Historical cryptography 2. CSCI 470: Web Science Keith Vertanen

Size: px
Start display at page:

Download "Historical cryptography 2. CSCI 470: Web Science Keith Vertanen"

Transcription

1 Historical cryptography 2 CSCI 470: Web Science Keith Vertanen

2 Overview Historical cryptography WWI Zimmerman telegram WWII Rise of the cipher machines Engima Allied encryption 2

3 WWI: Zimmermann Telegram 1915, U-boat sinks Lusitania 1,198 drown including 128 US Germany agrees to surface 1st 1916, new Foreign Minister Arthur Zimmermann 1917, unrestricted submarine warfare Zimmermann hatches plan Keep American busy at home Persuade Mexico to: invade US and invite Japan to attack US as well Arthur Zimmermann 3

4 4

5 Mechanization of secret writing Pencil and paper Security limited by what humans can do quickly and accurately in the heat of battle Enter the machine Thomas Jefferson's wheel cipher Captain Midnight's Code-o-Graph 5

6 Enigma machine Enigma cipher machine 1918, patented by German engineer Arthur Scherbius Arthur Scherbius A electrical/mechanical implementation of a polyalphabetic substitution cipher 6

7 7

8 Rotor (wheel, drum) Enigma rotors Monoalphabetic substitution cipher implemented via complex wiring pattern One of 26 initial positions Geared: rotates after each letter Rotor set 3 rotors in 3!=6 possible orders Eventually increased to 3 out of 5 Navy used even more Possible keys: 3! * 26 3 = 6 * 17,576 = 105,456 8

9 Plugboard Enigma plugboard Operator inserts cables to swap letters Initially 6 cables Swaps 6 pairs of letters Leaves 14 letters unswapped Possible configurations: 100,391,791,500 Total keys: 17,576 * 6 * 100,391,791,500 10,000,000,000,000,000 9

10 Enigma machine Sales initially slow Enigma 1923, Germans find out about failures of communication security in WWI 1925, Scherbius starts mass production German military eventually buys 30,000 Enigma machines 1929, Scherbius dies in carriage accident Arthur Scherbius 10

11 Step 1: Espionage Cracking the Enigma Disgruntled Schmidt meets with French agent Sells Enigma user manuals Allows replica to be constructed Also codebook and daily key scheme French give intelligence to Poles "It is assumed in judging the security of the cryptosystem that the enemy has at his disposition the machine." -German memorandum Hans-Thilo Schmidt 11

12 Cracking the Enigma Step 2: Poles identify weakness: German's had day code specifying: Configuration of rotors (3! orders) Settings of rotors (26 3 settings) Settings of plugboard (6 letter swaps) Unique key per message: Send 3 letters, encrypted with day key Letters specify new setting of rotors New rotor setting then used for remainder of message Repeat the 3 initial letters Repetition is the enemy of security! Marian Rejewski 12

13 Cracking the Enigma Find patterns in first 6 letters 1 st & 4 th, 2 rd & 5 th, 3 rd & 6 th ciphers of same letter Message 1st 2nd 3rd 4th 5th 6th 1 L O K R G M 2 M V T X Z E 3 J K T M P E 4 D V Y P Z X 1 st A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 4 th P M R X 13

14 Cracking the Enigma Given enough messages: Fill in full table of relations between 3 pairs Message 1st 2nd 3rd 4th 5th 6th 1 L O K R G M 2 M V T X Z E 3 J K T M P E 4 D V Y P Z X 1 st A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 4 th F Q H P L W O G B M V R X U Y C Z I T N J E A S D K 14

15 Find chains Fingerprinting a day key Chains change each day depending on day key 1 st A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 4 th F Q H P L W O G B M V R X U Y C Z I T N J E A S D K A F W A B Q Z K V E L R I B C H G O Y D P C J M X S T N U J 3 links 9 links 7 links 7 links Also for 2 nd & 5 th and 3 rd & 6 th letter pairs # of chains and length, independent of plugboard Catalog 105,456 rotors settings using replica 15

16 WWII 1938, Germany increases Enigma security Add two additional rotors, C(5, 3) = plugboard cables instead of 6 Poles couldn't build big enough bombes Poles give research + replicas to Britain & France US Navy bombe Bletchley Park bombe 16

17 Bletchley Park Government Code and Cypher School Height of WWII, 9000 people Battled against improvements to Enigma May 1, 1940 Germans stop repeating day key Turing had already developed technique + machine to crack using a crib instead of repetition of key Alan Turing 17

18 Cribs Cribs Some plaintext you suspect is in ciphertext Ideally also its location e.g. Germans usually broadcast weather at 6 am "wetter" somewhere at start of message German Navy had strongest crypto: 3 rotors out of 8, reflector with 26 orientations Avoided stereotypical messages Allies: Mine area to generate traffic Grid reference as crib Also, stole code books 18

19 Typex Allied encryption British army and air force 5 rotors ECM Mark II (SIGABA) United States 15 rotors No known cryptanalysis M-209 But big, expensive, fragile Portable mechanical device For tactical use 19

