|
Post by ZS5SB on Oct 25, 2013 9:15:26 GMT
Hi everyone, I',m a Security Manager on a large industrial site. On site we have many burglar alarm systems and there are highly confidential PIN codes for those alarms. I used Enigma to encrypt those codes which are now listed on a memo which is itself password protected. Only myself and my Deputy have that password and for my Deputy who is not very familiar with Engma I have saved the Enigma settings in another file which is also password protected. It's far from the level of Security that Enigma can provide but at the same time its not WWII & it's beyong that required by my Company. It was also a learning exercise and a lot of fun. Best wishes to all and 73 from Brian ZS5SB.
|
|
|
Post by Admin on Oct 27, 2013 22:43:48 GMT
Way to go Brian! You are helping to keep history alive! Great work! Bruce Culp, N7CLH
|
|
jrsm
New Member
Posts: 18
|
Post by jrsm on Nov 29, 2014 5:42:54 GMT
Here's another one for you. While we never made it to market, I was working with a start up that needed a licensing key mechanism, but was not too onerous to maintain. We needed to take some inputs and generate a license key. After a number of false starts, we came up with a system that worked. I then realized we had created a variation on the polyalphabetic cypher AKA Enigma! We reworked our inputs a bit, and I found some Perl and Python modules that simulated an Enigma Machine. it was maintainable, reasonably secure, and worked! Not to mention a bit of security through obscurity. :-) Python: pypi.python.org/pypi/py-enigma/Perl: search.cpan.org/~jblakey/Crypt-Enigma-1.1/Enigma.pmJRSM
|
|
jrsm
New Member
Posts: 18
|
Post by jrsm on Nov 29, 2014 6:25:41 GMT
Brian,
I forgot to ask, did you use the simulater by Rijimenats, or something else? I was thinking of creating a simple "edit in memory" type of editor that would process the read/write from/to disk through Enigma's algorithms.
JRSM
|
|