A game of imitation without unnecessary details, but with important ones
Until the moment when we are captured by robots, there is still a little time left. Therefore, we will have time to tell you about cryptography in the era of electromechanical devices. And to understand what is happening here, we advise you to read the first part of the article.
Sometimes humanity takes a terrible step into the abyss, only to get out and go forward. War is always a huge abyss. World War II gave impetus to the formation of a new branch of cryptography - electromechanical.
Most of us know what a typewriter looks like. But few would recognize it as the most feared weapon of the twentieth century. This is what the Enigma military cipher machine looked like.
It would be fair to say that "Enigma" was not called a specific machine, but a whole series of machines. They differed in configuration, but served the same purpose - to encrypt. In essence, encryption was still based on a principle familiar to us - a simple substitution cipher. But there were several substitutions, and for each letter the shift was different.
Outwardly, the machine really looked like a typewriter: it was a box with a keyboard and incomprehensible switches. Inside, the magic of chaos was going on. The text was encrypted thanks to rotars - that was the name of the disks inside the Enigma. Each such disk had 26 contacts.
Each rotor took on one letter value and returned another: each rotor performed this operation. The initial letter entered on the machine's keyboard changed its meaning several times, moreover, by a seemingly random, indecipherable number of shifts. The first rotor gave out one cipher, then the second rotor changed it. And so on, until the rotors run out. Usually they ended at three pieces, but sometimes there were four - it depended on the Enigma model.
To further confuse the cipher, a patch panel was invented. It consisted of cells, the number of which corresponded to the number of letters in the alphabet. The cells were connected by a wire and swapped each other's value. By inserting the wire with one end into the “A” socket, and with the other end into the “E”, you swapped these letters. After all these manipulations, the number of possible variants of the cipher became equal to 150738274937250 (two to the 47th degree).
"Enigma" had a very complex principle of operation, but easy execution. It was enough to enter text on the keyboard and see what happened. "Enigma" was a popular device: for the entire time of its existence, about 100 thousand copies of the product were produced. Even then, the story of adding accessories to the device became relevant. For example, one of the configurations allowed the cipher to be displayed on the panel, instead of watching the light bulbs light up. Or use Enigma remotely, though with the help of a wire - then the operator at one end of the wire knew only the message, and at the other - only the cipher. This has become a new element of secrecy.
Bletchley Park has always kept many secrets. Enigma was not the first machine to encrypt messages, it was simply the most famous. And when Enigma was first invented in Germany, deciphering machines were already being built in Britain. True, they are not.
The surprise in The Imitation Game about the huge machine is nothing more than acting. Bletchley Park by that time boasted a car called the Colossus. Already by the name it can be assumed that here the dimensions of the device were really amazing. "Colossius" was a cabinet with switches and light bulbs. It cracked ciphers from intercepted radio broadcasts codenamed "fish" and was decommissioned with the invention of Enigma.
Unfortunately or fortunately, he could only solve narrowly focused tasks and it was necessary to look for something that would cope with Enigma.
And then the Turing Bomb was dropped.
There was no bomb, of course. That was the code name for the machine that defeated Enigma. The Turing machine was of great importance at that time, but no less for us. It was she who laid the foundation for modern computers. But we will talk about this in more detail next time.
We actively explore the world branding and advertising
Subscribe to our social media accounts to explore the world together.
This Personal Data Processing Policy is drafted in accordance with the requirements of Federal Law No. 152-FZ dated July 27, 2006, “On Personal Data” (hereinafter referred to as the Personal Data Law) and defines the procedure for processing personal data and the measures taken to ensure the security of personal data by LLC “AISIU+” (hereinafter referred to as the Operator).
1.1. The Operator considers the observance of human and civil rights and freedoms during the processing of personal data, including the protection of the right to privacy, personal and family confidentiality, to be its primary objective and essential condition for carrying out its activities.
1.2. This Policy of the Operator regarding the processing of personal data (hereinafter – the Policy) applies to all information that the Operator may receive about visitors to the website .
2.9. Personal data made publicly available by the subject of personal data – personal data to which the subject has granted access to an unlimited number of persons by giving consent to the processing of personal data made publicly available, in accordance with the procedure established by the Personal Data Law (hereinafter – personal data made publicly available).
7.2. The Operator is also entitled to send the User notifications about new products and services, special offers, and various events. The User may at any time opt out of receiving such informational messages by sending an email to the Operator at hello@icu.agency with the subject “Unsubscribe from notifications about new products, services, and special offers.”
7.3. Anonymized data of Users collected through web analytics services is used to gather information about User behavior on the website, improve the quality of the website, and enhance its content.
8. Legal Grounds for Personal Data Processing
8.1. The legal grounds for the processing of personal data by the Operator are:
– Federal Law “On Information, Information Technologies and Information Protection” No. 149-FZ dated July 27, 2006;
– federal laws and other regulatory legal acts in the field of personal data protection;
– the Users’ consent to the processing of their personal data, including the processing of personal data permitted for distribution.
