Milestone-Proposal:The First Breaking of Enigma Code by the Team of Polish Cipher Bureau, 1932-39

Revision as of 13:58, 30 July 2013 by Breakingenigma (talk | contribs)

Docket #:2013-03

This is a draft proposal, that has not yet been submitted. To submit this proposal, click on "Edit with form", check the "Submit this proposal for review" box at the bottom, and save the page.

Is the achievement you are proposing more than 25 years old? Yes

Is the achievement you are proposing within IEEE’s fields of interest? (e.g. “the theory and practice of electrical, electronics, communications and computer engineering, as well as computer science, the allied branches of engineering and the related arts and sciences” – from the IEEE Constitution) Yes

Did the achievement provide a meaningful benefit for humanity? Yes

Was it of at least regional importance? Yes

Has an IEEE Organizational Unit agreed to pay for the milestone plaque(s)? Yes

Has an IEEE Organizational Unit agreed to arrange the dedication ceremony? Yes

Has the IEEE Section in which the milestone is located agreed to take responsibility for the plaque after it is dedicated? Yes

Has the owner of the site agreed to have it designated as an Electrical Engineering Milestone? Yes

Year or range of years in which the achievement occurred:


Title of the proposed milestone:

The First Breaking of Enigma Code by the Team of Polish Cipher Bureau, 1932-39

Plaque citation summarizing the achievement and its significance:

This plaque commemorates the achievements of Marian Rejewski, Jerzy Różycki and Henryk Zygalski, mathematicians of the Polish Cipher Bureau, who broke the German Enigma cipher machine. Working with engineers from the AVA Radio Manufacturing Company they built the ‘bomba’ – the first cryptanalytic machine to break Enigma codes. Their work was a foundation of British code breaking efforts which, with later American assistance, helped to shorten World War II.

In what IEEE section(s) does it reside?


IEEE Organizational Unit(s) which have agreed to sponsor the Milestone:

IEEE Organizational Unit(s) paying for milestone plaque(s):

Unit: Poland Section
Senior Officer Name: Senior officer name masked to public

IEEE Organizational Unit(s) arranging the dedication ceremony:

Unit: Poland Section
Senior Officer Name: Senior officer name masked to public

IEEE section(s) monitoring the plaque(s):

IEEE Section: Poland
IEEE Section Chair name: Section chair name masked to public

Milestone proposer(s):

Please note: your email address and contact information will be masked on the website for privacy reasons. Only IEEE History Center Staff will be able to view the email address.

Street address(es) and GPS coordinates of the intended milestone plaque site(s):

ul. Śniadeckich 8, 00-956 Warszawa (Warsaw), Poland GPS (latitude, longitude) 52.2213787 ; 21.0146535

Describe briefly the intended site(s) of the milestone plaque(s). The intended site(s) must have a direct connection with the achievement (e.g. where developed, invented, tested, demonstrated, installed, or operated, etc.). A museum where a device or example of the technology is displayed, or the university where the inventor studied, are not, in themselves, sufficient connection for a milestone plaque.

Please give the address(es) of the plaque site(s) (GPS coordinates if you have them). Also please give the details of the mounting, i.e. on the outside of the building, in the ground floor entrance hall, on a plinth on the grounds, etc. If visitors to the plaque site will need to go through security, or make an appointment, please give the contact information visitors will need.

Institute of Mathematics, Polish Academy of Sciences

Are the original buildings extant?

Details of the plaque mounting:

How is the site protected/secured, and in what ways is it accessible to the public?

Who is the present owner of the site(s)?

A letter in English, or with English translation, from the site owner(s) giving permission to place IEEE milestone plaque on the property:

File:IMPAN letter.pdf

A letter or email from the appropriate Section Chair supporting the Milestone application:

What is the historical significance of the work (its technological, scientific, or social importance)?

IEEE Milestone Description During the 1930s, a trio of Polish mathematicians Marian Rejewski (1905 – 1980), Henryk Zygalski (1907 – 1978), and Jerzy Różycki (1909 – 1942) solved the German Enigma cipher machine and broke Enigma messages. Working with engineers from AVA Radio Manufacturing Company they built the bomba – the first cryptanalytic machine designed to attack Enigma and one of many cryptanalytic machines to be built by Allied codebreakers. Enigma is an electrically wired rotor machine; a sequence of ciphers is generated by the motion of rotors in the machine. It is one of several cipher machines that were developed for military or for commercial use during or just after World War I. German Arthur Scherbius invented Enigma; he patented a rotor machine in 1918. An American, Edward Hebern, had designed a rotor cipher machine in 1917, and the Dutch inventor Hugo Koch and the Swedish inventor Arvid Damm designed machines that were patented in 1919.

It is likely that both Scherbius’ and Koch’s designs resulted from a rotor machine developed in 1915 

by two Dutch military officers.

