In this, the fourth article in a series on implementing the Enigma cipher in Java, we use some big number libraries to explore the combinatorics of the Enigma encryption scheme and better understand the Enigma's strengths and weaknesses.
Table of Contents
The Key Space
Basically, what the Enigma did was to encrypt each character of a message one …