[comp.archives] [crypt] Re: Seizing the Enigma

riordanmr@clvax1.cl.msu.edu (Mark Riordan) (06/22/91)

Archive-name: sci/crypt/enigma-2/1991-06-18
Archive: cl-next1.cl.msu.edu:/crypt/enigma_2.zip [35.8.4.21]
Original-posting-by: riordanmr@clvax1.cl.msu.edu (Mark Riordan)
Original-subject: Re: Seizing the Enigma
Reposted-by: emv@msen.com (Edward Vielmetti, MSEN)


In article <1991Jun17.054312.21607@bellcore.bellcore.com>, karn@epic.bellcore.com (Phil Karn) says:
> It would also be fun
>to write computer programs that simulate the exact behavior of both
>machines - the information ought to be available somewhere to do this.

I agree that the book is worth reading (I haven't finished it yet, though).
I was surprised when the salesman at the bookstore knew exactly
what I was talking about when I asked for the book.  He said he had
first read "The Codebreakers" (also by Kahn) at the age of 10.

Anyway:

A few months ago I downloaded a program called ENIGMA_2 from
a crypto BBS.  It's a simulation of the Enigma written by Cipher
Devours and others for the IBM PC.  No source is included, unfortunately.
I put it up for anonymous FTP from cl-next1.cl.msu.edu  (35.8.4.21).
There's also Devours' M209 decryptor (in BASIC source code) on that machine.

Here's a blurb from the ENIGMA_2 documentation:

"In July 1981, an article authored by Marian Rejewski
appeared in "Annals of the History of Computing",
a quarterly publication of AFIPS (American Federation of
Information Publishing Societies, Inc.).  Published with that article
was a simulation program in BASIC language which illustrated the
operation of the ENIGMA.  The program was authored by C.Deavours of
the Math Department, Kean College of NJ.  Of course, that issue (vol
3, # 3) was copyrighted by AFIPS.  The original program was modified,
and was later translated to IBM/PC BASIC, by  J.E.Eller, Virginia
Beach, VA.  ENIGMA.EXE is the result of that history.  All rights are
reserved.  Permission to use the original source material was granted
by AFIPS, on condition that credit be given to the source, and that
copying and distribution would not be used for direct commercial
advantage."

Mark Riordan   riordanmr@clvax1.cl.msu.edu

-- MSEN Archive Service file verification
cl-next1.cl.msu.edu
-rw-r--r--  1 root     other      26892 Jun 18 14:44 /crypt/enigma_2.zip
found enigma-2 ok
cl-next1.cl.msu.edu:/crypt/enigma_2.zip