Voting Systems, Mass Murder, and the Enigma Machine

Similar documents
Historical cryptography 2. CSCI 470: Web Science Keith Vertanen

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

CPSC 467: Cryptography and Computer Security

D. Plurality-with-Elimination Method

B. Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Purple. Used by Japanese government. Not used for tactical military info. Used to send infamous 14-part message

Name: Exam Score: /100. Exam 1: Version C. Academic Honesty Pledge

Chapter 4 The Data Encryption Standard

Block Ciphers Security of block ciphers. Symmetric Ciphers

MA 111 Worksheet Sept. 9 Name:

MA 110 Homework 1 ANSWERS

Alan Turing: Codebreaker

Grade 7 and 8 Math Circles March 19th/20th/21st. Cryptography

Math 1111 Math Exam Study Guide

Code Breakers: Uncovering German Messages. by Rena Korb. Scott Foresman Reading Street 4.4.4

EMINENT & ENIGMATIC. 10 aspects of Alan Turing

Lecture 1: Introduction

Background Data: Naval Warfare, Battle of the Atlantic, Cryptography, and the Code Game. Battle of the Atlantic Allied Convoys vs.

THE 1912 PRESIDENTIAL ELECTION

Network Security: Secret Key Cryptography

La Storia dei Messaggi Segreti fino alle Macchine Crittografiche

Challenge 2. uzs yfr uvjf kay btoh abkqhb khgb tv hbk lk t tv bg akwv obgr

A Brief History of Computer Science and Computing

Codes and Nomenclators

Note that there are questions printed on both sides of each page!

V.Sorge/E.Ritter, Handout 2

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1

Math 1001: Excursions in Mathematics Final Exam: 9 May :30-4:30 p.m.

Alan Turing and the Enigma of Computability

Grade 7/8 Math Circles Winter March 24/25 Cryptography

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

Two Candidates in Lockstep on the Brink of the Debates

Math 167 Ch 9 Review 1 (c) Janice Epstein

CRYPTANALYSIS OF THE PERMUTATION CIPHER OVER COMPOSITION MAPPINGS OF BLOCK CIPHER

Classical Cryptography

The number theory behind cryptography

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

Overview: The works of Alan Turing ( )

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

Math June Review: Probability and Voting Procedures

10/4/10. An overview using Alan Turing s Forgotten Ideas in Computer Science as well as sources listed on last slide.

Cipher Machines From Antiquity to the Enigma Machine

Barbarossa: The War in the East, Second Edition "The Child's Game of Barbarossa" v 1.0

A BIT OF. Machines that learn. Make me invisible! The robot painter. Spies like us. Computer Science for Fun Issue 1

Gore Inches Closer, But Bush Still Leads

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

A Glossary of Voting Terminology

DOWNLOAD OR READ : MYSTERIOUS ALEX BUILDING BLOCKS LIBRARY LEVEL 8 BOOK 4 PDF EBOOK EPUB MOBI

World History Unit 13 Lesson 1 The Start of WWI The Belle Epoque The late 1800s & early 1900s had been a time of great scientific discoveries &

New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256

MAT 302: ALGEBRAIC CRYPTOGRAPHY. Department of Mathematical and Computational Sciences University of Toronto, Mississauga.

DUBLIN CITY UNIVERSITY

PERMUTATIONS - II JUNIOR CIRCLE 11/17/2013

Cryptanalysis on short messages encrypted with M-138 cipher machine

RICHARD FLETCHER, Secretary, the Bill Tutte Memorial Fund

Secret Key Systems (block encoding) Encrypting a small block of text (say 128 bits) General considerations for cipher design:

Encryption Systems 4/14/18. We have seen earlier that Python supports the sorting of lists with the built- in.sort( ) method

SOLUTION OF POLYGRAPHIC SUBSTITUTION SYSTEMS. Analysis of Four-Square and Two-Square Ciphers

The Cryptoclub. Blackline Masters. Using Mathematics to Make and Break Secret Codes. to accompany. Janet Beissinger Vera Pless

AP European History. Course Overview. First Quarter: Second Quarter: Third Quarter:

Grade 6 Math Circles Combinatorial Games - Solutions November 3/4, 2015

An Axis & Allies variant

Public Key Cryptography

Number Theory and Public Key Cryptography Kathryn Sommers

Seventeenth Annual University of Oregon Eugene Luks Programming Competition

Combinational Mathematics - I

Unit 8: In the Clouds

Permutations and Combinations Problems

Maths Berg. Grade 8 Mathematics Paper 1 November 2015 Marks Available: 140 Time Available: 2 ¼ hours

LAMC Junior Circle February 3, Oleg Gleizer. Warm-up

ElGamal Public-Key Encryption and Signature

DES Data Encryption standard

Larsson's A&A50 House Rules

Introduction to Cryptography

Theodore Roosevelt Leads America Into the 20th Century

Grade 7/8 Math Circles Game Theory October 27/28, 2015

Chapter 4 MASK Encryption: Results with Image Analysis

WNBC/Marist Poll Poughkeepsie, NY Phone Fax

World War I and Revolutions Study Guide ( )

Successful Implementation of the Hill and Magic Square Ciphers: A New Direction

Week 3: Block ciphers

Cryptography Made Easy. Stuart Reges Principal Lecturer University of Washington

Discuss WWII Begin looking over Chapter 19: The Cold War Watch Crash Course

DUBLIN CITY UNIVERSITY

Combinational Mathematics Part 1

Part I. First Notions

Objectives. Module 6: Sampling

National HRO Receivers. Presented to the Ozaukee Radio Club May 10, 2017 Patrick Volkmann W9JI

SECURITY OF CRYPTOGRAPHIC SYSTEMS. Requirements of Military Systems

Math 1111 Math Exam Study Guide

Introduction to Talking Robots

FOX News/Opinion Dynamics Poll

Solution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result.

