Milestone-Proposal:The First Breaking of Enigma Code by the Team of Polish Cipher Bureau, 1932-39

From IEEE Milestones Wiki


To see comments, or add a comment to this discussion, click here.

Docket #:2013-03

This Proposal has been approved, and is now a Milestone


To the proposer’s knowledge, is this achievement subject to litigation?


Is the achievement you are proposing more than 25 years old? Yes

Is the achievement you are proposing within IEEE’s designated fields as defined by IEEE Bylaw I-104.11, namely: Engineering, Computer Sciences and Information Technology, Physical Sciences, Biological and Medical Sciences, Mathematics, Technical Communications, Education, Management, and Law and Policy. Yes

Did the achievement provide a meaningful benefit for humanity? Yes

Was it of at least regional importance? Yes

Has an IEEE Organizational Unit agreed to pay for the milestone plaque(s)? Yes

Has an IEEE Organizational Unit agreed to arrange the dedication ceremony? Yes

Has the IEEE Section in which the milestone is located agreed to take responsibility for the plaque after it is dedicated? Yes

Has the owner of the site agreed to have it designated as an IEEE Milestone? Yes


Year or range of years in which the achievement occurred:

1932-39

Title of the proposed milestone:

First Breaking of Enigma Code by the Team of Polish Cipher Bureau, 1932-1939

Plaque citation summarizing the achievement and its significance:

Polish Cipher Bureau mathematicians Marian Rejewski, Jerzy Różycki and Henryk Zygalski broke the German Enigma cipher machine codes. Working with engineers from the AVA Radio Manufacturing Company, they built the ‘bomba’ – the first cryptanalytic machine to break Enigma codes. Their work was a foundation of British code breaking efforts which, with later American assistance, helped end World War II.

200-250 word abstract describing the significance of the technical achievement being proposed, the person(s) involved, historical context, humanitarian and social impact, as well as any possible controversies the advocate might need to review.


IEEE technical societies and technical councils within whose fields of interest the Milestone proposal resides.


In what IEEE section(s) does it reside?

Poland

IEEE Organizational Unit(s) which have agreed to sponsor the Milestone:

IEEE Organizational Unit(s) paying for milestone plaque(s):

Unit: Poland Section
Senior Officer Name: Maciej Ogorzalek

IEEE Organizational Unit(s) arranging the dedication ceremony:

Unit: Poland Section
Senior Officer Name: Maciej Ogorzalek

IEEE section(s) monitoring the plaque(s):

IEEE Section: Poland
IEEE Section Chair name: Maciej Ogorzalek

Milestone proposer(s):

Proposer name: Maciej Ogorzalek
Proposer email: Proposer's email masked to public

Proposer name: Jozef Modelski
Proposer email: Proposer's email masked to public

Proposer name: Marian Piotr Kazmierkowski
Proposer email: Proposer's email masked to public

Please note: your email address and contact information will be masked on the website for privacy reasons. Only IEEE History Center Staff will be able to view the email address.

Street address(es) and GPS coordinates in decimal form of the intended milestone plaque site(s):

ul. Śniadeckich 8, 00-956 Warszawa (Warsaw), Poland GPS (latitude, longitude) 52.2213787 ; 21.0146535

Describe briefly the intended site(s) of the milestone plaque(s). The intended site(s) must have a direct connection with the achievement (e.g. where developed, invented, tested, demonstrated, installed, or operated, etc.). A museum where a device or example of the technology is displayed, or the university where the inventor studied, are not, in themselves, sufficient connection for a milestone plaque.

Please give the address(es) of the plaque site(s) (GPS coordinates if you have them). Also please give the details of the mounting, i.e. on the outside of the building, in the ground floor entrance hall, on a plinth on the grounds, etc. If visitors to the plaque site will need to go through security, or make an appointment, please give the contact information visitors will need. Institute of Mathematics, Polish Academy of Sciences

Are the original buildings extant?


Details of the plaque mounting:

The plaque will be placed at the front entrance of the Institute's building facing the Sniadeckich Street

How is the site protected/secured, and in what ways is it accessible to the public?

The plaque site is publicly accessible at one of the busy streets of Warsaw downtown area, with high concentration of academics and tourists

Who is the present owner of the site(s)?

Instytut Matematyki Polskiej Akademii Nauk

What is the historical significance of the work (its technological, scientific, or social importance)? If personal names are included in citation, include justification here. (see section 6 of Milestone Guidelines)

IEEE Milestone Description During the 1930s, a trio of Polish mathematicians Marian Rejewski (1905 – 1980), Henryk Zygalski (1907 – 1978), and Jerzy Różycki (1909 – 1942) solved the German Enigma cipher machine and broke Enigma messages. Working with engineers from AVA Radio Manufacturing Company they built the bomba – the first cryptanalytic machine designed to attack Enigma and one of many cryptanalytic machines to be built by Allied codebreakers. Enigma is an electrically wired rotor machine; a sequence of ciphers is generated by the motion of rotors in the machine. It is one of several cipher machines that were developed for military or for commercial use during or just after World War I. German Arthur Scherbius invented Enigma; he patented a rotor machine in 1918. An American, Edward Hebern, had designed a rotor cipher machine in 1917, and the Dutch inventor Hugo Koch and the Swedish inventor Arvid Damm designed machines that were patented in 1919.

It is likely that both Scherbius’ and Koch’s designs resulted from a rotor machine developed in 1915 

by two Dutch military officers.

The weaknesses of their World War I codes and ciphers prompted the German military to adopt a cipher machine. The Reichsmarine began using Enigma in 1926, and the Reichswehr began using it in 1928. The Polish Cipher Bureau had many successes during the Polish-Soviet War (1919 – 1921), and in the 1920s the Cipher Bureau monitored radio signals resulting from German military exercises. In 1928 the Poles were confronted by messages that – because of the randomness of letters in the messages – were thought to be generated by a machine cipher.

That same year the Cipher Bureau began a cryptology course for mathematics students at Poznań University. Rejewski, Zygalski, and Różycki participated in that course. They began working for the Cipher Bureau in Poznań but moved to Warsaw, and Rejewski began his attack on Enigma in September 1932. Although the Cipher Bureau was aware of the operation of a commercial Enigma, the rotors of the German military Enigma had different wiring than the commercial version, and the German military had complicated the machine by adding a plugboard, which further greatly scrambled the letters. By the end of 1932, Rejewski had determined the wiring of the rotors of the military version of Enigma. In 1932, Rejewski had received from the French two German manuals that described the operation of military Enigma. He had managed to write a system of equations that modeled the permutations of the six indicators (which were used by the sending operator to transmit the message setting to the receiving operator) at the beginning of Enigma messages. In December 1932, Rejewski received from the French the setting sheets for September and October. This information allowed Rejewski to substitute for some of the unknowns in his system of equations and solve for the wiring of the rotors. The Cipher Bureau arranged with AVA Radio Manufacturing Company to produce Enigma “doubles.” Doubles were produced in 1934. AVA Company had been established by Edward Fokczyński and Antoni Palluth to design and produce telecommunications equipment for the Polish army. They were soon joined by the brothers Ludomir and Leonard Danilewicz, who had graduated from Warsaw University of Technology. In order to break Enigma messages, it was necessary to determine the machine settings. The Polish codebreakers developed several techniques to determine settings. For example, Różycki developed the “clock method,” and Zygalski developed a set of perforated sheets. Two other methods resulted in the production of codebreaking machines – one machine to produce a catalog of settings and their “characteristics” and another to determine the rotor settings.

In 1934, Rejewski was able to exploit patterns, which he called characteristics, produced by the six-letter 

