Confederate Cipher Disk

Slides:



Advertisements
Similar presentations
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Advertisements

A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Cryptography The science of writing in secret code.
1 Codes, Ciphers, and Cryptography-Ch 2.1 Michael A. Karls Ball State University.
David Reed Department of Computer Science Creighton University Nifty Assignments: Encryption & the Enigma Machine.
Inner Workings of the German Enigma. History of the Enigma The concept was invented by a German named Albert Scherbius in 1918 Scherbius tried to take.
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
Navajo Code TalkersNM History1 Navajo Code Talkers The “Native” Contribution to WWII.
Windtalkers The Navajo Code Talkers Presentation by Robert L. Martinez Primary Content Source: American Greats, edited by R. Wilson & S. Marcus. Images.
 During World War II, in a segregated military, the Tuskegee Airmen distinguished themselves among aviators. These African- American aviators flew as.
Cryptanalysis. The Speaker  Chuck Easttom  
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
Cis 4930 Introduction to cryptography
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Crypto Laboratory Winter Alexander Grechin and Zohar Rogel Under supervision of Zvika Berkovich.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Windtalkers The Navajo Code Talkers Presentation by Robert L. Martinez Primary Content Source: American Greats, Edited by R. Wilson & S. Marcus. Images.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b

Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Encryption: A Brief History Author: Margery Waldron.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Introduction to Cryptography
Secret Codes.  A code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to send messages or store.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
U. S. Civil War 1 st Modern War in History 1861—1865.
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
C. Thomas, 5 th Grade, Fairmont Charter School.
CRYPTOLOGY IN WWII ByJOE&SEAN. SIGABA SIGABA was similar to the Enigma in basic theory A series of rotors enciphered every character of the plaintext.
Section 2.5 Polyaphabetic Substitutions
MAT 1000 Mathematics in Today's World Winter 2015.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
World War II During WWII the primary method of communication was the Radio. The problem with radios was that anyone with a radio receiver could tune into.
CS 150 – Computing: From Ada to the Web Cryptography.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Polyalphabetic Ciphers History. Alberti Rennaisance Architect –First fountains of Trevi, Rome –Churches 1467 essay on cryptology –Frequency analysis –Cipher.
Bell Ringer  What are some of the reasons the war in the Pacific would be a longer, bloodier war than that in Europe?
Windtalkers: The Navajo Code Talkers Presentation by Robert L. Martinez Primary Content Source: American Greats, edited by R. Wilson & S. Marcus. Images.
 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 
Code Making/Breaking. What methods have you seen for encoding secret messages?
CRYTOGRAPHY PIGPEN CIPHER.
Navajo Code Talkers of World War II
Introduction To Cryptography
Asad Gondal Ali Haider Mansoor
World War II During WWII the primary method of communication was the Radio. The problem with radios was that anyone with a radio receiver could tune.
Cryptography CS Principles January 19, 2017.
Basic Encryption Methods
Polyalphabetic Ciphers
Topic 3: Data Encryption.
WWII: Fighting the War History Notes 12-3.
Windtalkers: The Navajo Code Talkers
Navajo Code Talkers.
Christiana Hagan, James Eaker, Robbie Simmons
Simple Encryption- Lesson 5
Today’s Assignment You’re going to create a pin on a map about an event in the Pacific Theater. You can work in groups of up to 3 people (no more unless.
Tuskegee Airmen & Navajo Code Talkers
Navajo Code Talkers.
The War at Home part II Coach Duke.
Double Transpositions
Symmetric Encryption or conventional / private-key / single-key
PHONES UP Have your notes out!
Who is in this picture, what is happening?
Presentation transcript:

Confederate Cipher Disk Simran, Lovjoat, Arshdeep, Zohaib TEAM SALL-E

History Cipher Disks were invented by Leon Battista Alberti, a famous Italian philosopher and architect in 1467. Fundamentally, involving two rotating rings that line up two different letters or numbers which ciphers the text. (Cipher meaning a method of altering the plaintext) Used during Civil War At the rear of the disc is the text Richmond, VA, the home town of the confederacy.

History Cont. Vigenère Cipher was simple enough to use to be a field cipher. Used during the American Civil War (1861-1865) The war between the North (Union) and the South (Confederates) Union usually cracked the confederates messages.

Creator Francis LaBarre, a gold and silver worker Based on the Vigenère Cipher A mechanical wheel cipher consisting of two concentric disks, each with the 26 letters of the Latin alphabet, that was used for the encryption of messages.

Purpose The disk was used for encryption of secret messages of the Confederacy during the American Civil War (1861-1865)

Key Short key phrase said in a private previous conversation A polyalphabetic cipher disk that was a combination of the Caesar Cipher and the Vigenère Cipher

Examples “R” is the default adjustment letter and key number “1212”, the inner disk turns so that “R” and the number “1212” coincide The signal adjustment “2212”, “3”, “1122”, “333”, indicates “W” was adjustment letter, and 1122 the key number completing the cipher combinations (“W” coincides with “1122”) -Note: “2212” being “W” in the non-ciphered code

Only five are known today in existence.

The Navajo Code Talkers

History Philip Johnston realized that the Navajo languages was very complex and was not written down. The code was used for troop movements, tactics, order, and transmit info, with the use of native dialects over radios and telegraphs. The language was primarily used during WWII, Korean war, and was retired after the Vietnam war. On May 1942, 29 recruits attended boot camp and was the first group that made the code.

Creator Philip Johnston proposed the idea to use the Navajo language as code during WWII Chester Nez, last of the original Navajo Code talkers of WWII dies at 93.

Purpose During WWII the allies needed an encryption they realized that Navajo language was very difficult The navajos would say random words and then write their english equivalent and would use 1st letter to make a word.

Examples wol-la-chee (ant), tse-nill (axe) tsah (needle) be-la-sana (apple) ah-keh-di-gini (victor) Tsah-ah-dzoh (yucca) Besh-lo (iron fish) meant submarine Dah-he-tih-hi (humming bird) meant fighter plane

How the Code was Broken Most letters had more than one Navajo word representing them. Not all words had to be spelled out letter by letter. developers of original code assigned Navajo words to represent about 450 frequently used military terms that didn’t exist in Navajo language

Reference http://www.cryptomuseum.com/crypto/usa/ccd/index .htm http://www.nsa.gov/kids/ciphers/ciphe00005.shtm http://www.history.navy.mil/faqs/faq61-2.htm http://navajocodetalkers.org/navajo-code-talkers-facts/