List of Enigma machine simulators

Last updated

List of Enigma machine simulators lists software implementations of the Enigma machine, a rotor cypher device that was invented by German engineer Arthur Scherbius at the end of World War I. [1] and used in the early- to mid-20th century to protect commercial, [2] diplomatic, and military communication. [3]

Contents

List of Enigma simulators

NamePlatformMachine types Uhr UKW-D
EnigmaZone [4] WindowsEnigma I, M3, M4, plus German and English decryption toolNoNo
enKor's CryptoMuseum [5] C#Any Enigma - fully configurable Rotors, Plugboard and Reflector. Sample models: German Railway (Rocket), Swiss KNoYes
Web Encryptor - The Online Encrypter [6] React App Enigma I, M3 (Army/Navy), M4 (Army/Navy), Railway, Tirpitz, Zahlwerk (Default/G-260/G-312), Swiss-K (Air Force/Commercial)NoYes
Franklin Heath Enigma Simulator [7] AndroidK Railway, Kriegsmarine M3, M4NoNo
EnigmAndroid [8] AndroidWehrmacht I, Kriegsmarine M3, M4, Abwehr G31, G312, G260, D, K, Swiss-K, KD, R, TNoNo
Andy Carlson Enigma Applet (Standalone Version) [9] JavaKriegsmarine M3, M4NoNo
Minarke (Minarke Is Not A Real Kriegsmarine Enigma) [10] C/Posix/CLI (MacOS, Linux, UNIX, etc.)Wehrmacht, Kriegsmarine, M3, M4NoNo
Russell Schwager Enigma Simulator [11] JavaKriegsmarine M3NoNo
Lucas Santos' Enigma Simulator [12] JavascriptWehrmacht INoNo
PA3DBJ G-312 Enigma Simulator [13] JavascriptG312 AbwehrNoNo
Daniel Palloks Universal Enigma [14] JavascriptI (Wehrmacht), M3 (Kriegsmarine), M4 (Shark), D (commercial), K (Swiss), KD (Sweden), N (Norenigma), R (Railway), S (Sondermaschine), T (Tirpitz/Japan), A-865 (Zählwerk), G-111 (Hungary/Munich), G-260 (Abwehr/Argentina), G-312 (Abwehr/Bletchley Park)YesYes
Universal Enigma Machine Simulator [15] JavascriptD, I, Norway, M3, M4, Zählwerk, G, G-111, G-260, G-312, K, Swiss-K, KD, Railway, TYesYes
Virtual Enigma 3D [16] JavaScriptWehrmacht, Kriegsmarine M4NoNo
Terry Long Enigma Simulator [17] MacOSKriegsmarine M3NoNo
Paul Reuvers Enigma Simulator for RISC OS [18] RISC OSKriegsmarine M3, M4, G-312 AbwehrNoNo
Dirk Rijmenants Enigma Simulator v7.0 [19] WindowsWehrmacht, Kriegsmarine M3, M4NoNo
Frode Weierud Enigma Simulators [20] WindowsAbwehr, Kriegsmarine M3, M4, RailwayNoNo
Alexander Pukall Enigma Simulator [21] WindowsWehrmacht, LuftwaffeNoNo
CrypTool 2 — Enigma component and cryptanalysis [22] WindowsA/B/D (commercial), Abwehr, Reichsbahn, Swiss-K, Enigma M3, Enigma M4NoNo
Marcos Velasco - MV Enigma Simulator [23] WindowsEnigma M3NoNo

Related Research Articles

<span class="mw-page-title-main">Bletchley Park</span> WWII code-breaking site and British country house

Bletchley Park is an English country house and estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following 1883 for the financier and politician Herbert Leon in the Victorian Gothic, Tudor and Dutch Baroque styles, on the site of older buildings of the same name.

