Role of three Polish mathematicians: Różycki, Zygalski and Rejewski in breaking Enigma was as usual overlooked.
Please read: https://www.bbc.com/news/magazine-28167071
** GERMANY [non]. As seen on PBS World Channel via OETA, Nov 8 at 2200: ``Breaking Enigma: A World War II Game Changer Special | 56m 29s Video has Closed Captions | CC Narrated by Keith Morrison of "Dateline," the breaking of Germany's top-secret Enigma Code at Bletchley Park in the United Kingdom was one of World War II's biggest secrets, alongside the atomic bombs. Some historians estimate that deciphering the German military code shortened the war by two years and possibly saved 14 million lives. 11/01/2025 | Expires 01/01/2026 | Rating TV-PG`` I get this play link once I reveal my PBS is OETA: https://www.pbs.org/video/breaking-enigma-a-world-war-ii-game-changer-mx5LiA/ You have to set up with ``your`` station. A more detailed description at OETA.tv: ``The breaking of Germany's top-secret Enigma Code at Bletchley Park in the United Kingdom was one of World War II's biggest secrets, alongside the construction of the atomic bombs. Some historians estimate that deciphering the German military code shortened the war by two years and possibly saved 14 million lives. Though the Enigma was deemed unbreakable, a British mathematician named Alan Turing spearheaded the initiative to achieve the impossible and succeeded unbeknownst to the German military. Narrated by Keith Morrison of Dateline and filmed on location in England and the United States, BREAKING ENIGMA: A WORLD WAR II GAME CHANGER tells this heroic story in detail through a combination of interviews with historians, veterans and modern scientists.`` A post-script says some of the women codebreakers interviewed died just this year 2025. Roger in Germany replies: ``Thanks for sharing this information. It cannot be used with a German IP address, but you can break the geo-blocking via VPN. 1920x1080 ca. 1,8 GB The mention of the "Lorenz-Schlüsselmaschine was also interesting. https://de.wikipedia.org/wiki/Lorenz-Schl%C3%BCsselmaschine https://de.wikipedia.org/wiki/Kryptanalyse_der_Lorenz-Maschine The aim was to simplify and automate machine encryption compared to the cumbersome Enigma machine, and to achieve significantly higher message volumes and transmission speeds than was possible with manually operated Morse code. To this end, the Schlüssel-Zusatz (SZ) was developed as an add-on device for a Lorenz teletypewriter. As is usual with teletypewriters, the Baudot-Murray code (CCITT-2) with 5 bits was used for the transmission of 32 characters. The binary representation is particularly well suited for the binary addition of a pseudo-random key, thereby cryptographically implementing the function of a mixer... Starting in June 1941, the German Wehrmacht began securing its telegraph communications between the highest command posts using a newly developed encryption machine called Schlüssel-Zusatz 40 (SZ 40). Above the Enigma machine, which continued to be used for tactical communication, it served to encrypt strategic communications, especially between the Army High Command (OKH), based in Wünsdorf near Berlin, and the Army High Commands (AOK) in cities such as Vienna, Rome, Paris, Athens, Copenhagen, Oslo, Königsberg, Riga, Belgrade, Bucharest, and Tunis. As early as the second half of 1940, British interception stations (Y Stations) had noticed German radio telegraph traffic that sounded distinctly different from the usual Morse code signals, and initially gave it the nicknames “new music” and ‘NoMo’ for “No Morse.” A little later, radio transmissions of this type were grouped under the code name Fish. Due to a lack of capacity and resources, these messages were initially given low priority and could not be deciphered. ....Presumably for convenience, the second time around he did not enter the plain text into the teletypewriter identically to the first time, but slightly abbreviated it. Right at the beginning of the message, he did not write SPRUCHNUMMER (message number) as he had done the first time, but abbreviated the word and wrote only SPRUCHNR. From this point on, the two ciphertexts differed significantly, while the plaintexts continued almost identically. The Germans did not notice this, but for the British it was a “godsend.” Now they were in possession of a so-called depth, i.e., two different ciphertexts based on two nearly identical but slightly shifted plaintexts, both of which had been encrypted with the same key. (In German technical terminology, this case is also referred to as a “plaintext-plaintext compromise.”) This involuntary “gift” from the Germans allowed British code breaker John Tiltman (1894–1982) at Bletchley Park in England to make the decisive first breakthrough in SZ 40. After weeks of manual work, he succeeded in determining the two slightly “phase-shifted” and almost identical plaintexts. To do this, he calculated the difference between the two intercepted radio messages and tried to insert probable words. This enabled him to reconstruct not only the plaintexts, but also a 4,000-character section of the “pseudo-random” key. This ultimately led to the exposure of the logical structure of the key supplement. The combination of the two errors mentioned above proved fatal for the German side, without them knowing or even suspecting it. OT 2005: https://www.elcomsoft.com/help/en/azpr/index.html?page=known_plaintext_attack.html roger`` (Glenn Hauser, OK, WOR) ** NORTH AMERICA. 6925 AM, Nov 9 at 0221, rock music S9. These say it`s Liquid Radio: https://www.hfunderground.com/board/index.php/topic,153449.0.html An hour earlier, no pirate could I hear (Glenn Hauser, OK, WOR)
_ Hard-Core-DX mailing list [email protected] http://montreal.kotalampi.com/mailman/listinfo/hard-core-dx http://www.hard-core-dx.com/ _______________________________________________ THE INFORMATION IN THIS ARTICLE IS FREE. It may be copied, distributed and/or modified under the conditions set down in the Design Science License published by Michael Stutz at http://www.gnu.org/licenses/dsl.html
