The Enigma Code


The work of breaking the German Enigma code has been made more famous recently through the "Imitation Game" screenplay. Hollywood chose to focus on the life and work of Alan Turing, but how did the code actually work?  This article will examine how Enigma messages were encrypted and decrypted.


The Enigma machine was originally invented and developed by an engineer named Arthur Schierbus.1  Initially used by Schierbus’ corporation “Chiffriermaschinen Aktiengesellschaft”, it attracted the interest of the German military and was introduced first to the Navy during the 1920s.2 By 1933 the growing WehrMacht had implemented Enigma encryption techniques in all branches. The machine was gradually improved and refined as the escalation of armed conflicts between Germany and its European neighbours led to an increasing need of sending encrypted messages. An estimate gives a number of 100,000 machines in use at the outbreak of WWII in 1939.3

The Machine

A model of the machine can be found in Figure 1

Figure 1. An Enigma machine4

The input is given by the manual keyboard on the top. The letter goes through the plugboard, through three rotors forward and then through the same rotors in the reverse order, before the output is inidicated by a red diode lighting up on the front. This circuitry is shown in even more detail in Figure 2.

Figure 2. Enigma Machine circuitry5

The rotors are alphabetic wheels, where each letter is converted to another, as shown in Figure 3.

Figure 3. An Enigma rotor5

The output for a given letter input depends on how the rotor is set up, and the code for this would change every day based on codes sent out to the radio operators. Additionally, the rotor changes its setting for every letter in the message.  In all, the letter is converted 7 times, twice for each reflector and by the reflector.

This gives a fairly sizeable number of output combinations, but not quite enough to satisfy the needs of the German army. They added a plugboard on the front, as indicated in Figure 4.


Figure 4. Enigma machine plugboard6

The plugboard makes a further conversion, where certain letters are converted to others. Up to 13 pairs can be used, and the normal mode was to set it up with 10 connectors; so in all, the Germans could alter each of:

  • The ordering of the rotors
  • The reflector and ring settings
  • The positions in each rotor
  • The ten cables on the plugboard 

This yields a number of 1023 possible outputs for a letter.5 This would certainly explain why the Germans felt that their code as “unbreakable”.


The encryption of a message is, as mentioned, highly dependent on the setup of the machine. The code for specifying the setup could look like this:7



This means:

  • Use left rotor 2 (out of five)
  • Use middle rotor 1
  • Use right rotor 5
  • Set the ring at AAA
  • Set the rotors at F, R and A, respectively
  • Plug A to B, I to R, U to X and K to P”

This converts



gvksd zshpd ackcq pgygm oftb


The simulation provided by Daniel Palloks at the Humboldt University of Berlin, Department of Physics.8

Apart from the materials cited below, on a level appropriate for a student seeking college homework help, an interesting and relevant online tutorial for computing history is offered by MIT's OpenCourseWare and is titled The History of Computing.

To fulfill our tutoring mission of online education, our college homework help and online tutoring centers are standing by 24/7, ready to assist college students who need homework help with all aspects of the history of computing. Our computer science tutors can help with all your projects, large or small, and we challenge you to find better online history of computing tutoring anywhere.


[1] – Enigma Machine - Wikipedia.

[2] - BBC history - BBC

[3] – World War II DataBase.

[4] Wilcox, J.: Solving the Enigma. History of the Cryptanalytic Bombe. Center for Cryptologic History, National Security Agency, 2006.

[5] - Crypto Museum, Netherlands.

[6] - National Education Network.

[7] Oberzalek, M.: Enigma – a very famous story of cryptology.

[8] - Humboldt University, Berlin.


Get College Homework Help.

Are you sure you don't want to upload any files?

Fast tutor response requires as much info as possible.

Upload a file
Continue without uploading

We couldn't find that subject.
Please select the best match from the list below.
For faster response, you may skip assigning directly to a tutor to receive the first tutor available.
That tutor may not be available for several hours. Please try another tutor if you're in a hurry.

We'll send you an email right away. If it's not in your inbox, check your spam folder.

  • 1
  • 2
  • 3
Get help from a qualified tutor

Latest News

Read All News
April 20, 2021

New subject available! Quantitative Methods

Hey students! is proud to annouce that we've added another topic to our Business subject area. You can now receive online tutoring for Quantitative Methods. You can learn more about Quantitative Methods at   -24HourAnswers team
April 12, 2021

$500 College Scholarship Deadline

Just a reminder to our students and website visitors that the deadline for the Spring semester scholarship is May 1st. To learn more about applying, please visit our blog.  
Live Chats