Free Republic
Browse · Search
General/Chat
Topics · Post Article

http://jproc.ca/crypto/schluesselgeraet_41.html

http://jproc.ca/crypto/menu.html

By checking out the website above you can see that a great many Crypto-code Machines using electromechanical technologies were available in World War Two and the code war. Variants of some of these machines were used right up the 70's in The West and til the 1980's in the Eastern Bloc countries(Warsaw Pact).

The machine pictured above is one example of the Hitler Mill, an encryption machine that could have replaced the Enigma entirely and made code breaking on the part of the British(Bletchly Park) much much more difficult.

1 posted on 07/08/2009 3:52:06 AM PDT by Osnome
[ Post Reply | Private Reply | View Replies ]


To: Osnome
Concerns were raised from time to time about possible breaches of Enigma, and there were several formal inquiries by German armed forces that bore those concerns out. Yet these were suppressed by General Fritz Erich Fellgiebel, the brilliant and capable head of the German Signals Service — and a dedicated member of the German resistance to Hitler and the Nazis.

Fellgiebel did not survive the war because he was implicated the July 20 plot and fell into the lethal hands of the Gestapo. Even without the benefit of Fellgiebel’s account, there is is reason to believe that he deliberately maintained Enigma as a compromised signals system in order to help bring down the Third Reich.

In addition, some of the apparent operation and security errors that helped made Enigma signals readable by the Allies were likely the deliberate work of other anti-Nazi German officers. A substitute for Enigma would have been vulnerable to such honorable sabotage and errors in signals security.

Moreover, a mere change in machines would not have transcended the fundamental limitations of German code technology and practices or counteracted the scope and sophistication of Allied code breaking efforts. Unrealized by the Germans, the Allies had attained analytical and computational advances that far outpaced Germany;s ability to develop and adopt secure code systems.

In the end, whether Nazi Germany used Enigma or some substitute machine, the Allies would probably have read German's wartime signals.

2 posted on 07/08/2009 8:13:16 AM PDT by Rockingham
[ Post Reply | Private Reply | To 1 | View Replies ]

To: indcons; Ernest_at_the_Beach

· join list or digest · view topics · view or post blog · bookmark · post a topic ·

 
Gods
Graves
Glyphs
Just adding to the catalog, not sending a general distribution.

To all -- please ping me to other topics which are appropriate for the GGG list.
GGG managers are SunkenCiv, StayAt HomeMother, and Ernest_at_the_Beach
 

·Dogpile · Archaeologica · ArchaeoBlog · Archaeology · Biblical Archaeology Society ·
· Discover · Nat Geographic · Texas AM Anthro News · Yahoo Anthro & Archaeo · Google ·
· The Archaeology Channel · Excerpt, or Link only? · cgk's list of ping lists ·


3 posted on 07/08/2009 5:30:22 PM PDT by SunkenCiv (https://secure.freerepublic.com/donate/__Since Jan 3, 2004__Profile updated Monday, January 12, 2009)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Osnome

Trivia: Read here on FR once that the secrecy of the Enigma being cracked wasn’t revealed until decades after the war. Part of the reason for this was that third world countries were buying and using the machines for government use and Britain read their mail for years.


25 posted on 07/11/2009 4:57:48 AM PDT by Rebelbase (Obama--POtuS.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Peanut Gallery; sionnsar

ping


27 posted on 07/11/2009 5:36:12 AM PDT by Professional Engineer (FOBU: Mr. Gorbachev, tear down... Oooh, a well-proportioned derriere.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Osnome

Then there is good ol bureaucratic inertia.

Once Enigma is in place, those who fought off the other contenders will continue and even prevail in spite of problems, real or suspected. It is the bureaucratic way


28 posted on 07/11/2009 5:56:09 AM PDT by bert (K.E. N.P. +12 . The boy's war in Detriot has already cost more then the war in Iraq.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Osnome
The Colossus Code Pattern Detection Machine:
48 posted on 07/15/2009 1:07:29 AM PDT by Osnome
[ Post Reply | Private Reply | To 1 | View Replies ]

To: All
ENIAC, The original programmable electronic digital computer
49 posted on 07/15/2009 1:14:23 AM PDT by Osnome
[ Post Reply | Private Reply | To 1 | View Replies ]

To: All
The Japanese Code Purple Machine. It is interesting to note that this machine is functionally derivative of Hebern's Rotor based cipher code encryption machine. Note that this interesting mechanism uses two rotors for the scrambler-unit whereas Hebern's used only one.
50 posted on 07/15/2009 1:33:38 AM PDT by Osnome
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson