Enigma machine and List of mobile network operators: Difference between pages

(Difference between pages)
Content deleted Content added
DjMD (talk | contribs)
m =Ultra= Fixed Operation_Sea_Lion to point to operation not disambiguation
 
 
Line 1:
<table align=right width="30%" border=0 style="margin-left:1em; margin-bottom:1em;"><tr align="center"><td>[[image:Enigma.jpeg]]</td></tr>
<tr align="justify"><td align="center">''The Enigma Machine''</td></tr>
<tr align="justify"><td><small>An electro-mechanical rotor cypher machine; this version shown is probably military, but is similar to the Enigma-D commercial version</small></td></tr></table>
 
This is a '''list of [[mobile phone]] [[mobile phone network|network]] operating companies'''.
The '''Enigma''' was an electro-mechanical [[rotor cypher machine]] used for both [[encryption]] and [[decryption]], widely used in various forms in Europe from the early 1920s on. It is most famous for having been adopted by most [[Germany|German]] military forces from about 1930 on. Ease of use and the supposedly unbreakable cypher were the main reasons for its widespread use. The cypher was in fact broken, and the reading of information in the messages it didn't protect is sometimes credited with ending [[World War II]] at least a year earlier than it would have otherwise.
 
{{TOCright}}
The counterpart British encryption machine, [[Typex]], and several American ones, e.g. the [[SIGABA]] (or M-134-C in Army use), were similar in principle to Enigma, but far more secure. The first modern rotor cypher machine, by [[Edward Hebern]], was considerably less secure, a fact noted by [[William F. Friedman]] when it was offered to the US Government.
== World ==
These are the world's '''largest mobile network operators''', by number of subscribers (and by proportionate subscribers, if the company has holdings in other operators). The largest in the world by turnover is [[Vodafone]].
 
{|{{prettytable}} width=435
== History ==
|-
! Rank !! Company !! Technology !! Subscribers<br><small>(in [[million]]s)</small> !! Subscribers<br><small>(including minority stakes)</small>
|-
|align=right| 1 || [[China Mobile]] ([[China]]) || [[GSM]] || 231.01 ||
|-
|align=right| 2 || [[Vodafone]] ([[United Kingdom]]) || [[UMTS]], [[GSM]] || 165.01 || 450.90
|-
|align=right| 3 || [[China Unicom]] ([[China]]) || [[GSM]], [[CDMA]] || 122.99 ||
|-
|align=right| 4 || [[T-Mobile]] ([[Germany]]) || [[UMTS]], [[GSM]] || 80.88 || 120.00
|-
|align=right| 5 || [[América Móvil]] ([[Mexico]]) || [[GSM]], [[TDMA]] || 73.76 ||
|-
|align=right| 6 || [[Telefónica|Telefónica Móviles]] ([[Spain]]) || [[UMTS]], [[GSM]], [[CDMA]] || 69.94 || 85.27
|-
|align=right| 7 || [[Orange SA|Orange]] ([[France]]) || [[UMTS]], [[GSM]] || 66.74 || 69.55
|-
|align=right| 8 || [[Cingular Wireless|Cingular]] ([[United States]]) || [[UMTS]], [[GSM]], [[TDMA]] || 54.00 ||
|-
|align=right| 9 || [[NTT DoCoMo]] ([[Japan]]) || [[Personal Digital Cellular|PDC]], [[FOMA]] || 50.82 ||
|-
|align=right| 10 || [[Mobile TeleSystems|MTS]] ([[Russia]]) || [[GSM]] || 48.33 ||
|}
 
==Americas==
Enigma was developed by [[Arthur Scherbius]] in various versions dating back to [[1919]]. He set up a [[Berlin]] company to produce the machine, and the first commercial version (Enigma-A) was offered for sale in 1923. Three more commercial versions followed, and the Enigma-D became the most important when several copies were purchased by the [[Reichsmarine]] in [[1926]]. The basic design was then picked up by the Army in 1929, and thereafter by practically every German military organization and by many parts of the [[Nazi]] hierarchy. In the German Navy, it was called the "M" machine.
===Argentina=== (as of [[June]] [[2005]])
The country had in [[August]] [[2005]] 18,758,335 subscribers in total.
{|{{prettytable}} width=435
|-
! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
| [[movistar]] || [[GSM]] || 6.73 || [[Telefónica|Telefónica Móviles]]
|-
| [[CTI Movil]] || [[GSM]] || 4.92 || [[América Móvil]]
|-
| [[Personal (mobile phone service)|Personal]] || [[GSM]] || 4.81 || [[Telecom Argentina]]
|-
| [[NEXTEL]] || [[iDEN]] || 0.43 || [[Sprint Nextel]]
|}
 
===Brazil=== (as of [[August]] [[2005]])
Versions of Enigma were used for practically all German (and much other European Axis) radio, and often telegraph, communications throughout the war, even weather reports were encrypted with an Enigma machine. Both the Spanish (during the [[Spanish Civil War | Civil War]]) and Italians (during World War II) are said to have used the commercial machine, unchanged, for military communications. This was unwise, for the British (and one presumes, others) had succeeded in breaking the plain commercial version or its equivalents, and this contributed to the British victory over the Italian fleet at Matapan.
The country had 78,947,332 subscribers in total, or a 42.85% penetration rate.
{|{{prettytable}} width=435
|-
! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|colspan=4 align=center|'''National operators'''
|-
| [[Vivo (mobile phone network)|Vivo]] [http://www.vivo.com.br/]|| [[CDMA]], [[TDMA]] || 28.79 || [[Telefónica|Telefónica Móviles]] and [[Portugal Telecom]]
|-
| [[Telecom Italia Mobile|TIM]] [http://www.tim.com.br/]|| [[GSM]], [[TDMA]] || 18.01 || [[Telecom Italia]]
|-
| [[Claro (mobile phone network)|Claro]] [http://www.claro.com.br/]|| [[GSM]], [[TDMA]] || 17.12 ||[[América Móvil]]
|-
|colspan=4 align=center|'''Regional operators'''
|-
| [[Oi (mobile phone network)|Oi]] [http://www.oi.com.br/] || [[GSM]] || 8.72 || [[Telemar]]
|-
| [[Telemig Celular]]/[[Amazônia Celular]] [http://www.telemigcelular.com.br/]|| [[GSM]], [[TDMA]] || 4.23 || [[Telpart]]
|-
| [[Brasil Telecom GSM]] [http://www.brasiltelecom.com.br/]|| [[GSM]] || 1.64 || [[Brasil Telecom]]
|-
| [[CTBC]] [http://www.ctbc.com.br/]|| [[GSM]], [[TDMA]] || 0.35 ||
|-
| [[Sercomtel Celular]] [http://www.sercomtelcelular.com.br/]|| [[GSM]], [[TDMA]] || 0.09 || [[Londrina]] city ([[Paraná]])[[State-owned]] [[Sercomtel]]
|-
|colspan=4 align=center|'''Specialized Mobile Radio'''
|-
| [[NEXTEL]] [http://www.nextel.com.br/]|| [[iDEN]] || || [[Sprint Nextel]]
|}
 
===Canada=== (as of [[June]] [[2005]])
== Operation ==
{{main|List of Canadian mobile phone companies}}
The country had 15,583,039 subscribers in total.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Rogers Wireless]] || [[GSM]] || 5.71 || [[Rogers Communications]]
|-
|align=right| 2 || [[Bell Mobility]] || [[CDMA]] || 4.44 || [[Bell Canada]]
|-
|align=right| 3 || [[TELUS Mobility]] || [[CDMA]] || 4.15 || [[Telus]]
|-
|align=right| 4 || [[Microcell Telecommunications|Fido]] || [[GSM]] || || [[Rogers Wireless]]
|-
|align=right| 5 || [[Aliant Mobility]] || [[CDMA]] ||0.67 || [[Aliant]]
|-
|align=right| 6 || [[SaskTel Mobility]] || [[CDMA]] || 0.32 || [[SaskTel]]
|-
|align=right| 7 || [[MTS Mobility]] || [[CDMA]] || 0.30 || [[Manitoba Telecom Services|MTS]]
|-
|align=right| 8 || [[Virgin Mobile]] || [[CDMA]] || || [[Virgin Group]]
|}
 
===Chile===
The Enigma machine was electro-mechanical, meaning it used a combination of electrical and mechanical parts. The mechanism consisted primarily of a [[typewriter]]-style keyboard, which operated electrical switches as well as a gearing mechanism.
The country had in [[June]] [[2005]] 10,572,000 subscribers in total.
{|{{prettytable}} width=435
|-
! Operator !! Technology !! Ownership
|-
| [[movistar]] || [[GSM]], [[CDMA]], [[TDMA]] || [[Telefónica Móviles]]
|-
| [[Entel PCS]] || [[GSM]] || [[Hurtado Vicuña]]
|-
| [[Smartcom]] || [[CDMA]] || [[América Móvil]]
|}
 
===Colombia=== (as of [[June]] [[2005]])
The electrical portion consisted of a battery attached through the keys to lamps. In general terms, when a key was held down on the keyboard, one of the lamps would be lit up by the battery. In the picture to the right you can see the typewriter keys at the front of the machine, and the lights are the small (barely visible) circles "above" the keyboard in the middle of the machine.
The country had 15,581,389 subscribers in total.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Comcel]] || [[GSM]], [[TDMA]] || 9.17 || [[América Móvil]]
|-
|align=right| 2 || [[movistar]] || [[GSM]], [[CDMA]], [[TDMA]] || 4.76 || [[Telefónica|Telefónica Móviles]]
|-
|align=right| 3 || [[Ola]] || [[GSM]] || 1.65 || [[Empresas Públicas de Medellín]] and [[Empresa de Teléfonos de Bogotá]]
|}
 
