Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

EnigmaNDS: Difference between revisions

From GameBrew
No edit summary
No edit summary
Line 24: Line 24:
Theoretically the application can encrypt text with a key (rotors, initial position of the rotors and configuration of the steckers) and if later, the text shown above, the ciphertext is re-encrypted with the same key, you get the original text.  
Theoretically the application can encrypt text with a key (rotors, initial position of the rotors and configuration of the steckers) and if later, the text shown above, the ciphertext is re-encrypted with the same key, you get the original text.  


That is, if "HELLO" is encrypted, the machine encrypts it as "OIIQ". If you put the rotors back in the position for the encrypted code "OIIQ", the screen would appear the decrypted text: "HELLO".
That is, if HELLO is encrypted, the machine encrypts it as OIIQ. If you put the rotors back in the position for the encrypted code OIIQ, the screen would appear the decrypted text: HELLO.


==Controls==
==Controls==

Revision as of 11:08, 24 Mayıs 2021

Enigma NDS
File:Enigmads.jpg
General
Author(s)mincemeatteam
TypeOther
Version1.0
LicenceMixed
Links
[Media:Enigma10nds.zip Download]
Website
Advertisements

<htmlet>adsense</htmlet>


EnigmaNDS is a Enigma machine simulator playful and educational purposes.

Implements the algorithm required to simulate the three-rotor Enigma machine, and can select from five possible addition to the functions of steckers.

It was participate in the Scenery Beta 2011.

User guide

The Enigma machine is the machine used by the Germans to encrypt their communications in the 2nd World War. It was a transposition cipher machine by rotating.

EnigmaNDS simulates the original version of the Enigma, which worked with 3 rotors, selected from among 5 possible ones, it allows setting the position and number of the rotor, and we also simulated the function of the steckers (a front panel that allowed to perform a previous permutation to encryption).

Theoretically the application can encrypt text with a key (rotors, initial position of the rotors and configuration of the steckers) and if later, the text shown above, the ciphertext is re-encrypted with the same key, you get the original text.

That is, if HELLO is encrypted, the machine encrypts it as OIIQ. If you put the rotors back in the position for the encrypted code OIIQ, the screen would appear the decrypted text: HELLO.

Controls

Uses Stylus.


Advertising: