Slowly press the A key ten times and notice how a different encrypted letter is chosen as output through the rotating dials even though you are hitting the same key each time. Backspace the text in the Input text box. Take a screenshot with your name showing in the Output text box. (Type slowly so you won't make a mistake and have to start over!) 9. Type the ciphertext into the Input text box. (In this case, the ciphertext for "RANDYBOYLE” was "VDOLZYMEAC.") 8. Refer back to the screenshot you just took and copy down the output (ciphertext). (The rotors should be set back to their AAA position.) 7. Click in the Input text box and backspace your name. This is the equivalent of decrypting the message. Subsequently, you should see your name reproduced in the bottom box. You can copy the ciphertext from the screenshot you just took. You are now going to reset the dials to their original position in this case AAA) and type the encrypted text (ciphertext) you produced in the Output text box. The text in the Output text box is what you would send. This page links to web sites with information about various WWII cipher - decipher machines and simulation software. Note: The text in the Input text box is what you typed. If you make a typing error you can start over by pressing the backspace key.) 5. Slowly type your first name and last name without a space. Click in the Input text box in the bottom of your screen. Use the left and right arrows to move each of the top three rotors so that each has the letter “A” selected in blue.ģ. Open a web browser and go to enigma/enigma.swf. If it completes one full cycle, it will advance the middle rotor and subsequently the left rotor. The right rotor moves with each key- stroke. The red path goes through the three rotors, bounces off the reflector, becomes green, and then goes back through the three rotors. Pay attention to the colored paths as you type. Modern cryptographic systems are much more secure than Enigma machines. Enigma machines provided fairly good encryption strength for their day. It's a great learning tool when you first start exploring the subject of cryptography. This example has been included to help you better understand how encryption worked in the early days. It functions like the Enigma machines used during World War II. PROJECT 2 This project uses an Enigma machine simulator.
0 Comments
Leave a Reply. |