20 Navy Department, Office of Chief of Naval Operations, Washington, D.C. CLASSIFICATION: CONFIDENTIAL Date: 27 Dec 1943 CARELESS COMMUNICATIONS COST LIVES The following is a list of some of common violations of security principles: DRAFTING: Unnecessary word repetition Unnecessary or improper punctuation Plain language reply to encrypted dispatch Classification too high Precedence too high Cancellation in plain language of an encrypted dispatch ENCRYPTION: "XYX" or "X"'s for nulls "XX" & "KK" to separate padding from text Same letters at both ends to separate padding from text Continuity of padding Seasonal and stereotyped padding Repetition of generatrices (Ed. Note: CSP-845) Systematic selection of generatrices (Ed. Note: CSP-845) Using plain text column for encryption (Ed. Note: CSP-845) Proper strips not eliminated as prescribed by internal indicator (Ed. Note: CSP- 845) Improper set-up according to date Using system not held by all addressees Failing to use system of narrowest distribution CALLS: Enciphering indefinite call sign Enciphering call signs of shore activities CODRESS might have been used Operation of the cipher machine is as important as the cipher itself! 20

21 Code talkers Machine based encryption Heavy equipment Slow to perform Code talking Use Native American languages Started in WWI with Choctaw Improvise phrases for out-of-vocabulary words "big gun" = artillery "little gun shoot fast" = machine gun 21

22 Navajo code talkers Code talkers WW II Few outsiders knew the unwritten language 3 line message: 20 seconds vs. machine: 30 min Lexicon of 274 words + phonetic alphabet 22

23 Summary History of cryptography WW I Zimmerman telegraph WW II Enigma Allied encryption Code talkers 23

Background Data: Naval Warfare, Battle of the Atlantic, Cryptography, and the Code Game. Battle of the Atlantic Allied Convoys vs.

Background Data: Naval Warfare, Battle of the Atlantic, Cryptography, and the Code Game. Battle of the Atlantic Allied Convoys vs. Background Data: Naval Warfare, Battle of the Atlantic, Cryptography, and the Code Game Randy H. Katz CS Division, EECS Dept. University of California, Berkeley Spring 2013 Battle of the Atlantic Allied

More information

Codes and Nomenclators

Codes and Nomenclators Spring 2011 Chris Christensen Codes and Nomenclators In common usage, there is often no distinction made between codes and ciphers, but in cryptology there is an important distinction. Recall that a cipher

More information

Code Breakers: Uncovering German Messages. by Rena Korb. Scott Foresman Reading Street 4.4.4

Code Breakers: Uncovering German Messages. by Rena Korb. Scott Foresman Reading Street 4.4.4 Suggested levels for Guided Reading, DRA, Lexile, and Reading Recovery are provided in the Pearson Scott Foresman Leveling Guide. Code Breakers: Uncovering German Messages by Rena Korb Genre Expository

More information

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo Lecturers: Mark D. Ryan and David Galindo. Cryptography 2017. Slide: 1 Cryptography Module in Autumn Term 2016 University of Birmingham Lecturers: Mark D. Ryan and David Galindo Slides originally written

More information

Alan Turing: Codebreaker

Alan Turing: Codebreaker 1 CLOSE READING Alan Turing: Codebreaker Invisible ink, cipher wheels, and hidden messages these are the spy gadgets of the past. Modern spy devices include unmanned aircraft and other spy planes. But

More information

B. Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

B. Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. B. Substitution Ciphers, continued 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Non-periodic case: Running key substitution ciphers use a known text (in

More information

La Storia dei Messaggi Segreti fino alle Macchine Crittografiche

La Storia dei Messaggi Segreti fino alle Macchine Crittografiche La Storia dei Messaggi Segreti fino alle Macchine Crittografiche Wolfgang J. Irler The Story from Secret Messages to Cryptographic Machines Wolfgang J. Irler Problem Comunicate without being understood

More information

Voting Systems, Mass Murder, and the Enigma Machine

Voting Systems, Mass Murder, and the Enigma Machine Voting Systems, Mass Murder, and the Enigma Machine Department of Mathematics University of Arizona 3/22/11 Outline Der Reichstag 1 Der Reichstag 2 3 Der Reichstag German Parliamentary Election Results

More information

Cipher Machines From Antiquity to the Enigma Machine

Cipher Machines From Antiquity to the Enigma Machine Cipher Machines From Antiquity to the Enigma Machine Wayne Summers Department of Computer Science Columbus State University Columbus, Georgia, USA Abstract More and more people worldwide are using the

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 5b September 11, 2013 CPSC 467, Lecture 5b 1/11 Stream ciphers CPSC 467, Lecture 5b 2/11 Manual stream ciphers Classical stream ciphers

More information

Purple. Used by Japanese government. Not used for tactical military info. Used to send infamous 14-part message

Purple. Used by Japanese government. Not used for tactical military info. Used to send infamous 14-part message Purple Purple 1 Purple Used by Japanese government o Diplomatic communications o Named for color of binder cryptanalysts used o Other Japanese ciphers: Red, Coral, Jade, etc. Not used for tactical military

More information

Overview: The works of Alan Turing ( )

Overview: The works of Alan Turing ( ) Overview: The works of Alan Turing (1912-1954) Dan Hallin 2005-10-21 Introduction Course in Computer Science (CD5600) The methodology of Science in Technology (CT3620) Mälardalen

More information

Cryptography Made Easy. Stuart Reges Principal Lecturer University of Washington

Cryptography Made Easy. Stuart Reges Principal Lecturer University of Washington Cryptography Made Easy Stuart Reges Principal Lecturer University of Washington Why Study Cryptography? Secrets are intrinsically interesting So much real-life drama: Mary Queen of Scots executed for treason

More information

Airplane. Estimated Casualty Statistics for the Battle of Tannenberg Allied Powers: 267,000 Central Powers: 80,000

Airplane. Estimated Casualty Statistics for the Battle of Tannenberg Allied Powers: 267,000 Central Powers: 80,000 Airplane The Battle of Tannenberg in 1914 was an important victory for the Germans. They stopped the Russian army from advancing into German-controlled territory. Prior to the outbreak of fighting, both

More information

SECURITY OF CRYPTOGRAPHIC SYSTEMS. Requirements of Military Systems

SECURITY OF CRYPTOGRAPHIC SYSTEMS. Requirements of Military Systems SECURITY OF CRYPTOGRAPHIC SYSTEMS CHAPTER 2 Section I Requirements of Military Systems 2-1. Practical Requirements Military cryptographic systems must meet a number of practical considerations. a. b. An

More information

AXIS AND ALLIES 1914 OPTIONAL RULE: RESEARCH AND DEVELOPMENT

AXIS AND ALLIES 1914 OPTIONAL RULE: RESEARCH AND DEVELOPMENT AXIS AND ALLIES 1914 OPTIONAL RULE: RESEARCH AND DEVELOPMENT Using this rule, you may attempt to develop improved military technology. If you decide to use Research & Development, it becomes the new phase

More information

Classical Cryptography

Classical Cryptography Classical Cryptography CS 6750 Lecture 1 September 10, 2009 Riccardo Pucella Goals of Classical Cryptography Alice wants to send message X to Bob Oscar is on the wire, listening to all communications Alice

More information

The number theory behind cryptography

The number theory behind cryptography The University of Vermont May 16, 2017 What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of adverse third parties. What is cryptography?

More information

Quick History: Electricity and Magnetism in the 19 th Century. Background Data: Military Communication and The Radio Game. E&M History.

Quick History: Electricity and Magnetism in the 19 th Century. Background Data: Military Communication and The Radio Game. E&M History. Background Data: Military Communication and The Radio Game Randy H. Katz CS Division, EECS Dept. University of California, Berkeley Spring 2011 Quick History: Electricity and Magnetism in the 19 th Century

More information

Background Data: Military Communication and The Radio Game

Background Data: Military Communication and The Radio Game Background Data: Military Communication and The Radio Game Randy H. Katz CS Division, EECS Dept. University of California, Berkeley Spring 2008 Quick History: Electricity and Magnetism in the 19 th Century

More information

Encryption Systems 4/14/18. We have seen earlier that Python supports the sorting of lists with the built- in.sort( ) method

Encryption Systems 4/14/18. We have seen earlier that Python supports the sorting of lists with the built- in.sort( ) method Sorting Encryption Systems CSC121, Introduction to Computer Programming We have seen earlier that Python supports the sorting of lists with the built- in.sort( ) method >>> a = [ 5, 2, 3, 1, 4 ] >>> a.sort(

More information

MODERN MARVELS: CODES NETWORK: THE HISTORY CHANNEL Writer/Producer/Director: Adrian Maher Date: April 6, 2001 TEASE

MODERN MARVELS: CODES NETWORK: THE HISTORY CHANNEL Writer/Producer/Director: Adrian Maher Date: April 6, 2001 TEASE 1 Adrian Maher/CODES MODERN MARVELS: CODES NETWORK: THE HISTORY CHANNEL Writer/Producer/Director: Adrian Maher Date: April 6, 2001 TEASE ACT ONE CAESAR ALTERED HIS ALPHABET. THE NAZIS HAD ENIGMA. THE MODERN

More information

Block Ciphers Security of block ciphers. Symmetric Ciphers

Block Ciphers Security of block ciphers. Symmetric Ciphers Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 26 Assume encryption and decryption use the same key. Will discuss how to distribute key to all parties later Symmetric ciphers unusable

More information

CANDOER News. Volume 8 Number 2 Inside this issue

CANDOER News. Volume 8 Number 2 Inside this issue CANDOER News A quarterly Newsletter dedicated to Communicators AND Others Enjoying Retirement July 2008 Summer Issue Volume 8 Number 2 Inside this issue candoercat@gmail.com or to my snail-mail address:

More information

A BIT OF. Machines that learn. Make me invisible! The robot painter. Spies like us. Computer Science for Fun Issue 1

A BIT OF. Machines that learn. Make me invisible! The robot painter. Spies like us. Computer Science for Fun Issue 1 A BIT OF Computer Science for Fun Issue 1 Machines that learn Make me invisible! The robot painter Spies like us ADA LOVELACE Victorian computing wizard Ada Lovelace was a Victorian countess. She loved

