bombe&rft.pub=M+%26+M+Baldwin&rft.date=2012-08-01&rft.isbn=978-0-947712-48-8&rft.aulast=Keen&rft.aufirst=John&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3Dtfq7MQEACAAJ&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLarge2003" class="citation book cs1">Large, Christine (6 October 2003). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=jAkiAQAAIAAJ"><i>Hijacking Enigma: The Insider's Tale</i></a>. Wiley. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-470-86346-6" title="Special:BookSources/978-0-470-86346-6"><bdi>978-0-470-86346-6</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Hijacking+Enigma%3A+The+Insider%27s+Tale&rft.pub=Wiley&rft.date=2003-10-06&rft.isbn=978-0-470-86346-6&rft.aulast=Large&rft.aufirst=Christine&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DjAkiAQAAIAAJ&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li>Marks, Philip. "Umkehrwalze D: Enigma's Rewirable Reflector — Part I", <i>Cryptologia</i> 25(2), April 2001, pp. 101–141.</li> <li>Marks, Philip. "Umkehrwalze D: Enigma's Rewirable Reflector — Part II", <i>Cryptologia</i> 25(3), July 2001, pp. 177–212.</li> <li>Marks, Philip. "Umkehrwalze D: Enigma's Rewirable Reflector — Part III", <i>Cryptologia</i> 25(4), October 2001, pp. 296–310.</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPaillole1985" class="citation book cs1 cs1-prop-foreign-lang-source">Paillole, Paul (1985). <i>Notre espion chez Hitler</i> [<i>Our Spy with Hitler</i>] (in French). Robert Laffont.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Notre+espion+chez+Hitler&rft.pub=Robert+Laffont&rft.date=1985&rft.aulast=Paillole&rft.aufirst=Paul&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPerera,_Tom2010" class="citation book cs1">Perera, Tom (2010). <i>Inside ENIGMA</i>. Bedford, UK: <a href="/wiki/Radio_Society_of_Great_Britain" title="Radio Society of Great Britain">Radio Society of Great Britain</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-905086-64-1" title="Special:BookSources/978-1-905086-64-1"><bdi>978-1-905086-64-1</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Inside+ENIGMA&rft.place=Bedford%2C+UK&rft.pub=Radio+Society+of+Great+Britain&rft.date=2010&rft.isbn=978-1-905086-64-1&rft.au=Perera%2C+Tom&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li>Perera, Tom. <i>The Story of the ENIGMA: History, Technology and Deciphering</i>, 2nd Edition, CD-ROM, 2004, Artifax Books, <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/1-890024-06-6" title="Special:BookSources/1-890024-06-6">1-890024-06-6</a> <a rel="nofollow" class="external text" href="http://w1tp.com/enigma/ecds.htm">sample pages</a></li> <li>Rebecca Ratcliffe: Searching for Security. The German Investigations into Enigma's security. In: Intelligence and National Security 14 (1999) Issue 1 (Special Issue) S. 146–167.</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRatcliffe2005" class="citation book cs1">Ratcliffe, Rebecca (1 January 2005). Winkel, Brian J. (ed.). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=1eVOAAAAMAAJ"><i>How Statistics led the Germans to believe Enigma Secure and Why They Were Wrong: neglecting the practical Mathematics of Cipher machines</i></a>. Artech House. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-58053-996-8" title="Special:BookSources/978-1-58053-996-8"><bdi>978-1-58053-996-8</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=How+Statistics+led+the+Germans+to+believe+Enigma+Secure+and+Why+They+Were+Wrong%3A+neglecting+the+practical+Mathematics+of+Cipher+machines&rft.pub=Artech+House&rft.date=2005-01-01&rft.isbn=978-1-58053-996-8&rft.aulast=Ratcliffe&rft.aufirst=Rebecca&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3D1eVOAAAAMAAJ&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span> <span class="cs1-visible-error citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_book" title="Template:Cite book">cite book</a>}}</code>: </span><span class="cs1-visible-error citation-comment"><code class="cs1-code">|work=</code> ignored (<a href="/wiki/Help:CS1_errors#periodical_ignored" title="Help:CS1 errors">help</a>)</span></li> <li><a href="/wiki/Marian_Rejewski" title="Marian Rejewski">Rejewski, Marian</a>. <a rel="nofollow" class="external text" href="http://chc60.fgcu.edu/images/articles/rejewski.pdf">"How Polish Mathematicians Deciphered the Enigma"</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20111004194534/http://chc60.fgcu.edu/images/articles/rejewski.pdf">Archived</a> 4 October 2011 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, <i>Annals of the History of Computing 3</i>, 1981. This article is regarded by <a href="/wiki/Andrew_Hodges" title="Andrew Hodges">Andrew Hodges</a>, Alan Turing's biographer, as "the definitive account" (see Hodges' <i><a href="/wiki/Alan_Turing:_The_Enigma" title="Alan Turing: The Enigma">Alan Turing: The Enigma</a></i>, Walker and Company, 2000 paperback edition, p. 548, footnote 4.5).</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFQuirantes2004" class="citation journal cs1">Quirantes, Arturo (April 2004). "Model Z: A Numbers-Only Enigma Version". <i>Cryptologia</i>. <b>28</b> (2): 153–156. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F0161-110491892845">10.1080/0161-110491892845</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:44319455">44319455</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cryptologia&rft.atitle=Model+Z%3A+A+Numbers-Only+Enigma+Version&rft.volume=28&rft.issue=2&rft.pages=153-156&rft.date=2004-04&rft_id=info%3Adoi%2F10.1080%2F0161-110491892845&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A44319455%23id-name%3DS2CID&rft.aulast=Quirantes&rft.aufirst=Arturo&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSebag-Montefiore2011" class="citation book cs1"><a href="/wiki/Hugh_Sebag-Montefiore" title="Hugh Sebag-Montefiore">Sebag-Montefiore, Hugh</a> (2011). <i>Enigma: The Battle for the Code</i>. Orion. