A STUDY OF REJEWSKI'S EQUATIONS

@article{Lawrence2005ASO,
  title={A STUDY OF REJEWSKI'S EQUATIONS},
  author={John Lawrence},
  journal={Cryptologia},
  year={2005},
  volume={29},
  pages={233 - 247}
}
ABSTRACT We look at a question of Marian Rejewski. Can the system of six equations, by which he solved the internal wiring of the Enigma, be solved without knowing specific plugboard settings? A complexity result and some counting arguments give some partial results but Rejewski's question remains open. We also look at Rejewski's proposed solution of the plugboard problem. 

Recovering the military Enigma using permutations—filling in the details of Rejewski's solution

TLDR
This article describes in detail how to find the complete wiring of the rotors and reflector of Enigma, as well as other specifics, using data that Rejewski had at his disposal, by systematically presenting the resolution of all cases that could have been encountered.

Review of Memories of My Work at the Cipher Bureau of the General Staff Second Department 1930–1945 by Marian Rejewski

TLDR
The year 2010 marked the thirtieth anniversary of the death of Marian Rejewski, and to honor him and his colleagues Jerzy Rozycki and Henryk Zygalski, AdamMickiewicz University Press decided to publish in book from two of his typed manuscripts.

Polish Mathematicians Finding Patterns in Enigma Messages

This is a story about heroes. Its heroes are three Polish mathematicians who in the decade before World War II broke German Enigma messages. It seems rare that mathematicians are heroes of stories,

ARITHMETIC METHODS IN MATHEMATICAL PHYSICS AND BIOLOGY

  • Mathematics
  • 2016
. The First International Conference Arithmetic Methods in Mathematical Physics and Biology was held on August 3–8, 2014, in the Mathematical Research and Conference Center of the Institute of

On latin squares, invariant differentials, random permutations and historical Enigma rotors

TLDR
Rotors from the same source and the same period have consistent properties deeply rooted in classical cryptography of polyalphabetical ciphers, and these properties exhibit strong linear and differential properties.

References

SHOWING 1-6 OF 6 REFERENCES

An Introduction to the Theory of Numbers

This is the fifth edition of a work (first published in 1938) which has become the standard introduction to the subject. The book has grown out of lectures delivered by the authors at Oxford,

An Introduction to the Theory of Groups

Anyone who has studied "abstract algebra" and linear algebra as an undergraduate can understand this book. This edition has been completely revised and reorganized, without however losing any of the

Computers and Intractability: A Guide to the Theory of NP-Completeness

TLDR
The experiences, understandings, and beliefs that guide the professional practices of teacher educators are explored, and the book paints a picture of a profession that offers huge rewards, alongside challenges and frustrations.

Enigma: The Battle for the Code

List of Illustrations. Acknowledgements. Introduction. Prologue. The Betrayal -- Belgium and Germany, 1931. The Leak -- Poland, Belgium and Germany, 1929--38. An Inspired Guess -- Poland, 1932. A

Cryptography - theory and practice

  • D. Stinson
  • Computer Science, Mathematics
    Discrete mathematics and its applications series
  • 1995

Equations in groups