A Glimpse of the History of Cryptography

Slides:



Advertisements
Similar presentations
Origin and Nature of the Allied Cryptographic Advantage During World War II By Grant Musick.
Advertisements

Types of Cipher Machines 2000 Years of Cryptology
By Megan Goatley. history one of the last of a top World War Two codebreaking team at Bletchley Park codebreaker Jerry Roberts dies aged 93, Capt Roberts,
Cryptography & Encryption Secret Codes & The Advance of Technology Copyright © 2008 by Helene G. Kershner.
Code Breaking during the Second World War An Introduction By Gary J Becea.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Solving the Enigma How the Western Allies Cracked the German Secret Codes During WW II.
Enigma? Several Images from Wikipedia (an online encyclopedia)
Secure communication Informatics for economists II Jan Přichystal
HOW WE KEEP IN TOUCH by Eric Michaels.
Modern Cryptography.
A Glimpse of the History of Cryptography Cunsheng Ding Department of Computer Science HKUST, Hong Kong, CHINA.
Inner Workings of the German Enigma. History of the Enigma The concept was invented by a German named Albert Scherbius in 1918 Scherbius tried to take.
National Security and Cryptography Jude Vanover and Justin Gross.
James Tam The history of computers and computing: Part II The computers of the 20 th century and the people behind those machines.
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
ALAN TURNING A COMPUTER SCIENCE PIONEER BY: JOURDAN D. BEVERLY.
The History of Computers
The Big Brother on Menwith Hill PSI 2007 Kaido Kikkas This document uses the GNU Free Documentation License (v1.2 or newer).
Alan Turing ( ). Early Biography Born on June 23, 1912 in London, England Attended a prestigious public school where he showed promise in math.
Alan Turing and Code Breaking
Famous Firsts in Computation MSE 2400 Evolution & Learning
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
The Turing machine Olena Lastivka. Definition Turing machine is a theoretical device that manipulates symbols on a strip of tape according to a table.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Encryption: A Brief History Author: Margery Waldron.
Cryptography By, Anthony Lonigro & Valentine Mbah.
1.History of a remarkable Man Call “Alan Turing”. 2.Study Life. 3.Work life during the world war 2 period. 4.His achievement after the world war. 5.His.
Secret Codes.  A code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to send messages or store.
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
Terminology and classical Cryptology
Enigma Plymstock School History Department. The Battle of the Atlantic The Battle of the Atlantic Since the evacuation of the British Army from the beaches.
Alan M. Turing ( ) A Natalie Cluck Presentation.
The History of Computers What is a computer? A computer is an electronic machine that accepts information (Data), processes it according.
WWII - U-Boats A British convoy made it’s way from England to Nova Scotia because, it needed to protect supply ships from the ever present threat of German.
Encryption of WWII Philip Gebhardt 10/24/2011. Interest.
CRYPTOLOGY IN WWII ByJOE&SEAN. SIGABA SIGABA was similar to the Enigma in basic theory A series of rotors enciphered every character of the plaintext.
“IT IS A RIDDLE, WRAPPED IN A MYSTERY, INSIDE AN ENIGMA” * By: Michaela Wontroba Mr Kuniega; PD 5,6,7.
AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%
INDUSTRIAL REVOLUTION COMMUNICATION Grace Cepeda, Kerry Locke, Isaac Case, Bobby Garcia, & Sidney Mendoza.
CS 150 – Computing: From Ada to the Web Cryptography.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
Museum Entrance Enigma Code Breaking Enigma SIGABA Native American Code Talkers Welcome to the Museum of WW2 Codes Curator ’ s Offices Back Room Actions.
By, Amanda Rydzynski O’Brien Computer Skills
CRYPTOGRAPHY. DEFINITION Cryptography is the science of writing in secret code The earliest documented use began around 2,000 B.C in Egypt (Hieroglyphics)
Code- and cipher-breaking have been in operation for centuries. However, cryptanalysis – the art of deciphering encoded messages – took on a new importance.
The Mathematics Behind
CS 154 Formal Languages and Computability April 5 Class Meeting Department of Computer Science San Jose State University Spring 2016 Instructor: Ron Mak.
Brief Incursion into Cryptography 1 20 th May 2008 Brief Incursion into Cryptography 20 th May 2008.
Secure communication Informatics for economists II Jan Přichystal
Secret Key Cryptography
Key words: Prototype | Blueprint | Valve
Fat Pipes Aren’t Enough: Health Science Applications
Cryptology in the U.S.—Then and Now
The Big Brother on Menwith Hill
Other Fronts of WW2: EQ: What was happening in other parts of the world during the Second World War?
In this lesson we will understand:
History of Cryptography
Enigma Machine.
Rotor Ciphers.
Tea Boyarchuk History 12 December
Cryptography a Presentation Prepared by Vytautas Kondratas.
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Enigma Cipher Machine By: Amber Churchwell.
Crypto Wars: The Evolution of Military Cryptology
The History and Technology of the Enigma Cipher Machine
WORLD OF WONDERS : THE ENIGMA MACHINE
Presentation transcript:

A Glimpse of the History of Cryptography Cunsheng Ding Department of Computer Science HKUST, Hong Kong, CHINA

Part II: Machine Ciphers

Enigma Before war broke out in 1939 the Germans had planned a special way of keeping their communications secret. The army, navy and air force were told to encode their messages using cipher machines called ENIGMA.

Enigma Enigma could put a message into code in over 150 MILLION MILLION MILLION different ways. The Germans believed that no one could crack the Enigma code. But the Allies knew that if they could, they would be able to find out their enemy's military secrets.

Enigma The Enigma machine looked like a typewriter in a wooden box. An electric current went from the keyboard through a set of rotors and a plugboard to light up the 'code' alphabet.

Enigma At least once a day the Germans changed the order of the rotors, their starting positions and the plugboard connections. To decipher a message sent using Enigma, you had to work out exactly how all of these had been set.

Enigma In the 1930's Polish cipher experts secretly began to try to crack the code. Just before war broke out they managed to pass models and drawings of Enigma to British and French code-breakers. Later Enigma was broken.

Sigaba It was suited for fixed station secure communications, and used by U.S. for high-level communications, was the only machine system used by any participant to remain completely unbroken by an enemy during World War II.

B-21 Machine by Boris Hagelin Patterned on the Enigma and produced for the Swedish General staff, Boris Hagelin of Sweden developed the B-21 machine in 1925. It also had the capability to be connected to an electric typewriter.

BC-38 by Crypto AG Zug Boris Hagelin of Sweden developed a long line of cipher systems, beginning with the B-21, B-211, C-35, C-36, C-38 (which later became America's M-209).

BID 590 (Noreen) The BID 590 was a British built crypto machine and was used by Canada's foreign service communicators at various diplomatic missions to communicate with various government departments.

H-4605 (Crypto AG) The Crypto AG H4605 was designed as an off-line, keyboard operated cipher machine with twin printing (of cipher and plain text) system with automatic 5-letter grouping. It's a solid piece of equipment, almost 'battleship grade’.

Japanese "Enigma" Rotor Cipher Machine Produced by Germans for Japanese

KY-28 (Nestor) The KY-28 was an analog, voice encryption device based on transistor circuitry and was the shipboard/airborne member of the NESTOR family of equipment.

Racal-Milgo 64-1027C Datacryptor The Racal-Milgo 64-1027C Datacryptor was used to send and receive secure data via computer. This is the commercial version of the KG-84, and has ability to be loaded via the KYK-13 Fill device.

The “Clock Cryptograph” It is basically a nicely implemented Wheatstone cipher disk. It was in active use in the Danish armed forces from 1934 (or a little earlier) until around 1948.

People in Breaking Codes Bletchley Park was the home of the secret Government Code and Cypher School. This was the centre of British code-breaking during the war.

People in Breaking Codes The code-breakers in Bletchley Park were specially chosen from among the cleverest people in England. Some were brilliant mathematicians or linguists. Alan Turing, a Cambridge mathematician and code-breaker who helped to invent one of the world's first computers at Bletchley Park.

Computer and Code Breaking Colossus was built for the code-breakers at Bletchley Park by post office engineers in 1943. One of the earliest computers.

Computer and Code Breaking The computer was as big as a room - 5 metres long, 3 metres deep and 2.5 metres high - and was made mainly from parts used for post office telephone and telegraph systems.

Computer and Code Breaking This Cray XMP was donated to the museum by Cray Research, Inc. It denotes the newest era of partnership between NSA and the American computer industry in the employment of computers for cryptologic processes.

Cipher Machines and Software Somulation http://frode.home.cern.ch/frode/crypto/