More information

EMINENT & ENIGMATIC. 10 aspects of Alan Turing

EMINENT & ENIGMATIC. 10 aspects of Alan Turing EMINENT & ENIGMATIC. 10 aspects of Alan Turing Exhibition at the Heinz Nixdorf MuseumsForum from January to December 2012 The international scientific focus in 2012 will be firmly on Alan Turing. This

More information

Reunion at Bletchley Park, 19 October 1991

Reunion at Bletchley Park, 19 October 1991 Reunion at Bletchley Park, 19 October 1991 Brian Randell Computing Laboratory University of Newcastle upon Tyne The reunion was organized by the Bletchley Archaeological and Historical Society (BAHS),

More information

Canadian History 1201 January, 2011 Exam

Canadian History 1201 January, 2011 Exam Canadian History 1201 January, 2011 Exam Name: Time: 2 Hours INSTRUCTIONS: 1. Read all the questions and instructions carefully before answering. 2. For Part A (the multiple choice), write your answers

More information

Chapter 4 The Data Encryption Standard

Chapter 4 The Data Encryption Standard Chapter 4 The Data Encryption Standard History of DES Most widely used encryption scheme is based on DES adopted by National Bureau of Standards (now National Institute of Standards and Technology) in

More information

Download Submarines Of World War Two pdf

Download Submarines Of World War Two pdf Download Submarines Of World War Two pdf Over 2,500 submarines saw action during WWII from all combatant nations, and for the first time all classes and types of submarines are covered in a single book.

More information

Airplane. Estimated Casualty Statistics for the Battle of Tannenberg Allied Powers: 267,000 Central Powers: 80,000. Artillery

Airplane. Estimated Casualty Statistics for the Battle of Tannenberg Allied Powers: 267,000 Central Powers: 80,000. Artillery a Airplane The Battle of Tannenberg in 1914 was an important victory for the Germans. They stopped the Russian army from advancing into German-controlled territory. Prior to the outbreak of fighting, both

More information

Military Technology in the World Wars

Military Technology in the World Wars Military Technology in the World Wars During the Second World War, many of the technologies that were used in the First World War became either outdated, or obsolete. The Second World War was very much

More information

LETTER OF PROMULGATION

LETTER OF PROMULGATION D EPARTMEN T OF DEFENSE CHIEF, ARMY MARS CHIEF, AIR FORCE MARS CHIEF, NAVY-MARINE CORPS MARS 22 Nov 2007 LETTER OF PROMULGATION 1. The Standard Operating Procedure for Calling and Operating a Voice Net

More information

Lecture 1: Introduction

Lecture 1: Introduction Lecture 1: Introduction Instructor: Omkant Pandey Spring 2018 (CSE390) Instructor: Omkant Pandey Lecture 1: Introduction Spring 2018 (CSE390) 1 / 13 Cryptography Most of us rely on cryptography everyday

More information

Alan Turing and the Enigma of Computability

Alan Turing and the Enigma of Computability Alan Turing and the Enigma of Computability http://kosmoi.com/technology//computer/turing/ Alan Matheson Turing, b. June 23, 1912, d. June 7, 1954, was a British mathematician who conceived of a machine

More information

World History Unit 13 Lesson 1 The Start of WWI The Belle Epoque The late 1800s & early 1900s had been a time of great scientific discoveries &

World History Unit 13 Lesson 1 The Start of WWI The Belle Epoque The late 1800s & early 1900s had been a time of great scientific discoveries & Unit 13 Lesson 1 The Start of WWI The Belle Epoque The late 1800s & early 1900s had been a time of great scientific discoveries & technological inventions. Europe was civilizing the world & living standards

More information

Cryptanalysis on short messages encrypted with M-138 cipher machine

Cryptanalysis on short messages encrypted with M-138 cipher machine Cryptanalysis on short messages encrypted with M-138 cipher machine Tsonka Baicheva Miroslav Dimitrov Institute of Mathematics and Informatics Bulgarian Academy of Sciences 10-14 July, 2017 Sofia Introduction

More information

1) He was the American President during the duration of the First World War.

1) He was the American President during the duration of the First World War. 1) He was the American President during the duration of the First World War. 2) This was the name of the treaty that ended World War I. a) Treaty of Paris b) Treaty of Versailles c) Treaty of Munich d)

More information

Cracking the Code, Part 2: Codes & Combinations

Cracking the Code, Part 2: Codes & Combinations Cracking the Code, Part 2: Codes & Combinations From fire signals to computer programming, coding has always been an essential skill for communication. This second set of lessons in the series engages

More information

Grade 7 and 8 Math Circles March 19th/20th/21st. Cryptography

Grade 7 and 8 Math Circles March 19th/20th/21st. Cryptography Faculty of Mathematics Waterloo, Ontario N2L 3G1 Centre for Education in Mathematics and Computing Grade 7 and 8 Math Circles March 19th/20th/21st Cryptography Introduction Before we begin, it s important

More information

Unit 8: In the Clouds

Unit 8: In the Clouds Cloud Computing http://isharacomix.org/bjc-course/curriculum/08-cloud-comp... 1 of 1 07/26/2013 11:35 AM Curriculum (/bjc-course/curriculum) / Unit 8 (/bjc-course/curriculum/08-cloud-computing) / Unit