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-78022-123-6" title="Special:BookSources/978-1-78022-123-6"><bdi>978-1-78022-123-6</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Enigma%3A+The+Battle+for+the+Code&rft.pub=Orion&rft.date=2011&rft.isbn=978-1-78022-123-6&rft.aulast=Sebag-Montefiore&rft.aufirst=Hugh&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li>Ulbricht, Heinz. Enigma Uhr, <i>Cryptologia</i>, 23(3), April 1999, pp. 194–205.</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTuring2018" class="citation book cs1"><a href="/wiki/Dermot_Turing" title="Dermot Turing">Turing, Dermot</a> (2018). <i><a href="/wiki/X,_Y_%26_Z:_The_Real_Story_of_How_Enigma_Was_Broken" class="mw-redirect" title="X, Y & Z: The Real Story of How Enigma Was Broken">X, Y & Z: The Real Story of How Enigma Was Broken</a></i>. Gloustershire England: History Press. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-7509-8782-0" title="Special:BookSources/978-0-7509-8782-0"><bdi>978-0-7509-8782-0</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/1029570490">1029570490</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=X%2C+Y+%26+Z%3A+The+Real+Story+of+How+Enigma+Was+Broken&rft.place=Gloustershire+England&rft.pub=History+Press&rft.date=2018&rft_id=info%3Aoclcnum%2F1029570490&rft.isbn=978-0-7509-8782-0&rft.aulast=Turing&rft.aufirst=Dermot&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWinterbotham1999" class="citation book cs1">Winterbotham, F. W. (1999). <i>The Ultra Secret</i>. Weidenfeld & Nicolson. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-297-64405-7" title="Special:BookSources/978-0-297-64405-7"><bdi>978-0-297-64405-7</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Ultra+Secret&rft.pub=Weidenfeld+%26+Nicolson&rft.date=1999&rft.isbn=978-0-297-64405-7&rft.aulast=Winterbotham&rft.aufirst=F.+W.&rfr_id=info%3Asid%2Fen.wikipedia.org%3AEnigma+machine" class="Z3988"></span></li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20051118083351/http://news.mod.uk/news/press/news_headline_story.asp?newsItem_id=3339">Untold Story of Enigma Code-Breaker — The Ministry of Defence (U.K.) </a></li></ul> </div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Enigma_machine&action=edit&section=49" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1235681985">.mw-parser-output .side-box{margin:4px 0;box-sizing:border-box;border:1px solid #aaa;font-size:88%;line-height:1.25em;background-color:var(--background-color-interactive-subtle,#f8f9fa);display:flow-root}.mw-parser-output .side-box-abovebelow,.mw-parser-output .side-box-text{padding:0.25em 0.9em}.mw-parser-output .side-box-image{padding:2px 0 2px 0.9em;text-align:center}.mw-parser-output .side-box-imageright{padding:2px 0.9em 2px 0;text-align:center}@media(min-width:500px){.mw-parser-output .side-box-flex{display:flex;align-items:center}.mw-parser-output .side-box-text{flex:1;min-width:0}}@media(min-width:720px){.mw-parser-output .side-box{width:238px}.mw-parser-output .side-box-right{clear:right;float:right;margin-left:1em}.mw-parser-output .side-box-left{margin-right:1em}}</style><style data-mw-deduplicate="TemplateStyles:r1237033735">@media print{body.ns-0 .mw-parser-output .sistersitebox{display:none!important}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}</style><div class="side-box side-box-right plainlinks sistersitebox"><style data-mw-deduplicate="TemplateStyles:r1126788409">.mw-parser-output .plainlist ol,.mw-parser-output .plainlist ul{line-height:inherit;list-style:none;margin:0;padding:0}.mw-parser-output .plainlist ol li,.mw-parser-output .plainlist ul li{margin-bottom:0}</style> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/30px-Commons-logo.svg.png" decoding="async" width="30" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/45px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/59px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></span></span></div> <div class="side-box-text plainlist">Wikimedia Commons has media related to <span style="font-weight: bold; font-style: italic;"><a href="https://commons.wikimedia.org/wiki/Category:Enigma_machine" class="extiw" title="commons:Category:Enigma machine">Enigma machine</a></span>.</div></div> </div> <ul><li><a rel="nofollow" class="external text" href="https://www.bbc.com/news/magazine-28167071">Gordon Corera, Poland's overlooked Enigma codebreakers, BBC News Magazine, 4 July 2014</a></li> <li><a rel="nofollow" class="external text" href="http://enigmadisplays.blogspot.ca/">Long-running list of places with Enigma machines on display</a></li> <li><a rel="nofollow" class="external text" href="http://www.bletchleypark.org.uk/">Bletchley Park National Code Centre Home of the British codebreakers during the Second World War</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20091209184137/http://www.bletchleypark.org.uk/">Archived</a> 9 December 2009 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></li> <li><a rel="nofollow" class="external text" href="http://www.cryptomuseum.com/crypto/enigma/">Enigma machines on the Crypto Museum Web site</a></li> <li><a rel="nofollow" class="external text" href="http://cnm.open.ac.uk/projects/stationx/enigma/index.html">Pictures of a four-rotor naval enigma, including Flash (SWF) views of the machine</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110724015209/http://cnm.open.ac.uk/projects/stationx/enigma/index.html">Archived</a> 24 July 2011 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></li> <li><a rel="nofollow" class="external text" href="http://www.cgisecurity.net/2008/04/getting-to-see-an-enigma-machine-at-rsa-2008-.html">Enigma Pictures and Demonstration by NSA Employee at RSA</a></li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130426233328/http://www.wwiiarchives.net/servlet/action/document/index/97/0">Kenngruppenheft</a></li> <li><a rel="nofollow" class="external text" href="http://www.enigma-maschine.de/en/">Process of building an Enigma M4 replica</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130318013252/http://www.enigma-maschine.de/en/">Archived</a> 