List of Enigma machine simulators lists software implementations of the Enigma machine, a rotor cypher device that was invented by German engineer Arthur Scherbius at the end of World War I. [1] and used in the early- to mid-20th century to protect commercial, [2] diplomatic, and military communication. [3]
Name | Platform | Machine types | Uhr | UKW-D |
---|---|---|---|---|
EnigmaZone [4] | Windows | Enigma I, M3, M4, plus German and English decryption tool | No | No |
enKor's CryptoMuseum [5] | C# | Any Enigma - fully configurable Rotors, Plugboard and Reflector. Sample models: German Railway (Rocket), Swiss K | No | Yes |
Web Encryptor - The Online Encrypter [6] | React App | Enigma I, M3 (Army/Navy), M4 (Army/Navy), Railway, Tirpitz, Zahlwerk (Default/G-260/G-312), Swiss-K (Air Force/Commercial) | No | Yes |
Franklin Heath Enigma Simulator [7] | Android | K Railway, Kriegsmarine M3, M4 | No | No |
EnigmAndroid [8] | Android | Wehrmacht I, Kriegsmarine M3, M4, Abwehr G31, G312, G260, D, K, Swiss-K, KD, R, T | No | No |
Andy Carlson Enigma Applet (Standalone Version) [9] | Java | Kriegsmarine M3, M4 | No | No |
Minarke (Minarke Is Not A Real Kriegsmarine Enigma) [10] | C/Posix/CLI (MacOS, Linux, UNIX, etc.) | Wehrmacht, Kriegsmarine, M3, M4 | No | No |
Russell Schwager Enigma Simulator [11] | Java | Kriegsmarine M3 | No | No |
Lucas Santos' Enigma Simulator [12] | Javascript | Wehrmacht I | No | No |
PA3DBJ G-312 Enigma Simulator [13] | Javascript | G312 Abwehr | No | No |
Daniel Palloks Universal Enigma [14] | Javascript | I (Wehrmacht), M3 (Kriegsmarine), M4 (Shark), D (commercial), K (Swiss), KD (Sweden), N (Norenigma), R (Railway), S (Sondermaschine), T (Tirpitz/Japan), A-865 (Zählwerk), G-111 (Hungary/Munich), G-260 (Abwehr/Argentina), G-312 (Abwehr/Bletchley Park) | Yes | Yes |
Universal Enigma Machine Simulator [15] | Javascript | D, I, Norway, M3, M4, Zählwerk, G, G-111, G-260, G-312, K, Swiss-K, KD, Railway, T | Yes | Yes |
Virtual Enigma 3D [16] | JavaScript | Wehrmacht, Kriegsmarine M4 | No | No |
Terry Long Enigma Simulator [17] | MacOS | Kriegsmarine M3 | No | No |
Paul Reuvers Enigma Simulator for RISC OS [18] | RISC OS | Kriegsmarine M3, M4, G-312 Abwehr | No | No |
Enigma Windows Simulator [19] | Windows | Wehrmacht, Luftwaffe | No | No |
Dirk Rijmenants Enigma Simulator v7.0 [20] | Windows | Wehrmacht, Kriegsmarine M3, M4 | No | No |
Frode Weierud Enigma Simulators [21] | Windows | Abwehr, Kriegsmarine M3, M4, Railway | No | No |
Alexander Pukall Enigma Simulator | Windows | Wehrmacht, Luftwaffe | No | No |
CrypTool 2 — Enigma component and cryptanalysis [22] | Windows | A/B/D (commercial), Abwehr, Reichsbahn, Swiss-K, Enigma M3, Enigma M4 | No | No |
Marcos Velasco - MV Enigma Simulator [23] | Windows | Enigma M3 | No | No |
Bletchley Park is an English country house and estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following 1883 for the financier and politician Herbert Leon in the Victorian Gothic, Tudor and Dutch Baroque styles, on the site of older buildings of the same name.
Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.
The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the German military. The Enigma machine was considered so secure that it was used to encipher the most top-secret messages.
