<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" dir="ltr" class="client-nojs" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Enigma machine - Wikipedia, the free encyclopedia</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<meta http-equiv="Content-Style-Type" content="text/css" />
<meta name="generator" content="MediaWiki 1.18wmf1" />
<link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Enigma_machine&amp;action=edit" />
<link rel="edit" title="Edit this page" href="/w/index.php?title=Enigma_machine&amp;action=edit" />
<link rel="apple-touch-icon" href="//en.wikipedia.org/apple-touch-icon.png" />
<link rel="shortcut icon" href="/favicon.ico" />
<link rel="search" type="application/opensearchdescription+xml" href="/w/opensearch_desc.php" title="Wikipedia (en)" />
<link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd" />
<link rel="copyright" href="//creativecommons.org/licenses/by-sa/3.0/" />
<link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&amp;feed=atom" />
<link rel="stylesheet" href="//bits.wikimedia.org/en.wikipedia.org/load.php?debug=false&amp;lang=en&amp;modules=ext.wikihiero%7Cmediawiki.legacy.commonPrint%2Cshared%7Cskins.vector&amp;only=styles&amp;skin=vector&amp;*" type="text/css" media="all" />
<meta name="ResourceLoaderDynamicStyles" content="" />
<link rel="stylesheet" href="//bits.wikimedia.org/en.wikipedia.org/load.php?debug=false&amp;lang=en&amp;modules=site&amp;only=styles&amp;skin=vector&amp;*" type="text/css" media="all" />
<style type="text/css" media="all">a:lang(ar),a:lang(ckb),a:lang(fa),a:lang(kk-arab),a:lang(mzn),a:lang(ps),a:lang(ur){text-decoration:none}a.new,#quickbar a.new{color:#ba0000}

