David Reed Department of Computer Science Creighton University Nifty Assignments: Encryption & the Enigma Machine.

Slides:



Advertisements
Similar presentations
RISC and Pipelining Prof. Sin-Min Lee Department of Computer Science.
Advertisements

Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Security & Encryption Thomas Fenske & Joseph Minter.
David Reed Department of Computer Science Creighton University __ __ ______ ____ ______ __ __ /\ \/\ \/\__ _\ /\ _`\ /\__ _\/\ \
Enigma Machine - Design Presentation Group M1 Adithya Attawar Shilpi Chakrabarti Zavo Gabriel Michael Sokolsky Digital World War II Enigma Cipher Wed.
Inner Workings of the German Enigma. History of the Enigma The concept was invented by a German named Albert Scherbius in 1918 Scherbius tried to take.
A Glimpse of the History of Cryptography
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Nifty Assignments Shamelessly Borrowed from Nick Parlante at Stanford University.
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
COM181 Computer Hardware Ian McCrumRoom 5B18,
Chapter 2 – Classical Encryption Techniques
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Confederate Cipher Disk
Platforms for Learning in Computer Science July 28, 2005.
Dan Boneh Introduction History Online Cryptography Course Dan Boneh.
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
Can you find the hidden message? G HTCR A HVMR E EA I AA S S T.
CS110: Computers and the Internet Encryption and Certificates.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Cryptography, Authentication and Digital Signatures
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Encryption: A Brief History Author: Margery Waldron.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Keeping Secrets with Digital Technology Information Assurance Program Anderson School of Management.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
CSCI 5857: Encoding and Encryption
Enigma Plymstock School History Department. The Battle of the Atlantic The Battle of the Atlantic Since the evacuation of the British Army from the beaches.
A Balanced Introduction to Computer Science, 3/E David Reed, Creighton University ©2011 Pearson Prentice Hall ISBN Chapter 15 JavaScript.
Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)
Unit 3 Day 4. Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In.
© A+ Computer Science - Codes and ciphers have existed for hundreds of years. People have always had the need to hide secrets.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Chapter 2 Data Manipulation Yonsei University 1 st Semester, 2015 Sanghyun Park.
Encryption of WWII Philip Gebhardt 10/24/2011. Interest.
CRYPTOLOGY IN WWII ByJOE&SEAN. SIGABA SIGABA was similar to the Enigma in basic theory A series of rotors enciphered every character of the plaintext.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
MAT 1000 Mathematics in Today's World Winter 2015.
The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,
Encryption CS110: Computer Science and the Internet.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Cryptology aka Cryptography Tim Cahill Ryan Church.
Classroom games in INFORMS Transactions on Education Jeroen Belien, KU Leuven (Belgium) Editor-in-Chief.
CS 150 – Computing: From Ada to the Web Cryptography.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
CRYPTOGRAPHY. DEFINITION Cryptography is the science of writing in secret code The earliest documented use began around 2,000 B.C in Egypt (Hieroglyphics)
Warm Up 1) Solve: -2(x + 9) + 13 = -11 2) A triangle has side lengths of 5, 15, and 14. Is the triangle a right triangle? Why or Why not?
[FUNCTIONALITY AND SAFETY OF A MODERN TECHNOLOGY] [CLOUD COMPUTING FOR INDIVIDUAL CONSUMERS]
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Eric Roberts and Jerry Cain
Cryptography CS Principles January 19, 2017.
History and Background Part 3: Polyalphabetic Ciphers
History of Cryptography
Enigma Machine.
Rotor Ciphers.
Rotors and Secret-Key Encryption
Simple Encryption- Lesson 5
slides courtesy of Eric Roberts
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
By Sean O’Mahoney from the Computing Society at Futures Friday
Double Transpositions
Presentation transcript:

David Reed Department of Computer Science Creighton University Nifty Assignments: Encryption & the Enigma Machine

