Cryptography in Enigma revolves around encoding messages through complex rotor -based mechanisms, ensuring secure communication by making intercepted messages nearly impossible to decipher without the correct key
_edited.png)
Sir Alan Turing
Visual Cryptography
What exactly is the Visual Cryptography
It’s a technique where an image or text is encrypted into two or more layers, each of which appears meaning less on its own.
​
How Does Encryption Work ?
1. Data is split into multiple layers.​
2. When layers are combined, the original message or image becomes visible.
Real Life Application And Use
This method ensures secure data sharing, where only those with the required layers or keys can decrypt the message.
Activity
Layer 1
Layer 2
1. Drag Layer 1 over Layer 2.
​
2. Observe how the hidden pattern when placed correctly
Real-Life Application
This process is used to secure the passwords by encrypting it in multiple layers for increased privacy
1. Caesar Cipher
-
Each letter in the plaintext is shifted by a fixed number down the alphabet
-
Example- shift by 3 (key=3): A → D, B → E
Cipher Wheel Activity
1. Enter the key (number)
2. Letters in the above wheel shows the mapping of each letter.
2. Vigenere Cipher
-
Uses a repeating key to shift letters by different values.
-
Each letter is shifted by value corresponding to the letter in the keyword (A = 0, B = 1...)
It is calculated based on the following reference table:

Here's an animation of how the 'Vigenere Cipher' works

Frequency Analysis
What is
Frequency Analysis ?
Analyzes the frequency of letters or symbols in a given text.
In languages like English, certain letters (e.g., 'E', 'T', 'A') appear more frequently than others.
Use of this analysis in Cryptography
Helps break substitution ciphers by identifying common letter patterns.
Attackers try to break the encrypion if patterns match the frequency of letters.
Impact of it in the Enigma Machine
Enigma avoided frequency-based attacks by using rotors that changed the encryption of a letter every time it appeared, thereby making frequency analysis effective
1. Type your text into the input box.
​
2. The bar chart will show the frequency of each letters in real-time
​
3. It helps us know the frequency pattern and how it affects encryption strength.