Chris Christensen Northern Kentucky University.

Slides:



Advertisements
Similar presentations
Chris Christensen Northern Kentucky University.
Advertisements

Chris Christensen Department of Mathematics and Statistics Northern Kentucky University.
Introduction to Computer Science 2 Lecture 7: Extended binary trees
Chris Christensen Department of Mathematics and Statistics Northern Kentucky University.
Lab 10 : Arithmetic Systems : Adder System Layout: Slide #2 Slide #3 Slide #4 Slide #5 Arithmetic Overflow: 2’s Complement Conversions: 8 Bit Adder/Subtractor.
By Michael Flick May 15, What you Need to Get in the Coast Guard? To get into To get into U.S. citizen U.S. citizen ages between ages between United.
Code Breaking during the Second World War An Introduction By Gary J Becea.
Pacific Battles of World War II Ms. Krall. Pearl Harbor December 7, 1941 Planned by Prime Minister Hideki Tojo Attack began at 7:55 am. Two waves. Total.
Enigma? Several Images from Wikipedia (an online encyclopedia)
The I.D.(The Idea Developer) By: Daniel, Chris, and Ryan.
The Basic Java Tools A text editor to write Java program source code. A compiler to translate source code into bytecode. An interpreter to translate.
Logic Gates Combinational Circuits
©2008 The McGraw-Hill Companies, Inc. All rights reserved. Digital Electronics Principles & Applications Seventh Edition Chapter 10 Arithmetic Circuits.
Pearl Harbor Attack Period 3 Jack Murphy. Facts  This is what brought the U.S. into the war  It was known as the day of infamy  We new that the Japanese.
Getting and using Data: Scorecarding, RFID, and CRM. Tools: Computers and IT. VB, VBA, Excel,.NET, Etc. Humans: Multiple ways to make decisions. Algorithms:
Section 2.5 Multiplication of Polynomials and Special Products
Chris Christensen Northern Kentucky University. Lester S. Hill
The Road to War for the US in WW II
Company LOGO John Huss and Shannon Eastep Northern Kentucky University Online Students Are Talking, Are We Listening? Using Student Data to Create a Dynamic.
Ch.10, Sec.4 – The War of 1812 The War Begins The War Begins - England tried to avoid another war with the United States because they were still fighting.
 Can you think of any famous conspiracy theories or cover ups?  Do you think that newspapers and / or governments cover up events? Why (not)?  When.
Secret Codes.  A code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to send messages or store.
The Battle of Gettysburg. Before the Battle Confederates inflict bloody defeat on Union at Fredericksburg, VA. (12/13/62) North defeated again in the.
Chapter 11 Section 2 US History Mr. Love. Civil War Map (Focus on Blue and Red)
Codes by Dr. Amin Danial Asham. References  Programmable Controllers- Theory and Implementation, 2nd Edition, L.A. Bryan and E.A. Bryan.
Encryption of WWII Philip Gebhardt 10/24/2011. Interest.
CRYPTOLOGY IN WWII ByJOE&SEAN. SIGABA SIGABA was similar to the Enigma in basic theory A series of rotors enciphered every character of the plaintext.
Bi-Directional RF Data Communication A Robot Control Device.
ECE 1304 Introduction to Electrical and Computer Engineering What is Electrical Engineering? Part 3 (1920 to 1950)
The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,
COMMUNICATIONS SYSTEMS (RADIO, TV) AND MODELING PROFESSOR JOHN SANTIAGO (ALIAS DR. J)
Canada’s Role in Europe During the early months of 1942 the war was not going well for the Allies Stalin wanted the Allies to invade Europe from the west,
German U-boats were sinking Allied ships faster than they could be built Allied supply ships began sailing in convoys: vessels carrying vital supplies.
Unit 1 Lecture 4.
The Battle of the Atlantic The other attack on the United States.
Turing’s Bombes. Solve Enigma using known plaintext Depending on German patterns, e.g. weather reports Sometimes setup by seeding/farming Depended on.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
Chris Christensen Department of Mathematics and Statistics Northern Kentucky University.
Assignments Locate an assignment Attach an assignment Turn in an assignment.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Using Dataflow Diagrams Systems Analysis and Design, 8e Kendall & Kendall 7.
Counsellor Series Session 7: Entrance Requirements Mr. Quiaoit Ms. Showerman Ms. Mrozowsky.
Northern Virginia Hospital Alliance (NVHA) Overview  Non-profit organization formed in the wake of 9/11 terrorist attacks for the purpose of improving.
Notes Over 6.3 Adding Polynomial Horizontally and Vertically Find the sum. Just combine like terms.
Using the GAVRT Radio Telescope: The SETI Project
B/B+ Trees 4.7.
History of calculation
What Was the Purple Cipher?
The Evolution of JN-25 and Attacks on It
Using the GAVRT Radio Telescope: The SETI Project
Don’t Forget (Enciphered) Codes
What is a conspiracy theory?
Battle of the Ironclads
Who was Alan Turing? Alan Turing played a role in deciphering the messages encrypted by the German Enigma machine. He took the lead in a team that designed.
Moving Companies in VA Moving Companies in Washington DC.
1.#.
14.2: The Early Battles: War in the Pacific
Business Papers Tense – history (NO first person)
DSC.
Alan Turing & Cryptanalysis
Using Cathode Ray Oscilloscopes (CRO’s)
War at Sea.
What is a conspiracy theory?
T. R. Hollcroft’s Problem
Why was the outcome of the Battle of Britain important for the Allies?
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Chapter 14 North and South
Enigma Cipher Machine By: Amber Churchwell.
The War of
Podcast Ch23d Title: Huffman Compression
Where do our lawyers of color come from?
Presentation transcript:

Chris Christensen Northern Kentucky University

Naval Communications Washington, DC

Alfred Clifford MIT (Top, 1) Marshall Hall, Jr. Yale (Middle, 2) Andrew Gleason Harvard (Middle, 5)

Howard Engstrom Yale (Top, 5) Lawrence Steinhardt MIT student (Top, 8)

Howard Campaigne Minnesota (Top, 10) Reed B. Dawson Illinois (Top, 11) William A. Blankinship (Top, 12) William Wray Williams (Bottom, 6) J. J. Eachus Purdue (Middle, 6)

National Cash Register Dayton, OH

2011 Inductee

hatsufrom58743, shuushifufull stop50418 maruship name76833 begin45435 good34131 commander-in-chief41595 radio silence66201

Encipher “Full stop”50418 Additive65358 False sum15766 Transmitted15766 Additive65358 “Full stop”50418 Decipher

(Codegroup 1 + Additive) (Codegroup 2 + Additive) Codegroup 1 – Codegroup 2

… we also saw a machine for aiding one in the recovery of subtractor groups when messages have been set in depth. A rather similar machine was made by Letchworth for us in early 1940, and although not nearly so convenient as this model, has been used quite a bit I believe. Alan Turing

DisplayColors

D – B = 15103B = 89172

JN-25

1943 The cryptologic crisis of the Battle of the Atlantic eased, and Lt. Lawrence Steinhardt was assigned the responsibility of designing machines to attack Japanese additive cipher systems.

Align message groups vertically – in depth Align message groups and recovered additives

Copperhead I

Align messages in depth

19 November 1943 Proposal for Copperhead I submitted. 3 November 1944 Copperhead I shipped to NCA.

Align messages and recovered additives

Slide recovered additives along messages, subtract, and check for high frequency code groups.

At least 10 additives. At least 8 scanning groups. At least 5 have confirmed meanings.

20 December 1943 Copperhead II is low priority. 8 November 1944 Copperhead II project is terminated.

?

Hall’s weights Shinn weights

*

Differences of Scanning Groups Distribution of Differences

DifferenceShinn Weights or or or or

*418

Align JN-25 messages in depth

Never Produced.

Align JN-25 messages and recovered additives

Message Additive

12 April 1944 “Mamba Theory.” 18 November 1944 Status of Mamba? Acme Pattern and Tool Company.

1 December 1943 – 1 July 1945 production

1 December 1943 – 1 July Copperhead One1 Parallel Grenade1 Cilli Grenade 10 Vipers1 Mamba8 Inverted Bombes 1 Mike30 Wave FiltersModified 25 Bombes 3 Rattlers60 Boa25 Squelcher Circuits 2 Gypsy-Topas10 Special Boa 1 Double Bombes1 Satyr 1 Asp495 Pluggable Reflectors 2 Sliding Grenades4 Standard Grenades 60 M-91 Drag Grenade 8 M-81 Coast Guard Grenade

It is believed that considerable thought should be given to the desirability of building equipment of general usefulness which might do this and other jobs rather than a number of machines each designed to meet a specific need.

This thought is advanced because it is felt that we should be building for the future where in machines built for specific purposes may become obsolete but the value of a more generally universal machine might become enhanced. J. Howard

Joseph Wenger Howard Engstrom William Norris John Parker ERA