List of Enigma machine simulators lists software implementations of the Enigma machine, a rotor cypher device that was invented by German engineer Arthur Scherbius at the end of World War I. [1] and used in the early- to mid-20th century to protect commercial, [2] diplomatic, and military communication. [3]
Name | Platform | Machine types | Uhr | UKW-D |
---|---|---|---|---|
EnigmaZone [4] | Windows | Enigma I, M3, M4, plus German and English decryption tool | No | No |
enKor's CryptoMuseum [5] | C# | Any Enigma - fully configurable Rotors, Plugboard and Reflector. Sample models: German Railway (Rocket), Swiss K | No | Yes |
Web Encryptor - The Online Encrypter [6] | React App | Enigma I, M3 (Army/Navy), M4 (Army/Navy), Railway, Tirpitz, Zahlwerk (Default/G-260/G-312), Swiss-K (Air Force/Commercial) | No | Yes |
Franklin Heath Enigma Simulator [7] | Android | K Railway, Kriegsmarine M3, M4 | No | No |
EnigmAndroid [8] | Android | Wehrmacht I, Kriegsmarine M3, M4, Abwehr G31, G312, G260, D, K, Swiss-K, KD, R, T | No | No |
Andy Carlson Enigma Applet (Standalone Version) [9] | Java | Kriegsmarine M3, M4 | No | No |
Minarke (Minarke Is Not A Real Kriegsmarine Enigma) [10] | C/Posix/CLI (MacOS, Linux, UNIX, etc.) | Wehrmacht, Kriegsmarine, M3, M4 | No | No |
Russell Schwager Enigma Simulator [11] | Java | Kriegsmarine M3 | No | No |
Lucas Santos' Enigma Simulator [12] | Javascript | Wehrmacht I | No | No |
PA3DBJ G-312 Enigma Simulator [13] | Javascript | G312 Abwehr | No | No |
Daniel Palloks Universal Enigma [14] | Javascript | I (Wehrmacht), M3 (Kriegsmarine), M4 (Shark), D (commercial), K (Swiss), KD (Sweden), N (Norenigma), R (Railway), S (Sondermaschine), T (Tirpitz/Japan), A-865 (Zählwerk), G-111 (Hungary/Munich), G-260 (Abwehr/Argentina), G-312 (Abwehr/Bletchley Park) | Yes | Yes |
Universal Enigma Machine Simulator [15] | Javascript | D, I, Norway, M3, M4, Zählwerk, G, G-111, G-260, G-312, K, Swiss-K, KD, Railway, T | Yes | Yes |
Virtual Enigma 3D [16] | JavaScript | Wehrmacht, Kriegsmarine M4 | No | No |
Terry Long Enigma Simulator [17] | MacOS | Kriegsmarine M3 | No | No |
Paul Reuvers Enigma Simulator for RISC OS [18] | RISC OS | Kriegsmarine M3, M4, G-312 Abwehr | No | No |
Enigma Windows Simulator [19] | Windows | Wehrmacht, Luftwaffe | No | No |
Dirk Rijmenants Enigma Simulator v7.0 [20] | Windows | Wehrmacht, Kriegsmarine M3, M4 | No | No |
Frode Weierud Enigma Simulators [21] | Windows | Abwehr, Kriegsmarine M3, M4, Railway | No | No |
Alexander Pukall Enigma Simulator | Windows | Wehrmacht, Luftwaffe | No | No |
CrypTool 2 — Enigma component and cryptanalysis [22] | Windows | A/B/D (commercial), Abwehr, Reichsbahn, Swiss-K, Enigma M3, Enigma M4 | No | No |
Marcos Velasco - MV Enigma Simulator [23] | Windows | Enigma M3 | No | No |
Bletchley Park is an English country house and estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following 1883 for the financier and politician Herbert Leon in the Victorian Gothic, Tudor and Dutch Baroque styles, on the site of older buildings of the same name.
Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.
The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the German military. The Enigma machine was considered so secure that it was used to encipher the most top-secret messages.
In cryptography, encryption is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Despite its goal, encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.
In the history of cryptography, Typex machines were British cipher machines used from 1937. It was an adaptation of the commercial German Enigma with a number of enhancements that greatly increased its security. The cipher machine was used until the mid-1950s when other more modern military encryption systems came into use.
A simulation is an imitative representation of a process or system that could exist in the real world. In this broad sense, simulation can often be used interchangeably with model. Sometimes a clear distinction between the two terms is made, in which simulations require the use of models; the model represents the key characteristics or behaviors of the selected system or process, whereas the simulation represents the evolution of the model over time. Another way to distinguish between the terms is to define simulation as experimentation with the help of a model. This definition includes time-independent simulations. Often, computers are used to execute the simulation.
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link. The requirement that both parties have access to the secret key is one of the main drawbacks of symmetric-key encryption, in comparison to public-key encryption. However, symmetric-key encryption algorithms are usually better for bulk encryption. With exception of the one-time pad they have a smaller key size, which means less storage space and faster transmission. Due to this, asymmetric-key encryption is often used to exchange the secret key for symmetric-key encryption.
William Frederick Friedman was a US Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s. In 1940, subordinates of his led by Frank Rowlett broke Japan's PURPLE cipher, thus disclosing Japanese diplomatic secrets before America's entrance into World War II.
A Stewart platform is a type of parallel manipulator that has six prismatic actuators, commonly hydraulic jacks or electric linear actuators, attached in pairs to three positions on the platform's baseplate, crossing over to three mounting points on a top plate. All 12 connections are made via universal joints. Devices placed on the top plate can be moved in the six degrees of freedom in which it is possible for a freely-suspended body to move: three linear movements x, y, z, and the three rotations.
David Kahn was an American historian, journalist, and writer. He wrote extensively on the history of cryptography and military intelligence.
The bombe was an electro-mechanical device used by British cryptologists to help decipher German Enigma-machine-encrypted secret messages during World War II. The US Navy and US Army later produced their own machines to the same functional specification, albeit engineered differently both from each other and from Polish and British bombes.
Havok is a middleware software suite developed by the Irish company Havok. Havok provides physics engine, navigation, and cloth simulation components that can be integrated into video game engines.
G-code is the most widely used computer numerical control (CNC) and 3D printing programming language. It is used mainly in computer-aided manufacturing to control automated machine tools, as well as for 3D-printer slicer applications. G-code has many variants.
Google Analytics is a web analytics service offered by Google that tracks and reports website traffic and also mobile app traffic and events, currently as a platform inside the Google Marketing Platform brand. Google launched the service in November 2005 after acquiring Urchin.
Hut 6 was a wartime section of the Government Code and Cypher School (GC&CS) at Bletchley Park, Buckinghamshire, Britain, tasked with the solution of German Army and Air Force Enigma machine cyphers. Hut 8, by contrast, attacked Naval Enigma. Hut 6 was established at the initiative of Gordon Welchman, and was run initially by Welchman and fellow Cambridge mathematician John Jeffreys.
This is a comparison of web frameworks for front-end web development that are reliant on JavaScript code for their behavior.
Internet art is a form of new media art distributed via the Internet. This form of art circumvents the traditional dominance of the physical gallery and museum system. In many cases, the viewer is drawn into some kind of interaction with the work of art. Artists working in this manner are sometimes referred to as net artists.
F-Droid is a free and open source app store and software repository for Android, serving a similar function to the Google Play store. The main repository, hosted by the project, contains only free and open source apps. Applications can be browsed, downloaded and installed from the F-Droid website or client app without the need to register an account. "Anti-features" such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.
WebAssembly (Wasm) defines a portable binary-code format and a corresponding text format for executable programs as well as software interfaces for facilitating communication between such programs and their host environment.