===Ecuador=== (as of [[August]] [[2005]])
The heart of the basic machine was mechanical, consisting of several connected ''rotors''. Enigma rotors in most versions consisted of flat disks with 26 contacts on each side, arranged in a circular manner around the outer faces of the disk. Every contact on one side of each disk is wired to a different contact on the other side. For instance, in a particular rotor the 1st contact on one side of the rotor might be wired to the 14th contact on the other side, the 2nd one the first side to the 22nd on the other, and so forth. Each rotor in the set supplied with an Enigma was wired differently than the others, and the German military/party models used different rotor wirings than did the commercial models.
The country had 5,221,535 subscribers in total.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Porta]] || [[GSM]], [[TDMA]] || 3.38 || [[América Móvil]]
|-
|align=right| 2 || [[movistar]] || [[CDMA]], [[TDMA]] || 1.65 || [[Telefónica|Telefónica Móviles]]
|-
|align=right| 3 || [[Alegro PCS]] || [[CDMA]] || 0.18 || [[TELECSA]]
|}
 
===Mexico=== (as of [[June]] [[2005]])
Inside the machine were three slots (in most variants) into which the rotors could be placed. The rotors were "stacked" in the slots in such a way that the contacts on the "output" side of one rotor were in contact with the "input" contacts on the next. The third rotor in most versions was connected to a ''reflector'' (unique to the Enigma family amongst the various rotor machines designed in the period) which was hard wired to feed outputs of the third rotor back into different contacts of the third rotor, thence back to the first rotor, but by a different route. In the picture you can see the three stacked rotors at the very top of the machine, with teeth protruding from the surface that allows the rotors to be turned by hand.
The country had 42,530,100 subscribers in total, or a 40.00% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Telcel]] || [[GSM]], [[TDMA]] || 32.29 || [[América Móvil]]
|-
|align=right| 2 || [[movistar]] || [[GSM]] || 5.85 || [[Telefónica|Telefónica Móviles]]
|-
|align=right| 3 || [[Iusacell]] || [[CDMA]] || 1.62 || [[Grupo Salinas]]
|-
|align=right| 4 || [[Unefon]] || [[CDMA]] || 1.44 || [[Moisés Saba]] and [[TV Azteca]]
|}
 
===Peru=== (as of [[June]] [[2005]])
When a key was pressed on the keyboard, the current from the battery flowing to that letter, say A, would be fed into the A position of the first rotor. There it would travel through the rotor's internal wiring to, say, the J position on the other side. It would then go into the next rotor, perhaps turned such that the first rotor's J was lined up with the second's X. From there it would travel to the other side of the second rotor, and so on. By the time the signal had travelled through the rotors and back, some other letter than A would light in the lamp array &ndash; thus substituting one letter for another, the key to all substitution cypher systems.
The country had 4,655,214 subscribers in total, or a 16.62% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[movistar]] || [[CDMA]], [[TDMA]] || 2.99 || [[Telefónica|Telefónica Móviles]]
|-
|align=right| 2 || [[TIM]] || [[GSM]] || 1.46 || [[América Móvil]]
|-
|align=right| 3 || [[NEXTEL]] || [[iDEN]] || 0.21 || [[Sprint Nextel]]
|}
 
===United States=== (as of [[December]] [[2004]])
Because the rotors changed position (rather like an automobile odometer) with every key press, A might be Q this time, but the next A would be something different, perhaps T. After 26 letters were pressed, a [[cam]] on the rotor spun the rotor in the next slot. The substitution alphabet thus changed with every plaintext letter.
The country had 182,140,862 subscribers in total.
These are the largest mobile phone companies in the [[United States]], by number of subscribers.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Cingular]] || [[UMTS]], [[GSM]], [[TDMA]] || 54.0 || [[SBC Communications|SBC]] (60%) and [[BellSouth]] (40%)
|-
|align=right| 2 || [[Verizon Wireless]] || [[CDMA]] || 47.4 || [[Verizon Communications]] (55%) and [[Vodafone]] (45%)
|-
|align=right| 3 || [[Sprint]] || [[CDMA]], [[iDEN]] || 44.4 || [[Sprint Nextel Corporation]]
|-
|align=right| 4 || [[T-Mobile]] || [[GSM]] || 19.2 || [[Deutsche Telekom]]
|-
|align=right| 5 || [[ALLTEL]] || [[GSM]], [[CDMA]], [[TDMA]] || 10.6 || [[ALLTEL|ALLTEL Corporation]]
|-
|align=right| 6 || [[U.S. Cellular]] || [[CDMA]], [[TDMA]] || 5.2 || [[U.S. Cellular|United States Cellular Corp.]]
|-
|align=right| 7 || [[TracFone]] || [[GSM]], [[CDMA]], [[TDMA]] || 4.9 || [[América Móvil]]
|-
|align=right| 8 || [[Virgin Mobile]] ([[Mobile Virtual Network Operator|MVNO]] using Sprint) || [[CDMA]] || 3.0 || [[Virgin Group]]
|-
|align=right| 9 || [[Dobson Communications]] || [[GSM]], [[TDMA]] || 1.6 ||
|-
|align=right| 10 || [[MetroPCS]] || [[CDMA]] || 1.5 ||
|-
|align=right| 11 || [[Cricket Communications]] || [[CDMA]] || 1.49 ||
|}
 
''In [[North America]], IS-2000 is commonly known as [[Code division multiple access|CDMA]]. IS-136 is known as [[Time division multiple access|TDMA]]. However, CDMA and TDMA are general terms that can refer to several different technologies.''
Better yet, due to the "random" wiring of each rotor, the exact sequence of these substitution alphabets varied depending on the initial position of the rotors, their installed order, and which rotors were installed in the machine. These settings were referred to as the ''initial settings'', and were given out in books once a month (to start with -- they became more frequent as time went on).
 
===Venezuela===
The most common versions of the machine were [[involution|symmetrical]] in the sense that [[decipherment]] works in the same way as [[encryption|encypherment]]: type in the encyphered text and the sequence of lit lamps will correspond to the plain text. However, this works only if the decyphering machine has the same configuration as had the encrypting machine (rotor sequence, wiring, alphabet ring settings, and initial positions); these changed regularly (at first monthly, then weekly, then daily and even more often nearer the end of the War on some networks) and were specified in key schedules distributed to Enigma users.
The country had in [[June]] [[2005]] 9,830,348 subscribers in total, or a 37.10% penetration rate.
{|{{prettytable}} width=435
|-
! Operator !! Technology !! Subscribers !! Ownership
|-
|colspan=4 align=center|'''National operators'''
|-
| [[movistar]] || [[CDMA]] || 5.2 || [[Telefónica|Telefónica Móviles]]
|-
| [[Movilnet]] || [[CDMA]], [[TDMA]] || 3.4 || [[Cantv]] and [[Verizon Communications|Verizon]]
|-
|colspan=4 align=center|'''Regional operators'''
|-
| [[Digitel TIM]] || [[GSM]] || 1.2 || [[Telecom Italia]]
|-
| [[Digicel]] || [[GSM]] ||
|-
| [[Infonet]] || [[GSM]] ||
|}
 
==Asia Pacific==
== Basic Cryptanalysis ==
===Australia=== (as of [[June]] [[2005]])
The country had 18,094,000 subscribers in total.
{|{{prettytable}} width=435
|-
!width=120| Operator !!width=90| Technology !!width=90| Subscribers!!width=150| Ownership
|-
| [[Telstra Mobile]] || [[GSM]], [[CDMA]] || 8.23 || [[Telstra]] (~50% [[State-owned]])
|-
|| [[Optus Mobile]] || [[GSM]], [[CDMA]] || 6.03 || [[Singapore Telecommunications]]
|-
| [[Vodafone]] || [[GSM]] || 2.89 || [[Vodafone]]
|-
| [[3 (telecommunications)|3]] || [[UMTS]] || 0.53 || [[Hutchison Whampoa]]
|-
|| [[Orange Australia]] || [[CDMA]] || 0.42 || [[Hutchison Whampoa]]
|}
 
===Bangladesh=== (as of [[June]] [[2005]])
Cyphers can, of course, be attacked, and the most effective attack method depends on the cypher. By the opening of [[World War I]] code-breaking departments were good enough that most cyphers could be broken with enough effort. However most of the techniques used relied on gaining access to sufficient quantities of text encyphered with a particular key, from which patterns might be discerned with much statistics and hard work.
The country had in [[December]] [[2004]] 3,762,000 subscribers in total, or a 2.80% penetration rate.
{|{{prettytable}} width=435
|-
!width=120| Operator !!width=90| Technology !!width=75| Subscribers<br><small>(in millions)</small> !!width=150| Ownership
|-
|| [[GrameenPhone]] || [[GSM]] || 3.70 || [[Telenor]] and [[Grameen Bank]]
|-
|| [[Aktel]] || [[GSM]] || 2.00 || [[AK Khan & Company]] and [[Telekom Malaysia]]
|-
|| [[Banglalink]] || [[GSM]] || 0.46 || [[Orascom Telecom]]
|-
|| [[CityCell]] || [[CDMA]] || 0.32 || [[Singapore Telecommunications]], [[Pacific Motors]] and [[Far East Telecom]]
|-
|| [[bMobile]] || [[GSM]] || ''Not available yet'' || [[State-owned]]
|}
 
===China, People's Republic of=== (as of [[August]] [[2005]])
In the [[frequency analysis]] technique, letters and letter patterns are the clue. Since certain letters appear much more frequently than others in every language, counting letter frequencies in the [[cyphertext]] usually reveals information about likely substitutions in the frequently used [[substitution cipher|substitution cypher]]s. Users typically look for some important letters and combinations. For instance, in English, E, T, A, O, I, N and S, are usually easy to identify -- being very frequent; as well, the combinations NG, ST and others, also very frequent in English. Once some (or all) of these are identified, the message is partially decrypted, revealing more information about other likely substitutions. Simple frequency analysis relies on one letter always being substituted for another [[plaintext]] letter in the cypher: if this is not the case the situation is more difficult. For many years, cryptographers attempted to hide the frequencies by using several different substitutions for common letters, but this is unable to fully hide patterns in the substitutions for plaintext letters. Such codes were being widely broken by the 1500s.
The country had 372,800,000 subscribers in total.
{|{{prettytable}} width=435
|-
!width=120| Operator !!width=90| Technology !!width=75| Subscribers<br><small>(in millions)</small> !!width=150| Ownership
|-
| [[China Mobile]] || [[GSM]] || 231.01 || [[State-owned]]
|-
| [[China Unicom]] || [[GSM]], [[CDMA]] || 122.99 || [[State-owned]]
|}
 
