Exhibit 28 of 37 WWII · Germany · 1940 Broken

Lorenz Cipher

Hitler's strategic cipher — broken by a mistake, and it built the world's first computer

InventorLorenz AG · German High Command
Year1940
Key Type12-wheel teleprinter cipher (Vernam-based)
Broken ByBill Tutte · Known plaintext · Colossus computer (1943)
Modern LessonComputational cryptanalysis → birth of modern computing
📜Historical Context

While Enigma protected German field communications, the Lorenz SZ40/42 protected Hitler's strategic communications to his senior commanders. Where Enigma was a hand-operated cipher machine, Lorenz was a fully automatic teleprinter attachment — messages fed in on paper tape, encrypted output punched automatically.

On August 30, 1941, a German operator sent a 4,000-character message, received a request to resend, and sent it again — with the same settings but slightly different plaintext (abbreviating some words). This catastrophic procedural error gave Bletchley Park cryptanalyst Bill Tutte enough to reconstruct the entire Lorenz cipher structure without ever seeing the machine. Tommy Flowers then built Colossus to automate the attack.

⚙️How It Works
Lorenz SZ42 used 12 cipher wheels:
5 Chi (χ) wheels: key stream
5 Psi (ψ) wheels: irregular key
2 Motor wheels: control Psi movement

Encryption: XOR operations on 5-bit
teletype characters (Baudot code)

C = P XOR χ-stream XOR ψ-stream

Wheel pin counts: 41,31,29,26,23,
                  43,47,51,53,59,
                  61,37

Total period: LCM of all wheels
= astronomically large — never repeats in practice
χ Chi wheels (5) 41 31 29 26 23 Motor (2) 61 37 ψ Psi wheels (5) 43 47 51 controls Plaintext χ-stream ψ-stream = Cipher Numbers = pin counts per wheel · Motor wheels control ψ stepping
Lorenz SZ42: 12 wheels generating two keystreams XORed with 5-bit Baudot character codes
💀How It Was Broken
Known Plaintext + Depth Attack (1941)
Complexity: Extreme · Required Colossus

The operator's mistake (same settings, similar plaintext) created a "depth" — two messages XORed together give P1 XOR P2 (the keys cancel). From this, Tutte deduced the complete wheel structure without seeing the machine — a cryptanalytic feat considered one of the greatest intellectual achievements of WWII. Colossus (1943) automated the wheel-setting problem, running at 5,000 characters per second.

🔬What It Teaches Modern Cryptography
Concept from Lorenz CipherModern Evolution
Wheel-based keystream generatorLinear Feedback Shift Registers (LFSRs): the direct descendant of rotor-based keystreams
XOR teleprinter encryptionVernam cipher: XOR is the foundation of all stream cipher design
Breaking it built ColossusThe needs of cryptanalysis drove the invention of programmable computing
Depth attack on reused settingsNonce reuse attacks: identical to the Lorenz depth attack, still relevant today
📝Worked Example
Plaintext character: H
Baudot (ITA2) code:  10100  (5-bit)

Wheel outputs at current position:
  χ wheels (5 bits): 0 1 1 0 1
  ψ wheels (5 bits): 1 1 0 1 0

Step 1 — XOR with χ stream:
  Plaintext:  1 0 1 0 0
  χ stream:   0 1 1 0 1
  Result:     1 1 0 0 1

Step 2 — XOR with ψ stream:
  Intermediate: 1 1 0 0 1
  ψ stream:     1 1 0 1 0
  Ciphertext:   0 0 0 1 1  = Baudot "D"

After each character:
  • All 5 χ wheels advance one position
  • Motor wheels decide whether ψ wheels step
    (irregular motion = extra security)

With all 12 wheels: period before repetition
≈ 1.6 × 10¹⁹ characters — effectively infinite
🏛️Related Exhibits
  • Enigma Machine — The field-level rotor cipher Lorenz outranked
  • One-Time Pad — Lorenz used XOR like a OTP but with a periodic key
  • VIC Cipher — Cold War hand cipher that resisted machine analysis
Quick Facts
Exhibit28 of 37
EraWWII · Germany · 1940
SecurityBroken
InventorLorenz AG · German High Command
Year1940
Key Type12-wheel teleprinter cipher (Vernam-based)
Broken ByBill Tutte · Known plaintext · Colossus computer (1943)
← Previous Enigma Machine