Cryptography History

What Is a Enigma Machine

What Is a Enigma Machine? It is an electro-mechanical cipher device used by Nazi Germany before and during World War II to encrypt military communications — and it came closer to winning the war for the Axis powers than almost any weapon ever built. Understanding how it worked, why it seemed unbreakable, and how it was finally cracked is one of the most compelling stories in the history of science.

By Letters to Numbers Converter  ·  May 14, 2026

what is a enigma machine — World War II Enigma cipher machine with rotors and keyboard

The Enigma Machine: An Overview

The Enigma machine was invented by German engineer Arthur Scherbius. He patented the commercial Enigma A in 1918 and began selling it in 1923, initially marketing it to banks and businesses that wanted to protect sensitive correspondence. The machine performed polyalphabetic substitution — meaning that the same plaintext letter produced a different ciphertext letter every time it was typed, because the rotors advanced with each keypress. This made frequency analysis, the classical tool for breaking substitution ciphers, essentially useless against it.

Physically, an Enigma machine resembled a chunky typewriter. It had a standard QWERTZ keyboard, a lampboard of 26 lettered bulbs that lit to show the encrypted output, a set of rotors (the scrambling heart of the machine), and — in the military versions — a plugboard at the front. The machine weighed roughly 12 kilograms (26 pounds) and could be carried in a wooden case to field positions.

The German Wehrmacht, Luftwaffe, and Kriegsmarineeach adopted and modified versions of Enigma from the late 1920s onward. The Navy's version, the Enigma M4, added a fourth rotor in 1942, making it significantly harder to crack. Different branches used different rotor sets and daily key sheets, compartmentalising the cipher system so that a break in one network did not automatically compromise others.

To try a working simulation of the machine, the Enigma machine simulator on Cryptii lets you set rotors, plugboard pairs, and ring settings and type messages in real time — an excellent way to build intuition for how the machine behaved.

The Mechanical Components Explained

Rotors (Scrambler Wheels)

Each rotor was a disc approximately 10 cm in diameter, with 26 electrical contacts on each face — one per letter of the alphabet. The contacts on both faces were connected internally in a scrambled, non-trivial wiring pattern. When a key was pressed, an electrical signal entered the right face of the rightmost rotor, was rerouted through the internal wiring, exited the left face, passed into the next rotor, and so on.

The critical mechanical detail: with each keypress, the rightmost rotor advanced one position (like the units digit of an odometer). After it completed a full 26-position rotation, it triggered the middle rotor to advance one step — and eventually the left rotor. Army and Air Force Enigmas used 3 rotors selected from a set of 5; the naval Enigma M4 chose from a set of 8 rotors. The specific rotors selected, their order in the machine, and their starting positions were all part of the daily key.

The Reflector (Umkehrwalze)

At the left end of the rotor stack sat the reflector, a fixed half-rotor that connected the 26 contacts in 13 reciprocal pairs. The signal arriving from the rotors was sent back through the rotor stack in the opposite direction. This design had one crucial consequence: the machine was self-reciprocal. The same machine settings used for encryption could decrypt the message — the operator simply typed the ciphertext and the plaintext lit up on the lampboard. No separate decryption mode was needed.

The reflector also introduced a famous cryptographic flaw: because it connected contacts in pairs, a letter could never encrypt to itself. If you pressed A, the result was guaranteed to be some other letter. Allied codebreakers exploited this “no self-encryption” rule relentlessly.

The Plugboard (Steckerbrett)

Added to military Enigmas from 1930, the plugboard sat at the front of the machine. Short cables were used to connect pairs of letters — swapping them electrically before the signal entered the rotors and again after it returned. A standard daily setting used 10 letter pairs, leaving 6 letters unplugged. The plugboard alone multiplied the number of possible machine configurations by a factor of roughly 150 trillion, dwarfing even the contribution of the rotors. It was the plugboard, more than any other component, that made Enigma feel impenetrable to its operators.

The Lampboard

Above the keyboard, 26 small bulbs were arranged in QWERTZ order. When a key was pressed and the electrical signal had completed its journey through the plugboard, rotors, reflector, and back, one bulb lit up showing the encrypted output letter. A second operator would read and record the lit letter; the resulting sequence of letters was the ciphertext to be transmitted by radio in Morse code.

How Encryption Worked: Step by Step

Each morning, every Enigma operator on a given network received a key sheetlisting the day's settings: which three rotors to use and in which order, the ring settings (an internal offset for each rotor), the plugboard pairs, and the ground setting (the starting rotor positions). Operators had to destroy used key sheets immediately.