====Hong Kong====
One technique to make frequency analysis more difficult is to use a different substitution for every letter, not only the common ones. This would normally be a very time-consuming process that required both parties to exchange their substitution patterns prior to sending encyphered messages. In the mid-1400s, a new technique was invented by [[Leone Battista Alberti|Alberti]], now known generally as [[polyalphabetic cipher]]s, which provided a simple technique for "creating" a multitude of substitution patterns. The two parties would exchange a small amount of information (referred to as the ''[[Cryptographic key|key]]'') and follow a simple technique that produced many substitution alphabets, and so many different substitutions for each plaintext letter. The idea is simple and effective, but proved more difficult to use than one might have expected. Many cyphers were only partial implementations of the concept, and so were easier to break than they might have been (eg, the [[Vigenere cypher]]).
The administrative region had in [[June]] [[2005]] 8,384,880 subscribers in total, or a 120.80% penetration rate.
{|{{prettytable}} width=435
|-
!width=120| Operator !!width=90| Technology!!width=150| Ownership
|-
|| [[CSL]] (CSL, 1O1O and One2Free) || [[UMTS]], [[GSM|GSM-900]], [[GSM-1800]], [[TDMA]] || [[Telstra]]
|-
|| [[3 (telecommunications)|3]]<sup>1</sup> || [[UMTS]], [[GSM|GSM-900]], [[GSM-1800]], [[CDMA]] || [[Hutchison Whampoa]]
|-
|| [[Smartone]] and [[eXtra]] || [[UMTS]], [[GSM|GSM-900]], [[GSM-1800]] || [[Sun Hung Kai]] and [[BT]]
|-
|| [[Sunday Communications Ltd|Sunday]]<sup>2</sup> || [[UMTS]], [[GSM-1800]] ||
|-
|| [[Peoples (wireless provider)|Peoples]] || [[GSM-1800]] ||
|-
|| [[New_World_Development_Co._Ltd.|New World Mobility]] || [[GSM-1800]] ||
|}
<sub>
1. Previously [[Orangina SA|Orange]] Hong Kong, [[Xin Gan Xian]], [[Everyday PCS]].<br>
2. July 2005: [[PCCW]] former owner of [[CSL]] has agreed in June to buy the 59.9% of shares held by the two biggest shareholders at HK$0.65 each share. The acquisition has received approval from Hong Kong's Office of the Telecommunications Authority, and has progressed to a mandatory unconditional cash offer to buy the remaining stock at HK$0.65 per share. Total cost to [[PCCW]] will be approx HK$1.942bn, allowing its reentry into the wireless market and access to [[Sunday]]'s 3G licence.
</sub>
 
===China, Republic of (Taiwan)=== (as of [[July]] [[2005]])
It took several hundred years before methods to reliably break proper polyalphabetic cyphers were found. The new techniques relied on statistics (eg, [[coincidence counting]]) to discover information about the key used for a message. These techniques look for repeating patterns in the [[ciphertext]], which provide clues about the length of the key. Once this is known the message essentially becomes a series of messages, each as long as the length of the key, to which normal frequency analysis can be applied. [[Charles Babbage]], [[Friedrich Kasiski]], and [[William F. Friedman]] are among those who did most to develop these techniques.
The country had 20,515,000 subscribers in total, or a 90.92% penetration rate.
{|{{prettytable}} width=435
|-
!width=120| Operator !!width=90| Technology !!width=75| Subscribers<br><small>(in millions)</small> !!width=150| Ownership
|-
|| [[Chunghwa Telecom]] || [[GSM]] || 8.11 || [[State-owned]]
|-
|| [[Far EasTone]] || [[UMTS]], [[GSM]] || ||
|-
|| [[KG Telecom]] || [[GSM]] || ||
|-
|| [[MobiTai]] || [[GSM]] || ||
|-
|| [[Taiwan Mobile]] || [[GSM]] || ||
|-
|| [[VIBO]] || [[UMTS]] || ||
|-
|| [[APBW]] || [[CDMA]] || ||
|}
 
===India=== (as of [[August]] [[2005]])
Cypher users were told to not only use a different substitution for every letter, but also to use a very long key, so the new techniques would fail (or at least be a lot harder). However this is very difficult to arrange; a long key takes longer to convey to the parties who need it, and mistakes are more likely. The 'ultimate' cypher of this kind would be one in which such a long key could be generated from a simple pattern, producing a cypher in which there are so many substitution [[alphabet]]s that frequency counting and statistical attacks would be effectively impossible.
The country had 62,570,000 subscribers in total, or a 5.76% penetration rate.
{|{{prettytable}} width=435
|-
!width=120| Operator !!width=90| Technology !!width=75| Subscribers<br><small>(in millions)</small> !!width=150| Ownership
|-
|| [[Airtel]] || [[GSM]] || 13.41 || [[Bharti Tele-Ventures]]
|-
|| [[BSNL]] || [[GSM]] || 11.32 || [[State-owned]]
|-
|| [[RIM]] || [[GSM]], [[CDMA]] || 11.13 || [[Reliance Industries Limited]]
|-
|| [[Hutch (Indian cellular company)|Hutch]] || [[GSM]] || 9.30 || [[Hutchison Whampoa]]
|-
|| [http://www.ideacellular.com !DEA] || [[GSM]] || 5.88 ||[[Birla]] ([[Tata Group]])
|-
|| [[Spice]] || [[GSM]] || 1.48 || [[Spicecorp]] and [[DISTACOM]]
|-
|| [[MTNL]] || [[GSM]] || 1.22 || [[State-owned]]
|}
 
===Indonesia=== (as of [[June]] [[2005]])
Enigma's use of multiple rotors provided a simple way of determining which substitution alphabet to use for any particular plaintext letter (while encyphering) and for any particular cyphertext letter (when decyphering). In this respect it was similar to the polyalphabetic cipher. However, unlike most of the variants of the polyalphabetic system, the Enigma had no obvious 'key length' since the rotors generated a new substitution alphabet with each keypress, and the entire sequence of substution alphabets could be changed by spinning one or more rotors, changing rotor order, etc before starting a new encryption. In the most simple sense, Enigma had a library of 26 x 26 x 26 = 17576 substitution alphabets for any given combination and ordering of rotors. As long as the message was not longer than 17576 characters, there would be no repeated use of a substitution alphabet. But, the Enigma machines added other possibilities. The sequence of alphabets used was different if the rotors were started in position ABC, as opposed to ACB; there was a rotating ring on each rotor which could be set in a different position, and the starting postion of each rotor was also variable. And most of the military Enigmas added a 'stecker' (a plugboard) which changed several key assignments (8 or more depending on model). Even so, this 'key' can be easily communicated to another user, it's just a few simple values: rotors to use, rotor order, ring positions, starting position, and plugboard settings.
The country had in [[December]] [[2004]] 30,000,000 subscribers in total, or a 13.48% penetration rate.
{|{{prettytable}} width=435
|-
!width=120| Operator !!width=90| Technology !!width=75| Subscribers<br><small>(in millions)</small> !!width=150| Ownership
|-
|| [[Telkomsel]] || [[GSM]] || 21.58 || [[State-owned]] [[PT Telekomunikasi Indonesia]] and [[Singapore Telecommunications]]
|-
|| [[Indosat]] || [[GSM]], [[CDMA]] || 12.90 || [[Technologies Telemedia]]
|-
|| [[XL]] || [[GSM]] || 4.30 || [[Telekom Malaysia]]
|-
|| [[Mobile8]] || [[CDMA]] || ||
|-
|| [[Esia]] || [[CDMA]] || ||
|-
|| [[TelkomFlexi]] || [[CDMA]] || ||
|-
|| [[LippoTel]] || [[GSM]] || ||
|}
 
===Japan=== (as of [[August]] [[2005]]) ([[Mobile]] and [[Personal Handy-phone System]] included)
== Encrypting Method ==
The country had 93,314,900 subscribers in total.
{|{{prettytable}} width=435
|-
!width=120| Operator !!width=90| Technology !!width=75| Subscribers<br><small>(in millions)</small> !!width=150| Ownership
|-
| [[NTT DoCoMo]] || [[Personal Digital Cellular|PDC]], [[FOMA]], [[Personal Handy-phone System|PHS]] || 50.82 || [[NTT]] (~50% [[State-owned]])
|-
| [[KDDI Corporation|KDDI]] || [[CDMA]] || 20.54 || [[KDDI Corporation|KDDI]]
|-
| [[Vodafone Japan]] || [[UMTS]], [[Personal Digital Cellular|PDC]] || 14.99 || [[Vodafone]]
|-
| [[TU-KA]] || [[Personal Digital Cellular|PDC]] || 3.53 || [[KDDI Corporation|KDDI]]
|-
| [[Willcom]] || [[Personal Handy-phone System|PHS]] || 3.37 || [[Carlyle Group]], [[Kyocera]] and [[KDDI Corporation|KDDI]]
|-
| [[Astel]] || [[Personal Handy-phone System|PHS]] || 0.07 ||
|}
 
===Korea, Republic of=== (as of [[September]] [[2005]])
Of course, if those settings were available, a code-breaker could simply set their copy of an Enigma to the same settings and decode the message. One could send out books of settings to use, but these could be intercepted. Instead the Germans settled on a clever system that blended the two designs.
The country had 37,911,000 subscribers in total, or a 78.30% penetration rate.
{|{{prettytable}} width=435
|-
!width=120| Operator !!width=90| Technology !!width=75| Subscribers<br><small>(in millions)</small> !!width=150| Ownership
|-
| [[SK Telecom]] || [[UMTS]], [[CDMA]] || 19.34 || [[SK Corporation]]
|-
| [[KTF]] || [[UMTS]], [[CDMA]] || 12.28 || [[KT Corporation|KT]]
|-
| [[LG Telecom]] || [[CDMA]] || 6.29 || [[LG Group|LG Corporation]] and [[BT Group plc|BT]]
|}
 