18 March 2013 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></li> <li><a rel="nofollow" class="external text" href="http://www.enigma.hoerenberg.com/">Breaking German Navy Ciphers</a></li></ul> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"></div><div role="navigation" class="navbox" aria-label="Navbox" style="padding:3px"><table class="nowraplinks hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Cryptography_classical" title="Template:Cryptography classical"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Cryptography_classical" title="Template talk:Cryptography classical"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Cryptography_classical" title="Special:EditPage/Template:Cryptography classical"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Classical_cryptography" style="font-size:114%;margin:0 4em"><a href="/wiki/Classical_cipher" title="Classical cipher">Classical cryptography</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Cipher" title="Cipher">Ciphers</a><br />by family</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Polyalphabetic_cipher" title="Polyalphabetic cipher">Polyalphabetic</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Alberti_cipher" title="Alberti cipher">Alberti</a></li> <li><a class="mw-selflink selflink">Enigma</a></li> <li><a href="/wiki/Trithemius_cipher" class="mw-redirect" title="Trithemius cipher">Trithemius</a></li> <li><a href="/wiki/Vigen%C3%A8re_cipher" title="Vigenère cipher">Vigenère</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Polybius_square" title="Polybius square">Polybius square</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/ADFGVX_cipher" title="ADFGVX cipher">ADFGVX</a></li> <li><a href="/wiki/Bifid_cipher" title="Bifid cipher">Bifid</a></li> <li><a href="/wiki/Nihilist_cipher" title="Nihilist cipher">Nihilist</a></li> <li><a href="/wiki/Tap_code" title="Tap code">Tap code</a></li> <li><a href="/wiki/Trifid_cipher" title="Trifid cipher">Trifid</a></li> <li><a href="/wiki/VIC_cipher" title="VIC cipher">VIC cipher</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;">Square</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Playfair_cipher" title="Playfair cipher">Playfair</a></li> <li><a href="/wiki/Two-square_cipher" title="Two-square cipher">Two-square</a></li> <li><a href="/wiki/Four-square_cipher" title="Four-square cipher">Four-square</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Substitution_cipher" title="Substitution cipher">Substitution</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Affine_cipher" title="Affine cipher">Affine</a></li> <li><a href="/wiki/Atbash" title="Atbash">Atbash</a></li> <li><a href="/wiki/Autokey_cipher" title="Autokey cipher">Autokey</a></li> <li><a href="/wiki/Beaufort_cipher" title="Beaufort cipher">Beaufort</a></li> <li><a href="/wiki/Caesar_cipher" title="Caesar cipher">Caesar</a></li> <li><a href="/wiki/Chaocipher" title="Chaocipher">Chaocipher</a></li> <li><a href="/wiki/Great_Cipher" title="Great Cipher">Great</a></li> <li><a href="/wiki/Hill_cipher" title="Hill cipher">Hill</a></li> <li><a href="/wiki/Pigpen_cipher" title="Pigpen cipher">Pigpen</a></li> <li><a href="/wiki/ROT13" title="ROT13">ROT13</a></li> <li><a href="/wiki/Running_key_cipher" title="Running key cipher">Running key</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Transposition_cipher" title="Transposition cipher">Transposition</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Transposition_cipher#Columnar_transposition" title="Transposition cipher">Columnar</a></li> <li><a href="/wiki/Transposition_cipher#Double_transposition" title="Transposition cipher">Double</a></li> <li><a href="/wiki/Transposition_cipher#Myszkowski_transposition" title="Transposition cipher">Myszkowski</a></li> <li><a href="/wiki/Rail_fence_cipher" title="Rail fence cipher">Rail fence</a></li> <li><a href="/wiki/Transposition_cipher#Route_cipher" title="Transposition cipher">Route</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;">Other</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/BATCO" title="BATCO">BATCO</a></li> <li><a href="/wiki/DRYAD" title="DRYAD">DRYAD</a></li> <li><a href="/wiki/Mlecchita_vikalpa" title="Mlecchita vikalpa">Kama Sutra</a></li> <li><a href="/wiki/One-time_pad" title="One-time pad">One-time pad</a></li> <li><a href="/wiki/Rasterschl%C3%BCssel_44" title="Rasterschlüssel 44">Rasterschlüssel 44</a></li> <li><a href="/wiki/Reihenschieber" title="Reihenschieber">Reihenschieber</a></li> <li><a href="/wiki/Reservehandverfahren" title="Reservehandverfahren">Reservehandverfahren</a></li> <li><a href="/wiki/Slidex" title="Slidex">Slidex</a></li> <li><a href="/wiki/Solitaire_(cipher)" title="Solitaire (cipher)">Solitaire</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Code_(cryptography)" title="Code (cryptography)">Codes</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Book_cipher" title="Book cipher">Book</a></li> <li><a href="/wiki/Code_talker" title="Code talker">Code talker</a></li> <li><a href="/wiki/Poem_code" title="Poem code">Poem</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Steganography" title="Steganography">Steganography</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Bacon%27s_cipher" title="Bacon's cipher">Bacon</a></li> <li><a href="/wiki/Grille_(cryptography)" title="Grille (cryptography)">Grille</a></li> <li><a href="/wiki/Null_cipher" title="Null cipher">Null</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Cryptanalysis</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Cryptogram" title="Cryptogram">Cryptogram</a></li> <li><a href="/wiki/Frequency_analysis" title="Frequency analysis">Frequency analysis</a></li> <li><a href="/wiki/Index_of_coincidence" title="Index of coincidence">Index of coincidence</a> (Units: <a href="/wiki/Hartley_(unit)" title="Hartley (unit)">Ban</a> and <a href="/wiki/Nat_(unit)" title="Nat (unit)">Nat</a>)</li> <li><a href="/wiki/Information_leakage" title="Information leakage">Information leakage</a></li> <li><a href="/wiki/Kasiski_examination" title="Kasiski examination">Kasiski examination</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr></tbody></table><div></div></td></tr><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks mw-collapsible mw-collapsed navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Cryptography_navbox" title="Template:Cryptography navbox"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Cryptography_navbox" title="Template talk:Cryptography navbox"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Cryptography_navbox" title="Special:EditPage/Template:Cryptography navbox"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Cryptography" style="font-size:114%;margin:0 4em"><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">General</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/History_of_cryptography" title="History of cryptography">History of cryptography</a></li> <li><a href="/wiki/Outline_of_cryptography" title="Outline of cryptography">Outline of cryptography</a></li> <li><a href="/wiki/Classical_cipher" title="Classical cipher">Classical cipher</a></li> <li><a href="/wiki/Cryptographic_protocol" title="Cryptographic protocol">Cryptographic protocol</a> <ul><li><a href="/wiki/Authentication_protocol" title="Authentication protocol">Authentication protocol</a></li></ul></li> <li><a href="/wiki/Cryptographic_primitive" title="Cryptographic primitive">Cryptographic primitive</a></li> <li><a href="/wiki/Cryptanalysis" title="Cryptanalysis">Cryptanalysis</a></li> <li><a href="/wiki/Cryptocurrency" title="Cryptocurrency">Cryptocurrency</a></li> <li><a href="/wiki/Cryptosystem" title="Cryptosystem">Cryptosystem</a></li> <li><a href="/wiki/Cryptographic_nonce" title="Cryptographic nonce">Cryptographic nonce</a></li> <li><a href="/wiki/Cryptovirology" title="Cryptovirology">Cryptovirology</a></li> <li><a href="/wiki/Hash_function" title="Hash function">Hash function</a> <ul><li><a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">Cryptographic hash function</a></li> <li><a href="/wiki/Key_derivation_function" title="Key derivation function">Key derivation function</a></li> <li><a href="/wiki/Secure_Hash_Algorithms" title="Secure Hash Algorithms">Secure Hash Algorithms</a></li></ul></li> <li><a href="/wiki/Digital_signature" title="Digital signature">Digital signature</a></li> <li><a href="/wiki/Kleptography" title="Kleptography">Kleptography</a></li> <li><a href="/wiki/Key_(cryptography)" title="Key (cryptography)">Key (cryptography)</a></li> <li><a href="/wiki/Key_exchange" title="Key exchange">Key exchange</a></li> <li><a href="/wiki/Key_generator" title="Key generator">Key generator</a></li> <li><a href="/wiki/Key_schedule" title="Key schedule">Key schedule</a></li> <li><a href="/wiki/Key_stretching" title="Key stretching">Key stretching</a></li> <li><a href="/wiki/Keygen" title="Keygen">Keygen</a></li> <li><a href="/wiki/Template:Cryptography_machines" title="Template:Cryptography machines">Machines</a></li> <li><a href="/wiki/Cryptojacking_malware" class="mw-redirect" title="Cryptojacking malware">Cryptojacking malware</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Random_number_generation" title="Random number generation">Random number generation</a> <ul><li><a href="/wiki/Cryptographically_secure_pseudorandom_number_generator" title="Cryptographically secure pseudorandom number generator">Cryptographically secure pseudorandom number generator</a> (CSPRNG)</li></ul></li> <li><a href="/wiki/Pseudorandom_noise" title="Pseudorandom noise">Pseudorandom noise</a> (PRN)</li> <li><a href="/wiki/Secure_channel" title="Secure channel">Secure channel</a></li> <li><a href="/wiki/Insecure_channel" class="mw-redirect" title="Insecure channel">Insecure channel</a></li> <li><a href="/wiki/Subliminal_channel" title="Subliminal channel">Subliminal channel</a></li> <li><a href="/wiki/Encryption" title="Encryption">Encryption</a></li> <li><a href="/wiki/Decryption" class="mw-redirect" title="Decryption">Decryption</a></li> <li><a href="/wiki/End-to-end_encryption" title="End-to-end encryption">End-to-end encryption</a></li> <li><a href="/wiki/Harvest_now,_decrypt_later" title="Harvest now, decrypt later">Harvest now, decrypt later</a></li> <li><a href="/wiki/Information-theoretic_security" title="Information-theoretic security">Information-theoretic security</a></li> <li><a href="/wiki/Plaintext" title="Plaintext">Plaintext</a></li> <li><a href="/wiki/Codetext" class="mw-redirect" title="Codetext">Codetext</a></li> <li><a href="/wiki/Ciphertext" title="Ciphertext">Ciphertext</a></li> <li><a href="/wiki/Shared_secret" title="Shared secret">Shared secret</a></li> <li><a href="/wiki/Trapdoor_function" title="Trapdoor function">Trapdoor function</a></li> <li><a href="/wiki/Trusted_timestamping" title="Trusted timestamping">Trusted timestamping</a></li> <li><a href="/wiki/Key-based_routing" title="Key-based routing">Key-based routing</a></li> <li><a href="/wiki/Onion_routing" title="Onion routing">Onion routing</a></li> <li><a href="/wiki/Garlic_routing" title="Garlic routing">Garlic routing</a></li> <li><a href="/wiki/Kademlia" title="Kademlia">Kademlia</a></li> <li><a href="/wiki/Mix_network" title="Mix network">Mix network</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Mathematics</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">Cryptographic hash function</a></li> <li><a href="/wiki/Block_cipher" title="Block cipher">Block cipher</a></li> <li><a href="/wiki/Stream_cipher" title="Stream cipher">Stream cipher</a></li> <li><a href="/wiki/Symmetric-key_algorithm" title="Symmetric-key algorithm">Symmetric-key algorithm</a></li> <li><a href="/wiki/Authenticated_encryption" title="Authenticated encryption">Authenticated encryption</a></li> <li><a href="/wiki/Public-key_cryptography" title="Public-key cryptography">Public-key