Hands-on applets for Elements of Cryptanalysis
← Back to course home · Course book → · Presentation slides →Part I — Foundations of Cryptanalysis (Chapters 1–3)
Part IV — The Enigma Machine (Chapters 10–12)
Interactive simulation of the Enigma I cipher machine. Configure rotors, ring settings, and plugboard. Watch the signal path animate through the encryption circuit.
Chapter 10Step through Rejewski's cryptanalysis of the Enigma indicator system. Build characteristic permutations, compute cycle structures, and recover the secret Grundstellung.
Chapter 11See how Rejewski recovered the Enigma's secret rotor wiring using permutation algebra and leaked daily keys. Strip known components and propagate constraints to reconstruct the unknown wiring.
Chapter 11Watch perforated sheets narrow down the Grundstellung one female at a time. Each overlay eliminates impossible rotor positions until only the true setting remains.
Chapter 11bWatch the Bombe search through rotor positions, propagate constraints through menu loops, and recover Enigma settings from a known-plaintext crib.
Chapter 12Part VI — Linear Cryptanalysis (Chapters 16–18)
Part IX — RSA and Factoring (Chapters 25–27)
Part XIV — Lattice-Based Cryptography (Chapters 40–42)