/* cache key: enwiki:resourceloader:filter:minify-css:4:c88e2bcd56513749bec09a7e29cb3ffa */</style>
<script src="//bits.wikimedia.org/en.wikipedia.org/load.php?debug=false&amp;lang=en&amp;modules=startup&amp;only=scripts&amp;skin=vector&amp;*" type="text/javascript"></script>
<script type="text/javascript">if ( window.mediaWiki ) {
	mw.config.set({"wgCanonicalNamespace": "", "wgCanonicalSpecialPageName": false, "wgNamespaceNumber": 0, "wgPageName": "Enigma_machine", "wgTitle": "Enigma machine", "wgCurRevisionId": 472278310, "wgArticleId": 9256, "wgIsArticle": true, "wgAction": "view", "wgUserName": null, "wgUserGroups": ["*"], "wgCategories": ["Articles with inconsistent citation formats", "Articles with German language external links", "Cryptography", "Rotor machines", "World War II military equipment of Germany", "Cryptographic hardware", "Signals intelligence of World War II", "Broken stream ciphers"], "wgBreakFrames": false, "wgRestrictionEdit": [], "wgRestrictionMove": [], "wgSearchNamespaces": [0], "wgFlaggedRevsParams": {"tags": {"status": {"levels": 1, "quality": 2, "pristine": 3}}}, "wgStableRevisionId": null, "wgVectorEnabledModules": {"collapsiblenav": true, "collapsibletabs": true, "editwarning": true, "expandablesearch": false, "footercleanup": false, "sectioneditlinks": false, "simplesearch": true, "experiments": true}, "wgWikiEditorEnabledModules": {"toolbar": true, "dialogs": true, "hidesig": true, "templateEditor": false, "templates": false, "preview": false, "previewDialog": false, "publish": false, "toc": false}, "wgTrackingToken": "674d2e01a716de8db927506fb8715f7d", "wikilove-recipient": "", "wikilove-edittoken": "+\\", "wikilove-anon": 0, "mbEmailEnabled": true, "mbUserEmail": false, "mbIsEmailConfirmationPending": false, "Geo": {"city": "", "country": ""}, "wgNoticeProject": "wikipedia"});
}
</script><script type="text/javascript">if ( window.mediaWiki ) {
	mw.loader.load(["mediawiki.page.startup"]);
}
</script>
<!--[if lt IE 7]><style type="text/css">body{behavior:url("/w/skins-1.18/vector/csshover.min.htc")}</style><![endif]--></head>
<body class="mediawiki ltr sitedir-ltr ns-0 ns-subject page-Enigma_machine action-view skin-vector">
		<div id="mw-page-base" class="noprint"></div>
		<div id="mw-head-base" class="noprint"></div>
		<!-- content -->
		<div id="content">
			<a id="top"></a>
			<div id="mw-js-message" style="display:none;"></div>
						<!-- sitenotice -->
			<div id="siteNotice"><!-- centralNotice loads here --></div>
			<!-- /sitenotice -->
						<!-- firstHeading -->
			<h1 id="firstHeading" class="firstHeading">Enigma machine</h1>
			<!-- /firstHeading -->
			<!-- bodyContent -->
			<div id="bodyContent">
								<!-- tagline -->
				<div id="siteSub">From Wikipedia, the free encyclopedia</div>
				<!-- /tagline -->
								<!-- subtitle -->
				<div id="contentSub"></div>
				<!-- /subtitle -->
																<!-- jumpto -->
				<div id="jump-to-nav">
					Jump to: <a href="#mw-head">navigation</a>,
					<a href="#p-search">search</a>
				</div>
				<!-- /jumpto -->
								<!-- bodycontent -->
				<div lang="en" dir="ltr" class="mw-content-ltr"><div class="thumb tright">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:EnigmaMachineLabeled.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/3/3e/EnigmaMachineLabeled.jpg/220px-EnigmaMachineLabeled.jpg" width="220" height="293" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:EnigmaMachineLabeled.jpg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
Military Enigma machine</div>
</div>
</div>
<div class="thumb tright">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Bundesarchiv_Bild_183-2007-0705-502,_Chiffriermaschine_%22Enigma%22.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/7/7b/Bundesarchiv_Bild_183-2007-0705-502%2C_Chiffriermaschine_%22Enigma%22.jpg/220px-Bundesarchiv_Bild_183-2007-0705-502%2C_Chiffriermaschine_%22Enigma%22.jpg" width="220" height="307" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Bundesarchiv_Bild_183-2007-0705-502,_Chiffriermaschine_%22Enigma%22.jpg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
Enigma in use, 1943</div>
</div>
</div>
<table class="vertical-navbox nowraplinks" cellspacing="5" style="float: right; clear: right; color: black; background: #f9f9f9; border: 1px solid #aaa; width: 22em; margin: 0 0 1.0em 1.0em; padding: 0.2em; border-spacing: 0.4em 0; text-align: center; line-height: 1.4em; font-size: 88%;&#160;;" cellpadding="0">
<tr>
<th class="" style="padding: 0.2em 0.4em 0.2em; font-size: 145%; line-height: 1.2em; font-weight: bold;">The Enigma<br />
cipher machine</th>
</tr>
<tr>
<td class="" style="padding: 0.2em 0 0.4em;"><a href="/wiki/File:Enigma-logo.jpg" class="image"><img alt="Enigma-logo.jpg" src="//upload.wikimedia.org/wikipedia/commons/thumb/e/e1/Enigma-logo.jpg/100px-Enigma-logo.jpg" width="100" height="44" /></a></td>
</tr>
<tr>
<td style="padding-top: 0.2em; padding-bottom: 0.2em; text-align:left;">
<div>
<ul>
<li><strong class="selflink">Enigma machine</strong>
<ul>
<li><a href="/wiki/Enigma_rotor_details" title="Enigma rotor details">Enigma rotors</a></li>
</ul>
</li>
<li><a href="/wiki/Cryptanalysis_of_the_Enigma" title="Cryptanalysis of the Enigma">Breaking Enigma</a>
<ul>
<li><a href="/wiki/Biuro_Szyfr%C3%B3w" title="Biuro Szyfrów">Polish Cipher<br />
Bureau</a>
<ul>
<li><a href="/wiki/Polish_Enigma_doubles" title="Polish Enigma doubles">Doubles</a></li>
<li><a href="/wiki/Grill_(cryptology)" title="Grill (cryptology)">Grill</a></li>
<li><a href="/wiki/Clock_(cryptography)" title="Clock (cryptography)">Clock</a></li>
<li><a href="/wiki/Cyclometer" title="Cyclometer">Cyclometer</a></li>
<li><a href="/wiki/Bomba_(cryptography)" title="Bomba (cryptography)">Bomba</a></li>
<li><a href="/wiki/Zygalski_sheets" title="Zygalski sheets">Zygalski sheets</a></li>
</ul>
</li>
<li><a href="/wiki/Bletchley_Park" title="Bletchley Park">Bletchley Park</a>
<ul>
<li><a href="/wiki/Banburismus" title="Banburismus">Banburismus</a></li>
<li><a href="/wiki/Herivel_tip" title="Herivel tip" class="mw-redirect">Herivel tip</a></li>
<li><a href="/wiki/Known-plaintext_attack" title="Known-plaintext attack">Crib</a></li>
<li><a href="/wiki/Bombe" title="Bombe">Bombe</a></li>
<li><a href="/wiki/Hut_6" title="Hut 6">Hut 6</a></li>
<li><a href="/wiki/Hut_8" title="Hut 8">Hut 8</a></li>
</ul>
</li>
<li><a href="/wiki/PC_Bruno" title="PC Bruno">PC Bruno</a></li>
</ul>
</li>
<li><a href="/wiki/Ultra" title="Ultra">Ultra</a></li>
</ul>
</div>
</td>
</tr>
<tr>
<td style="text-align: right; font-size: 115%;">
<div class="noprint plainlinks hlist navbar" style="">
<ul>
<li class="nv-view"><a href="/wiki/Template:EnigmaSeries" title="Template:EnigmaSeries"><span style="" title="View this template">v</span></a></li>
<li class="nv-talk"><a href="/wiki/Template_talk:EnigmaSeries" title="Template talk:EnigmaSeries"><span style="" title="Discuss this template">d</span></a></li>
<li class="nv-edit"><a class="external text" href="//en.wikipedia.org/w/index.php?title=Template:EnigmaSeries&amp;action=edit"><span style="" title="Edit this template">e</span></a></li>
</ul>
</div>
</td>
</tr>
</table>
<p>An <b>Enigma machine</b> is any of a family of related <a href="/wiki/Electromechanics" title="Electromechanics">electro-mechanical</a> <a href="/wiki/Rotor_machine" title="Rotor machine">rotor cipher machines</a> used for the <a href="/wiki/Encryption" title="Encryption">encryption</a> and decryption of secret messages. Enigma was invented by <a href="/wiki/Germans" title="Germans">German</a> engineer <a href="/wiki/Arthur_Scherbius" title="Arthur Scherbius">Arthur Scherbius</a> at the end of <a href="/wiki/World_War_I" title="World War I">World War I</a>.<sup id="cite_ref-0" class="reference"><a href="#cite_note-0"><span>[</span>1<span>]</span></a></sup> The early models were used commercially from the early 1920s, and adopted by military and government services of several countries — most notably by <a href="/wiki/Nazi_Germany" title="Nazi Germany">Nazi Germany</a> before and during <a href="/wiki/World_War_II" title="World War II">World War II</a>.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span>[</span>2<span>]</span></a></sup> Several different Enigma models were produced, but the <a href="/wiki/Wehrmacht" title="Wehrmacht">German military</a> models are the ones most commonly discussed.</p>
<p>In December 1932, the <a href="/wiki/Polish_Cipher_Bureau" title="Polish Cipher Bureau" class="mw-redirect">Polish Cipher Bureau</a> first broke Germany's military Enigma ciphers. Five weeks before the outbreak of World War II, on 25 July 1939, in Warsaw, they presented their <a href="/wiki/Cryptanalysis_of_the_Enigma" title="Cryptanalysis of the Enigma">Enigma-decryption techniques</a> and equipment to French and British <a href="/wiki/Military_intelligence" title="Military intelligence">military intelligence</a>.<sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span>[</span>3<span>]</span></a></sup><sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span>[</span>4<span>]</span></a></sup> Thanks to this,<sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span>[</span>5<span>]</span></a></sup> during the war, <a href="/wiki/Allies_of_World_War_II" title="Allies of World War II">Allied</a> <a href="/wiki/Cryptanalysis" title="Cryptanalysis">codebreakers</a> were able to decrypt a vast number of messages that had been enciphered using the Enigma. The <a href="/wiki/Military_intelligence" title="Military intelligence">intelligence</a> gleaned from this source, codenamed "<a href="/wiki/Ultra" title="Ultra">Ultra</a>" by the British, was a substantial aid to the Allied war effort.<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span>[</span>6<span>]</span></a></sup></p>
<p>The exact influence of Ultra on the course of the war is debated; an oft-repeated assessment is that decryption of German ciphers hastened the <a href="/wiki/Victory_in_Europe_Day" title="Victory in Europe Day">end of the European war</a> by two years.<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span>[</span>7<span>]</span></a></sup><sup id="cite_ref-engima_cryptographic_mathematics_7-0" class="reference"><a href="#cite_note-engima_cryptographic_mathematics-7"><span>[</span>8<span>]</span></a></sup><sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span>[</span>9<span>]</span></a></sup> <a href="/wiki/Winston_Churchill" title="Winston Churchill">Winston Churchill</a> told Britain's King <a href="/wiki/George_VI" title="George VI">George VI</a> after World War II: "It was thanks to Ultra that we won the war."<sup id="cite_ref-9" class="reference"><a href="#cite_note-9"><span>[</span>10<span>]</span></a></sup></p>
<p>Although Enigma had some cryptographic weaknesses, in practice it was only in combination with procedural flaws, operator mistakes, captured key tables and hardware, that Allied cryptanalysts were able to be so successful.<sup id="cite_ref-10" class="reference"><a href="#cite_note-10"><span>[</span>11<span>]</span></a></sup></p>
<table id="toc" class="toc">
<tr>
<td>
<div id="toctitle">
<h2>Contents</h2>
</div>
<ul>
<li class="toclevel-1 tocsection-1"><a href="#Description"><span class="tocnumber">1</span> <span class="toctext">Description</span></a>
<ul>
<li class="toclevel-2 tocsection-2"><a href="#Electrical_pathway"><span class="tocnumber">1.1</span> <span class="toctext">Electrical pathway</span></a></li>
<li class="toclevel-2 tocsection-3"><a href="#Rotors"><span class="tocnumber">1.2</span> <span class="toctext">Rotors</span></a></li>
<li class="toclevel-2 tocsection-4"><a href="#Stepping"><span class="tocnumber">1.3</span> <span class="toctext">Stepping</span></a></li>
<li class="toclevel-2 tocsection-5"><a href="#Turnover"><span class="tocnumber">1.4</span> <span class="toctext">Turnover</span></a></li>
<li class="toclevel-2 tocsection-6"><a href="#Entry_wheel"><span class="tocnumber">1.5</span> <span class="toctext">Entry wheel</span></a></li>
<li class="toclevel-2 tocsection-7"><a href="#Reflector"><span class="tocnumber">1.6</span> <span class="toctext">Reflector</span></a></li>
<li class="toclevel-2 tocsection-8"><a href="#Plugboard"><span class="tocnumber">1.7</span> <span class="toctext">Plugboard</span></a></li>
<li class="toclevel-2 tocsection-9"><a href="#Accessories"><span class="tocnumber">1.8</span> <span class="toctext">Accessories</span></a></li>
<li class="toclevel-2 tocsection-10"><a href="#Mathematical_analysis"><span class="tocnumber">1.9</span> <span class="toctext">Mathematical analysis</span></a></li>
</ul>
</li>
<li class="toclevel-1 tocsection-11"><a href="#Operation"><span class="tocnumber">2</span> <span class="toctext">Operation</span></a>
<ul>
<li class="toclevel-2 tocsection-12"><a href="#Indicator"><span class="tocnumber">2.1</span> <span class="toctext">Indicator</span></a></li>
<li class="toclevel-2 tocsection-13"><a href="#Some_details"><span class="tocnumber">2.2</span> <span class="toctext">Some details</span></a></li>
</ul>
</li>
<li class="toclevel-1 tocsection-14"><a href="#History_of_the_machine"><span class="tocnumber">3</span> <span class="toctext">History of the machine</span></a>
<ul>
<li class="toclevel-2 tocsection-15"><a href="#Commercial_Enigma"><span class="tocnumber">3.1</span> <span class="toctext">Commercial Enigma</span></a></li>
<li class="toclevel-2 tocsection-16"><a href="#Military_Enigma"><span class="tocnumber">3.2</span> <span class="toctext">Military Enigma</span></a></li>
</ul>
</li>
<li class="toclevel-1 tocsection-17"><a href="#Breaking_Enigma"><span class="tocnumber">4</span> <span class="toctext">Breaking Enigma</span></a></li>
<li class="toclevel-1 tocsection-18"><a href="#Surviving_machines"><span class="tocnumber">5</span> <span class="toctext">Surviving machines</span></a></li>
<li class="toclevel-1 tocsection-19"><a href="#Derivatives"><span class="tocnumber">6</span> <span class="toctext">Derivatives</span></a></li>
<li class="toclevel-1 tocsection-20"><a href="#Fiction"><span class="tocnumber">7</span> <span class="toctext">Fiction</span></a></li>
<li class="toclevel-1 tocsection-21"><a href="#Notes"><span class="tocnumber">8</span> <span class="toctext">Notes</span></a></li>
<li class="toclevel-1 tocsection-22"><a href="#References"><span class="tocnumber">9</span> <span class="toctext">References</span></a></li>
<li class="toclevel-1 tocsection-23"><a href="#Further_reading"><span class="tocnumber">10</span> <span class="toctext">Further reading</span></a></li>
<li class="toclevel-1 tocsection-24"><a href="#External_links"><span class="tocnumber">11</span> <span class="toctext">External links</span></a></li>
</ul>
</td>
</tr>
</table>
<h2><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=1" title="Edit section: Description">edit</a>]</span> <span class="mw-headline" id="Description">Description</span></h2>
<p>Like other rotor machines, the Enigma machine is a combination of mechanical and electrical subsystems. The mechanical subsystem consists of a <a href="/wiki/Alphanumeric_keyboard" title="Alphanumeric keyboard" class="mw-redirect">keyboard</a>; a set of rotating disks called <i>rotors</i> arranged adjacently along a <a href="/wiki/Axle" title="Axle">spindle</a>; and one of various stepping components to turn one or more of the rotors with each key press.</p>
<h3><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=2" title="Edit section: Electrical pathway">edit</a>]</span> <span class="mw-headline" id="Electrical_pathway">Electrical pathway</span></h3>
<div class="thumb tright">
<div class="thumbinner" style="width:356px;"><a href="/wiki/File:Enigma_wiring_kleur.svg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/5/53/Enigma_wiring_kleur.svg/354px-Enigma_wiring_kleur.svg.png" width="354" height="500" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Enigma_wiring_kleur.svg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
Enigma wiring diagram with arrows and the numbers 1 to 9 showing how current flows from key depression to a lamp being lit. The <i>A</i> key is encoded to the <i>D</i> lamp. D yields A, but A never yields A; this property was due to a patented feature unique to the Enigmas, and could be exploited by cryptanalysts in some situations.</div>
</div>
</div>
<p>The mechanical parts act in such a way as to form a varying <a href="/wiki/Electrical_network" title="Electrical network">electrical circuit</a>. When a key is pressed, a circuit is completed with current flowing through the various components in their current configuration and ultimately lighting one of the display <a href="/wiki/Lamp_(electrical_component)" title="Lamp (electrical component)">lamps</a>, indicating the output letter. For example, when encrypting a message starting <i>ANX…</i>, the operator would first press the <i>A</i> key, and the <i>Z</i> lamp might light, so <i>Z</i> would be the first letter of the <a href="/wiki/Ciphertext" title="Ciphertext">ciphertext</a>. The operator would next press <i>N</i>, and then <i>X</i> in the same fashion, and so on.</p>
<p>The detailed operation of Enigma is shown in the wiring diagram to the right. To simplify the example, only four components of a complete Enigma machine are shown. In reality, there are 26 lamps and keys, rotor wirings inside the rotors (of which there were either three or four) and between six and ten plug leads.</p>
<div class="thumb tleft">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Enigma-action.svg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/6/6c/Enigma-action.svg/220px-Enigma-action.svg.png" width="220" height="250" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Enigma-action.svg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
The scrambling action of Enigma's rotors is shown for two consecutive letters with the right-hand rotor moving one position between them.</div>
</div>
</div>
<p>Current flowed from the battery (1) through a depressed bi-directional keyboard switch (2) to the plugboard (3). Next, it passed through the (unused in this instance, so shown closed) plug (3) via the entry wheel (4), through the wiring of the three (Wehrmacht Enigma) or four (<i><a href="/wiki/Kriegsmarine" title="Kriegsmarine">Kriegsmarine</a></i> M4 and <i>Abwehr</i> variants) installed rotors (5), and entered the reflector (6). The reflector returned the current, via an entirely different path, back through the rotors (5) and entry wheel (4), proceeding through plug 'S' (7) connected with a cable (8) to plug 'D', and another bi-directional switch (9) to light the appropriate lamp.<sup id="cite_ref-Rijmenants_11-0" class="reference"><a href="#cite_note-Rijmenants-11"><span>[</span>12<span>]</span></a></sup></p>
<p>The repeated changes of electrical path through an Enigma scrambler, implemented a <a href="/wiki/Polyalphabetic_cipher" title="Polyalphabetic cipher">polyalphabetic substitution cipher</a> which provided Enigma's high security. The diagram on the left shows how the electrical pathway changed with each key depression, which caused rotation of at least the right hand rotor. Current passed into the set of rotors, into and back out of the reflector, and out through the rotors again. The greyed-out lines are some other possible paths within each rotor; these are hard-wired from one side of each rotor to the other. Letter <i>A</i> encrypts differently with consecutive key presses, first to <i>G</i>, and then to <i>C</i>. This is because the right hand rotor has stepped, sending the signal on a completely different route; eventually other rotors will also step with a key press.</p>
<h3><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=3" title="Edit section: Rotors">edit</a>]</span> <span class="mw-headline" id="Rotors">Rotors</span></h3>
<div class="thumb tright">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Enigma_rotors_with_alphabet_rings.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/d/dd/Enigma_rotors_with_alphabet_rings.jpg/220px-Enigma_rotors_with_alphabet_rings.jpg" width="220" height="179" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Enigma_rotors_with_alphabet_rings.jpg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
Enigma rotor assembly. In the Wehrmacht Enigma, the three installed movable rotors are sandwiched between two fixed wheels: the entry wheel, on the right, and the reflector on the left.</div>
</div>
</div>
<div class="rellink relarticle mainarticle">Main article: <a href="/wiki/Enigma_rotor_details" title="Enigma rotor details">Enigma rotor details</a></div>
<p>The rotors (alternatively <i>wheels</i> or <i>drums</i>, <i>Walzen</i> in German) formed the heart of an Enigma machine. Each rotor was a disc approximately 10&#160;cm (3.9&#160;in) in diameter made from hard <a href="/wiki/Rubber" title="Rubber" class="mw-redirect">rubber</a> or <a href="/wiki/Bakelite" title="Bakelite">bakelite</a> with <a href="/wiki/Brass" title="Brass">brass</a> spring-loaded pins on one face arranged in a circle; on the other side are a corresponding number of circular electrical contacts. The pins and contacts represent the <a href="/wiki/Alphabet" title="Alphabet">alphabet</a> — typically the 26 letters A–Z (this will be assumed for the rest of this description). When the rotors were mounted side-by-side on the spindle, the pins of one rotor rest against the contacts of the neighbouring rotor, forming an electrical connection. Inside the body of the rotor, 26 wires connected each pin on one side to a contact on the other in a complex pattern. Most of the rotors were identified by Roman numerals and each issued copy of rotor I was wired identically to all others. The same was true of the special thin beta and gamma rotors used in the M4 naval variant.</p>
<div class="thumb tleft">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Enigma-rotors.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/1/18/Enigma-rotors.jpg/220px-Enigma-rotors.jpg" width="220" height="140" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Enigma-rotors.jpg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
Three Enigma rotors and the shaft on which they are placed when in use.</div>
</div>
</div>
<p>By itself, a rotor will perform only a very simple type of <a href="/wiki/Encryption" title="Encryption">encryption</a> — a simple <a href="/wiki/Substitution_cipher" title="Substitution cipher">substitution cipher</a>. For example, the pin corresponding to the letter <i>E</i> might be wired to the contact for letter <i>T</i> on the opposite face, and so on. The Enigma's complexity, and cryptographic security, came from using several rotors in series (usually three or four) and the regular stepping movement of the rotors, thus implementing a poly-alphabetic substitution cipher.</p>
<p>When placed in an Enigma, each rotor can be set to one of 26 possible positions. When inserted, it can be turned by hand using the grooved finger-wheel which protrudes from the internal Enigma cover when closed. So that the operator can know the rotor's position, each had an <i>alphabet tyre</i> (or letter ring) attached to the outside of the rotor disk, with 26 characters (typically letters); one of these could be seen through the window, thus indicating the rotational position of the rotor. In early Enigma models, the alphabet ring was fixed to the rotor disk. An improvement introduced in later variants was the ability to adjust the alphabet ring relative to the rotor disk. The position of the ring was known as the <i>Ringstellung</i> ("ring setting"), and was a part of the initial setting of an Enigma prior to an operating session. In modern terms it was a part of the <a href="/wiki/Initialization_vector" title="Initialization vector">initialization vector</a>.</p>
<div class="thumb tleft">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Enigma_rotors_and_spindle_showing_contacts_rachet_and_notch.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/d/d8/Enigma_rotors_and_spindle_showing_contacts_rachet_and_notch.jpg/220px-Enigma_rotors_and_spindle_showing_contacts_rachet_and_notch.jpg" width="220" height="117" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Enigma_rotors_and_spindle_showing_contacts_rachet_and_notch.jpg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
Two Enigma rotors showing electrical contacts, stepping rachet (on the left) and notch (on the right hand rotor opposite <b>D</b>).</div>
</div>
</div>
<p>The rotors each contained a notch (more than one for some rotors) which was used to control rotor stepping. In the military variants, the notches are located on the alphabet ring.</p>
<p>The Army and Air Force Enigmas were used with several rotors; when first issued, there were only three. On 15 December 1938, this changed to five, from which three were chosen for insertion in the machine for a particular operating session. Rotors were marked with <a href="/wiki/Roman_numerals" title="Roman numerals">Roman numerals</a> to distinguish them: I, II, III, IV and V, all with single notches located at different points on the alphabet ring. This variation was probably intended as a security measure, but ultimately allowed the Polish <a href="/wiki/Clock_(cryptography)" title="Clock (cryptography)">Clock Method</a> and British <a href="/wiki/Banburismus" title="Banburismus">Banburismus</a> attacks.</p>
<p>The Naval version of the <i><a href="/wiki/Wehrmacht" title="Wehrmacht">Wehrmacht</a></i> Enigma had always been issued with more rotors than the other services: at first six, then seven, and finally eight. The additional rotors were marked VI, VII and VIII, all with different wiring, and had two notches cut into them resulting in a more frequent turnover. The four-rotor Naval Enigma (M4) machine accommodated an extra rotor in the same space as the three-rotor version. This was accomplished by replacing the original reflector with a thinner one and by adding a special, also thin, fourth rotor. That fourth rotor was one of two types, <i>Beta</i> or <i>Gamma</i>, and never stepped, but it could be manually set to any of its 26 possible positions, one of which made the machine perform identically to the three-rotor machine.</p>
<h3><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=4" title="Edit section: Stepping">edit</a>]</span> <span class="mw-headline" id="Stepping">Stepping</span></h3>
<p>To avoid merely implementing a simple (and easily breakable) substitution cipher, every key press caused one or more rotors to step by one twenty-sixth of a full rotation, before the electrical connections were made. This changed the substitution alphabet used for encryption, ensuring that the cryptographic substitution was different at each new rotor position, producing a more formidable <a href="/wiki/Polyalphabetic_cipher" title="Polyalphabetic cipher">polyalphabetic substitution cipher</a>. The stepping mechanism varied slightly from model to model. The right-hand rotor stepped once with each key stroke, and other rotors stepped less frequently.</p>
<h3><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=5" title="Edit section: Turnover">edit</a>]</span> <span class="mw-headline" id="Turnover">Turnover</span></h3>
