⚙️

Enigma Machine Simulator

Ready
Enter letter pairs (e.g. AZ BM) — up to 10 pairs, no repeated letters
Rotor I
A
Rotor II
A
Rotor III
A
0 characters
0 characters

Type or click keys below — the machine processes each letter in real-time, advancing rotors with every keystroke.

🔄 Rotor Wirings

I: EKMFLGDQVZNTOWYHXUSPAIBRCJ
II: AJDKSIRUXBLHWTMCQGZNPYFVOE
III: BDFHJLCPRTXVZNYEIWGAKMUSQO
IV: ESOVPZJAYQUIRHXLNFTGKDCMWB
V: VZBRGITYUPSDNHLXAWMJQOFECK

🪞 Reflectors

B: YRUHQSLDPXNGOKMIEBFZCWVJAT
C: FVPJIAOYEDRZXWGCTKUQSBNMHL

🔔 Turnover Notches

I: Q → R
II: E → F
III: V → W
IV: J → K
V: Z → A

ℹ️ Key Facts

• Symmetric: encode = decode with same settings
• No letter maps to itself
• Up to 10 plugboard pairs
• Double-stepping anomaly modeled

Advanced Enigma Cipher Features

Everything you need to simulate, study, and understand the legendary Enigma cipher machine.

⚙️

Authentic Rotor Mechanics

Five historical rotor wirings (I–V) with correct turnover notches, double-stepping anomaly, and ring settings (Ringstellung) as used in actual WWII machines.

🔌

Full Plugboard Support

Configure up to 10 letter-pair swaps (Steckerbrett) with real-time validation. Visual toggle interface and manual text entry both supported.

⌨️

Live Keyboard Mode

Press keys or click the visual keyboard to see each letter encrypted in real-time with lamp illumination, just like the original machine.

🔄

Symmetric Encode/Decode

The Enigma is self-inverse — use the same settings to both encrypt and decrypt. Swap input/output with a single click.

🪞

Reflector B & C

Choose between historical Reflector B (Wehrmacht standard) and Reflector C (Kriegsmarine) for different cipher outputs.

Real-Time Validation

Instant feedback on invalid characters, duplicate plugboard letters, and position errors. Errors highlighted before encoding begins.

How the Enigma Machine Works

Six steps from keypress to encrypted letter — the same path the original machine followed.

Configure Settings

Select three rotors (I–V), set starting positions (A–Z), ring settings, and plugboard pairs matching your communication partner.

Plugboard Swap

The input letter passes through the Steckerbrett, swapping it with its plugboard partner (if connected) before entering the rotors.

Rotor Forward Pass

The signal traverses three rotors right-to-left, each substituting the letter based on its wiring offset by the current position.

Reflector

The reflector sends the signal back through the rotors from left to right — ensuring the machine is always self-inverse.

Rotor Return Pass

The signal passes back through all three rotors in reverse order, producing a different substitution on the return path.

Final Output

After a final plugboard swap, the encrypted letter illuminates the lampboard. Rotors advance, changing the cipher for every single letter.

What Is the Enigma Machine? A Complete Guide

The Enigma machine is one of history's most celebrated encryption devices — an electro-mechanical cipher engine originally developed in the early 1920s and later adopted by Nazi Germany for military communications throughout World War II. Each message was scrambled through a combination of rotating cipher wheels (rotors), a reflector, and an optional plugboard, creating a cipher so complex that operators believed it mathematically unbreakable in the field.

The Enigma cipher works on a polyalphabetic substitution principle: pressing the same letter key multiple times always produces a different ciphertext letter because at least one rotor advances with each keystroke, constantly shifting the internal wiring paths. This dynamic substitution was the core strength of the enigma code and what distinguished it from earlier, static cipher methods. The additional plugboard (Steckerbrett) allowed operators to swap pairs of letters before and after rotor processing, multiplying the number of possible key combinations into the billions of trillions.

Breaking the Enigma decoder challenge fell to cryptanalysts at Bletchley Park, notably Alan Turing and Gordon Welchman, who built electromechanical Bombe machines to systematically eliminate invalid key settings. Their success in deciphering Enigma-encrypted messages, codenamed ULTRA, is credited by historians with shortening the war by up to two years. Today, studying the Enigma cipher remains a foundational exercise in cryptography education, teaching concepts like stream ciphers, key management, and machine-based encryption.

Best practices for using an Enigma simulator: always share settings through a secure side channel, change starting positions for each message, use all 10 plugboard pairs for maximum entropy, and never reuse the same key settings across messages. Although the Enigma cipher is historically fascinating, modern security applications require contemporary algorithms such as AES-256 or ChaCha20. Use this Enigma machine online tool to explore cipher history, test settings, and understand how rotor-based encryption shaped modern cryptography.

Frequently Asked Questions

Common questions about the Enigma machine, enigma cipher, and how to use this encoder decoder.

The Enigma machine was an electro-mechanical cipher device used by Nazi Germany during WWII. It became famous because it produced ciphers so complex that Axis forces believed them unbreakable. Its eventual decryption by Bletchley Park cryptanalysts, including Alan Turing, had a decisive impact on the war's outcome and laid foundations for modern computing and cryptography.

To decode an Enigma message, you need the exact same settings used to encode it: rotor order, ring settings (Ringstellung), starting positions, reflector choice, and all plugboard connections. Enter these settings in the Enigma machine above, paste the ciphertext, and click Encode/Decode. Because Enigma is symmetric, the same settings encrypt and decrypt.

This is a fundamental property of the reflector. Because the signal must always be sent back through a different path by the reflector, no letter can map to itself. This was actually a cryptographic weakness that Bletchley Park exploited — if a crib (guessed plaintext) contained a letter at a position where the ciphertext showed the same letter, that key setting was immediately eliminated.

The plugboard is a front panel with 26 sockets corresponding to each letter. Cables could be inserted to swap letter pairs before and after the rotor scrambling stage. With up to 10 pairs active, the plugboard added an enormous number of additional key combinations — roughly 150 trillion — making brute force decryption practically impossible for the era.

Yes. This Enigma machine online tool accurately implements the Wehrmacht/Luftwaffe 3-rotor Enigma with authentic rotor wirings (I–V), correct turnover notch positions, proper ring settings, reflectors B and C, and the famous double-stepping anomaly. Results are verified against known historical Enigma messages and reference implementations.

Explore More Encryption Tools

From classical ciphers to modern cryptography — our free suite covers everything you need to learn, test, and apply encryption concepts.