ASSIGNMENT PROJECT This project uses an Enigma machine simulator. It functions like the Enigma machines used...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
ASSIGNMENT PROJECT This project uses an Enigma® machine simulator. It functions like the Enigma machines used during WWII. This example has been included to help you better understand how encryption worked in the early days. It's a great learning tool for when you first start exploring the subject of cryptography, Enigma machines provided fairly good encryption strength for their day. Modern cryptographic systems are much more secure than Enigma machines. Pay attention to the colored paths as you type. The red path goes through the three rotors, bounces off the reflector, becomes green, and then goes back through the three rotors. The right rotor moves with each keystroke. If it completes one full cycle, it will advance the middle rotor and subsequently the left rotor. 1. Open a Web browser and go to http://enigmaco.de/enigma/enigma.html 2. Use the left and right arrows to move each of the top three rotors so that each has the letter "A" selected in blue. 3. Click in the Input text box in the bottom of your screen. 4. Slowly type your first name and last name without a space. (In this case it was relizab. If you make a typing error you can start over by pressing the backspace key.) 5. Take a screenshot. 6. Note: The text in the Input text box is what you typed. The text in the Output text box is what you would send. You are now going to reset the dials to their original position (in this case AAA) and type the encrypted text (cipher text) you produced in the Output text box. You can copy the cipher text from the screenshot you just took. Subsequently, you should see your name reproduced in the bottom box. This is the equivalent of decrypting the message. 7. Click in the Input text box and backspace your name. (The rotors should be set back to their AAA position.) 8. Refer back to the screenshot you just took and copy down the output (cipher text). (In this case, the cipher text for "relizab" was "HMZVPEF.") 9. Type the cipher text into the Input text box. (Type slowly so you won't make a mistake and have to start over!) 10. Take a screenshot with your name showing in the Output text box. 11. Backspace the text in the Input text box. 12. Slowly press the A key ten times and notice how a different encrypted letter is chosen as output through the rotating dials even though you are hitting the same key each time. 13. Take a screenshot. After performing the exercise in the Project, provide adequate responses to the follow up questions. • Write very short notes to describe your observations during Project above. • Why did Enigma machines use multiple rotors? • How did WWII cryptographers know which rotor settings to use? ASSIGNMENT PROJECT This project uses an Enigma® machine simulator. It functions like the Enigma machines used during WWII. This example has been included to help you better understand how encryption worked in the early days. It's a great learning tool for when you first start exploring the subject of cryptography, Enigma machines provided fairly good encryption strength for their day. Modern cryptographic systems are much more secure than Enigma machines. Pay attention to the colored paths as you type. The red path goes through the three rotors, bounces off the reflector, becomes green, and then goes back through the three rotors. The right rotor moves with each keystroke. If it completes one full cycle, it will advance the middle rotor and subsequently the left rotor. 1. Open a Web browser and go to http://enigmaco.de/enigma/enigma.html 2. Use the left and right arrows to move each of the top three rotors so that each has the letter "A" selected in blue. 3. Click in the Input text box in the bottom of your screen. 4. Slowly type your first name and last name without a space. (In this case it was relizab. If you make a typing error you can start over by pressing the backspace key.) 5. Take a screenshot. 6. Note: The text in the Input text box is what you typed. The text in the Output text box is what you would send. You are now going to reset the dials to their original position (in this case AAA) and type the encrypted text (cipher text) you produced in the Output text box. You can copy the cipher text from the screenshot you just took. Subsequently, you should see your name reproduced in the bottom box. This is the equivalent of decrypting the message. 7. Click in the Input text box and backspace your name. (The rotors should be set back to their AAA position.) 8. Refer back to the screenshot you just took and copy down the output (cipher text). (In this case, the cipher text for "relizab" was "HMZVPEF.") 9. Type the cipher text into the Input text box. (Type slowly so you won't make a mistake and have to start over!) 10. Take a screenshot with your name showing in the Output text box. 11. Backspace the text in the Input text box. 12. Slowly press the A key ten times and notice how a different encrypted letter is chosen as output through the rotating dials even though you are hitting the same key each time. 13. Take a screenshot. After performing the exercise in the Project, provide adequate responses to the follow up questions. • Write very short notes to describe your observations during Project above. • Why did Enigma machines use multiple rotors? • How did WWII cryptographers know which rotor settings to use?