<div class="thumb tright">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Enigma_ratchet.png" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/6/6a/Enigma_ratchet.png/220px-Enigma_ratchet.png" width="220" height="147" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Enigma_ratchet.png" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
The Enigma stepping motion seen from the side away from the operator. All three ratchet pawls (green) push in unison as a key is depressed. For the first rotor (1), which to the operator is the right-hand rotor, the ratchet (red) is always engaged, and steps with each keypress. Here, the middle rotor (2) is engaged because the notch in the first rotor is aligned with the pawl; it will step (<i>turn over</i>) with the first rotor. The third rotor (3) is not engaged, because the notch in the second rotor is not aligned to the pawl, so it will not engage with the rachet.</div>
</div>
</div>
<p>The advancement of a rotor other than the left-hand one was called a <i>turnover</i> by the cryptanalysts at Bletchley Park. This was achieved by a <a href="/wiki/Ratchet_and_pawl" title="Ratchet and pawl" class="mw-redirect">ratchet and pawl</a> mechanism. Each rotor had a ratchet with 26 teeth and every time a key was pressed, the set of spring-loaded pawls moved forward in unison, trying to engage with a ratchet. The alphabet ring of the rotor to the right normally prevented this. As this ring rotated with its rotor, a notch machined into it would eventually align itself with the pawl, allowing it to engage with the ratchet, and advance the rotor on its left. The right-hand pawl, having no rotor and ring to its right, stepped its rotor with every key depression.<sup id="cite_ref-doublestepping_12-0" class="reference"><a href="#cite_note-doublestepping-12"><span>[</span>13<span>]</span></a></sup> For a single-notch rotor in the right-hand position, the middle rotor stepped once for every 26 steps of the right-hand rotor. Similarly for rotors two and three. For a two-notch rotor, the rotor to its left would turn over twice for each rotation.</p>
<p>The first five rotors to be introduced (I–V) contained one notch each, while the additional naval rotors VI, VII and VIII each had two notches. The position of the notch on each rotor was determined by the letter ring which could be adjusted in relation to the core containing the interconnections. The points on the rings at which they caused the next wheel to move were as follows.<sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span>[</span>14<span>]</span></a></sup></p>
<table>
<caption>Position of turnover notches</caption>
<tr>
<th width="130pt">Rotor</th>
<th width="130pt">Turnover position(s)</th>
<th width="130pt">BP mnemonic</th>
</tr>
<tr>
<td align="center">I</td>
<td align="center">R</td>
<td align="center">Royal</td>
</tr>
<tr>
<td align="center">II</td>
<td align="center">F</td>
<td align="center">Flags</td>
</tr>
<tr>
<td align="center">III</td>
<td align="center">W</td>
<td align="center">Wave</td>
</tr>
<tr>
<td align="center">IV</td>
<td align="center">K</td>
<td align="center">Kings</td>
</tr>
<tr>
<td align="center">V</td>
<td align="center">A</td>
<td align="center">Above</td>
</tr>
<tr>
<td align="center">VI, VII and VIII</td>
<td align="center">A and N</td>
<td></td>
</tr>
</table>
<p>The design also included a feature known as <i>double-stepping</i>. This was enabled due to each pawl being aligned with both the ratchet of its rotor and the rotating notched ring of the neighbouring rotor. If a pawl was allowed to engage with a ratchet through alignment with a notch, as it moved forward it would push against both the ratchet and the notch, advancing both rotors at the same time. In a three-rotor machine, the double-stepping would affect rotor two only. This, if in moving forward allowed the ratchet of rotor three to be engaged, would move again on the subsequent keystroke, thus resulting in two consecutive steps. Rotor two also pushes rotor one forward after 26 of its steps, but as rotor one moves forward with every keystroke anyway, there is no double-stepping.<sup id="cite_ref-doublestepping_12-1" class="reference"><a href="#cite_note-doublestepping-12"><span>[</span>13<span>]</span></a></sup> This double-stepping caused the rotors to deviate from <a href="/wiki/Odometer" title="Odometer">odometer</a>-style regular motion.</p>
<p><br />
With three wheels and only single notches in the first and second wheels, the machine had a period of 26 × 25 × 26 = 16,900 (not 26 × 26 × 26 because of the double-stepping of the second rotor).<sup id="cite_ref-doublestepping_12-2" class="reference"><a href="#cite_note-doublestepping-12"><span>[</span>13<span>]</span></a></sup> Historically, messages were limited to a few hundred letters, and so there was no chance of repeating any net combined rotor position during a single message session, and so cryptanalysts were denied a valuable clue to the substitution used.</p>
<p>To make room for the Naval fourth rotors, <i>Beta</i> and <i>Gamma</i> (introduced in 1942), the reflector was changed, by making it much thinner. The special fourth rotors fit into the space made available. No changes were made to the rest of the mechanism, which eased the changeover to the new mode of operation. Since there were only three pawls, the fourth rotor never stepped, but could be manually set into one of its 26 possible positions.</p>
<p>A device that was designed, but not implemented before the war's end, was the <i>Lückenfüllerwalze</i> (gap-fill wheel) which implemented irregular stepping. It allowed field configuration of notches in all 26 positions. If the number of notches was a relative <a href="/wiki/Prime_number" title="Prime number">prime</a> of 26 and the number of notches were different for each wheel, the stepping would be more unpredictable. Like the Umkehrwalze-D it also allowed the internal wiring to be reconfigured.<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span>[</span>15<span>]</span></a></sup><br clear="all" /></p>
<h3><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=6" title="Edit section: Entry wheel">edit</a>]</span> <span class="mw-headline" id="Entry_wheel">Entry wheel</span></h3>
<p>The current entry wheel (<i>Eintrittswalze</i> in German), or entry <a href="/wiki/Stator" title="Stator">stator</a>, connects the <a href="/wiki/Plugboard" title="Plugboard">plugboard</a>, if present, or otherwise the keyboard and lampboard, to the rotor assembly. While the exact wiring used is of comparatively little importance to the security, it proved an obstacle in the progress of <a href="/wiki/Poland" title="Poland">Polish</a> cryptanalyst <a href="/wiki/Marian_Rejewski" title="Marian Rejewski">Marian Rejewski</a> during his deduction of the rotor wirings. The commercial Enigma connects the keys in the order of their sequence on the keyboard: <i>Q</i><img class="tex" alt="\rightarrow" src="//upload.wikimedia.org/wikipedia/en/math/8/3/e/83e37b7246fdfcb99b2754210ebeae27.png" /><i>A</i>, <i>W</i><img class="tex" alt="\rightarrow" src="//upload.wikimedia.org/wikipedia/en/math/8/3/e/83e37b7246fdfcb99b2754210ebeae27.png" /><i>B</i>, <i>E</i><img class="tex" alt="\rightarrow" src="//upload.wikimedia.org/wikipedia/en/math/8/3/e/83e37b7246fdfcb99b2754210ebeae27.png" /><i>C</i> and so on. However, the military Enigma connects them in straight alphabetical order: <i>A</i><img class="tex" alt="\rightarrow" src="//upload.wikimedia.org/wikipedia/en/math/8/3/e/83e37b7246fdfcb99b2754210ebeae27.png" /><i>A</i>, <i>B</i><img class="tex" alt="\rightarrow" src="//upload.wikimedia.org/wikipedia/en/math/8/3/e/83e37b7246fdfcb99b2754210ebeae27.png" /><i>B</i>, <i>C</i><img class="tex" alt="\rightarrow" src="//upload.wikimedia.org/wikipedia/en/math/8/3/e/83e37b7246fdfcb99b2754210ebeae27.png" /><i>C</i>, and so on. It took an inspired piece of guesswork for Rejewski to realise the modification.</p>
<h3><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=7" title="Edit section: Reflector">edit</a>]</span> <span class="mw-headline" id="Reflector">Reflector</span></h3>
<p>With the exception of the early Enigma models <b>A</b> and <b>B</b>, the last rotor came before a <i>reflector</i> (German: <i>Umkehrwalze</i>, meaning <i>reversal rotor</i>), a patented feature distinctive of the Enigma family amongst the various rotor machines designed in the period. The reflector connected outputs of the last rotor in pairs, redirecting current back through the rotors by a different route. The reflector ensured that Enigma is <a href="/wiki/Involution_(mathematics)" title="Involution (mathematics)">self-reciprocal</a>: conveniently, encryption was the same as decryption. However, the reflector also gave Enigma the property that no letter ever encrypted to itself. This was a severe conceptual flaw and a cryptological mistake subsequently exploited by codebreakers.</p>
<p>In the commercial Enigma model <b>C</b>, the reflector could be inserted in one of two different positions. In Model <b>D</b>, the reflector could be set in 26 possible positions, although it did not move during encryption. In the <i>Abwehr</i> Enigma, the reflector stepped during encryption in a manner like the other wheels.</p>
<p>In the German Army and Air Force Enigma, the reflector was fixed and did not rotate; there were four versions. The original version was marked <b>A</b>, and was replaced by <b><i>Umkehrwalze</i> B</b> on 1 November 1937. A third version, <b><i>Umkehrwalze</i> C</b> was used briefly in 1940, possibly by mistake, and was solved by <a href="/wiki/Hut_6" title="Hut 6">Hut 6</a>.<sup id="cite_ref-ukwd-1_15-0" class="reference"><a href="#cite_note-ukwd-1-15"><span>[</span>16<span>]</span></a></sup> The fourth version, first observed on 2 January 1944, had a rewireable reflector, called <b><i>Umkehrwalze</i> D</b>, allowing the Enigma operator to alter the connections as part of the key settings.<br clear="all" /></p>
<h3><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=8" title="Edit section: Plugboard">edit</a>]</span> <span class="mw-headline" id="Plugboard">Plugboard</span></h3>
<div class="thumb tright">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Enigma-plugboard.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/2/27/Enigma-plugboard.jpg/220px-Enigma-plugboard.jpg" width="220" height="150" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Enigma-plugboard.jpg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
The plugboard (<i>Steckerbrett</i>) was positioned at the front of the machine, below the keys. When in use during World War II, there were ten connections. In this photograph, just two pairs of letters have been swapped (A↔J and S↔O).</div>
</div>
</div>
<p>The plugboard (<i>Steckerbrett</i> in German) permitted variable wiring that could be reconfigured by the operator (visible on the front panel of Figure 1; some of the patch cords can be seen in the lid). It was introduced on German Army versions in 1930, and was soon adopted by the Navy as well. The plugboard contributed a great deal to the strength of the machine's encryption: more than an extra rotor would have done. Enigma without a plugboard (known as <i>unsteckered Enigma</i>) can be solved relatively straightforwardly using hand methods; these techniques are generally defeated by the addition of a plugboard, and Allied cryptanalysts resorted to special machines to solve it.</p>
<p>A cable placed onto the plugboard connected letters up in pairs; for example, <i>E</i> and <i>Q</i> might be a steckered pair. The effect was to swap those letters before and after the main rotor scrambling unit. For example, when an operator presses <i>E</i>, the signal was diverted to <i>Q</i> before entering the rotors. Several such steckered pairs, up to 13, might be used at one time. However, normally only 10 pairs were used at any one time.</p>
<p>Current flowed from the keyboard through the plugboard, and proceeded to the entry-rotor or <i>Eintrittswalze</i>. Each letter on the plugboard had two jacks. Inserting a plug disconnected the upper jack (from the keyboard) and the lower jack (to the entry-rotor) of that letter. The plug at the other end of the crosswired cable was inserted into another letter's jacks, thus switching the connections of the two letters.</p>
<h3><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=9" title="Edit section: Accessories">edit</a>]</span> <span class="mw-headline" id="Accessories">Accessories</span></h3>
<div class="thumb tleft">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Enigma-printer-2.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/7/77/Enigma-printer-2.jpg/220px-Enigma-printer-2.jpg" width="220" height="165" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Enigma-printer-2.jpg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
The <i>Schreibmax</i> was a printing unit which could be attached to the Enigma, removing the need for laboriously writing down the letters indicated on the light panel.</div>
</div>
</div>
<div class="thumb tright">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Enigma-uhr-box.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/4/45/Enigma-uhr-box.jpg/220px-Enigma-uhr-box.jpg" width="220" height="340" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Enigma-uhr-box.jpg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
The Enigma Uhr attachment</div>
</div>
</div>
<p>A number of additional features were produced to make various Enigma machines more secure or more convenient to use.<sup id="cite_ref-16" class="reference"><a href="#cite_note-16"><span>[</span>17<span>]</span></a></sup></p>
<p>One feature that was used on some M4 Enigmas was the <i>Schreibmax</i>, a small <a href="/wiki/Computer_printer" title="Computer printer" class="mw-redirect">printer</a> which could print the 26 letters on a narrow paper ribbon. This did away with the need for a second operator to read the lamps and write the letters down. The <i>Schreibmax</i> was placed on top of the Enigma machine and was connected to the lamp panel. To install the printer, the lamp cover and all light bulbs had to be removed. Besides its convenience, it could improve operational security; the printer could be installed remotely such that the signal officer operating the machine no longer had to see the decrypted <a href="/wiki/Plaintext" title="Plaintext">plaintext</a> information.</p>
<p>Another accessory was the remote lamp panel <i>Fernlesegerät</i>. For machines equipped with the extra panel, the wooden case of the Enigma was wider and could store the extra panel. There was a lamp panel version that could be connected afterwards, but that required, just as with the <i>Schreibmax</i>, that the lamp panel and lightbulbs be removed.<sup id="cite_ref-Rijmenants_11-1" class="reference"><a href="#cite_note-Rijmenants-11"><span>[</span>12<span>]</span></a></sup> The remote panel made it possible for a person to read the decrypted plaintext without the operator seeing it.</p>
<p>In 1944, the <i>Luftwaffe</i> introduced a plugboard switch, called the <i>Uhr</i> (clock). There was a little box, containing a switch with 40 positions. It replaced the standard plugs. After connecting the plugs, as determined in the daily key sheet, the operator turned the switch into one of the 40 positions, each position producing a different combination of plug wiring. Most of these plug connections were, unlike the default plugs, not pair-wise.<sup id="cite_ref-Rijmenants_11-2" class="reference"><a href="#cite_note-Rijmenants-11"><span>[</span>12<span>]</span></a></sup> In one switch position, the <i>Uhr</i> did not swap any letters, but simply emulated the 13 stecker wires with plugs.</p>
<h3><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=10" title="Edit section: Mathematical analysis">edit</a>]</span> <span class="mw-headline" id="Mathematical_analysis">Mathematical analysis</span></h3>
<p>The Enigma transformation for each letter can be specified mathematically as a product of <a href="/wiki/Permutation" title="Permutation">permutations</a>.<sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span>[</span>18<span>]</span></a></sup> Assuming a three-rotor German Army/Air Force Enigma, let <img class="tex" alt="\scriptstyle P" src="//upload.wikimedia.org/wikipedia/en/math/d/7/c/d7cfb23450291969e5f005706414a6ab.png" /> denote the plugboard transformation, <img class="tex" alt="\scriptstyle U" src="//upload.wikimedia.org/wikipedia/en/math/9/e/d/9ed8dc4100221927c9ab0c050581f5aa.png" /> denote that of the reflector, and <img class="tex" alt="\scriptstyle L, M, R" src="//upload.wikimedia.org/wikipedia/en/math/c/d/1/cd1b8b153de7dd10df73969c999c5fb7.png" /> denote those of the left, middle and right rotors respectively. Then the encryption <img class="tex" alt="\scriptstyle E" src="//upload.wikimedia.org/wikipedia/en/math/f/f/9/ff9e5566b3f30257642444135c57c298.png" /> can be expressed as</p>
<dl>
<dd><span class="texhtml" dir="ltr"><i>E</i> = <i>P</i><i>R</i><i>M</i><i>L</i><i>U</i><i>L</i> <sup>− 1</sup><i>M</i> <sup>− 1</sup><i>R</i> <sup>− 1</sup><i>P</i> <sup>− 1</sup></span>.</dd>
</dl>
<p>After each key press, the rotors turn, changing the transformation. For example, if the right hand rotor <img class="tex" alt="\scriptstyle R" src="//upload.wikimedia.org/wikipedia/en/math/f/7/f/f7fc705c10af285d4fc0275d19e6cbbb.png" /> is rotated <img class="tex" alt="\scriptstyle i" src="//upload.wikimedia.org/wikipedia/en/math/b/a/7/ba760789275a80840870e04ec9096216.png" /> positions, the transformation becomes <img class="tex" alt="\scriptstyle\rho^iR\rho^{-i}" src="//upload.wikimedia.org/wikipedia/en/math/3/3/1/331ed560a9b22bc62899c491c0eb9731.png" />, where <img class="tex" alt="\scriptstyle\rho" src="//upload.wikimedia.org/wikipedia/en/math/7/9/5/7954f3df8b6dd0aeda32d3813a9569ed.png" /> is the <a href="/wiki/Cyclic_permutation" title="Cyclic permutation">cyclic permutation</a> mapping <i>A</i> to <i>B</i>, <i>B</i> to <i>C</i>, and so forth. Similarly, the middle and left-hand rotors can be represented as <img class="tex" alt="\scriptstyle j" src="//upload.wikimedia.org/wikipedia/en/math/4/6/b/46bc08736051bdf64068c67785c6888e.png" /> and <img class="tex" alt="\scriptstyle k" src="//upload.wikimedia.org/wikipedia/en/math/6/d/2/6d2638f3b017bed72452bddbc28cbd6a.png" /> rotations of <img class="tex" alt="\scriptstyle M" src="//upload.wikimedia.org/wikipedia/en/math/8/5/3/85352b5b8832903500d7f7d2873e5144.png" /> and <img class="tex" alt="\scriptstyle L" src="//upload.wikimedia.org/wikipedia/en/math/b/1/d/b1dc21bfe298d9c5408dced55789670b.png" />. The encryption transformation can then be described as</p>
<dl>
<dd><span class="texhtml" dir="ltr"><i>E</i> = <i>P</i>(ρ<sup><i>i</i></sup><i>R</i>ρ <sup>− <i>i</i></sup>)(ρ<sup><i>j</i></sup><i>M</i>ρ <sup>− <i>j</i></sup>)(ρ<sup><i>k</i></sup><i>L</i>ρ <sup>− <i>k</i></sup>)<i>U</i>(ρ<sup><i>k</i></sup><i>L</i> <sup>− 1</sup>ρ <sup>− <i>k</i></sup>)(ρ<sup><i>j</i></sup><i>M</i> <sup>− 1</sup>ρ <sup>− <i>j</i></sup>)(ρ<sup><i>i</i></sup><i>R</i> <sup>− 1</sup>ρ <sup>− <i>i</i></sup>)<i>P</i> <sup>− 1</sup></span>.</dd>
</dl>
<h2><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=11" title="Edit section: Operation">edit</a>]</span> <span class="mw-headline" id="Operation">Operation</span></h2>
<div class="thumb tright">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Kenngruppenheft.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/8/82/Kenngruppenheft.jpg/220px-Kenngruppenheft.jpg" width="220" height="141" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Kenngruppenheft.jpg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
German Kenngruppenheft (a U-boat <a href="/wiki/Codebook" title="Codebook">codebook</a> with grouped key codes)</div>
</div>
</div>
<p>In use, the Enigma required a list of daily key settings as well as a number of auxiliary documents. The procedures for German Naval Enigma were more elaborate and more secure than the procedures used in other services. The Navy <a href="/wiki/Codebook" title="Codebook">codebooks</a> were also printed in red, water-soluble ink on pink paper so that they could easily be destroyed if they were at risk of being seized by the enemy. The codebook to the right was taken from captured <a href="/wiki/German_submarine_U-505" title="German submarine U-505">German submarine&#160;<i>U-505</i></a>.</p>
<p>In German military usage, communications were divided up into a number of different networks, all using different settings for their Enigma machines. These communication nets were termed <i>keys</i> at <a href="/wiki/Bletchley_Park" title="Bletchley Park">Bletchley Park</a>, and were assigned <a href="/wiki/Code_name" title="Code name">code names</a>, such as <i>Red</i>, <i>Chaffinch</i>, and <i>Shark</i>. Each unit operating on a network was assigned a settings list for its Enigma for a period of time. For a message to be correctly encrypted and decrypted, both sender and receiver had to set up their Enigma in the same way; the rotor selection and order, the starting position and the plugboard connections must be identical. All these settings (together the <a href="/wiki/Key_(cryptography)" title="Key (cryptography)">key</a> in modern terms) must have been established beforehand, and were distributed in <a href="/wiki/Codebook" title="Codebook">codebooks</a>.</p>
<p>An Enigma machine's initial state, the <a href="/wiki/Key_(cryptography)" title="Key (cryptography)">cryptographic key</a>, has several aspects:</p>
<ul>
<li>Wheel order (<i>Walzenlage</i>) — the choice of rotors and the order in which they are fitted.</li>
<li>Initial position of the rotors — chosen by the operator, different for each message.</li>
<li>Ring settings (<i>Ringstellung</i>) — the position of the alphabet ring relative to the rotor wiring.</li>
<li>Plug settings (<i>Steckerverbindungen</i>) — the connections of the plugs in the plugboard.</li>
<li>In very late versions, the wiring of the reconfigurable reflector.</li>
</ul>
<p>Note that although the ring settings (<i>ringstellung</i>) were a required part of the setup, they did not actually affect the message encryption because the rotors were positioned independently of the rings. The ring settings were only necessary to determine the initial rotor position based on the <i>message setting</i> which was transmitted at the beginning of a message, as described in the "Indicators" section, below. Once the receiver had set his rotors to the indicated positions, the ring settings no longer played any role in the encryption.</p>
<p>In modern cryptographic language, the ring settings did not actually contribute <a href="/wiki/Information_entropy" title="Information entropy" class="mw-redirect">entropy</a> to the key used for encrypting the message. Rather, the ring settings were part of a separate key (along with the rest of the setup such as wheel order and plug settings) used to encrypt an <i>initialization vector</i> for the message. The session key consisted of the complete setup <i>except for</i> the ring settings, plus the initial rotor positions chosen arbitrarily by the sender (the <i>message setting</i>). The important part of this session key was the rotor positions, not the ring positions. However, by <i>encoding</i> the rotor position into the ring position using the ring settings, additional variability was added to the encryption of the initialization vector.</p>
<p>Enigma was designed to be secure even if the rotor wiring was known to an opponent, although in practice there was considerable effort to keep the wiring secret. If the wiring is secret, the total number of possible configurations has been calculated to be around 10<sup>114</sup> (approximately 380 bits); with known wiring and other operational constraints, this is reduced to around 10²³ (76 bits).<sup id="cite_ref-engima_cryptographic_mathematics_7-1" class="reference"><a href="#cite_note-engima_cryptographic_mathematics-7"><span>[</span>8<span>]</span></a></sup> Users of Enigma were confident of its security because of the large number of possibilities; it was not then feasible for an adversary to even begin to try every possible configuration in a <a href="/wiki/Brute_force_attack" title="Brute force attack" class="mw-redirect">brute force attack</a>.</p>
<h3><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=12" title="Edit section: Indicator">edit</a>]</span> <span class="mw-headline" id="Indicator">Indicator</span></h3>
<p>Most of the key was kept constant for a set time period, typically a day. However, a different initial rotor position was used for each message, a concept similar to an <a href="/wiki/Initialization_vector" title="Initialization vector">initialisation vector</a> in modern cryptography. The reason for this is that, were a number of messages to be encrypted with identical or near-identical settings (termed in cryptanalysis as being <i>in depth</i>), it would be possible to attack the messages using a statistical procedure such as <a href="/wiki/William_F._Friedman" title="William F. Friedman">Friedman's</a> <a href="/wiki/Index_of_coincidence" title="Index of coincidence">Index of coincidence</a>.<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span>[</span>19<span>]</span></a></sup> The starting position for the rotors was transmitted just before the ciphertext, usually after having been enciphered. The exact method used was termed the <i>indicator procedure</i>. It was design weakness and operator sloppiness in these indicator procedures that were two of the main reasons that breaking Enigma messages was possible.</p>
<div class="thumb tleft">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Enigma-rotor-windows.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/a/a1/Enigma-rotor-windows.jpg/220px-Enigma-rotor-windows.jpg" width="220" height="163" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Enigma-rotor-windows.jpg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
Figure 2. With the inner lid down, the Enigma was ready for use. The finger wheels of the rotors protruded through the lid, allowing the operator to set the rotors, and their current position, here <i>RDKP</i>, was visible to the operator through a set of windows.</div>
</div>
</div>
<p>One of the earliest indicator procedures was used by Polish cryptanalysts to make the initial breaks into the Enigma. The procedure was for the operator to set up his machine in accordance with his settings list, which included a global initial position for the rotors (<i>Grundstellung</i>, meaning <i>ground setting</i>), <i>AOH</i>, perhaps. The operator turned his rotors until <i>AOH</i> was visible through the rotor windows. At that point, the operator chose his own, arbitrary, starting position for that particular message. An operator might select <i>EIN</i>, and these became the <i>message settings</i> for that encryption session. The operator then typed <i>EIN</i> into the machine, twice, to allow for detection of transmission errors. The results were an encrypted indicator—the <i>EIN</i> typed twice might turn into <i>XHTLOA</i>, which would be transmitted along with the message. Finally, the operator then spun the rotors to his message settings, <i>EIN</i> in this example, and typed the plaintext of the message.</p>
