toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

211
active users

#enigmamachine

0 posts0 participants0 posts today
IT News<p>Modernizing an Enigma Machine - This project by [Miro] is awesome, not only did he build a replica Enigma machine ... - <a href="https://hackaday.com/2025/04/17/modernizing-an-enigma-machine/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/17/modern</span><span class="invisible">izing-an-enigma-machine/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/debruijnsequence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debruijnsequence</span></a> <a href="https://schleuss.online/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retrocomputing</span></a> <a href="https://schleuss.online/tags/enigmamachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enigmamachine</span></a> <a href="https://schleuss.online/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://schleuss.online/tags/pogopin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pogopin</span></a> <a href="https://schleuss.online/tags/enigma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enigma</span></a></p>
Today On Screen<p><a href="https://xoxo.zone/tags/OnThisDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnThisDay</span></a>, July 9, in 1941, British cryptologists led by Alan Turing broke the Enigma code used by the German army to direct ground-to-air operations on the Eastern front (depicted in The Imitation Game, 2014)</p><p><a href="https://xoxo.zone/tags/Movies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Movies</span></a> <a href="https://xoxo.zone/tags/Film" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Film</span></a> <a href="https://xoxo.zone/tags/Cinema" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cinema</span></a> <a href="https://xoxo.zone/tags/Cinemastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cinemastodon</span></a> <a href="https://xoxo.zone/tags/Letterboxd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Letterboxd</span></a> <a href="https://xoxo.zone/tags/TodayInHistory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TodayInHistory</span></a> <a href="https://xoxo.zone/tags/Histodons" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Histodons</span></a> <a href="https://xoxo.zone/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://xoxo.zone/tags/Codebreaking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Codebreaking</span></a> <a href="https://xoxo.zone/tags/Enigma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Enigma</span></a> <a href="https://xoxo.zone/tags/EnigmaMachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EnigmaMachine</span></a> <a href="https://xoxo.zone/tags/TheImitationGame" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheImitationGame</span></a></p>
IT News<p>A Binary Version of the Engima Machine - The Enigma machine is the most well-known encryption tool used by German forces in... - <a href="https://hackaday.com/2024/03/21/a-binary-version-of-the-engima-machine/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2024/03/21/a-bina</span><span class="invisible">ry-version-of-the-engima-machine/</span></a> <a href="https://schleuss.online/tags/3dprinterhacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>3dprinterhacks</span></a> <a href="https://schleuss.online/tags/enigmamachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enigmamachine</span></a> <a href="https://schleuss.online/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://schleuss.online/tags/enigma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enigma</span></a></p>
Computer History Museum 🇸🇮<p>👨‍🏫 Dr. Mark Baldwin holds a talk on the Enigma machine in the museum 🗝️🏛️</p><p><a href="https://mastodon.social/tags/computermuseum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computermuseum</span></a> <a href="https://mastodon.social/tags/computerhistory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computerhistory</span></a> <a href="https://mastodon.social/tags/slovenia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>slovenia</span></a> <a href="https://mastodon.social/tags/ljubljana" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ljubljana</span></a> <a href="https://mastodon.social/tags/softwareheritage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>softwareheritage</span></a> <a href="https://mastodon.social/tags/digitalheritage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalheritage</span></a> <a href="https://mastodon.social/tags/nostalgia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nostalgia</span></a> <a href="https://mastodon.social/tags/nostalgie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nostalgie</span></a> <a href="https://mastodon.social/tags/nostalgi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nostalgi</span></a> <a href="https://mastodon.social/tags/enigmamachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enigmamachine</span></a> <a href="https://mastodon.social/tags/vintage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vintage</span></a> <a