Category
🎥
Short filmTranscript
00:00http://www.youtube.com or www.facebook.com
00:11http://www.youtube.com or www.facebook.com
00:30And I do not believe that the opponents who laughed back then, still laugh today.
00:43The Second World War engulfed more than 50 million human lives.
00:48With the military might of Hitler, the whole world fought for several years.
00:52The Second World War was a long and cruel war, if not for the ingenious mind of this man and his two colleagues.
01:09The invention of which the authors were not only influenced by the fate of the war, but also gave rise to the era of computers.
01:18I remember him as a rather inconspicuous and very modest man, who did not cast an eye and did not pay attention to himself.
01:29I never thought that I have in front of me a man who, in my opinion, contributed more to the victory over Hitler than all the armies.
01:48Bydgoszcz, Wileńska Street.
01:51This is where Marian Rejewski was born and raised.
01:54He was still a child when in 1915 two officers of the Dutch Navy constructed the Enigma.
02:01A device from which Rejewski's mystery will come to light a dozen years later.
02:08The Netherlands.
02:10This is where the Enigma, the world's first electromechanical decoding device, was invented.
02:21Two Dutch Navy officers, Henger and von Spinger, were asked by the Dutch Navy to develop a machine that would allow the secretion of messages sent during the First World War.
02:34The Netherlands was neutral at the time and wanted to hide its information, both from the Germans and the English.
02:42The soldiers built two units of the machine, which were used in eastern Indonesia.
02:55The Codemakers.
02:57The most outstanding work that has been published so far on the subject of codes.
03:01The book was written a dozen years ago.
03:06Its author, an American, Dr. David Kahn, says that the history of cryptology is as long as the history of humanity.
03:14People have always had some information to hide.
03:18The basis, as the factual basis for your story...
03:33Julius Caesar's code was a very simple code.
03:36In which each letter of the original message was replaced by a code letter, which was four cases further down the alphabet.
03:47So that the letter A would be replaced by the letter D, the letter B would be replaced by the letter E, and so on.
03:57That was the way that Julius Caesar's code was used.
04:18That's how a coded text is made.
04:21That's how Caesar coded, among other things, military orders.
04:26Texts that are coded in this way can be decoded quite easily, using the linguistic method.
04:36The simplest method for breaking the simplest codes is based upon the fact that all letters of the alphabet are not used in a different frequency.
04:47In English, for example, there are many more letters E than there are letters X or Z.
04:57When reading a coded text, we first have to determine which letter appears most often in it.
05:03Because we know that in English the most common letter is E, we can easily guess that in the coded text under the letter R, there is E.
05:14By determining which letters are hidden under the letters of the coded text, we decode the whole content.
05:25Although there were other methods of decoding in the space of centuries, they were not an obstacle for competent cryptanalysts.
05:35The real breakthrough took place in the 20th century, when coding machines were invented.
05:41Suddenly, the number of possible combinations of letters by other letters in coded texts increased rapidly.
05:53Jan Korver's Telegraph Museum in Holland.
05:57Here we meet three friends fascinated by the Enigma.
06:04They have been working on the history of this machine for several years.
06:07As they say, the Enigma is, after the atomic bomb, the greatest mystery of the Second World War.
06:15The Enigma was based on electromechanical sub-units.
06:19If you press a button, the current starts flowing through a series of wheels, and the wheels turn with the letters of the alphabet on them.
06:29The electric impulse runs from one wheel to the next and the next, until it comes back and starts up again.
06:38So if you press the letter A again, the letter M turns on.
06:43And if you press the letter A again, another letter turns on.
06:48So for each key you press, you have a completely different concept of encoding.
06:58Because on each wheel there were 26 contacts through which the electric impulse could flow to the next 26 contacts,
07:07the number of possible combinations of letters by other letters in the first models of the Enigma was expressed in billions of possibilities.
07:16To encode a text, first we set a secret password by turning the keys.
07:23Then we enter single letters of the text on the keyboard, e.g. D-O-G.
07:29On the desktop, the letters of the already encoded text W-A-R, WAR, light up.
07:37You have to be careful.
07:40You have to write them down and pass them to the recipient, e.g. by radio using the Morse alphabet.
07:53The recipient of the message had the same machine that decoded the text this time.
07:59By setting a secret password, the recipient set the drums in the same order.
08:04Then all you had to do was to enter the encoded text, and the letters of the encoded text lit up on the desktop.
08:13Radio is a wonderful instrument of war.
08:17You don't have to lay wire, you can communicate for a long distance without wire.
08:24You can use it to watch it.
08:27Every message you send can also be intercepted by the enemy.
08:57After the First World War, in which more than 10 million people lost their lives, there is a ban on armaments.
09:04According to the Treaty of Versailles, the Germans can only have a 100,000-strong volunteer army, without tanks, armored vehicles and aviation.
