How the Third Reich's main encryption machine, Enigma, was designed

12 869 28
How the Third Reich's main encryption machine, Enigma, was designed

During World War II, the German Armed Forces used a unique technology to create encrypted messages. Let's take a brief look at the design of the Third Reich's main encryption machine, the Enigma, which means "riddle" in German.

Externally, this equipment looked very simple, even primitive. It resembled a typewriter, with keys displaying the 26 letters of the Latin alphabet. It also had a panel with 26 lamps, next to which were also letters. Furthermore, there were rotating rotors—usually three of them.



When one of the keys was pressed, a light came on, but its letter designation was different. They pressed one key, and the light with a different letter came on.

The operator typed the text on the machine, writing it down on paper as he typed, using the letters that lit up as he typed. The result was complete gibberish. The recipient typed it on their own cipher machine in the same way, and the resulting text was normal.

The machine worked on the principle that it was a complex electrical circuit with tangled wires, which were used for encryption.

Current passes through three rotors, each numbered with 26 divisions corresponding to letters of the alphabet. Setting the rotors in a specific position allows the text to be "shuffled." When a key is pressed, electricity flows through the three rotors, reaches the reflector, and returns through the rotors a different route, changing the letter's value seven times along the way. Each press causes the rotor wheel to rotate, changing the combination again, and pressing the key again produces a new result. To further complicate the cipher, the letters on the keyboard could be swapped using jumpers on the front panel.

Before use, the machine's parameters were adjusted. These were written down on paper to prevent an adversary from deciphering the message, even if they possessed the Enigma but didn't know the settings.

Despite the machine's complexity, the Allies of the anti-Hitler coalition still managed to decrypt messages intercepted from the Nazis. As is well known, the British were the first to gain significant access to the Nazi encryption and decryption system, having discovered Enigma on board the "captured" U-110 submarine. Numerous encryption and decryption keys were also found there. However, there had been some successes before this, including by Rejewski's Polish group, which created a machine called "Antienigma" back in 1939.

28 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. +3
    10 January 2026 20: 46
    Thanks for the article, it's interesting... we look forward to more.
  2. +11
    10 January 2026 20: 57
    Nothing. In my opinion, the author "lifted the lid" on material from the internet. The result is... Anyone familiar with the Enigma machine won't know anything new. Those who aren't familiar won't understand anything... A graffiti addict, however...
    1. -1
      10 January 2026 23: 19
      Quote: tolancop
      Nothing. In my opinion, the author "lifted the lid" on material from the internet. The result is... Anyone familiar with the Enigma machine won't know anything new. Those who aren't familiar won't understand anything... A graffiti addict, however...

      Apparently, you're talking about nothing. Those in the know appreciate it. In the USSR, the M-125 and M-154 operated on almost the same principle. I remember them back then. Only what the author of the video calls "parameters" is otherwise known as a key system (one-time, daily, and long-term keys), which intelligence was always hunting for. In the event of a threat of capture, the cryptographer was obliged to destroy them first, and only then the machine itself, because if the keys were compromised, they had to be replaced across all troops, and that was a disaster.
      1. -5
        10 January 2026 23: 40
        Information that Enigma was cracked as a joint American-Anglo-Saxon effort was made public only in the late 70s, so our models could not have been analogs of this famous series.
        1. 0
          11 January 2026 02: 04
          The Poles were the first to hack it.
          1. 0
            11 January 2026 18: 54
            A Pole created it, and the British stole it from a sunken German submarine.
            1. 0
              11 January 2026 19: 25
              Polish cryptanalysts moved to England after Poland's capitulation and handed over the Bombe decryption device.
        2. 0
          11 January 2026 10: 51
          To discuss the device, you need to at least tinker with it once. Do you have any experience with this? Below, my colleague Andriuha077 posted a photo of the M-125. It shows disks through which current flows, using the same principle as in the Enigma, producing an output letter completely different from the one printed on the key. The difference is that while the output from the Enigma was copied manually, in our case, the gibberish text is sent to the tape.
  3. +6
    10 January 2026 20: 57
    The first M-125 "Fialka" was developed in the 1950s at Leningrad Plant No. 209 under the leadership of chief designer Nikolai Gyrdymov for the USSR Armed Forces (according to some sources, it was developed in 1962, based on the K-37 "Kristall" machine). Its design was similar to the German Enigma rotary machine from World War II.
    Although the machine is more similar to the American Sigaba, KL-7 and, to a lesser extent, Enigma, it is called the Russian Enigma.
    Photo: The Soviet "Fialka M-125-3M" encryption machine was auctioned off for $22.
    1. +1
      11 January 2026 00: 25
      According to Soviet classification, it was a coding machine, not a cipher machine. It was intended for processing classified documents, nothing higher.

      The encryption machines themselves used a purely random sequence of ciphertext. It wasn't synthesized from keys, but rather contained in cipher pads.
      1. 0
        11 January 2026 00: 35
        She had a cool feature: messages were strictly delivered with a signature.
      2. -1
        11 January 2026 15: 41
        It's hard to explain anything to people, they always know everything from non-specialized sources and consider themselves experts. Critical thinking is not about criticizing another opinion and rejecting it.
      3. -1
        12 January 2026 04: 48
        Not quite so. In many branches of the military, it was considered a coding unit, and, for example, motorized rifle divisions had coding and encryption (using M-105) groups.
        However, for the Airborne Forces and GRU units, it was considered a cipher machine. It was believed that information quickly "aged" during correspondence between these units, and it was permissible to transmit SS-classified information during wartime.
        Moreover, in a full-scale nuclear war, intermediate headquarters could have been lost. The M-125 coding machine used an OSB-1250 notepad (if the number was correct). 1250 subscribers with this equipment from different branches of the military could communicate with each other, changing the punch card and disk set once a day.
        The M-154 encryption machine was similar in principle to the M-125, but was used to a greater extent in industrial enterprises, large headquarters, the Navy, and the Strategic Missile Forces (the author personally sent the staff of the Strategic Missile Forces army headquarters)
      4. +1
        13 January 2026 09: 52
        By the way... the cipher machines in the USSR were electromechanical, but the "electro" part of the name only refers to the motor. The machine worked perfectly without electricity. You inserted a handle and turned it.

        All logic was realized in mechanics. In the old days, I studied it... this was the high level of Soviet engineering thought.
  4. +2
    10 January 2026 21: 15
    Antienigma.
    Why are there letters on one rotor, and then numbers from 0 to 26 on three rotors?
    And did Turing just accidentally remain in history because of Rejewski's modesty?
    1. +3
      10 January 2026 22: 17
      Because only the letter mattered. The numbers on the other rotors were for the initial setup of the machine before the session.
  5. +3
    10 January 2026 22: 13
    A semi-abstract report by an eighth grader?
    1. +2
      11 January 2026 01: 11
      Exactly. Some completely careless turns of phrase, both technically and otherwise:
      In addition, there were rotating rotors - usually three of them.
      What kind of rotors are these? Shafts, cylinders, gears?
      The machine worked on the principle that it was a complex electrical circuit with tangled wires, which were used for encryption.
      The turnover is especially strong with tangled wiresWere these cipher machines assembled by drunks? Or what?
      And then it's all pure gems. It's like a schoolboy's stream of consciousness after watching videos on a casual topic. It seems like the author is making TikToks and decided to tell it in his usual language.
      1. 0
        11 January 2026 20: 31
        Not rotors, but disks. Each disk had a set of contacts on both sides, with the contacts on opposite sides not connected one-to-one, but rather what the author called "interlocked." The disks, assembled into a block, contacted each other and rotated with each letter entered. As a result, current flowed from the contact of the first disk to the last one in a complex pattern.
        1. 0
          11 January 2026 20: 34
          Thank you! Your short comment provided more clarity and understanding than the entire article.
  6. -1
    10 January 2026 22: 47
    Quote: Napayz
    Because only the letter mattered. The numbers on the other rotors were for the initial setup of the machine before the session.


    Is the populism shown in their film The Imitation Game at all similar to the real engineering research of that time?
    Or is it all just a movie-like clown show?
    1. 0
      13 January 2026 09: 44
      Once the principle of operation has been revealed (in reality), it means the film corresponds.

      After the British began reading German encrypted correspondence, they learned of a planned raid on Coventry. To avoid compromising the Enigma system, no measures were taken to protect the city. The Germans bombed the city for 11 hours.
  7. The comment was deleted.
  8. The comment was deleted.
    1. The comment was deleted.
  9. -1
    10 January 2026 23: 45
    The Enigma encryption system itself was presented in models, with their own characteristics, for three branches of the German armed forces: the Navy, the Air Force, and the ground forces.
  10. The comment was deleted.
  11. 0
    11 January 2026 00: 29
    80 years later: "How the Baofeng radio station from Ozone works."
  12. +4
    11 January 2026 00: 42
    You'd think this site was filled with nothing but cryptologists. Even for the layman, it's a very informative article.
  13. 0
    11 January 2026 08: 24
    Hello everyone! There's a channel on YouTube called Mark Solonin's Technical School. My (personally, my) feelings about Solonin are very mixed, but he has a series (three or four) of programs on this channel about the British work on deciphering the secrets of the Enigma machine. Interesting.
    1. -1
      11 January 2026 10: 30
      The best option is the SUREN channel, it covers a lot of things, space, Enigma, war film analyses with references to its initial causes, a lot of technical and scientific details, a very careful selection of material, but the format of the videos is 3-8 hours,
  14. -1
    11 January 2026 20: 02
    The prototype of the Enigma is our T-600. I know it well; it even had secret bolts. And the thing is, if you don't wipe the encryption disks with alcohol (only pure and high-quality alcohol, it wouldn't accept anything else!), it won't work!