href="https://mastodon.social/tags/enigma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enigma</span></a> <a href="https://mastodon.social/tags/vintagecomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vintagecomputing</span></a> <a href="https://mastodon.social/tags/retro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retro</span></a> <a href="https://mastodon.social/tags/europee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>europee</span></a> <a href="https://mastodon.social/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retrocomputing</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/cipher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cipher</span></a> <a href="https://mastodon.social/tags/wwii" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wwii</span></a> <a href="https://mastodon.social/tags/worldwarii" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>worldwarii</span></a> <a href="https://mastodon.social/tags/drenigma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>drenigma</span></a></p>
Computer History Museum 🇸🇮<p>An exhibition showcasing the original Enigma, which played a significant role in shaping the fate of World War II, and a lesser-known innocent children's typewriter, Barbie, manufactured in Slovenia.</p><p><a href="https://mastodon.social/tags/computermuseum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computermuseum</span></a> <a href="https://mastodon.social/tags/computerhistory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computerhistory</span></a> <a href="https://mastodon.social/tags/slovenia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>slovenia</span></a> <a href="https://mastodon.social/tags/ljubljana" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ljubljana</span></a> <a href="https://mastodon.social/tags/softwareheritage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>softwareheritage</span></a> <a href="https://mastodon.social/tags/digitalheritage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalheritage</span></a> <a href="https://mastodon.social/tags/nostalgia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nostalgia</span></a> <a href="https://mastodon.social/tags/nostalgie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nostalgie</span></a> <a href="https://mastodon.social/tags/nostalgi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nostalgi</span></a> <a href="https://mastodon.social/tags/barbie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>barbie</span></a> <a href="https://mastodon.social/tags/vintage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vintage</span></a> <a href="https://mastodon.social/tags/vintagecomputer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vintagecomputer</span></a> <a href="https://mastodon.social/tags/vintagecomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vintagecomputing</span></a> <a href="https://mastodon.social/tags/retro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retro</span></a> <a href="https://mastodon.social/tags/europee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>europee</span></a> <a href="https://mastodon.social/tags/MundoRetro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MundoRetro</span></a> <a href="https://mastodon.social/tags/enigma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enigma</span></a> <a href="https://mastodon.social/tags/enigmamachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enigmamachine</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/nosztalgia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nosztalgia</span></a> <a href="https://mastodon.social/tags/%D0%9D%D0%BE%D1%81%D1%82%D0%B0%D0%BB%D1%8C%D0%B3%D0%B8%D1%8F" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ностальгия</span></a> <a href="https://mastodon.social/tags/typewriter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>typewriter</span></a></p>
Anthony Collette :donor: / Loistava<p>Code Breaking in the Pacific</p><p>You’ve heard about Enigma cipher machines, and how codebreakers at England’s Bletchley Park cracked messages during World War II. There are amazing stories about how the specialized machines they built helped them decipher messages, and become the predecessors of today’s computers.</p><p>But you may not have heard about a different kind of codebreaking going on in the Pacific during the same period. The problems and techniques were completely different, because enemy messages were transmitted in code, not cipher. And there were some incredible success stories from this period, such as the battle of Midway, which turned the tide of the conflict in the Pacific.</p><p>The methods used in code breaking behind those successes are quite different to those used against encryption machine ciphers such as the Enigma. The reason is that the main cipher systems used by the Japanese were based on code books rather than a machine. “Code Breaking in the Pacific” is the first book to provide a complete description of those systems and the development of the techniques used to break them. It addresses the last major gap in the literature of WW2 cryptography and most likely the last major gap in the literature of WW2.