indicators at the beginning of Enigma messages. Rejewski designed a machine called the cyclometer to catalog the characteristics of all 105,456 rotor settings. Again, the AVA Radio Manufacturing Company produced the machine. It took the codebreakers approximately a year to prepare the catalog. Unfortunately not long after its completion, the Germans changed Enigma’s reflecting rotor, and the catalog had to be redone. This method was rendered useless when the indicator procedure changed in September 1938. However, Rejewski found patterns in the new indicators. Working with the engineers at AVA, one of the most famous codebreaking machines – the bomba – was produced. The six bomby (plural in Polish for “bomba”) searched through all 105,456 rotor settings for those that exhibited patterns that could be determined from the indicators after a sufficient number of messages were intercepted. (Note: The reason that it is written both “bomba” and “bombę” is the declension endings. “Bomba” is for “who” or “what” and “bombę” is for “whom, what for?”) Usually only a small number of settings produced the patterns, and each of those settings was tried to determine the one that was correct. Because there were three rotors and three positions for rotors in Enigma, there were six possible rotor orders; therefore, six bomby were produced. In December 1938, the Germans introduced two new rotors. Then there were sixty possible ways to select three rotors from the set and place them in Enigma; sixty bomby would have been needed, and the Cipher Bureau could not afford to build them. After the change, the Cipher Bureau could break few Enigma messages. In July 1939, as war with Germany loomed over Poland, the Polish codebreakers met just outside Warsaw with British and French codebreakers. At this meeting the Poles described their achievements against Enigma.

As a result of the meeting, the British and the French each received one of the Enigma doubles and information 

on the methods used by the Poles to solve daily keys. On September 1, 1939, Germany attacked Poland, and British codebreakers at Bletchley Park continued the attack on Enigma. British mathematicians such as Alan Turing and Gordon Welchman and engineers such as Harold “Doc” Keen and Thomas “Tommy” Flowers developed cryptanalytic machines to attack Enigma and other German ciphers. One of the machines to attack Enigma was the Turing-Welchman bombe. (IEEE Milestone, Bletchley Park, 1939 – 1945) Both the British bombe and the Polish bomba searched through all possible Enigma rotor settings for settings that produced patterns that had been noticed by the codebreakers. The British bombe searched for patterns in Enigma messages, and the Polish bomba searched for patterns in Enigma indicators. After the United States entered the war, US Navy mathematicians at Naval Communications in Washington, DC, designed cryptanalytic machines to attack Japanese ciphers and machines to assist the British with the attack on naval Enigma. These codebreaking machines were engineered by Joseph Desch and other engineers at the Naval Computing Machine Laboratory located at National Cash Register Company in Dayton, OH. One of the machines to attack naval Enigma was the US Navy cryptologic bombe. (IEEE Milestone, Naval Computing Machine Laboratory, 1942 – 1945) The US Navy bombe – like the British bombe – searched for patterns in Enigma messages. At the beginning of the German attack on Poland, Rejewski, Zygalski, and Różycki fled Warsaw, and they arrived in Paris in late September. By the end of October they were again working on German ciphers – now at Command Post (P.C.) Bruno at Gretz-Armainvillers near Paris. The Poles and the British exchanged Enigma keys. In January 1940, Alan Turing visited the Polish codebreakers in France. Turing brought the Poles the British version of the Zygalski sheets, and the Poles provided Turing with corrected information on the wiring of Enigma rotors IV and V. Palluth and Fokczyński had also fled to France. Palluth maintained the team’s radio contact with London and later with Algiers and was involved with monitoring German radio signals. Fokczynski repaired radio and cipher equipment. Following the German attack on France in May 1940, Rejewski, Zygalski, and Różycki evacuated to North Africa. By October they had returned to Vichy France and continued attacking German ciphers. They were located near Uzès at P.C. Cadix. Until Germany took control of South France, the Polish codebreakers traveled to and from North Africa. On January 9, 1942, on a trip back to France after a three-month assignment in the cipher section in Algiers, Różycki died when the ship on which he was traveling sank. In November 1942, after Operation Torch, the Allied attack on North Africa, Germany occupied free France. Rejewski and Zygalski undertook a harrowing crossing into Spain, which included their being detained in Spanish prisons. After their release, they traveled to Portugal and then to Gibraltar from where they flew to Britain. Palluth and Fokczyński were both captured during the crossing into Spain. They both died in the Sachsenhausen camp – Palluth during an Allied bombing raid and Fokczyński due to illness. Rejewski and Zygalski arrived in Great Britain in August 1943 and served with the Communications Battalion of the Polish Armed Forces Commander-in-Chief’s General Staff. Both served in the German section. Their work until the end of the war was breaking manual SS and SD ciphers. After the war, Zygalski remained in England and worked at the Polish University. He died in 1978 in Liss, near Portsmouth. When the war ended, Rejewski returned to his home in Bydgoszcz where, despite harassment by the Polish security services, he worked for various companies until his retirement because of poor health in 1966. He moved to Warsaw in 1969 and died there of a heart attack in 1980.