More information

RICHARD FLETCHER, Secretary, the Bill Tutte Memorial Fund

RICHARD FLETCHER, Secretary, the Bill Tutte Memorial Fund keep Like all of them at Bletchley Park, they were all told never to talk about it. Churchill called them the geese that laid the golden eggs but never cackled. RICHARD FLETCHER, Secretary, the Bill Tutte

More information

Bombs Away!! The Role of Strategic Bombing in Changing Warfare in World War II

Bombs Away!! The Role of Strategic Bombing in Changing Warfare in World War II Bombs Away!! The Role of Strategic Bombing in Changing Warfare in World War II EMU TPS Workshop August 8 10, 2011 Lesson Overview: Warfare developed new tools between World War I and World War II. The

More information

Related Ideas: DHM Key Mechanics

Related Ideas: DHM Key Mechanics Related Ideas: DHM Key Mechanics Example (DHM Key Mechanics) Two parties, Alice and Bob, calculate a key that a third person Carl will never know, even if Carl intercepts all communication between Alice

More information

Navy League Summer Camp Semaphore Manual

Navy League Summer Camp Semaphore Manual Navy League Summer Camp Semaphore Manual Contents Definition of Semaphore... 3 History of Semaphore... 3 Definition of Phonetic Alphabet... 6 Phonetic Alphabet the Navy League uses... 7 Semaphore What

More information

World War II Unit Day Four U.S. History. The key events, figures, and outcomes of the Atomic Bombing of Japan.

World War II Unit Day Four U.S. History. The key events, figures, and outcomes of the Atomic Bombing of Japan. World War II Unit Day Four U.S. History The key events, figures, and outcomes of the Atomic Bombing of Japan. Title of Event: Atomic Bombing of Japan Problem or Goal: How should the U.S. end World War

More information

Larsson's A&A50 House Rules

Larsson's A&A50 House Rules Larsson's A&A50 House Rules 2009-03-17 House Rule 1 Black Sea - Official optional rule In order to maintain its neutrality, Turkey closed the narrow straights linking the Black Sea and the Mediterranean,

More information

AK274 TRACKS AND WHEELS. AK LEARNING SERIES 3 (ENGLISH) 9.95 Tracks and Wheels is the third release from the already famous AK Learning Series. The extremely talented artists within this book, take you

More information

RCN Communications Procedures 1950s 1960s. By Dennis Stapleton (RCN Ret d)

RCN Communications Procedures 1950s 1960s. By Dennis Stapleton (RCN Ret d) RCN Communications Procedures 1950s 1960s By Dennis Stapleton (RCN Ret d) Security Radio transmissions are the least secure of all the various means of communicating. These signals are easily intercepted

More information

The Fall Of Japan (World War II) By Keith Wheeler

The Fall Of Japan (World War II) By Keith Wheeler The Fall Of Japan (World War II) By Keith Wheeler If you are searched for a ebook The Fall of Japan (World War II) by Keith Wheeler in pdf format, then you have come on to faithful website. We furnish

More information

Course Business. Harry. Hagrid. Homework 2 Due Now. Midterm is on March 1. Final Exam is Monday, May 1 (7 PM) Location: Right here

Course Business. Harry. Hagrid. Homework 2 Due Now. Midterm is on March 1. Final Exam is Monday, May 1 (7 PM) Location: Right here Course Business Homework 2 Due Now Midterm is on March 1 Final Exam is Monday, May 1 (7 PM) Location: Right here Harry Hagrid 1 Cryptography CS 555 Topic 17: DES, 3DES 2 Recap Goals for This Week: Practical

More information

Seizing The Enigma: The Race To Break The German U- Boat Codes, , Revised Edition By David Kahn READ ONLINE

Seizing The Enigma: The Race To Break The German U- Boat Codes, , Revised Edition By David Kahn READ ONLINE Seizing The Enigma: The Race To Break The German U- Boat Codes, 1939 1945, Revised Edition By David Kahn READ ONLINE If you are searched for a ebook by David Kahn Seizing the Enigma: The Race to Break

More information

Drill Time: Remainders from Long Division

Drill Time: Remainders from Long Division Drill Time: Remainders from Long Division Example (Drill Time: Remainders from Long Division) Get some practice finding remainders. Use your calculator (if you want) then check your answers with a neighbor.

More information

DUBLIN CITY UNIVERSITY

DUBLIN CITY UNIVERSITY DUBLIN CITY UNIVERSITY SEMESTER ONE EXAMINATIONS 2013/2014 MODULE: CA642/A Cryptography and Number Theory PROGRAMME(S): MSSF MCM ECSA ECSAO MSc in Security & Forensic Computing M.Sc. in Computing Study

More information

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator.