<p>At the receiving end, the operation was reversed. The operator set the machine to the initial settings and typed in the first six letters of the message (<i>XHTLOA</i>). In this example, <i>EINEIN</i> emerged on the lamps. After moving his rotors to <i>EIN</i>, the receiving operator then typed in the rest of the ciphertext, deciphering the message.</p>
<p>The weakness in this indicator scheme came from two factors. First, use of a global ground setting—this was later changed so the operator selected his initial position to encrypt the indicator, and sent the initial position in the clear. The second problem was the repetition of the indicator, which was a serious security flaw. The message setting was encoded twice, resulting in a relation between first and fourth, second and fifth, and third and sixth character. This security problem enabled the <a href="/wiki/Polish_Cipher_Bureau" title="Polish Cipher Bureau" class="mw-redirect">Polish Cipher Bureau</a> to break into the pre-war Enigma system as early as 1932. However, from 1940 on, the Germans changed the procedures to increase the security.</p>
<p>During World War II, codebooks were only used each day to set up the rotors, their ring settings and the plugboard. For each message, the operator selected a random start position, let's say <i>WZA</i>, and a random message key, perhaps <i>SXT</i>. He moved the rotors to the <i>WZA</i> start position and encoded the message key <i>SXT</i>. Assume the result was <i>UHL</i>. He then set up the message key, <i>SXT</i>, as the start position and encrypted the message. Next, he transmitted the start position, <i>WZA</i>, the encoded message key, <i>UHL</i>, and then the ciphertext. The receiver set up the start position according to the first trigram, <i>WZA</i>, and decoded the second trigram, <i>UHL</i>, to obtain the <i>SXT</i> message setting. Next, he used this <i>SXT</i> message setting as the start position to decrypt the message. This way, each ground setting was different and the new procedure avoided the security flaw of double encoded message settings.<sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span>[</span>20<span>]</span></a></sup></p>
<p>This procedure was used by <i>Wehrmacht</i> and <i>Luftwaffe</i> only. The <i>Kriegsmarine</i> procedures on sending messages with the Enigma were far more complex and elaborate. Prior to encryption with the Enigma, the message was encoded using the <i>Kurzsignalheft</i> code book. The <i>Kurzsignalheft</i> contained tables to convert sentences into four-letter groups. A great many choices were included, for example, logistic matters such as refueling and rendezvous with supply ships, positions and grid lists, harbor names, countries, weapons, weather conditions, enemy positions and ships, date and time tables. Another codebook contained the <i>Kenngruppen</i> and <i>Spruchschlüssel</i>: the key identification and message key.<sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span>[</span>21<span>]</span></a></sup></p>
<h3><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=13" title="Edit section: Some details">edit</a>]</span> <span class="mw-headline" id="Some_details">Some details</span></h3>
<p>The Army Enigma machine used only the 26 alphabet characters. Signs were replaced with rare character combinations. A space was omitted or replaced with an X. The X was generally used as point or full-stop.</p>
<p>Some signs were different in other parts of the armed forces. The <i>Wehrmacht</i> replaced a comma with ZZ and the question sign with FRAGE or FRAQ.</p>
<p>The <i>Kriegsmarine</i> replaced the comma with Y and the question sign with UD. The combination CH, as in "Acht" (eight) or "Richtung" (direction), was replaced with Q (AQT, RIQTUNG). Two, three and four zeros were replaced with CENTA, MILLE and MYRIA.</p>
<p>The <i>Wehrmacht</i> and the <i>Luftwaffe</i> transmitted messages in groups of five characters.</p>
<p>The <i>Kriegsmarine</i>, using the four rotor Enigma, had four-character groups. Frequently-used names or words were to be varied as much as possible. Words like <i>Minensuchboot</i> (minesweeper) could be written as MINENSUCHBOOT, MINBOOT, MMMBOOT or MMM354. To make cryptanalysis harder, it was forbidden to use more than 250 characters in a single message. Longer messages were divided into several parts, each using its own message key.<sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span>[</span>22<span>]</span></a></sup><sup id="cite_ref-22" class="reference"><a href="#cite_note-22"><span>[</span>23<span>]</span></a></sup><br clear="all" /></p>
<h2><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=14" title="Edit section: History of the machine">edit</a>]</span> <span class="mw-headline" id="History_of_the_machine">History of the machine</span></h2>
<p>Far from being a single design, there are numerous models and variants of the Enigma family. The earliest Enigma machines were commercial models dating from the early 1920s. Starting in the mid-1920s, the various branches of the German military began to use Enigma, making a number of changes in order to increase its security. In addition, a number of other nations either adopted or adapted the Enigma design for their own cipher machines.</p>
<table style="margin: 1em auto 0 auto;">
<tr>
<td>
<div class="thumb tright">
<div class="thumbinner" style="width:442px;"><a href="/wiki/File:Enigmas.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/f/f3/Enigmas.jpg/440px-Enigmas.jpg" width="440" height="196" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Enigmas.jpg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
A selection of seven Enigma machines and paraphernalia exhibited at the USA's <a href="/wiki/National_Cryptologic_Museum" title="National Cryptologic Museum">National Cryptologic Museum</a>. From left to right, the models are: 1) Commercial Enigma; 2) Enigma T; 3) Enigma G; 4) Unidentified; 5) <i>Luftwaffe</i> (Air Force) Enigma; 6) <i>Heer</i> (Army) Enigma; 7) <i>Kriegsmarine</i> (Naval) Enigma—M4.</div>
</div>
</div>
</td>
</tr>
</table>
<h3><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=15" title="Edit section: Commercial Enigma">edit</a>]</span> <span class="mw-headline" id="Commercial_Enigma">Commercial Enigma</span></h3>
<div class="thumb tright">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Scherbius-1928-patent.png" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/b/b3/Scherbius-1928-patent.png/220px-Scherbius-1928-patent.png" width="220" height="139" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Scherbius-1928-patent.png" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
Scherbius's Enigma patent—<span><a rel="nofollow" class="external text" href="http://www.google.com/patents?vid=1657411">U.S. Patent 1,657,411</a></span>, granted in 1928.</div>
</div>
</div>
<p>On 23 February 1918, German engineer <a href="/wiki/Arthur_Scherbius" title="Arthur Scherbius">Arthur Scherbius</a> applied for a patent for a cipher machine using rotors and, with E. Richard Ritter, founded the firm of Scherbius &amp; Ritter. They approached the German Navy and Foreign Office with their design, but neither was interested. They then assigned the patent rights to Gewerkschaft Securitas, who founded the <i>Chiffriermaschinen Aktien-Gesellschaft</i> (Cipher Machines Stock Corporation) on 9 July 1923; Scherbius and Ritter were on the board of directors.</p>
<p>Chiffriermaschinen AG began advertising a rotor machine — <i>Enigma model A</i> — which was exhibited at the Congress of the <a href="/wiki/Universal_Postal_Union" title="Universal Postal Union">International Postal Union</a> in 1923-1924. The machine was heavy and bulky, incorporating a <a href="/wiki/Typewriter" title="Typewriter">typewriter</a>. It measured 65×45×35&#160;cm and weighed about 50&#160;kg (110&#160;lb).</p>
<div class="thumb tright">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Enigma-8-rotor.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/b/be/Enigma-8-rotor.jpg/220px-Enigma-8-rotor.jpg" width="220" height="331" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Enigma-8-rotor.jpg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
A rare 8-rotor printing Enigma.</div>
</div>
</div>
<p>In 1925 Enigma <i>model B</i> was introduced, and was of a similar construction.<sup id="cite_ref-23" class="reference"><a href="#cite_note-23"><span>[</span>24<span>]</span></a></sup> While bearing the Enigma name, both models <i>A</i> and <i>B</i> were quite unlike later versions: they differed in physical size and shape, but also cryptographically, in that they lacked the reflector.</p>
<p>The reflector — an idea suggested by Scherbius's colleague <a href="/w/index.php?title=Willi_Korn&amp;action=edit&amp;redlink=1" class="new" title="Willi Korn (page does not exist)">Willi Korn</a> — was first introduced in the <i>Enigma C</i> (1926) model. The reflector is a key feature of the Enigma machines.</p>
<p><i>Model C</i> was smaller and more portable than its predecessors. It lacked a typewriter, relying instead on the operator reading the lamps; hence the alternative name of "glowlamp Enigma" to distinguish from models <i>A</i> and <i>B</i>.</p>
<p>The <i>Enigma C</i> quickly became extinct, giving way to the <i>Enigma D</i> (1927). This version was widely used, with examples going to <a href="/wiki/Sweden" title="Sweden">Sweden</a>, the <a href="/wiki/Netherlands" title="Netherlands">Netherlands</a>, <a href="/wiki/United_Kingdom" title="United Kingdom">United Kingdom</a>, <a href="/wiki/Japan" title="Japan">Japan</a>, <a href="/wiki/Italy" title="Italy">Italy</a>, <a href="/wiki/Spain" title="Spain">Spain</a>, <a href="/wiki/United_States" title="United States">United States</a>, and <a href="/wiki/Poland" title="Poland">Poland</a>.</p>
<p><br style="clear:both;" /></p>
<h3><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=16" title="Edit section: Military Enigma">edit</a>]</span> <span class="mw-headline" id="Military_Enigma">Military Enigma</span></h3>
<div class="thumb tright">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Bundesarchiv_Bild_101I-241-2173-09,_Russland,_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/7/74/Bundesarchiv_Bild_101I-241-2173-09%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg/220px-Bundesarchiv_Bild_101I-241-2173-09%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg" width="220" height="146" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Bundesarchiv_Bild_101I-241-2173-09,_Russland,_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
Enigma in use on the Russian front</div>
</div>
</div>
<p>The Navy was the first branch of the German military to adopt Enigma. This version, named <i>Funkschlüssel C</i> ("Radio cipher C"), had been put into production by 1925 and was introduced into service in 1926.<sup id="cite_ref-early-mil-enigma_24-0" class="reference"><a href="#cite_note-early-mil-enigma-24"><span>[</span>25<span>]</span></a></sup></p>
<p>The keyboard and lampboard contained 29 letters—A-Z, Ä, Ö and Ü—which were arranged alphabetically, as opposed to the QWERTZU ordering.<sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span>[</span>26<span>]</span></a></sup> The rotors had 28 contacts, with the letter <i>X</i> wired to bypass the rotors unencrypted.<sup id="cite_ref-Stripp_26-0" class="reference"><a href="#cite_note-Stripp-26"><span>[</span>27<span>]</span></a></sup></p>
<p>Three rotors were chosen from a set of five<sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span>[</span>28<span>]</span></a></sup> and the reflector could be inserted in one of four different positions, denoted α, β, γ and δ.<sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span>[</span>29<span>]</span></a></sup> The machine was revised slightly in July 1933.<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span>[</span>30<span>]</span></a></sup></p>
<p>By 15 July 1928,<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span>[</span>31<span>]</span></a></sup> the German Army (<i><a href="/wiki/Reichswehr" title="Reichswehr">Reichswehr</a></i>) had introduced their own version of the Enigma—the <i>Enigma G</i>, revised to the <i>Enigma I</i> by June 1930.<sup id="cite_ref-dc-97_31-0" class="reference"><a href="#cite_note-dc-97-31"><span>[</span>32<span>]</span></a></sup> Enigma I is also known as the <i>Wehrmacht</i>, or "Services" Enigma, and was used extensively by the German military services and other government organisations (such as the <a href="/wiki/Deutsche_Reichsbahn-Gesellschaft" title="Deutsche Reichsbahn-Gesellschaft" class="mw-redirect">railways</a><sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span>[</span>33<span>]</span></a></sup>), both before and during <a href="/wiki/World_War_II" title="World War II">World War II</a>.</p>
<p>The major difference between <i>Enigma I</i> and commercial Enigma models was the addition of a plugboard to swap pairs of letters, greatly increasing the cryptographic strength of the machine. Other differences included the use of a fixed reflector, and the relocation of the stepping notches from the rotor body to the movable letter rings.<sup id="cite_ref-dc-97_31-1" class="reference"><a href="#cite_note-dc-97-31"><span>[</span>32<span>]</span></a></sup> The machine measured 28×34×15&#160;cm (11&#160;in×13.5&#160;in×6&#160;in) and weighed around 12&#160;kg (26&#160;lb).<sup id="cite_ref-Stripp_26-1" class="reference"><a href="#cite_note-Stripp-26"><span>[</span>27<span>]</span></a></sup></p>
<p>By 1930, the Army had suggested that the Navy adopt their machine, citing the benefits of increased security (with the plugboard) and easier interservice communications.<sup id="cite_ref-kahn-43_33-0" class="reference"><a href="#cite_note-kahn-43-33"><span>[</span>34<span>]</span></a></sup> The Navy eventually agreed and in 1934<sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span>[</span>35<span>]</span></a></sup> brought into service the Navy version of the Army Enigma, designated <i>Funkschlüssel</i> ' or <i>M3</i>. While the Army used only three rotors at that time, for greater security the Navy specified a choice of three from a possible five.<sup id="cite_ref-dc-98_35-0" class="reference"><a href="#cite_note-dc-98-35"><span>[</span>36<span>]</span></a></sup></p>
<p>In December 1938, the Army issued two extra rotors so that the three rotors were chosen from a set of five.<sup id="cite_ref-dc-97_31-2" class="reference"><a href="#cite_note-dc-97-31"><span>[</span>32<span>]</span></a></sup> In 1938, the Navy added two more rotors, and then another in 1939 to allow a choice of three rotors from a set of eight.<sup id="cite_ref-dc-98_35-1" class="reference"><a href="#cite_note-dc-98-35"><span>[</span>36<span>]</span></a></sup> In August 1935, the Air Force also introduced the Wehrmacht Enigma for their communications.<sup id="cite_ref-dc-97_31-3" class="reference"><a href="#cite_note-dc-97-31"><span>[</span>32<span>]</span></a></sup></p>
<p>A four-rotor Enigma was introduced by the Navy for U-boat traffic on 1 February 1942, called <i>M4</i> (the network was known as <i>Triton</i>, or <i>Shark</i> to the Allies). The extra rotor was fitted in the same space by splitting the reflector into a combination of a thin reflector and a thin fourth rotor.</p>
<p>There was also a large, eight-rotor printing model, the <i>Enigma II</i>. In 1933 the <a href="/wiki/Polish_Cipher_Bureau" title="Polish Cipher Bureau" class="mw-redirect">Polish Cipher Bureau</a> detected that it was in use for high-level military communications, but that it was soon withdrawn from use after it was found to be unreliable and to jam frequently.<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span>[</span>37<span>]</span></a></sup></p>
<p>The <i><a href="/wiki/Abwehr" title="Abwehr">Abwehr</a></i> used the <i>Enigma G</i> (the <i>Abwehr</i> Enigma). This Enigma variant was a four-wheel unsteckered machine with multiple notches on the rotors. This model was equipped with a counter which incremented upon each key press, and so is also known as the "counter machine" or the <i>Zählwerk</i> Enigma.</p>
<p>Other countries also used Enigma machines. The Italian Navy adopted the commercial Enigma as "Navy Cipher D"; the Spanish also used commercial Enigma during their <a href="/wiki/Spanish_Civil_War" title="Spanish Civil War">Civil War</a>. British codebreakers succeeded in breaking these machines, which lacked a plugboard.<sup id="cite_ref-37" class="reference"><a href="#cite_note-37"><span>[</span>38<span>]</span></a></sup></p>
<p>The Swiss used a version of Enigma called <i>model K</i> or <i>Swiss K</i> for military and diplomatic use, which was very similar to the commercial Enigma D. The machine was broken by a number of parties, including Poland, France, Britain and the United States (the latter codenamed it INDIGO). An <i>Enigma T</i> model (codenamed <i>Tirpitz</i>) was manufactured for use by the Japanese.</p>
<p>It has been estimated that 100,000 Enigma machines were constructed.<sup id="cite_ref-Bauer-112_38-0" class="reference"><a href="#cite_note-Bauer-112-38"><span>[</span>39<span>]</span></a></sup> After the end of World War II, the Allies sold captured Enigma machines, still widely considered secure, to a number of developing countries.<sup id="cite_ref-Bauer-112_38-1" class="reference"><a href="#cite_note-Bauer-112-38"><span>[</span>39<span>]</span></a></sup></p>
<ul class="gallery" style="max-width: 489px;_width: 489px;">
<li class="gallerybox" style="width: 155px">
<div style="width: 155px">
<div class="thumb" style="width: 150px;">
<div style="margin:15px auto;"><a href="/wiki/File:Enigma-G.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/4/49/Enigma-G.jpg/82px-Enigma-G.jpg" width="82" height="120" /></a></div>
</div>
<div class="gallerytext">
<p>Enigma G, used by the <i><a href="/wiki/Abwehr" title="Abwehr">Abwehr</a></i>, had four rotors, no plugboard, and multiple notches on the rotors.</p>
</div>
</div>
</li>
<li class="gallerybox" style="width: 155px">
<div style="width: 155px">
<div class="thumb" style="width: 150px;">
<div style="margin:15px auto;"><a href="/wiki/File:Enigma-IMG_0484-black.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/3/31/Enigma-IMG_0484-black.jpg/120px-Enigma-IMG_0484-black.jpg" width="120" height="120" /></a></div>
</div>
<div class="gallerytext">
<p>The Enigma-K used by the Swiss Army sported three rotors and a reflector, and no plugboard. It was made in Germany, but had locally re-wired rotors and an additional lamp panel.</p>
</div>
</div>
</li>
<li class="gallerybox" style="width: 155px">
<div style="width: 155px">
<div class="thumb" style="width: 150px;">
<div style="margin:18px auto;"><a href="/wiki/File:Four-rotor-enigma.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Four-rotor-enigma.jpg/120px-Four-rotor-enigma.jpg" width="120" height="114" /></a></div>
</div>
<div class="gallerytext">
<p>An Enigma model T (Tirpitz)—a modified commercial Enigma K manufactured for use by the Japanese.</p>
</div>
</div>
</li>
<li class="gallerybox" style="width: 155px">
<div style="width: 155px">
<div class="thumb" style="width: 150px;">
<div style="margin:15px auto;"><a href="/wiki/File:Enigma_Decoder_Machine.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/0b/Enigma_Decoder_Machine.jpg/90px-Enigma_Decoder_Machine.jpg" width="90" height="120" /></a></div>
</div>
<div class="gallerytext">
<p>An Enigma machine in Britain's Imperial War Museum</p>
</div>
</div>
</li>
<li class="gallerybox" style="width: 155px">
<div style="width: 155px">
<div class="thumb" style="width: 150px;">
<div style="margin:15px auto;"><a href="/wiki/File:Bundesarchiv_Bild_101I-241-2173-06,_Russland,_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/e/ef/Bundesarchiv_Bild_101I-241-2173-06%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg/80px-Bundesarchiv_Bild_101I-241-2173-06%2C_Russland%2C_Verschl%C3%BCsselungsger%C3%A4t_Enigma.jpg" width="80" height="120" /></a></div>
</div>
<div class="gallerytext">
<p>Enigma in use in Russia (image Bundesarchiv)</p>
</div>
</div>
</li>
</ul>
<h2><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=17" title="Edit section: Breaking Enigma">edit</a>]</span> <span class="mw-headline" id="Breaking_Enigma">Breaking Enigma</span></h2>
<div class="rellink relarticle mainarticle">Main article: <a href="/wiki/Cryptanalysis_of_the_Enigma" title="Cryptanalysis of the Enigma">Cryptanalysis of the Enigma</a></div>
<h2><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=18" title="Edit section: Surviving machines">edit</a>]</span> <span class="mw-headline" id="Surviving_machines">Surviving machines</span></h2>
<div class="thumb tright">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:US_M1_enigma_analog_3.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/3/33/US_M1_enigma_analog_3.jpg/220px-US_M1_enigma_analog_3.jpg" width="220" height="130" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:US_M1_enigma_analog_3.jpg" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
US Enigma replica on display at the <a href="/wiki/National_Cryptologic_Museum" title="National Cryptologic Museum">National Cryptologic Museum</a> in Fort Meade, Maryland, USA.</div>
</div>
</div>
<div class="thumb tright">
<div class="thumbinner" style="width:222px;"><a href="/wiki/File:Kriegsmarine_Enigma.png" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/7/7f/Kriegsmarine_Enigma.png/220px-Kriegsmarine_Enigma.png" width="220" height="270" class="thumbimage" /></a>
<div class="thumbcaption">
<div class="magnify"><a href="/wiki/File:Kriegsmarine_Enigma.png" class="internal" title="Enlarge"><img src="//bits.wikimedia.org/skins-1.18/common/images/magnify-clip.png" width="15" height="11" alt="" /></a></div>
A four–rotor, <i><a href="/wiki/Kriegsmarine" title="Kriegsmarine">Kriegsmarine</a></i> Enigma machine on display at the US National Cryptologic Museum</div>
</div>
</div>
<p>The effort to break the Enigma was not disclosed until the 1970s. Since then, interest in the Enigma machine has grown considerably and a number of Enigmas are on public display in museums around the world.</p>
<p>The <a href="/wiki/Deutsches_Museum" title="Deutsches Museum">Deutsches Museum</a> in <a href="/wiki/Munich" title="Munich">Munich</a> has both the three- and four-rotor German military variants, as well as several older civilian versions. Several Enigma machines are exhibited at National Codes Centre in <a href="/wiki/Bletchley_Park" title="Bletchley Park">Bletchley Park</a>, the <a href="/wiki/Science_Museum_(London)" title="Science Museum (London)">Science Museum</a> in <a href="/wiki/London" title="London">London</a>, at the <a href="/wiki/Polish_Army_Museum" title="Polish Army Museum">Polish Army Museum</a> in Warsaw, the <i><a href="/wiki/Swedish_Army_Museum" title="Swedish Army Museum">Armémuseum</a></i> (Swedish Army Museum) in <a href="/wiki/Stockholm" title="Stockholm">Stockholm</a>, the National Signals Museum in <a href="/wiki/Finland" title="Finland">Finland</a>, and at the <a href="/wiki/Australian_War_Memorial" title="Australian War Memorial">Australian War Memorial</a> and in the foyer of the <a href="/wiki/Defence_Signals_Directorate" title="Defence Signals Directorate">Defence Signals Directorate</a>, both in <a href="/wiki/Canberra" title="Canberra">Canberra</a>, Australia.</p>
<p>In the United States, Enigma machines can be seen at the <a href="/wiki/Computer_History_Museum" title="Computer History Museum">Computer History Museum</a> in <a href="/wiki/Mountain_View,_California" title="Mountain View, California">Mountain View, California</a>, at the <a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency's</a> <a href="/wiki/National_Cryptologic_Museum" title="National Cryptologic Museum">National Cryptologic Museum</a> at <a href="/wiki/Fort_George_G._Meade" title="Fort George G. Meade">Fort Meade</a>, Maryland, where visitors can try their hand at encrypting messages and deciphering code, and two machines that were acquired after the capture of <a href="/wiki/German_submarine_U-505" title="German submarine U-505"><i>U-505</i></a> during World War II, are on display at the <a href="/wiki/Museum_of_Science_and_Industry_(Chicago)" title="Museum of Science and Industry (Chicago)">Museum of Science and Industry</a> in <a href="/wiki/Chicago" title="Chicago">Chicago</a>, Illinois. The now-defunct San Diego "Computer Museum of America" had an Enigma in its collection, which has since been given to the <a href="/wiki/San_Diego_State_University" title="San Diego State University">San Diego State University</a> Library.</p>
<p>The only Enigma machine in Canada, a Swiss Army issue Enigma-K, is in Calgary, Alberta. It is on permanent display at The Naval Museum Of Alberta inside the Military Museums Of Calgary.</p>
<p>A number of machines are also in private hands. Occasionally, Enigma machines are sold at auction; prices of US$40,000 are not unusual.<sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span>[</span>40<span>]</span></a></sup><sup id="cite_ref-40" class="reference"><a href="#cite_note-40"><span>[</span>41<span>]</span></a></sup> Replicas of the machine are available in various forms, including an exact reconstructed copy of the Naval M4 model, an Enigma implemented in electronics (Enigma-E), various computer software simulators and paper-and-scissors analogues.</p>
<p>A rare <i>Abwehr</i> Enigma machine, designated G312, was stolen from the Bletchley Park museum on 1 April 2000. In September, a man identifying himself as "The Master" sent a note demanding £25,000 and threatened to destroy the machine if the ransom was not paid. In early October 2000, Bletchley Park officials announced that they would pay the ransom but the stated deadline passed with no word from the blackmailer. Shortly afterwards, the machine was sent anonymously to BBC journalist <a href="/wiki/Jeremy_Paxman" title="Jeremy Paxman">Jeremy Paxman</a>, but three rotors were missing.</p>
<p>In November 2000, an antiques dealer named Dennis Yates was arrested after telephoning <i><a href="/wiki/The_Sunday_Times" title="The Sunday Times">The Sunday Times</a></i> to arrange the return of the missing parts. The Enigma machine was returned to Bletchley Park after the incident. In October 2001, Yates was sentenced to 10 months in prison after admitting handling the stolen machine and demanding ransom for its return, although he maintained that he was acting as an intermediary for a third party.<sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span>[</span>42<span>]</span></a></sup> Yates was released from prison after serving three months.</p>
<p>In October 2008, the Spanish daily newspaper <i><a href="/wiki/El_Pa%C3%ADs" title="El País">El País</a></i> reported that 28 Enigma machines had been discovered by chance in an attic of the Army headquarters in Madrid during inventory taking. These 4-rotor commercial machines had helped Franco's Nationalists win the <a href="/wiki/Spanish_Civil_War" title="Spanish Civil War">Spanish Civil War</a> because, although the British code breaker <a href="/wiki/Alfred_Dilwyn_Knox" title="Alfred Dilwyn Knox" class="mw-redirect">Alfred Dilwyn Knox</a> broke the code generated by Franco's Enigma machines in 1937, this was not disclosed to the Republicans and they could not break the code. The Nationalist government continued to use Enigma machines into the 1950s, eventually having a total of 50. Some of the 28 machines are now on display in Spanish military museums.<sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span>[</span>43<span>]</span></a></sup></p>
