PURPLE and The Life of William Friedman Peter Smith Matt Salmon.

Slides:



Advertisements
Similar presentations
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Advertisements

Origin and Nature of the Allied Cryptographic Advantage During World War II By Grant Musick.
Kyle Johnson. Cryptology Comprised of both Cryptography and Cryptanalysis Cryptography - which is the practice and study of techniques for secure communication.
Cryptology Making & Breaking Codes & Ciphers. AJ 1152 Cryptology Cryptography –Science of creating codes or ciphers Cryptanalysis –Science of breaking.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
1 Codes, Ciphers, and Cryptography-Ch 3.2 Michael A. Karls Ball State University.
Week 2 - Friday.  What did we talk about last time?  Substitution ciphers  Vigenère ciphers  One-time pad.
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Enigma? Several Images from Wikipedia (an online encyclopedia)
Enigma Meghan Emilio Faculty Sponsor: Ralph Morelli (Computer Science)
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Sigaba 1 Sigaba Sigaba 2 Sigaba  Used by Americans during WWII o And afterwards (to about 1948)  Never broken o Germans quit collecting, considered.
National Security and Cryptography Jude Vanover and Justin Gross.
A Glimpse of the History of Cryptography
Purple 1 Purple Purple 2 Purple  Used by Japanese government o Diplomatic communications o Named for color of binder cryptanalysts used o Other Japanese.
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
Enigma 1 Enigma Enigma 2 Enigma  Developed and patented (in 1918) by Arthur Scherbius  Many variations on basic design  Eventually adopted by Germany.
INTERNMENT OF JAPANESE AMERICANS. Map of Camps ( )
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Internment of Japanese Americans What kind of hardships did WWII create for Americans at home?
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
George W. Bush By Matt. Introduction George was born July at New Haven, Connecticut. He was known for his success in the oil business.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Cryptography By, Anthony Lonigro & Valentine Mbah.
PowerPoint Jeopardy MiscellaneousBattlesPeopleDatesMiscellaneous
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Terminology and classical Cryptology
Important Leaders and Groups of WWII. George Patton  General Patton was one of the commanders of the forces that invaded North Africa and Sicily.  He.
Questioned Document Examination Part II. Other Responsibilities The Document Examination Unit not only examines questioned documents, but works with other.
With Executive Order 9066, Franklin D. Roosevelt authorized the Secretary of War to decide what groups of people had to be relocated from areas where they.

Cryptography in WWII Explanation of the German Enigma Machine
CRYPTOLOGY IN WWII ByJOE&SEAN. SIGABA SIGABA was similar to the Enigma in basic theory A series of rotors enciphered every character of the plaintext.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
World War II During WWII the primary method of communication was the Radio. The problem with radios was that anyone with a radio receiver could tune into.
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
The cracking of Enigma in World War II John Bibb Harry Caplan Abhishek Chhikara Vladimir Grantcharov Aditi Kulkarni Nigel Lawrence Andrew Muldowney Hou.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
Museum Entrance Enigma Code Breaking Enigma SIGABA Native American Code Talkers Welcome to the Museum of WW2 Codes Curator ’ s Offices Back Room Actions.
By, Amanda Rydzynski O’Brien Computer Skills
CRYPTOGRAPHY – DES EMMANUEL M. BIBANGAMBA. TABLE OF CONTENTS Cryptography defined Definitions used Brief history of Cryptography DES & it’s history Technical.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
{ Japanese American Internment By: Alicia Gupte.  Anti-Japanese sentiments have existed in America for several decades prior to the attack on Pearl Harbor.
ISA 400 Management of Information Security
Chapter 2 Basic Encryption and Decryption
Key words: Cryptography | Binary | Cipher
What Was the Purple Cipher?
World War II During WWII the primary method of communication was the Radio. The problem with radios was that anyone with a radio receiver could tune.
Women, African Americans, Japanese Americans, All Americans
History of Cryptography
Enigma Machine.
Rotor Ciphers.
Tea Boyarchuk History 12 December
Alan Turing & Cryptanalysis
Japanese Internment and the Code Talkers Tuesday/Wednesday March 27-28
National Cipher Challenge
World War II Reading Checks
How the War Ended.
Foreign Policy Basics. Foreign Policy Basics Development of US Foreign Policy.
One-Time Pad The Only Unbreakable Cipher
M-94 Cylinder Cipher: A Story of Innovation, Intrigue and Deception
The History and Technology of the Enigma Cipher Machine
WORLD OF WONDERS : THE ENIGMA MACHINE
Basics Of Symmetric Encryption
Presentation transcript:

PURPLE and The Life of William Friedman Peter Smith Matt Salmon

PURPLE  A Japanese cryptographic machine used before and during WWII  Similar to the German Enigma  Broken by William Friedman  MAGIC- information gained from decryptions (ULTRA in WWII) Photo courtesy of:

How it Works  Used an electromechanical stepping-switch system  Plugboard and four coding wheels  Divided Alphabet: –“Twenties”- twenty consonants –“Sixes”- six vowels –Used a different algorithm to encipher the two groups  “Twenties” enciphered on three stepping switches –Fast, medium and slow –Repetition = 25x25x25 = 15,625  “Sixes” enciphered on one six level, twenty-five position stepping switch –Repetition = 25

Photo courtesy of:

William Friedman  Born in 1891 in Kishinev Bessarabia  Childhood  Family  Education  Adult life and work in cryptology  Considered worlds greatest cryptologist Photo courtesy of:

Early Life  Life at Riverbank –Influenced by Elizabeth Gallup’s work –George Fabyan  Accomplishments –Index of Coincidence –Joint success with wife –SIGABA Machine (with Rowlett)  American Black Chamber –Signals Intelligence Service (SIS)

Friedman and PURPLE  Similar to breaking the ENIGMA –Cribs –Errors by senders  Friedman and Rowlett –Japanese abolished previous codes and methods  1940: Construction of a “duplicate” of PURPLE  Francis A. Raven –Discovered key to keys Frank Rowlett Photo courtesy of:

Friedman after PURPLE  Armed Forces Security Agency  National Security Agency (NSA)  Retirement: –The Shakespearean Ciphers Examined – Health problems –Military Intelligence Hall of Fame posthumously

MAGIC  Information gained from PURPLE interceptions  Limited number of people eligible to see MAGIC  Fear of possible leak of information

PURPLE’s Impact in WWII  Pearl Harbor –Warning signs –Intercepted messages    

Other Impacts  D-Day –Known location of German troops –Further confirmed trick worked  Japanese Evacuation –Executive Order No –President Roosevelt  American advantage in WWII –Outcome  Questions?