-Using the Enigma machine simulator

docx

School

Northern Virginia Community College *

*We aren’t endorsed by this school

Course

276

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by JusticeAntelope23233

Report
Screenshot 1 Screenshot 2 Screenshot 3
Screenshot 4 Exploring Cryptography with the Enigma Simulator Introduction - This review will go over Enigma machine simulator application and how it was used to encrypt and decrypt any given name or text. Well known for its use during World War II by the Germans, the Enigma machine was seen as an innovative tool of the time since it served the purpose of creating elaborate ciphers. In this case, the simulator is meant to replicate how the Enigma worked and allow people to use it to experience other methods of encryption. Methodology - The simulator required putting a name into it while the rotors of the machine are set to a certain position to start. Then the name will be encrypted and then decrypted all while using the same settings. - Results and Discussion Screenshot 1: Initial Encryption Process - What is seen in the first screenshot is how the rotors of the simulator are set to the position ‘AAA’, which is the default setting. Using my own name ‘Carlos Menjivar”, I entered this into the input field. The output that is produced is now an encrypted version of my first name ‘PTFCS XVGR ELGQ.” This demonstrates how the Enigma functions to encrypt any text that it is given. - Some of the challenges experienced during this was trying to understand how the rotor settings operated since any variation of the input would result in a different output.
Screenshot 2: Resetting the Machine - The second visual is where the machine rotors are now reset back to ‘AAA.” Previously, I encrypted my name, “Carlos Menjivar” for the input. Although the output isn’t shown here, it is expected that my name will be decrypted back to the original format as long as the settings stay the same. - One of the challenges in this step was making sure that the machine was set back to the default settings before trying to decrypt, that way any potential errors could be avoided. Screenshot 3: Alternate Rotor Settings - This screenshot shows what occurs when the settings is changed to ‘CCB.” Now we enter the encrypted text into the machine “PTFCZXVKRJEJGQ.” Now, the output has changed to “DGBMB UOVKE KNHR" because of how the rotor setting has changed. The Enigma has produced a totally different encrypted message. - Here I understood how sensitive the machine is when just altering the settings. The encryption process was affected in a drastic way. Screenshot 4: Demonstrating Polyalphabetic Cipher - In the last screenshot the rotor settings changed back to the original ‘AAA.” The letter ‘A’ was input many times and the result of each was a different letter. This shows us how the machine uses a polyalphabetic, a type of substitution cipher, therefore making it more secure against frequency analysis. - The challenge was working with the complexity of the machine, although seeing why it is considered effective in securing communications. Conclusion - Overall, the Enigma simulator provided me with an experience that helped me understand how encryption and decryption works in a machine like this. There were many challenges faced along the way but helped me cultivate skills in paying attention to the little details and working with resources. This type of hands-on activity gave me a lot of insight into how the encryption process has changed dramatically over history and how in-depth cryptographic systems go.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help