Role of three Polish mathematicians: Różycki, Zygalski and Rejewski in
breaking Enigma was as usual overlooked.Please read:
https://www.bbc.com/news/magazine-28167071
** GERMANY [non]. As seen on PBS World Channel via OETA, Nov 8 at
2200: ``Breaking Enigma: A World War II Game Changer
Special | 56m 29s Video has Closed Captions | CCNarrated by Keith Morrison of "Dateline," the breaking of Germany's
top-secret Enigma Code at Bletchley Park in the United Kingdom was one
of World War II's biggest secrets, alongside the atomic bombs. Some
historians estimate that deciphering the German military code
shortened the war by two years and possibly saved 14 million lives.11/01/2025 | Expires 01/01/2026 | Rating TV-PG``
I get this play link once I reveal my PBS is OETA:
https://www.pbs.org/video/breaking-enigma-a-world-war-ii-game-changer-mx5LiA/You have to set up with ``your`` station. A more detailed description
at OETA.tv:``The breaking of Germany's top-secret Enigma Code at Bletchley Park
in the United Kingdom was one of World War II's biggest secrets,
alongside the construction of the atomic bombs. Some historians
estimate that deciphering the German military code shortened the war
by two years and possibly saved 14 million lives. Though the Enigma
was deemed unbreakable, a British mathematician named Alan Turing
spearheaded the initiative to achieve the impossible and succeeded
unbeknownst to the German military. Narrated by Keith Morrison of
Dateline and filmed on location in England and the United States,
BREAKING ENIGMA: A WORLD WAR II GAME CHANGER tells this heroic story
in detail through a combination of interviews with historians,
veterans and modern scientists.``A post-script says some of the women codebreakers interviewed died
just this year 2025. Roger in Germany replies:``Thanks for sharing this information. It cannot be used with a German
IP address, but you can break the geo-blocking via VPN. 1920x1080 ca.
1,8 GBThe mention of the "Lorenz-Schlüsselmaschine was also interesting.
https://de.wikipedia.org/wiki/Lorenz-Schl%C3%BCsselmaschine
https://de.wikipedia.org/wiki/Kryptanalyse_der_Lorenz-MaschineThe aim was to simplify and automate machine encryption compared to
the cumbersome Enigma machine, and to achieve significantly higher
message volumes and transmission speeds than was possible with
manually operated Morse code. To this end, the Schlüssel-Zusatz (SZ)
was developed as an add-on device for a Lorenz teletypewriter. As is
usual with teletypewriters, the Baudot-Murray code (CCITT-2) with 5
bits was used for the transmission of 32 characters. The binary
representation is particularly well suited for the binary addition of
a pseudo-random key, thereby cryptographically implementing the
function of a mixer...Starting in June 1941, the German Wehrmacht began securing its
telegraph communications between the highest command posts using a
newly developed encryption machine called Schlüssel-Zusatz 40 (SZ 40).
Above the Enigma machine, which continued to be used for tactical
communication, it served to encrypt strategic communications,
especially between the Army High Command (OKH), based in Wünsdorf near
Berlin, and the Army High Commands (AOK) in cities such as Vienna,
Rome, Paris, Athens, Copenhagen, Oslo, Königsberg, Riga, Belgrade,
Bucharest, and Tunis.As early as the second half of 1940, British interception stations (Y
Stations) had noticed German radio telegraph traffic that sounded
distinctly different from the usual Morse code signals, and initially
gave it the nicknames “new music” and ‘NoMo’ for “No Morse.” A little
later, radio transmissions of this type were grouped under the code
name Fish. Due to a lack of capacity and resources, these messages
were initially given low priority and could not be deciphered.....Presumably for convenience, the second time around he did not
enter the plain text into the teletypewriter identically to the first
time, but slightly abbreviated it. Right at the beginning of the
message, he did not write SPRUCHNUMMER (message number) as he had done
the first time, but abbreviated the word and wrote only SPRUCHNR. From
this point on, the two ciphertexts differed significantly, while the
plaintexts continued almost identically. The Germans did not notice
this, but for the British it was a “godsend.” Now they were in
possession of a so-called depth, i.e., two different ciphertexts based
on two nearly identical but slightly shifted plaintexts, both of which
had been encrypted with the same key. (In German technical
terminology, this case is also referred to as a “plaintext-plaintext
compromise.”)This involuntary “gift” from the Germans allowed British code breaker
John Tiltman (1894–1982) at Bletchley Park in England to make the
decisive first breakthrough in SZ 40. After weeks of manual work, he
succeeded in determining the two slightly “phase-shifted” and almost
identical plaintexts. To do this, he calculated the difference between
the two intercepted radio messages and tried to insert probable words.
This enabled him to reconstruct not only the plaintexts, but also a
4,000-character section of the “pseudo-random” key. This ultimately
led to the exposure of the logical structure of the key supplement.
The combination of the two errors mentioned above proved fatal for the
German side, without them knowing or even suspecting it.OT 2005:
https://www.elcomsoft.com/help/en/azpr/index.html?page=known_plaintext_attack.html
roger`` (Glenn Hauser, OK, WOR)** NORTH AMERICA. 6925 AM, Nov 9 at 0221, rock music S9. These say
it`s Liquid Radio:
https://www.hfunderground.com/board/index.php/topic,153449.0.html
An hour earlier, no pirate could I hear (Glenn Hauser, OK, WOR)
_
Hard-Core-DX mailing list
Hard-Core-DX@hard-core-dx.com
http://montreal.kotalampi.com/mailman/listinfo/hard-core-dx
http://www.hard-core-dx.com/
http://www.hard-core-dx.com/article.php?story=20251110181503250