The weaknesses of their World War I codes and ciphers prompted the German military to adopt a cipher machine. The Reichsmarine began using Enigma in 1926, and the Reichswehr began using it in 1928. The Polish Cipher Bureau had many successes during the Polish-Soviet War (1919 – 1921), and in the 1920s the Cipher Bureau monitored radio signals resulting from German military exercises. In 1928 the Poles were confronted by messages that – because of the randomness of letters in the messages – were thought to be generated by a machine cipher.

That same year the Cipher Bureau began a cryptology course for mathematics students at Poznań University. Rejewski, Zygalski, and Różycki participated in that course. They began working for the Cipher Bureau in Poznań but moved to Warsaw, and Rejewski began his attack on Enigma in September 1932. Although the Cipher Bureau was aware of the operation of a commercial Enigma, the rotors of the German military Enigma had different wiring than the commercial version, and the German military had complicated the machine by adding a plugboard, which further greatly scrambled the letters. By the end of 1932, Rejewski had determined the wiring of the rotors of the military version of Enigma. In 1932, Rejewski had received from the French two German manuals that described the operation of military Enigma. He had managed to write a system of equations that modeled the permutations of the six indicators (which were used by the sending operator to transmit the message setting to the receiving operator) at the beginning of Enigma messages. In December 1932, Rejewski received from the French the setting sheets for September and October. This information allowed Rejewski to substitute for some of the unknowns in his system of equations and solve for the wiring of the rotors. The Cipher Bureau arranged with AVA Radio Manufacturing Company to produce Enigma “doubles.” Doubles were produced in 1934. AVA Company had been established by Edward Fokczyński and Antoni Palluth to design and produce telecommunications equipment for the Polish army. They were soon joined by the brothers Ludomir and Leonard Danilewicz, who had graduated from Warsaw University of Technology. In order to break Enigma messages, it was necessary to determine the machine settings. The Polish codebreakers developed several techniques to determine settings. For example, Różycki developed the “clock method,” and Zygalski developed a set of perforated sheets. Two other methods resulted in the production of codebreaking machines – one machine to produce a catalog of settings and their “characteristics” and another to determine the rotor settings.

In 1934, Rejewski was able to exploit patterns, which he called characteristics, produced by the six-letter 

indicators at the beginning of Enigma messages. Rejewski designed a machine called the cyclometer to catalog the characteristics of all 105,456 rotor settings. Again, the AVA Radio Manufacturing Company produced the machine. It took the codebreakers approximately a year to prepare the catalog. Unfortunately not long after its completion, the Germans changed Enigma’s reflecting rotor, and the catalog had to be redone. This method was rendered useless when the indicator procedure changed in September 1938. However, Rejewski found patterns in the new indicators. Working with the engineers at AVA, one of the most famous codebreaking machines – the bomba – was produced. The six bomby (plural in Polish for “bomba”) searched through all 105,456 rotor settings for those that exhibited patterns that could be determined from the indicators after a sufficient number of messages were intercepted. Usually only a small number of settings produced the patterns, and each of those settings was tried to determine the one that was correct. Because there were three rotors and three positions for rotors in Enigma, there were six possible rotor orders; therefore, six bomby were produced. In December 1938, the Germans introduced two new rotors. Then there were sixty possible ways to select three rotors from the set and place them in Enigma; sixty bomby would have been needed, and the Cipher Bureau could not afford to build them. After the change, the Cipher Bureau could break few Enigma messages. In July 1939, as war with Germany loomed over Poland, the Polish codebreakers met just outside Warsaw with British and French codebreakers. At this meeting the Poles described their achievements against Enigma.

As a result of the meeting, the British and the French each received one of the Enigma doubles and information 

