You are here

The Theorem that Won the War: Activities for Part 1.2 (Encryption)

Author(s): 
Jeff Suzuki (Brooklyn College)

 

Suggestion: The encryption activities are easier if they are done as group activities, with one person calling out the keyboard encryptions and the other the reflector encryptions.

For activities 1–4 in this section, we continue with the example from the previous page, for which the "Initial Setup" was as follows:

Diagram of initial setup of reflector and keyboard rotors for some exercises on Enigma machine encryption.

  1. Consider the initial setup shown above.
    1. Draw a rotor corresponding to the keyboard rotor.
    2. Explain why, when the current is moving right-to-left, we use the encryption \(a \rightarrow c\), but when the current is moving left-to-right, we use the backward encryption \(a \rightarrow d\).
  2. Express, in Cauchy two-line notation, the permutation used for the first; second; and third letters in the encryption of the message \(cab\) that we completed on the previous page using the initial setup shown above.
  3. Suppose we want to send the message \(cab \, bad\) using the initial setup shown above. Complete the encryption. Ignore the space, so that the \(b\) of \(bad\) will be the fourth letter that needs to be encrypted.
  4. An encryption system is not useful unless the recipients can decrypt the messages. Suppose you receive the encrypted message \(dbf\).
    1. “Reset” the paper Enigma to the initial setup shown above. Then encrypt \(dbf\). What do you notice?
    2. Continue on with the rest of your encrypted version of the message \(cab \, bad\). What happens?
  5. Notice that the initial placement of the rotors is arbitrary.  Suppose the initial setup of the rotors is as shown below:

     

    Diagram of initial setup of reflector and keyboard rotors for an exercise on Enigma machine encryption.

    1. Encrypt the word \(cab\) using this initial setup.
    2. Express, in Cauchy two-line notation, the encryption used for the first; second; and third letters.
  6. Now suppose your initial setup is:

     

    /sites/default/files/images/upload_library/46/Suzuki_Enigma/Suzuki_Ex5_Act1_2.jpg

    1. Use this initial setup to encrypt the message: \(faded \, cab\).
    2. Verify that using the same initial setup will decrypt the message correctly.
  7. Explain why it is impossible for any rotor and reflector set to encrypt a letter as itself.

Return to the overview of Part 1.2 (The Enigma Encryption).

Continue to the overview of Part 2 (The Algebra of Enigma).

Jeff Suzuki (Brooklyn College), "The Theorem that Won the War: Activities for Part 1.2 (Encryption)," Convergence (October 2023)