<h2><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=19" title="Edit section: Derivatives">edit</a>]</span> <span class="mw-headline" id="Derivatives">Derivatives</span></h2>
<p>The Enigma was influential in the field of cipher machine design, and a number of other rotor machines are derived from it. The British <a href="/wiki/Typex" title="Typex">Typex</a> was originally derived from the Enigma patents; Typex even includes features from the patent descriptions that were omitted from the actual Enigma machine. Owing to the need for secrecy about its cipher systems, no royalties were paid for the use of the patents by the British government. The Typex implementation of the Enigma transform is not the same as the transform found in almost all of the German or other Axis implementations of the machine.</p>
<p>A Japanese Enigma clone was codenamed GREEN by American cryptographers. Little used, it contained four rotors mounted vertically. In the U.S., cryptologist <a href="/wiki/William_F._Friedman" title="William F. Friedman">William Friedman</a> designed the <a href="/wiki/M-325" title="M-325">M-325</a>, a machine similar to Enigma in logical operation, although not in construction.</p>
<p>A unique rotor machine was constructed in 2002 by <a href="/wiki/Netherlands" title="Netherlands">Netherlands</a>-based Tatjana van Vark. This unusual device was inspired by Enigma but makes use of 40-point rotors, allowing letters, numbers and some punctuation to be used; each rotor contains 509 parts.<sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span>[</span>44<span>]</span></a></sup></p>
<p>Machines like the <a href="/wiki/SIGABA" title="SIGABA">SIGABA</a>, <a href="/wiki/NEMA_(machine)" title="NEMA (machine)">NEMA</a>, <a href="/wiki/Typex" title="Typex">Typex</a> and so forth, are deliberately not considered to be Enigma derivatives as their internal ciphering functions are not mathematically identical to the Enigma transform.</p>
<p>Several software implementations of Enigma machines do exist, but not all are <a href="/wiki/State_machine" title="State machine" class="mw-redirect">state machine</a> compliant with the Enigma family. The most commonly used software derivative (that is not compliant with any hardware implementation of the Enigma) is at <a rel="nofollow" class="external text" href="http://enigmaco.de/">Enigma.co.de</a>. Many Java applet Enigmas only accept single letter entry, making use difficult even if the applet is Enigma state machine compliant. Technically <a rel="nofollow" class="external text" href="http://www.enigmaathome.net/">Enigma@home</a> is the largest scale deployment of a software Enigma, but the decoding software does not implement encipherment making it a derivative (as all original machines could cipher and decipher).</p>
<p>On the other hand, there is a very user-friendly 3-rotor simulator here: <a rel="nofollow" class="external free" href="http://w1tp.com/enigma/enigma_w.zip">http://w1tp.com/enigma/enigma_w.zip</a> where users can select rotors, use the plugboard as well as defining new settings to the rotors and reflectors. The output is in separate windows which can be independently made "invisible" to hide decryption. A 32-bit version of this simulator can be found here&#160;: <a rel="nofollow" class="external free" href="http://membres.lycos.fr/pc1/enigma">http://membres.lycos.fr/pc1/enigma</a></p>
<p>A more complex version is here: <a rel="nofollow" class="external free" href="http://w1tp.com/enigma/EnigmaSim.zip">http://w1tp.com/enigma/EnigmaSim.zip</a> which includes an "autotyping" function which takes plaintext from a clipboard and converts it to cyphertext (or vice-versa) at one of four speeds. The "very fast" option runs through 26 characters in less than one second.</p>
<p>There currently are no known open source projects to implement the Enigma in logic gates using either <a href="/wiki/Register_transfer_level" title="Register transfer level" class="mw-redirect">RTL</a> or <a href="/wiki/VHDL" title="VHDL">VHDL</a> logic gate markup languages.</p>
<ul class="gallery">
<li class="gallerybox" style="width: 155px">
<div style="width: 155px">
<div class="thumb" style="width: 150px;">
<div style="margin:30px auto;"><a href="/wiki/File:Japanese_secure_teletype_2.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/0f/Japanese_secure_teletype_2.jpg/120px-Japanese_secure_teletype_2.jpg" width="120" height="90" /></a></div>
</div>
<div class="gallerytext">
<p>A Japanese Enigma clone, codenamed GREEN by American cryptographers.</p>
</div>
</div>
</li>
<li class="gallerybox" style="width: 155px">
<div style="width: 155px">
<div class="thumb" style="width: 150px;">
<div style="margin:36.5px auto;"><a href="/wiki/File:Tatjavanavark-machine.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/0/02/Tatjavanavark-machine.jpg/120px-Tatjavanavark-machine.jpg" width="120" height="77" /></a></div>
</div>
<div class="gallerytext">
<p>Tatjana van Vark's Enigma-inspired rotor machine.</p>
</div>
</div>
</li>
<li class="gallerybox" style="width: 155px">
<div style="width: 155px">
<div class="thumb" style="width: 150px;">
<div style="margin:15px auto;"><a href="/wiki/File:Enigma_simulator-IMG_0515-black.jpg" class="image"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/b/be/Enigma_simulator-IMG_0515-black.jpg/120px-Enigma_simulator-IMG_0515-black.jpg" width="120" height="120" /></a></div>
</div>
<div class="gallerytext">
<p>Electronic implementation of an Enigma machine, sold at the Bletchley Park souvenir shop</p>
</div>
</div>
</li>
</ul>
<p><br style="clear:both;" /></p>
<h2><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=20" title="Edit section: Fiction">edit</a>]</span> <span class="mw-headline" id="Fiction">Fiction</span></h2>
<p>The play <i><a href="/wiki/Breaking_the_Code" title="Breaking the Code">Breaking the Code</a></i>, dramatised by <a href="/wiki/Hugh_Whitemore" title="Hugh Whitemore">Hugh Whitemore</a>, is about the life and death of <a href="/wiki/Alan_Turing" title="Alan Turing">Alan Turing</a>, who was the central force in continuing to break the Enigma in <a href="/wiki/United_Kingdom" title="United Kingdom">Britain</a> during <a href="/wiki/World_War_II" title="World War II">World War II</a>. Turing was played by <a href="/wiki/Derek_Jacobi" title="Derek Jacobi">Derek Jacobi</a>, who also played Turing in a 1996 television adaptation of the play. Although it is a drama and thus takes artistic license, it is nonetheless a fundamentally accurate account.</p>
<p><a href="/wiki/Robert_Harris_(novelist)" title="Robert Harris (novelist)">Robert Harris</a>'s 1995 novel <i>Enigma</i> is set against the backdrop of World War II <a href="/wiki/Bletchley_Park" title="Bletchley Park">Bletchley Park</a> and cryptologists working to read Naval Enigma in <a href="/wiki/Hut_8" title="Hut 8">Hut 8</a>. The book, with substantial changes in plot, was made into the 2001 film <i><a href="/wiki/Enigma_(2001_film)" title="Enigma (2001 film)">Enigma</a>,</i> directed by <a href="/wiki/Michael_Apted" title="Michael Apted">Michael Apted</a> and starring <a href="/wiki/Kate_Winslet" title="Kate Winslet">Kate Winslet</a> and <a href="/wiki/Dougray_Scott" title="Dougray Scott">Dougray Scott</a>. The film has been criticized for many historical inaccuracies, including neglect of the role of <a href="/wiki/Poland" title="Poland">Poland</a>'s <i><a href="/wiki/Biuro_Szyfr%C3%B3w" title="Biuro Szyfrów">Biuro Szyfrów</a></i> in breaking the Enigma cipher and showing the British how to do it. The film—like the book—makes a Pole the villain, who seeks to betray the secret of Enigma decryption.<sup id="cite_ref-44" class="reference"><a href="#cite_note-44"><span>[</span>45<span>]</span></a></sup></p>
<p>An earlier Polish film dealing with Polish aspects of the subject was the 1979 <i><a href="/wiki/Sekret_Enigmy" title="Sekret Enigmy">Sekret Enigmy</a></i>, whose title translates as <i>The Enigma Secret</i>.<sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span>[</span>46<span>]</span></a></sup></p>
<p><a href="/wiki/Wolfgang_Petersen" title="Wolfgang Petersen">Wolfgang Petersen</a>'s 1981 film <i><a href="/wiki/Das_Boot" title="Das Boot">Das Boot</a></i> includes an Enigma machine which is evidently a four-rotor Kriegsmarine variant. It appears in many scenes, which probably capture well the flavour of day-to-day Enigma use aboard a <a href="/wiki/World_War_II" title="World War II">World War II</a> U-Boat. The plot of <i><a href="/wiki/U-571_(film)" title="U-571 (film)">U-571</a></i>, released in 2000, revolves around an attempt to seize an Enigma machine from a German U-boat.</p>
<p>An Enigma machine makes a very brief appearance in the 1980s TV show <i><a href="/wiki/Whiz_Kids_(TV_series)" title="Whiz Kids (TV series)">Whiz Kids</a></i>, episode 12.</p>
<p><a href="/wiki/Neal_Stephenson" title="Neal Stephenson">Neal Stephenson</a>'s novel <i><a href="/wiki/Cryptonomicon" title="Cryptonomicon">Cryptonomicon</a></i> prominently features the Enigma machine and efforts by British and American cryptologists to break variants of it, and portrays the German <a href="/wiki/U-boat" title="U-boat">U-boat</a> command under <a href="/wiki/Karl_D%C3%B6nitz" title="Karl Dönitz">Karl Dönitz</a> using it in apparently deliberate ignorance of its having been broken.</p>
<p>In the comedy war film <i><a href="/wiki/All_the_Queen%27s_Men" title="All the Queen's Men">All the Queen's Men</a></i>, released in 2001 and starring <a href="/wiki/Matt_LeBlanc" title="Matt LeBlanc">Matt LeBlanc</a> alongside <a href="/wiki/Eddie_Izzard" title="Eddie Izzard">Eddie Izzard</a>, four World War II Allied soldiers are parachuted into Germany, where, dressed as women, they attempt to steal an Enigma machine. They eventually learn that the Allies already had the machine and that the mission was a ruse intended to mislead the Germans into thinking that Enigma was a closed book to the Allies.</p>
<p><i>EnigmaWarsaw</i> is an outdoor city game in <a href="/wiki/Warsaw" title="Warsaw">Warsaw</a> organised by StayPoland travel agency. This <a href="/wiki/Treasure_hunt" title="Treasure hunt" class="mw-redirect">treasure hunt</a> game is devised to help the players imagine pre-war Warsaw. EnigmaWarsaw is named to commemorate the pioneering work of Polish cryptographers <a href="/wiki/Marian_Rejewski" title="Marian Rejewski">Marian Rejewski</a>, <a href="/wiki/Jerzy_R%C3%B3%C5%BCycki" title="Jerzy Różycki">Jerzy Różycki</a>, and <a href="/wiki/Henryk_Zygalski" title="Henryk Zygalski">Henryk Zygalski</a> at decrypting the Enigma machine cipher.</p>
<p><i><a href="/wiki/To_Say_Nothing_of_the_Dog" title="To Say Nothing of the Dog">To Say Nothing of the Dog</a></i> is a science fiction novel about time traveling historians in which the importance of the Allies obtaining the German Enigma machine is heavily stressed.</p>
<p>In the TV show <i><a href="/wiki/Sanctuary_(TV_Series)" title="Sanctuary (TV Series)" class="mw-redirect">Sanctuary</a></i>, the deciphering of the Enigma cipher is credited to <a href="/wiki/Characters_of_Sanctuary#Nikola_Tesla" title="Characters of Sanctuary">Nikola Tesla</a> during the episode "Into the Black", released on June 20, 2011.</p>
<p>In Ian Fleming's <i>From Russia with Love</i>, released in 1957, the fictitious Spektor code machine, based on the real-life Enigma cipher machine, is used as a plot piece. This device would supposedly intercept Russian coded traffic and decipher it, allowing MI6's cryptanalysts to access decoded information.</p>
<h2><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=21" title="Edit section: Notes">edit</a>]</span> <span class="mw-headline" id="Notes">Notes</span></h2>
<div class="reflist references-column-count references-column-count-2" style="-moz-column-count: 2; -webkit-column-count: 2; column-count: 2; list-style-type: decimal;">
<ol class="references">
<li id="cite_note-0"><b><a href="#cite_ref-0">^</a></b> <span class="citation book"><a href="/wiki/Simon_Singh" title="Simon Singh">Singh, Simon</a> (1999). <i>The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography</i>. London: Fourth Estate. p.&#160;127. <a href="/wiki/International_Standard_Book_Number" title="International Standard Book Number">ISBN</a>&#160;<a href="/wiki/Special:BookSources/1-85702-879-1" title="Special:BookSources/1-85702-879-1">1-85702-879-1</a>.</span><span class="Z3988" title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+Code+Book%3A+The+Science+of+Secrecy+from+Ancient+Egypt+to+Quantum+Cryptography&amp;rft.aulast=Singh&amp;rft.aufirst=Simon&amp;rft.au=Singh%2C%26%2332%3BSimon&amp;rft.date=1999&amp;rft.pages=p.%26nbsp%3B127&amp;rft.place=London&amp;rft.pub=Fourth+Estate&amp;rft.isbn=1-85702-879-1&amp;rfr_id=info:sid/en.wikipedia.org:Enigma_machine"><span style="display: none;">&#160;</span></span></li>
<li id="cite_note-1"><b><a href="#cite_ref-1">^</a></b> <span class="citation web" id="CITEREFLord1998.E2.80.932010">Lord, Bob (1998–2010). <a rel="nofollow" class="external text" href="http://www.ilord.com/enigma-manual1937-english.html">"1937 Enigma Manual by: Jasper Rosal - English Translation"</a><span class="printonly">. <a rel="nofollow" class="external free" href="http://www.ilord.com/enigma-manual1937-english.html">http://www.ilord.com/enigma-manual1937-english.html</a></span><span class="reference-accessdate">. Retrieved 31 May 2011</span></span><span class="Z3988" title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=1937+Enigma+Manual+by%3A+Jasper+Rosal+-+English+Translation&amp;rft.atitle=&amp;rft.aulast=Lord&amp;rft.aufirst=Bob&amp;rft.au=Lord%2C%26%2332%3BBob&amp;rft.date=1998%E2%80%932010&amp;rft_id=http%3A%2F%2Fwww.ilord.com%2Fenigma-manual1937-english.html&amp;rfr_id=info:sid/en.wikipedia.org:Enigma_machine"><span style="display: none;">&#160;</span></span></li>
<li id="cite_note-2"><b><a href="#cite_ref-2">^</a></b> <a rel="nofollow" class="external free" href="http://www.codesandciphers.org.uk/virtualbp/poles/poles.htm">http://www.codesandciphers.org.uk/virtualbp/poles/poles.htm</a></li>
<li id="cite_note-3"><b><a href="#cite_ref-3">^</a></b> <span class="citation news">Peter, Laurence (20 July 2009). <a rel="nofollow" class="external text" href="http://news.bbc.co.uk/2/hi/europe/8158782.stm">"How Poles cracked Nazi Enigma secret"</a>. <i>BBC News</i><span class="printonly">. <a rel="nofollow" class="external free" href="http://news.bbc.co.uk/2/hi/europe/8158782.stm">http://news.bbc.co.uk/2/hi/europe/8158782.stm</a></span>.</span><span class="Z3988" title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.atitle=How+Poles+cracked+Nazi+Enigma+secret&amp;rft.jtitle=BBC+News&amp;rft.aulast=Peter&amp;rft.aufirst=Laurence&amp;rft.au=Peter%2C%26%2332%3BLaurence&amp;rft.date=20+July+2009&amp;rft_id=http%3A%2F%2Fnews.bbc.co.uk%2F2%2Fhi%2Feurope%2F8158782.stm&amp;rfr_id=info:sid/en.wikipedia.org:Enigma_machine"><span style="display: none;">&#160;</span></span></li>
<li id="cite_note-4"><b><a href="#cite_ref-4">^</a></b> <a href="/wiki/Gordon_Welchman" title="Gordon Welchman">Gordon Welchman</a>, who became head of <a href="/wiki/Hut_6" title="Hut 6">Hut 6</a> at Bletchley Park, has written: "Hut 6 <a href="/wiki/Ultra" title="Ultra">Ultra</a> would never have gotten off the ground if we had not learned from the Poles, in the nick of time, the details both of the German military version of the commercial Enigma machine, and of the operating procedures that were in use." <a href="/wiki/Gordon_Welchman" title="Gordon Welchman">Gordon Welchman</a>, <i>The Hut Six Story</i>, 1982, p. 289.</li>
<li id="cite_note-5"><b><a href="#cite_ref-5">^</a></b> Much of the German cipher traffic was encrypted on the Enigma machine, hence the term "Ultra" has often been used almost synonymously with "<a href="/wiki/Cryptanalysis_of_the_Enigma" title="Cryptanalysis of the Enigma">Enigma decrypts</a>". However, Ultra also encompassed decrypts of the German <a href="/wiki/Lorenz_cipher" title="Lorenz cipher">Lorenz SZ 40 and 42 machines</a> that were used by the German High Command, and decrypts of <a href="/wiki/C-36_(cipher_machine)" title="C-36 (cipher machine)">Hagelin ciphers</a> and of other Italian ciphers and codes, as well as of Japanese ciphers and codes such as <a href="/wiki/Purple_(cipher_machine)" title="Purple (cipher machine)">Purple</a> and <a href="/wiki/JN-25" title="JN-25" class="mw-redirect">JN-25</a>.</li>
<li id="cite_note-6"><b><a href="#cite_ref-6">^</a></b> Kahn (1991).</li>
<li id="cite_note-engima_cryptographic_mathematics-7">^ <a href="#cite_ref-engima_cryptographic_mathematics_7-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-engima_cryptographic_mathematics_7-1"><sup><i><b>b</b></i></sup></a> <span class="citation Journal" id="CITEREFMiller2001">Miller, A. Ray (2001). <a rel="nofollow" class="external text" href="http://www.nsa.gov/about/_files/cryptologic_heritage/publications/wwii/engima_cryptographic_mathematics.pdf"><i>The Cryptographic Mathematics of Enigma</i></a>. National Security Agency<span class="printonly">. <a rel="nofollow" class="external free" href="http://www.nsa.gov/about/_files/cryptologic_heritage/publications/wwii/engima_cryptographic_mathematics.pdf">http://www.nsa.gov/about/_files/cryptologic_heritage/publications/wwii/engima_cryptographic_mathematics.pdf</a></span></span><span class="Z3988" title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+Cryptographic+Mathematics+of+Enigma&amp;rft.aulast=Miller&amp;rft.aufirst=A.+Ray&amp;rft.au=Miller%2C%26%2332%3BA.+Ray&amp;rft.date=2001&amp;rft.pub=National+Security+Agency&amp;rft_id=http%3A%2F%2Fwww.nsa.gov%2Fabout%2F_files%2Fcryptologic_heritage%2Fpublications%2Fwwii%2Fengima_cryptographic_mathematics.pdf&amp;rfr_id=info:sid/en.wikipedia.org:Enigma_machine"><span style="display: none;">&#160;</span></span></li>
<li id="cite_note-8"><b><a href="#cite_ref-8">^</a></b> <a href="/wiki/Bletchley_Park" title="Bletchley Park">Bletchley Park</a> veteran and historian <a href="/wiki/Harry_Hinsley" title="Harry Hinsley">F.H. Hinsley</a> is often cited as an authority for the two-year estimate, yet his assessment in <i>Codebreakers</i> is much less definitive: "Would the <a href="/wiki/Soviet_Union" title="Soviet Union">Soviets</a> meanwhile have defeated <a href="/wiki/Germany" title="Germany">Germany</a>, or Germany the Soviets, or would there have been stalemate on the eastern fronts? What would have been decided about the <a href="/wiki/Atom_bomb" title="Atom bomb" class="mw-redirect">atom bomb</a>? Not even <a href="/wiki/Counter-factual_history" title="Counter-factual history" class="mw-redirect">counter-factual historians</a> can answer such questions. They are questions which do not arise, because the war went as it did. But those historians who are concerned only with the war as it was must ask why it went as it did. And they need venture only a reasonable distance beyond the facts to recognise the extent to which the explanation lies in the influence of Ultra." <a href="/wiki/Harry_Hinsley" title="Harry Hinsley">F.H. Hinsley</a>, "Introduction: The Influence of Ultra in the Second World War," <i>Codebreakers: The Inside Story of Bletchley Park</i>, edited by F.H. Hinsley and Alan Stripp, Oxford University Press, 1993, pp. 12–13.</li>
<li id="cite_note-9"><b><a href="#cite_ref-9">^</a></b> <a rel="nofollow" class="external free" href="http://www.history.co.uk/explore-history/ww2/code-breaking.html">http://www.history.co.uk/explore-history/ww2/code-breaking.html</a></li>
<li id="cite_note-10"><b><a href="#cite_ref-10">^</a></b> Kahn (1991), Hinsley and Stripp (1993).</li>
<li id="cite_note-Rijmenants-11">^ <a href="#cite_ref-Rijmenants_11-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Rijmenants_11-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Rijmenants_11-2"><sup><i><b>c</b></i></sup></a> Rijmenants, Dirk; <a rel="nofollow" class="external text" href="http://users.telenet.be/d.rijmenants/en/enigmatech.htm">Technical details of the Enigma machine</a> Cipher Machines &amp; Cryptology</li>
<li id="cite_note-doublestepping-12">^ <a href="#cite_ref-doublestepping_12-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-doublestepping_12-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-doublestepping_12-2"><sup><i><b>c</b></i></sup></a> David Hamer, "Enigma: Actions Involved in the 'Double-Stepping' of the Middle Rotor", <i>Cryptologia</i>, 21(1), January 1997, pp. 47–50, <a rel="nofollow" class="external text" href="http://www.eclipse.net/~dhamer/downloads/rotorpdf.zip">Online version (zipped PDF)</a></li>
<li id="cite_note-13"><b><a href="#cite_ref-13">^</a></b> <span class="citation web"><a href="/wiki/Anthony_Sale" title="Anthony Sale" class="mw-redirect">Sale, Tony</a>. <a rel="nofollow" class="external text" href="http://www.codesandciphers.org.uk/enigma/rotorspec.htm">"Technical specifications of the Enigma rotors"</a>. <i>Technical Specification of the Enigma</i><span class="printonly">. <a rel="nofollow" class="external free" href="http://www.codesandciphers.org.uk/enigma/rotorspec.htm">http://www.codesandciphers.org.uk/enigma/rotorspec.htm</a></span><span class="reference-accessdate">. Retrieved 2009-11-15</span>.</span><span class="Z3988" title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=Technical+specifications+of+the+Enigma+rotors&amp;rft.atitle=Technical+Specification+of+the+Enigma&amp;rft.aulast=Sale&amp;rft.aufirst=Tony&amp;rft.au=Sale%2C%26%2332%3BTony&amp;rft_id=http%3A%2F%2Fwww.codesandciphers.org.uk%2Fenigma%2Frotorspec.htm&amp;rfr_id=info:sid/en.wikipedia.org:Enigma_machine"><span style="display: none;">&#160;</span></span></li>
<li id="cite_note-14"><b><a href="#cite_ref-14">^</a></b> <a rel="nofollow" class="external free" href="http://www.cryptomuseum.com/crypto/enigma/lf/index.htm">http://www.cryptomuseum.com/crypto/enigma/lf/index.htm</a></li>
<li id="cite_note-ukwd-1-15"><b><a href="#cite_ref-ukwd-1_15-0">^</a></b> Philip Marks, "Umkehrwalze D: Enigma's Rewirable Reflector — Part I", Cryptologia 25(2), April 2001, pp. 101–141</li>
<li id="cite_note-16"><b><a href="#cite_ref-16">^</a></b> <span class="citation web">Reuvers, Paul (2008). <a rel="nofollow" class="external text" href="http://www.jproc.ca/crypto/enigma_acc.html">"Enigma accessories"</a><span class="printonly">. <a rel="nofollow" class="external free" href="http://www.jproc.ca/crypto/enigma_acc.html">http://www.jproc.ca/crypto/enigma_acc.html</a></span><span class="reference-accessdate">. Retrieved 22 July 2010</span></span><span class="Z3988" title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=Enigma+accessories&amp;rft.atitle=&amp;rft.aulast=Reuvers&amp;rft.aufirst=Paul&amp;rft.au=Reuvers%2C%26%2332%3BPaul&amp;rft.date=2008&amp;rft_id=http%3A%2F%2Fwww.jproc.ca%2Fcrypto%2Fenigma_acc.html&amp;rfr_id=info:sid/en.wikipedia.org:Enigma_machine"><span style="display: none;">&#160;</span></span></li>
<li id="cite_note-17"><b><a href="#cite_ref-17">^</a></b> <a href="#CITEREFRejewski1980">Rejewski 1980</a></li>
<li id="cite_note-18"><b><a href="#cite_ref-18">^</a></b> <span class="citation book"><a href="/wiki/William_F._Friedman" title="William F. Friedman">Friedman, W.F.</a> (1922). <i>The index of coincidence and its applications in cryptology</i>. Department of Ciphers. Publ 22. Geneva, Illinois, USA: Riverbank Laboratories. <a href="/wiki/Online_Computer_Library_Center" title="Online Computer Library Center">OCLC</a>&#160;<a rel="nofollow" class="external text" href="http://www.worldcat.org/oclc/55786052">55786052</a>.</span><span class="Z3988" title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+index+of+coincidence+and+its+applications+in+cryptology&amp;rft.aulast=Friedman&amp;rft.aufirst=W.F.&amp;rft.au=Friedman%2C%26%2332%3BW.F.&amp;rft.date=1922&amp;rft.series=Department+of+Ciphers.+Publ+22&amp;rft.place=Geneva%2C+Illinois%2C+USA&amp;rft.pub=Riverbank+Laboratories&amp;rft_id=info:oclcnum/55786052&amp;rfr_id=info:sid/en.wikipedia.org:Enigma_machine"><span style="display: none;">&#160;</span></span></li>
<li id="cite_note-19"><b><a href="#cite_ref-19">^</a></b> Rijmenants, Dirk; <a rel="nofollow" class="external text" href="http://users.telenet.be/d.rijmenants/en/enigmaproc.htm">Enigma message procedures</a> Cipher Machines &amp; Cryptology</li>
<li id="cite_note-20"><b><a href="#cite_ref-20">^</a></b> Rijmenants, Dirk; <a rel="nofollow" class="external text" href="http://users.telenet.be/d.rijmenants/en/kurzsignale.htm">Kurzsignalen on German U-boats</a> Cipher Machines &amp; Cryptology</li>
<li id="cite_note-21"><b><a href="#cite_ref-21">^</a></b> <span class="citation web"><a rel="nofollow" class="external text" href="http://www.codesandciphers.org.uk/documents/egenproc/eniggnix.htm">"The translated 1940 <i>Enigma General Procedure</i>"</a>. codesandciphers.org.uk<span class="printonly">. <a rel="nofollow" class="external free" href="http://www.codesandciphers.org.uk/documents/egenproc/eniggnix.htm">http://www.codesandciphers.org.uk/documents/egenproc/eniggnix.htm</a></span><span class="reference-accessdate">. Retrieved 2006-10-16</span>.</span><span class="Z3988" title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=The+translated+1940+%27%27Enigma+General+Procedure%27%27&amp;rft.atitle=&amp;rft.pub=codesandciphers.org.uk&amp;rft_id=http%3A%2F%2Fwww.codesandciphers.org.uk%2Fdocuments%2Fegenproc%2Feniggnix.htm&amp;rfr_id=info:sid/en.wikipedia.org:Enigma_machine"><span style="display: none;">&#160;</span></span></li>
<li id="cite_note-22"><b><a href="#cite_ref-22">^</a></b> <span class="citation web"><a rel="nofollow" class="external text" href="http://www.codesandciphers.org.uk/documents/officer/officerx.htm">"The translated 1940 <i>Enigma Officer and Staff Procedure</i>"</a>. codesandciphers.org.uk<span class="printonly">. <a rel="nofollow" class="external free" href="http://www.codesandciphers.org.uk/documents/officer/officerx.htm">http://www.codesandciphers.org.uk/documents/officer/officerx.htm</a></span><span class="reference-accessdate">. Retrieved 2006-10-16</span>.</span><span class="Z3988" title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=The+translated+1940+%27%27Enigma+Officer+and+Staff+Procedure%27%27&amp;rft.atitle=&amp;rft.pub=codesandciphers.org.uk&amp;rft_id=http%3A%2F%2Fwww.codesandciphers.org.uk%2Fdocuments%2Fofficer%2Fofficerx.htm&amp;rfr_id=info:sid/en.wikipedia.org:Enigma_machine"><span style="display: none;">&#160;</span></span></li>
<li id="cite_note-23"><b><a href="#cite_ref-23">^</a></b> <span class="citation web"><a rel="nofollow" class="external text" href="http://www.armyradio.com/publish/Articles/The_Enigma_Code_Breach/Pictures/enigma_type_b.jpg">"image of Enigma Type B"</a><span class="printonly">. <a rel="nofollow" class="external free" href="http://www.armyradio.com/publish/Articles/The_Enigma_Code_Breach/Pictures/enigma_type_b.jpg">http://www.armyradio.com/publish/Articles/The_Enigma_Code_Breach/Pictures/enigma_type_b.jpg</a></span>.</span><span class="Z3988" title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=image+of+Enigma+Type+B&amp;rft.atitle=&amp;rft_id=http%3A%2F%2Fwww.armyradio.com%2Fpublish%2FArticles%2FThe_Enigma_Code_Breach%2FPictures%2Fenigma_type_b.jpg&amp;rfr_id=info:sid/en.wikipedia.org:Enigma_machine"><span style="display: none;">&#160;</span></span></li>
