Resources: How Polish Mathematicians Deciphered the Enigma, IEEE Annals of the History of Computing, 1981
 Theory behind Breaking Enigma Cipher, Appl. Math., 1980
 Math. Solution of Enigma Cipher from Cryptologia, 1982
 In Memoriam, M. Rejewski from Cryptologia, 1982
 Conversation with M. Rejewski from Cryptologia, 1982
 Cryptographic Mathematics of Enigma, by Ray Miller National Security Agency
 Role of Turing and Rejewski in Deciphering Enigma
 Rejewski and Enigma (in German) Informatik Spektrum, 2000
 Source Materials in breaking Enigma
 Polish Cryptologists and Enigma, by Lisicki, 1979
 Overview of the History of Cryptology
 The Brains Behind Enigma
Marian Rejewski [pron. MAHRyahn reYEVski] was born on August 16, 1905, in Bydgoszcz, Poland (then Bromberg, Prussia/Germany) and died on February 13, 1980 in Warsaw. He studied mathematics at Poznan University and graduated with a masterâ€™s degree in 1929. After graduation, he spent a year in GÃ¶ttingen, Germany, studying actuarial mathematics, and returned to Poznan to take a lectureship in mathematics at the University. At the same time, he began working for the Polish Cipher Bureau where he became permanently employed in 1932, working on a team breaking the German Enigma code. During the World War II, he continued work on breaking codes for the Allies, in France and Britain. He returned to Poland in 1946, but did not continue his work in cryptography and worked as a clerk until his retirement in 1967.
Major Contribution: Breaking the German Enigma cipher in 193233, with Jerzy RÃ³zycki and Henryk Zygalski [14].
Basic Questions What is the Enigma cipher? Enigma was a German ciphering machine used before and during World War II for coding commercial and military messages. The ciphering method is pretty elaborate, although described well in details in multiple publications by Rejewski himself [24] and others [58]. A succinct description of Enigma has been recently given by J. Copeland [9]. Briefly speaking, the encryption process relies on automatic encoding sequences of letters entered from the keyboard (of 26 letters, A through Z), by the arrangement of three rotating drums (rotors) and one reflecting drum that convert each letter according to a preassumed secret rule (which can be changed). When a message thus encoded is delivered to the recipient, Enigma deciphers it and produces the plain text, as typed in by the sender, provided that both machines were synchronized to the same settings. Multiple simulators imitating Enigmaâ€™s operation are available online, including one on this page under the Resources button. The cryptographic power of Enigma cipher is best illustrated by the number of possible Enigma configurations. A.R. Miller [10] discusses this issue in a very straightforward manner, attributing the number of combinations to the following five variable components of Enigma: a plugboard which could contain up to thirteen dualwire cables to connect pairs of letters
 three ordered rotors which wired twenty six input points to twenty six output points
 twenty six serrations which allow the operator to specify initial positions of the rotors
 a movable ring on each of the rotors which controls their behavior by means of a notch
 a reflector rotor to fold inputs and outputs back.
Millerâ€™s calculations lead to an incredible number of the order of 10^114 (yes, ten to the power of one hundred fourteen) combinations, which is many orders of magnitudes higher than the estimated number of atoms in an observable universe! How, then, could the Enigma code be broken (the encoding rule uncovered)? Theoretically, this is next to impossible. However, Marian Rejewski describes the process of how he and his coworkers came up with the solution that ultimately led them to breaking the Enigma code [24]. The essential notion to understand it is the mathematical term permutation, which means â€œchanging an arrangement of elements in a sequenceâ€. Thus, Rejewski and his team were tasked with finding the rule, which Enigma used to govern rearranging permutations of letters in the original text to produce the enciphered text, and vice versa. Two things were essential in this process: formulating mathematical equations which described the generation of permutations, and, using some additional intelligence information, solving them by a very laborious computational process. The equations Rejewski formulated involved all the components of the machine participating in the transformation of the initial text into an enciphered text. In Rejewskiâ€™s terms, equations (six of them for a known message header) had the following form:
A = SHPNP^(1)MLRL^(1)M^(1)PN^(1)P^(1)H^(1)S^(1) where A means a known header permutation (which was obtained by intelligence), S â€" the permutation produced by the switchboard, and H, L, N, M, R â€" permutations from all the drums. With a lot of guessing, deductive reasoning, and some preset configurations delivered by the French intelligence, Rejewski was able to break the Enigma code, but as he states in his papers, â€œTo this day it is not known whether equations are solvableâ€ [2].