</p><p>This very dense book was written by two mathematicians: Peter Donovan and John Mack. Math and I have never been on good terms, we’re definitely not friends. So the math in the book is *completely* over my head. But there were some interesting nuggets that jumped out:</p><p>☑️​ As early as 1916, the British were using Hollerith punch-card equipment from the U.S. to decode enemy messages. The Hollerith company eventually became IBM.</p><p>☑️​ The skills required for successful decoding . . . [of these messages] are more akin to the linguistic challenge of determining the nature and meaning of an unknown written language than to those needed for elucidating the operation of a cipher machine . . .”</p><p>☑️​ Lightly used code books were particularly difficult to crack.</p><p>☑️​ The use of boilerplate messages by the other side provided codebreakers with a way to crack messages.</p><p>☑️​ Some of these systems were designed to keep information secure only for a few hours.</p><p>☑️​ Choosing to doubly encrypt messages often made the system *less* secure, not more secure.</p><p>☑️​ Major pieces of disinformation were known as “purple whales.” 🐳​🐋​🐳​</p><p>If you have an interest in math and history, this may be right up your alley.</p><p>But this book isn’t cheap. One option: “check it out like a library book” from a local university library.</p><p><a href="https://infosec.exchange/tags/WW2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WW2</span></a><br><a href="https://infosec.exchange/tags/CodeBreaking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CodeBreaking</span></a><br><a href="https://infosec.exchange/tags/BookReview" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BookReview</span></a><br><a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a><br><a href="https://infosec.exchange/tags/Enigma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Enigma</span></a><br><a href="https://infosec.exchange/tags/EnigmaMachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EnigmaMachine</span></a><br><a href="https://infosec.exchange/tags/BletchleyPark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BletchleyPark</span></a><br><a href="https://infosec.exchange/tags/CodeBreakingInThePacific" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CodeBreakingInThePacific</span></a><br><a href="https://infosec.exchange/tags/TelegraphicCodeBooks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TelegraphicCodeBooks</span></a></p><p>Amazon:<br><a href="https://www.amazon.com/Code-Breaking-Pacific-Peter-Donovan/dp/3319082779/ref=sr_1_1?crid=206QHDM0GR76P&amp;keywords=code+breaking+in+the+pacific&amp;qid=1672089089&amp;sprefix=code+breaking+in+the+pacifi%2Caps%2C253&amp;sr=8-1&amp;ufe=app_do%3Aamzn1.fos.f5122f16-c3e8-4386-bf32-63e904010ad0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">amazon.com/Code-Breaking-Pacif</span><span class="invisible">ic-Peter-Donovan/dp/3319082779/ref=sr_1_1?crid=206QHDM0GR76P&amp;keywords=code+breaking+in+the+pacific&amp;qid=1672089089&amp;sprefix=code+breaking+in+the+pacifi%2Caps%2C253&amp;sr=8-1&amp;ufe=app_do%3Aamzn1.fos.f5122f16-c3e8-4386-bf32-63e904010ad0</span></a></p><p>Note: This is *not* an affiliate link. I’m simply recommending this high-quality book for those who might find it interesting.</p>
A Wolf In Cheap Clothing<a href="https://kitchener.ctvnews.ca/rare-second-world-war-nazi-code-machine-on-display-in-waterloo-1.6477391" rel="nofollow noopener" target="_blank">https://kitchener.ctvnews.ca/rare-second-world-war-nazi-code-machine-on-display-in-waterloo-1.6477391</a><br><br>An authentic <a class="hashtag" href="https://seafoam.space/tag/secondworldwar" rel="nofollow noopener" target="_blank">#SecondWorldWar</a> <a class="hashtag" href="https://seafoam.space/tag/enigmamachine" rel="nofollow noopener" target="_blank">#Enigmamachine</a> is now on display at the museum – along with information about the <a class="hashtag" href="https://seafoam.space/tag/university" rel="nofollow noopener" target="_blank">#University</a> of <a class="hashtag" href="https://seafoam.space/tag/waterloo" rel="nofollow noopener" target="_blank">#Waterloo</a>’s special connection to decoding <a class="hashtag" href="https://seafoam.space/tag/nazi" rel="nofollow noopener" target="_blank">#Nazi</a> messages
