enigma-python-mcp
This server provides an MCP interface to historically accurate Enigma machine emulators, enabling LLMs to encrypt and decrypt messages via the encrypt_message tool.
10 supported Enigma models:
M3,M4(Naval),I,I_Norway,I_Sondermaschine(Army/Luftwaffe),K,K_Swiss(Commercial/Swiss),D,Z(digits only),B_A133(Swedish letters only)Full machine configuration:
Rotors: type (
I–VIII,Beta,Gamma), ring settings, initial positions, ordered Fastest→Middle→Slowest (→Greek for M4)Reflector: choose model-appropriate type (e.g.,
UKWA,UKWB,UKWBThin), with optional ring/position settingsPlugboard: define letter-swap pairs (e.g.,
{"A": "B", "C": "D"})
Model-specific character sets: A–Z for standard models, digits (0–9) for Enigma Z, Swedish letters for B_A133
Flexible deployment: run locally via
stdioor over a network via SSE (HTTP), with Docker supportClient integration: compatible with Claude Desktop and OpenCode
Enigma Python MCP Server
An MCP (Model Context Protocol) server that brings the capabilities of the enigmapython library to LLMs, allowing them to encrypt and decrypt messages using historically accurate Enigma machine emulators.

This MCP Server is listed on Glama.ai with this score
Features
Exposes all known Enigma machine models: Enigma M3, Enigma M4, Enigma I, Enigma K, Enigma Z, Enigma D, and more.
Dynamic Configuration: LLMs can specify rotors, initial positions, ring settings, reflectors, and plugboard pairs for the encryption.
Local and Network Mode: Supports both
stdiotransport for local MCP integrations (like Claude Desktop) andssetransport to expose the tools over a network.Dockerized: Easy portability and execution across platforms.
Exposed Tools
encrypt_message
Encrypt or decrypt a message using a configured Enigma machine.
Arguments:
machine_model(str): Model name. Supported:'M3','M4','I','I_Norway','I_Sondermaschine','K','K_Swiss','D','Z','B_A133'.message(str): The plaintext or ciphertext to process.rotors(list[object]): List ofRotorConfigobjects. Each object specifiesrotor_type(str),ring_setting(int, default=0), andinitial_position(int | str, default=0). IMPORTANT: The list MUST be ordered exactly as:[Fastest/Rightmost, Middle, Slowest/Leftmost, Greek (if M4)].reflector(object): AReflectorConfigobject specifyingreflector_type(str), and optionallyring_setting(int) andinitial_position(int | str) for rotating reflectors.plugboard_pairs(dict, optional): Dictionary mapping plugboard connections (e.g.,{"A": "B", "C": "D"}).
Running the Server
Using Python
Requires Python 3.11+.
Install the package from PyPI:
pip install enigmapython-mcp(Alternatively, you can just run
uvx enigmapython-mcpif you haveuvinstalled!)Run via stdio (for local MCP client):
enigmapython-mcp --transport stdioRun via SSE (exposing over network):
enigmapython-mcp --transport sse --host 0.0.0.0 --port 8000
Using Docker
Build the container:
docker build -t enigmapython-mcp .Run via stdio (default):
docker run -i enigmapython-mcpRun via SSE:
docker run -p 8000:8000 enigmapython-mcp --transport sse --host 0.0.0.0 --port 8000
Client Configuration (Claude Desktop)
We provide two distinct mcpb bundles for 1-click installation on Claude Desktop. Simply download your preferred bundle from the GitHub Releases page and drag-and-drop it into Claude Desktop's Extensions menu:
enigmapython-mcp-docker.mcpb: Extremely lightweight, relies on your local Docker daemon to run the server in an isolated container. (Recommended)enigmapython-mcp-python.mcpb: Contains the full Python source. Claude Desktop will natively build a virtual environment and run the server without needing Docker.
If you prefer manual configuration via claude_desktop_config.json, use the settings below:
Using Python (uvx recommended)
{
"mcpServers": {
"enigma": {
"command": "uvx",
"args": ["enigmapython-mcp", "--transport", "stdio"]
}
}
}Using Docker
(Note: Make sure you have built the Docker image first: docker build -t enigmapython-mcp .)
{
"mcpServers": {
"enigma": {
"command": "docker",
"args": ["run", "-i", "--rm", "enigmapython-mcp"]
}
}
}Client Configuration (OpenCode)
To use this server with OpenCode, add the following to your ~/.config/opencode/opencode.json (global) or opencode.json (project-level) under the mcp section:
Using Python (uvx recommended)
{
"mcp": {
"enigma": {
"type": "local",
"command": [
"uvx",
"enigmapython-mcp",
"--transport",
"stdio"
],
"enabled": true
}
}
}Using Docker
(Note: Make sure you have built the Docker image first: docker build -t enigmapython-mcp .)
{
"mcp": {
"enigma": {
"type": "local",
"command": [
"docker",
"run",
"-i",
"--rm",
"enigmapython-mcp"
],
"enabled": true
}
}
}Example Prompts
Once the server is configured, you can test it by sending the following prompts to your LLM:
Example 1: Basic Encryption (Enigma M3)
"I need to encrypt the message 'TOPSECRET' using an Enigma M3. The rotors, ordered from fastest to slowest, are III, II, and I. All starting at position 0 with ring settings at 0. Use reflector 'UKWB' and no plugboard. What is the ciphertext?"
Example 2: Historical Decryption (Enigma I)
"Decrypt this 1930 Enigma I message. The ciphertext is 'GCDSEAHUGWTQGRK'. The machine settings, strictly ordered from Fastest to Slowest, are: Rotors III, I, and II. Their respective ring settings are 21, 12, and 23. Their initial positions are 11, 1, and 0. The reflector is 'UKWA'. The plugboard swaps are: A/M, F/I, N/V, P/S, T/U, W/Z."
Example 3: Complex M4 Configuration
"Use the Enigma M4 to encrypt the message 'DIVE DIVE DIVE'. The machine uses the 'UKWBThin' reflector. The rotors, explicitly ordered as [Fastest, Middle, Slowest, Greek], are: VIII (pos 2), III (pos 6), IV (pos 12), and Gamma (pos 21). All ring settings are 0. Please process this."
Testing
A comprehensive test suite is included in tests/test_server.py. It tests the encryption and decryption reversibility for all 10 supported Enigma models.
To run the tests:
# Activate your virtual environment first
source .venv/bin/activate
pip install pytest
export PYTHONPATH=$PYTHONPATH:$(pwd)/src/enigmapython_mcp && pytest tests/* Testing the SSE Server interactively
Because the Model Context Protocol requires a stateful initialization handshake before any tools can be called, manually testing the SSE endpoint with curl is quite complex.
The easiest and officially recommended way to test the server is using the MCP Inspector:
Ensure your server is running in SSE mode:
uv run enigmapython-mcp --transport sse --host 0.0.0.0 --port 8000In a second terminal, launch the Inspector:
npx @modelcontextprotocol/inspectorA web interface will open in your browser (usually at
http://localhost:5173).Change the Transport Type to SSE.
Enter
http://localhost:8000/sseas the URL and click Connect.You can now visually configure and execute the
encrypt_messagetool!
Maintenance
Tools
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/denismaggior8/enigma-python-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server