cryptography</a></li> <li><a href="/wiki/Quantum_key_distribution" title="Quantum key distribution">Quantum key distribution</a></li> <li><a href="/wiki/Quantum_cryptography" title="Quantum cryptography">Quantum cryptography</a></li> <li><a href="/wiki/Post-quantum_cryptography" title="Post-quantum cryptography">Post-quantum cryptography</a></li> <li><a href="/wiki/Message_authentication_code" title="Message authentication code">Message authentication code</a></li> <li><a href="/wiki/Cryptographically_secure_pseudorandom_number_generator" title="Cryptographically secure pseudorandom number generator">Random numbers</a></li> <li><a href="/wiki/Steganography" title="Steganography">Steganography</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><span class="noviewer" typeof="mw:File"><span title="Category"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/16px-Symbol_category_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/23px-Symbol_category_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/31px-Symbol_category_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <a href="/wiki/Category:Cryptography" title="Category:Cryptography">Category</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"></div><div role="navigation" class="navbox" aria-label="Navbox" style="padding:3px"><table class="nowraplinks hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Cryptography_machines" title="Template:Cryptography machines"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Cryptography_machines" title="Template talk:Cryptography machines"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Cryptography_machines" title="Special:EditPage/Template:Cryptography machines"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Cipher_machines" style="font-size:114%;margin:0 4em">Cipher machines</div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Rotor_machine" title="Rotor machine">Rotor machines</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Combined_Cipher_Machine" title="Combined Cipher Machine">CCM</a></li> <li><a class="mw-selflink selflink">Enigma</a></li> <li><a href="/wiki/Fialka" title="Fialka">M-125 Fialka</a></li> <li><a href="/wiki/Hebern_rotor_machine" title="Hebern rotor machine">Hebern</a></li> <li><a href="/wiki/HX-63" title="HX-63">HX-63</a></li> <li><a href="/wiki/KL-7" title="KL-7">KL-7</a></li> <li><a href="/wiki/Lacida" title="Lacida">Lacida</a></li> <li><a href="/wiki/M-325" title="M-325">M-325</a></li> <li><a href="/wiki/Mercury_(cipher_machine)" title="Mercury (cipher machine)">Mercury</a></li> <li><a href="/wiki/NEMA_(machine)" title="NEMA (machine)">NEMA</a></li> <li><a href="/wiki/OMI_cryptograph" title="OMI cryptograph">OMI</a></li> <li><a href="/wiki/Red_(cipher_machine)" class="mw-redirect" title="Red (cipher machine)">RED</a></li> <li><a href="/wiki/Schl%C3%BCsselger%C3%A4t_39" title="Schlüsselgerät 39">SG-39</a></li> <li><a href="/wiki/Schl%C3%BCsselger%C3%A4t_41" title="Schlüsselgerät 41">SG-41</a></li> <li><a href="/wiki/SIGABA" title="SIGABA">SIGABA</a></li> <li><a href="/wiki/SIGCUM" title="SIGCUM">SIGCUM</a></li> <li><a href="/wiki/BID/60" title="BID/60">Singlet</a></li> <li><a href="/wiki/Typex" title="Typex">Typex</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Mechanical</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Jefferson_disk" title="Jefferson disk">Bazeries cylinder</a></li> <li><a href="/wiki/C-36_(cipher_machine)" title="C-36 (cipher machine)">C-36</a></li> <li><a href="/wiki/C-52_(cipher_machine)" title="C-52 (cipher machine)">C-52</a></li> <li><a href="/wiki/CD-57" title="CD-57">CD-57</a></li> <li><a href="/wiki/Cipher_disk" title="Cipher disk">Cipher disk</a></li> <li><a href="/wiki/HC-9" title="HC-9">HC-9</a></li> <li><a href="/wiki/Kryha" title="Kryha">Kryha</a></li> <li><a href="/wiki/Jefferson_disk" title="Jefferson disk">Jefferson disk</a></li> <li><a href="/wiki/M-94" title="M-94">M-94</a></li> <li><a href="/wiki/M-209" title="M-209">M-209</a></li> <li><a href="/wiki/Reihenschieber" title="Reihenschieber">Reihenschieber</a></li> <li><a href="/wiki/Scytale" title="Scytale">Scytale</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Teleprinter</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/5-UCO" title="5-UCO">5-UCO</a></li> <li><a href="/wiki/BID_770" title="BID 770">BID 770</a></li> <li><a href="/wiki/DUDEK" title="DUDEK">DUDEK</a></li> <li><a href="/wiki/KW-26" title="KW-26">KW-26</a></li> <li><a href="/wiki/KW-37" title="KW-37">KW-37</a></li> <li><a href="/wiki/Lorenz_cipher" title="Lorenz cipher">Lorenz SZ 40/42</a></li> <li><a href="/wiki/Siemens_and_Halske_T52" title="Siemens and Halske T52">Siemens and Halske T52</a></li> <li><a href="/wiki/SIGTOT" title="SIGTOT">SIGTOT</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Secure_voice" title="Secure voice">Secure voice</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/BID_150" title="BID 150">BID 150</a></li> <li><a href="/wiki/FASCINATOR" title="FASCINATOR">FASCINATOR</a></li> <li><a href="/wiki/KY-3" title="KY-3">KY-3</a></li> <li><a href="/wiki/KY-58" title="KY-58">KY-58</a></li> <li><a href="/wiki/KY-68" title="KY-68">KY-68</a></li> <li><a href="/wiki/NESTOR_(encryption)" title="NESTOR (encryption)">NESTOR</a></li> <li><a href="/wiki/OMNI_(SCIP)" class="mw-redirect" title="OMNI (SCIP)">OMNI</a></li> <li><a href="/wiki/Secure_Communications_Interoperability_Protocol" title="Secure Communications Interoperability Protocol">SCIP</a></li> <li><a href="/wiki/Sect%C3%A9ra_Secure_Module" title="Sectéra Secure Module">Sectéra Secure Module</a></li> <li><a href="/wiki/SIGSALY" title="SIGSALY">SIGSALY</a></li> <li><a href="/wiki/Secure_Terminal_Equipment" title="Secure Terminal Equipment">STE</a></li> <li><a href="/wiki/STU-II" title="STU-II">STU-II</a></li> <li><a href="/wiki/STU-III" title="STU-III">STU-III</a></li> <li><a href="/wiki/VINSON" title="VINSON">VINSON</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Other</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/JADE_(cipher_machine)" title="JADE (cipher machine)">JADE</a></li> <li><a href="/wiki/KG-84" title="KG-84">KG-84</a></li> <li><a href="/wiki/KL-43" title="KL-43">KL-43</a></li> <li><a href="/wiki/KL-51" title="KL-51">KL-51</a></li> <li><a href="/wiki/Noreen" title="Noreen">Noreen</a></li> <li><a href="/wiki/Type_A_Cipher_Machine" title="Type A Cipher Machine">Red</a></li> <li><a href="/wiki/Type_B_Cipher_Machine" title="Type B Cipher Machine">Purple</a></li> <li><a href="/wiki/Pinwheel_(cryptography)" title="Pinwheel (cryptography)">Pinwheel</a></li> <li><a href="/wiki/Rockex" title="Rockex">Rockex</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Hardware-based_encryption" title="Hardware-based encryption">Computer hardware</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/AES_instruction_set" title="AES instruction set">AES instruction set</a></li> <li><a href="/wiki/Intel_SHA_extensions" title="Intel SHA extensions">Intel SHA extensions</a></li> <li><a href="/wiki/IBM_4758" title="IBM 4758">IBM 4758</a></li> <li><a href="/wiki/IBM_4764" title="IBM 4764">IBM 4764</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr></tbody></table><div></div></td></tr><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks mw-collapsible mw-collapsed navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Cryptography_navbox" title="Template:Cryptography navbox"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Cryptography_navbox" title="Template talk:Cryptography navbox"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Cryptography_navbox" title="Special:EditPage/Template:Cryptography navbox"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Cryptography" style="font-size:114%;margin:0 4em"><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">General</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/History_of_cryptography" title="History of cryptography">History of cryptography</a></li> <li><a href="/wiki/Outline_of_cryptography" title="Outline of cryptography">Outline of cryptography</a></li> <li><a href="/wiki/Classical_cipher" title="Classical cipher">Classical cipher</a></li> <li><a href="/wiki/Cryptographic_protocol" title="Cryptographic protocol">Cryptographic protocol</a> <ul><li><a href="/wiki/Authentication_protocol" title="Authentication protocol">Authentication protocol</a></li></ul></li> <li><a href="/wiki/Cryptographic_primitive" title="Cryptographic primitive">Cryptographic primitive</a></li> <li><a href="/wiki/Cryptanalysis" title="Cryptanalysis">Cryptanalysis</a></li> <li><a href="/wiki/Cryptocurrency" title="Cryptocurrency">Cryptocurrency</a></li> <li><a href="/wiki/Cryptosystem" title="Cryptosystem">Cryptosystem</a></li> <li><a href="/wiki/Cryptographic_nonce" title="Cryptographic nonce">Cryptographic nonce</a></li> <li><a href="/wiki/Cryptovirology" title="Cryptovirology">Cryptovirology</a></li> <li><a href="/wiki/Hash_function" title="Hash function">Hash function</a> <ul><li><a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">Cryptographic hash function</a></li> <li><a href="/wiki/Key_derivation_function" title="Key derivation function">Key derivation function</a></li> <li><a href="/wiki/Secure_Hash_Algorithms" title="Secure Hash Algorithms">Secure Hash Algorithms</a></li></ul></li> <li><a href="/wiki/Digital_signature" title="Digital signature">Digital signature</a></li> <li><a href="/wiki/Kleptography" title="Kleptography">Kleptography</a></li> <li><a href="/wiki/Key_(cryptography)" title="Key (cryptography)">Key (cryptography)</a></li> <li><a href="/wiki/Key_exchange" title="Key exchange">Key exchange</a></li> <li><a href="/wiki/Key_generator" title="Key generator">Key generator</a></li> <li><a href="/wiki/Key_schedule" title="Key schedule">Key schedule</a></li> <li><a href="/wiki/Key_stretching" title="Key stretching">Key stretching</a></li> <li><a href="/wiki/Keygen" title="Keygen">Keygen</a></li> <li><a href="/wiki/Template:Cryptography_machines" title="Template:Cryptography machines">Machines</a></li> <li><a href="/wiki/Cryptojacking_malware" class="mw-redirect" title="Cryptojacking malware">Cryptojacking malware</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Random_number_generation" title="Random number generation">Random number generation</a> <ul><li><a href="/wiki/Cryptographically_secure_pseudorandom_number_generator" title="Cryptographically secure pseudorandom number generator">Cryptographically secure pseudorandom number generator</a> (CSPRNG)</li></ul></li> <li><a href="/wiki/Pseudorandom_noise" title="Pseudorandom noise">Pseudorandom noise</a> (PRN)</li> <li><a href="/wiki/Secure_channel" title="Secure channel">Secure channel</a></li> <li><a href="/wiki/Insecure_channel" class="mw-redirect" title="Insecure channel">Insecure channel</a></li> <li><a href="/wiki/Subliminal_channel" title="Subliminal channel">Subliminal channel</a></li> <li><a href="/wiki/Encryption" title="Encryption">Encryption</a></li> <li><a href="/wiki/Decryption" class="mw-redirect" title="Decryption">Decryption</a></li> <li><a href="/wiki/End-to-end_encryption" title="End-to-end encryption">End-to-end encryption</a></li> <li><a href="/wiki/Harvest_now,_decrypt_later" title="Harvest now, decrypt later">Harvest now, decrypt later</a></li> <li><a href="/wiki/Information-theoretic_security" title="Information-theoretic security">Information-theoretic security</a></li> <li><a href="/wiki/Plaintext" title="Plaintext">Plaintext</a></li> <li><a href="/wiki/Codetext" class="mw-redirect" title="Codetext">Codetext</a></li> <li><a href="/wiki/Ciphertext" title="Ciphertext">Ciphertext</a></li> <li><a href="/wiki/Shared_secret" title="Shared secret">Shared secret</a></li> <li><a href="/wiki/Trapdoor_function" title="Trapdoor function">Trapdoor function</a></li> <li><a href="/wiki/Trusted_timestamping" title="Trusted timestamping">Trusted timestamping</a></li> <li><a href="/wiki/Key-based_routing" title="Key-based routing">Key-based