<span class="mw-page-title-main">Cryptanalysis</span> Study of analyzing information systems in order to discover their hidden aspects

Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

<span class="mw-page-title-main">Enigma machine</span> German cipher machine

The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the German military. The Enigma machine was considered so secure that it was used to encipher the most top-secret messages.

<span class="mw-page-title-main">Squeak</span> Object-oriented programming language

Squeak is an object-oriented, class-based, and reflective programming language. It was derived from Smalltalk-80 by a group that included some of Smalltalk-80's original developers, initially at Apple Computer, then at Walt Disney Imagineering, where it was intended for use in internal Disney projects. The group would later go on to be supported by HP Labs, SAP, and most recently, Y Combinator.

<span class="mw-page-title-main">Typex</span> British cipher machine

In the history of cryptography, Typex machines were British cipher machines used from 1937. It was an adaptation of the commercial German Enigma with a number of enhancements that greatly increased its security. The cipher machine was used until the mid-1950s when other more modern military encryption systems came into use.

<span class="mw-page-title-main">Simulation</span> Imitation of the operation of a real-world process or system over time

A simulation is an imitative representation of a process or system that could exist in the real world. In this broad sense, simulation can often be used interchangeably with model. Sometimes a clear distinction between the two terms is made, in which simulations require the use of models; the model represents the key characteristics or behaviors of the selected system or process, whereas the simulation represents the evolution of the model over time. Another way to distinguish between the terms is to define simulation as experimentation with the help of a model. This definition includes time-independent simulations. Often, computers are used to execute the simulation.

<span class="mw-page-title-main">William F. Friedman</span> American cryptologist (1891–1969)

William Frederick Friedman was a US Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s. In 1940, subordinates of his led by Frank Rowlett broke Japan's PURPLE cipher, thus disclosing Japanese diplomatic secrets before America's entrance into World War II.

<i>The New Grove Dictionary of Music and Musicians</i> Encyclopedic dictionary of music and musicians

The New Grove Dictionary of Music and Musicians is an encyclopedic dictionary of music and musicians. Along with the German-language Die Musik in Geschichte und Gegenwart, it is one of the largest reference works on the history and theory of music. Earlier editions were published under the titles A Dictionary of Music and Musicians, and Grove's Dictionary of Music and Musicians; the work has gone through several editions since the 19th century and is widely used. In recent years it has been made available as an electronic resource called Grove Music Online, which is now an important part of Oxford Music Online.

<span class="mw-page-title-main">Stewart platform</span> Type of parallel manipulator

A Stewart platform is a type of parallel manipulator that has six prismatic actuators, commonly hydraulic jacks or electric linear actuators, attached in pairs to three positions on the platform's baseplate, crossing over to three mounting points on a top plate. All 12 connections are made via universal joints. Devices placed on the top plate can be moved in the six degrees of freedom in which it is possible for a freely-suspended body to move: three linear movements x, y, z, and the three rotations.

<span class="mw-page-title-main">David Kahn (writer)</span> American historian and writer (1930–2024)

David Kahn was an American historian, journalist, and writer. He wrote extensively on the history of cryptography and military intelligence.

<span class="mw-page-title-main">Bombe</span> Codebreaking device created at Bletchley Park (United Kingdom)

The bombe was an electro-mechanical device used by British cryptologists to help decipher German Enigma-machine-encrypted secret messages during World War II. The US Navy and US Army later produced their own machines to the same functional specification, albeit engineered differently both from each other and from Polish and British bombes.

G-code is the most widely used computer numerical control (CNC) and 3D printing programming language. It is used mainly in computer-aided manufacturing to control automated machine tools, as well as for 3D-printer slicer applications. The G stands for geometry. G-code has many variants.

<span class="mw-page-title-main">Google Analytics</span> Web analytics service from Google

Google Analytics is a web analytics service offered by Google that tracks and reports website traffic and also the mobile app traffic & events, currently as a platform inside the Google Marketing Platform brand. Google launched the service in November 2005 after acquiring Urchin.

