summaryrefslogtreecommitdiff
path: root/doc/context/third/enigma/examples/enigma-example-plain.tex
diff options
context:
space:
mode:
Diffstat (limited to 'doc/context/third/enigma/examples/enigma-example-plain.tex')
-rw-r--r--doc/context/third/enigma/examples/enigma-example-plain.tex31
1 files changed, 17 insertions, 14 deletions
diff --git a/doc/context/third/enigma/examples/enigma-example-plain.tex b/doc/context/third/enigma/examples/enigma-example-plain.tex
index 87ce9b1..ba2157d 100644
--- a/doc/context/third/enigma/examples/enigma-example-plain.tex
+++ b/doc/context/third/enigma/examples/enigma-example-plain.tex
@@ -1,37 +1,40 @@
\parindent0pt
-%%·····································································%
+%%····································································%
\input {enigma}
-%%·····································································%
+%%····································································%
%% The first machine will be used for encryption of our plain text.
\defineenigma {encryption}
\setupenigma {encryption} {
- other_chars = yes,
- day_key = B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL,
+ other_chars = yes,
+ day_key = B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL,
rotor_setting = ben,
+ spacing = yes,
+ verbose = 1,
}
-%%·····································································%
+%%····································································%
%% This second machine below will be used to decrypt the string.
\defineenigma{decryption}
\setupenigma{decryption}{
- other_chars = yes,
- day_key = B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL,
+ other_chars = yes,
+ day_key = B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL,
rotor_setting = ben,
}
-%%·····································································%
+%%····································································%
%% main
-%%·····································································%
+%%····································································%
%% Ciphertext in the PDF. Rely on the addressee to decrypt the document
%% externally.
-%%·····································································%
+%%····································································%
%% encryption of plain text
-%%·····································································%
+%%····································································%
\startencryption
- Never underestimate the amount of money, time, and effort someone will expend to thwart a security system.
+ Never underestimate the amount of money, time, and effort someone
+ will expend to thwart a security system.
\stopencryption
-%%·····································································%
+%%····································································%
%% decryption of ciphertext
-%%·····································································%
+%%····································································%
%% Input string generated with:
%% mtxrun --script t-enigma \
%% --setup="day_key=B V III II 12 03 01 GI JV KZ WM PU QY AD CN ET FL,\