Feeds

Crack a puzzle, win a WWII Enigma machine

Come and have a go if you think you're ingenious enough

Beginner's guide to SSL certificates

A code breaking riddle that offers the chance to win a genuine World War II Enigma machine remains unsolved more than a year after the challenge was first posed.

The chance to own a piece of crypto history is on offer through a code-breaking competition associated with the book Can you crack the Enigma code? by author Richard Belfield.

As part of the book, Belfield worked with a team of boffins from the Information Security Group at Royal Holloway, University of London, to create a challenging collection of interlinked puzzles. These "Enigma puzzles" have been designed in such a way that ingenuity and lateral thinking will be as important as having access to a computer in solving them.

The formidable challenge has withstood the best efforts of numerous would-be code breakers for more than a year since the book was launched in September 2006. Kenny Paterson, one of the team of cryptographers who devised the puzzle, wrote to alert us about the ongoing competition.

Long-term readers may recall our own codebreaker competitions. Given the interest these spurred we're sure many of you will be keen to get stuck in. Getting involved in the competition may lead to hours of frustration but, as Paterson notes, is perhaps better than bidding for an Enigma machine on eBay.

"The competition has been running for over a year and, so far, the puzzles have defied any attempts to break them all. There's been plenty of discussion on the online forum, but so far it seems that only the first three of the six puzzles have been cracked," Paterson writes.

Time to sharpen your pencils and get to work, perhaps?

The competition can be found here

Beginner's guide to SSL certificates

More from The Register

next story
Apple CEO Tim Cook: My well-known gayness is 'a gift from GOD'
'I have benefited from the sacrifice of others'
MEN: For pity's sake SLEEP with LOTS of WOMEN - and avoid Prostate Cancer
And, um, don't sleep with other men. If that's what worries you
Jim Beam me up, Scotty! WHISKY from SPAAACE returns to Earth
They're insured for $1m, before you thirsty folks make plans
Now: The REAL APPLE NEWS you need to know
OMG! Gravity's totes amazeballs. Calm down, George Clooney, not your film
Boffins who stare at goats: I do believe they’re SHRINKING
Alpine chamois being squashed by global warming
Let's make an app that POSTS your POO to APPLE HQ
Plus: It's OPEN WARFARE in the Linux greybeard world
Adorkable overshare of words like photobomb in this year's dictionaries
And hipsters are finally defined as self-loathing. Sort of
Not a loyal follower of @BritishMonarchy? You missed The QUEEN*'s first Tweet
Her Maj opens 'Information Age' at the Science Museum
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.