SlideShare a Scribd company logo
1 of 36
The Engima Cipher Dr. Vicki Schell Pensacola Junior College [email_address] 9 September 2008
[object Object],[object Object]
Taxonomy of Cryptology
ACTIVITY #1: How many possible keys are there when you swap each letter of the alphabet with another letter? 26*25*24*23*22*21*20*19*18*17*16*15*14*13812*11*10*9*8*7*6*5*4*3*2*1 =26! = 400 000 000 000 000 000 000 000 000
400 septillion keys 6.5 billion people in the world 31 million seconds in a year If everyone in the world checked one key per second, it would still take 2 billion years to check them all!
Code Breaking Tips ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Enigma Machine ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Plugboard ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Simplified Plugboard
The Plugboard ,[object Object],[object Object],[object Object]
Rotor Cipher Machines ,[object Object],[object Object],[object Object]
The Rotors ,[object Object],[object Object],[object Object]
The Rotors ,[object Object],[object Object],[object Object]
The Rotors ,[object Object],[object Object]
The Rotors: Operations ,[object Object],[object Object]
The Rotors: Operations ,[object Object],[object Object],[object Object]
The Rotors: Operations ,[object Object],[object Object],[object Object]
The Rotors: Operations ,[object Object],[object Object]
The Rotors: Example ,[object Object],[object Object],[object Object],[object Object],[object Object]
Settings of the Daily Keys ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bletchley House During World War II, codebreakers at Bletchley Park solved messages from a large number of Axis  code and cipher systems, including the German Enigma machine. For this purpose, the Bletchley Park mansion was soon joined by a host of other buildings. The mansion's facade is an idiosyncratic mix of architectural styles.
Bletchley House ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Weaknesses of the German Enigma ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Decryption Process  at Bletchley Park ,[object Object],[object Object],[object Object]
The Decryption Process  at Bletchley Park ,[object Object],[object Object],[object Object]
Rodding & Cribs ,[object Object],[object Object],[object Object],[object Object]
Rodding & Cribs ,[object Object],[object Object],[object Object]
Rodding & Cribs ,[object Object],[object Object],[object Object],[object Object]
Rodding & Cribs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Rodding & Cribs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Bombe ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Bombe ,[object Object],[object Object],[object Object],[object Object]
How to Speak Crypto ,[object Object],[object Object],[object Object],[object Object]
How to Speak Crypto Code :  whole words or phrases replaced by a letter or number Cipher :  Individual letters are replaced with other letters or symbols Plaintext :  normal English Ciphertext :  coded English Cryptology : the art and science of making and breaking “secret codes” Crytography : making “secret codes” Cryptanalysis : breaking ‘secret codes”
http://www.bletchleypark.org/ Thanks to Mike Koss for permission to use his paper Engima machine Simon Singh.   The Code Book - The Science   of Secrecy from Ancient Egypt to Quantum Cryptography .  ENGIMA Director: Michael Apted. Actors: Dougray Scott, Kate Winslet, Saffron Borrows, Jeremy Northam, Nikolaj Coster-Waldau.  

More Related Content

What's hot (6)

Understanding blockchain
Understanding blockchainUnderstanding blockchain
Understanding blockchain
 
組み込みとITのお話 (LTSpiral03)
組み込みとITのお話 (LTSpiral03)組み込みとITのお話 (LTSpiral03)
組み込みとITのお話 (LTSpiral03)
 
Ornithopter
Ornithopter Ornithopter
Ornithopter
 
R Study LT 02
R Study LT 02R Study LT 02
R Study LT 02
 
The evolution of fieldbus topologies
The evolution of fieldbus topologiesThe evolution of fieldbus topologies
The evolution of fieldbus topologies
 
Med 101
Med 101Med 101
Med 101
 

Viewers also liked

Following Enigma
Following EnigmaFollowing Enigma
Following EnigmaMonika Ch
 
Enigma matemàtiques
Enigma matemàtiquesEnigma matemàtiques
Enigma matemàtiquesescolamura
 
Fund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine SimulatorFund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine SimulatorCraig Heath
 
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the worldCracking the Enigma Machine - Rejewski, Turing and the Math that saved the world
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the worldBradYoung
 
The Enigma of implantation
The Enigma of implantationThe Enigma of implantation
The Enigma of implantationPriya Bhave.
 

