One of the first truly difficult
cryptanalysis and hacking examples was the enigma machine. In this
assignment, you will encrypt your own crafted message utilizing the
tools featured in Chapter 3 of the text.
undefined
For this assignment, you will:
undefined
- Visit this website: https://observablehq.com/@tmcw/enigma-machine
- Encrypt the following message: Cyphers are fun.
- Repeat this process a few times to see how it works.
undefined
Upon completion of your encryption
exercise, read through the following related summary and experiment with
this version of an enigma machine:https://www.101computing.net/enigma-machine-emulator/
undefined
To summarize your encryption
experience, write a short paper discussing how cypher text machines work
and approximately how long it would take to break your code using a
standard brute force method.
undefined
Your paper is required to be 2-3
pages in length, not including the title and reference pages, and should
cite at least one scholarly resource other than the course materials.
It should follow Saudi Electronic University academic writing standards
and APA style guidelines, as appropriate.


0 comments