Abstract
While the 1930s saw the first efforts to cryptanalyze the new cipher machines, the advent of World War II made this work must more imperative. The Enigma , the Typex and the M-134C/SIGABA were the epitome of these machines and the efforts to create and cryptanalyze them led us into the computer age. This chapter examines the race to break the ever more sophisticated cipher machines of the 1940s and looks in some detail at the cryptographic construction of the Enigma and the M-134C/SIGABA.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
U.S. Patent 6,097,812 granted 1 August 2000.
- 2.
Patent 6,175,625, granted 16 January 2001.
- 3.
Patent 6,130,946, granted 10 October 2000.
- 4.
References
Bauer, Craig P. 2013. Secret History: The Story of Cryptology. Boca Raton, FL: CRC Press.
Budiansky, Stephen. 2000. Battle of Wits: The Complete Story of Codebreaking in World War II. New York: Free Press.
Clark, Ronald. 1977. The Man Who Broke Purple. Boston: Little, Brown and Company.
Hodges, Andrew. 1983. Alan Turing: The Enigma. New York: Walker & Company.
Miller, A. Ray. 1995. The cryptographic mathematics of enigma. Cryptologia 19 (1): 65–80. https://doi.org/10.1080/0161-119591883773.
Mowry, David. 2011. Cryptologic Aspects of German Intelligence Activities in South America during World War II. Series 4, Volume 11. Ft. George Meade, MD: Center for Cryptologic History, National Security Agency. https://www.nsa.gov/about/cryptologic-heritage/historical-figures-publications/publications/wwii/assets/files/cryptologic_aspects_of_gi.pdf.
Mucklow, Timothy. 2015. The SIGABA / ECM II Cipher Machine: ‘A Beautiful Idea.’ Fort George G. Meade: Center for Cryptologic History, National Security Agency. https://www.nsa.gov/about/cryptologic-heritage/historical-figures-publications/publications/assets/files/sigaba-ecm-ii/The_SIGABA_ECM_Cipher_Machine_A_Beautiful_Idea3.pdf.
Rowlett, Frank R. 1998. The Story of Magic: Memoirs of an American Cryptologic Pioneer. Laguna Hills: Aegean Park Press.
Savard, John J., and Richard S. Pekelney. 1999. The ECM mark II: design, history, and cryptology. Cryptologia 23 (3): 211–228. https://doi.org/10.1080/0161-119991887856.
Sebag-Montefiore, Hugh. 2000. Enigma: The Battle for the Code. London: Cassell.
Smith, G. Stuart. 2017. A Life in Code: Pioneer Cryptanalyst Elizebeth Smith Friedman. Paperback. Jefferson: McFarland & Company. www.mcfarlandpub.com
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Dooley, J.F. (2018). Battle Against the Machines: World War II 1939–1945. In: History of Cryptography and Cryptanalysis. History of Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-90443-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-90443-6_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-90442-9
Online ISBN: 978-3-319-90443-6
eBook Packages: Computer ScienceComputer Science (R0)