===Malaysia=== (as of [[June]] [[2005]])
Enigma operators were at first given a new book every month that contained the initial settings for the machine. For instance, on a particular day the settings might be to put rotor number 7 in slot 1, nr 4 in slot 2, and 6 in 3. They are then spun, so that slot 1 is at letter X, slot 2 at letter J and slot 3 at A. Since the rotors could be moved around in the machine, with three rotors in three slots you have another 3 x 2 x 1 = 6 combinations to consider, for a total of 105456 possible alphabets. There was also a 'ring' setting for each rotor which adds still more variation.
The country had 16,551,000 subscribers in total, or a 63.30% penetration rate.
{|{{prettytable}} width=435
|-
!width=120| Operator !!width=90| Technology !!width=75| Subscribers<br><small>(in millions)</small> !!width=150| Ownership
|-
| [[Maxis Berhad]] || [[UMTS]], [[GSM]] || ||
|-
| [[Celcom]] || [[UMTS]], [[GSM]] || || [[Telekom Malaysia]]
|-
| [[Digi]] || [[GSM]] || || [[Telenor]]
|}
 
===Pakistan=== (as of [[August]] [[2005]])
At this point, the operator would then select some other settings for the rotors, this time defining only the positions, or "spins" of the rotors. A particular operator might select ABC, and these become the ''message settings'' for that encryption session. They then typed their message settings into the machine, which is still set up in the initial settings. To be on the safe side, they typed it twice. The results would be encrypted, so the ABC typed twice might turn into XHTLOA. The operator then spins the rotors to his message settings, ABC. The rest of the message is then typed in, and sent it over the radio.
The country had 15,511,045 subscribers in total, or a 10.07% penetration rate.
{|{{prettytable}} width=435
|-
!width=120| Operator !!width=90| Technology !!width=75| Subscribers<br><small>(in millions)</small> !!width=150| Ownership
|-
|| [[Mobilink]] || [[GSM]] || 7.46 || [[Orascom Telecom]]
|-
|| [[Ufone GSM]] || [[GSM]], [[CDMA]] || 2.57 || [[State-owned]]
|-
|| [[Paktel]] || [[GSM]], [[TDMA]], [[AMPS]] || ''Not available yet'' || [[Millicom]]
|-
|| [[Telenor]] || [[GSM]] || 0.83 || [[Telenor]]
|-
|| [[Instaphone]] || [[TDMA]], [[AMPS]] || ''Not available yet'' || [[Millicom]]
|-
|| [[Warid Telecom]] || [[GSM]] || 0.51 || [[Abu Dhabi Group]]
|}
 
===Philippines=== (as of [[December]] [[2004]])
At the receiving end the operation is reversed. The operator sets the machine to the inital settings and types in the first six letters of the message. Upon doing this he will see ABCABC light up on the machine. He then spins the rotors to ABC and types in the rest of the encrypted message, decyphering as he goes.
The country had in [[March]] [[2005]] 34,800,000 subscribers in total, or a 41.10% penetration rate.
{|{{prettytable}} width=435
|-
!width=120| Operator !!width=90| Technology !!width=75| Subscribers<br><small>(in millions)</small> !!width=150| Ownership
|-
|| [[Smart Communications]] || [[GSM]] || 14.60 || [[Philippine Long Distance Telephone Company]]
|-
|| [[Globe Telecom]]&sup1; || [[GSM]] || 12.51 || [[Ayala Corporation]] and <br>[[Singapore Telecommunications]]
|-
|| [[Sun Cellular]] || [[GSM]] || 1.20 || [[Digital Telecommunications Philippines]]
|-
|| [[Next Mobile]] || [[Integrated Digital Enhanced Network|iDEN]] || 0.031 ||
|-
|| [[Extelcom]] || [[CDMA]] || 0.01 ||
|-
!colspan=4 align=center| [[Mobile Virtual Network Operator|Mobile Virtual Network Operators]]
|-
| [[Talk 'N Text]] (using Smart) || [[GSM]] || 4.61 || [[Smart Communications]]
|-
| [[Addict Mobile]] (using Smart) || [[GSM]] || || [[Smart Communications]]
|-
| [[Touch Mobile]] (using Globe) || [[GSM]] || || [[Globe Telecom]]
|}
<sub>1. UMTS service for Globe is in testing stage and is planned for launch by at least 2007.</sub>
 
===Thailand=== (as of [[June]] [[2005]])
This system was excellent because cryptanalysis fundamentally relies on frequency counting of some sort. Although lots of messages would be sent in any one day with six letters from the initial settings, those letters were intended to be random. While an attack on the cypher itself ought to have been possible, every message used a different cypher key, making frequency counting useless in practice. With modern computers, things might have been different, but with pencil and paper...
The country had in [[December]] [[2004]] 28,000,000 subscribers in total, or a 44.12% penetration rate.
{|{{prettytable}} width=435
|-
!width=120| Operator !!width=90| Technology !!width=75| Subscribers<br><small>(in millions)</small> !!width=150| Ownership
|-
|| [[Advance Info Service]] (AIS) || [[GSM]] || 15.81 || [[Shin Corporation]] and [[Singapore Telecommunications]]
|-
|| [[DTAC]] || [[GSM]] || 8.24 || [[UCOM]] and [[Telenor]]
|-
|| [[Orange SA|Orange]] || [[GSM]] || || [[True Corporation]] and [[France Télécom]]
|-
|| [[Hutch]] || [[CDMA]] || 0.68 || [[Hutchison Whampoa]]
|-
|| [[Thai Mobile]] || [[UMTS]], [[GSM]] || || [[State-owned]]
|}
 
===Vietnam===
Enigma was very secure. So secure in fact that the Germans relied very heavily on it. The Enigma-encrypted traffic included everything from high-level messages about tactics and plans, to trivialities such as weather reports and even birthday congratulations.
The country had in [[December]] [[2004]] 4,960,000 subscribers in total, or a 6.01% penetration rate.
''List of operators not available yet. To come soon''
 
==Europe==
== Breaking the Enigma ==
===Austria=== (as of [[August]] [[2005]])
The country had 8,128,000 subscribers in total.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Mobilkom Austria|A1]] || [[UMTS]], [[GSM]] || 3.30 || [[Telekom Austria]]
|-
|align=right| 2 || [[T-Mobile]] || [[GSM]] || 2.05 || [[Deutsche Telekom]]
|-
|align=right| 3 || [[One]] || [[UMTS]], [[GSM]] || 1.54 ||
|-
|align=right| 4 || [[tele.ring]] || [[GSM]] || 0.98 || [[Deutsche Telekom]]
|-
|align=right| 5 || [[3]] || [[UMTS]] || 0.26 || [[Hutchison Whampoa]]
|}
 
===Belgium=== (as of [[June]] [[2005]])
The commercial Engima machine was good, but not good enough. The British are said to have broken some messages when it was used in Spain during the Civil War there. And they are also said to have read some Italian traffic encrypted with one of the commercial versions. But, when the German Navy began using Enigma in the mid-20s, no one was able to read the traffic. When the German Army began to use a slightly different version in the early 30's, no one was able to read any of that traffic either. There are reports that British cryptanalysts of the GC&CS (Government Code and Cypher School) and the French too gave up, regarding the German military Enigmas as unbreakable.
The country had 8,930,000 subscribers in total.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Proximus]] || [[UMTS]], [[GSM]] || 4.21 || [[Belgacom]] and [[Vodafone]]
|-
|align=right| 2 || [[Mobistar]] || [[UMTS]], [[GSM]] || 2.87 || [[France Télécom]]
|-
|align=right| 3 || [[Base]] || [[GSM]] || 1.85 || [[KPN]]
|}
 
===Bulgaria===
The effort which broke the German cypher began in [[1929]] when the [[Poland|Poles]] intercepted an Enigma machine being shipped from [[Berlin]] to [[Warsaw]] and mistakenly not protected as diplomatic baggage. It was not a military version, but it provided a hint that the Germans might be using an Enigma type machine in the future. When the German Army first began using modified Enigmas a few years later, the Poles attempted to 'break the system' by finding the wirings of the rotors used in the Army version and by finding a way to recover the settings used for particular messages.
The country had in [[December]] [[2004]] 4,729,700 subscribers in total, or a 60.41% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[M-Tel]]<sup>1</sup> || [[GSM]] || || [[Telekom Austria]]
|-
|align=right| 2 || [[GloBul]] || [[GSM]] || || [[OTE]]
|-
|align=right| 3 || [[Viva]] || [[GSM]] || || [[State-owned]] [[Bulgarian Telecommunation Company|BTC]] (Bulgarian Telecommunication Company)
|}
<sup>1</sup> [[UMTS]] licence has been acquired by [[M-Tel]] in March 2005.
 
===Czech Republic=== (as of [[June]] [[2005]])
A young Polish [[mathematician]], [[Marian Rejewski]], made one of the most signficant breakthroughs in [[cryptanalysis|cryptanalytic]] history by using fundamental mathematical and statistical techniques to find a way to do both. Rejewski noticed a pattern that was to prove vital; since the message code was repeated twice at the beginning of the message, you could guess the wiring of a rotor not by the letters themselves, but by the way they ''changed''.
The country had 10,834,000 subscribers in total.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[T-Mobile]]<sup>1</sup> || [[GSM]] || 4.46 || [[Deutsche Telekom]]
|-
|align=right| 2 || [[Eurotel Praha]] (Prague) || [[GSM]] || 4.42 || [[Český Telekom]]
|-
|align=right| 3 || [[Oskar Mobil]] || [[GSM]] || 1.95 || [[Vodafone]]
|}
<sup>1</sup> [[UMTS]] service for T-Mobile CZ is currently being planned for launch on March 2006.
 
===Finland===
For instance, let's say an operator picked QRS as their 'message setting'. They would set the machine to the day's ground settings, and then type QRSQRS. This would turn into something like JXDRFT. This looks like complete gibberish, but the clue Rejewski exploited was that the disk had moved three positions between the two sets of QRS &ndash; we know that J and R are originally the same letter, and the same for XF and DT. We don't know what the letters ''are'', but nor do we have to, because while there are a huge number of rotor settings, there are only a small number of rotors that will have a letter go from J to R, X to F '''and''' D to T. Rejewski called these patterns ''chains''.
The country had in [[December]] [[2004]] 4,988,000 subscribers in total, or a 95.63% penetration rate.
{|{{prettytable}} width=435
|-
! Operator !! Technology !! Ownership
|-
| [[Sonera]] || [[UMTS]], [[GSM]] || [[Telia Sonera]]
|-
| [[Elisa]] (formerly Radiolinja) || [[UMTS]], [[GSM]] ||
|-
| [[DNA Finland]] || [[GSM]] || [[Finnet]]
|-
| [[GSM Åland]] || [[GSM]] || [[Mariehamns Telefon]] and [[Ålands Telefonandelslag]]
|-
!colspan=3 align=center| [[Mobile Virtual Network Operator|Virtual Mobile Network Operators]]
|-
| [[Saunalahti]] || [[GSM]] ||
|-
| [[Tele2]] || [[GSM]] ||
|-
| [[Cubio]] || [[GSM]] ||
|}
 
===France=== (as of [[June]] [[2005]]) ([[Metropolitan France]] only.)
Finding the proper chains from the 105456 possiblilities was quite a task. The Poles (particularly Rejewski's classmates [[Jerzy Rozycki]] and [[Henryk Zygalski]]), developed a number of methods to help. One technique used clear strips for each rotor showing which letters could be chained, with the letters that could not chain being blacked out. Users would pick up the strips and lay them over each other, looking for selections where the three letters were clear all the way through. The British had also developed such a technique when they succeeded in breaking the common commercial Enigma, though they attempted (and failed) to break the military versions of the Enigma.
The country had 43,884,700 subscribers in total, or a 75.00% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Orange SA|Orange]] || [[GSM]] || 20.67 || [[State-owned]] [[France Télécom]]
|-
|align=right| 1 || [[SFR]] || [[GSM]] || 15.69 || [[SFR Cegetel]] and [[Vodafone]]
|-
|align=right| 1 || [[Bouygues Telecom]] || [[GSM]] || 7.53 || [[Bouygues|Bouygues group]]
|}
 
===Germany=== (as of [[June]] [[2005]])
Of course, a few thousand possibilites is still a lot to try. To help with this, the Poles eventually built several "parallel enigma" machines which they called the '''[[bombe|bomba kryptologiczna]]''' (cryptologic bomb). (Suggestions are that the name was chosen from a kind of local ice-cream dish, or from the ticking noise the machines made as they ran through the possibilities; the French later changed the name to 'bombe' and the English (or Americans) to 'bomb'. No one traces the name to anything explosive.) Possible sets of disks would be loaded into the machine and then a message could be tried on the remaining settings one after another. Now you were down to hundreds of possibilities. Hundreds is a reasonable number to attack by hand.
The country had 74,088,000 subscribers in total.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[T-Mobile]] || [[UMTS]], [[GSM]] || 28.18 || [[Deutsche Telekom]]
|-
|align=right| 2 || [[Vodafone]] || [[UMTS]], [[GSM]] || 27.72 || [[Vodafone]]
|-
|align=right| 3 || [[E-Plus (operator)|E-Plus]] || [[GSM]] || 9.80 || [[KPN]]
|-
|align=right| 4 || [[O2 plc|O<sub>2</sub>]] || [[GSM]] || 8.39 || [[O2 plc|O<sub>2</sub> plc]]
|}
 
===Greece=== (as of [[June]] [[2005]])
The Poles were able to determine the wiring of the rotors then in use by the German Army and, using them, to decrypt a large portion of German Army traffic for much of the [[1930s]] -- until the beginning of WWII. They received some (secret) assistance from the [[France|French]], who had an agent ([[Hans Thilo-Schmidt]], codenamed Asch by the French) in Berlin who had access to Enigma key schedules, manuals, etc. Rejewski's cryptanalytic breakthrough did not, however, depend on that information; he wasn't even told of the French agent or given access to his material.
The country had 11,659,600 subscribers in total.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Cosmote]] || [[UMTS]], [[GSM]] || 4.38 || [[OTE]]
|-
|align=right| 2 || [[Vodafone]] || [[GSM]] || 4.17 || [[Vodafone]]
|-
|align=right| 3 || [[TIM]]<sup>1</sup> || [[GSM]] || 2.26 ||
|-
|align=right| 4 || [[Q-Telecom]]<sup>2</sup> || [[GSM]] || 0.85 || [[Info-Quest]]
|}
<sub>
1. Was [[Telestet]] until [[February]] [[2004]] but the name is still used coloquially.<br>
2. The newest mobile telecom in Greece uses Vodafone's infrastructure until it builds its own network.
</sub>
 
===Hungary=== (as of [[August]] [[2005]])
Some sources claim (without much support from informed participants' accounts) that in [[1938]] a [[Poland|Polish]] mechanic employed in a German factory producing Enigma machines took notes of the components before being repatriated and, with the help of the [[British]] and [[France|French]] secret services, constructed a wooden mockup of the machine. There's also a story about an ambush by the Polish resistance of a German Army vehicle carrying an Enigma machine... In neither case would the ground settings, much less the individual message settings chosen by the operators, be available, and so that knowledge, however bravely gained, would be of little worth. These stories are, thus, less than inherently plausible.
The country had 9,020,623 subscribers in total, or a 89.40% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[T-Mobile]] || [[GSM]] || 4.09 || [[Deutsche Telekom]]
|-
|align=right| 2 || [[Pannon GSM]] || [[GSM]] || 3.08 || [[Telenor]]
|-
|align=right| 3 || [[Vodafone]] || [[GSM]] || 1.86 || [[Vodafone]]
|}
 
===Italy===
However, in [[1939]] the German Army increased the complexity of their Enigmas. Whereas in the past they used only three rotors and simply moved them from slot to slot, they now introduced an additional two rotors; thus using any three out of five at any particular time. They also had their operators stop sending the individual three letter message settings twice at the beginning of each message, which eliminated the original method of attack.
The country had in [[December]] [[2004]] 62,750,000 subscribers in total, or a 109.42% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[TIM]] || [[UMTS]], [[GSM]] || 26.3 || [[Telecom Italia]]
|-
|align=right| 2 || [[Vodafone]] || [[UMTS]], [[GSM]] || 17 || [[Vodafone]]
|-
|align=right| 3 || [[Wind]] || [[GSM]] || 7.7 || [[Orascom Telecom]]
|-
|align=right| 4 || [[3 (telecommunications)|3]] || [[UMTS]] || 5.2 || [[Hutchison Whampoa]]
|}
 
===Netherlands===
The Poles, realizing time was running out before the Germans invaded, and unable to extend their techniques with the available resources, decided in mid-1939 to share their work, and passed to the French and the British some of their ersatz 'Enigmas', and information on Rejewski's breakthrough and the other techniques they had developed. All of that was shipped to France in diplomatic baggage; the British share went on to [[Bletchley Park]]. Until then, German military Enigma traffic had utterly defeated both the British and French, and they faced the disturbing possibility that German communications would remain "black" for the entire war.
The country had in [[June]] [[2005]] 16,660,000 subscribers in total.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[KPN]] || [[GSM]] || 3.9 || [[KPN]]
|-
|align=right| 2 || [[Vodafone]] || [[GSM]] || 3.6 || [[Vodafone]]
|-
|align=right| 3 || [[Telfort]] || [[GSM]] || 2.4 || [[KPN]]
|-
|align=right| 4 || [[T-Mobile]] || [[GSM]] || 2.3 || [[Deutsche Telekom]]
|-
|align=right| 5 || [[Orange SA|Orange]] || [[GSM]] || 1.65 || [[France Telecom]]
|}
 
===Norway===
Nearly all the personnel of the Polish cryptography section left Poland during the invasion and most of them ended up in France, working with French cryptographers on German transmissions. Some Polish crypto workers were captured by the Germans before they left Poland or while in transit thereafter, but fortunately nothing was revealed of the Enigma work. It continued in France at 'Station [[PC Bruno]]' until the fall of France (and even somewhat after). Some of the French/Polish workers then managed to escape to England; none were used to help the British cryptanalytic effort against the Engima networks. When Rejewski himself learned (shortly before his death) of the work at Bletchley Park which he had begun in Poland in 1932, and of its importance to winning WWII, he was astonished.
The country had in [[December]] [[2004]] 4,716,090 subscribers in total, or a 102.40% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Subscribers<br><small>(in millions)</small>
|-
|align=right| 1 || [[Telenor]] || 2.5
|-
|align=right| 2 || [[NetCom (Norway)|NetCom]] || 1.2
|}
 
== [[Ultra]] =Poland===
The country had in [[June]] [[2005]] 25,300,000 subscribers in total, or a 65.90% penetration rate.
{|{{prettytable}} width=435
|-
! <small>Rank</small> !! Operator !! Technology !! Subscri bers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Era (operator)|Era]] || [[UMTS]], [[GSM]] || 8.60<sup>2</sup> || [[Elektrim]] and [[Deutsche Telekom]]
|-
|align=right| 2 || [[Orange Polska]] || [[UMTS]]<sup>1</sup>, [[GSM]] || 7.44<sup>2</sup> || [[TPSA]] and [[France Telecom]]
|-
|align=right| 3 || [[Plus GSM]] || [[UMTS]], [[GSM]] || 7.03<sup>2</sup> || [[Vodafone]], [[TDC (company)|TDC]], KGHM, [[PKN Orlen]], PSE
|-
|align=right| 4 || Netia Mobile<sup>1</sup> || [[UMTS]]<sup>1</sup> || - || Novator 70% and [[Netia]] 30%
|}
 
<sub>
With this massive Polish assistance, the British began to work on German Enigma traffic themselves. Early in [[1939]] Britain's secret service installed its ''Government Code and Cypher School'' (GC&CS) at [[Bletchley Park]], 50 miles (80 km) north of [[London]], to break enemy message traffic if possible. They also set up a large interception network to collect encyphered traffic for the code breakers at Bletchley. Eventually, there was a very large organization controlling the distribution of the resulting -- secret -- decrypted information. Strict rules were established to restrict the number of people who knew about the existence of Ultra and to ensure that no actions would alert the [[Axis]] powers that the Allies possessed such knowledge. Early in the war the product from Bletchley Park was codenamed 'Boniface' to give the impression to the uninitiated that the source was a secret agent. Such was the secrecy surrounding reports from 'Boniface' that 'his' reports were taken directly to [[Winston Churchill]] in a locked box to which the Prime Minister personally held the key. The information so produced was eventually termed '''Ultra'''.
1. Not yet operational as of [[September]] [[2005]].
 