Introduction to Cryptography CS 355

MA 111, Topic 2: Cryptography

THE GEORGE LUTZAI COLLECTION. 14 Manuscript Boxes. Processed: May, 1967 Accession Number 19 By: PCG

Stream Ciphers And Pseudorandomness Revisited. Table of contents

Caesar Augustus. Introduction. Caesar Augustus Copyright Edward Seager A board game by Edward Seager

FOX News/Mason-Dixon New York State Poll

Transcription:

Voting Systems, Mass Murder, and the Enigma Machine Department of Mathematics University of Arizona 3/22/11

Outline Der Reichstag 1 Der Reichstag 2 3

Der Reichstag

German Parliamentary Election Results Figure: SPRING 1924

German Parliamentary Election Results Figure: WINTER 1924

German Parliamentary Election Results Figure: SPRING 1928

German Parliamentary Election Results Figure: FALL 1930

German Parliamentary Election Results Figure: SUMMER 1932

German Parliamentary Election Results Figure: FALL 1932

German Parliamentary Election Results Figure: SPRING 1933

German Parliamentary Election Results Figure: FALL 1933

I consider it completely unimportant who in the party will vote, or how; but what is extraordinarily important is this who will count the votes, and how. Figure: Joseph Stalin

1932 German Presidential Runoff: Round One Candidate # of votes % Hindenberg 18,651,497 49.6 Hitler 11,339,446 30.2 Thälmann 4,983,341 13.2 Düsterberg 2,557,729 6.8 No majority; Düsterberg withdraws; a revote is held.

1932 German Presidential Runoff: Round Two Candidate # of votes % Hindenberg 19,359,983 53.1 Hitler 13,418,517 36.7 Thälmann 3,706,759 10.1 Hindenberg wins with majority... but if no Thälmann supporters changed their votes, round 3 would have given Hitler another chance to make up ground. This an example of tactical voting.

In US presidential elections, we only require plurality (largest percentage) to win a state. This leads to spoiler situations: Candidate % Clinton 43.01 Bush 37.45 Perot 18.91 Other 0.63 Table: Popular Vote, 1992 Candidate % Bush 48.847 Gore 48.838 Nader 1.635 Buchanan 0.293 Other 0.387 Table: Florida Results, 2000

2009 Burlington, VT Mayoral Race: Round One of IRV 1 Montroll Montroll Kiss Kiss Wright Wright 2 Kiss Wright Montroll Wright Kiss Montroll 3 Wright Kiss Wright Montroll Montroll Kiss # 1621 935 1890 1091 1397 1897 # 2554 2981 3294 Table: A Possible Preference Schedule Montroll (D) is eliminated despite being the Condorcet winner; votes split among Kiss and Wright.

2009 Burlington, VT Mayoral Race: Round Two of IRV 1 Kiss Wright 2 Wright Kiss # 2981 + 1621 3294 + 935 # 4602 4229 Table: A Possible Preference Schedule Wright (R) is eliminated despite having plurality; Kiss (P) wins.

What if Kiss (the winner) had done better? 1 Montroll Montroll Kiss Kiss Wright Wright 2 Kiss Wright Montroll Wright Kiss Montroll 3 Wright Kiss Wright Montroll Montroll Kiss # 1621 935 1890 1841 647 1897 # 2554 2981 + 750 3294 750 # 2554 3731 2544 Table: A Possible Preference Schedule Wright (R) is eliminated; votes split among Kiss and Montroll.

What if Kiss (the winner) had done better? 1 Montroll Kiss 2 Kiss Montroll # 2554 + 1897 3731 + 647 # 4451 4378 Table: A Possible Preference Schedule Kiss (P) is eliminated despite doing better; Montroll (D) wins! This is a violation of monotonicity.

Who were the Nazis? pro-military: regain lost territories and ignore war reparations Figure: Hitler, Himmler, & others

Who were the Nazis? pro-military: regain lost territories and ignore war reparations used simplified and symbolic propaganda, fear, repetition, vague promises Figure: Hitler, Himmler, & others

Who were the Nazis? pro-military: regain lost territories and ignore war reparations used simplified and symbolic propaganda, fear, repetition, vague promises Figure: Hitler, Himmler, & others anti-semitic, anti-roma, anti-socialist, anti-gay,...: deported/arrested/killed

German Flag and Coat: 1918-1933

Nazi Flag and Insignia: 1933-1945

Figure: Nazi Postcard

Figure: Nazi Propaganda Poster

Figure: Nazi Children s Book

Moritz Schlick was a German philosopher and physicist interested in the foundations of mathematics.