on the methods used by the Poles to solve daily keys. On September 1, 1939, Germany attacked Poland, and British codebreakers at Bletchley Park continued the attack on Enigma. British mathematicians such as Alan Turing and Gordon Welchman and engineers such as Harold “Doc” Keen and Thomas “Tommy” Flowers developed cryptanalytic machines to attack Enigma and other German ciphers. One of the machines to attack Enigma was the Turing-Welchman bombe. (IEEE Milestone, Bletchley Park, 1939 – 1945) Both the British bombe and the Polish bomba searched through all possible Enigma rotor settings for settings that produced patterns that had been noticed by the codebreakers. The British bombe searched for patterns in Enigma messages, and the Polish bomba searched for patterns in Enigma indicators. After the United States entered the war, US Navy mathematicians at Naval Communications in Washington, DC, designed cryptanalytic machines to attack Japanese ciphers and machines to assist the British with the attack on naval Enigma. These codebreaking machines were engineered by Joseph Desch and other engineers at the Naval Computing Machine Laboratory located at National Cash Register Company in Dayton, OH. One of the machines to attack naval Enigma was the US Navy cryptologic bombe. (IEEE Milestone, Naval Computing Machine Laboratory, 1942 – 1945) The US Navy bombe – like the British bombe – searched for patterns in Enigma messages. At the beginning of the German attack on Poland, Rejewski, Zygalski, and Różycki fled Warsaw, and they arrived in Paris in late September. By the end of October they were again working on German ciphers – now at Command Post (P.C.) Bruno at Gretz-Armainvillers near Paris. The Poles and the British exchanged Enigma keys. In January 1940, Alan Turing visited the Polish codebreakers in France. Turing brought the Poles the British version of the Zygalski sheets, and the Poles provided Turing with corrected information on the wiring of Enigma rotors IV and V. Palluth and Fokczyński had also fled to France. Palluth maintained the team’s radio contact with London and later with Algiers and was involved with monitoring German radio signals. Fokczynski repaired radio and cipher equipment. Following the German attack on France in May 1940, Rejewski, Zygalski, and Różycki evacuated to North Africa. By October they had returned to Vichy France and continued attacking German ciphers. They were located near Uzès at P.C. Cadix. Until Germany took control of South France, the Polish codebreakers traveled to and from North Africa. On January 9, 1942, on a trip back to France after a three-month assignment in the cipher section in Algiers, Różycki died when the ship on which he was traveling sank. In November 1942, after Operation Torch, the Allied attack on North Africa, Germany occupied free France. Rejewski and Zygalski undertook a harrowing crossing into Spain, which included their being detained in Spanish prisons. After their release, they traveled to Portugal and then to Gibraltar from where they flew to Britain. Palluth and Fokczyński were both captured during the crossing into Spain. They both died in the Sachsenhausen camp – Palluth during an Allied bombing raid and Fokczyński due to illness. Rejewski and Zygalski arrived in Great Britain in August 1943 and served with the Communications Battalion of the Polish Armed Forces Commander-in-Chief’s General Staff. Both served in the German section. Their work until the end of the war was breaking manual SS and SD ciphers. After the war, Zygalski remained in England and worked at the Polish University. He died in 1978 in Liss, near Portsmouth. When the war ended, Rejewski returned to his home in Bydgoszcz where, despite harassment by the Polish security services, he worked for various companies until his retirement because of poor health in 1966. He moved to Warsaw in 1969 and died there of a heart attack in 1980.

What obstacles (technical, political, geographic) needed to be overcome?

What features set this work apart from similar achievements?

References to establish the dates, location, and importance of the achievement: Minimum of five (5), but as many as needed to support the milestone, such as patents, contemporary newspaper articles, journal articles, or citations to pages in scholarly books. At least one of the references must be from a scholarly book or journal article.

The achievements outlined above are covered in more detail in the following publications: [1] Frank Carter, “The First Breaking of Enigma: Some of the Pioneering Techniques Developed by the Polish Cipher Bureau,” Report No 2, Bletchley Park Trust, 2008. [2] Jennifer Wilcox, “Solving the Enigma: History of the Cryptanalytic Bombe,” Center for Cryptologic History, National Security Agency, 2006. [3] Chris Christensen,”Polish Mathematicians Finding Patterns in Enigma Messages,” Mathematics Magazine, 80(4), October 2007, pp. 247-273. [4] F. H. Hinsley, et al., British Intelligence in the Second World War: Its Influence on Strategy and Operations (book). 3(2), Appendix 30. [5] Andrew Hodges, Alan Turing: The Enigma, Simon & Schuster, 1983 (book). This is also available in a Polish translation: Andrew Hodges, Enigma. Życie i śmierć Alana Turinga, Prószyński i S-ka, Warsaw, 2002. [6] Brian Johnson, The Secret War, Methuen Inc, 1978 (book). This is also available in a Polish translation: Brian Johnson, Sekrety Drugiej Wojny Światowej. Wojna Mózgów, Zysk i S-ka, Warsaw, 1997. [7] Władysław Kozaczuk, W kręgu Enigmy, Książka i Wiedza, Warsaw 1986 (book). [8] David Kahn, The Codebreakers: The Story of Secret Writing, Scribner; Revised Edition, 1996 (book). This is also available in a Polish translation: Łamacze kodów: Historia kryptologii, WNT Warszawa, 2004. [9] Marian Rejewski, Memories of My Work at the Cipher Bureau of the General Staff Second Department 1930-45, Adam Mickiewicz University Press, Poznań, Poland, 2011 (book.) Half of this book is written in Polish, and the other half is a translation into English.

Websites: US National Security Agency’s Center for Cryptologic History website: There are many Enigma websites, including Wikipedia’s comprehensive coverage at

Supporting materials (supported formats: GIF, JPEG, PNG, PDF, DOC): All supporting materials must be in English, or if not in English, accompanied by an English translation. You must supply the texts or excerpts themselves, not just the references. For documents that are copyright-encumbered, or which you do not have rights to post, email the documents themselves to Please see the Milestone Program Guidelines for more information.