Skip main navigation

New offer! Get 30% off one whole year of Unlimited learning. Subscribe for just £249.99 £174.99. T&Cs apply

Quantum cryptography

We have seen that quantum computers have the power to break RSA, hence in a world with quantum computers our use of this cryptographic method is certainly taken away. However, …

An overview of quantum cryptography

Quantum computers threaten current cryptographic techniques, but may hold the key to complete – provable – security. In this video, Hamid introduces the concept of quantum cryptography. What do you …

Rejewski’s insight

Using the mathematical insights of permutations, Rejewski invented a device called a cyclometer that enabled him to infer the daily settings from listening in to the encrypted messages. Rejewski’s cyclometer …

The Enigma machine as a permutation

By thinking of the Enigma machine as a sequence of permutations, and applying the theory we have already met, we will now take the first steps to see how the …

Conjugation and cycle structure invariance

How does cycle structure change when we perform different operations on permutations? More importantly, when doesn’t it change? Cycle structure of inverse permutations Hopefully you tried out the exercises at …

The cycle structure of permutations

In Week 1 we met the idea of permutations, and saw one way of representing them – the Cauchy two-line notation. We also saw how to compose two permutations together, …

How messages were sent in practice

Before we can understand how Enigma was broken, we need to appreciate the details of how messages were sent in practice. Before 15 Sept 1938 the operator set the machine …

Counting the number of possible settings

The difficulty in reading Enigma-encrypted messages came not just from the machine itself but mainly from the manifold different ways of setting the machine up. Without knowing the daily settings, …

Instructions for making your own machine

This step will show you how to build a simplified Enigma machine using only a Pringles tube. The wiring in the model is accurate – that is the genuine wiring …

Early history of the Enigma machine

The Enigma machine was used extensively by the German military to encrypt its communications throughout the Second World War (and for a few years beforehand); however it was broken by …

Rejewski’s cyclometer

In this video, Emilie explains how Rejewski was able to deduce the cycle structure of the permutation of the “double Enigma machine”, and how this dramatically reduced the number of …

A potential weakness

Watch this video to hear Emilie explain how the double-encryption of the message indicators was a weakness that could be exploited by mathematicians. Is there anything that strikes you as …

Make your own Enigma machine

In this video, Chris shows how to make a simplified version of the Enigma machine. Written instructions, along with the pictures you’ll need to print off, are provided in the …

Introduction to the Enigma machine

In this video, Chris Hughes gives an introduction to the Enigma machine. Have you heard about Enigma before? Use the comments below to tell us what you’ve heard about how …