This page hosts documentation and firmware for the Enigma touch, gives sources for suitable rechargeable batteries, and provides external links to information on the original Enigma which I found particularly useful.
New – We have set up an Enigma touch Google Group. Feel free to stop by with questions, ideas for future firmware versions etc. We are also thinking about additional activities – maybe an encrypted message exchange and a code-breaking competition?
These files apply to the current board revisions 4 and 5, available via CEDS.
These files refer to the older board revisions 2 and 3, without sound or with the small piezo beeper. Note that the CPU pinout and memory size has changed in board revision 4, so the firmware above will not work with the older boards – please use the dedicated versions below. The firmware update process is the same for the older boards and is described in the user manual.
The Enigma touch comes prepared for a rechargeable lithium-polymer battery. Unfortunately CEDS cannot include a battery due to international shipping restrictions. But is is easy to add one – no soldering required.
See the user manual for details on the installation and on choosing a suitable battery. At this time, the following batteries are direct fits:
A wealth of information on the original Enigma is available online. Here are some recommended websites which I found particularly useful:
Crypto Museum, a virtual cryptography museum and comprehensive presentation of the Enigma machines by two Dutch collectors. Many other cipher devices, spy radios and other espionage-related items too!
Excellent 3D animation by Jared Owen explaining the working principle of the Enigma. Just under 20 minutes, highly recommended!
Functional principle, military use and decryption of the Enigma. Extensive website, originally created by Tony Sale, the first curator of the museum in Bletchley Park.
Extensive collection of publications, links and own work on the history and cryptanalysis of the Enigma by Frode Weierud, a Norwegian amateur cryptologist.
Decoding tutorial using a historical sample message.
Explanation of the various message procedures used in the German army, air force and navy – daily keys, message keys, code groups…
Original messages that you can try to decrypt: Lots of M4 messages, Enigma I and M3 messages, and a few messages for various Enigma types including the K and T models.