<li id="cite_note-early-mil-enigma-24"><b><a href="#cite_ref-early-mil-enigma_24-0">^</a></b> Kahn, 1991, pp. 39–41, 299</li>
<li id="cite_note-25"><b><a href="#cite_ref-25">^</a></b> Ulbricht, 2005, p.4</li>
<li id="cite_note-Stripp-26">^ <a href="#cite_ref-Stripp_26-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Stripp_26-1"><sup><i><b>b</b></i></sup></a> Stripp, 1993</li>
<li id="cite_note-27"><b><a href="#cite_ref-27">^</a></b> Kahn, 1991, pp. 40, 299</li>
<li id="cite_note-28"><b><a href="#cite_ref-28">^</a></b> Bauer, 2000, p. 108</li>
<li id="cite_note-29"><b><a href="#cite_ref-29">^</a></b> Hinsley and Stripp, 1993, plate 3</li>
<li id="cite_note-30"><b><a href="#cite_ref-30">^</a></b> Kahn, 1991, pp. 41, 299</li>
<li id="cite_note-dc-97-31">^ <a href="#cite_ref-dc-97_31-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-dc-97_31-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-dc-97_31-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-dc-97_31-3"><sup><i><b>d</b></i></sup></a> Deavours and Kruh, 1985, p. 97</li>
<li id="cite_note-32"><b><a href="#cite_ref-32">^</a></b> Michael Smith <i>Station X</i>, four books (macmillan) 1998, Paperback 2000, <a href="/wiki/Special:BookSources/0752271482" class="internal mw-magiclink-isbn">ISBN 0-7522-7148-2</a>, Page 73</li>
<li id="cite_note-kahn-43-33"><b><a href="#cite_ref-kahn-43_33-0">^</a></b> Kahn, 1991, p. 43</li>
<li id="cite_note-34"><b><a href="#cite_ref-34">^</a></b> Kahn (1991, p. 43) says August 1934. Kruh and Deavours (2002, p. 15) say October 2004.</li>
<li id="cite_note-dc-98-35">^ <a href="#cite_ref-dc-98_35-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-dc-98_35-1"><sup><i><b>b</b></i></sup></a> Deavours and Kruh, 1985, p. 98</li>
<li id="cite_note-36"><b><a href="#cite_ref-36">^</a></b> Kozaczuk, 1984, p. 28.</li>
<li id="cite_note-37"><b><a href="#cite_ref-37">^</a></b> <a href="#CITEREFSmith2006">Smith 2006</a>, p.&#160;23</li>
<li id="cite_note-Bauer-112-38">^ <a href="#cite_ref-Bauer-112_38-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Bauer-112_38-1"><sup><i><b>b</b></i></sup></a> Bauer, 2000, p. 112</li>
<li id="cite_note-39"><b><a href="#cite_ref-39">^</a></b> Hamer, David; <i><a rel="nofollow" class="external text" href="http://www.eclipse.net/~dhamer/location.htm">Enigma machines - known locations*</a></i></li>
<li id="cite_note-40"><b><a href="#cite_ref-40">^</a></b> Hamer, David; <i><a rel="nofollow" class="external text" href="http://www.eclipse.net/~dhamer/enigma_p.htm">Selling prices of Enigma and NEMA - all prices converted to US$</a></i></li>
<li id="cite_note-41"><b><a href="#cite_ref-41">^</a></b> <span class="citation news"><a rel="nofollow" class="external text" href="http://news.bbc.co.uk/1/hi/uk/1609168.stm">"Man jailed over Enigma machine"</a>. <i>BBC News</i>. 19 October 2001<span class="printonly">. <a rel="nofollow" class="external free" href="http://news.bbc.co.uk/1/hi/uk/1609168.stm">http://news.bbc.co.uk/1/hi/uk/1609168.stm</a></span><span class="reference-accessdate">. Retrieved 2 May 2010</span>.</span><span class="Z3988" title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.atitle=Man+jailed+over+Enigma+machine&amp;rft.jtitle=BBC+News&amp;rft.date=19+October+2001&amp;rft_id=http%3A%2F%2Fnews.bbc.co.uk%2F1%2Fhi%2Fuk%2F1609168.stm&amp;rfr_id=info:sid/en.wikipedia.org:Enigma_machine"><span style="display: none;">&#160;</span></span></li>
<li id="cite_note-42"><b><a href="#cite_ref-42">^</a></b> Graham Keeley. <i><a rel="nofollow" class="external text" href="http://www.timesonline.co.uk/tol/news/world/europe/article5003411.ece">Nazi Enigma machines helped General Franco in Spanish Civil War</a></i> <a href="/wiki/The_Times" title="The Times">The Times</a> 24 October 2008. p 47</li>
<li id="cite_note-43"><b><a href="#cite_ref-43">^</a></b> van Vark, Tatjana <i><a rel="nofollow" class="external text" href="http://www.tatjavanvark.nl/tvv1/pht10.html">The coding machine</a></i></li>
<li id="cite_note-44"><b><a href="#cite_ref-44">^</a></b> Laurence Peter, <a rel="nofollow" class="external text" href="http://news.bbc.co.uk/2/hi/europe/8158782.stm">How Poles cracked Nazi Enigma secret</a>, BBC News, 20 July 2009</li>
<li id="cite_note-45"><b><a href="#cite_ref-45">^</a></b> <a rel="nofollow" class="external text" href="http://imdb.com/title/tt0079878/">Sekret Enigmy</a> (Film 1979) <a href="/wiki/Internet_Movie_Database" title="Internet Movie Database">Internet Movie Database</a></li>
</ol>
</div>
<h2><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=22" title="Edit section: References">edit</a>]</span> <span class="mw-headline" id="References">References</span></h2>
<div class="refbegin references-column-count references-column-count-2" style="-moz-column-count: 2; -webkit-column-count: 2; column-count: 2;">
<ul>
<li>Bauer, F. L. (2000). <i>Decrypted Secrets</i> (Springer, 2nd edition). <a href="/wiki/Special:BookSources/3540668713" class="internal mw-magiclink-isbn">ISBN 3-540-66871-3</a></li>
<li>Hamer, David H.; Sullivan, Geoff; Weierud, Frode (July 1998). "Enigma Variations: an Extended Family of Machines", <i>Cryptologia</i>, 22(3). <a rel="nofollow" class="external text" href="http://www.eclipse.net/~dhamer/downloads/enigvar1.zip">Online version (zipped PDF)</a>.</li>
<li>Stripp, Alan. "The Enigma Machine: Its Mechanism and Use" in Hinsley, F. H.; and Stripp, Alan (editors), <i>Codebreakers: The Inside Story of Bletchley Park</i> (1993), pp.&#160;83–88.</li>
<li><a href="/wiki/David_Kahn_(writer)" title="David Kahn (writer)">Kahn, David</a> (1991). <i>Seizing the Enigma: The Race to Break the German U-Boats Codes, 1939-1943</i> <a href="/wiki/Special:BookSources/0395427398" class="internal mw-magiclink-isbn">ISBN 0-395-42739-8</a>.</li>
<li><a href="/wiki/W%C5%82adys%C5%82aw_Kozaczuk" title="Władysław Kozaczuk">Kozaczuk, Władysław</a>, <i>Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two</i>, edited and translated by <a href="/wiki/Christopher_Kasparek" title="Christopher Kasparek">Christopher Kasparek</a>, Frederick, MD, University Publications of America, 1984, <a href="/wiki/Special:BookSources/0890935475" class="internal mw-magiclink-isbn">ISBN 0-89093-547-5</a>.</li>
<li><a href="/wiki/W%C5%82adys%C5%82aw_Kozaczuk" title="Władysław Kozaczuk">Kozaczuk, Władysław</a>. <i><a rel="nofollow" class="external text" href="http://www.enigmahistory.org/text.html">The origins of the Enigma/ULTRA</a></i></li>
<li>Kruh, Louis; Deavours, Cipher (2002). "The Commercial Enigma: Beginnings of Machine Cryptography", <i>Cryptologia</i>, 26(1), pp.&#160;1–16. <a rel="nofollow" class="external text" href="http://www.dean.usma.edu/math/pubs/cryptologia/classics.htm">Online version (PDF)</a></li>
<li>Marks, Philip; Weierud, Frode (January 2000). "Recovering the Wiring of Enigma's Umkehrwalze A", <i>Cryptologia</i> 24(1), pp55–66.</li>
<li><span class="citation Journal" id="CITEREFRejewski1980"><a href="/wiki/Marian_Rejewski" title="Marian Rejewski">Rejewski, Marian</a> (1980). <a rel="nofollow" class="external text" href="http://cryptocellar.org/">"An Application of the Theory of Permutations in Breaking the Enigma Cipher"</a>. <i>Applicationes mathematicae</i> <b>16</b> (4). <a href="/wiki/International_Standard_Serial_Number" title="International Standard Serial Number">ISSN</a>&#160;<a rel="nofollow" class="external text" href="http://www.worldcat.org/issn/1730-6280">1730-6280</a><span class="printonly">. <a rel="nofollow" class="external free" href="http://cryptocellar.org/">http://cryptocellar.org/</a></span></span><span class="Z3988" title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.atitle=An+Application+of+the+Theory+of+Permutations+in+Breaking+the+Enigma+Cipher&amp;rft.jtitle=Applicationes+mathematicae&amp;rft.aulast=Rejewski&amp;rft.aufirst=Marian&amp;rft.au=Rejewski%2C%26%2332%3BMarian&amp;rft.date=1980&amp;rft.volume=16&amp;rft.issue=4&amp;rft.issn=1730-6280&amp;rft_id=http%3A%2F%2Fcryptocellar.org%2F&amp;rfr_id=info:sid/en.wikipedia.org:Enigma_machine"><span style="display: none;">&#160;</span></span></li>
<li>Smith, Michael (1998). <i>Station X</i> (Macmillan) <a href="/wiki/Special:BookSources/0752271482" class="internal mw-magiclink-isbn">ISBN 0-7522-7148-2</a></li>
<li><span class="citation book" id="CITEREFSmith2006"><a href="/wiki/Michael_Smith_(newspaper_reporter)" title="Michael Smith (newspaper reporter)">Smith, Michael</a> (2006). "How it began: Bletchley Park Goes to War". In <a href="/wiki/Jack_Copeland" title="Jack Copeland">Copeland, B Jack</a>. <i>Colossus: The Secrets of Bletchley Park's Codebreaking Computers</i>. Oxford: Oxford University Press. <a href="/wiki/International_Standard_Book_Number" title="International Standard Book Number">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-19-284055-4" title="Special:BookSources/978-0-19-284055-4">978-0-19-284055-4</a></span><span class="Z3988" title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.btitle=How+it+began%3A+Bletchley+Park+Goes+to+War&amp;rft.atitle=Colossus%3A+The+Secrets+of+Bletchley+Park%27s+Codebreaking+Computers&amp;rft.aulast=Smith&amp;rft.aufirst=Michael&amp;rft.au=Smith%2C%26%2332%3BMichael&amp;rft.date=2006&amp;rft.place=Oxford&amp;rft.pub=Oxford+University+Press&amp;rft.isbn=978-0-19-284055-4&amp;rfr_id=info:sid/en.wikipedia.org:Enigma_machine"><span style="display: none;">&#160;</span></span></li>
<li>Ulbricht, Heinz. <i>Die Chiffriermaschine Enigma — Trügerische Sicherheit: Ein Beitrag zur Geschichte der Nachrichtendienste</i>, PhD Thesis, 2005. <a rel="nofollow" class="external text" href="http://opus.tu-bs.de/opus/volltexte/2005/705/pdf/enigmadiss.pdf">Online version</a>.<span class="languageicon" style="font-size:0.95em; font-weight:bold; color:#555;">(German)</span></li>
</ul>
</div>
<h2><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=23" title="Edit section: Further reading">edit</a>]</span> <span class="mw-headline" id="Further_reading">Further reading</span></h2>
<div class="refbegin references-column-count references-column-count-2" style="-moz-column-count: 2; -webkit-column-count: 2; column-count: 2;">
<ul>
<li>Richard J. Aldrich, <i>GCHQ: The Uncensored Story of Britain's Most Secret Intelligence Agency</i>, HarperCollins, July 2010.</li>
<li><a href="/wiki/Peter_Calvocoressi" title="Peter Calvocoressi">Calvocoressi, Peter</a>. <i>Top Secret Ultra</i>. Baldwin, new edn 2001. 978-0-947712-36-5</li>
<li><a href="/wiki/Anthony_Cave_Brown" title="Anthony Cave Brown">Cave Brown, Anthony</a>. <i>Bodyguard of Lies</i>, 1975. A journalist's sensationalist best-seller that purported to give a history of Enigma decryption and its effect on the outcome of World War II. Worse than worthless on the seminal Polish work that made "<a href="/wiki/Ultra" title="Ultra">Ultra</a>" possible. See <a href="/wiki/Richard_Woytak" title="Richard Woytak">Richard Woytak</a>, prefatory note (pp.&#160;75–76) to <a href="/wiki/Marian_Rejewski" title="Marian Rejewski">Marian Rejewski</a>, "Remarks on Appendix 1 to <i>British Intelligence in the Second World War</i> by <a href="/wiki/Harry_Hinsley" title="Harry Hinsley">F.H. Hinsley</a>", <i><a href="/wiki/Cryptologia" title="Cryptologia">Cryptologia</a></i>, vol. 6, no. 1 (January 1982), pp.&#160;76–83.</li>
<li><a href="/wiki/J%C3%B3zef_Garli%C5%84ski" title="Józef Garliński">Garliński, Józef</a> <i>Intercept</i>, Dent, 1979. A superficial, sometimes misleading account of Enigma decryption before and during World War II, of equally slight value as to both the Polish and British phases. See <a href="/wiki/Richard_Woytak" title="Richard Woytak">Richard Woytak</a> and <a href="/wiki/Christopher_Kasparek" title="Christopher Kasparek">Christopher Kasparek</a>, "The Top Secret of World War II", <i><a href="/wiki/The_Polish_Review" title="The Polish Review">The Polish Review</a></i>, vol. XXVIII, no. 2, 1983, pp.&#160;98–103 (specifically, about Garliński, pp.&#160;101–3).</li>
<li><a href="/wiki/John_Herivel" title="John Herivel">Herivel, John</a>. <i>Herivelismus and the German military Enigma</i>. Baldwin, 2008. 978-0-947712-46-4</li>
<li><a href="/wiki/John_Keen" title="John Keen" class="mw-redirect">Keen, John</a>. <i>Harold 'Doc' Keen and the Bletchley Park Bombe</i>. Baldwin, 2003. 978-0-947712-42-6</li>
<li>Large, Christine. <i>Hijacking Enigma</i>, 2003, <a href="/wiki/Special:BookSources/0470863471" class="internal mw-magiclink-isbn">ISBN 0-470-86347-1</a>.</li>
<li>Marks, Philip. "Umkehrwalze D: Enigma's Rewirable Reflector—Part I", <i>Cryptologia</i> 25(2), April 2001, pp.&#160;101–141.</li>
<li>Marks, Philip. "Umkehrwalze D: Enigma's Rewirable Reflector—Part II", <i>Cryptologia</i> 25(3), July 2001, pp.&#160;177–212.</li>
<li>Marks, Philip. "Umkehrwalze D: Enigma's Rewirable Reflector—Part III", <i>Cryptologia</i> 25(4), October 2001, pp.&#160;296–310.</li>
<li>Perera, Tom. <i>The Story of the ENIGMA: History, Technology and Deciphering</i>, 2nd Edition, CD-ROM, 2004, Artifax Books, <a href="/wiki/Special:BookSources/1890024066" class="internal mw-magiclink-isbn">ISBN 1-890024-06-6</a> <a rel="nofollow" class="external text" href="http://w1tp.com/enigma/ecds.htm">sample pages</a></li>
<li><a href="/wiki/Marian_Rejewski" title="Marian Rejewski">Rejewski, Marian</a>. "<a rel="nofollow" class="external text" href="http://chc60.fgcu.edu/images/articles/rejewski.pdf">How Polish Mathematicians Deciphered the Enigma</a>", <i>Annals of the History of Computing 3</i>, 1981. This article is regarded by Andrew Hodges, Alan Turing's biographer, as "the definitive account" (see Hodges' <i>Alan Turing: The Enigma</i>, Walker and Company, 2000 paperback edition, p.&#160;548, footnote 4.5).</li>
<li>Quirantes, Arturo. "Model Z: A Numbers-Only Enigma Version", <i>Cryptologia</i> 28(2), April 2004.</li>
<li><a href="/wiki/Hugh_Sebag-Montefiore" title="Hugh Sebag-Montefiore">Sebag-Montefiore, Hugh</a>. <i>Enigma: the battle for the code</i>. Cassell Military Paperbacks, London, 2004. 978-1-407-22129-8</li>
<li>Ulbricht, Heinz. Enigma Uhr, <i>Cryptologia</i>, 23(3), April 1999, pp.&#160;194–205.</li>
<li><a href="/wiki/Gordon_Welchman" title="Gordon Welchman">Welchman, Gordon</a>. <i>The Hut Six Story: breaking the Enigma codes</i>. Baldwin, new edition, 1997. 978-0-947712-34-1</li>
<li>Winterbotham, F.W, <i>The Ultra Secret</i>, Harper and Row, New York, 1974; Spanish edition <i>Ultrasecreto</i>, Ediciones Grijalbo, Madrid, 1975</li>
</ul>
</div>
<h2><span class="editsection">[<a href="/w/index.php?title=Enigma_machine&amp;action=edit&amp;section=24" title="Edit section: External links">edit</a>]</span> <span class="mw-headline" id="External_links">External links</span></h2>
<table class="metadata mbox-small plainlinks" style="border:1px solid #aaa; background-color:#f9f9f9;">
<tr>
<td class="mbox-image"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/30px-Commons-logo.svg.png" width="30" height="40" /></td>
<td class="mbox-text" style="">Wikimedia Commons has media related to: <i><b><a class="external text" href="//commons.wikimedia.org/wiki/Special:Search/Enigma_machine">Enigma machine</a></b></i></td>
</tr>
</table>
<ul>
<li><a rel="nofollow" class="external text" href="http://www.bletchleypark.org.uk/">Bletchley Park National Code Center</a> Home of the British codebreakers during the Second World War</li>
<li><a rel="nofollow" class="external text" href="http://cnm.open.ac.uk/projects/stationx/enigma/index.html">Pictures of a four-rotor naval enigma, including Flash (SWF) views of the machine</a></li>
<li><a rel="nofollow" class="external text" href="http://www.cgisecurity.net/2008/04/getting-to-see-an-enigma-machine-at-rsa-2008-.html">Enigma Pictures and Demonstration by NSA Employee at RSA</a></li>
<li><a rel="nofollow" class="external text" href="http://www.dmoz.org/Science/Math/Applications/Communication_Theory/Cryptography/Historical//">Enigma machine</a> at the <a href="/wiki/Open_Directory_Project" title="Open Directory Project">Open Directory Project</a></li>
<li><a rel="nofollow" class="external text" href="http://russells.freeshell.org/enigma/">An online Enigma Machine simulator</a></li>
<li><a rel="nofollow" class="external text" href="http://www.students.oamk.fi/~k0khro00/Enigma.html">Online Enigma simulator</a></li>
<li><a rel="nofollow" class="external text" href="http://wwiiarchives.net/servlet/document/97/0/0">Kenngruppenheft</a></li>
</ul>
<p><br style="clear:both;" /></p>
<table cellspacing="0" class="navbox" style="border-spacing:0;;">
<tr>
<td style="padding:2px;">
<table cellspacing="0" class="nowraplinks navbox-inner" style="border-spacing:0;background:transparent;color:inherit;;">
<tr>
<td colspan="2" style="width:100%;padding:0px;;;" class="navbox-list navbox-odd">
<div style="padding:0em 0.25em"></div>
<table cellspacing="0" class="nowraplinks navbox-subgroup" style="border-spacing:0;;;;">
<tr>
<td colspan="2" style="width:100%;padding:0px;;;" class="navbox-list navbox-odd">
<div style="padding:0em 0.25em"></div>
<table cellspacing="0" class="nowraplinks navbox-subgroup" style="border-spacing:0;;;;">
<tr>
<th scope="col" style=";" class="navbox-title" colspan="2">
<div class="noprint plainlinks hlist navbar" style="">
<ul>
<li class="nv-view"><a href="/wiki/Template:Crypto_machines" title="Template:Crypto machines"><span style=";;background:none transparent;border:none;" title="View this template">v</span></a></li>
<li class="nv-talk"><a href="/wiki/Template_talk:Crypto_machines" title="Template talk:Crypto machines"><span style=";;background:none transparent;border:none;" title="Discuss this template">d</span></a></li>
<li class="nv-edit"><a class="external text" href="//en.wikipedia.org/w/index.php?title=Template:Crypto_machines&amp;action=edit"><span style=";;background:none transparent;border:none;" title="Edit this template">e</span></a></li>
</ul>
</div>
<span style="float:right;width:6em;">&#160;</span>
<div class="" style="font-size:110%;">Cipher machines</div>
</th>
</tr>
<tr style="height:2px;">
<td></td>
</tr>
<tr>
<th scope="row" class="navbox-group" style=";;"><a href="/wiki/Rotor_machine" title="Rotor machine">Rotor machines</a>:</th>
<td style="text-align:left;border-left-width:2px;border-left-style:solid;width:100%;padding:0px;;;" class="navbox-list navbox-odd hlist">
<div style="padding:0em 0.25em">
<ul>
<li><a href="/wiki/Combined_Cipher_Machine" title="Combined Cipher Machine">CCM</a></li>
<li><strong class="selflink">Enigma</strong></li>
<li>M – 125 <a href="/wiki/Fialka" title="Fialka">Fialka</a></li>
<li><a href="/wiki/Hebern_rotor_machine" title="Hebern rotor machine">Hebern</a></li>
<li><a href="/wiki/HX-63" title="HX-63">HX-63</a></li>
<li><a href="/wiki/KL-7" title="KL-7">KL-7</a></li>
<li><a href="/wiki/Lacida" title="Lacida">Lacida</a></li>
<li><a href="/wiki/M-325" title="M-325">M-325</a></li>
<li><a href="/wiki/Mercury_(cipher_machine)" title="Mercury (cipher machine)">Mercury</a></li>
<li><a href="/wiki/NEMA_(machine)" title="NEMA (machine)">NEMA</a></li>
<li><a href="/wiki/OMI_cryptograph" title="OMI cryptograph">OMI</a></li>
<li><a href="/wiki/Portex" title="Portex">Portex</a></li>
<li><a href="/wiki/Red_(cipher_machine)" title="Red (cipher machine)">RED</a></li>
<li><a href="/wiki/SIGABA" title="SIGABA">SIGABA</a></li>
<li><a href="/wiki/SIGCUM" title="SIGCUM">SIGCUM</a></li>
<li><a href="/wiki/BID/60" title="BID/60">Singlet</a></li>
<li><a href="/wiki/Typex" title="Typex">Typex</a></li>
</ul>
</div>
</td>
</tr>
<tr style="height:2px">
<td></td>
</tr>
<tr>
<th scope="row" class="navbox-group" style=";;">Mechanical:</th>
<td style="text-align:left;border-left-width:2px;border-left-style:solid;width:100%;padding:0px;;;" class="navbox-list navbox-even hlist">
<div style="padding:0em 0.25em">
<ul>
<li><a href="/wiki/Jefferson_disk" title="Jefferson disk">Bazeries cylinder</a></li>
<li><a href="/wiki/C-36_(cipher_machine)" title="C-36 (cipher machine)">C-36</a></li>
<li><a href="/wiki/C-52_(cipher_machine)" title="C-52 (cipher machine)">C-52</a></li>
<li><a href="/wiki/CD-57" title="CD-57">CD-57</a></li>
<li><a href="/wiki/Cipher_disk" title="Cipher disk">Cipher disk</a></li>
<li><a href="/wiki/HC-9" title="HC-9">HC-9</a></li>
<li><a href="/wiki/Kryha" title="Kryha">Kryha</a></li>
<li><a href="/wiki/Jefferson_disk" title="Jefferson disk">Jefferson disk</a></li>
<li><a href="/wiki/M-94" title="M-94">M-94</a></li>
<li><a href="/wiki/M-209" title="M-209">M-209</a></li>
<li><a href="/wiki/Reihenschieber" title="Reihenschieber">Reihenschieber</a></li>
<li><a href="/wiki/Scytale" title="Scytale">Scytale</a></li>
</ul>
</div>
</td>
</tr>
<tr style="height:2px">
<td></td>
</tr>
<tr>
<th scope="row" class="navbox-group" style=";;">Teleprinter:</th>
<td style="text-align:left;border-left-width:2px;border-left-style:solid;width:100%;padding:0px;;;" class="navbox-list navbox-odd hlist">
<div style="padding:0em 0.25em">
<ul>
<li><a href="/wiki/5-UCO" title="5-UCO">5-UCO</a></li>
<li><a href="/wiki/BID_770" title="BID 770">BID 770</a></li>
<li><a href="/wiki/DUDEK" title="DUDEK">DUDEK</a></li>
<li><a href="/wiki/KW-26" title="KW-26">KW-26</a></li>
<li><a href="/wiki/KW-37" title="KW-37">KW-37</a></li>
<li><a href="/wiki/Lorenz_cipher" title="Lorenz cipher">Lorenz SZ 40/42</a></li>
<li><a href="/wiki/Siemens_and_Halske_T52" title="Siemens and Halske T52">Siemens and Halske T52</a></li>
</ul>
</div>
</td>
</tr>
<tr style="height:2px">
<td></td>
</tr>
<tr>
<th scope="row" class="navbox-group" style=";;"><a href="/wiki/Secure_voice" title="Secure voice">Secure voice</a>:</th>
<td style="text-align:left;border-left-width:2px;border-left-style:solid;width:100%;padding:0px;;;" class="navbox-list navbox-even hlist">
<div style="padding:0em 0.25em">
<ul>
<li><a href="/wiki/BID_150" title="BID 150">BID 150</a></li>
<li><a href="/wiki/FASCINATOR" title="FASCINATOR">FASCINATOR</a></li>
<li><a href="/wiki/KY-3" title="KY-3">KY-3</a></li>
<li><a href="/wiki/KY-57" title="KY-57">KY-57</a></li>
<li><a href="/wiki/KY-58" title="KY-58">KY-58</a></li>
<li><a href="/wiki/KY-68" title="KY-68">KY-68</a></li>
<li><a href="/wiki/OMNI_(SCIP)" title="OMNI (SCIP)">OMNI</a></li>
<li><a href="/wiki/Secure_Communications_Interoperability_Protocol" title="Secure Communications Interoperability Protocol">SCIP</a></li>
<li><a href="/wiki/Sect%C3%A9ra_Secure_Module" title="Sectéra Secure Module">Sectéra Secure Module</a></li>
<li><a href="/wiki/SIGSALY" title="SIGSALY">SIGSALY</a></li>
<li><a href="/wiki/Secure_Terminal_Equipment" title="Secure Terminal Equipment">STE</a></li>
<li><a href="/wiki/STU-II" title="STU-II">STU-II</a></li>
<li><a href="/wiki/STU-III" title="STU-III">STU-III</a></li>
<li><a href="/wiki/VINSON" title="VINSON">VINSON</a></li>
</ul>
</div>
</td>
</tr>
<tr style="height:2px">
<td></td>
</tr>
<tr>
<th scope="row" class="navbox-group" style=";;">Miscellaneous:</th>
<td style="text-align:left;border-left-width:2px;border-left-style:solid;width:100%;padding:0px;;;" class="navbox-list navbox-odd hlist">
<div style="padding:0em 0.25em">
<ul>
<li><a href="/wiki/JADE" title="JADE">JADE</a></li>
<li><a href="/wiki/KG-84" title="KG-84">KG-84</a></li>
<li><a href="/wiki/KL-43" title="KL-43">KL-43</a></li>
<li><a href="/wiki/Noreen" title="Noreen">Noreen</a></li>
<li><a href="/wiki/Purple_(cipher_machine)" title="Purple (cipher machine)">PURPLE</a></li>
<li><a href="/wiki/Pinwheel_(cryptography)" title="Pinwheel (cryptography)">Pinwheel</a></li>
<li><a href="/wiki/Rockex" title="Rockex">Rockex</a></li>
</ul>
</div>
</td>
</tr>
</table>
</td>
</tr>
</table>
</td>
</tr>
<tr style="height:2px">
<td></td>
</tr>
<tr>
<td colspan="2" style="width:100%;padding:0px;;;" class="navbox-list navbox-even">
<div style="padding:0em 0.25em"></div>
<table cellspacing="0" class="nowraplinks navbox-subgroup" style="border-spacing:0;;;;">
<tr>
<th scope="col" style=";" class="navbox-title" colspan="2">
<div class="noprint plainlinks hlist navbar" style="">
<ul>
<li class="nv-view"><a href="/wiki/Template:Cryptography_navbox" title="Template:Cryptography navbox"><span style=";;background:none transparent;border:none;" title="View this template">v</span></a></li>
<li class="nv-talk"><a href="/wiki/Template_talk:Cryptography_navbox" title="Template talk:Cryptography navbox"><span style=";;background:none transparent;border:none;" title="Discuss this template">d</span></a></li>
<li class="nv-edit"><a class="external text" href="//en.wikipedia.org/w/index.php?title=Template:Cryptography_navbox&amp;action=edit"><span style=";;background:none transparent;border:none;" title="Edit this template">e</span></a></li>
</ul>
</div>
<span style="float:right;width:6em;">&#160;</span>
<div class="" style="font-size:110%;"><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a></div>
</th>
</tr>
<tr style="height:2px;">
<td></td>
</tr>
<tr>
<td colspan="2" style="width:100%;padding:0px;;;" class="navbox-list navbox-odd">
<div style="padding:0em 0.25em"><a href="/wiki/History_of_cryptography" title="History of cryptography">History of cryptography</a>&#160;<span style="font-weight:bold;">·</span>  <a href="/wiki/Cryptanalysis" title="Cryptanalysis">Cryptanalysis</a>&#160;<span style="font-weight:bold;">·</span>  <a href="/wiki/Portal:Cryptography" title="Portal:Cryptography">Cryptography portal</a>&#160;<span style="font-weight:bold;">·</span>  <a href="/wiki/Outline_of_cryptography" title="Outline of cryptography">Outline of cryptography</a></div>
</td>
</tr>
<tr style="height:2px">
<td></td>
</tr>
<tr>
<td colspan="2" style="width:100%;padding:0px;;;" class="navbox-list navbox-even">
<div style="padding:0em 0.25em"><a href="/wiki/Symmetric-key_algorithm" title="Symmetric-key algorithm">Symmetric-key algorithm</a>&#160;<span style="font-weight:bold;">·</span>  <a href="/wiki/Block_cipher" title="Block cipher">Block cipher</a>&#160;<span style="font-weight:bold;">·</span>  <a href="/wiki/Stream_cipher" title="Stream cipher">Stream cipher</a>&#160;<span style="font-weight:bold;">·</span>  <a href="/wiki/Public-key_cryptography" title="Public-key cryptography">Public-key cryptography</a>&#160;<span style="font-weight:bold;">·</span>  <a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">Cryptographic hash function</a>&#160;<span style="font-weight:bold;">·</span>  <a href="/wiki/Message_authentication_code" title="Message authentication code">Message authentication code</a>&#160;<span style="font-weight:bold;">·</span>  <a href="/wiki/Cryptographically_secure_pseudorandom_number_generator" title="Cryptographically secure pseudorandom number generator">Random numbers</a>&#160;<span style="font-weight:bold;">·</span>  <a href="/wiki/Steganography" title="Steganography">Steganography</a></div>
</td>
</tr>
</table>
</td>
</tr>
</table>
</td>
</tr>
</table>
<p><span id="interwiki-ar-fa"></span> <span id="interwiki-bg-fa"></span> <span id="interwiki-de-fa"></span> <span id="interwiki-hu-fa"></span> <span id="interwiki-nl-fa"></span> <span id="interwiki-pl-fa"></span> <span id="interwiki-sl-fa"></span> <span id="interwiki-zh-fa"></span> <span id="interwiki-ro-ga"></span></p>