routing</a></li> <li><a href="/wiki/Onion_routing" title="Onion routing">Onion routing</a></li> <li><a href="/wiki/Garlic_routing" title="Garlic routing">Garlic routing</a></li> <li><a href="/wiki/Kademlia" title="Kademlia">Kademlia</a></li> <li><a href="/wiki/Mix_network" title="Mix network">Mix network</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Mathematics</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">Cryptographic hash function</a></li> <li><a href="/wiki/Block_cipher" title="Block cipher">Block cipher</a></li> <li><a href="/wiki/Stream_cipher" title="Stream cipher">Stream cipher</a></li> <li><a href="/wiki/Symmetric-key_algorithm" title="Symmetric-key algorithm">Symmetric-key algorithm</a></li> <li><a href="/wiki/Authenticated_encryption" title="Authenticated encryption">Authenticated encryption</a></li> <li><a href="/wiki/Public-key_cryptography" title="Public-key cryptography">Public-key cryptography</a></li> <li><a href="/wiki/Quantum_key_distribution" title="Quantum key distribution">Quantum key distribution</a></li> <li><a href="/wiki/Quantum_cryptography" title="Quantum cryptography">Quantum cryptography</a></li> <li><a href="/wiki/Post-quantum_cryptography" title="Post-quantum cryptography">Post-quantum cryptography</a></li> <li><a href="/wiki/Message_authentication_code" title="Message authentication code">Message authentication code</a></li> <li><a href="/wiki/Cryptographically_secure_pseudorandom_number_generator" title="Cryptographically secure pseudorandom number generator">Random numbers</a></li> <li><a href="/wiki/Steganography" title="Steganography">Steganography</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><span class="noviewer" typeof="mw:File"><span title="Category"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/16px-Symbol_category_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/23px-Symbol_category_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/31px-Symbol_category_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <a href="/wiki/Category:Cryptography" title="Category:Cryptography">Category</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"><style data-mw-deduplicate="TemplateStyles:r1038841319">.mw-parser-output .tooltip-dotted{border-bottom:1px dotted;cursor:help}</style></div><div role="navigation" class="navbox authority-control" aria-label="Navbox" style="padding:3px"><table class="nowraplinks hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Help:Authority_control" title="Help:Authority control">Authority control databases</a>: National <span class="mw-valign-text-top noprint" typeof="mw:File/Frameless"><a href="https://www.wikidata.org/wiki/Q150758#identifiers" title="Edit this at Wikidata"><img alt="Edit this at Wikidata" src="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/10px-OOjs_UI_icon_edit-ltr-progressive.svg.png" decoding="async" width="10" height="10" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/15px-OOjs_UI_icon_edit-ltr-progressive.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/20px-OOjs_UI_icon_edit-ltr-progressive.svg.png 2x" data-file-width="20" data-file-height="20" /></a></span></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"><ul><li><span class="uid"><a rel="nofollow" class="external text" href="https://d-nb.info/gnd/4209290-5">Germany</a></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="https://id.loc.gov/authorities/sh00004694">United States</a></span></li><li><span class="uid"><span class="rt-commentedText tooltip tooltip-dotted" title="Enigma (šifrovací stroj)"><a rel="nofollow" class="external text" href="https://aleph.nkp.cz/F/?func=find-c&local_base=aut&ccl_term=ica=ph715974&CON_LNG=ENG">Czech Republic</a></span></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="http://olduli.nli.org.il/F/?func=find-b&local_base=NLX10&find_code=UID&request=987007291048805171">Israel</a></span></li></ul></div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐f69cdc8f6‐mcbjw Cached time: 20241124053201 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 1.293 seconds Real time usage: 1.676 seconds Preprocessor visited node count: 8159/1000000 Post‐expand include size: 273025/2097152 bytes Template argument size: 6802/2097152 bytes Highest expansion depth: 14/100 Expensive parser function count: 6/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 295589/5000000 bytes Lua time usage: 0.729/10.000 seconds Lua memory usage: 10936287/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1336.050 1 -total 25.07% 334.882 2 Template:Reflist 14.72% 196.705 30 Template:Cite_web 11.30% 151.012 9 Template:Navbox 10.75% 143.613 29 Template:Cite_book 10.43% 139.412 33 Template:Sfn 10.05% 134.215 1 Template:Commons_category 9.88% 131.978 1 Template:Sister_project 9.74% 130.082 1 Template:Side_box 8.43% 112.622 1 Template:EnigmaSeries --> <!-- Saved in parser cache with key enwiki:pcache:idhash:9256-0!canonical and timestamp 20241124053201 and revision id 1259187132. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Enigma_machine&oldid=1259187132">https://en.wikipedia.org/w/index.php?title=Enigma_machine&oldid=1259187132</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Enigma_machine" title="Category:Enigma machine">Enigma machine</a></li><li><a href="/wiki/Category:Broken_stream_ciphers" title="Category:Broken stream ciphers">Broken stream ciphers</a></li><li><a href="/wiki/Category:Cryptographic_hardware" title="Category:Cryptographic hardware">Cryptographic hardware</a></li><li><a href="/wiki/Category:Encryption_devices" title="Category:Encryption devices">Encryption devices</a></li><li><a href="/wiki/Category:Military_communications_of_Germany" title="Category:Military communications of Germany">Military communications of Germany</a></li><li><a href="/wiki/Category:Military_equipment_introduced_in_the_1920s" title="Category:Military equipment introduced in the 1920s">Military equipment introduced in the 1920s</a></li><li><a