Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

EnigmaNDS: Difference between revisions

From GameBrew
No edit summary
No edit summary
 
(17 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{Infobox homebrew
{{Infobox DS Homebrews
| title       = EnigmaNDS
|title=Enigma NDS
| image       = [[File:Enigmads.jpg|300px]]
|image=enigmands.png
| type       = Other
|description=Enigma machine simulator.
| version     = 1.0
|author=mincemeatteam
| licence    = Mixed
|lastupdated=2011/07/01
| author      = mincemeatteam
|type=Other Apps
| website     = http://mincemeatteam.eshost.es/enigma.php#
|version=1.0
| download    = Media:Enigma10nds.zip
|license=Mixed
| source      =
|download=https://dlhb.gamebrew.org/dshomebrew2/enigmands_1.0.zip
}}  
|website=http://mincemeatteam.eshost.es/enigma.php
}}
EnigmaNDS is a simulator of the Enigma machine.


EnigmaNDS is a Enigma machine simulator playful and educational purposes.
It was a contest entry to the Scenery Beta 2011 (NDS Applications, 3rd place).


Implements the algorithm required to simulate the three-rotor Enigma machine, and can select from five possible addition to the functions of steckers.
==User guide==
The Enigma machine was used by the Germans to encrypt their communications during the 2nd World War. It was a machine based on rotary substitution encryption.


It was participate in the Scenery Beta 2011.
EnigmaNDS simulates the original version of the Enigma, which operated with 3 rotors selected from 5 possibilities. It allows you to configure the rotor position and number, and also simulates the function of the steckers (a front panel that allowed for a preliminary permutation before encryption).  


==User guide==
Theoretically the application can encrypt text with a key (rotors, initial position of the rotors and configuration of the steckers). If later, the text shown above, the ciphertext is re-encrypted with the same key, you get the original text.  
The Enigma machine is the machine used by the Germans to encrypt their communications in the 2nd World War. It was a transposition cipher machine by rotating.  


It worked with three rotors, chosen from a possible 5, and to configure the number of rotor position, and also simulate the function of steckers (a front panel allowing to perform a pre-trade encryption).  
That is, if HELLO is encrypted, the machine encrypts it as OIIQ. If you put the rotors back in the position for the encrypted code OIIQ, the screen would appear the decrypted text: HELLO.


Theoretically the application can encrypt text with a key (rotors, rotor position and configuration of the steckers) and if then, the text shows up, the ciphertext is re-encrypted with the same key, you get the original text.  
==Controls==
Operate with Stylus.


That is, if you figure "hello", and the machine will figure as "OIIQ", then if we put the rotor in the position they were when they encrypt "Hello", if we encrypt "OIIQ" should appear on the screen deciphered text: "HELLO".
==Screenshots==
https://dlhb.gamebrew.org/dshomebrew/enigmands2.png
https://dlhb.gamebrew.org/dshomebrew/enigmands3.png


==Controls==
==External links==
Uses Stylus.
* Author's website - http://mincemeatteam.eshost.es/enigma.php
* SceneBeta - https://nds.scenebeta.com/noticia/enigmands


[[Category:Homebrew applications]]
[[Category:Scenery Beta 2011]]

Latest revision as of 12:51, 20 August 2024

Enigma NDS
Enigmands.png
General
Authormincemeatteam
TypeOther Apps
Version1.0
LicenseMixed
Last Updated2011/07/01
Links
Download
Website

EnigmaNDS is a simulator of the Enigma machine.

It was a contest entry to the Scenery Beta 2011 (NDS Applications, 3rd place).

User guide

The Enigma machine was used by the Germans to encrypt their communications during the 2nd World War. It was a machine based on rotary substitution encryption.

EnigmaNDS simulates the original version of the Enigma, which operated with 3 rotors selected from 5 possibilities. It allows you to configure the rotor position and number, and also simulates the function of the steckers (a front panel that allowed for a preliminary permutation before encryption).

Theoretically the application can encrypt text with a key (rotors, initial position of the rotors and configuration of the steckers). If later, the text shown above, the ciphertext is re-encrypted with the same key, you get the original text.

That is, if HELLO is encrypted, the machine encrypts it as OIIQ. If you put the rotors back in the position for the encrypted code OIIQ, the screen would appear the decrypted text: HELLO.

Controls

Operate with Stylus.

Screenshots

enigmands2.png enigmands3.png

External links

Advertising: