The Cryptographic Mathematics of Enigma

@article{Miller1995TheCM,
  title={The Cryptographic Mathematics of Enigma},
  author={A. R. Miller},
  journal={Cryptologia},
  year={1995},
  volume={19},
  pages={65-80}
}
  • A. R. Miller
  • Published 1995
  • Computer Science
  • Cryptologia
  • The Enigma cipher machine had the confidence of German forces who depended upon its security. This misplaced confidence was due in part to the large key space the machine provided. This paper derives for the first time the exact number of theoretical cryptographic key settings and machine configurations for the Enigma cipher machine. It also calculates the number of practical key settings Allied cryptanalysts were faced with on a daily basis throughout World War II. Finally, it shows the… CONTINUE READING
    26 Citations

    Topics from this paper

    Key Space and Period of Fialka M-125 Cipher Machine
    • 2
    A review on mathematical strength and analysis of Enigma
    • Highly Influenced
    • PDF
    The Rise of the Machines: 1918–1941
    Re-engineering the Enigma cipher
    • 2
    • Highly Influenced
    • PDF
    The Impact of the Allied Cryptographers on World War II : Cryptanalysis of the Japanese and German Cipher Machines
    • 1
    • Highly Influenced
    • PDF
    Codes, Ciphers, and Cryptography—An Honors Colloquium
    • 4

    References

    SHOWING 1-7 OF 7 REFERENCES
    Naval Enigma: M4 and its Rotors
    • 19
    British Intelligence in the second world war
    • 34
    Seizing the Enigma
    • Boston: Houghton Mifflin.
    • 1991
    Ray Miller is a senior technical expert at the National Security Agency. He received his Ph.D. in computer science from the University of Illinois
    • 1987
    A Conversation with MARIAN Rejewski
    • 4
    The National Museum of American History
    • 60
    • PDF