Significance Breaking the Enigma cipher is considered by some to be one of the two most critical scientific events leading to the end of World War II â€" the other one being the development of an atomic bomb. The extraordinary contribution of Rejewski and his colleagues has been independently confirmed by many authors in books and papers. For example, an American historian, D. Kahn, describes it as follows: â€The solution was Rejewski's own stunning achievement, one that elevates him to the pantheon of the greatest cryptanalysts of all timeâ€ [6]. Since the special issue of Cryptologia appeared in 1982 [1112], reprinted next in a book [13], to this day papers are being published on the Rejewskiâ€™s role in deciphering Enigma [1415]. However, the destruction of the Polish Cipher Bureau at the beginning of war, displacements of the crew, certain political decisions of the Allies, and the need for a significant computational power, due to constant changes made in Enigma by the Germans, led to the discontinuation of work by Rejewski. In the meantime, another great figure in decrypting the Enigma cipher, Alan Turing, emerged. One can read a balanced account on the role of both men in deciphering Enigma, in an article by J. Copeland [9], and especially on Turing in [16].
Findings The historical contribution of this website is in bringing together important pieces of information on Marian Rejewski. They have been known individually for some time, since the history of Enigma and breaking its cipher is very well researched, but never before has a single source been created that collects all this information and presents it for viewing, with links to the original material.
References [show]
[1] T. Lisicki, Die Leistung des polnisches Entzifferungsdienstes bei der LÃ¶sung des Verfahrens der deutschen EnigmaFunkschlÃ¼sselmaschine, Die FunkaufklÃ¤rung und ihre Rolle im Zweiten Welkrieg, J. Rohwer, E. JÃ¤ckel (Eds.), Motorbuch Verlag, Stuttgart, 1979, s. 6683. [2] M. Rejewski, An Application of the Theory of Permutations in Breaking the Enigma Cipher, Applicationes Mathematicae, Vol. 16, No. 4, pp. 543559, 1980 [3] M. Rejewski, How Polish Mathematicians Deciphered Enigma, IEEE Annals of the History of Computing, Vol. 3, No. 3, pp. 213234, July 1981 [4] M. Rejewski, Mathematical Solution of the Enigma Cipher, Cryptologia, Vol. 6, No. 1, pp. 118, January 1982 (Reprinted in [13], pp. 310327) [5] W. Kozaczuk, Enigma: How the Poles Broke the Nazi Code, Hippocrene Books, New York, 2004 [6] D. Kahn, The CodeBreakers, Macmillan, New York, 1967 (Expanded Edition, 1996) [7] G. Bertrand, Enigma ou la plu grande enigme de la guerre 19391945, Librairie Plon, Paris, 1973 [8] F.L. Bauer, Decrypted Secrets: Methods and Maxims of Cryptology. 2nd Edition, SpringerVerlag, Berlin, 2000 [9] J. Copeland (Ed.), The Essential Turing, Clarendon Press, Oxford, 2004. Chapter 4: Enigma. http://www.phil.canterbury.ac.nz/personal_pages/jack_copeland/pub/etsamp.pdf [10] A.R. Miller, The Cryptographic Mathematics of Enigma, National Security Agency, Ft. Meade, Maryland, 2006 [11] Ch. Kasperek, R. Woytak, In Memoriam: Marian Rejewski, Cryptologia, Vol. 6, No. 1, pp. 1925, January 1982 (Reprinted in [13], pp. 1521) [12] R. Woytak, A Conversation with Marian Rejewski, Cryptologia, Vol. 6, No. 1, pp. 5060, January 1982 (Reprinted in [13], pp. 414) [13] C.A. Deavours et al. (Eds.), Cryptology: Machines, History and Methods, Artech House, Norwood, Mass., 1989 [14] F.L. Bauer, Marian Rejewski und die Alliierten im Angriff gegen die Enigma, Informatik Spektrum, Vol. 23, No. 5, pp. 325333, October 2000 [15] F.L. Bauer, Mathematik besiegte in Polen die unvernuenftig gebrauchte Enigma, Informatik Spektrum, Vol. 28, No. 6, pp. 493497, December 2005 (Part 1), and Vol. 29, No. 1, pp. 5360, February 2006 (Part 2) [16] J. Copeland, Colossus: The Secrets of Bletchley Park's CodeBreaking Computers, Oxford University Press, New York, 2006