NIFTY ASSIGNMENTS – David Reed – SIGCSE 09 2 Overview 3 CS1/CS2 assignments based on encryption & the Enigma machine could be assigned independently, or as connected assignments in a course could be assigned independently, or as connected assignments in a course why nifty? historical significance & modern relevance of encryption historical significance & modern relevance of encryption each assignment can have a hands-on component, building physical models out of paper each assignment can have a hands-on component, building physical models out of paper

NIFTY ASSIGNMENTS – David Reed – SIGCSE Cipher Disks & Cryptograms historical motivation: substitution ciphers have been used for millenia substitution ciphers have been used for millenia ─ Atbash cipher(6 th century B.C.) ─ Caesar cipher (1 st century B.C.) ─ Vigenère cipher (16 th century) ─ Civil War cipher disks more recent: cryptogram puzzles cryptogram puzzles motivation for discussing modern uses of encryption motivation for discussing modern uses of encryption ─ e.g., process underlying secure Web-based transactions

NIFTY ASSIGNMENTS – David Reed – SIGCSE Rotating Ciphers (CS1) CS1 assignment: given a class for a simple, fixed substitution cipher given a class for a simple, fixed substitution cipher generalize to handle capitals & non-letters, arbitrary keys, key rotation to strengthen code generalize to handle capitals & non-letters, arbitrary keys, key rotation to strengthen code focus: class modification, string manipulation, file processing focus: class modification, string manipulation, file processing hands-on activity: can build a cipher disk out of paper can build a cipher disk out of paper e.g., various templates at e.g., various templates at

NIFTY ASSIGNMENTS – David Reed – SIGCSE Multiple, Rotating Disks rotating substitution keys are the underlying mechanism of the Enigma can obtain Enigma-like behavior from a generalized 3-ring cipher disk can obtain Enigma-like behavior from a generalized 3-ring cipher disk 2-stage mapping to encode a letter: 2-stage mapping to encode a letter: 'A' inner  'H' outer; 'H' middle  'N' outer odometer-style disk rotation odometer-style disk rotation rotate inner disk after each encoding; also rotate middle when inner completes cycle hands-on activity: similarly, can build a paper model similarly, can build a paper model e.g., e.g.,

NIFTY ASSIGNMENTS – David Reed – SIGCSE Simple Enigma Model (CS1) CS1 assignment: based on the paper model of 3-ring cipher disk, design and implement a simple Enigma simulator based on the paper model of 3-ring cipher disk, design and implement a simple Enigma simulator must support both encoding & decoding must support both encoding & decoding allow for different rotors & settings allow for different rotors & settings focus: class design, string manipulation, GUI design focus: class design, string manipulation, GUI design

NIFTY ASSIGNMENTS – David Reed – SIGCSE Enigma Machine historical motivation: Enigma used by Germany in WWII Enigma used by Germany in WWII original design utilized 3 rotors original design utilized 3 rotors ─ interchangeable, could vary order & setting ─ rotors contained circuitry, connecting to adjacent rotors ─ effectively defined a 6-stage mapping rotors are interlocked to produce a complex, automatic rotation pattern rotors are interlocked to produce a complex, automatic rotation pattern hands-on activity: I have designed a 3-D paper model (inspired by Koss' Paper Enigma) I have designed a 3-D paper model (inspired by Koss' Paper Enigma)

NIFTY ASSIGNMENTS – David Reed – SIGCSE Enigma Simulator (CS1/CS2) CS1/CS2 assignment: based on the paper model, design and implement a complete Enigma simulator based on the paper model, design and implement a complete Enigma simulator must allow for different initial rotor settings must allow for different initial rotor settings focus: complex design, interacting classes, string manipulation, GUI design focus: complex design, interacting classes, string manipulation, GUI design

NIFTY ASSIGNMENTS – David Reed – SIGCSE 09 9 Summary assignments with a story & context are more interesting to students than artificial applications assignments that have a hands-on component are engaging to students can help to build a mental model of what they are designing/implementing can help to build a mental model of what they are designing/implementing the topic of encryption can lead to exploration just turn on the History Channel just turn on the History Channel online resources on encryption, Enigma, Bletchley Park, … online resources on encryption, Enigma, Bletchley Park, …