In this lesson we will understand:

Slides:



Advertisements
Similar presentations
Origin and Nature of the Allied Cryptographic Advantage During World War II By Grant Musick.
Advertisements

By Megan Goatley. history one of the last of a top World War Two codebreaking team at Bletchley Park codebreaker Jerry Roberts dies aged 93, Capt Roberts,
Code Breaking during the Second World War An Introduction By Gary J Becea.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Solving the Enigma How the Western Allies Cracked the German Secret Codes During WW II.
Inner Workings of the German Enigma. History of the Enigma The concept was invented by a German named Albert Scherbius in 1918 Scherbius tried to take.
A Glimpse of the History of Cryptography
Alan Turing Presented By: Tyler Romero CSCE Spring 2014.
Welcome to... The Big Picture. This presentation contains a sequence of images. The Big Picture Each image shows slightly more of one big picture. After.
Alan Turing and Code Breaking
Famous Firsts in Computation MSE 2400 Evolution & Learning
The Turing machine Olena Lastivka. Definition Turing machine is a theoretical device that manipulates symbols on a strip of tape according to a table.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used.
Encryption: A Brief History Author: Margery Waldron.
1.History of a remarkable Man Call “Alan Turing”. 2.Study Life. 3.Work life during the world war 2 period. 4.His achievement after the world war. 5.His.
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
Enigma Plymstock School History Department. The Battle of the Atlantic The Battle of the Atlantic Since the evacuation of the British Army from the beaches.
Unit 3 Day 4. Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In.
Alan M. Turing ( ) A Natalie Cluck Presentation.
Encryption of WWII Philip Gebhardt 10/24/2011. Interest.
“IT IS A RIDDLE, WRAPPED IN A MYSTERY, INSIDE AN ENIGMA” * By: Michaela Wontroba Mr Kuniega; PD 5,6,7.
AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%
History of Computers. Do you know who this really happy looking guy is???? Charles Babbage- also known as the Father of Computers.
The cracking of Enigma in World War II John Bibb Harry Caplan Abhishek Chhikara Vladimir Grantcharov Aditi Kulkarni Nigel Lawrence Andrew Muldowney Hou.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
By, Amanda Rydzynski O’Brien Computer Skills
Chris Christensen Department of Mathematics and Statistics Northern Kentucky University.
The Mathematics Behind
Millions of electronic pulses move through your computer every second. Computers are capable of processing thousands of functions in the time it takes.
CS 154 Formal Languages and Computability April 5 Class Meeting Department of Computer Science San Jose State University Spring 2016 Instructor: Ron Mak.
JOURNEY WITH THE TITANIC A GRAPHICS DESIGN PROJECT FOR MIDDLE SCHOOL.
Computers!.
Key words: Prototype | Blueprint | Valve
Key words: Intercept | Decipher | Translate
Eric Roberts and Jerry Cain
Key words: Apprentice | Invention | Colossus
Turing Machines Finite State Machines.
Cryptography & Security
Professional Communications
BITS & BYTES.
The Big Brother on Menwith Hill
The imitation Game.
DATA REPRESENTATION – 3 binary addtion
Who was Alan Turing? Alan Turing played a role in deciphering the messages encrypted by the German Enigma machine. He took the lead in a team that designed.
Other Fronts of WW2: EQ: What was happening in other parts of the world during the Second World War?
Code Breakers and Makers
Codes in movies.
History of Cryptography
Enigma Machine.
Rotor Ciphers.
Alan Turing & Cryptanalysis
Professional Communications
Professional Communications
Pixels.
Cryptography “The Secret Code Language”
BITS & BYTES.
Substitution Codes By Sarah Bonnell.
Changes and Advancements in Technology and Tactics
Cryptography Cryptography is derived from the Green word ‘kryptos’
Enigma, Cyphers and Encryption
slides courtesy of Eric Roberts
The Race to Crack the Enigma Machine
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Enigma Cipher Machine By: Amber Churchwell.
World’s first programmable computer – Colossus
Professional Communications
The German Enigma Machine The Secret Battlefield of WW2
WORLD OF WONDERS : THE ENIGMA MACHINE
Modern Cryptography.
Presentation transcript:

In this lesson we will understand: Understanding Codes Cryptography History Lesson - 2 By: A. Lawson In this lesson we will understand: Better understanding of codes Review the history behind coding systems Figure out codes and their use Complete tasks to better understand cryptography Martian alphabet – Task 1 Enigma Poster – Task 2 Video Views Enigma Machine History timeline

Martian Alphabet Using the Martian alphabet, decode the following: The Martian alphabet consists of 6 symbols: After many years of study, mathematicians have finally managed to crack the code. Using the Martian alphabet, to decode the following:

Poster on the Enigma Machine - Task Create a poster on the story of the Enigma Machine and the computer Colossus. Use the keywords on the slide attached. The poster can be done on the computer (A4 size) or by hand The poster should include suitable images Spelling and punctuation are important Check ´Rules of a good poster´ bellow Rules for a good poster Must be informative and educational Text should be kept to a minimum Text should be large enough to read from a distance Text colour should be readable over background Stick to one or two fonts – beware of Word Art! Use large, eye-catching images Images should not be pixelated or have copyright notices Make use of ‘white space’

Enigma Machine Poster Key words Colossus WWII Bletchley Park Alan Turing Code First computer Check the links https://www.youtube.com/watch?v=Hb44bGY2KdU Check the links Check the links https://www.youtube.com/watch?v=2458QZmNxRY Check the links https://www.youtube.com/watch?v=W9BPTSegLSs

The Enigma Machine Links Bellow 1915, two Dutch Naval officers invented a machine to encrypt messages. This became known as the Enigma machine. 1918, Arthur Scherbius, a German businessman, patented the Enigma machine. Mid 1920s, mass production of Enigma machine with 30,000 machines being sold to the German military over the next 2 decades. The Poles set up a world leading crypt analysis bureau and hired leading mathematicians such as Marian Rejewski. Marian Rejewski built his own model of the Enigma machine without having actually seen it. Enigma History http://www.bbc.co.uk/history/topics/enigma In 1931, a German traitor told Rejewski that the Germans routinely changed the daily key indicator setting for the codes. To find the daily key, Rejewski build 6 replicas of the Enigma machine and connected them. The new machine could run through more than 17,000 indicator settings. He called this machine, ‘the bomb’. The bomb was used to secretly read the traffic from the German Enigma machines for several years. In 1938 Germans added two new roters into the Enigma machine. This made it harder for the Polish to read the traffic How did the Enigma Machine work http://www.theguardian.com/technology/2014/nov/14/how-did-enigma-machine-work-imitation-game Code Breakers https://www.youtube.com/watch?v=W9BPTSegLSs Enigma Explained https://www.youtube.com/watch?v=ASfAPOiq_eQ Flaw in Enigma https://www.youtube.com/watch?v=V4V2bpZlqx8 The Polish asked their allies, Britain and France to help them with the analysis and codebreaking of the German messages. The British smuggle out the Enigma replica machines two weeks before Germany invaded Poland The smuggled Enigma replicas were taken to the British code, and cypher school at Bletchley Park. Alan Turing, a British mathematician at Bletchley Park thought of a different way of using the ‘bombs’ for testing the German codes. Turing used 180 ‘bombs’ which clicked round letter-by-letter, 20 every second, until they hit the correct one. Hundreds of code breakers at Blechley Park worked round the clock to decipher the German Enigma communications they intercepted In 1943, British engineer, Tommy Flowers, created Colossus Colossus changed the way code breaking was done from electro-mechanical to electronic – it was the first modern day computer Colossus could read paper tape at 5,000 characters a second. The Allied work on codebreaking played a key role in victories such as D-Day. It shortened the length of WW2.