<sub>
At Bletchley Park, British [[mathematician|mathematicians]] and [[cryptographer|cryptographers]], [[chess]] and [[contract bridge|bridge]] players, and [[crossword puzzle]] fans, among them [[Alan Turing]], confronted the problems presented by the many German Enigma variations, and found means of cracking many of them.
2. As of [[December]] [[2004]].
</sub>
 
===Portugal===
British attacks on the Enigmas were similar in concept to the original Polish methods, but based on different specifics. First, the German Army had changed their practices (more rotors, different 'message setting', etc), so the Polish techniques no longer worked without modification. Second, the German Navy had always used more secure practices, and no one had broken any of their traffic.
The country had in [[March]] [[2005]] 10,642,600 subscribers in total, or a 101.60% penetration rate.
{|{{prettytable}} width=435
|-
! Operator !! Technology !! Ownership
|-
|[[Telecomunicações Móveis Nacionais, SA|TMN]] || [[UMTS]], [[GSM]] || [[Portugal Telecom]]
|-
|[[Vodafone]] || [[UMTS]], [[GSM]] || [[Vodafone]]
|-
|[[Optimus Telecomunicações, S.A.|Optimus]] || [[UMTS]], [[GSM]] || [[Sonae]], [[France Télécom]]
|-
|colspan=4 align=center|'''[[Mobile Virtual Network Operator|Mobile Virtual Network Operators]]'''
|-
|[[Yorn|Yorn (Young ORiginal Network)]] (using Vodafone) || [[UMTS]], [[GSM]] || [[Vodafone]]
|-
|[[rede4]] (using Optimus) || [[GSM]] || [[Sonae]], [[France Télécom]]
|-
|[[UZO]] (using TMN) || [[GSM]] || [[Portugal Telecom]]
|}
 
===Romania=== (as of [[July]] [[2005]])
One new attack relied on the fact that the reflector (a patented feature of the Enigma machines) guaranteed that no letter could be encyphered as itself, so an A could never turn back into an A. Another technique counted on various common German phrases, like "Heil Hitler" or "please respond", which were found to likely be in this or that plaintext; successful guesses as to the plaintext were known at Bletchley as ''[[crib]]s''. With a probable plaintext fragment and the knowledge that no letter could be encyphered as itself, it wasn't uncommon that a corresponding [[cyphertext]] fragment could be identified. This provide a large hint as to the message settings, much in the same way the message setting codes had done for the Poles before the War started.
The country had 11,640,000 subscribers in total, or a 53.65% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Orange Romania]] || [[GSM]] || 6.00 || [[France Télécom]]
|-
|align=right| 2 || [[Connex GSM Romania]] || [[UMTS]], [[GSM]] || 5.25 || [[Vodafone]]
|-
|align=right| 3 || [[Zapp Mobile]] || [[CDMA]] || 0.30 || [[Oger Telecom]]
|-
|align=right| 4 || [[Cosmorom]] || [[GSM]] || 0.09 || [[OTE]]
|}
 
===Russian Federation=== (as of [[July]] [[2005]])
German operators themselves also gave the decrypters immense help on a number of occasions. In one instance an operator was asked to send a test message, so he simply hit the T key repeatedly and sent it. A British analyst received a long message without a single T in it from the interceptor stations, and immediately realised what had happened. In other cases, Enigma operators would constantly use the same settings for their message codes, often their own initals or those of their girlfriends. Analysts were set to finding these messages in the sea of intercepted traffic every day, allowing Bletchley to use the original Polish techniques to find the initial settings for the day. Other German operators used "form letters" for daily reports, notably weather reports, so the same crib could be used every day.
The country had 102,440,000 subscribers in total, or a 70.60% penetration rate.
These are the largest mobile phone companies in [[Russia]], by number of subscribers.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Mobile TeleSystems|Mobile TeleSystems - MTS]] || [[GSM]] || 35.74 || [[AFK Sistema]]
|-
|align=right| 2 || [[Bee Line GSM|VimpelCom - Bee Line GSM]] || [[GSM]] || 35.35 || [[Telenor]] and [[Alfa Group]]
|-
|align=right| 3 || [[MegaFon]] || [[GSM]] || 19.15 || [[Telia Sonera]], [[Telecominvest]] and [[IPOC International Growth Fund]]
|-
|align=right| 4 || [[Uralsvyazinform]] || [[GSM]] || 2.95 ||
|-
|align=right| 5 || [[SMARTS]] || [[GSM]] || 2.39 ||
|-
|align=right| 6 || [[Tele2]] || [[GSM]] || 1.91 ||
|-
|align=right| 7 || [[Sibirtelecom]] || [[GSM]] || 1.48 ||
|}
 
===Serbia & Montenegro===
In summer 1940 British decrypters, who were successfully breaking the German Air Force codes, were able to give Churchill information about the issuance of maps of England and Ireland to the [[Operation_Sea_Lion|Sealion]] invasion forces.
The country had in [[December]] [[2004]] 4,729,600 subscribers in total, or a 44.96% penetration rate.
{|{{prettytable}} width=435
|-
! Operator !! Technology !! Subscribers<br><small>(in millions)</small>
|-
| [[MOBTEL]] || [[GSM]] ||
|-
| [[ProMonte]] || [[GSM]] ||
|-
| [[MONET GSM|MONET]] || [[GSM]] ||
|-
| [[Mobilna Telefonija Srbija]] || [[GSM]] ||
|}
 
===Spain=== (as of [[June]] [[2005]])
From the beginning, the Naval version of Enigma used a greater variety of rotors than did the Army or Air Force versions, as well as various operational methods that made it much more secure than other Enigma variants. There was no hint at all of the initial settings for the machines, and there was little probable plaintext to use either. Different, and far more difficult methods had to be used to break into Naval Enigma traffic, and with the [[U-boat]]s running freely in the [[Atlantic Ocean|Atlantic]] after the Fall of France, a more direct approach recommended itself.
The country had 40,921,800 subscribers in total.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[movistar]] || [[UMTS]], [[GSM]] || 19.38 || [[Telefónica|Telefónica Móviles]]
|-
|align=right| 2 || [[Vodafone]] || [[UMTS]], [[GSM]] || 11.84 || [[Vodafone]]
|-
|align=right| 3 || [[Amena]]<sup>1</sup> || [[UMTS]], [[GSM]] || 9.70 || [[France Télécom]]
|}
<sub>
1. to be rebranded [[Orange SA|Orange]] Spain
</sub>
 
===Sweden=== (as of [[June]] [[2005]])
On 7 May [[1941]] the Royal Navy deliberately captured a German weather ship, together with cipher equipment and codes, and 2 days later [[Unterseeboot 110|U-110]] was captured, together with an Enigma machine, code book, operation manual and other information enabling the submarine message traffic to be broken until the end of June. And they did it again shortly afterwards.
{|{{prettytable}} width=435
|-
! Operator !! Technology !! Subscribers<br><small>(in millions)</small>
|-
| [[Telia]] || [[UMTS]],[[GSM]] || 4.32
|-
| [[Tele2Comviq]] || [[UMTS]],[[GSM]] || 3.50
|-
| [[Vodafone]] || [[UMTS]],[[GSM]] || 1.52
|-
| [[3 (telecommunications)|3]] || [[UMTS]] ||
|-
| [[Spring Mobil]] || [[GSM]] ||
|}
 
===Switzerland=== (as of [[June]] [[2005]])
In addition to U-110, Naval Enigma machines or settings books were captured from a total of 7 U-boats and 8 German surface ships, including [[U-boat|U-boats]] [[Unterseeboot 505|U-505]] ([[1944]]), and [[Unterseeboot 559|U-559]] ([[1942]]), as well as from a number of German weather-reporting boats, from some converted trawlers, a small vessel (the Krebs) captured during the raid in the Lofoten Islands off Norway, and so on. Several other more imaginative techniques were dreamed up, including [[Ian Fleming]]'s suggestion to "crash" captured German bombers into the sea near German shipping, hoping to be "rescued" by the crew, which would then be taken captive by the [[Commando]]s hiding in the plane.
The country had 6,426,000 subscribers in total.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Swisscom Mobile]] || [[UMTS]], [[GSM]] || 4.04 || [[State-owned]] [[Swisscom]] and [[Vodafone]]
|-
|align=right| 2 || [[Sunrise (telecommunication)|Sunrise]] || [[GSM]] || 1.23 || [[TDC Group]]
|-
|align=right| 3 || [[Orange SA|Orange]] || [[GSM]] || 1.15 || [[France Télécom]]
|}
 