09:13However, already in the second half of the 1920s, the Germans are seriously thinking about retaliation for the lost war.
09:22Enigma was interested in the army.
09:24The machine is being tested.
09:27German designers are improving the commercial version,
09:31installing plug-in connections in it, which several times increase the number of combinations of interchangeability.
09:38The machine is unbreakable, according to cipher specialists.
09:47Poland.
09:49This country regained its independence after the First World War.
09:52The Germans think that the cost of their territory is a part of it.
09:56They do not hide that they consider the border with Poland to be temporary.
10:01Poznań.
10:03Here, at the local university, a cryptological course for mathematics students begins.
10:08The heads of the Polish military intelligence are looking for outstanding mathematical talents to break the German defences.
10:15It required a lot of imagination to switch from the idea of hiring linguists and chess masters,
10:24who have a certain ability to perceive certain schemes or images, to mathematicians.
10:32Among others, Jerzy Różycki, Henryk Zygalski and Marian Rajewski participate in the course.
10:38Later, they are employed in the office of Polish military intelligence ciphers.
10:41In the second half of the 1920s, first the German navy, and later the land forces introduced a new secret communication medium.
10:49The Germans were absolutely sure of the machine's reliability.
10:57Both British, French and Polish radio stations intercept ciphered messages sent by radio, which cannot be broken in any way.
11:11It was quickly realized that the Germans were ciphering with the help of Enigma.
11:19The British knew that there was a cipher machine called the Enigma, which had been sold in a number of cases in the world.
11:29They also knew that Enigma was used by the Germans as their military machine.
11:37They didn't know to the best of my ability, they didn't know anything about the modification that the German military made to the machine,
11:48and they didn't know any details about how this machine was used.
11:53The British did some preliminary work, some preliminary analysis.
11:58They came to the conclusion that this cipher is impossible to break, and basically left further work in this direction.
12:07The Polish interviewee obtains a copy of the commercial version of Enigma.
12:11The machine, together with the DPESH file, ciphered with Enigma, is given to Rejewski.
12:18The mathematician begins his research.
12:21After a few weeks, he comes to the conclusion that the theory of permutation, which he learned in his studies, will be helpful.
12:28The idea that the process of ciphering in Enigma can be described in the permutation language,
12:35was the idea of Rejewski, a very original and profound idea.
12:41Germany. Hitler's party wins the elections.
12:59The French interviewee has a spy in the German cipher office.
13:02His name is Hans Thilo Schmidt, pseudonym Asche.
13:06The spy gives the French information about Enigma.
13:12The spy provided very interesting materials.
13:16For example, he provided instructions on how to use the Enigma machine.
13:20He provided diagrams of how the Enigma looks like, but without the connection of the ciphers, without the internal structure.
13:29The head of the French cryptological services, captain Gustave Bertrand, provides the documents to the Poles.
13:36While studying the DPESH ciphered with Enigma, Rejewski recognizes the habits of the German ciphers.
13:42He catches them on mistakes, such as entering the girl's name as a password.
13:48Or the same letters, for example, A, A, A, A.
13:53Rejewski arranges mathematical equations.
13:57He invents his own assertions about permutations.
14:02Here we have the heart of Enigma.
14:05A set of cipher tubes.
14:08The edges of the ciphers could be set in different orders on this axis.
14:13Permutation is the switching of objects according to a different order.
14:17It can be seen that if we have only three ciphers, there are six different ways to set them in order.
14:25Permutation was the mathematical tool Rejewski used.
14:30Rejewski analyzes the information obtained by the French interview.
14:35Finally, he solves the equations.
14:38From this moment on, Enigma is no longer a mystery.
14:42The Poles read the German military DPESH.
14:47The breaking of the Enigma cipher by Marian Rejewski was an extremely complicated mathematical operation.
14:54It can't be explained very easily on television.
14:58Even when you're standing in front of a blackboard, it's extremely complicated.
15:03It has to do with permutations, combinations, permutations of the motors, permutations of the ciphers.
15:13It's an extremely complicated thing.
15:15It's amazing that anybody in the world was able to do it at all.
15:20So my head is absolutely blown.
15:23I don't even have to see how Rejewski solved such a complicated system.
15:28This is the greatest act of this century for our people.
15:36Hitler comes to power.
15:39He takes over the Reichstag.
15:42Führer deals with his political opponents.
15:47Nazism becomes a state ideology.
15:51Hitler does not intend to respect the decriminalization regulations of the Treaty of Versailles.
15:59Rejewski is joined by Różycki and Zygalski.
16:03From this moment on, they work together on the Enigma cipher.
16:06Together, they come up with a method of encryption that makes it much easier to calculate.
16:13Nobody in Germany thought that the Poles were already reading the most secret German DPSs.