<!-- 
NewPP limit report
Preprocessor node count: 12480/1000000
Post-expand include size: 116688/2048000 bytes
Template argument size: 49354/2048000 bytes
Expensive parser function count: 1/500
-->

<!-- Saved in parser cache with key enwiki:pcache:idhash:9256-0!1!0!!en!4!* and timestamp 20120122162140 generated by mw47 -->
</div>				<!-- /bodycontent -->
								<!-- printfooter -->
				<div class="printfooter">
				Retrieved from "<a href="http://en.wikipedia.org/w/index.php?title=Enigma_machine&amp;oldid=472278310">http://en.wikipedia.org/w/index.php?title=Enigma_machine&amp;oldid=472278310</a>"				</div>
				<!-- /printfooter -->
												<!-- catlinks -->
				<div id='catlinks' class='catlinks'><div id="mw-normal-catlinks"><a href="/wiki/Special:Categories" title="Special:Categories">Categories</a>: <ul><li><a href="/wiki/Category:Cryptography" title="Category:Cryptography">Cryptography</a></li><li><a href="/wiki/Category:Rotor_machines" title="Category:Rotor machines">Rotor machines</a></li><li><a href="/wiki/Category:World_War_II_military_equipment_of_Germany" title="Category:World War II military equipment of Germany">World War II military equipment of Germany</a></li><li><a href="/wiki/Category:Cryptographic_hardware" title="Category:Cryptographic hardware">Cryptographic hardware</a></li><li><a href="/wiki/Category:Signals_intelligence_of_World_War_II" title="Category:Signals intelligence of World War II">Signals intelligence of World War II</a></li><li><a href="/wiki/Category:Broken_stream_ciphers" title="Category:Broken stream ciphers">Broken stream ciphers</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:Articles_with_inconsistent_citation_formats" title="Category:Articles with inconsistent citation formats">Articles with inconsistent citation formats</a></li><li><a href="/wiki/Category:Articles_with_German_language_external_links" title="Category:Articles with German language external links">Articles with German language external links</a></li></ul></div></div>				<!-- /catlinks -->
												<div class="visualClear"></div>
				<!-- debughtml -->
								<!-- /debughtml -->
			</div>
			<!-- /bodyContent -->
		</div>
		<!-- /content -->
		<!-- header -->
		<div id="mw-head" class="noprint">
			
