NEMA (machine)

Last updated

NEMA
Date inventedduring the World War II
ManufacturerZellweger AG, Switzerland
Typerotor machine

In the history of cryptography, the NEMA (NEue MAschine) [1] ("new machine"), also designated the T-D (Tasten-Druecker-Maschine) ("key-stroke machine"), was a 10-wheel rotor machine designed by the Swiss Army during the World War II as a replacement for their Enigma machines.

Contents

History

The Swiss became aware that their current machine, a commercial Enigma (the Swiss K), had been broken by both Allied and German cryptanalysts.

A new design was begun between 1941 and 1943 by Captain Arthur Alder, a professor of mathematics at the University of Bern. The team which designed the machine also included Professors Hugo Hadwiger and Heinrich Emil Weber. [2] [3]

In the spring of 1944, the first prototype had become available. After some modifications, the design was accepted in March 1945, and production of 640 machines began the following month by Zellweger AG. The first machine entered service in 1947.

NEMA was declassified on 9 July 1992, and machines were offered for sale to the public on 4 May 1994.

The machine

NEMA uses 10 wheels, of which four are normal electrical rotors with 26 contacts at each end that are scramble wired in a way unique to each rotor type; one is an electrical reflector (like the Enigma's Umkehrwalze) with one set of 26 pairwise cross connected contacts; and the remaining five are "drive wheels", with mechanical cams that control the stepping of the rotors and the reflector. The wheels are assembled on an axle in pairs consisting of a drive wheel and an electrical rotor.

The NEMA machine weighs about 10 kg and measures approximately 36×32×14 cm.

See also

Related Research Articles

<span class="mw-page-title-main">Enigma machine</span> German cipher machine

The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the German military. The Enigma machine was considered so secure that it was used to encipher the most top-secret messages.

<span class="mw-page-title-main">Typex</span> British cipher machine

In the history of cryptography, Typex machines were British cipher machines used from 1937. It was an adaptation of the commercial German Enigma with a number of enhancements that greatly increased its security. The cipher machine was used until the mid-1950s when other more modern military encryption systems came into use.

<span class="mw-page-title-main">Type B Cipher Machine</span> Japanese diplomatic code named Purple by the US

In the history of cryptography, the "System 97 Typewriter for European Characters" or "Type B Cipher Machine", codenamed Purple by the United States, was an encryption machine used by the Japanese Foreign Office from February 1939 to the end of World War II. The machine was an electromechanical device that used stepping-switches to encrypt the most sensitive diplomatic traffic. All messages were written in the 26-letter English alphabet, which was commonly used for telegraphy. Any Japanese text had to be transliterated or coded. The 26-letters were separated using a plug board into two groups, of six and twenty letters respectively. The letters in the sixes group were scrambled using a 6 × 25 substitution table, while letters in the twenties group were more thoroughly scrambled using three successive 20 × 25 substitution tables.

<span class="mw-page-title-main">SIGABA</span> American cipher machine

In the history of cryptography, the ECM Mark II was a cipher machine used by the United States for message encryption from World War II until the 1950s. The machine was also known as the SIGABA or Converter M-134 by the Army, or CSP-888/889 by the Navy, and a modified Navy version was termed the CSP-2900.

<span class="mw-page-title-main">Rotor machine</span>

In cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting messages. Rotor machines were the cryptographic state-of-the-art for much of the 20th century; they were in widespread use in the 1920s–1970s. The most famous example is the German Enigma machine, the output of which was deciphered by the Allies during World War II, producing intelligence code-named Ultra.

<span class="mw-page-title-main">Lorenz cipher</span> Cipher machines used by the German Army during World War II

The Lorenz SZ40, SZ42a and SZ42b were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz AG in Berlin. The model name SZ was derived from Schlüssel-Zusatz, meaning cipher attachment. The instruments implemented a Vernam stream cipher.

<span class="mw-page-title-main">Arthur Scherbius</span> German electrical engineer (1878–1929)

Arthur Scherbius was a German electrical engineer who invented the mechanical cipher Enigma machine. He patented the invention and later sold the machine under the brand name Enigma.

<span class="mw-page-title-main">Bombe</span> Codebreaking device created at Bletchley Park (United Kingdom)

The bombe was an electro-mechanical device used by British cryptologists to help decipher German Enigma-machine-encrypted secret messages during World War II. The US Navy and US Army later produced their own machines to the same functional specification, albeit engineered differently both from each other and from Polish and British bombes.

<i>Bomba</i> (cryptography) Polish decryption device

The bomba, or bomba kryptologiczna, was a special-purpose machine designed around October 1938 by Polish Cipher Bureau cryptologist Marian Rejewski to break German Enigma-machine ciphers.