<span class="mw-page-title-main">CrypTool</span>

CrypTool is an open-source project that is a free e-learning software for illustrating cryptographic and cryptanalytic concepts. According to "Hakin9", CrypTool is worldwide the most widespread e-learning software in the field of cryptology.

This is a comparison of web frameworks for front-end web development that are heavily reliant on JavaScript code for their behavior.

<span class="mw-page-title-main">F-Droid</span> Repository for free and open source Android apps

F-Droid is an open-source app store and software repository for Android, serving a similar function to the Google Play store. The main repository, hosted by the project, contains only free and open source apps. Applications can be browsed, downloaded and installed from the F-Droid website or client app without the need to register for an account. "Anti-features" such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.

<span class="mw-page-title-main">WebAssembly</span> Cross-platform assembly language and bytecode designed for execution in web browsers

WebAssembly defines a portable binary-code format and a corresponding text format for executable programs as well as software interfaces for facilitating interactions between such programs and their host environment.

<span class="mw-page-title-main">Women in Bletchley Park</span>

About 7,500 women worked in Bletchley Park, the central site for British cryptanalysts during World War II. Women constituted roughly 75% of the workforce there. While women were overwhelmingly under-represented in high-level work such as cryptanalysis, they were employed in large numbers in other important areas, including as operators of cryptographic and communications machinery, translators of Axis documents, traffic analysts, clerical workers, and more. Women made up the majority of Bletchley Park’s workforce, most enlisted in the Women’s Royal Naval Service, WRNS, nicknamed the Wrens.

References

  1. Singh, Simon (26 January 2011). The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Knopf Doubleday Publishing Group. ISBN   978-0-307-78784-2.
  2. Ratcliff, R. A. (14 August 2006). Delusions of Intelligence: Enigma, Ultra, and the End of Secure Ciphers. Cambridge University Press. p. 14. ISBN   978-0-521-85522-8. OCLC   234299179.
  3. Copeland, B Jack; Bowen, J P; Sprevak, Mark; Wilson, Robin J (2020). The Turing guide. Oxford: Oxford University Press. p. 85. ISBN   9780191916946. OCLC   1222774991.
  4. Steve Williams. "EnigmaZone".
  5. Martin Procházka (11 February 2022). "CryptoMuseum - Enigma source code". GitHub .
  6. Gabriel Inácio. "Web Encryptor - The Online Encrypter". google.com.
  7. Franklin Heath Ltd. "Enigma Simulator – Android Apps on Google Play". google.com.
  8. "F-Droid". f-droid.org.
  9. Andy Carlson, Enigma Applet (Standalone Version) Archived 21 January 2015 at the Wayback Machine
  10. John Gilbert, Minarke – A Terminal Friendly Enigma Emulator
  11. Russell Schwager, Enigma Simulator Russell Schwager Enigma Simulator
  12. "Enigma JS | Lucas Santos". Enigma JS | Lucas Santos. Retrieved 2022-11-23.
  13. PA3DBJ G-312, Enigma Simulator
  14. Daniel Palloks, Universal Enigma
  15. Summerside Makerspace, Universal Enigma Machine Simulator Archived 7 October 2016 at the Wayback Machine
  16. Gillow, Martin. "Virtual Enigma 3D". Virtual Colossus. Retrieved 27 April 2022.
  17. Terry Long, Enigma Simulator
  18. Reuvers, Paul (3 November 2016). "Enigma Simulator for RISC OS". Crypto Museum. Retrieved 27 April 2022.
  19. Dirk Rijmenants, Enigma Simulator v7.0
  20. Frode Weierud Enigma Simulators
  21. Alexander Pukall Wehrmacht / Luftwaffe Simulator
  22. CrypTool 2 Team, CrypTool 2 website Archived 19 July 2018 at the Wayback Machine
  23. Marcos Velasco Enigma Simulators