Hall of Codebreakers
Ten moments when human ingenuity broke what mathematics could not
"A cipher is only as strong as the mind trying to break it."
Person: Abu Yusuf Yaqub ibn Ishaq al-Kindi, Baghdad
Technique: Frequency analysis
His nine-page manuscript is the founding document of cryptanalysis. Every substitution cipher made before 850 AD and for centuries after was rendered permanently insecure. He did this with nothing but a count of letters and an understanding that language has statistical structure.
Al-Kindi's insight was simple but devastating: in any natural language, some letters appear far more often than others. In Arabic, the most common letter is alif. In English, it's E. Map the most frequent ciphertext symbol to the most frequent plaintext letter, and the cipher begins to unravel.
Person: Thomas Phelippes, agent of Sir Francis Walsingham
Technique: Frequency analysis + contextual knowledge
Mary's encrypted correspondence with Babington Plot conspirators was intercepted and decoded. She was executed February 8, 1587. The break is one of history's clearest examples of cryptanalysis determining a human life.
People: Room 40, British Naval Intelligence
Technique: Code book reconstruction from partial recoveries
Germany secretly offered Mexico an alliance against the United States. Britain decoded it, waited strategically, then shared it with Washington. The telegram helped bring America into WWI. The war ended 20 months later.
People: Marian Rejewski, Jerzy Różycki, Henryk Zygalski
Technique: Permutation group mathematics + known message indicators
Polish mathematicians used pure mathematics — specifically permutation group theory — to reconstruct Enigma's rotor wiring without ever seeing the machine. They built the first Enigma-breaking machines. In July 1939, six weeks before Germany invaded Poland, they handed everything to Britain and France. Without Warsaw, there is no Bletchley Park.
Rejewski's breakthrough came from analyzing the message indicator system — the first six characters of each Enigma message. By collecting enough indicators, he found patterns that revealed the mathematical structure of the rotors. Pure mathematics, applied to an engineering problem, by a 27-year-old mathematician.
People: Alan Turing, Gordon Welchman, and 10,000 Bletchley Park staff
Technique: Crib-based electromechanical search
The Bombe tested thousands of Enigma configurations per minute by exploiting known plaintext cribs — stereotyped phrases like WETTER, KEINE BESONDEREN EREIGNISSE, HEIL HITLER. The intelligence product, codenamed Ultra, remained classified until 1974. Historians estimate it shortened WWII by 2–4 years.
People: Bill Tutte (analysis), Tommy Flowers (engineer)
Technique: Statistical wheel-pattern analysis
Tutte deduced the entire Lorenz machine structure without ever seeing it — working only from intercepted traffic. Tommy Flowers built Colossus, the world's first programmable electronic computer, to automate the attack. The need to break a cipher built computing.
Person: William F. Friedman, US Army Signal Intelligence
Technique: Statistical analysis + machine reconstruction
Friedman's team reconstructed the Purple machine without ever possessing one. The US could read Japanese diplomatic traffic for years before Pearl Harbor. The intelligence existed. The failure was in how it was shared — not cryptanalytic but bureaucratic.
The lesson: Breaking the cipher was not enough. The intelligence from Purple (codenamed MAGIC) warned of Japanese intentions, but inter-service rivalry, poor distribution, and bureaucratic inertia prevented the warnings from reaching Pearl Harbor's commanders in time. The cryptanalysis succeeded. The intelligence system failed.
People: 420 Navajo Marines, US Marine Corps
Cipher: Navajo language as operational field code
This is the only story in this hall about a code that was NOT broken. It belongs here because the story of wartime cryptography is incomplete without it. 420 Navajo Marines transmitted battlefield orders in a language that Japanese linguists could not touch. The code was declassified in 1968 and the Code Talkers received the Congressional Gold Medal in 2001.
People: Meredith Gardner and the US Army Signal Intelligence Service
Technique: Depth attack on reused pad pages
The OTP is mathematically unbreakable. Soviet signals officers reused pad pages under WWII supply pressure. XOR-ing two messages with the same key eliminates the key: C1 ⊕ C2 = P1 ⊕ P2. VENONA decoded thousands of messages and exposed Julius Rosenberg, Klaus Fuchs, Donald Maclean, and others. The project remained classified until 1995.
The math never failed — the people did. The one-time pad's mathematical proof of perfect secrecy remains unbroken. What broke was operational discipline. Under the pressure of wartime logistics, Soviet cipher clerks reused key pages. That single human decision exposed an entire intelligence network and changed the course of the Cold War.
People: David Oranchak, Sam Blake, Jarl Van Eycke
Technique: Computational search + n-gram statistical scoring
51 years unsolved. Cracked during COVID lockdown by a three-person remote team using modern computing and classical cryptanalytic intuition. The key insight: the Z-340 used a diagonal transposition before homophonic substitution — a reading order nobody had tried. Once the transposition was identified, the substitution fell to standard techniques. The killer was not identified.