WWII · 1937 Never confirmed broken; far stronger than Enigma in service

Typex

Britain's improved Enigma — five rotors, no plugboard, used at Bletchley to read its own intercepts.

OriginRAF Squadron Leader O.G.W. Lywood and team, derived from the commercial Enigma G
YearService 1937–1956
Key Type5 rotors (3 stepping + 2 stator) chosen from a set of 10 or 14
Broken ByNever confirmed broken — German cryptanalysts at OKW/Chi reportedly judged it not worth attacking
Modern LessonRemoving a weakness (Enigma's plugboard quirks) by adding rotors trades operator burden for cryptanalytic strength

Why This Matters

The British Government Code & Cypher School bought a commercial Enigma G in 1934, took it apart, and decided they could do better. The result was Typex: five rotors instead of three, no plugboard (the operational headache that bedeviled German Enigma users), and a typing-and-printing mechanism instead of Enigma's lampboard. Typex handled the bulk of British and Commonwealth strategic traffic from 1937 through the mid-1950s. As far as the postwar archives reveal, the Germans never broke it in service — and Bletchley itself used Typex machines, modified to emulate Enigma, as part of the Bombe-driven decryption pipeline.

📜Historical Context

Typex Mark II entered service with the RAF in 1937. By 1939 the Army and Royal Navy had adopted variants (Mark VI, Mark VIII). Production reached around 12,000 units — far more than SIGABA. Bletchley Park's TUNNY/Newmanry teams modified Typex machines to function as Enigma simulators during the closing stages of decryption, so Britain's own Enigma-attacking pipeline depended on its own Enigma-derived design. Captured German cryptanalytic records (TICOM 1945) suggest the OKW/Chi studied Typex briefly, decided the analytical effort exceeded the likely return, and never mounted a serious break attempt — a stark contrast to the German confidence in Enigma's invulnerability.

⚙️How It Works

Five rotors in series. The first three step (with a notch system inherited from Enigma but with multiple notches per rotor, so the stepping is faster and less predictable than Enigma's single-notch design). The last two rotors are stators — they can be set but do not advance. There is no plugboard. Reflector is fixed. The simulation here uses the Enigma core extended with two additional substitution stages and a multi-notch stepping schedule.

💀Why It Has Resisted
Why It Held
Complexity: Beyond OKW/Chi's 1940s analytical reach

Two extra rotors square the search space relative to three-rotor Enigma. The multi-notch stepping destroys the regular ‘ring-setting at fixed positions' that made the Bombe's menu-elimination tractable. No plugboard means no plugboard-induced biases — paradoxically the plugboard, designed to make Enigma stronger, was one of the things that made it breakable, because it constrained possible configurations in ways the Bombe could test. German analysts in 1942–1944 reportedly concluded a Typex break would require resources comparable to Britain's Bombe programme — and Germany never built that infrastructure.

🔬What It Teaches Modern Cryptography
Concept from TypexModern Evolution
Multi-notch steppingSame insight that Hagelin built into the M-209 lugs
Fewer features can mean more securityRemoving the plugboard removed an exploitable structural constraint
Asymmetric resource investmentThe Bombe required 200+ machines and 10,000 staff; Germany never matched it
Break This Cipher

Ciphertext: RZEBVVKJUAVRKTBFBT

Hint: use the simplest possible five-rotor start setting in the demo.

Plaintext: BRITISH SIGNAL READY
Rotor Start: AAAAA
Quick Facts
EraWWII · 1937
SecurityNever confirmed broken; far stronger than Enigma in service
OriginRAF Squadron Leader O.G.W. Lywood and team, derived from the commercial Enigma G
YearService 1937–1956
Key Type5 rotors (3 stepping + 2 stator) chosen from a set of 10 or 14
Broken ByNever confirmed broken — German cryptanalysts at OKW/Chi reportedly judged it not worth attacking
Modern LessonRemoving a weakness (Enigma's plugboard quirks) by adding rotors trades operator burden for cryptanalytic strength
← Previous SIGABA (ECM Mark II)