16:21It should be emphasized, and I mean this strongly,
16:25that these people were guided solely by patriotic motives.
16:31After all, each of them could make a career and money in their profession.
16:37And yet they had everything.
16:40They focused on this, but at their own expense.
16:44And this is a very important thing.
16:47Patriotic motive.
16:50We could not expect any reward.
16:53Hitler, contrary to the prohibitions, creates Luftwaffe, the German Air Force.
16:59He leads a mandatory military service.
17:02He develops the arms industry.
17:05The West does not protest.
17:08When the Prime Minister of Great Britain, Neville Chamberlain, visited Hitler,
17:13after the meeting, he testified.
17:16Despite his hard and ruthless expression on his face,
17:18I had the impression that he is a man you can rely on.
17:25The British and French governments allowed Hitler to announce the ceasefire.
17:33When he mobilized the army and increased the divisions from 12 to 36,
17:40it all happened under their watch, and they knew what Hitler was doing.
17:48The Germans improve the Enigma.
17:51They introduce additional, interchangeable drums.
17:55They improve the cycle of using the keys,
17:58which now change more than once a quarter, but every day.
18:02The number of combinations increases many times.
18:07Polish mathematicians know that without the automation of the computation process,
18:12they are not able to keep up with the changes in the Enigma.
18:16They invent the cyclometer.
18:19The device improves the calculations.
18:22The Poles continue to read the German military deposits.
18:30In Germany, the pogroms of Jews continue.
18:33Opponents of Hitler go to prison.
18:36The cult of the leader is spreading.
18:38Chamberlain has an agreement with Hitler on the expansion of the German fleet.
18:42The world was stunned by the news that the British government agreed
18:46that the German navy could reach 35% of the largest fleet in the world.
18:57In the Enigma, the Germans change the so-called reversing drums.
19:02They improve the way of entering the keys of the Depeche.
19:06The number of interchangeable letters is rapidly increasing.
19:11The number of combinations used in modern computer systems
19:15to secure bank transactions is increasing several times.
19:20The improvements that the Germans made to the encryption system of the machine
19:25really made the life of the cryptologists difficult.
19:28Sometimes it took several months to catch up.
19:34Zegalski develops the method of perforated sheets, which makes it easier to calculate.
19:41Rejewski invents a counting machine.
19:45Cryptologists call it a bomb.
19:48The device accelerates the calculation significantly.
19:52Six Polish cryptological bombs are being built in Warsaw,
19:56under the supervision of the outstanding engineers of the AWA radio technology plant.
20:01It was a device in which nothing had to be pressed.
20:04It was an electromechanical device,
20:06in the sense that it was simply inserted into the current.
20:10And it was spinning on its own.
20:13The idea was to design a device that uses these drums,
20:17because it is about their position,
20:20but in such a way that the device will only stop
20:24if these settings turn out to be plausible
20:28in the light of what has been accumulated during the Depeche hearing.
20:32The name of the bomb probably comes from the characteristic ticking of the machine,
20:37reminiscent of the ticking of a clock bomb.
20:40A test conducted by the headquarters of the Main Polish Army
20:44shows that cryptologists are able to solve and read
20:47over 70% of all captured German Depeche Enigmas.
20:52In us marches Germany, and behind us comes Germany!
21:01Hitler occupies Austria.
21:06During the international conference in Munich,
21:09the Prime Ministers of England and France agree that Hitler should enter the Czech Republic.
21:13Chamberlain believes that in this way he saves peace in Europe.
21:17As he says, at a small cost of a faraway country that we know so little about.
21:31The Enigma is perfected.
21:34Nine months before the attack on Poland,
21:37the Germans equip the machine with two additional drums.
21:40The number of combinations increases again.
21:46Cryptologists recognize the changes made.
21:50However, further mass reading of the German Depeche
21:53would require the immediate possession of 60 cryptological bombs.
21:57The Polish intelligence has no money to build them.
22:02In July 1939, it was already certain that in a few weeks Hitler would attack Poland.
22:09The Poles invite the French and the English to the Pyra near Warsaw.
22:13This is where the secret encryption office of the Polish intelligence was located.
22:17The effect of the July meeting in the Pyra was not only the transfer of
22:22completely reconstructed copies of the Enigma machines
22:24to the French and the British intelligence,
22:27but also the transfer of the complete materials
22:30concerning the construction of the bomb,
22:33the principle of operation of the Cigal Pact,
22:36in general, the complete knowledge that the Poles had at that time
22:39regarding the solution of the Enigma.
22:42I would say that the transfer of the Enigma secret,
22:45the ability to give it to the English and the French
22:48was an absolutely unprecedented transfer.
22:50According to my knowledge, no other country
22:53has ever given such valuable intelligence to another country.
22:57It was a great gift for the English and the French allies,
23:01a gift before the Second World War had even begun.
23:10Hitler enters Poland.
