This project uses an Enigma® machine simulator. It functions like the Enigma machines used during WWII. This example has been included to help you better understand how encryption worked in the early days. It’s a great learning tool for when you first start exploring the subject of cryptography. Enigma machines provided fairly good encryption strength for their day. Modern cryptographic systems are much more secure than Enigma machines.
Pay attention to the colored paths as you type. The red path goes through the three rotors, bounces off the reflector, becomes green, and then goes back through the three rotors. The right rotor moves with each keystroke. If it completes one full cycle, it will advance the middle rotor and, subsequently, the left rotor as well.
- Open a Web browser and go to http://enigmaco.de/enigma/enigma.swf
- Use the left and right arrows to move each of the top three rotors so that each has the letter “A” selected in blue.
- Click in the Input text box in the bottom of your screen.
- Slowly type your first name and last name without a space. (If you make a typing error you can start over by pressing the backspace key.)
- Take a screenshot.
Note: The text in the Input text box is what you typed. The text in the Output text box is what you would send. You are now going to reset the dials to their original position (in this case AAA) and type the encrypted text (cipher text) you produced in the Output text box. You can copy the cipher text from the screenshot you just took. Subsequently, you should see your name reproduced in the bottom box. This is the equivalent of decrypting the message.
- Click in the Input text box and backspace your name. (The rotors should be set back to their AAA position.)
- Refer back to the screenshot you just took and copy down the output (cipher text).
- Type the cipher text into the Input text box. (Type slowly so you don’t make a mistake and have to start over!)
- Take a screenshot with your name showing in the Output text box.
- Backspace the text in the Input text box.
- Slowly press the A key ten times and notice how a different encrypted letter is chosen as output through the rotating dials even though you are hitting the same key each time.
- Take a screenshot.
Submit your screenshots and answer the following questions:
- Why did Enigma machines use multiple rotors?
- How did WWII cryptographers know which rotor settings to use?
Your well-written paper should meet the following requirements:
- Be two to four pages in length
- Contain an illustrative table or a diagram created from properly cited external references and contain 2 to 3 intext citation per page
- Include two credible external references in addition to the textbook
- Formatted according to APA writing guidelines.