CS664 Saudi Electronic University MOD3 CH6 Encryption Fundamentals Paper
CS664 Saudi Electronic University MOD3 CH6 Encryption Fundamentals Paper
Hands-On Project – Enigma® machine simulator (100 points)
This project uses an Enigma® machine simulator. It functions like the Enigma machines used during WWII. This example has been included to help you better understand how encryption worked in the early days. It’s a great learning tool for when you first start exploring the subject of cryptography. Enigma machines provided fairly good encryption security for their day. Modern cryptographic systems are much more secure than Enigma machines.
Pay attention to the colored paths as you type. The red path goes through the three rotors, bounces off the reflector, becomes green, and then goes back through the three rotors. The right rotor moves with each keystroke. If it completes one full cycle, it will advance the middle rotor and subsequently the left rotor.
My first name and last name
Abdulrahman Albatel
Directions:
- Open a web browser and go to http://enigmaco.de/enigma/enigma.swf
- Use the left and right arrows to move each of the top three rotors so that each has the letter “A” selected in blue.
- Click in the Input text box in the bottom of your screen.
- Slowly type your first name and last name without a space. (If you make a typing error you can start over by pressing the backspace key.)
- Take a screenshot.
Note: The text in the Input text box is what you typed. The text in the Output text box is what you would send. You are now going to reset the dials to their original position (in this case AAA) and type the encrypted text (cipher text) you produced in the Output text box. You can copy the cipher text from the screenshot you just took. Subsequently, you should see your name reproduced in the bottom box. This is the equivalent of decrypting the message. - Click in the Input text box and backspace your name. (The rotors should be set back to their AAA position.)
- Refer back to the screenshot you just took and copy down the output (cipher text).
- Type the cipher text into the Input text box. (Type slowly so you don’t make a mistake and have to start over!)
- Take a screenshot with your name showing in the Output text box.
- Backspace the text in the Input text box.
- Slowly press the A key 10 times and notice how a different encrypted letter is chosen as output through the rotating dials even though you are hitting the same key each time.
- Take a screenshot.
Submit your screenshots and answer the following questions:
- Why did Enigma machines use multiple rotors?
- How did WWII cryptographers know which rotor settings to use?
Your well-written paper should meet the following requirements:
- 3-4 pages in length, not including the cover and reference pages
- Contain an illustrative table or a diagram created from properly cited external references
- Include two credible external references in addition to the textbook
- Formatted according to Saudi Electronic University and APA writing guidelines.
There is SafeAssign Plagiarism Checker, If your score is above 25%, you will want to edit your assignment before submitting it for grading.
course name: CS664: Cyber Security Defense and Countermeasures
Course Materials: Easttom, W. (2018). Network defense and countermeasures (3rd ed.). Upper Saddle River, NJ: Pearson Education. Print ISBN13: 9780789759962, eText ISBN13: 9780134893099