In cryptography, SHA-1 is a hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest – typically rendered as 40 hexadecimal digits. It was designed by the United States National Security Agency, and is a U.S. Federal Information Processing Standard. The algorithm has been cryptographically broken but is still widely used.
In the history of cryptography, Typex machines were British cipher machines used from 1937. It was an adaptation of the commercial German Enigma with a number of enhancements that greatly increased its security. The cipher machine was used until the mid-1950s when other more modern military encryption systems came into use.
A simulation is an imitative representation of a process or system that could exist in the real world. In this broad sense, simulation can often be used interchangeably with model. Sometimes a clear distinction between the two terms is made, in which simulations require the use of models; the model represents the key characteristics or behaviors of the selected system or process, whereas the simulation represents the evolution of the model over time. Another way to distinguish between the terms is to define simulation as experimentation with the help of a model. This definition includes time-independent simulations. Often, computers are used to execute the simulation.
William Frederick Friedman was a US Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s. In 1940, subordinates of his led by Frank Rowlett broke Japan's PURPLE cipher, thus disclosing Japanese diplomatic secrets before America's entrance into World War II.
The New Grove Dictionary of Music and Musicians is an encyclopedic dictionary of music and musicians. Along with the German-language Die Musik in Geschichte und Gegenwart, it is one of the largest reference works on the history and theory of music. Earlier editions were published under the titles A Dictionary of Music and Musicians, and Grove's Dictionary of Music and Musicians; the work has gone through several editions since the 19th century and is widely used. In recent years it has been made available as an electronic resource called Grove Music Online, which is now an important part of Oxford Music Online.
A Stewart platform is a type of parallel manipulator that has six prismatic actuators, commonly hydraulic jacks or electric linear actuators, attached in pairs to three positions on the platform's baseplate, crossing over to three mounting points on a top plate. All 12 connections are made via universal joints. Devices placed on the top plate can be moved in the six degrees of freedom in which it is possible for a freely-suspended body to move: three linear movements x, y, z, and the three rotations.
David Kahn was an American historian, journalist, and writer. He wrote extensively on the history of cryptography and military intelligence.
The bombe was an electro-mechanical device used by British cryptologists to help decipher German Enigma-machine-encrypted secret messages during World War II. The US Navy and US Army later produced their own machines to the same functional specification, albeit engineered differently both from each other and from Polish and British bombes.
G-code is the most widely used computer numerical control (CNC) and 3D printing programming language. It is used mainly in computer-aided manufacturing to control automated machine tools, as well as for 3D-printer slicer applications. The G stands for geometry. G-code has many variants.
Google Analytics is a web analytics service offered by Google that tracks and reports website traffic and also mobile app traffic & events, currently as a platform inside the Google Marketing Platform brand. Google launched the service in November 2005 after acquiring Urchin.
CrypTool is an open-source project that is a free e-learning software for illustrating cryptographic and cryptanalytic concepts. According to "Hakin9", CrypTool is worldwide the most widespread e-learning software in the field of cryptology.
This is a comparison of web frameworks for front-end web development that are heavily reliant on JavaScript code for their behavior.
F-Droid is an open-source app store and software repository for Android, serving a similar function to the Google Play store. The main repository, hosted by the project, contains only free and open source apps. Applications can be browsed, downloaded and installed from the F-Droid website or client app without the need to register an account. "Anti-features" such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.
WebAssembly (Wasm) defines a portable binary-code format and a corresponding text format for executable programs as well as software interfaces for facilitating interactions between such programs and their host environment.
About 7,500 women worked in Bletchley Park, the central site for British cryptanalysts during World War II. Women constituted roughly 75% of the workforce there. While women were overwhelmingly under-represented in high-level work such as cryptanalysis, they were employed in large numbers in other important areas, including as operators of cryptographic and communications machinery, translators of Axis documents, traffic analysts, clerical workers, and more. Women made up the majority of Bletchley Park’s workforce, most enlisted in the Women’s Royal Naval Service, WRNS, nicknamed the Wrens.