Today On Screen<p><a href="https://botsin.space/tags/OnThisDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnThisDay</span></a>, July 9, in 1941, British cryptologists led by Alan Turing broke the Enigma code used by the German army to direct ground-to-air operations on the Eastern front (depicted in The Imitation Game, 2014)</p><p><a href="https://botsin.space/tags/Movies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Movies</span></a> <a href="https://botsin.space/tags/Film" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Film</span></a> <a href="https://botsin.space/tags/Cinema" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cinema</span></a> <a href="https://botsin.space/tags/Cinemastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cinemastodon</span></a> <a href="https://botsin.space/tags/Letterboxd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Letterboxd</span></a> <a href="https://botsin.space/tags/TodayInHistory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TodayInHistory</span></a> <a href="https://botsin.space/tags/Histodons" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Histodons</span></a> <a href="https://botsin.space/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://botsin.space/tags/Codebreaking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Codebreaking</span></a> <a href="https://botsin.space/tags/Enigma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Enigma</span></a> <a href="https://botsin.space/tags/EnigmaMachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EnigmaMachine</span></a> <a href="https://botsin.space/tags/TheImitationGame" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheImitationGame</span></a></p>
Anthony Collette :donor: / Loistava<p>Code Breaking in the Pacific</p><p>You’ve heard about Enigma cipher machines, and how codebreakers at England’s Bletchley Park cracked messages during World War II. There are amazing stories about how the specialized machines they built helped them decipher messages, and become the predecessors of today’s computers.</p><p>But you may not have heard about a different kind of codebreaking going on in the Pacific during the same period. The problems and techniques were completely different, because enemy messages were transmitted in code, not cipher. And there were some incredible success stories from this period, such as the battle of Midway, which turned the tide of the conflict in the Pacific.</p><p>The methods used in code breaking behind those successes are quite different to those used against encryption machine ciphers such as the Enigma. The reason is that the main cipher systems used by the Japanese were based on code books rather than a machine. “Code Breaking in the Pacific” is the first book to provide a complete description of those systems and the development of the techniques used to break them. It addresses the last major gap in the literature of WW2 cryptography and most likely the last major gap in the literature of WW2.</p><p>This very dense book was written by two mathematicians: Peter Donovan and John Mack. Math and I have never been on good terms, we’re definitely not friends. So the math in the book is *completely* over my head. But there were some interesting nuggets that jumped out:</p><p>☑️​ As early as 1916, the British were using Hollerith punch-card equipment from the U.S. to decode enemy messages. The Hollerith company eventually became IBM.</p><p>☑️​ The skills required for successful decoding . . . [of these messages] are more akin to the linguistic challenge of determining the nature and meaning of an unknown written language than to those needed for elucidating the operation of a cipher machine . . .”</p><p>☑️​ Lightly used code books were particularly difficult to crack.</p><p>☑️​ The use of boilerplate messages by the other side provided codebreakers with a way to crack messages.</p><p>☑️​ Some of these systems were designed to keep information secure only for a few hours.</p><p>☑️​ Choosing to doubly encrypt messages often made the system *less* secure, not more secure.</p><p>☑️​ Major pieces of disinformation were known as “purple whales.” 🐳​🐋​🐳​</p><p>If you have an interest in math and history, this may be right up your alley.</p><p>But this book isn’t cheap. One option: “check it out like a library book” from a local university library.</p><p><a href="https://infosec.exchange/tags/WW2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WW2</span></a><br><a href="https://infosec.exchange/tags/CodeBreaking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CodeBreaking</span></a><br><a href="https://infosec.exchange/tags/BookReview" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BookReview</span></a><br><a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a><br><a href="https://infosec.exchange/tags/Enigma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Enigma</span></a><br><a href="https://infosec.exchange/tags/EnigmaMachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EnigmaMachine</span></a><br><a href="https://infosec.exchange/tags/BletchleyPark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BletchleyPark</span></a><br><a href="https://infosec.exchange/tags/CodeBreakingInThePacific" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CodeBreakingInThePacific</span></a><br><a href="https://infosec.exchange/tags/TelegraphicCodeBooks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TelegraphicCodeBooks</span></a></p><p>Amazon:<br><a href="https://www.amazon.com/Code-Breaking-Pacific-Peter-Donovan/dp/3319082779/ref=sr_1_1?crid=206QHDM0GR76P&amp;keywords=code+breaking+in+the+pacific&amp;qid=1672089089&amp;sprefix=code+breaking+in+the+pacifi%2Caps%2C253&amp;sr=8-1&amp;ufe=app_do%3Aamzn1.fos.f5122f16-c3e8-4386-bf32-63e904010ad0" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">amazon.com/Code-Breaking-Pacif</span><span class="invisible">ic-Peter-Donovan/dp/3319082779/ref=sr_1_1?crid=206QHDM0GR76P&amp;keywords=code+breaking+in+the+pacific&amp;qid=1672089089&amp;sprefix=code+breaking+in+the+pacifi%2Caps%2C253&amp;sr=8-1&amp;ufe=app_do%3Aamzn1.fos.f5122f16-c3e8-4386-bf32-63e904010ad0</span></a></p><p>Note: This is *not* an affiliate link. I’m simply recommending this high-quality book for those who might find it interesting.</p>