Moritz Schlick was a German philosopher and physicist interested in the foundations of mathematics. He organized the Vienna Circle, a regular gathering of some of the world s most most preeminent critical thinkers.

Moritz Schlick was a German philosopher and physicist interested in the foundations of mathematics. He organized the Vienna Circle, a regular gathering of some of the world s most most preeminent critical thinkers.

9/11 American Civil War The Holocaust

Permutations Plaintext: ab c de f g h i j k l m n o p q r s t uvwx yz Ciphertext: EKMFLGDQVZNTOWYHXUSPA I BRCJ

Permutations Plaintext: ab c de f g h i j k l m n o p q r s t uvwx yz Ciphertext: EKMFLGDQVZNTOWYHXUSPA I BRCJ SAKSP VPAPV YWMVH QLUS s ub s t i t u t i o n c i p he r s

Permutations Plaintext: ab c de f g h i j k l m n o p q r s t uvwx yz Ciphertext: EKMFLGDQVZNTOWYHXUSPA I BRCJ SAKSP VPAPV YWMVH QLUS s ub s t i t u t i o n c i p he r s Cycle Notation: (aeltphqxru)(bknw)(cmoy)(dfg)(iv)(jz)(s)

There are many possible substitution ciphers (permutations): 26! = 26 25 24 2 1 = 403291461126605635584000000

There are many possible substitution ciphers (permutations): 26! = 26 25 24 2 1 = 403291461126605635584000000 Languages have patterns: e.g., letters like e, t, a, o, i, n, s, occur often, and there are common 2- and 3-letter combos...

There are many possible substitution ciphers (permutations): 26! = 26 25 24 2 1 = 403291461126605635584000000 Languages have patterns: e.g., letters like e, t, a, o, i, n, s, occur often, and there are common 2- and 3-letter combos... For this reason, the Germans came up with a machine to systematically generate a new permutation for every letter.

Figure: An Enigma Machine and Diagram Enigma generates 16,900 permutations for a given setting.

Der Reichstag Figure: Enigma Circuit

Der Reichstag Figure: Enigma Circuit Each component is a permutation, and composing gives a product of permutations. S 1 N 1 M 1 L 1 RLMNS,

Der Reichstag Figure: Enigma Circuit Each component is a permutation, and composing gives S 1 N 1 M 1 L 1 RLMNS, a product of permutations. Note: composition isn t commutative, so nothing cancels.

The fast rotor moves forward each keystroke, so if P = (abcdefghijklmnopqrstuvwxyz),

The fast rotor moves forward each keystroke, so if P = (abcdefghijklmnopqrstuvwxyz), then the next letter gets permuted by S 1 P 1 N 1 M 1 L 1 RLMNPS = (LMNPS) 1 R(LMNPS)

The fast rotor moves forward each keystroke, so if P = (abcdefghijklmnopqrstuvwxyz), then the next letter gets permuted by S 1 P 1 N 1 M 1 L 1 RLMNPS = (LMNPS) 1 R(LMNPS) and the next letter gets permuted by S 1 P 2 N 1 M 1 L 1 RLMNP 2 S = (LMNP 2 S) 1 R(LMNP 2 S)

The reflector R was self-reciprocal: R 2 = 1 (the permutation sending each letter to itself)

The reflector R was self-reciprocal: R 2 = 1 (the permutation sending each letter to itself) so every Enigma permutation was also self-reciprocal: (X 1 RX) 2 = X 1 RXX 1 RX = X 1 R 2 X = X 1 X = 1

The reflector R was self-reciprocal: R 2 = 1 (the permutation sending each letter to itself) so every Enigma permutation was also self-reciprocal: (X 1 RX) 2 = X 1 RXX 1 RX = X 1 R 2 X = X 1 X = 1 So if we start with the same setting is used to encrypt a message, we can decrypt by typing it into the keyboard.

Being self-reciprocal is convenient, but it s also a weakness.

Being self-reciprocal is convenient, but it s also a weakness. Another weakness is that of depth, meaning that the setting needed to be changed for every message.

Being self-reciprocal is convenient, but it s also a weakness. Another weakness is that of depth, meaning that the setting needed to be changed for every message. A groundsetting was used to send 3-letter message settings.

Figure: Marian Rejewski...found patterns in in these encrypted message settings and used permutation theory to crack the Enigma.

Figure: Marian Rejewski...found patterns in in these encrypted message settings and used permutation theory to crack the Enigma. Figure: Cyclometer...used to determine cycle types by replicating Enigma motors. Voting Systems, Mass Murder, and the Enigma Machine

Figure: Alan Turing... built off the work of Rejewski helping to win the war for the Allies, but he was chemically castrated by his own government for being homosexual.

Figure: Alan Turing Figure: Replicated Bombe... built off the work of Rejewski helping to win the war for the Allies, but he was chemically castrated by his own government for being homosexual....at Bletchley park; these electromechanical machines were used to determine daily settings by linking up Enigma copies in series.