The Enigma machine was a decryption/encryption device most well-known for its use in World War II, when it was developed by the Germans and cracked by the British. Ultimately employed to decrypt crucial German messages, the Enigma is known to be a rarely found machine that may have actually been responsible for ending the war perhaps as much as two years ahead of time thanks to a crack team of code breakers including Alan Turing, as featured in the 2014 movie The Imitation Game. Code breaking was obviously an important duty during the war—and has been during many wars historically—and those who were able to do so were held in high esteem, along with their machines.
The German military was responsible for the manufacturing of the machine as early as the 1920s. With it, they began to encrypt messages due to a scrambling system powered by rotors and electronics. A message could not be figured out unless the settings of the rotors were known, and the Germans tried to stay ahead of everyone else, even adding another rotor. Although that war has faded into history and the machine is certainly obsolete at this point, it’s still a great source of fascination, and enough so, as Hackaday pointed out recently, that makers and hackers have shown interest in re-creating them, as well as making other projects that are related to the encryption machine.
Now, we see the Enigma continuing on into posterity via a project from students studying in their first year at CentraleSupélec Rennes, in Northwestern France. First year or not, they’ve certainly shown their mechanical engineering chops with the Enigma, consisting of rotors that harken back to the design of the originals, yet showing off some high-tech flair with a 3D printed housing shell that holds brass contacts and the writing. Modern microswitches are also used for the keyboard although the students used an aesthetic design that is reminiscent of the original. They also added their own look with the AZERTY layout, using the French equivalent of the well-known QWERTY keyboard which was established for the traditional alphabetical layout meant to be used with typewriters.
The rotors are what make this 3D printed device unique, and as you can see in the explanation written by the students regarding the design, it has either three or four 3D printed rotors, along with the 3D printed compensator, that work to encrypt the letters. Both the keyboard and sub-keyboard were constructed out of wood. The keys were made by using an aluminum pipe that with a 3D printed touch at the top. They painted on the letters by hand, and then created the keyboard from several layers of wood, measuring at 5mm each. The team then glued them and drilled them together.All of their 3D design was performed in SOLIDWORKS, with a great deal of handiwork done afterward, from brass pins to parts that were cut and then welded using tin. Pieces were glued and sanded in bringing the final machine to fruition. This Enigma is fully functional, but also unique.
Their transmission protocol for the device was as follows:
“One of the main differences in Enigma is that rotors positions change for each letter (each 1 letter for rotor I, each 26th letter for rotor II…). For instance, AAAAAAA CFRTUIJ,” explains the team. “For a single letter encryption, the operator press a touch on the keyboard: it enables a current travelling through the rotors (cables and pins), being reflected through the reflector and being displayed using lamps.”
“The complexity of the Enigma encryption scheme is increased with the plugboard: it allows the operator to transform each letter in another before the rotors. For decryption, rotors must be replaced in their initial position and the ciphertext will be typed on the Enigma keyboard.”
- Settings, written in a book daily, changed each month in terms of initial position, rotors to be used, plugboard connections, and ring position.
- Operators chose three random letters.
- Rotors and ring positions, with day plugboard connections were set.
- The initial position was encrypted twice and then sent twice as the students worked to doublecheck on the ‘integrity of the transmission.’
- The rotors were placed in the initial position and the writing of the ciphertext began.
Hackaday; Pascal Blog]
“Only six letters are encrypted with the same initial position: frequency analysis was unefficient,” stated the students. “However, position of rotors II and III may not change in 6 letters: it was one breach in the Enigma encryption scheme.”
Subscribe to Our Email Newsletter
Stay up-to-date on all the latest news from the 3D printing industry and receive information and offers from third party vendors.
You May Also Like
3D Printing Consolidation or Collaboration? The Driving Theme of AMS 2024
One of the defining features of the Additive Manufacturing Strategies (AMS) business summit has been its emphasis on the financial aspects of the 3D printing market. That was no different...
Dimension Inx CMFlex Pioneers Surgeries as FDA’s First Cleared 3D Printed Bone Graft
Marking a new milestone in 3D printed medical innovation, the first 3D printed regenerative bone graft product is now making its way into surgeries, offering a pioneering solution for bone...
3D Printing’s Journey to a New Industrial Reality
In the world of 3D printing, we stand to witness a revolution unfold before our eyes. As the saying goes, “There’s a time and place for everything,” and for 3D...
Materialise to 3D Print Aircraft Cabin Parts via Partnership with Stirling Dynamics and Proponent
3D printing software and service provider Materialise NV (NASDAQ:MTLS) is extending its role in the field of maintenance, repair, and overhaul (MRO) for the aerospace sector. Together with Proponent, the...
Upload your 3D Models and get them printed quickly and efficiently.