enigma - The Enigma Its Operation, Power, and Vulnerability...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
The Enigma Its Operation, Power, and Vulnerability Presented by Goodson, Kaur, Marks, Yang, Blazado
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Agenda Description/Physical Features Operation/Setup Cipher Power Vulnerabilities: What the Germans did Wrong Summary
Background image of page 2
Enigma A family of related electro-mechanical rotor machines used for the encryption and decryption of secret messages Keyboard Plugboard Lampboard Rotors
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Operation Keyboar d Plugboar d Lamp Board Reflecto r “Q” Type in “A” Lights up “Q” Rotors (3 for Air Force and Army; 4 for Navy) Put “Q” in cyper-text Read “A” from plain-text “A”
Background image of page 4
Plugboard If the plug board socket contains a connector, its identity is switched in a monoalphabetic substitution The plugboard contributed significantly more complexity than the rotors
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Rotors Each of these has twenty-six contacts on each of its faces Cross-wired in a random fashion
Background image of page 6
Rotors /Reflector The identity of an incoming character is changed three times With each keyboard input the extreme right-hand wheel moves one position Reflector changes the signal's and also sends it back to the entry stator.
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
A minimum of 7 remapping (the current passes through the rotors
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 20

enigma - The Enigma Its Operation, Power, and Vulnerability...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online