===Turkey=== (as of [[June]] [[2005]])
In other cases the Allies forced the Germans to provide them with a crib. To do this they would drop mines (or take some other action), and then listen for messages being sent. In the case of mining, they knew the word "Minen" would be in some of them. This technique was called ''[[gardening (cryptanalysis)|gardening]]'' at Bletchley.
The country had 39,608,677 subscribers in total.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Turkcell]] || [[GSM]] || 25.60 || [[Cukurova Group]] and [[Telia Sonera]]
|-
|align=right| 2 || [[Telsim]] || [[GSM]] || ''not available yet'' || Currently possessed by state, to be sold off soon.
|-
|align=right| 3 || [[Avea]] || [[GSM]] || ''not available yet'' || [[Türk Telekom]], [[Telecom Italia]] and [[Türk İş Bankası]]
|}
 
===Ukraine=== (as of [[August]] [[2005]])
Had the Germans ever replaced every rotor at the same time, it is possible that the British would not have been able to break back into the system. However, both because of the expense and because of the difficulty of getting all those new rotors to all the necessary ships and units, it was never done. Instead the Germans simply added new rotors to the mix every so often, allowing the settings of the newest ones to be deciphered after a short period.
The country had 23,000,000 mobile subscribers in total, or a 48.9% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! Technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Ukrainian Mobile Communications]] || [[GSM]], [[Nordic_Mobile_Telephone|NMT]] || ~11.0 || [[Mobile_TeleSystems|MTS]] (100%)
|-
|align=right| 2 || [[Kyivstar]] || [[GSM]] || 10.9 || [[Telenor]] (56.52%), [[Alfa_Group|Alfa Group]] (43.48%)
|-
|align=right| 3 || [[Astelit life:)]] || [[GSM]] || 1.1 || [[Turkcell]] (54.2%), [[SCM Holdings]] (45.8%)
|-
|align=right| 4 || [[Ukrainian RadioSystems]] || [[GSM]] || 0.1 || [[Optima-Telecom]] and [[PRIVAT Group]]
|-
|align=right| 5 || [[Golden Telecom]] || [[GSM]] || 0.06 || [[Golden Telecom Inc.]] (GLDN)
|-
|align=right| 6 || [[DCC]] || [[TDMA]] || 0.04 || [[Turkcell]] (54.2%), [[SCM Holdings]] (45.8%)
|-
|-
|align=right| - || CDMA operators || [[CDMA]] || 0.1 || [[ITC Ukraine]], [[Velton]], etc.
|-
|}
 
===United Kingdom=== (as of [[June]] [[2005]])
Even these brief periods were enough to have dramatic effects on the progress of the War. Charting the amount of traffic decoded against the British shipping losses for that month shows a strong pattern of increased loss when Naval Enigma was blacked out, and vice versa. But, by 1943, so much traffic had been decrypted that the code breakers had an excellent understanding of the messages coming from various locations and times. For instance, a message sent from the west at 6am was likely to be sent by a weather reporting boat in the Atlantic, and that meant the message would almost certainly contain ''these'' cribs, and similarly for other traffic. From this point on, Naval Enigma messages were being read constantly, even after changes to the ground settings.
The country had 63,601,000 subscribers in total
{|{{prettytable}} width=435
|-
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[T-Mobile]] || [[UMTS]], [[GSM]] || 16.06 || [[Deutsche Telekom]]
|-
|align=right| 2 || [[Vodafone]] || [[UMTS]], [[GSM]] || 15.49 || [[Vodafone]]
|-
|align=right| 3 || [[O2 plc|O<sub>2</sub>]] || [[GSM]] || 14.62 || [[O2 plc|O<sub>2</sub> plc]]
|-
|align=right| 4 || [[Orange SA|Orange]] || [[UMTS]], [[GSM]] || 14.46 || [[France Télécom]]
|-
|align=right| 5 || [[3 (telecommunications)|3]] || [[UMTS]] || 3.21 <sup>1</sup> || [[Hutchison Whampoa]]
|}
<sup>1</sup> Data as of [[August]] [[24]] [[2005]].
 
There are also a number of [[MVNO|Virtual Mobile Network Operators]], including [[Virgin Mobile]], [[Tesco|Tesco Mobile]], and [[EasyGroup|easyMobile]].
However, like the Polish system, the new tricks only reduced the number of possible settings for a message. The number remaining was still huge, and due to the new rotors the Germans had added from time to time, that number was much larger than the Poles had been left with. In order to solve this problem the Allies, especially the US, "went industrial", and produced much larger versions of the Polish ''bomba'' that could test thousands of possible key settings very rapidly indeed.
 
==Middle East & Africa==
Some Germans had suspicions that all was not right with Enigma. [[Karl Dönitz]] received reports of "impossible" encounters between U-boats and enemy vessels which made him suspect some compromise of his communications. In one instance, three U-boats met at a tiny island in the [[Caribbean]], and a British destroyer promptly showed up. They all escaped and reported what had happened. Doenitz immediately asked for a review of Enigma's security. The analysis suggested that the signals problem, if there was one, wasn't due to the Enigma itself. Doenitz had the settings book changed anyway, blacking out Bletchley Park for a period. However the evidence was never enough to truly convince him that naval Enigma was being read by the Allies. The more so, since his counterintelligence ''B-Dienst'', who had partially broken Royal Navy traffic (including its convoy codes during the early part of the War), supplied enough information to support the idea that the Allies were unable to read Naval Enigma. Coincidentally, German success in this respect almost exactly matched in time an Allied blackout from Naval Enigma.
===Algeria=== (as of [[August]] [[2005]])
The country had 9,879,847 subscribers in total, or a 30.87% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Djezzy]] || [[GSM]] || 5.69 || [[Orascom Telecom]]
|-
|align=right| 2 || [[Mobilis]] || [[GSM]] || 3.19 || [[State-owned]] [[Algérie Télécom]]
|-
|align=right| 3 || [[Nedjma]] || [[GSM]] || 1.00 || [[Wataniya Telecom]]
|}
 
===Egypt=== (as of [[August]] [[2005]])
After the War, the American [[TICOM]] project teams found and detained a considerable number of German crypto personnel. Among the things they learned from them was that the German cryptographers, at least, understood very well that Enigma messages might be read; they knew Enigma was not unbreakable. They just found it impossible to imagine anyone going to the immense effort required. (See Bamford's ''Body of Secrets'' in regard to the TICOM missions immediately after the War.)
The country had 11,223,984 subscribers in total.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[MobiNil]] [http://www.mobinil.com] || [[GSM]] || 5.91 || [[Orascom Telecom]] and [[France Télécom]]
|-
|align=right| 2 || [[Vodafone]] [http://www.vodafone.com.eg] || [[GSM]] || 5.32 || [[Vodafone]]
|}
 
===Kenya=== (as of [[June]] [[2005]])
In [[1941]] British intelligence learned that the German Navy was about to introduce ''Triton'', a new version of Enigma with 4 wheels rather than 3. Fortunately, for the Allies, in December, a U boat mistakenly transmitted a messsage using Triton before it was due to be implemented. Realising the error, they re-transmitted the same message using pre-Triton 3 rotor Enigma, giving the British sufficient clues to break the new machine very shortly after it became operational on February 1 [[1942]]. The Triton network was given the name ''Shark'' and its traffic was routinely readable.
The country had 4,611,070 subscribers in total, or a 14,40% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Safaricom]] [http://www.safaricom.co.ke]] || [[GSM]] || ''Not available yet'' || [[State-owned]] [[Telkom Kenya]] and [[Vodafone]]
|-
|align=right| 2 || [[Celtel]] [http://www.ke.celtel.com] || [[GSM]] || ''Not available yet'' || [[MTC]]
|}
 
===Mauritius=== (as of [[June]] [[2005]]
By 1945 almost all German Enigma traffic ([[Wehrmacht]], Navy, [[Luftwaffe]], [[Abwehr]], [[SD]], ...) could be decoded within a day or two, yet the Germans remained confident of its security and continued to rely on the system. Had they been aware of Allied progress against Enigma, they simply could have, and surely would have, changed systems, forcing Allied code-breakers to start over. The Germans considered Enigma traffic so secure that they openly discussed their plans and movements, handing the Allies a huge amount of very useful information, not all of which was properly used; for example, both Rommel's actions at the [[Kasserine Pass]] and the [[Battle of the Bulge]] was clearly foreshadowed in decrypted German Enigma traffic, but the information was not properly appreciated in either case.
The country had in [[December]] [[2004]] 622,565 subscribers in total.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Cellplus]] || [[GSM]] || 0.39 || [[Mauritius Telecom]] group and [[France Telecom]]
|-
|align=right| 2 || [[Emtel]] || [[GSM]] || ''Not available yet'' || Millicom International Cellular
|}
 
===Morocco=== (as of [[June]] [[2005]])
It is commonly claimed that the breaks into Naval enigma resulted in the war being a year shorter, but given its effects on the [[Battle of the Atlantic (1940)]] alone, that might be an underestimate.
The country had 10,725,000 subscribers in total, or a 35.88% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[IAM]] (Itissalat al-Maghrib) [http://www.mobileiam.ma] || [[GSM]] || 7.19 || [[State-owned]] [[Maroc Télécom]]
|-
|align=right| 2 || [[Méditel]] [http://www.meditel.ma] || [[GSM]] || 3.54 || [[Telefónica|Telefónica Móviles]] and [[Portugal Telecom]]
|}
 
===Mozambique=== (as of [[May]] [[2005]])
== After the War; public disclosure ==
The country had in [[December]] [[2004]] 708,000 subscribers in total, or a 3.73% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[mCel]] || [[GSM]] || 0.77 || Partially [[state-owned]]
|-
|align=right| 2 || [[Vodacom]] || [[GSM]] || ''Not available yet'' || [[Telkom]], [[Vodafone]] and [[VenFin]]
|}
 
===Nigeria=== (as of [[June]] [[2005]])
The fact that Enigma had been broken during the War remained a secret until the late 1960s. The important contributions to the War effort of a great many people remained unknown, and they were unable to share in the glory of what is likely one of the chief reasons the Allies won the war as quickly as they did. Eventually the story became known.
The country had 13,316,597 subscribers in total, or a 10.56% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| || [[Glo Mobile]] [http://www.gloworld.com] || [[GSM]] || ''Not available yet '' ||
|-
|align=right| || [[MTN Nigeria]] [http://www.mtnonline.com] || [[GSM]] || 6.38 || [[MTN]]
|-
|align=right| || [[Mtel]] [http://www.mtelnigeria.com] || [[GSM]] || ''Not available yet'' || [[State-owned]] [[Nitel]]
|-
|align=right| || [[Vmobile]] [http://www.vmobile-nigeria.com] || [[GSM]] || ''Not yet'' || [[First Bank of Nigeria]] and [[AKIIPOC]]
|}
 
