From the course: Learning Cryptography and Network Security

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Solution: Coding with the Enigma

Solution: Coding with the Enigma

From the course: Learning Cryptography and Network Security

Start my 1-month free trial

Solution: Coding with the Enigma

(upbeat music) - [Instructor] Okay, now let's check our work. First, we're at the webpage and we've reloaded the page and also I need to go to decode, now where it says Ciphertext I need to take out what's in there and then we're going to enter this code as you see here. And using my app always on top, I can just use a copy and paste that, but then over here we need to change the position of the rotors. I'll minimize that. And now we can watch how that changes. And we set the settings at S U N and now we can see the plain text is cryptography. Now, as you can see the Enigma can provide a powerful method to conceal data. I met this webpage here where we can see a little article about how during war time the machine was fiercely protected. In this article, we can see that the Royal Navy was able to capture the Enigma on May 9th, 1941. And although the Germans thought the Enigma had been lost at sea, that was not…

Contents