Last week, upon the invitation of blockchain company Verity – Dr Enigma travelled to Slovenia’s beautiful capital to present at the ‘Original Crypto’ evening as well as visit Verity’s office and speak to both the Slovene media and Verity staff about the Enigma machine.
TV Cameras rolling at Verity’s office in Ljubljana, Slovenia, Sep 2018
Media interest was strong, with two different TV crews doing segments for national stations, and several magazine and newspaper journalists interviewing both Dr Enigma, and Martin Mikeln, Verity co-founder.
The event was an excellent example of how the breaking of the Enigma machine codes still fascinates people and is still relevant to cybersecurity today; especially those in the computer programming community.
Slovenia is a hotspot for blockchain, having been an early adopter of the technology which has led to a strong ecosystem of blockchain companies, and several world-class companies to have come out of the country. This was reflected by the Original Crypto event selling out with over 100 people attending.
With its roots in ‘cryptography’, today’s ‘cryptocurrency’ and underlying blockchain pioneers are fascinated by the story of hacking Enigma as well as the original machine itself. Ljubljana has a bit of Enigma history of its own; it was Ljubljana (then called ‘Laibach’) that was where the first pre-Enigma rotor-cipher machine was patented. And as Ljubljana’s National Museum of Contemporary History highlighted via a tweet, they have a three rotor machine on display.
Dr Enigma was covered by most of the major Slovene press, including:
As Scotland’s premier IT event, the Enigma machine story, the hands-on demos of the original Enigma machines, and their links to Alan Turing, provide an interesting contrast to the high-tech world of blockchain, growth hacking and bootstrapping, as well as something you can actually touch and feel – something of a rarity in this digital age.
A big thanks to Brian Corcoran and the rest of the Turing Fest organisers for the invite and to everybody who came to the talk and to play with an Enigma machine.
If you’d like to book an Enigma machine talk or demo for your own event, see our Enigma machine events page or email: email@example.com.
Here are a few pictures of Turing Fest 2018:
Turing Fest 2018, Edinburgh
Tika Larasati and Dr Enigma at Turing Fest 2018, Edinburgh
Hands-on Enigma demo at Turing Fest 2018, Edinburgh, UK
Speaking at Turing Fest 2018, Edinburgh
Brian Corcoran, Turing Fest co-founder, plays with my Enigma Machine
Gareth Williams, Skyscanner co-founder, plays with my Enigma Machine
This year marks 100 years since the precursor of the Enigma machine was first patented by Arthur Scherbius.
Although known best as the enciphering machine used by the Nazis during World War Two, the Enigma machine in fact pre-dates the war and was available commercially until the late 1920s, after which the German government swallowed up the company, removed the machines from the open market and upgraded the hardware.
So how could the cracking of coding technology that is a century old still have any relevance to today’s cybersecurity world, where ciphers, and the hacking of them, are infinitely more complex?
Well, the story of breaking the Enigma code is a fascinating tale of cat and mouse, which anyone in the cybersecurity space today will appreciate. Essentially, the Poles, Brits and Americans, who each broke Enigma ciphers at different points during the war, were hackers, constantly probing for weaknesses in the Enigma system.
It was a combination of mathematical genius along with exploiting said weaknesses in the hardware, prescribed protocol and just plain user error, that helped Allied forces break Enigma ciphers and allowed them to read many of the messages (though not all by a very long way) and gain advantages which eventually led to Allied victory and the shortening of the war.
As part of our recent Silicon Valley Tech Tour, Dr Enigma presented at the Dropbox HQ in San Francisco, and during this visit I spoke to Scott Joaquim of Dropbox’s Security Team. He perfectly sums up why the Enigma story is still so relevant to IT security and what they are trying to achieve at Dropbox today:
“At Dropbox, one of our core company values is being worthy of trust. With over half a billion users and 300,000 companies using our platform, security and privacy are our top priority.
So for us, one of the most riveting elements of the history of the Enigma machine is that, in spite of the machine’s technical sophistication, it was human error, procedural flaws, and leaks of key information that helped enable the Bletchley Park team and others to crack the codes.
It’s a dramatic testament to the fact that a system or organization can only be as secure as the people who are operating or taking care of it. At Dropbox this is why we cultivate a culture of security where every employee, regardless of their role, takes personal responsibility for keeping Dropbox and our users secure.”
Indeed, with more ways to set up an Enigma machine than there are atoms in the observable universe, the Nazis were convinced that Enigma ciphers were unbreakable. And indeed they were correct in believing that they were safe from a brute force attack; it would have taken a lifetime to run through each setting at that point in history.
However, clever people approached the problem differently, discovering and exploiting weaknesses with both the machine’s hardware, the user protocols set from above, as well as just every day user laziness, to attack and break the ciphers.
As Scott from Dropbox noted, it’s a stark reminder that systems are only as secure as their weakest link. It’s not just holes in the code which need to be patched; social engineering attacks are nothing new, and the lessons that Alan Turing and the Enigma hackers learned back then, still have much to teach us today.