<!-- 0 -->
<div id="p-personal" class="">
	<h5>Personal tools</h5>
	<ul>
		<li id="pt-login"><a href="/w/index.php?title=Special:UserLogin&amp;returnto=Enigma+machine" title="You are encouraged to log in; however, it is not mandatory. [o]" accesskey="o">Log in / create account</a></li>
	</ul>
</div>

<!-- /0 -->
			<div id="left-navigation">
				
<!-- 0 -->
<div id="p-namespaces" class="vectorTabs">
	<h5>Namespaces</h5>
	<ul>
					<li  id="ca-nstab-main" class="selected"><span><a href="/wiki/Enigma_machine"  title="View the content page [c]" accesskey="c">Article</a></span></li>
					<li  id="ca-talk"><span><a href="/wiki/Talk:Enigma_machine"  title="Discussion about the content page [t]" accesskey="t">Talk</a></span></li>
			</ul>
</div>

<!-- /0 -->

<!-- 1 -->
<div id="p-variants" class="vectorMenu emptyPortlet">
		<h5><span>Variants</span><a href="#"></a></h5>
	<div class="menu">
		<ul>
					</ul>
	</div>
</div>

<!-- /1 -->
			</div>
			<div id="right-navigation">
				
<!-- 0 -->
<div id="p-views" class="vectorTabs">
	<h5>Views</h5>
	<ul>
					<li id="ca-view" class="selected"><span><a href="/wiki/Enigma_machine" >Read</a></span></li>
					<li id="ca-edit"><span><a href="/w/index.php?title=Enigma_machine&amp;action=edit"  title="You can edit this page. &#10;Please use the preview button before saving. [e]" accesskey="e">Edit</a></span></li>
					<li id="ca-history" class="collapsible"><span><a href="/w/index.php?title=Enigma_machine&amp;action=history"  title="Past versions of this page [h]" accesskey="h">View history</a></span></li>
			</ul>
</div>

<!-- /0 -->

<!-- 1 -->
<div id="p-cactions" class="vectorMenu emptyPortlet">
	<h5><span>Actions</span><a href="#"></a></h5>
	<div class="menu">
		<ul>
					</ul>
	</div>
</div>

<!-- /1 -->

<!-- 2 -->
<div id="p-search">
	<h5><label for="searchInput">Search</label></h5>
	<form action="/w/index.php" id="searchform">
		<input type='hidden' name="title" value="Special:Search"/>
				<div id="simpleSearch">
						<input type="text" name="search" value="" title="Search Wikipedia [f]" accesskey="f" id="searchInput" />						<button type="submit" name="button" title="Search Wikipedia for this text" id="searchButton"><img src="//bits.wikimedia.org/skins-1.18/vector/images/search-ltr.png?303-4" alt="Search" /></button>					</div>
			</form>
</div>

<!-- /2 -->
			</div>
		</div>
		<!-- /header -->
		<!-- panel -->
			<div id="mw-panel" class="noprint">
				<!-- logo -->
					<div id="p-logo"><a style="background-image: url(//upload.wikimedia.org/wikipedia/en/b/bc/Wiki.png);" href="/wiki/Main_Page"  title="Visit the main page"></a></div>
				<!-- /logo -->
				
<!-- navigation -->
<div class="portal" id='p-navigation'>
	<h5>Navigation</h5>
	<div class="body">
		<ul>
			<li id="n-mainpage-description"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z">Main page</a></li>
			<li id="n-contents"><a href="/wiki/Portal:Contents" title="Guides to browsing Wikipedia">Contents</a></li>
			<li id="n-featuredcontent"><a href="/wiki/Portal:Featured_content" title="Featured content – the best of Wikipedia">Featured content</a></li>
			<li id="n-currentevents"><a href="/wiki/Portal:Current_events" title="Find background information on current events">Current events</a></li>
			<li id="n-randompage"><a href="/wiki/Special:Random" title="Load a random article [x]" accesskey="x">Random article</a></li>
			<li id="n-sitesupport"><a href="//wikimediafoundation.org/wiki/Special:Landingcheck?landing_page=WMFJA085&amp;language=en&amp;utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=20101204SB002" title="Support us">Donate to Wikipedia</a></li>
		</ul>
	</div>
</div>

<!-- /navigation -->

<!-- SEARCH -->

<!-- /SEARCH -->

<!-- interaction -->
<div class="portal" id='p-interaction'>
	<h5>Interaction</h5>
	<div class="body">
		<ul>
			<li id="n-help"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia">Help</a></li>
			<li id="n-aboutsite"><a href="/wiki/Wikipedia:About" title="Find out about Wikipedia">About Wikipedia</a></li>
			<li id="n-portal"><a href="/wiki/Wikipedia:Community_portal" title="About the project, what you can do, where to find things">Community portal</a></li>
			<li id="n-recentchanges"><a href="/wiki/Special:RecentChanges" title="A list of recent changes in the wiki [r]" accesskey="r">Recent changes</a></li>
			<li id="n-contact"><a href="/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia">Contact Wikipedia</a></li>
		</ul>
	</div>
</div>

<!-- /interaction -->

<!-- TOOLBOX -->
<div class="portal" id='p-tb'>
	<h5>Toolbox</h5>
	<div class="body">
		<ul>
			<li id="t-whatlinkshere"><a href="/wiki/Special:WhatLinksHere/Enigma_machine" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j">What links here</a></li>
			<li id="t-recentchangeslinked"><a href="/wiki/Special:RecentChangesLinked/Enigma_machine" title="Recent changes in pages linked from this page [k]" accesskey="k">Related changes</a></li>
			<li id="t-upload"><a href="/wiki/Wikipedia:Upload" title="Upload files [u]" accesskey="u">Upload file</a></li>
			<li id="t-specialpages"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q">Special pages</a></li>
			<li id="t-permalink"><a href="/w/index.php?title=Enigma_machine&amp;oldid=472278310" title="Permanent link to this revision of the page">Permanent link</a></li>
<li id="t-cite"><a href="/w/index.php?title=Special:Cite&amp;page=Enigma_machine&amp;id=472278310" title="Information on how to cite this page">Cite this page</a></li>		</ul>
	</div>
</div>

<!-- /TOOLBOX -->

<!-- coll-print_export -->
<div class="portal" id='p-coll-print_export'>
	<h5>Print/export</h5>
	<div class="body">
		<ul id="collectionPortletList"><li id="coll-create_a_book"><a href="/w/index.php?title=Special:Book&amp;bookcmd=book_creator&amp;referer=Enigma+machine" title="Create a book or page collection" rel="nofollow">Create a book</a></li><li id="coll-download-as-rl"><a href="/w/index.php?title=Special:Book&amp;bookcmd=render_article&amp;arttitle=Enigma+machine&amp;oldid=472278310&amp;writer=rl" title="Download a PDF version of this wiki page" rel="nofollow">Download as PDF</a></li><li id="t-print"><a href="/w/index.php?title=Enigma_machine&amp;printable=yes" title="Printable version of this page [p]" accesskey="p">Printable version</a></li></ul>	</div>
</div>

<!-- /coll-print_export -->

<!-- LANGUAGES -->
<div class="portal" id='p-lang'>
	<h5>Languages</h5>
	<div class="body">
		<ul>
			<li class="interwiki-ar"><a href="//ar.wikipedia.org/wiki/%D8%A2%D9%84%D8%A9_%D8%A5%D9%86%D8%AC%D9%85%D8%A7">العربية</a></li>
			<li class="interwiki-bg"><a href="//bg.wikipedia.org/wiki/%D0%95%D0%BD%D0%B8%D0%B3%D0%BC%D0%B0_(%D0%BC%D0%B0%D1%88%D0%B8%D0%BD%D0%B0)">Български</a></li>
			<li class="interwiki-bs"><a href="//bs.wikipedia.org/wiki/Enigma_(ma%C5%A1ina)">Bosanski</a></li>
			<li class="interwiki-ca"><a href="//ca.wikipedia.org/wiki/M%C3%A0quina_Enigma">Català</a></li>
			<li class="interwiki-cs"><a href="//cs.wikipedia.org/wiki/Enigma">Česky</a></li>
			<li class="interwiki-da"><a href="//da.wikipedia.org/wiki/Enigma">Dansk</a></li>
			<li class="interwiki-de"><a href="//de.wikipedia.org/wiki/Enigma_(Maschine)">Deutsch</a></li>
			<li class="interwiki-et"><a href="//et.wikipedia.org/wiki/Enigma">Eesti</a></li>
			<li class="interwiki-el"><a href="//el.wikipedia.org/wiki/Enigma_(%CF%83%CF%85%CF%83%CE%BA%CE%B5%CF%85%CE%AE)">Ελληνικά</a></li>
			<li class="interwiki-es"><a href="//es.wikipedia.org/wiki/Enigma_(m%C3%A1quina)">Español</a></li>
			<li class="interwiki-eo"><a href="//eo.wikipedia.org/wiki/Enigma">Esperanto</a></li>
			<li class="interwiki-eu"><a href="//eu.wikipedia.org/wiki/Enigma_(kriptografia)">Euskara</a></li>
			<li class="interwiki-fa"><a href="//fa.wikipedia.org/wiki/%D9%85%D8%A7%D8%B4%DB%8C%D9%86_%D8%A7%D9%86%DB%8C%DA%AF%D9%85%D8%A7">فارسی</a></li>
			<li class="interwiki-fr"><a href="//fr.wikipedia.org/wiki/Enigma_(machine)">Français</a></li>
			<li class="interwiki-ko"><a href="//ko.wikipedia.org/wiki/%EC%97%90%EB%8B%88%EA%B7%B8%EB%A7%88">한국어</a></li>
			<li class="interwiki-hy"><a href="//hy.wikipedia.org/wiki/%D4%B7%D5%B6%D5%AB%D5%A3%D5%B4%D5%A1">Հայերեն</a></li>
			<li class="interwiki-hi"><a href="//hi.wikipedia.org/wiki/%E0%A4%8F%E0%A4%A8%E0%A4%BF%E0%A4%97%E0%A5%8D%E0%A4%AE%E0%A4%BE_(%E0%A4%AE%E0%A4%B6%E0%A5%80%E0%A4%A8)">हिन्दी</a></li>
			<li class="interwiki-hr"><a href="//hr.wikipedia.org/wiki/Enigma_(stroj)">Hrvatski</a></li>
			<li class="interwiki-id"><a href="//id.wikipedia.org/wiki/Mesin_Enigma">Bahasa Indonesia</a></li>
			<li class="interwiki-it"><a href="//it.wikipedia.org/wiki/Enigma_(crittografia)">Italiano</a></li>
			<li class="interwiki-he"><a href="//he.wikipedia.org/wiki/%D7%90%D7%A0%D7%99%D7%92%D7%9E%D7%94">עברית</a></li>
			<li class="interwiki-ka"><a href="//ka.wikipedia.org/wiki/%E1%83%94%E1%83%9C%E1%83%98%E1%83%92%E1%83%9B%E1%83%90_(%E1%83%9B%E1%83%90%E1%83%9C%E1%83%A5%E1%83%90%E1%83%9C%E1%83%90)">ქართული</a></li>
			<li class="interwiki-lv"><a href="//lv.wikipedia.org/wiki/Enigma_(%C5%A1ifr%C4%93%C5%A1anas_ma%C5%A1%C4%ABna)">Latviešu</a></li>
			<li class="interwiki-lb"><a href="//lb.wikipedia.org/wiki/Enigma">Lëtzebuergesch</a></li>
			<li class="interwiki-hu"><a href="//hu.wikipedia.org/wiki/Enigma_(g%C3%A9p)">Magyar</a></li>
			<li class="interwiki-nl"><a href="//nl.wikipedia.org/wiki/Enigma_(codeermachine)">Nederlands</a></li>
			<li class="interwiki-ja"><a href="//ja.wikipedia.org/wiki/%E3%82%A8%E3%83%8B%E3%82%B0%E3%83%9E_(%E6%9A%97%E5%8F%B7%E6%A9%9F)">日本語</a></li>
			<li class="interwiki-no"><a href="//no.wikipedia.org/wiki/Enigma_(krypteringsmaskin)">‪Norsk (bokmål)‬</a></li>
			<li class="interwiki-pl"><a href="//pl.wikipedia.org/wiki/Enigma">Polski</a></li>
			<li class="interwiki-pt"><a href="//pt.wikipedia.org/wiki/Enigma_(m%C3%A1quina)">Português</a></li>
			<li class="interwiki-ro"><a href="//ro.wikipedia.org/wiki/Ma%C8%99ina_Enigma">Română</a></li>
			<li class="interwiki-ru"><a href="//ru.wikipedia.org/wiki/%D0%AD%D0%BD%D0%B8%D0%B3%D0%BC%D0%B0">Русский</a></li>
			<li class="interwiki-sq"><a href="//sq.wikipedia.org/wiki/Enigma_(makin%C3%AB)">Shqip</a></li>
			<li class="interwiki-sk"><a href="//sk.wikipedia.org/wiki/Enigma_(%C5%A1ifrovac%C3%AD_stroj)">Slovenčina</a></li>
			<li class="interwiki-sl"><a href="//sl.wikipedia.org/wiki/Enigma_(naprava)">Slovenščina</a></li>
			<li class="interwiki-sr"><a href="//sr.wikipedia.org/wiki/%D0%95%D0%BD%D0%B8%D0%B3%D0%BC%D0%B0">Српски / Srpski</a></li>
			<li class="interwiki-fi"><a href="//fi.wikipedia.org/wiki/Enigma_(salauslaite)">Suomi</a></li>
			<li class="interwiki-sv"><a href="//sv.wikipedia.org/wiki/Enigma_(krypteringsmaskin)">Svenska</a></li>
			<li class="interwiki-th"><a href="//th.wikipedia.org/wiki/%E0%B9%80%E0%B8%84%E0%B8%A3%E0%B8%B7%E0%B9%88%E0%B8%AD%E0%B8%87%E0%B8%AD%E0%B8%B4%E0%B8%99%E0%B8%B4%E0%B8%81%E0%B8%A1%E0%B8%B2">ไทย</a></li>
			<li class="interwiki-tr"><a href="//tr.wikipedia.org/wiki/Enigma_makinesi">Türkçe</a></li>
			<li class="interwiki-uk"><a href="//uk.wikipedia.org/wiki/%D0%95%D0%BD%D1%96%D0%B3%D0%BC%D0%B0_(%D0%B0%D0%B2%D1%82%D0%BE%D0%BC%D0%B0%D1%82)">Українська</a></li>
			<li class="interwiki-vi"><a href="//vi.wikipedia.org/wiki/M%C3%A1y_Enigma">Tiếng Việt</a></li>
			<li class="interwiki-zh"><a href="//zh.wikipedia.org/wiki/%E6%81%A9%E5%B0%BC%E6%A0%BC%E7%8E%9B%E5%AF%86%E7%A0%81%E6%9C%BA">中文</a></li>
		</ul>
	</div>
</div>

<!-- /LANGUAGES -->
			</div>
		<!-- /panel -->
		<!-- footer -->
		<div id="footer">
							<ul id="footer-info">
											<li id="footer-info-lastmod"> This page was last modified on 20 January 2012 at 16:42.<br /></li>
											<li id="footer-info-copyright">Text is available under the <a rel="license" href="//en.wikipedia.org/wiki/Wikipedia:Text_of_Creative_Commons_Attribution-ShareAlike_3.0_Unported_License">Creative Commons Attribution-ShareAlike License</a><a rel="license" href="//creativecommons.org/licenses/by-sa/3.0/" style="display:none;"></a>;
additional terms may apply.
See <a href="//wikimediafoundation.org/wiki/Terms_of_use">Terms of use</a> for details.<br/>
Wikipedia&reg; is a registered trademark of the <a href="//www.wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.<br /></li><li class="noprint"><a class='internal' href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact us</a></li>
									</ul>
							<ul id="footer-places">
											<li id="footer-places-privacy"><a href="//wikimediafoundation.org/wiki/Privacy_policy" title="wikimedia:Privacy policy">Privacy policy</a></li>
											<li id="footer-places-about"><a href="/wiki/Wikipedia:About" title="Wikipedia:About">About Wikipedia</a></li>
											<li id="footer-places-disclaimer"><a href="/wiki/Wikipedia:General_disclaimer" title="Wikipedia:General disclaimer">Disclaimers</a></li>
											<li id="footer-places-mobileview"><a href='/w/index.php?title=Enigma_machine&amp;useformat=mobile' class='noprint'>Mobile view</a></li>
									</ul>
										<ul id="footer-icons" class="noprint">
					<li id="footer-copyrightico">
						<a href="//wikimediafoundation.org/"><img src="//bits.wikimedia.org/images/wikimedia-button.png" width="88" height="31" alt="Wikimedia Foundation"/></a>
					</li>
					<li id="footer-poweredbyico">
						<a href="//www.mediawiki.org/"><img src="//bits.wikimedia.org/skins-1.18/common/images/poweredby_mediawiki_88x31.png" alt="Powered by MediaWiki" width="88" height="31" /></a>
					</li>
				</ul>
						<div style="clear:both"></div>
		</div>
		<!-- /footer -->
		<!-- fixalpha -->
		<script type="text/javascript"> if ( window.isMSIE55 ) fixalpha(); </script>
		<!-- /fixalpha -->
		<script src="//bits.wikimedia.org/en.wikipedia.org/load.php?debug=false&amp;lang=en&amp;modules=skins.vector&amp;only=scripts&amp;skin=vector&amp;*" type="text/javascript"></script>
<script type="text/javascript">if ( window.mediaWiki ) {
	mw.loader.load(["mediawiki.user", "mediawiki.util", "mediawiki.page.ready", "mediawiki.legacy.wikibits", "mediawiki.legacy.ajax", "mediawiki.legacy.mwsuggest", "ext.gadget.wmfFR2011Style", "ext.vector.collapsibleNav", "ext.vector.collapsibleTabs", "ext.vector.editWarning", "ext.vector.simpleSearch", "ext.UserBuckets", "ext.articleFeedback.startup", "ext.articleFeedbackv5.startup", "ext.markAsHelpful"]);
}
</script>
<script src="/w/index.php?title=Special:BannerController&amp;cache=/cn.js&amp;303-4" type="text/javascript"></script>
<script src="//bits.wikimedia.org/en.wikipedia.org/load.php?debug=false&amp;lang=en&amp;modules=site&amp;only=scripts&amp;skin=vector&amp;*" type="text/javascript"></script>
<script type="text/javascript">if ( window.mediaWiki ) {
	mw.user.options.set({"ccmeonemails":0,"cols":80,"date":"default","diffonly":0,"disablemail":0,"disablesuggest":0,"editfont":"default","editondblclick":0,"editsection":1,"editsectiononrightclick":0,"enotifminoredits":0,"enotifrevealaddr":0,"enotifusertalkpages":1,"enotifwatchlistpages":0,"extendwatchlist":0,"externaldiff":0,"externaleditor":0,"fancysig":0,"forceeditsummary":0,"gender":"unknown","hideminor":0,"hidepatrolled":0,"highlightbroken":1,"imagesize":2,"justify":0,"math":1,"minordefault":0,"newpageshidepatrolled":0,"nocache":0,"noconvertlink":0,"norollbackdiff":0,"numberheadings":0,"previewonfirst":0,"previewontop":1,"quickbar":5,"rcdays":7,"rclimit":50,"rememberpassword":0,"rows":25,"searchlimit":20,"showhiddencats":false,"showjumplinks":1,"shownumberswatching":1,"showtoc":1,"showtoolbar":1,"skin":"vector","stubthreshold":0,"thumbsize":4,"underline":2,"uselivepreview":0,"usenewrc":0,"watchcreations":1,"watchdefault":0,"watchdeletion":0,"watchlistdays":3,"watchlisthideanons":0,
	"watchlisthidebots":0,"watchlisthideliu":0,"watchlisthideminor":0,"watchlisthideown":0,"watchlisthidepatrolled":0,"watchmoves":0,"wllimit":250,"flaggedrevssimpleui":1,"flaggedrevsstable":0,"flaggedrevseditdiffs":true,"flaggedrevsviewdiffs":false,"vector-simplesearch":1,"useeditwarning":1,"vector-collapsiblenav":1,"usebetatoolbar":1,"usebetatoolbar-cgd":1,"wikilove-enabled":1,"variant":"en","language":"en","searchNs0":true,"searchNs1":false,"searchNs2":false,"searchNs3":false,"searchNs4":false,"searchNs5":false,"searchNs6":false,"searchNs7":false,"searchNs8":false,"searchNs9":false,"searchNs10":false,"searchNs11":false,"searchNs12":false,"searchNs13":false,"searchNs14":false,"searchNs15":false,"searchNs100":false,"searchNs101":false,"searchNs108":false,"searchNs109":false,"gadget-wmfFR2011Style":1});;mw.user.tokens.set({"editToken":"+\\","watchToken":false});;mw.loader.state({"user.options":"ready","user.tokens":"ready"});
	
	/* cache key: enwiki:resourceloader:filter:minify-js:4:b41a86ec4e0fe8329bc3ce917e792339 */
}
</script><script src="//geoiplookup.wikimedia.org/" type="text/javascript"></script><!-- Served by mw7 in 0.056 secs. -->
	</body>
</html>