Luisa Donato<p>Enigma.</p><p><a href="https://hachyderm.io/tags/enigma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enigma</span></a> <a href="https://hachyderm.io/tags/enigmamachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enigmamachine</span></a> <a href="https://hachyderm.io/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a></p>
Anthony Collette :donor: / Loistava<p>Code Breaking in the Pacific</p><p>You’ve heard about Enigma cipher machines, and how codebreakers at England’s Bletchley Park cracked messages during World War II. There are amazing stories about how the specialized machines they built helped them decipher messages, and become the predecessors of today’s computers.</p><p>But you may not have heard about a different kind of codebreaking going on in the Pacific during the same period. The problems and techniques were completely different, because enemy messages were transmitted in code, not cipher. And there were some incredible success stories from this period, such as the battle of Midway, which turned the tide of the conflict in the Pacific.</p><p>The methods used in code breaking behind those successes are quite different to those used against encryption machine ciphers such as the Enigma. The reason is that the main cipher systems used by the Japanese were based on code books rather than a machine. “Code Breaking in the Pacific” is the first book to provide a complete description of those systems and the development of the techniques used to break them. It addresses the last major gap in the literature of WW2 cryptography and most likely the last major gap in the literature of WW2.</p><p>This very dense book was written by two mathematicians: Peter Donovan and John Mack. Math and I have never been on good terms, we’re definitely not friends. So the math in the book is *completely* over my head. But there were some interesting nuggets that jumped out:</p><p>☑️​ As early as 1916, the British were using Hollerith punch-card equipment from the U.S. to decode enemy messages. The Hollerith company eventually became IBM.</p><p>☑️​ The skills required for successful decoding . . . [of these messages] are more akin to the linguistic challenge of determining the nature and meaning of an unknown written language than to those needed for elucidating the operation of a cipher machine . . .”</p><p>☑️​ Lightly used code books were particularly difficult to crack.</p><p>☑️​ The use of boilerplate messages by the other side provided codebreakers with a way to crack messages.</p><p>☑️​ Some of these systems were designed to keep information secure only for a few hours.</p><p>☑️​ Choosing to doubly encrypt messages often made the system *less* secure, not more secure.</p><p>☑️​ Major pieces of disinformation were known as “purple whales.” 🐳​🐋​🐳​</p><p>If you have an interest in math and history, this may be right up your alley.</p><p>But this book isn’t cheap. One option: “check it out like a library book” from a local university library.</p><p><a href="https://infosec.exchange/tags/WW2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WW2</span></a><br><a href="https://infosec.exchange/tags/CodeBreaking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CodeBreaking</span></a><br><a href="https://infosec.exchange/tags/BookReview" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BookReview</span></a><br><a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a><br><a href="https://infosec.exchange/tags/Enigma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Enigma</span></a><br><a href="https://infosec.exchange/tags/EnigmaMachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EnigmaMachine</span></a><br><a href="https://infosec.exchange/tags/BletchleyPark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BletchleyPark</span></a><br><a href="https://infosec.exchange/tags/CodeBreakingInThePacific" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CodeBreakingInThePacific</span></a><br><a href="https://infosec.exchange/tags/TelegraphicCodeBooks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TelegraphicCodeBooks</span></a></p><p>Amazon:<br><a href="https://www.amazon.com/Code-Breaking-Pacific-Peter-Donovan/dp/3319082779/ref=sr_1_1?crid=206QHDM0GR76P&amp;keywords=code+breaking+in+the+pacific&amp;qid=1672089089&amp;sprefix=code+breaking+in+the+pacifi%2Caps%2C253&amp;sr=8-1&amp;ufe=app_do%3Aamzn1.fos.f5122f16-c3e8-4386-bf32-63e904010ad0" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">amazon.com/Code-Breaking-Pacif</span><span class="invisible">ic-Peter-Donovan/dp/3319082779/ref=sr_1_1?crid=206QHDM0GR76P&amp;keywords=code+breaking+in+the+pacific&amp;qid=1672089089&amp;sprefix=code+breaking+in+the+pacifi%2Caps%2C253&amp;sr=8-1&amp;ufe=app_do%3Aamzn1.fos.f5122f16-c3e8-4386-bf32-63e904010ad0</span></a></p><p>Note: This is *not* an affiliate link. I’m simply recommending this high-quality book for those who might find it interesting.</p>
