- 35,003
- 21,712
Using the emulator your link provided, I did the following:
I get MMMMM MMMMM, So this supports my contention - if you get the rotors and rings right - what I called Q above - and the plugboard wrong, you arr left with a simple substitution cipher.
Sure, I have no idea that M stands for L in this case, but if I had a real message, I could work it out with frequency analysis.
- Set everything to its defaults. Set the plugboard at QW+LM.
- Emcrypted LLLLL LLLLL anbd got DYKOH CONOV. Multiple letters are obfuscated, good. A letter doesn't encrypt to itself. Good.
- Decrypted DYKOH CONOV and got LLLLL LLLLL. Good. Double-encrypted DYKOH CONOV and got LLLLL LLLL. Good.
- Undid the plugboard, and decrypted DYKOH CONOV.
I get MMMMM MMMMM, So this supports my contention - if you get the rotors and rings right - what I called Q above - and the plugboard wrong, you arr left with a simple substitution cipher.
Sure, I have no idea that M stands for L in this case, but if I had a real message, I could work it out with frequency analysis.