The Theorem that Won the War: Activities for Part 2.4 (The Message Key)

Author(s): 
Jeff Suzuki (Brooklyn College)

 

For the activities in this section, we continue with the reflector and keyboard rotor from the final example on the previous page:

Diagram of reflector and keyboard rotor for the Enigma machine.

  1. Use the reflector and keyboard rotor above to encrypt the message \(fade\):
    1. If the message key is \(a\).
    2. If the message key is \(f\).
  2. Suppose a message is received:  \(edc\).  Assume the reflector and keyboard rotors are those shown above, but that the message key was not received.  There are six possible initial settings for the keyboard rotor.  Find all six possible decryptions.

Return to the overview of Part 2.4 (The Message Key).

Continue to the overview of Part 3 (Breaking Enigma).