ENIGMA MACHINE RESOURCES

ENIGMA MACHINE RESOURCES :

ENIGMA PRO :

(with PASSWORD support!)
EnigmaInside

You can find description and other
technical information about ENIGMA machine here:

  Source

==============================================================
 How to encrypt the message using this machine:
———————————————
1. Press “Reset Enigma” button.
2. Make sure “Encrypt” option is selected.
3. Type a message using the Virtual Keyboard.
4. Write down the result string (use paper & pencil).
============================================================


==============================================================
How to decrypt the message using this machine:
———————————————
1. Press “Reset Enigma” button.
2. Make sure “Decrypt” option is selected.
3. Look at the recorded message (it should be written
on paper using pencil or pen).
4. Type this encrypted text using the Virtual Keyboard.
5. You should receive the original message!
======================================
Copyright (C) 2005 Free Code
http://www.emu8086.com/vb/
=======================================

ENIGMA SIMULATOR v6.3.0

 Source

emuleEnigma_Simulator (ed2k-eMule Client is required)

The Enigma Enciphering and Deciphering Machine
(Encryption and Decryption)

DOWNLOAD Military Enigma Machine (Binary and Visual Basic Source Code)

DOWNLOAD. Enigma Machine PRO (Binary and Visual Basic Source Code)

note: binary files may require Microsoft’s Visual Basic 6.0 Runtime Library

The real mechanical machine was used during the World War II, not so long ago, just about 60 years ago :) It was believed that the encryption is unbreakable, just like today’s popular 128 bit encryption, but in truth it wasn’t so, the encryption was cracked down and decrypted using another machine. Today’s technologies allow us to make a much simpler versions of the original mechanical machines. I do not trust 128 and 512 bit encryptions, if there will something that I’d like to encrypt I’d use 32768 bit encryption because now the speed of encryption and decryption is much and much faster. In the old days it was required to have at least 2 people for easy operation, and a huge brute force of people who were intercepting the radio signals, and some luck for getting a real copy of the original machine :) Now days anyone can make such machine. This version is programmed in Microsoft Visual Basic, however a much easier and smaller model of this machine can be coded in Assembly Language. If you’d be successful in making your own code breaking machine you should be able to decipher several secret messages that are in the bottom of this page, or you’d have to use VB’s version or just look at the weird character set and say hmm…. :)

For more information about the Real Enigma Machine and screenshots click here.

These are the instructions for Basic Enigma machine only, a team of 2 people is recommended

===============================================
How to encrypt the message using this machine:
———————————————
1. Press “Reset Enigma” button.
2. Make sure “Encrypt” option is selected.
3. Type a message using the Virtual Keyboard.
4. Write down the result string – use paper & pencil.
===========================================

===============================================
How to decrypt the message using this machine:
———————————————
1. Press “Reset Enigma” button.
2. Make sure “Decrypt” option is selected.
3. Look at the recorded message – it should be written on paper using pencil or pen.
4. Type this encrypted text using the Virtual Keyboard.
5. You should receive the original message!
===============================================

You can use Cut and Paste as well, but you have to press Enter key in “Source” text box, this way only 1 person is sufficient.

The following message is encrypted by the Enigma Pro Machine without any password – the wheels are not twisted. The amount of the cypertext should be enough to make a lexical analysis even without looking at the source code.

updateipx

enigma_device_01

-Enigma Device for Amiga 500

-Download

enigma_device_03


%d bloggers like this: