Jump to content

Recommended Posts

Posted

There are hundreds of these around the internet, but here is my version of the Enigma Machine in UDF form.

It can be used for simple string, or for entire files.  I don't recommend it for highly sensitive data, but is good for simple encryption or just for fun.

There are no global variables used, and you can have multiple instances (if you find you need it).

Enigma.zipFetching info...

Posted
  On 9/28/2023 at 11:20 PM, willichan said:

I don't recommend it for highly sensitive data

Expand  

Or any kind of data which you don't want people to see, because it was cracked in WW2 by Alan Turing himself :lol:

EasyCodeIt - A cross-platform AutoIt implementation - Fund the development! (GitHub will double your donations for a limited time)

DcodingTheWeb Forum - Follow for updates and Join for discussion

Posted

If you read the Wikipedia article in full, you will see that many more people were involved. Not only Alan Turing :)

My UDFs and Tutorials:

  Reveal hidden contents

 

Posted

This article describes who was involved in cracking the Enigma.

My UDFs and Tutorials:

  Reveal hidden contents

 

Posted

@water Thanks, the article was too long so I asked ChatGPT to give me the brief:

  Quote

Alan Turing and his team at Bletchley Park were not the first to crack the Enigma code, but they made significant and pioneering contributions to the codebreaking efforts. Polish cryptanalysts, including Marian Rejewski, had made earlier breakthroughs in understanding the Enigma machine's workings during the 1930s.

The Polish Cipher Bureau had already developed techniques to decrypt Enigma-encrypted messages before World War II. They shared their knowledge with the British and French, providing them with valuable insights. However, it was Turing and his colleagues who further developed and refined these techniques, especially for the more complex versions of the Enigma machine used by the German military during the war.

So, while Turing and his team were not the first to crack Enigma, they played a crucial role in significantly enhancing and expanding the codebreaking efforts, ultimately contributing to the Allies' success in deciphering Enigma-encrypted messages during World War II.

Expand  

Bonus: Turing's contributions:

  Reveal hidden contents

 

EasyCodeIt - A cross-platform AutoIt implementation - Fund the development! (GitHub will double your donations for a limited time)

DcodingTheWeb Forum - Follow for updates and Join for discussion

Posted
  On 9/29/2023 at 12:23 AM, TheDcoder said:

Or any kind of data which you don't want people to see, because it was cracked in WW2 by Alan Turing himself :lol:

Expand  

Thanks for the "like", TheDcoder.

It is true that many messages from the Nazi machine were cracked.  This was because of flaws in the system that Turning and his team exploited, which allowed them to work backwards to find the machine setup for that day.

  • First, they could assume that text like "Hail Hitler" would appear toward the end of the message.
  • Second, they could assume that no letter would encrypt to itself.  For Example "t" would not encrypt to "t"
  • Third, once a single message was cracked for the day, they could assume the same settings for the remainder of the day.

Fortunately, my rendition has a few differences.

  • Although based on the mechanics of the Enigma machine, I am not limited by the physical, so my version can potentially encode a character to itself.
  • No assumptions can be made about the contents of one encrypted sample, and apply it to another as universally as containing a common phrase, or using the same configuration for each encryption during the day.
  • The Enigma machine was limited to just letters and numbers, without upper and lower case differentiation.  I am able to work with a full 256 characters in each byte of data, including non-printable characters.  (exponentially more possibilities to try).

That said, I might trust this for simple needs, but would not recommend it over modern encryption methods available, should higher security be needed.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...