  1. Set the machine. The operator inserted the correct rotors in the specified order, set the ring settings, connected the plugboard cables, and then rotated the rotor windows to the ground setting.
  2. Choose a message key. The operator picked a random three-letter starting position for that specific message (e.g., QKR) and transmitted it at the start of the encrypted message so the recipient could set their rotors to match.
  3. Type the plaintext. Each keypress sent a current through the plugboard, into the rightmost rotor, through all three rotors, into the reflector, back through the three rotors in reverse, out through the plugboard again, and finally lit a lamp. The right rotor advanced one step before each character, ensuring a different scrambling path for every letter typed.
  4. Transmit the ciphertext. A second operator recorded each lit lamp letter and passed the ciphertext string to a radio operator, who transmitted it in Morse code.
  5. Decrypt at the other end.The receiving operator, using an identically configured machine, typed the ciphertext. Because of the reflector's reciprocal design, the plaintext letters lit up — no separate decryption procedure was required.

The guarantee that no letter could encrypt to itself was baked into the hardware by the reflector. This seems like a minor detail, but it was a catastrophic weakness: when Allied analysts found a message that had to contain a known phrase — a weather report always starting “WETTER” (weather), for instance — they could instantly eliminate any rotor position where any letter of that phrase mapped to itself. This process of using known plaintext fragments was called a crib, and it drove the Bombe machines that broke Enigma day after day.

The Staggering Number of Possible Configurations

German cryptographers calculated — correctly — that the number of possible Enigma settings was astronomically large. For the standard three-rotor Army/Air Force machine, accounting for rotor selection from a set of five, rotor order, ring settings, starting positions, and 10 plugboard pairs, the total comes to approximately:

158,962,555,217,826,360,000

≈ 1.59 × 10²⁰ possible configurations

To put that number in perspective: if a person tested one configuration per second without sleeping, it would take roughly five billion years — more than the current age of the universe — to try them all. This is why German military command was confident that Enigma was unbreakable by brute force. They were right about brute force. What they underestimated was the power of mathematics and operational security failures.

Want to experiment with the machine settings yourself? The Boxentriq Enigma machine tool provides an interactive simulator with full rotor and plugboard configuration. Our own Enigma machine emulator is another option for quick experiments.

Breaking the Enigma: From Warsaw to Bletchley Park

The story of Enigma's defeat begins not in Britain but in Poland. In 1932, mathematician Marian Rejewski — working for the Polish Cipher Bureau — made the first mathematical break into Enigma traffic. Working with barely any information, Rejewski used the algebraic structure of the cipher and the German practice of repeating message keys (a procedural weakness, not a hardware one) to deduce the rotor wiring. He was joined by colleagues Jerzy Różycki and Henryk Zygalski; together they built mechanical aids called bomby (bombas) and devised perforated paper sheets to search through possible settings.

In July 1939, with German invasion imminent, Polish intelligence made a decision of historic generosity: they invited British and French intelligence officers to Warsaw and handed over everything — their mathematical findings, reconstructed Enigma machines, and the bomba designs. This gift gave Bletchley Park a multi-year head start.

At Bletchley Park, the British Government Code and Cypher School assembled a remarkable collection of mathematicians, linguists, and chess champions. Alan Turing designed an improved electromechanical Bombe machine that systematically tested rotor positions against cribs, discarding positions where any letter in the crib would encrypt to itself. Gordon Welchmanadded the “diagonal board” improvement that dramatically reduced the time required per run. By 1942, over 200 Bombes were operating around the clock.

The intelligence product — codenamed ULTRA— was so sensitive that the British government went to extraordinary lengths to conceal its existence. Intercepts were sometimes acted on only after a fake reconnaissance mission was staged to provide an alternative explanation for how the British “knew” something. ULTRA intelligence contributed to Allied successes in the North African campaign, the Battle of the Atlantic, and the Normandy landings.

Enigma Rotor Configurations by Service

Different branches of the German military used different rotor sets, giving each network a measure of independence. The table below summarises the principal configurations:

ServiceMachine ModelRotor CountRotors AvailableNotes
Army (Wehrmacht)Enigma I3 active + reflectorI, II, III, IV, V (choose 3)Standard military Enigma from 1930; 10 plugboard pairs
Air Force (Luftwaffe)Enigma I3 active + reflectorI, II, III, IV, V (choose 3)Same hardware as Army; shared key distribution network
Navy (Kriegsmarine)Enigma M33 active + reflectorI–VIII (choose 3)Added rotors VI, VII, VIII; naval procedures more secure
Navy (Kriegsmarine)Enigma M44 active + thin reflectorI–VIII + Beta/GammaIntroduced Feb 1942; fourth rotor temporarily blinded Bletchley
Railway / AbwehrEnigma G3 active, no plugboardVariousCounter-intelligence use; no plugboard made it easier to break

Legacy: Enigma's Impact on Computing and Cryptography

The Enigma story did not end with the war. Alan Turing's work at Bletchley Park — particularly his conceptual framework for the Bombe and his earlier theoretical paper on computable numbers — helped lay the intellectual foundations of modern computer science. The Bombe was not a general-purpose computer, but the problem it solved (systematically searching a structured problem space using mechanised logic) was a direct precursor to computational thinking.

