cryptanalysis 4

Cryptanalysis

One of the first true difficult cryptanalysis and hacking examples was the enigma machine. In this assignment, you will encrypt your own crafted message utilizing the tools featured in Chapter 3 of the text.

For this assignment, you will:

  • Visit this website: Navy M3/M4 Enigma Machine Emulator
  • Encrypt the following message: Cypher codes are fun.
  • Change the Umkehrwalze, Walzenlage, Ringstellung, Grundstellung, and input your text letter.

Record all the settings.

  • Repeat this process three times.

Upon completion of your encryption exercise, read through the following related summary “How Enigma Machines Work.”

To summarize your encryption experience, write a short paper discussing how cypher text machines work and approximately how long it would take to break your code using a standard brute force method.

Your paper is required to be 2-3 pages in length, not including the title and references pages, and should cite at least one scholarly resource other than the course materials. It should follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

"Is this question part of your assignment? We can help"

ORDER NOW