Expert Answer:
Related Book For
Modern Management Concepts And Skills
ISBN: 9781292265193
15th global Edition
Authors: Samuel Certo, S Certo
Posted Date:
Students also viewed these electrical engineering questions
-
This project will help you better understand specific information that companies provide to the securities and exchange commission as well as the information that investors review before making their...
-
Box 1 contains two red balls and three green balls, and Box 2 contains four red balls and one green ball. One ball is randomly selected from Box 1 and placed in Box 2. Then one ball is randomly...
-
A box with an open top is to be constructed from a rectangular piece of cardboard with dimensions 12 in. by 20 in. by cutting out equal squares of side at each corner and then folding up the sides as...
-
Majan International School, Muscat conducts online classes and online exams for its students due to Covid 19 pandemic situation. It uses its own online Learning Teaching Management system namely...
-
The market for apple pies in the city of Ectenia is competitive and has the following demand schedule: Price Quantity Demanded $1.............. 1,200 pies 2.............. 1,100 3.............. 1,000...
-
Represent f(x) as an integral (11). (cos x if f(x) 0
-
When to use different discovery devices?
-
Bunn and his wife claimed that they had an easement to enter and use the swimming pool on neighboring land. A contract between the former owners of the Bunns' property and the adjacent apartment...
-
A company's 2005 sales were $10 million. If sales grow at 8% per year, how large will they be in 8 years? 2. Suppose a government bond will pay $1,000 three years from now. If the going interest rate...
-
Kai is the president of Zebra Antiques. An employee, Reese Francis, is due a raise. Reeses current benefit analysis is as follows: Compute the benefit analysis assuming: 3 percent increase in pay. ...
-
The firm is looking to expand its operations by 10% of the firm's net property, plant, and equipment. The estimated life of this new property, plant, and equipment will be 12 years. The salvage value...
-
Mason ( single ) is a 5 0 percent shareholder in Angels Corporation ( an S Corporation ) . Mason receives a $ 1 9 0 , 5 0 0 salary working full time for Angels Corporation. Angels Corporation...
-
An essay about managers and quality in health care. Explain in detail why financial managers should be concerned with quality initiatives. Provide two specific examples of areas in a healthcare...
-
Envelope Company had the following information during the previous year for one of its product lines: Sales price per unit: $450 Units in beginning inventory: 0 Units started during the year: 35,000...
-
It is evident that Central Banks in advanced capitalist nations such as Australia are serious about reducing annual CPI inflation, which was 5.4 per cent in the September 2023 quarter. Raising the...
-
The following information was obtained from the annual report of A Ltd of the current year. Income statement: Sales 4200 Cost of sales -1680 Other operating expenses -630 Profit before interest and...
-
Peria Enterprise operates a process costing system. The process is expected to lose 25% of input and this can be sold for RM8 per kg. Inputs for the month were: Direct materials 3,500 kg at a total...
-
Why do markets typically lead to an efficient outcome for buyers and sellers?
-
Operations management involves the direction and control of processes. What are its key points?
-
The days of a bulky computer hard drive, keyboard, monitor, and mouse are behind us, right? Tablets, smartphones, and other devices are the way of the future, or soit would seem. However, one...
-
Is it important for organizational change to occur on a regular basis? Why or why not?
-
Three masses, weighing \(225 \mathrm{~g}, 320 \mathrm{~g}\), and \(550 \mathrm{~g}\), are attached around the rim, of diameter \(750 \mathrm{~mm}\), of a flywheel at the angular locations...
-
True or False. Any unbalanced mass can be replaced by two equivalent unbalanced masses in the end planes of the rotor.
-
Transmissibility is the ratio of a. force transmitted and exciting force b. force applied and the resulting displacement c. input displacement and output displacement
Study smarter with the SolutionInn App