|
Post by Arduino Enigma on May 2, 2016 3:33:20 GMT
Found another group that exchanges M4 Triton Key messages Keys are at: ubootenigma.weebly.com/descifrado.htmlI sent them two messages: --- VIBN LMXD JSLH JFHF URIA EJTA RJWH WPTN DIRY UBHG MHIO AFTY JRTW WNSZ TCWH SJLL KTGX IYVS SOBO NFYQ NURR CJNK AODM Z VIBN LMXD --- KLM 2300 01 002 16 FAQQ AHIZ RGYT JZCV AATK YAWZ PQFJ NDMF ROJQ SVYG KOEP QJVA EPXJ YEPI FAQQ AHIZ
|
|
|
Post by lpaseen on May 2, 2016 14:29:30 GMT
Dunno any spanish but with google translate I managed to confirm the procedure to be the same (despite that google switched around some groups) and decrypted all 3 messages.
Doesn't look like it's to much activity there and with just 2 additional followers I guess it's hard to get things going but maybe they can join this forum
|
|
|
Post by woody1969 on Jan 17, 2019 22:44:25 GMT
Dear friends, Last week, after two years of unwanted abandonment, I recovered my page UBootENIGMA to continue with my initial idea, to make known the interesting encryption procedure of the ENIGMA M4. I have reviewed my website and I have discovered an error in the example that illustrates the procedure. This error has been solved. Receive a cordial greeting from Barcelona, SPAIN. Oscar Font escolaicriptografia.weebly.com
|
|
|
Post by mauser on Jan 18, 2019 14:53:57 GMT
Oscar,
Welcome back to the forum! I've read many of your posts on cryptocollectors group over the years. For what its worth, if you go to the EWCG website, go into the links page and go to the lower right, you will see the new library. If you want the M4 procedure and the General Cipher M procedure, the original German documents are in there.
Mauser sends EWCG Website and Forums Administrator
|
|
|
Post by woody1969 on Jan 20, 2019 13:19:58 GMT
Hi, Mauser, Yes, I've already seen those interesting links. I plan to offer a new talk about the different M4 cipher procedures. This is a great way to show to my students about how practical and fun maths can be. They are always fascinated with the ENIGMA machine. Learning its cipher procedures will be a new and deep level of knowledge. Ciphering in this way will force them to reason mathematically but in an applied way.
|
|