<span class="mw-page-title-main">Cryptanalysis of the Enigma</span> Decryption of the cipher of the Enigma machine

Cryptanalysis of the Enigma ciphering system enabled the western Allies in World War II to read substantial amounts of Morse-coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from other decrypted Axis radio and teleprinter transmissions, was given the codename Ultra.

<span class="mw-page-title-main">KL-7</span> Rotor encryption machine

The TSEC/KL-7, also known as Adonis was an off-line non-reciprocal rotor encryption machine. The KL-7 had rotors to encrypt the text, most of which moved in a complex pattern, controlled by notched rings. The non-moving rotor was fourth from the left of the stack. The KL-7 also encrypted the message indicator.

<span class="mw-page-title-main">Fialka</span> Soviet cipher machine

In cryptography, Fialka (M-125) is the name of a Cold War-era Soviet cipher machine. A rotor machine, the device uses 10 rotors, each with 30 contacts along with mechanical pins to control stepping. It also makes use of a punched card mechanism. Fialka means "violet" in Russian. Information regarding the machine was quite scarce until c. 2005 because the device had been kept secret.

This article contains technical details about the rotors of the Enigma machine. Understanding the way the machine encrypts requires taking into account the current position of each rotor, the ring setting and its internal wiring.

<span class="mw-page-title-main">Cyclometer</span> Cryptologic device

The cyclometer was a cryptologic device designed, "probably in 1934 or 1935," by Marian Rejewski of the Polish Cipher Bureau's German section (BS-4), to catalog the cycle structure of Enigma permutations, thereby facilitating the decryption of German Enigma ciphertext.

In cryptography, the clock was a method devised by Polish mathematician-cryptologist Jerzy Różycki, at the Polish General Staff's Cipher Bureau, to facilitate decrypting German Enigma ciphers. The method determined the rightmost rotor in the German Enigma by exploiting the different turnover positions. For the Poles, learning the rightmost rotor reduced the rotor-order search space by a factor of 3. The British improved the method, and it allowed them to use their limited number of bombes more effectively.

The card catalog, or "catalog of characteristics," in cryptography, was a system designed by Polish Cipher Bureau mathematician-cryptologist Marian Rejewski, and first completed about 1935 or 1936, to facilitate decrypting German Enigma ciphers.

The grill method, in cryptology, was a method used chiefly early on, before the advent of the cyclometer, by the mathematician-cryptologists of the Polish Cipher Bureau in decrypting German Enigma machine ciphers. The Enigma rotor cipher machine changes plaintext characters into cipher text using a different permutation for each character, and so implements a polyalphabetic substitution cipher.

<span class="mw-page-title-main">Marian Rejewski</span> Polish mathematician and cryptologist (1905–1980)

Marian Adam Rejewski was a Polish mathematician and cryptologist who in late 1932 reconstructed the sight-unseen German military Enigma cipher machine, aided by limited documents obtained by French military intelligence.

Cryptanalysis of the Lorenz cipher was the process that enabled the British to read high-level German army messages during World War II. The British Government Code and Cypher School (GC&CS) at Bletchley Park decrypted many communications between the Oberkommando der Wehrmacht in Berlin and their army commands throughout occupied Europe, some of which were signed "Adolf Hitler, Führer". These were intercepted non-Morse radio transmissions that had been enciphered by the Lorenz SZ teleprinter rotor stream cipher attachments. Decrypts of this traffic became an important source of "Ultra" intelligence, which contributed significantly to Allied victory.

The Schlüsselgerät 39 (SG-39) was an electrically operated rotor cipher machine, invented by the German Fritz Menzer during World War II. The device was the evolution of the Enigma rotors coupled with three Hagelin pin wheels to provide variable stepping of the rotors. All three wheels stepped once with each encipherment. Rotors stepped according to normal Enigma rules, except that an active pin at the reading station for a pin wheel prevented the coupled rotor from stepping. The cycle for a normal Enigma was 17,576 characters. When the Schlüsselgerät 39 was correctly configured, its cycle length was characters, which was more than 15,000 times longer than a standard Enigma. The Schlüsselgerät 39 was fully automatic, in that when a key was pressed, the plain and cipher letters were printed on separate paper tapes, divided into five-digit groups. The Schlüsselgerät 39 was abandoned by German forces in favour of the Schlüsselgerät 41.

References

  1. Klaus Schmeh (2008). Codeknacker gegen Codemacher: die faszinierende Geschichte der Verschlüsselung; [Sachbuch]. W3l GmbH. p. 122. ISBN   978-3-937137-89-6.
  2. Walter Schmid: Die Chiffriermaschine NEMA, p. 75, third edition, February 2005, Hombrechtikon ZH, Switzerland
  3. de:Heinrich Emil Weber

Further reading