Don’t Forget (Enciphered) Codes

Slides:



Advertisements
Similar presentations
Chris Christensen Northern Kentucky University.
Advertisements

Creating Tables The basics, nothing pretty, but it works.
By Sunny Mahesh and Andy Yuwen. Cryptography = Secret Messages = Cool Stuff Ciphers Difference between plaintext and ciphertext Enciphering and Deciphering.
Chris Christensen Department of Mathematics and Statistics Northern Kentucky University.
World War II in the European Theater. WWII before Pearl Harbor (this is review!)
Attack on Pearl Harbor Cassie Hall. Attack on Pearl Harbor  The attack on Pearl Harbor was during World War II.  When the war began they had 8 battleships,
History of legendary US naval base. US became involved in a devastating world conflict.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Japan officers talk about a possible attack on Pearl Harbor. January, 1941 July, 1941 Japanese officers finalize the plan on the attack of Pearl Harbor.
Section 2.9 The Hill Cipher; Matrices
Chris Christensen Northern Kentucky University.
Pearl Harbor Attack Period 3 Jack Murphy. Facts  This is what brought the U.S. into the war  It was known as the day of infamy  We new that the Japanese.
Chris Christensen Northern Kentucky University. Lester S. Hill
Look over your notes for this unit up until this point. Identify any questions you have or confusion. Write those things down.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
a connection between language and mathematics
Commas in Dates and Geographic Units Mini- Lesson #35 From the Writing Lab’s 101 Grammar Mini-Lessons Series.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
WORLD WAR TWO TIMELINE.
Pearl Harbor.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
Invasion!!! World War II officially started on September 1 st On this date Adolf Hitler and his German garrison invaded virtually defenseless Poland.
Japan Strikes in the Pacific. A Surprise Attack Japan had been conquering territory in Southeast Asia. This was a potential threat to the American owned.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Section 2.5 Polyaphabetic Substitutions
Ww 2 timeline By: jacob warren.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
Shahram Khazaei Siavash Ahmadi Fall 2015
Notes Over 4.4 Finding the Inverse of 2 x 2 Matrix.
WORLD WAR II A CYA game Start. DECEMBER 7TH  You are a 24 year old man. The date is December 7 th You get news that Pearl Harbor has been attacked.
Chris Christensen Department of Mathematics and Statistics Northern Kentucky University.
ROT13 cipher. The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. Example: all 'A's.
75 YEARS SINCE PEARL HARBOR By: Malcolm WHO IS INVOLVED IN THIS EVENT?  Japanese and Americans Citizens.
World War II after Pearl Harbor. The attack on Pearl Harbor slowed the U.S. involvement in Asia. 2 hours after the attack on Pearl Harbor Japan attacked.
A look at the World War II Fighting in Asia
World War II Timeline: Using the shapes of the drawing toolbar create a timeline for WW II. Use one slide for each year from 1939 to Use the WW II.
Chapter 21 Review World War II
1942 LE3-C5S7T3L2pg
What Was the Purple Cipher?
World War II U.S. History.
The Evolution of JN-25 and Attacks on It
History of legendary US naval base
Introduction Of System Security
Chapter-2 Classical Encryption Techniques.
The War in the Pacific.
Battle of Midway Island
Major Events and Turning Points of WWII Notes
Chapter 24 Section 3 The United States in World War II Riddlebarger
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
The War in the Pacific The War in the Pacific
Multiplying Matrices.
The War in the Pacific
Please get out your “Rise of Dictators” Chart.
The Pacific and the Homefront
World War Two September August 1945 How did the war start?
Data Structures – 2D Lists
T. R. Hollcroft’s Problem
How the War Ended.
Winning The War Chapter 11, Lesson 3.
Cryptography and Cryptanalysis
The United States in World War II
EKRJGTU CTG CYGUQOG! Can you break the code?.
United States History II
The multiples of Delete this text and write about what you notice:
8Y Wednesday World War II
Commas in Dates and Geographic Units
Presentation transcript:

Don’t Forget (Enciphered) Codes Chris Christensen Northern Kentucky University

Codes

World War I Zimmermann Telegram January 1917 SMS Magdeburg 1914

World War II JN-25 Pearl Harbor 7 December 1941 Battle of Midway 4 – 7 June 1942

Encode

Additives

Additives

Encipher False sum Addition modulo 10

Indicator: Page/row/column 101A 9 pages 27 rows 10 columns

Received Message

Decipher 317D

Depth

Messages in Depth

Depth Possible attacks Brute force determination of possible Additives. Differencing. Known Additives. Known plaintext.

Differencing (Codegroup 1 + Additive) (Codegroup 2 + Additive) Codegroup 1 – Codegroup 2

Differencing Minor difference 2329 e minus the 5554 - 3235

Difference Table

Additive Recovery 5554 + ? = 3486 3486 5554 8732

Text Substitution