===Saudi Arabia===
After the war ended, the British and Americans sold surplus Enigmas and Enigma-like machines to many countries around the world, who remained convinced of the security of this remarkable cypher machine. Their traffic was not so secure as they believed, which is, of course, one reason the British and Americans made the machines available.
The country had in [[December]] [[2004]] 9,175,800 subscribers in total, or a 36.82% penetration rate.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Al Jawal]] || [[GSM]] || ''Not available yet'' || [[State-owned]] [[Saudi Telecom]]
|-
|align=right| 2 || [[Mobily]] || [[GSM]] || ''Not available yet'' || [[Etisalat]]
|}
 
===South Africa=== (as of [[June]] [[2005]])
In 1967, [[David Kahn]] released his book ''[[The Codebreakers]]'', which described the capture of the Naval Enigma from U-505 in 1945. He went on to mention, somewhat in passing, that Enigma messages were already being read by that time, requiring machines that filled several buildings. By 1970 newer computer-based cyphers were becoming popular as the world increasingly turned to computerised communications, and the usefulness of Enigma copies (and rotor machines generally) rapidly decreased. It was decided at this point to "let the cat out of the bag", and official reports about some of Bletchley Park's operations were released in 1974.
{|{{prettytable}} width=435
|-
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Vodacom-Vodafone]] [http://www.vodacom.co.za] || [[UMTS]], [[GSM]] || 14.29 || [[Telkom]], [[Vodafone]] and [[VenFin]]
|-
|align=right| 2 || [[MTN]] [http://www.mtn.co.za] || [[UMTS]], [[GSM]] || 8.41 || [[Mobile Telephone Networks]]
|-
|align=right| 3 || [[Cell C]] [http://www.cellc.co.za] || [[GSM]] || ''not available yet'' || [[Oger Telecom]]
|}
 
===disclosureSudan===
The country had in [[December]] [[2004]] 1,048,600 subscribers in total, or a 3.04% penetration rate.
Many accounts of these events, and of other [[World War II]] crypto happenings, have been published since then. Several are unreliable in many respects. This is due to several reasons:
{|{{prettytable}} width=435
|-
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
|-
|align=right| 1 || [[Mobitel]] || [[GSM]] || || [[Sudatel]] and [[MSI Cellular Holdings]]
|}
 
===Tunisia=== (as of [[June]] [[2005]])
*First, not all of the authors were in a position to know (e.g., several books have been published by those on the Ultra distribution side at Bletchley Park, but work there was very seriously compartmentalised, making it difficult to credit some episodes when they are due only to such a source. The story about Churchill deliberately not interfering with a Luftwaffe bombing of Coventry which was known through Enigma decrypts is one such; see P Calvocoressi's book for a more reliable account of this matter than that in Winterbotham's.);
The country had in [[December]] [[2004]] 3,575,700 subscribers in total, or a 37.59% penetration rate.
*second, the cryptanalytic work was tricky and quite technical (those without sympathy for it are not likely to have got the details or the implications of those details quite right);
{|{{prettytable}} width=435
*third, documents have been lost in secret archives, those not lost took decades to finally be released to the public; in any case, none were written originally, nor made available later, with historical clarity in mind;
|-
*fourth, governments have chosen to keep secret or release information to serve their purposes, not public knowledge;
! Rank !! Operator !! technology !! Subscribers<br><small>(in millions)</small> !! Ownership
*fifth, several authors have their own agendas (at least one incident is known of whole cloth fabrication regarding British cryptanalytic progress on a particular World War II Japanese Navy crypto system -- the account was claimed to have been written from the unpublished memoirs of an Australian cryptanalyst, but substantive parts of the published version were simply invented);
|-
*sixth, many writers have not done their research (the exact fate of the Enigma spy 'Asch' was not publicly known till Hugh Sebag-Montefiore tracked his daughter down c. 1999; see his book for the details).
|align=right| 1 || [[Tuntel]] || [[GSM]] || ''Not available yet'' || [[State-owned]] [[Tunisie Télécom]]
|-
|align=right| 2 || [[Tunisiana]] || [[GSM]] || 1.56 || [[Wataniya Telecom]] and [[Orascom Telecom]]
|}
 
== Sources of information ==
More than in most history, the history of cryptography, especially its 'recent' history, must be read carefully.
*[http://www.itu.int/ITU-D/ict/statistics/at_glance/cellular04.pdf International Telecommunications Union's cellular statistics]
*[http://www.cellular-news.com/ Cellular News web site]
*[http://www.gsmworld.com GSM Association web site]
*[http://www.cdg.org CDMA Development Group web site]
*[http://www.rtr.at/web.nsf/englisch/Telekommunikation_Markt_Marktinfos_Marktinfos_MarktanteileMobilfunkbetreiber2005?OpenDocument Austrian Mobile Telecoms' data]
*[http://www.teleco.com.br Brazilian Mobile Telecoms' data]
*[http://www.cwta.ca Canadian Mobile Telecoms' data]
*[http://www.sic.gov.co Colombian Mobile Telecoms' data]
*[http://www.supertel.gov.ec Ecuadorian Mobile Telecoms' data]
*[http://www.ntc.gov.ph/whatsnew-frame.html Filipino Mobile Telecoms' data]
*[http://www.arcep.fr French Mobile Telecoms' data]
*[http://www.myphone.gr/library/article-16.html Greek Mobile Telecoms' data]
*[http://www.tca.or.jp Japanese Mobile Telecoms' data]
*[http://www.osiptel.gop.pe Peruvian Mobile Telecoms' data]
*[http://www.mobile-arsenal.com.ua/ Ukrainian mobile operators info]
*[http://www.americamovil.com América Móvil subsidiaries' subscriber numbers]
*[http://www.unefon.com.mx Unefon subscriber numbers]
*[http://www.iusacell.com.mx Iusacell subscriber numbers]
*[http://www.chinamobilehk.com/investor_relations.htm China Mobile subscriber numbers]
*[http://www.t-mobile.net/CDA/about_t-mobile,2,0,,en.html?w=1088&h=733 T-Mobile company data]
*[http://www.verizonwireless.com/b2c/aboutUs/index.jsp Verizon company data]
*[http://cingular.com/about/company_overview Cingular company data]
*[http://www.telefonicamoviles.com/eng/accionistaseinversores/inversores/hechos_relev/hechos_relev.html# Telefonica company data]
*[http://www.sprint.com/sprint/fastfacts/overview/ Sprint PCS company data]
*[http://www.t-mobile.com/company/about/quickfacts.asp T-Mobile USA company data]
*[http://www.orange.com/English/aboutorange/whereweare.asp?UID=# Orange Statistics]
*[http://www.mmo2.com/media/pr_040721a.asp O2 Data]
*[http://www.vodafone.com/article_wide/0,3041,CATEGORY_ID%253D306%2526LANGUAGE_ID%253D0%2526CONTENT_ID%253D230772,00.html Vodafone company data]
*[http://www.turkcell.com.tr/index/0,1028,69300,00.html Turkcell company data]
*[http://www.telecomitalia.it/cgi-bin/tiportale/TIPortale/ep/contentView.do?channelId=-9794&LANG=EN&contentId=20336&programId=9597&programPage=/ep/TImedia/TISearch.jsp&tabId=3&pageTypeId=-8663&contentType=EDITORIAL TIM company data]
 
{{MobilePhoneNetworks}}
==Further reading==
A responsible, and mercifully short, account of World War II cryptography which is essentially up-to-date as of this writing is ''Battle of Wits'' by Stephen Budiansky. It covers more than just the Enigma story. Hugh Sebag-Montefiore's recent ''Enigma'' is both well written and accurate, and includes some previously unknown information -- and many excellent photographs. Bletchley Park had been his grandfather's house before it was purchased for [[GC&CS]]. [[David Kahn]]'s ''Breaking the Enigma'' is essentially about the problem of Naval Enigma; it's also accurate. Finally, an excellent and accessible (in addition to being brief) description of the Enigma, as well as other codes/cyphers, can be found in Simon Singh's ''The Code Book''. The official British history of cryptograhpy in World War II is in four volumes, edited by Sir [[Harry Hinsley]]. He also edited a one volume collection of memoirs by participants.
 
[[Category:Mobile phone companies| ]]
==Related Topics==
''World War II Era Encryption Devices''
*[[Sigaba]] (''United States'')
*[[Typex]] (''Britain'')
*[[Lorenz cypher]] (''Germany'')
*[[Geheimfernschreiber]] (''Germany'')
 
[[zh:最大的移动电话公司]]
==External links==
*[http://www.murky.org/cryptography/classical/enigma.shtml The Enigma, discussed on] [http://www.murky.org/cryptography/index.shtml The Beginner's Guide to Cryptography]
*[http://www.mlb.co.jp/linux/science/genigma/enigma-referat/enigma-referat.html ''Enigma - a very famous story of cryptology'' by Martin Oberzalek]
*[http://www.codesandciphers.org.uk/enigma/index.htm ''The Enigma cipher machine''], by Tony Sale, the original curator of the Bletchley Park Museum
*[http://webhome.idirect.com/~jproc/crypto/menu.html site w/ several images of Enigmas and related items]
* [http://webhome.idirect.com/~jproc/crypto/enigma.html Several images of Enigma]
 
[[da:Enigma]]
[[de:Enigma]]
[[fr:Machine Enigma]]
[[it:Enigma]]
[[ja:&#12456;&#12491;&#12464;&#12510; (&#26263;&#21495;&#27231;)]]
[[nl:Enigma]]
[[pl:Enigma]]
[[pt:Enigma]]