Skip to content

Details

This presentation is The Enigma Machine - live demo'd and explained.

After RSVP, please ensure to get your admission ticket from Humantix: https://events.humanitix.com/the-enigma-machine-live-demo-d-and-explained-sectalks-syd0x62-98th

Thanks to you for
1. Keeping your RSVP up-to-date. We are usually overbooked and have a long waitlist. We will sign you in and keep track of RSVPs and attendance.
2. Aligning with SecTalks' no-bullshit code of conduct
3. Keeping the venue nice and tidy during and after the session

# Presentation

Title: The Enigma Machine - live demo'd and explained

This session provides live demonstrations of the infamous WWII German Enigma machine, and explains its development, daily operation and historical impact.
Included are:

  • A brief intro to cipher systems just prior to Enigma’s invention
  • Live demo of a 1935 pattern German Enigma M1 showing daily setup
  • Live conversational demo across another pair of Enigmas
  • Influence of Enigma on subsequent cipher systems and methods

IT and cyber operators will find many historical echoes in today’s methods and take away a more visceral appreciation of the origins of modern threats.

Recommendation – watch the film “The Imitation Game” beforehand. While not perfect it is the best telling of the Enigma and Bletchley story to date, and will provide a good background to the challenge that Enigma presented to the allies.

# Speaker: Mike Pritchard of the Australian Spy Museum

How to find us on the day?
An organiser will be on the bottom floor until 6:15 to help attendees access the lifts.

# Speed hiring

There is an opportunity for potential employers to do an impromptu 30-second description of their open role. If you are interested, speak with one of the organisers before the start of the session.
Please note the best way to support SecTalks and tell others about your open roles is through sponsorship. We encourage companies, small or large, to come forward and support their local community.

# Sponsors

# Notes

Related topics

Events in 2000, AU
Cybersecurity
Hacking
Information Security
Exploit Code
Malware

You may also like