One of the first truly difficult cryptanalysis and hacking examples was the enigma machine. In this assignment, you will encrypt your own crafted message utilizing the tools featured in Chapter 3 of the text.

For this assignment, you will:

  • Visit this website: http://enigma.louisedade.co.uk/enigma.html
  • Encrypt the following message: Cypher codes are fun.
  • Change the Umkehrwalze, Walzenlage, Ringstellung, Grundstellung and input your text letter.
  • Record all the settings.
  • Repeat this three times.

Upon completion of your encryption exercise, read through the following related summary: http://enigma.louisedade.co.uk/howitworks.html

To summarize your encryption experience, write a short paper discussing how cypher text machines work and approximately how long it would take to break your code using a standard brute force method.

Your paper should be 3 pages in length, not including the title and references pages, and should cite at least two scholarly resources other than the course materials. Include proper introduction and labeled conclusion. It should follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

Course material is attached.

It is strongly encouraged that you submit all assignments to the Turnitin Originality Check prior to submitting it to your instructor for grading.