Atbash Cipher - Ancient Encryption Tool
Free Online Tool

Enigma Machine Simulator

Encrypt and decrypt text with a configurable three-rotor Enigma I-style machine.

Choose rotor order, ring settings, start positions, and plugboard pairs to see how a historical rotor cipher changes with every keypress.

How It Works

An Enigma machine is a rotor cipher device that transforms each letter through several moving substitutions. A keypress first advances the rotors, then passes the letter through plugboard swaps, the rotors, a reflector, the rotors again in reverse, and the plugboard again.

A rotor is a wired alphabet permutation with a notch that controls stepping. The right rotor advances on every encoded letter, while notch positions can advance the middle and left rotors. This makes repeated letters produce different ciphertext as the machine state changes.

A ring setting is an offset between the rotor wiring and the visible window letter. The start position sets the initial window letters. The plugboard is a set of letter-pair swaps that happens before and after the rotor path.

TL;DR
  • Use identical settings to decrypt what you encrypted.
  • Rotor order, ring settings, and plugboard pairs all change the result.
  • The simulator resets to the chosen start positions for every run.
  • Enigma is educational history, not modern data security.
History and Use Cases

The Enigma machine is best known for its World War II military use, but rotor machines belong to a broader period when mechanical and electromechanical devices made high-volume encryption practical. Enigma was much stronger than hand ciphers such as Caesar, Playfair, or Vigenere because its substitution changed during the message.

Enigma cryptanalysis also shows why real security depends on procedures as much as machinery. Allied codebreakers exploited repeated formats, probable plaintext, operator habits, captured materials, and specialized search machines. The machine was complex, but the surrounding system still leaked structure.

Today, Enigma simulators are useful for cryptography lessons, museum demonstrations, puzzle design, and understanding rotor-machine concepts before studying modern block ciphers, stream ciphers, and key-management failures.

Practical Notes

Enigma is reciprocal: encryption and decryption use the same operation. If the rotor order, ring settings, start positions, and plugboard pairs differ by even one letter, the decrypted text will not match.

The reflector prevents a letter from encrypting as itself in the historical Enigma design. That property helped operators use the same settings in both directions, but it also gave cryptanalysts an important clue when testing guessed plaintext fragments.

For real security, use modern reviewed cryptographic tools and protocols. This page is for learning, historical modeling, and controlled puzzle use.