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator. Lecture 32 Instructor s Comments: This is a make up lecture. You can choose to cover many extra problems if you wish or head towards cryptography. I will probably include the square and multiply algorithm

More information

Successful Implementation of the Hill and Magic Square Ciphers: A New Direction

Successful Implementation of the Hill and Magic Square Ciphers: A New Direction Successful Implementation of the Hill and Magic Square Ciphers: A New Direction ISSN:319-7900 Tomba I. : Dept. of Mathematics, Manipur University, Imphal, Manipur (INDIA) Shibiraj N, : Research Scholar

More information

How to Win Axis and Allies Style Games

How to Win Axis and Allies Style Games How to Win Axis and Allies Style Games October 31, 2006 Alan Richbourg Why Try? Whether you win or lose, especially in the long run, it s most rewarding for all players if they all make a reasonable effort

More information

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017 COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Previously Pseudorandom Functions and Permutaitons Modes of Operation Pseudorandom Functions Functions that look like random

More information

Set-Up Perform these 4 steps to prepare for play:

Set-Up Perform these 4 steps to prepare for play: Introduction Modern Naval Battles - Global Warfare is a fast-paced card game depicting naval warfare between 2 to 6 players. Each player is placed in command of a fleet of the most powerful military vessels

More information

CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI. March 10, 1996 Revision 1 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 9

CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI. March 10, 1996 Revision 1 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 9 CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI March 10, 1996 Revision 1 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 9 GERMAN REDUCTION CIPHERS ENIGMA IN HISTORICAL AND MODERN TIMES SUMMARY In Lecture 9, we circumvent

More information

10/4/10. An overview using Alan Turing s Forgotten Ideas in Computer Science as well as sources listed on last slide.

10/4/10. An overview using Alan Turing s Forgotten Ideas in Computer Science as well as sources listed on last slide. Well known for the machine, test and thesis that bear his name, the British genius also anticipated neural- network computers and hyper- computation. An overview using Alan Turing s Forgotten Ideas in

More information

Cryptography s Application in Numbers Station

Cryptography s Application in Numbers Station Cryptography s Application in Numbers Station Jacqueline - 13512074 1 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi Bandung, Jl. Ganesha 10 Bandung 40132, Indonesia

More information

IV. TROOPS FAQ SPECIALIZED UNITS 2

IV. TROOPS FAQ SPECIALIZED UNITS 2 IV. TROOPS FAQ STANDARD UNITS 1 7 8 8 Infantry Move 0-1 and battle, or move 2 no battle May Take Ground on successful Close Assault Armor Move 0-3 and battle May Overrun on successful Close Assault Artillery

More information

Alliances Leading to (Simulation Prep)

Alliances Leading to (Simulation Prep) Alliances Leading to 1914 (Simulation Prep) Sequence Review 1. Europe was out of their M.I.N.D. Militarism, Imperialism, Nationalism, Diplomacy (Alliances). 2. Assassination of Franz Ferdinand and Sophia

More information

CHAPTER 11 RADIO OPERATING PROCEDURES CHAPTER

CHAPTER 11 RADIO OPERATING PROCEDURES CHAPTER SECTION 2 ESTABLISHMENT, MAINTENANCE AND OPERATION OF COMMUNICATION SYSTEMS AND EQUIPMENT CHAPTER 11 RADIO OPERATING PROCEDURES CHAPTER 11 INTRODUCTION 11.1 11.1 Whilst the standard radio operating procedure

More information

National HRO Receivers. Presented to the Ozaukee Radio Club May 10, 2017 Patrick Volkmann W9JI

National HRO Receivers. Presented to the Ozaukee Radio Club May 10, 2017 Patrick Volkmann W9JI National HRO Receivers Presented to the Ozaukee Radio Club May 10, 2017 Patrick Volkmann W9JI Why the HRO? In the 1930 s a superhetrodyne receiver was considered almost useless for shortwave work. James

More information

SENDING MESSAGES. In the battle that followed, the British navy sank four German ships. Steady chaps!

SENDING MESSAGES. In the battle that followed, the British navy sank four German ships. Steady chaps! The Postal Museum, 2010-0423/2 SENDING MESSAGES General Post Office Engineers Communicating with troops on the front line is vitally important in any war. During the First World War, General Post Office

More information

UNIT 19 Lesson Plan 1

UNIT 19 Lesson Plan 1 UNIT 19 Lesson Plan 1 1 Introduction T: In this first lesson we'll look at the principles of the Lorenz cipher; in the next lesson we'll learn how the Lorenz cipher machine was used to break the code.

More information

MA 111, Topic 2: Cryptography

MA 111, Topic 2: Cryptography MA 111, Topic 2: Cryptography Our next topic is something called Cryptography, the mathematics of making and breaking Codes! In the most general sense, Cryptography is the mathematical ideas behind changing

More information

Chapter 4 MASK Encryption: Results with Image Analysis

Chapter 4 MASK Encryption: Results with Image Analysis 95 Chapter 4 MASK Encryption: Results with Image Analysis This chapter discusses the tests conducted and analysis made on MASK encryption, with gray scale and colour images. Statistical analysis including

More information

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext Cryptography Codes Lecture 3: The Times Cipher, Factors, Zero Divisors, and Multiplicative Inverses Spring 2015 Morgan Schreffler Office: POT 902 http://www.ms.uky.edu/~mschreffler New Cipher Times Enemy

More information

HISTORY of TELEGRAPHY. Ken Beauchamp. The Institution of Electrical Engineers

HISTORY of TELEGRAPHY. Ken Beauchamp. The Institution of Electrical Engineers HISTORY of TELEGRAPHY Ken Beauchamp The Institution of Electrical Engineers Contents List of figures xiii List of tables xvii Preface xviii Abbreviations xxi PART 1 - TERRESTRIAL TELEGRAPHY 1 1 Things

More information

Budiansky, Stephen, Her Majesty s Spymaster: Elizabeth I, Sir Francis Walsingham and the Birth of Modern Espionage, Viking, 2005.

