Feeds

Nazi Enigma encoding machine sells in London for over £80k

You could have got a better price there when it was new

The Power of One Brief: Top reasons to choose HP BladeSystem

A rare German WWII Enigma cipher machine has beat its auction estimate in London, selling for £85,250.

Bonhams auctioneers had put a £40,000 to £60,000 estimate on the pristine 1941 oak model coding device, used by the Nazis to encrypt and decode messages sent between the military and their commanders.

"Enigma machines come up very rarely at auction. This particular example is in working order, completely untouched and unrestored," Laurence Fisher, specialist head of mechanical music, technical apparatus and scientific instruments, said before the auction.

"Many machines were picked up by the Allies as souvenirs during the final stages of the second World War and as such, in later years, tended to be 'mixed and matched', where rotors, outer cases and head blocks were replaced with another machines' parts.

"This one has all elements bearing the same serial number, making this totally complete and original throughout."

The version of the machine sold was a model used between 1938 and 1944, with three-rotors to create 17,576 possible combinations for each letter in a message. The code was unbreakable until code-breakers at Bletchley Park automated the decryption with the Turing Bombe machine. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.