Background Data: Naval Warfare, Battle of the Atlantic, Cryptography, and the Code Game. Battle of the Atlantic Allied Convoys vs.

Similar documents
Historical cryptography 2. CSCI 470: Web Science Keith Vertanen

Alan Turing: Codebreaker

Quick History: Electricity and Magnetism in the 19 th Century. Background Data: Military Communication and The Radio Game. E&M History.

Background Data: Military Communication and The Radio Game

U.S. vs. British Viewpoints. Background Data:

EC312 Lesson 20: Electronic Warfare (3/20/14)

CONVERGENCE BETWEEN SIGNALS INTELLIGENCE AND ELECTRONIC WARFARE SUPPORT MEASURES

B. Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

HISTORY of TELEGRAPHY. Ken Beauchamp. The Institution of Electrical Engineers

British Commonwealth 70. CANADA AND SOUTH AFRICA 71. AUSTRALIA 70.1 CANADA: 71.1 OVERVIEW: 70.2 SOUTH AFRICA:

Areas of the museum to visit for this lesson plan: The Admiral Nimitz Museum and the George H.W. Bush Gallery

Codes and Nomenclators

Alan Turing and the Enigma of Computability

Intercepting WW II Enemy Wireless Signals at Ottawa Monitoring Station. Ernie Brown VA3OEB

During the next two months, we will discuss the differences

General Research. Air Research Projects. Jets (Germany, Britain, U.S., Russia, Japan) Air Range (Germany, Western Allies, Russia, Japan)

Purple. Used by Japanese government. Not used for tactical military info. Used to send infamous 14-part message

Introduction to Electronic Defence EEE5106S

A BIT OF. Machines that learn. Make me invisible! The robot painter. Spies like us. Computer Science for Fun Issue 1

The depth HQIBPEXEZMUG is intercepted & read. September December Whole of Research Section works on trying to analyze the key produced by the depth

German Raider Strategies By Elihu Feustel

CANDOER News. Volume 8 Number 2 Inside this issue

Code Breakers: Uncovering German Messages. by Rena Korb. Scott Foresman Reading Street 4.4.4

ELECTRONIC WARFARE. Robert Inkol. Defence Research and Development Canada

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

THE WRITERS VOICE. Carl Tighe

TACTICAL DATA LINK FROM LINK 1 TO LINK 22

Leveraging Digital RF Memory Electronic Jammers for Modern Deceptive Electronic Attack Systems

Improving Performance through Superior Innovative Antenna Technologies

Admiralty Trilogy Harmonization Process

Lecture 1: Introduction

AXIS AND ALLIES 1914 OPTIONAL RULE: RESEARCH AND DEVELOPMENT

CPSC 467: Cryptography and Computer Security

Heidi Robinson Today, I m going to talk to you about resiliency. Resiliency is not a term that is easily defined nor is it easily achievable. As I con

Summer Homework. Trace each number. Count to 10. Complete the picture. Tell a story about your picture..

Reunion at Bletchley Park, 19 October 1991

Download Submarines Of World War Two pdf

Harpoon 4.2 Evolution and Improvements

EMINENT & ENIGMATIC. 10 aspects of Alan Turing

Making Telecommunications in the First World War

SECURITY OF CRYPTOGRAPHIC SYSTEMS. Requirements of Military Systems

Seizing The Enigma: The Race To Break The German U- Boat Codes, , Revised Edition By David Kahn READ ONLINE

Larsson's A&A50 House Rules

FIRE FROM THE SKIES. Leonard R. Heinz

Autonomous Tactical Communications

Overview: The works of Alan Turing ( )

Cryptography Made Easy. Stuart Reges Principal Lecturer University of Washington

MODERN MARVELS: CODES NETWORK: THE HISTORY CHANNEL Writer/Producer/Director: Adrian Maher Date: April 6, 2001 TEASE

Chapter 14 Section 3. The War in the Pacific

Empire of the Sun. The Pacific War Table of Contents. Empire of the Sun. Game Design by Mark Herman V3.0

Cipher Machines From Antiquity to the Enigma Machine

3 Planning the Jamming Operation

Military Technology in the World Wars

Proposal # xxxxxxxxxxxx. Intercept Jammer. Date:

UNIT 1. 1-S Scene: L. A. International Airport

Airplane. Estimated Casualty Statistics for the Battle of Tannenberg Allied Powers: 267,000 Central Powers: 80,000

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS I CH-65

Rongammers' air rules for Memoir '44

From Australia to Zimmermann: A Brief History of Cable Telegraphy during World War One

Introduction. Echelon.

My Credentials? My Credentials? The Right Tunes? Wavemeters for British Army and Air Force uses in World War One time

Princeton University Jan. 23, 2015 Dr. Maryann Cusimano Love

Science and Technology for Naval Warfare,

Chapter 2 Threat FM 20-3

If You Give A Mouse A Letter He ll Want The Whole Alphabet By

National HRO Receivers. Presented to the Ozaukee Radio Club May 10, 2017 Patrick Volkmann W9JI

Evolution of Sensor Suites for Complex Environments

Bulgaria: May enter the war any time from II 1915 on, or if Serbia is conquered.

SPONSORED BY 1 MARCH Illustrations Jim Field. Photography Simon Webb DESIGN GUIDELINES

A nostalgic edition for contemporary times. Attack and capture the flag!

Chapter 4. Meaconing, Intrusion, Jamming, and Interference Reporting

Introduction. Playing time: min. Players: 1-4 Age: +8

Airplane. Estimated Casualty Statistics for the Battle of Tannenberg Allied Powers: 267,000 Central Powers: 80,000. Artillery

Drill Time: Remainders from Long Division

Concordia University Department of Computer Science and Software Engineering. SOEN Software Process Fall Section H

DEFENSE and SECURITY RIGEL ES AND. Defense and security in five continents. indracompany.com

Introduction. Victory. Solitaire Decisions. Campaigns

UNCLASSIFIED )UNCLASSIFIED

Voting Systems, Mass Murder, and the Enigma Machine

AFB OH Z XU ET AL 24 FEB 83 UAI FE FTD-ID(RS) T-i /2/2 N

A Review of Vulnerabilities of ADS-B

Electronic Warfare Training in the Pacific Northwest

Mission Solution 300

The C2/C4ISR Systems Market

Pulse digitizer generator for ESM systems

Operation Shingle The Battle for the Beachhead January 22 nd - March 1 st 1944

WHAT IT TAKES TO WIN SUCCEEDING IN 21 ST CENTURY BATTLE NETWORK COMPETITIONS JOHN STILLION BRYAN CLARK

Lord of the Flies. Introduction

Acceptance & Submission Guidelines Militaria

Canada and the Second World War

History of Naval Ships Wireless Systems I s to the 1920 s

DISTRIBUTED COHERENT RF OPERATIONS

Maritime Situational Awareness

RULES OF PLAY. Table of Contents. One Small Step 7507 Hillmeade Road Bowie MD Version 1.2d February, 2018

Presented By : Lance Clayton AOC - Aardvark Roost

National Data Links: Waveform Design and its role in Modern Electronic Warfare operations

CHECK OUT OUR WEBSITE SOME TIME FOR PLENTY OF ARTICES ABOUT SELF DEFENSE, SURVIVAL, FIREARMS AND MILITARY MANUALS.

Empire of the Sun. The Pacific War Table of Contents. Empire of the Sun. Game Design by Mark Herman

Passive Radars as Sources of Information for Air Defence Systems

A MINI REVIEW ON RADAR FUNDAMENTALS AND CONCEPT OF JAMMING

Transcription:

Background Data: Naval Warfare, Battle of the Atlantic, Cryptography, and the Code Game Randy H. Katz CS Division, EECS Dept. University of California, Berkeley Spring 2013 Battle of the Atlantic Allied Convoys vs. German U-Boats Germans on the Offensive, Allies on the Defensive Choosing Targets Assembling Forces Finding the Enemy Attacking with Precision or Causing As Much Damage as Possible Avoiding/Surviving Defenders Determining the Effects of Naval Combat 1

Battle of the Atlantic Allied Convoys vs. German U-Boats Allies on the Offensive, Germans on the Defensive Choosing Targets Assembling Forces Finding the Enemy Attacking with Precision or Causing As Much Damage as Possible Avoiding/Surviving Defenders Determining the Effects of Naval Combat 2

Convoys Das Boot 3

Naval Intelligence Finding the Enemy, Hiding Your Forces Is an "unbreakable" code possible? Is it possible to "hide" coded transmissions? How do you balance the need to communicate with the need to be invisible to easedropping? Cryptography, Cryptanalysis Heroic Codebreaking: Enigma, the Battle of the Atlantic, and the Development of the Computer Codebreaking in the Pacific: Intelligence successes at Midway Technology and the Battle of the Atlantic Airborne Radars, High Frequency Direction Finding Signals Intelligence Collecting information about a (potential) foe's capabilities (economic, military) and intentions (political, military) as old as nations themselves! New about the late 19th and 20th Centuries: Rise of far-flung empires, increasing use of technologies for communications, need for command and control 4

Development of Communications Technology Commercial = Militarily Relevant Technologies Electric Telegraph (1837) Undersea Cables (1842); transatlantic cable (1866) Transcontinental Telegraph (1861); crucial role in American Civil War Marconi, Radio (1895): first customer--the Royal Navy! Counter measures: cut foe's undersea cables, message interception, message deception; Counter counter measure: radio communications Counter counter counter measure: jamming, direction finding Every measure has a counter measure, and in turn, a countercounter measure! To Communicate is to Reveal Communication methods lead to detection Can the detector be detected? identified as to individual and location? Can the interceptor be fooled? traffic analysis and deception? Can the communicator be stopped from successfully communicating? jamming? Can the communicator hide his/her communications? stealth? 5

Intelligence Collection Spying, reconnaissance, spy satellites, code breaking Human intelligence (HUMINT) aka spies Signal intelligence (SIGINT)/Communications intelligence (COMINT) often used interchangeable, especially up through WWII Modern militaries use many forms of electromagnetic radiation that don't involve communications, but are used for detection (e.g., RADAR) Information derived from the monitoring, interception, decryption and evaluation of enemy radio communications Naval intelligence particularly important, as until the development of recon satellites, the ability to put "eyes" at sea was very limited! Codebreaking Before the Age of Radio, much more difficult to intercept cable traffic Radio potentially places large numbers of encrypted messages in the hands of the cryptanalysts Key to breaking the code! British Admiralty Room 40: Codebreaking Room 6

Enigma Machine Existence of ULTRA ("Very Special Intelligence") first revealed in 1974! Changed completely the way we view the history of WW II Combined encoding/decoding machine Five rotor system, three in use at any time How it worked and why it was hard to crack Use of per message keys makes analysis difficult But patterns provide the way in: doubly encrypted message keys Poles reverse engineer a stolen Enigma machine Invention of the Bombe: mechanical device to exhaust all enumerations New Enigma stumps the Poles who turn to the British (1939) Bletchley Park Guessing the day key: cillies common three letter sequences Human operator weakness! Rules of usage also limit the alternatives Stereotypical message structure helps too Turing s idea: the crib--<common plain text, encrypted text> If found, then could determine Enigma settings Compute the transformation in parallel: Turing s Bombe 10 May 40: Germans change their message key scheme Naval codes hardest to break more sophisticated Enigma used Battle of Atlantic was being lost! Solution: pinch the codebooks! 7

Enigma Enigma Deciphered 8

The Bombe Colossus The Code Game % Letter Occurrence in English Text a 7.49 b 1.29 c 3.54 d 3.62 e 14.00 f 2.18 g 1.74 h 4.22 i 6.65 j 0.27 k 0.47 l 3.57 m 3.39 n 6.74 o 7.37 p 2.43 q 0.26 r 6.14 s 6.95 t 9.85 u 3.00 v 1.16 w 1.69 x 0.28 y 1.64 z 0.04 9

The Code Game More Text Analysis Common Digrams: th he at st an in ea nd er en re nt to es on ed is ti Common Trigrams: the and tha hat ent ion for tio has edt tis ers res ter con ing men tho Double Letters: ll tt ss ee pp oo rr ff cc dd nn Common word ending letters: e t s d n r y Most common words: the of are I and you a can to he her that in was is has it him his 10