href="/wiki/Category:Products_introduced_in_1918" title="Category:Products introduced in 1918">Products introduced in 1918</a></li><li><a href="/wiki/Category:Rotor_machines" title="Category:Rotor machines">Rotor machines</a></li><li><a href="/wiki/Category:Signals_intelligence_of_World_War_II" title="Category:Signals intelligence of World War II">Signals intelligence of World War II</a></li><li><a href="/wiki/Category:World_War_II_military_equipment_of_Germany" title="Category:World War II military equipment of Germany">World War II military equipment of Germany</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">CS1 maint: multiple names: authors list</a></li><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:CS1_German-language_sources_(de)" title="Category:CS1 German-language sources (de)">CS1 German-language sources (de)</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_matches_Wikidata" title="Category:Short description matches Wikidata">Short description matches Wikidata</a></li><li><a href="/wiki/Category:Use_dmy_dates_from_January_2021" title="Category:Use dmy dates from January 2021">Use dmy dates from January 2021</a></li><li><a href="/wiki/Category:CS1_errors:_periodical_ignored" title="Category:CS1 errors: periodical ignored">CS1 errors: periodical ignored</a></li><li><a href="/wiki/Category:CS1_French-language_sources_(fr)" title="Category:CS1 French-language sources (fr)">CS1 French-language sources (fr)</a></li><li><a href="/wiki/Category:Commons_category_link_is_on_Wikidata" title="Category:Commons category link is on Wikidata">Commons category link is on Wikidata</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 23 November 2024, at 21:16<span class="anonymous-show"> (UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Enigma_machine&mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-f69cdc8f6-5w7wd","wgBackendResponseTime":144,"wgPageParseReport":{"limitreport":{"cputime":"1.293","walltime":"1.676","ppvisitednodes":{"value":8159,"limit":1000000},"postexpandincludesize":{"value":273025,"limit":2097152},"templateargumentsize":{"value":6802,"limit":2097152},"expansiondepth":{"value":14,"limit":100},"expensivefunctioncount":{"value":6,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":295589,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 1336.050 1 -total"," 25.07% 334.882 2 Template:Reflist"," 14.72% 196.705 30 Template:Cite_web"," 11.30% 151.012 9 Template:Navbox"," 10.75% 143.613 29 Template:Cite_book"," 10.43% 139.412 33 Template:Sfn"," 10.05% 134.215 1 Template:Commons_category"," 9.88% 131.978 1 Template:Sister_project"," 9.74% 130.082 1 Template:Side_box"," 8.43% 112.622 1 Template:EnigmaSeries"]},"scribunto":{"limitreport-timeusage":{"value":"0.729","limit":"10.000"},"limitreport-memusage":{"value":10936287,"limit":52428800},"limitreport-logs":"anchor_id_list = table#1 {\n [\"CITEREFAldrich2010\"] = 1,\n [\"CITEREFBauer2000\"] = 1,\n [\"CITEREFBauer2007\"] = 1,\n [\"CITEREFBertrand1973\"] = 1,\n [\"CITEREFCalvocoressi2001\"] = 1,\n [\"CITEREFComer2021\"] = 1,\n [\"CITEREFDe_LeeuwBergstra2007\"] = 1,\n [\"CITEREFErskine2006\"] = 1,\n [\"CITEREFFerris2005\"] = 1,\n [\"CITEREFFriedman1922\"] = 1,\n [\"CITEREFGreenberg2014\"] = 1,\n [\"CITEREFGrime\"] = 1,\n [\"CITEREFHamer1997\"] = 1,\n [\"CITEREFHamerSullivanWeierud1998\"] = 1,\n [\"CITEREFHerivel2008\"] = 1,\n [\"CITEREFHuttenhainFricke1945\"] = 1,\n [\"CITEREFKahn1991\"] = 1,\n [\"CITEREFKarl_Maria_Michael_de_LeeuwJan_Bergstra2007\"] = 1,\n [\"CITEREFKeegan2003\"] = 1,\n [\"CITEREFKeen2012\"] = 1,\n [\"CITEREFKozaczuk\"] = 1,\n [\"CITEREFKozaczuk1984\"] = 1,\n [\"CITEREFKruhDeavours2002\"] = 1,\n [\"CITEREFLarge2003\"] = 1,\n [\"CITEREFLord1998–2010\"] = 1,\n [\"CITEREFMarks2001\"] = 1,\n [\"CITEREFMarksWeierud2000\"] = 1,\n [\"CITEREFMiller1995\"] = 1,\n [\"CITEREFMucklow2015\"] = 1,\n [\"CITEREFPaillole1985\"] = 1,\n [\"CITEREFPerera,_Tom2010\"] = 1,\n [\"CITEREFQuirantes2004\"] = 1,\n [\"CITEREFRankin2011\"] = 1,\n [\"CITEREFRatcliffe2005\"] = 1,\n [\"CITEREFRejewski1980\"] = 1,\n [\"CITEREFReuvers2008\"] = 1,\n [\"CITEREFSale\"] = 1,\n [\"CITEREFScherbius1928\"] = 1,\n [\"CITEREFSebag-Montefiore2011\"] = 1,\n [\"CITEREFSingh2011\"] = 1,\n [\"CITEREFSmith2000\"] = 1,\n [\"CITEREFSmith2006\"] = 1,\n [\"CITEREFStripp1993\"] = 1,\n [\"CITEREFTuring2018\"] = 1,\n [\"CITEREFUlbricht2005\"] = 1,\n [\"CITEREFVan_ManenJohan_O._A.2016\"] = 1,\n [\"CITEREFVázquezJiménez–Seral2018\"] = 1,\n [\"CITEREFWelchman1982\"] = 1,\n [\"CITEREFWelle_(www.dw.com)\"] = 1,\n [\"CITEREFWinterbotham1999\"] = 1,\n}\ntemplate_list = table#1 {\n [\"!\"] = 2,\n [\"About\"] = 1,\n [\"Authority control\"] = 1,\n [\"Cite book\"] = 29,\n [\"Cite journal\"] = 10,\n [\"Cite news\"] = 3,\n [\"Cite patent\"] = 1,\n [\"Cite thesis\"] = 1,\n [\"Cite web\"] = 30,\n [\"Clear\"] = 3,\n [\"Commons category\"] = 1,\n [\"Convert\"] = 4,\n [\"Cryptography navbox\"] = 2,\n [\"Efn\"] = 1,\n [\"EnigmaSeries\"] = 1,\n [\"Google books\"] = 14,\n [\"Harvnb\"] = 2,\n [\"ISBN\"] = 1,\n [\"Main\"] = 3,\n [\"Mvar\"] = 13,\n [\"Notelist\"] = 1,\n [\"Refbegin\"] = 2,\n [\"Refend\"] = 2,\n [\"Reflist\"] = 1,\n [\"See also\"] = 2,\n [\"Sfn\"] = 33,\n [\"Ship\"] = 1,\n [\"Short description\"] = 1,\n [\"TOC limit\"] = 1,\n [\"US patent\"] = 1,\n [\"Use dmy dates\"] = 1,\n [\"Val\"] = 2,\n [\"Webarchive\"] = 7,\n}\narticle_whitelist = table#1 {\n}\n"},"cachereport":{"origin":"mw-web.codfw.main-f69cdc8f6-mcbjw","timestamp":"20241124053201","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Enigma machine","url":"https:\/\/en.wikipedia.org\/wiki\/Enigma_machine","sameAs":"http:\/\/www.wikidata.org\/entity\/Q150758","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q150758","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2001-11-14T15:51:07Z","dateModified":"2024-11-23T21:16:01Z","image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/bd\/Enigma_%28crittografia%29_-_Museo_scienza_e_tecnologia_Milano.jpg","headline":"German cipher machine"}</script> </body> </html>