Budiansky, Stephen, Her Majesty s Spymaster: Elizabeth I, Sir Francis Walsingham and the Birth of Modern Espionage, Viking, 2005. Early cryptology Budiansky, Stephen, Her Majesty s Spymaster: Elizabeth I, Sir Francis Walsingham and the Birth of Modern Espionage, Viking, 2005. Detail. Lots of detail. Urban, Mark, The Man Who Broke

More information

Axis & Allies Pacific FAQ

Axis & Allies Pacific FAQ Setup Axis & Allies Pacific FAQ December 11, 2003 Experienced players sometimes find that it s too easy for Japan to win. (Beginning players often decide that it s too hard for Japan to win it s all a

More information

Project VI Testing Naval Artillery and other Things That Blow Up

Project VI Testing Naval Artillery and other Things That Blow Up Project VI Testing Naval Artillery and other Things That Blow Up In this project, you should hand in the answers to questions 1-9 at the end. Show and explain your work. As WWI progressed, the British

More information

Revolutionary Activity Guide Discover Revolutionary New Jersey

Revolutionary Activity Guide Discover Revolutionary New Jersey Revolutionary Activity Guide Discover Revolutionary New Jersey www.revolutionarynj.org New Jersey and The American Revolution New Jersey was an important place during the American Revolution. Located between

More information

o Broken by using frequency analysis o XOR is a polyalphabetic cipher in binary

o Broken by using frequency analysis o XOR is a polyalphabetic cipher in binary We spoke about defense challenges Crypto introduction o Secret, public algorithms o Symmetric, asymmetric crypto, one-way hashes Attacks on cryptography o Cyphertext-only, known, chosen, MITM, brute-force

More information

Software Security. Encryption. Encryption. Encryption. Encryption. Encryption. Week 5 Part 1. Masking Data from Unwelcome eyes

Software Security. Encryption. Encryption. Encryption. Encryption. Encryption. Week 5 Part 1. Masking Data from Unwelcome eyes Software Security Encryption Week 5 Part 1 Masking Data from Unwelcome eyes Encryption Encryption Encryption is the process of transforming data into another form Designed to make it readable only by those

More information

Grade 7/8 Math Circles Winter March 24/25 Cryptography

Grade 7/8 Math Circles Winter March 24/25 Cryptography Faculty of Mathematics Waterloo, Ontario N2L 3G1 Centre for Education in Mathematics and Computing Grade 7/8 Math Circles Winter 2015 - March 24/25 Cryptography What is Cryptography? Cryptography is the

More information

THE WRITERS VOICE. Carl Tighe

THE WRITERS VOICE. Carl Tighe THE WRITERS VOICE The writer s voice is an element in achieving a professional standard of competence in writing. It is shorthand for the phenomenon where the writer has thoroughly mastered what they do;

More information

Stream Ciphers And Pseudorandomness Revisited. Table of contents

Stream Ciphers And Pseudorandomness Revisited. Table of contents Stream Ciphers And Pseudorandomness Revisited Foundations of Cryptography Computer Science Department Wellesley College Fall 2016 Table of contents Introduction Stream Ciphers Stream ciphers & pseudorandom

More information

1 Introduction to Cryptology

1 Introduction to Cryptology U R a Scientist (CWSF-ESPC 2017) Mathematics and Cryptology Patrick Maidorn and Michael Kozdron (Department of Mathematics & Statistics) 1 Introduction to Cryptology While the phrase making and breaking

More information

Math 1111 Math Exam Study Guide

Math 1111 Math Exam Study Guide Math 1111 Math Exam Study Guide The math exam will cover the mathematical concepts and techniques we ve explored this semester. The exam will not involve any codebreaking, although some questions on the

More information

TACTICAL DATA LINK FROM LINK 1 TO LINK 22

TACTICAL DATA LINK FROM LINK 1 TO LINK 22 Anca STOICA 1 Diana MILITARU 2 Dan MOLDOVEANU 3 Alina POPA 4 TACTICAL DATA LINK FROM LINK 1 TO LINK 22 1 Scientific research assistant, Lt. Eng.Military Equipment and Technologies Research Agency 16 Aeroportului

More information

An Introduction to Traditional Cryptography and Cryptanalysis for Amateurs. Chris Spackman

An Introduction to Traditional Cryptography and Cryptanalysis for Amateurs. Chris Spackman An Introduction to Traditional Cryptography and Cryptanalysis for Amateurs Chris Spackman 10 Feb. 2003 Contents 1 Preface 2 1.1 Conventions Used in this Book................... 2 1.2 Warning: Randomness.......................