8.3. The Operator processes anonymized data about the User if this is permitted in the User’s browser settings (such as enabling the storage of cookies and the use of JavaScript technology).
8.4. The personal data subject independently decides to provide their personal data and gives consent freely, by their own will, and in their own interest.
9. Conditions for Personal Data Processing
9.1. Personal data is processed with the consent of the personal data subject to the processing of their personal data.
9.2. The processing of personal data is necessary to achieve the purposes provided for by an international treaty of the Russian Federation or by law, as well as to fulfill the functions, powers, and duties imposed on the Operator by the legislation of the Russian Federation.
9.3. The processing of personal data is necessary for the administration of justice, the execution of a court decision, or the decision of another authority or official subject to execution in accordance with the legislation of the Russian Federation on enforcement proceedings.
9.4. The processing of personal data is necessary for the performance of a contract to which the personal data subject is a party, a beneficiary, or a guarantor, or for the conclusion of a contract at the initiative of the personal data subject or a contract under which the personal data subject will be a beneficiary or a guarantor.
9.5. The processing of personal data is necessary for the exercise of the rights and legitimate interests of the Operator or third parties, or for the achievement of socially significant goals, provided that this does not violate the rights and freedoms of the personal data subject.
9.6. Personal data is processed that has been made publicly available by the personal data subject or at their request (hereinafter – publicly available personal data).
9.7. Personal data is processed that is subject to publication or mandatory disclosure in accordance with federal law. 10. Procedure for the Collection, Storage, Transfer, and Other Types of Personal Data Processing
The security of personal data processed by the Operator is ensured through the implementation of legal, organizational, and technical measures necessary to fully comply with the requirements of current legislation in the field of personal data protection.
10.1. The Operator ensures the safekeeping of personal data and takes all possible measures to prevent unauthorized access to personal data.
10.2. The User’s personal data will never, under any circumstances, be transferred to third parties, except in cases related to the fulfillment of applicable legislation or if the personal data subject has given the Operator consent to transfer the data to a third party for the purpose of fulfilling obligations under a civil law contract.
10.3. If any inaccuracies in the personal data are identified, the User may update them independently by sending a notification to the Operator at the email address hello@icu.agency with the subject line “Personal Data Update.”
10.4. The period of personal data processing is determined by the achievement of the purposes for which the personal data was collected, unless a different period is specified by contract or applicable law. The User may withdraw their consent to the processing of personal data at any time by sending a notification to the Operator via email at hello@icu.agency with the subject line “Withdrawal of Consent to Personal Data Processing.”
10.5. All information collected by third-party services, including payment systems, communication tools, and other service providers, is stored and processed by those parties (Operators) in accordance with their own User Agreements and Privacy Policies. The personal data subject and/or User is solely responsible for reviewing such documents in a timely manner. The Operator is not responsible for the actions of third parties, including the service providers mentioned in this clause.
10.6. Any restrictions established by the personal data subject on the transfer (except access), processing, or conditions of processing (except access) of personal data permitted for distribution do not apply in cases where personal data is processed for state, public, or other socially significant interests as defined by the legislation of the Russian Federation.
10.7. The Operator ensures the confidentiality of personal data during processing.
10.8. The Operator stores personal data in a form that allows identification of the personal data subject for no longer than is necessary to achieve the purposes of personal data processing, unless a longer storage period is established by federal law or a contract to which the personal data subject is a party, beneficiary, or guarantor.
10.9. The grounds for termination of personal data processing may include the achievement of the processing purposes, the expiration of the data subject’s consent, the withdrawal of consent by the personal data subject, or the identification of unlawful processing of personal data.
11. List of Actions Performed by the Operator with Collected Personal Data
11.1. The Operator carries out the collection, recording, systematization, accumulation, storage, clarification (updating, modification), retrieval, use, transfer (distribution, provision, access), depersonalization, blocking, deletion, and destruction of personal data.
11.2. The Operator performs automated processing of personal data with the receipt and/or transfer of the obtained information via information and telecommunication networks or without such transfer.
12. Cross-Border Transfer of Personal Data
12.1. Before initiating the cross-border transfer of personal data, the Operator must ensure that the foreign country to which the data is to be transferred provides reliable protection of the rights of personal data subjects.
12.2. Cross-border transfer of personal data to foreign countries that do not meet the above requirements may only occur if there is written consent from the personal data subject for the cross-border transfer of their personal data and/or for the execution of a contract to which the personal data subject is a party.
13. Confidentiality of Personal Data
The Operator and other individuals who have access to personal data are obligated not to disclose or distribute personal data to third parties without the consent of the personal data subject, unless otherwise required by federal law.
14. Final Provisions
14.1. The User can obtain any clarifications regarding the processing of their personal data by contacting the Operator via email at hello@icu.agency.
14.2. Any changes to the Operator’s personal data processing policy will be reflected in this document. The Policy is valid indefinitely until replaced by a new version.
Monitoring and improving
By continuing to use our website, you consent to the use of cookies. We use cookies to enhance user experience, analyze traffic, and personalize content.