IEEE Poland Section is indebted to Dr. Chris Christensen and Mr. Ralph Erskine for their editorial support and useful comments added to this manuscript, especially concerning the existing related IEEE Milestones (1939-45 Bletchley Park, and 1942-45 Naval Computing Machine Laboratory)

What obstacles (technical, political, geographic) needed to be overcome?

. In December 1938, the Germans introduced two new rotors. Then there were sixty possible ways to select three rotors from the set and place them in Enigma; sixty bomby would have been needed, and the Cipher Bureau could not afford to build them. After the change, the Cipher Bureau could break few Enigma messages. In July 1939, as war with Germany loomed over Poland, the Polish codebreakers met just outside Warsaw with British and French codebreakers. At this meeting the Poles described their achievements against Enigma. As a result of the meeting, the British and the French each received one of the Enigma doubles and information on the methods used by the Poles to solve daily keys.

At the beginning of the German attack on Poland, Rejewski, Zygalski, and Różycki fled Warsaw, and they arrived in Paris in late September. By the end of October they were again working on German ciphers – now at Command Post (P.C.) Bruno at Gretz-Armainvillers near Paris. The Poles and the British exchanged Enigma keys. In January 1940, Alan Turing visited the Polish codebreakers in France. Turing brought the Poles the British version of the Zygalski sheets, and the Poles provided Turing with corrected information on the wiring of Enigma rotors IV and V. Palluth and Fokczyński had also fled to France. Palluth maintained the team’s radio contact with London and later with Algiers and was involved with monitoring German radio signals. Fokczynski repaired radio and cipher equipment. Following the German attack on France in May 1940, Rejewski, Zygalski, and Różycki evacuated to North Africa. By October they had returned to Vichy France and continued attacking German ciphers. They were located near Uzès at P.C. Cadix. Until Germany took control of South France, the Polish codebreakers traveled to and from North Africa. On January 9, 1942, on a trip back to France after a three-month assignment in the cipher section in Algiers, Różycki died when the ship on which he was traveling sank. In November 1942, after Operation Torch, the Allied attack on North Africa, Germany occupied free France. Rejewski and Zygalski undertook a harrowing crossing into Spain, which included their being detained in Spanish prisons. After their release, they traveled to Portugal and then to Gibraltar from where they flew to Britain. Palluth and Fokczyński were both captured during the crossing into Spain. They both died in the Sachsenhausen camp – Palluth during an Allied bombing raid and Fokczyński due to illness. Rejewski and Zygalski arrived in Great Britain in August 1943 and served with the Communications Battalion of the Polish Armed Forces Commander-in-Chief’s General Staff. Both served in the German section. Their work until the end of the war was breaking manual SS and SD ciphers. After the war, Zygalski remained in England and worked at the Polish University. He died in 1978 in Liss, near Portsmouth. When the war ended, Rejewski returned to his home in Bydgoszcz where, despite harassment by the Polish security services, he worked for various companies until his retirement because of poor health in 1966. He moved to Warsaw in 1969 and died there of a heart attack in 1980.

What features set this work apart from similar achievements?

On September 1, 1939, Germany attacked Poland, and British codebreakers at Bletchley Park continued the attack on Enigma. British mathematicians such as Alan Turing and Gordon Welchman and engineers such as Harold “Doc” Keen and Thomas “Tommy” Flowers developed cryptanalytic machines to attack Enigma and other German ciphers. One of the machines to attack Enigma was the Turing-Welchman bombe. (IEEE Milestone, Bletchley Park, 1939 – 1945) Both the British bombe and the Polish bomba searched through all possible Enigma rotor settings for settings that produced patterns that had been noticed by the codebreakers. The British bombe searched for patterns in Enigma messages, and the Polish bomba searched for patterns in Enigma indicators. After the United States entered the war, US Navy mathematicians at Naval Communications in Washington, DC, designed cryptanalytic machines to attack Japanese ciphers and machines to assist the British with the attack on naval Enigma. These codebreaking machines were engineered by Joseph Desch and other engineers at the Naval Computing Machine Laboratory located at National Cash Register Company in Dayton, OH. One of the machines to attack naval Enigma was the US Navy cryptologic bombe. (IEEE Milestone, Naval Computing Machine Laboratory, 1942 – 1945) The US Navy bombe – like the British bombe – searched for patterns in Enigma messages.