Anthony Collette :donor: / Loistava<p>Code Breaking in the Pacific</p><p>You’ve heard about Enigma cipher machines, and how codebreakers at England’s Bletchley Park cracked messages during World War II. There are amazing stories about how the specialized machines they built helped them decipher messages, and become the predecessors of today’s computers.</p><p>But you may not have heard about a different kind of codebreaking going on in the Pacific during the same period. The problems and techniques were completely different, because enemy messages were transmitted in code, not cipher. And there were some incredible success stories from this period, such as the battle of Midway, which turned the tide of the conflict in the Pacific.</p><p>The methods used in code breaking behind those successes are quite different to those used against encryption machine ciphers such as the Enigma. The reason is that the main cipher systems used by the Japanese were based on code books rather than a machine. “Code Breaking in the Pacific” is the first book to provide a complete description of those systems and the development of the techniques used to break them. It addresses the last major gap in the literature of WW2 cryptography and most likely the last major gap in the literature of WW2.</p><p>This very dense book was written by two mathematicians: Peter Donovan and John Mack. Math and I have never been on good terms, we’re definitely not friends. So the math in the book is *completely* over my head. But there were some interesting nuggets that jumped out:</p><p>☑️​ As early as 1916, the British were using Hollerith punch-card equipment from the U.S. to decode enemy messages. The Hollerith company eventually became IBM.</p><p>☑️​ The skills required for successful decoding . . . [of these messages] are more akin to the linguistic challenge of determining the nature and meaning of an unknown written language than to those needed for elucidating the operation of a cipher machine . . .”</p><p>☑️​ Lightly used code books were particularly difficult to crack.</p><p>☑️​ The use of boilerplate messages by the other side provided codebreakers with a way to crack messages.</p><p>☑️​ Some of these systems were designed to keep information secure only for a few hours.</p><p>☑️​ Choosing to doubly encrypt messages often made the system *less* secure, not more secure.</p><p>☑️​ Major pieces of disinformation were known as “purple whales.” 🐳​🐋​🐳​</p><p>If you have an interest in math and history, this may be right up your alley.</p><p>But this book isn’t cheap. One option: “check it out like a library book” from a local university library.</p><p><a href="https://infosec.exchange/tags/WW2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WW2</span></a><br><a href="https://infosec.exchange/tags/CodeBreaking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CodeBreaking</span></a><br><a href="https://infosec.exchange/tags/BookReview" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BookReview</span></a><br><a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a><br><a href="https://infosec.exchange/tags/Enigma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Enigma</span></a><br><a href="https://infosec.exchange/tags/EnigmaMachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EnigmaMachine</span></a><br><a href="https://infosec.exchange/tags/BletchleyPark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BletchleyPark</span></a><br><a href="https://infosec.exchange/tags/CodeBreakingInThePacific" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CodeBreakingInThePacific</span></a><br><a href="https://infosec.exchange/tags/TelegraphicCodeBooks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TelegraphicCodeBooks</span></a></p><p>Amazon:<br><a href="https://www.amazon.com/Code-Breaking-Pacific-Peter-Donovan/dp/3319082779/ref=sr_1_1?crid=206QHDM0GR76P&amp;keywords=code+breaking+in+the+pacific&amp;qid=1672089089&amp;sprefix=code+breaking+in+the+pacifi%2Caps%2C253&amp;sr=8-1&amp;ufe=app_do%3Aamzn1.fos.f5122f16-c3e8-4386-bf32-63e904010ad0" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">amazon.com/Code-Breaking-Pacif</span><span class="invisible">ic-Peter-Donovan/dp/3319082779/ref=sr_1_1?crid=206QHDM0GR76P&amp;keywords=code+breaking+in+the+pacific&amp;qid=1672089089&amp;sprefix=code+breaking+in+the+pacifi%2Caps%2C253&amp;sr=8-1&amp;ufe=app_do%3Aamzn1.fos.f5122f16-c3e8-4386-bf32-63e904010ad0</span></a></p><p>Note: This is *not* an affiliate link. I’m simply recommending this high-quality book for those who might find it interesting.</p>