The Enigma story also established several principles that remain central to modern cryptanalysis:

  • Known-plaintext attacks are often more powerful than brute-force searches — the crib technique is still studied today.
  • Operational security matters as much as cipher strength — many Enigma breaks came from German operators reusing keys, choosing predictable message keys (e.g., AAA or their girlfriend's initials), or sending standardised opening phrases.
  • No cipher is unbreakable given sufficient information — complexity is not the same as security.
  • Hardware design decisions have cryptographic consequences — the reflector's reciprocity was a deliberate usability choice that became an exploitable flaw.

Today, approximately 300 Enigma machines survive in museums and private collections worldwide. The Bletchley Park Trust operates the original site as a museum; the rebuilt Bombe replicas there demonstrate exactly how the decryption process worked. The 2014 film The Imitation Game, starring Benedict Cumberbatch as Alan Turing, brought the story to a wide audience, though historians note it compresses and fictionalises several events.

If you are interested in exploring how classical ciphers like Enigma relate to modern cryptographic concepts, our guides on the history of the Caesar cipher and the Vigenère cipher decoder trace the lineage from ancient substitution ciphers to the electromechanical era that Enigma represented.

Enigma History Timeline

YearEvent
1918Arthur Scherbius patents the commercial Enigma A machine in Germany.
1923Commercial Enigma machines go on sale to businesses seeking secure communications.
1926The German Navy (Kriegsmarine) begins adopting a naval variant of Enigma.
1928The German Army (Reichswehr) introduces its own military Enigma with a plugboard.
1930The plugboard (Steckerbrett) is added to Army Enigma, vastly increasing key space.
1932Polish mathematician Marian Rejewski breaks early Enigma traffic using mathematical analysis.
1939Poland shares its Enigma findings with Britain and France weeks before the German invasion.
1940Alan Turing and Gordon Welchman at Bletchley Park improve the electromechanical Bombe.
1941Capture of naval Enigma materials from U-110 gives British codebreakers critical keys.
1942Bletchley Park decrypts thousands of Enigma messages per day; intelligence codenamed ULTRA.
1945World War II ends; the existence of Enigma decryption remains classified for decades.
1974F. W. Winterbotham publishes "The ULTRA Secret," revealing the codebreaking effort to the public.
2014The film "The Imitation Game" dramatises Alan Turing's work at Bletchley Park.

Frequently Asked Questions

What is a Enigma machine?

The Enigma machine is an electro-mechanical rotor cipher device invented by Arthur Scherbius and first sold commercially in 1923. The German military adopted modified versions and used it to encrypt all major communications throughout World War II. It performed polyalphabetic substitution via rotating scrambler wheels, a reflector, and (in military versions) a plugboard.

How many possible configurations did the Enigma have?

The standard three-rotor Army/Air Force Enigma had approximately 158,962,555,217,826,360,000 (roughly 1.59 × 10²⁰) possible starting configurations. This number accounts for rotor selection from a set of five, rotor order, ring settings, starting positions, and the 10 plugboard pairs used in a standard daily key.

Who broke the Enigma machine, and how?

Polish mathematician Marian Rejewski, working with colleagues Jerzy Różycki and Henryk Zygalski, first broke Enigma traffic in 1932 using mathematical analysis of repeated message keys. They shared their findings with Britain in 1939. At Bletchley Park, Alan Turing and Gordon Welchman built the electromechanical Bombe, which exploited the no-self-encryption rule and known-plaintext cribs to identify the daily key settings.

What was ULTRA?

ULTRA was the Allied codename for intelligence derived from decrypted Axis communications — primarily Enigma traffic. By 1942 Bletchley Park was decrypting thousands of messages per day. The existence of ULTRA was kept secret until 1974, which is why Allied commanders sometimes appeared to make uncannily well-informed decisions during the war.

Can I try an Enigma machine simulator online?

Yes. Our Enigma machine emulator lets you configure rotors, plugboard pairs, and ring settings and encrypt or decrypt messages instantly. For a feature-rich alternative, the Cryptii Enigma simulator and the Boxentriq Enigma tool are also excellent.

Explore Further