More information

Lord Kitchener s Legacy

Lord Kitchener s Legacy Lord Kitchener s Legacy The Lost Treasure of H.M.S. Hampshire Can you solve the clues to find the lost gold? Lord Kitchener s Legacy The Lost Treasure of H.M.S. Hampshire Lord Horatio Kitchener was a great

More information

German Raider Strategies By Elihu Feustel

German Raider Strategies By Elihu Feustel German Raider Strategies By Elihu Feustel One approach is to use a minimal raider program in conjunction with submarine warfare to kill as many transports as possible. Whether your goal is the economic

More information

Georgia Department of Education Georgia Standards of Excellence Framework GSE Grade 8 Mathematics Unit 4

Georgia Department of Education Georgia Standards of Excellence Framework GSE Grade 8 Mathematics Unit 4 Secret Codes and Number Rules: Part 1 Encryption is used by spies, secret societies, and other organizations to transfer information without other people reading their messages. Secret codes can be created

More information

Network Security: Secret Key Cryptography

Network Security: Secret Key Cryptography 1 Network Security: Secret Key Cryptography Henning Schulzrinne Columbia University, New York schulzrinne@cs.columbia.edu Columbia University, Fall 2000 cfl1999-2000, Henning Schulzrinne Last modified

More information

Key People Causes Battles Terms. Grab Bag

Key People Causes Battles Terms. Grab Bag Key People Causes Battles Terms Grab Bag 200 200 200 200 200 400 400 400 400 400 600 600 600 600 600 800 800 800 800 800 1000 1000 1000 1000 1000 Key People - 200 Question This man is given credit for

More information

SOLUTION OF POLYGRAPHIC SUBSTITUTION SYSTEMS. Analysis of Four-Square and Two-Square Ciphers

SOLUTION OF POLYGRAPHIC SUBSTITUTION SYSTEMS. Analysis of Four-Square and Two-Square Ciphers CHAPTER 7 SOLUTION OF POLYGRAPHIC SUBSTITUTION SYSTEMS Section I Analysis of Four-Square and Two-Square Ciphers 7-1. Identification of Plaintext Recovery of any digraphic system is largely dependent on

More information

DIY Pencil-and-Paper Encryption

DIY Pencil-and-Paper Encryption DIY Pencil-and-Paper Encryption Today we re surrounded by massive computational power and vast communication systems. When you visit your bank s site, you don t think about negotiating cryptographic keys

More information

CRYPTANALYSIS OF THE PERMUTATION CIPHER OVER COMPOSITION MAPPINGS OF BLOCK CIPHER

CRYPTANALYSIS OF THE PERMUTATION CIPHER OVER COMPOSITION MAPPINGS OF BLOCK CIPHER CRYPTANALYSIS OF THE PERMUTATION CIPHER OVER COMPOSITION MAPPINGS OF BLOCK CIPHER P.Sundarayya 1, M.M.Sandeep Kumar 2, M.G.Vara Prasad 3 1,2 Department of Mathematics, GITAM, University, (India) 3 Department

More information

7 th Grade Social Studies Common Final Exam (CFE) Jeopardy Review Game

7 th Grade Social Studies Common Final Exam (CFE) Jeopardy Review Game 7 th Grade Social Studies Common Final Exam (CFE) Jeopardy Review Game Common Final Exam Jeopardy Review Game ERA 6 Interaction & Change ERA 7 Revolution & Empire ERA 8 Global Conflict ERA 9 The Emerging

More information

World War I and Revolutions Study Guide ( )

World War I and Revolutions Study Guide ( ) Name World War I and Revolutions Study Guide (1900-1939) World War I (1914-1918) was caused by competition among industrial nations in Europe and a failure of diplomacy. The war transformed European and

More information

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext Cryptography Codes Lecture 4: The Times Cipher, Factors, Zero Divisors, and Multiplicative Inverses Spring 2014 Morgan Schreffler Office: POT 902 http://www.ms.uky.edu/~mschreffler New Cipher Times Enemy

More information

We are going to begin a study of beadwork. You will be able to create beadwork on the computer using the culturally situated design tools.

We are going to begin a study of beadwork. You will be able to create beadwork on the computer using the culturally situated design tools. Bead Loom Questions We are going to begin a study of beadwork. You will be able to create beadwork on the computer using the culturally situated design tools. Read the first page and then click on continue

More information

ECE 583 Lectures 15 RADAR History and Basics

ECE 583 Lectures 15 RADAR History and Basics ECE 583 Lectures 15 RADAR History and Basics 1 -RADAR - A BIT OF HISTORY The acronym - RADAR is an acronym for Radio Detection and Ranging The Start: The thought/concept of using propagating EM waves began

More information

Seizing The Enigma: The Race To Break The German U-Boat Codes, , Revised Edition By David Kahn READ ONLINE

Seizing The Enigma: The Race To Break The German U-Boat Codes, , Revised Edition By David Kahn READ ONLINE Seizing The Enigma: The Race To Break The German U-Boat Codes, 1939 1945, Revised Edition By David Kahn READ ONLINE Find great deals on ebay for enigma code and enigma the Race to Break the German U-boat

More information

Differential Cryptanalysis of REDOC III

Differential Cryptanalysis of REDOC III Differential Cryptanalysis of REDOC III Ken Shirriff Address: Sun Microsystems Labs, 2550 Garcia Ave., MS UMTV29-112, Mountain View, CA 94043. Ken.Shirriff@eng.sun.com Abstract: REDOC III is a recently-developed

More information