By: David McDonald. Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of.

Slides:



Advertisements
Similar presentations
The US Enters the War Group #3 Rachel Jensen, Karthik Vasan, Mo Siddiqui, Sahil Joshi.
Advertisements

Cryptography encryption authentication digital signatures
Date______. Page_____ Title: U. S
NATIONAL DEFENSE ACT INCREASED THE NUMBER OF ARMY AND NATIONAL GUARDSMEN AUGUST $313 MILLION CHANNELED INTO BUILDING UP THE NAVY COUNCIL OF NATIONAL DEFENSE.
Chapter 22.  Factors that lead to WWI  1. A system of tangled alliances ▪ 1. Central Powers- Germany, Austria-Hungary, the Ottoman Empire ▪ 2. Allied.
The United States in the Great War 1914 to 1918 “The world must be made safe for democracy” Woodrow Wilson, 1917.
Cryptography & Encryption Secret Codes & The Advance of Technology Copyright © 2008 by Helene G. Kershner.
 The FOUR long term causes of the War  The major countries on each side  The IMMEDIATE cause of the war.
Digital Signatures. Anononymity and the Internet.
United States Foreign Policy
US Entry into World War I. Effects of Allied blockade Central powers 1914, $70 million in trade with Central powers 1916, trade reduced to $1.3 million.
The Great War “World War One”. Causes Immediate cause: assassination of Archduke Franz Ferdinand –Heir to the Austria-Hungarian throne Primary Causes.
America Enters the War. We Didn’t Want to Get Involved “I Need Some Alone Time” U.S tried to maintain a policy of neutrality –Monroe Doctrine The naval.
America Questions Neutrality
U.S. “Neutrality” in WWI. What does it mean to be “neutral”?
In 1916 Woodrow Wilson was elected President for a second term, largely because of the slogan "He kept us out of war." After the sinking of the Lusitania.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Part II: The Great War. On the first of February, we intend to begin unrestricted submarine warfare. In spite of this, it is our intention to endeavor.
School of something FACULTY OF OTHER School of Philosophy, Religion, and History of Science FACULTY OF ARTS.
: The World at War : The World at War Part 2 of 2.
The naval war in WWI…. "I had a peculiar passion for the navy. It sprang to no small extent from my English blood. When I was a little boy... I admired.
United States Entry into the Great War Androstic Modern World History.
WWI US Enters the War Major Causes of WWI Nationalism Rivalry over colonies Arms Race Military Alliances.
Lec. 5 : History of Cryptologic Research II
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Encryption: A Brief History Author: Margery Waldron.
World War I ABriefHistory Europe in 1914 Choosing sides: A History of Alliances TREATYDATECOUNTRIES The Dual Alliance Austria-Hungary Germany.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
American Neutrality in World War I Neutrality  “All Americans ought to be neutral in fact, as well as in name … impartial in thought as well.
  Central Powers (Germany and Austria- Hungry) vs. Allied Powers (France, United Kingdom, and Russia)  Austria’s Archduke Franz Ferdinand.
Topic 18. We intend to begin on the 1st of February unrestricted submarine warfare. We shall endeavor in spite of this to keep.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
World War I: Piecing It Together. Berlin Conference Classic example of imperialism.
American Imperialism and World War I Lesson 18. As it became an industrial power, the United States also became a world power.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
Peace, Love, and… Happiness???. The War Begins Imagine you are a German General. What strategy would you recommend Germany use to defeat the Allies? The.
Fighting the War. The Gallipoli Campaign A. Allies want the region of the Ottoman Empire known as the Ottoman Empire known as the “Dardanelles” “Dardanelles”
America Goes to War World War I. Famous Ship Disaster RMS Titanic April 15, ,500 passengers died RMS Empress of Ireland May 29, ,012 passengers.
Leading up to World War I 3 things help bring the war to a start: (6)Nationalism- This means to have pride in one’s own country and to want certain freedoms.
World War I: Factors leading to U.S. involvement in WWI.
American Neutrality in World War I Neutrality  “All Americans ought to be _____________, as well as in name … impartial in thought as well.
THE UNITED STATES ENTRY INTO WWI. GERMAN WEAPONRY In addition to fighting on land, Germany had effective weaponry on the ocean U-Boats (submarines)
US Enters The Great War (WWI). US Neutral at First Maintained a policy of isolationism (Monroe Doctrine) US traded more often with Allies than Central.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Why did the US decide to go to war in April 1917?.
American Involvement in WWI America growing into a super power.
American Neutrality and Entry into World War I
World War I DBQ Project In a small group, look through the political cartoons on the following slides. Discuss the symbolism in the cartoon, and answer.
U.S. Declares War.
World War I: Piecing It Together
US Enters WWI.
Ottoman Empire Before WWI Partitioning of the Ottoman Empire
Aim: Did the US make the right choice to intervene in WW1?
Do Now: What is a telegram?
Do you think it was wise for the USA to stray away from its policies of neutrality and isolationism in the late 1800’s early 1900’s?
AIM: Could the U.S. have avoided entering the war?
Cartoon Published Road to US Involvement in WWI—Document A
Getting the US into the War
WWI Affects the World OLD TEXTBOOK.
America Enters the War World War I.
Getting the US into the War
The Zimmerman Telegraph
World War I.
Guided Reading handout
U.S. Enters the War 1917.
Bell Ringer Write down two themes or general ideas that the film portrayed the past two days.
May 7th 1915 Date Event/ Significance Sinking of the Lusitania
Presentation transcript:

By: David McDonald

Why codes are important? We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of this to keep the United States of America neutral. In the event of this not succeeding, we make Mexico a proposal of alliance on the following basis: we make war together, make peace together, generous financial support and an understanding on our part that Mexico is to reconquer the lost territory in Texas, New Mexico, and Arizona.

Knowledge Issues  How does one keep important messages secret in a time when all languages are public?  How important is secrecy when it comes to language?  To what extent is secrecy important in a time when anyone can find anything by doing a simple web search?  How can people dictate what others see through the use of codes?

Privacy Imagine this…

Perfect Secrecy  How would you win the game? - the locks are a decoy - don’t put your card in the box - place the card back in the deck - shuffle  Why does this work? - it’s all about the patterns > just like decrypting codes > codes have patterns

Meet me at Scorpion Ridge.

Theory of Knowledge  How do people dictate what others see? - how can the encryption of codes be an example of this?  How is the age of public information making it harder for people to communicate in private?  To what extent would it be possible to communicate privately through sites like Twitter or Facebook?

Codes in the Digital Age

Implications of Knowledge: What to leave here with…  Could a trivial message be seen as important when encrypted?  How do we go about making things private in such a public world?  Has the world’s information become so public, that there is no way of keeping it secret?  What is the importance and the implications of keeping language, communication, and messages private on a domestic, national, and international level?

Works Cited Code Makers & Code Breakers, Cryptologoy (2/3). History Channel, n.d. Documentary.Youtube. History Channel, 11 June Web. 22 Apr Lindsay, James M. "Council on Foreign Relations." The Water's Edge. Council on Foreign Relations, 1 Mar Web. 23 Apr "Perfect Secrecy | Journey into Cryptography |Khan Academy." Khan Academy. Khan Academy, n.d. Web. 26 Apr "Polyalphabetic Cipher | Journey into Cryptography |Khan Academy." Khan Academy. Khan Academy, n.d. Web. 26 Apr Vacca, John R. "Public Key Infrastructures (PKIS): What Are They?" Public Key Infrastructure: Building Trusted Applications and Web Services. United States: Auerbach, Google Books. Google, Web. 25 Apr