Enigma Encryptor Pro - Version 1.0 What really makes this encryption effective is thatlike the real life machine, the wheels rotate either tothe left or right after each character. So therelationship between each character shifts constantly.As a result, even repeating characters such as"AAAAAAAAAA" are represented with garbage such as"BGPVLKHWCD". It would be virtually impossible to look at theencrypted characters and determine their relationshipto one another. There are so many possibilities andcombinations of the above criteria, it would have to besolved through brute force. I am not a mathematician,so if anyone can tell me the possible combinations, Iwould appreciate it. When the Germans used this machine, it baffled theAllies, who frantically tried to break it with nosuccess. It wasn't until a German U-Boat was forced tosurface in a naval battle and was captured that theAllies got a huge break. An Enigma machine was capturedalong with a code book that showed the informationneeded to decrypt the messages. The U-Boat was scuttled and the crew was kept in a topsecret location. The U-Boat was simply considered lostduring battle and Germans continued the war not knowingthe truth. When the war in the Atlantic turned for the worse, theGermans, who believed their code to be unbreakable,believed that there were spies in their top levelofficials. They never considered that the code wasbeing decrypted through a captured machine, so as aresult, they set up elaborate networks to try and findthese "spies". Paranoia being what it was, many loyalGerman officers were tortured and murdered for treason,even though they had committed no such offense. NOTE: Binary files require Microsoft's Visual Basic 6.0Runtime Library (usually pre-installed in Windows XP).