Viewers also liked (6)

Enigma
EnigmaEnigma
Enigma
 
Following Enigma
Following EnigmaFollowing Enigma
Following Enigma
 
Enigma matemàtiques
Enigma matemàtiquesEnigma matemàtiques
Enigma matemàtiques
 
Fund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine SimulatorFund Raising with an Android Enigma Machine Simulator
Fund Raising with an Android Enigma Machine Simulator
 
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the worldCracking the Enigma Machine - Rejewski, Turing and the Math that saved the world
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world
 
The Enigma of implantation
The Enigma of implantationThe Enigma of implantation
The Enigma of implantation
 

Similar to The Engima Cipher

Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)Somaditya Basak
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In CryptographyAbhishek Nand
 
Cryptograph yreport 2003
Cryptograph yreport 2003Cryptograph yreport 2003
Cryptograph yreport 2003keyurbz
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In CryptographyAadya Vatsa
 
2600 v01 n09 (september 1984)
2600 v01 n09 (september 1984)2600 v01 n09 (september 1984)
2600 v01 n09 (september 1984)Felipe Prado
 
Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Saif Kassim
 
Cryptography 387 © David Lippman Creative Commons BY-.docx
  Cryptography   387 © David Lippman  Creative Commons BY-.docx  Cryptography   387 © David Lippman  Creative Commons BY-.docx
Cryptography 387 © David Lippman Creative Commons BY-.docxrobert345678
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?Pratik Poddar
 
cryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptcryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptJohnree4
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesJanani S
 
Cryptography 101
Cryptography 101 Cryptography 101
Cryptography 101 Andy Fisher
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityBikramjit Sarkar, Ph.D.
 

Similar to The Engima Cipher (20)

Edward Schaefer
Edward SchaeferEdward Schaefer
Edward Schaefer
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
Cryptography
CryptographyCryptography
Cryptography
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
unit 2.ppt
unit 2.pptunit 2.ppt
unit 2.ppt
 
Cryptograph yreport 2003
Cryptograph yreport 2003Cryptograph yreport 2003
Cryptograph yreport 2003
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
2600 v01 n09 (september 1984)
2600 v01 n09 (september 1984)2600 v01 n09 (september 1984)
2600 v01 n09 (september 1984)
 
Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03
 
Cryptography 387 © David Lippman Creative Commons BY-.docx
  Cryptography   387 © David Lippman  Creative Commons BY-.docx  Cryptography   387 © David Lippman  Creative Commons BY-.docx
Cryptography 387 © David Lippman Creative Commons BY-.docx
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
cryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptcryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.ppt
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Coding and Decoding
Coding and DecodingCoding and Decoding
Coding and Decoding
 
Cryptography 101
Cryptography 101 Cryptography 101
Cryptography 101
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

The Engima Cipher

  • 1. The Engima Cipher Dr. Vicki Schell Pensacola Junior College [email_address] 9 September 2008
  • 2.
  • 4. ACTIVITY #1: How many possible keys are there when you swap each letter of the alphabet with another letter? 26*25*24*23*22*21*20*19*18*17*16*15*14*13812*11*10*9*8*7*6*5*4*3*2*1 =26! = 400 000 000 000 000 000 000 000 000
  • 5. 400 septillion keys 6.5 billion people in the world 31 million seconds in a year If everyone in the world checked one key per second, it would still take 2 billion years to check them all!
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Bletchley House During World War II, codebreakers at Bletchley Park solved messages from a large number of Axis code and cipher systems, including the German Enigma machine. For this purpose, the Bletchley Park mansion was soon joined by a host of other buildings. The mansion's facade is an idiosyncratic mix of architectural styles.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. How to Speak Crypto Code : whole words or phrases replaced by a letter or number Cipher : Individual letters are replaced with other letters or symbols Plaintext : normal English Ciphertext : coded English Cryptology : the art and science of making and breaking “secret codes” Crytography : making “secret codes” Cryptanalysis : breaking ‘secret codes”
  • 36. http://www.bletchleypark.org/ Thanks to Mike Koss for permission to use his paper Engima machine Simon Singh.  The Code Book - The Science of Secrecy from Ancient Egypt to Quantum Cryptography . ENGIMA Director: Michael Apted. Actors: Dougray Scott, Kate Winslet, Saffron Borrows, Jeremy Northam, Nikolaj Coster-Waldau.