23:12The Second World War breaks out.
23:15Poles, among others, thanks to the reading of the Enigma
23:19have recognized all units of the Wehrmacht,
23:22their position, number, armament.
23:25However, despite the information they have,
23:28the Polish army is without a chance of colliding with Hitler's power.
23:32The Nazi army has 1,600 planes, 2,500 tanks,
23:36and more than 1,000 tanks.
23:38The Nazi army has 1,600 planes, 2,500 tanks,
23:4210,000 tanks and almost 2 million soldiers.
23:52The expected help from France and England does not come.
23:56These countries formally declare war on Hitler,
23:59but do nothing.
24:02Hitler triumphs.
24:04Rejewski, Różycki and Zygalski receive the order to evacuate to Romania.
24:08Previously, the documentation and devices
24:11used to break the Enigma codes were destroyed.
24:14The point is not to fall into the hands of the Germans.
24:17This is the only way to keep the secret.
24:20Polish cryptologists go to France.
24:23Captain Gustave Bertrand deals with them there.
24:26They break the Enigma codes again.
24:29England, Bletchley.
24:31A small town 60 kilometers north of London.
24:35This is the secret headquarters of the British intelligence.
24:39Alan Turing, an outstanding English mathematician, works there.
24:43Turing, among other things,
24:46is engaged in improving the Polish cryptological bomb.
24:50The Germans attack France.
24:53They conquer this country in a few weeks.
24:56After the earlier conquest of Denmark, Norway, Belgium and Holland,
24:58the European continent is under Hitler's control.
25:02Now Fuhrer is preparing to negotiate with England.
25:08The discoveries of the Poles were passed on to Turing.
25:12In this way, he saves, as it is estimated, 9 months of work.
25:16Thanks to this, the first and second cryptological bombs of Turing
25:20were ready before the battle of Britain.
25:23This gave the possibility to read the German depeches,
25:26which spoke about the planned German goals in England,
25:30just before the start of the battle of England.
25:41When Hitler attacks England,
25:44this country is much weaker militarily than Germany.
25:48However, in the air battle, the Germans unexpectedly suffer heavy losses.
25:52Among other things,
25:54thanks to reading a thousand depeches enigmas,
25:57the English know earlier about the planned German raids.
26:01In the literature with which I get acquainted,
26:05I constantly come across the fact
26:08that the Germans could not understand
26:11the cowardice in the RAF,
26:14in supporting the attacks on London.
26:17They knew where to gather,
26:20in which direction to turn,
26:22and how to deal with the danger.
26:25The Germans knew that there must be a source of information,
26:29but they were powerless.
26:41England survived.
26:44Behind the ocean,
26:47the Americans, cooperating with the English,
26:50build their own cryptological bombs.
26:53Thanks to them, they read,
26:56first of all, the depeches of the Japanese troops.
26:59In Bletchley Park,
27:02the English perfect the counting machines.
27:05Based on the theoretical concept of Alan Turing,
27:08a colossus is created in the middle of the war.
27:10The first computer in the world.
27:131,500 electron lamps were used in it.
27:16The colossus is the development of bombs.
27:19But I want to emphasize that it is not the development
27:22in the sense that it was used to break enigmas.
27:25It is the development of the principle of operation
27:28and the use of new, different materials,
27:31in this case, electron lamps,
27:34instead of electromechanical transmitters.
27:37The colossus has a speed of several thousand impulses per minute.
27:41With its help, the English decrypt
27:44the most mysterious depeches of Hitler,
27:47encrypted by the Lorenz machine.
27:56Messages from decrypted depeches
27:59help the Allies to win important battles
28:02in France, Italy and Africa.
28:04And most importantly,
28:07the naval war in the Atlantic.
28:10Both the English and the Americans
28:13have been decrypting hundreds of thousands of enigmas.
28:16The Germans do not suspect anything.
28:19They are fully convinced that the enigma
28:22is an unbreakable machine.
28:24I think the solution of enigma,
28:27especially by the British,
28:30supported by the Americans,
28:33on the basis of the Polish gift cards,
28:36did not shorten the war.
28:39I don't think you can say
28:42that the solution of enigma won the war.
28:45Intelligence can never win wars.
28:48Wars are won by men who are fighting
28:51on the airplanes, on the ships and on the ground.
28:54But enigma helped to shorten the war.
28:57In general, enigma shortened the war
29:00and saved many people
29:03who otherwise would have died.
29:06In England, in 2002,
29:09the film Enigma was screened.
29:12One of its protagonists, a Pole,
29:15was presented by the British director
29:18as a traitor and a drunkard.
29:21The success of breaking the machine
29:24was attributed only to the English.
29:27The film was a success
29:30because the British director
29:32was presented as a traitor
29:35and a drunkard.
30:02© BF-WATCH TV 2021