Supporting texts and citations to establish the dates, location, and importance of the achievement: Minimum of five (5), but as many as needed to support the milestone, such as patents, contemporary newspaper articles, journal articles, or chapters in scholarly books. 'Scholarly' is defined as peer-reviewed, with references, and published. You must supply the texts or excerpts themselves, not just the references. At least one of the references must be from a scholarly book or journal article. All supporting materials must be in English, or accompanied by an English translation.

The achievements outlined above are covered in more detail in the following publications: [1] Frank Carter, “The First Breaking of Enigma: Some of the Pioneering Techniques Developed by the Polish Cipher Bureau,” Report No 2, Bletchley Park Trust, 2008. [2] Jennifer Wilcox, “Solving the Enigma: History of the Cryptanalytic Bombe,” Center for Cryptologic History, National Security Agency, 2006. http://www.nsa.gov/about/_files/cryptologic_heritage/publications/wwii/solving_enigma.pdf [3] Chris Christensen,”Polish Mathematicians Finding Patterns in Enigma Messages,” Mathematics Magazine, 80(4), October 2007, pp. 247-273. [4] F. H. Hinsley, et al., British Intelligence in the Second World War: Its Influence on Strategy and Operations (book). 3(2), Appendix 30. [5] Andrew Hodges, Alan Turing: The Enigma, Simon & Schuster, 1983 (book). This is also available in a Polish translation: Andrew Hodges, Enigma. Życie i śmierć Alana Turinga, Prószyński i S-ka, Warsaw, 2002. [6] Brian Johnson, The Secret War, Methuen Inc, 1978 (book). This is also available in a Polish translation: Brian Johnson, Sekrety Drugiej Wojny Światowej. Wojna Mózgów, Zysk i S-ka, Warsaw, 1997. [7] Władysław Kozaczuk, W kręgu Enigmy, Książka i Wiedza, Warsaw 1986 (book). [8] David Kahn, The Codebreakers: The Story of Secret Writing, Scribner; Revised Edition, 1996 (book). This is also available in a Polish translation: Łamacze kodów: Historia kryptologii, WNT Warszawa, 2004. [9] Marian Rejewski, Memories of My Work at the Cipher Bureau of the General Staff Second Department 1930-45, Adam Mickiewicz University Press, Poznań, Poland, 2011 (book.) Half of this book is written in Polish, and the other half is a translation into English.

Websites: US National Security Agency’s Center for Cryptologic History website: http://www.nsa.gov/about/cryptologic_heritage/center_crypt_history/publications/wwii.shtml There are many Enigma websites, including Wikipedia’s comprehensive coverage at http://en.wikipedia.org/wiki/Cryptanalysis_of_the_Enigma

Supporting materials (supported formats: GIF, JPEG, PNG, PDF, DOC): All supporting materials must be in English, or if not in English, accompanied by an English translation. You must supply the texts or excerpts themselves, not just the references. For documents that are copyright-encumbered, or which you do not have rights to post, email the documents themselves to ieee-history@ieee.org. Please see the Milestone Program Guidelines for more information.


Please email a jpeg or PDF a letter in English, or with English translation, from the site owner(s) giving permission to place IEEE milestone plaque on the property, and a letter (or forwarded email) from the appropriate Section Chair supporting the Milestone application to ieee-history@ieee.org with the subject line "Attention: Milestone Administrator." Note that there are multiple texts of the letter depending on whether an IEEE organizational unit other than the section will be paying for the plaque(s).

Please recommend reviewers by emailing their names and email addresses to ieee-history@ieee.org. Please include the docket number and brief title of your proposal in the subject line of all emails.