# How Polish Mathematicians Broke the Enigma Cipher

@article{Rejewski1981HowPM, title={How Polish Mathematicians Broke the Enigma Cipher}, author={Marian Rejewski}, journal={Annals of the History of Computing}, year={1981}, volume={3}, pages={213-234} }

The paper gives a personal view of work in the Polish Cipher Bureau from 1932 to 1939 as mathematicians worked to decipher the codes of the military version of the Enigma. The author, who was a participant, relates details of the device and the successes and frustrations involved in the work. He also describes mathematical principles that enabled him and his colleagues to break successive versions of the Enigma code and to construct technical devices (cyclometers and "bombs") that facilitated…

## 27 Citations

### Recovering the military Enigma using permutations—filling in the details of Rejewski's solution

- Computer ScienceCryptologia
- 2018

This article describes in detail how to find the complete wiring of the rotors and reflector of Enigma, as well as other specifics, using data that Rejewski had at his disposal, by systematically presenting the resolution of all cases that could have been encountered.

### The autoscritcher and the superscritcher: aids to cryptanalysis of the German Enigma cipher machine, 1944-6

- Computer ScienceIEEE Annals of the History of Computing
- 1992

The Superscritcher proved the practicality of electronic digital technology for computing applications and showed that a more flexible architecture was needed to allow the solving of more than one class of problems.

### On Rejewski's Solution of Enigma Cipher

- Computer Science
- 2006

This contribution presents one of the two new methods how to calculate the connections in the third rotor together with the probability of having suitable data for this method of Rejewski's method.

### Cryptology, Mathematics, and Technology

- Computer Science, Mathematics
- 2018

A particularly striking example of the impact of mathematics on cryptography is the development of public key encryption, where physical randomization has been completely replaced by the use of pseudo-random number generators.

### Review of Memories of My Work at the Cipher Bureau of the General Staff Second Department 1930–1945 by Marian Rejewski

- ArtCryptologia
- 2013

The year 2010 marked the thirtieth anniversary of the death of Marian Rejewski, and to honor him and his colleagues Jerzy Rozycki and Henryk Zygalski, AdamMickiewicz University Press decided to publish in book from two of his typed manuscripts.

### Resurrecting Bomba Kryptologiczna: Archaeology of Algorithmic Artefacts, I

- SociologyCryptologia
- 2009

The procedure executed on the Polish Bomba Kryptologiczna is reconstructed on the basis of Marian Rejewski's accounts and simulative experiment and the circuitry of a simplified version of the bomba presented.

### Cryptography in a Quantum World

- PhysicsSOFSEM
- 2016

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century before Claude Shannon gave it a strong mathematical foundation. However, Shannon's approach…

### Mathematical Reconstruction of the Enigma

- MathematicsEUROCAST
- 2019

This paper demonstrates the mathematical reconstruction of the three-rotor German cyphering machine Enigma by Polish cryptologists around Marian Rejewski in 1932 [1].

### Basic Concepts and Historical Overview

- Computer Science, Mathematics
- 2013

Cryptography is the science of transforming, or encoding, information into a form non-comprehensible for anyone who does not know an appropriate key to regaining the content of encrypted messages without an authorized access to the decryption keys.

### The US Bombes, NCR, Joseph Desch, and 600 WAVES: The First Reunion of the US Naval Computing Machine Laboratory

- HistoryIEEE Ann. Hist. Comput.
- 2000

This is the story of the US Navy's response to the need to gain intelligence to win the battle of the Atlantic in 1941 and 1942, the competitive development of mechanical code-breaking systems known as Bombes, and the contributions of NCR engineer Joseph Desch and 600 Navy WAVES (Women Appointed for Volunteer Emergency Service).

## References

SHOWING 1-10 OF 13 REFERENCES

### Early Work on Computers at Bletchley

- Computer ScienceAnnals of the History of Computing
- 1979

Pioneering work on computers was carried out at Bletchley, England, during World War II, for the cryptanalysis of the messages enciphered on the German cryptographic machines, the Enigma and the…

### History of Computing in the Twentieth Century

- History
- 1980

This book is both the reuslt of that conference and the subsequent collection of supplementary articles by the editors, and attempts to fill in some of the gaps that remained and that either could not be filled by the attendees or were left as open questions for lack of time.

### British Intelligence in the Second World War

- History
- 1979

To the German invasion of Soviet Russia from the summer of 1941 to the end of 1942 the first half of 1943 from the summer of 1943 to the summer of 1944 Overlord and the Battle of Normandy the defeat…

### Studies in the History of Probability and Statistics. XXXVII

- Business
- 1979

SUMMARY An account is given of A. M. Turing's unpublished contributions to statistics during 1941 or 1940.

### The Joint Probability Generating Function for Run-Lengths in Regenerative Binary Markov Chains, with Applications

- Mathematics
- 1973

### TAE; (20 ) 'AE:CGEFGilIJt:L.iCTNOF'CiHSTUU~X'~Z' 300 FOKI=l.T03:PRIN7'0UTPUT

- TAE; (20 ) 'AE:CGEFGilIJt:L.iCTNOF'CiHSTUU~X'~Z' 300 FOKI=l.T03:PRIN7'0UTPUT

### Manuel de Cryptographie (French ed

- by J. Bres, from the Italian). Paris, Payot.
- 1951