Cryptography During World War II - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Cryptography During World War II

Description:

D-Day. Victory. Conclusion. Agenda. Discuss context of war and ... used in the precise timing of D-Day. Purple ... D-Day. June 6, 1944. Timing dictated ... – PowerPoint PPT presentation

Number of Views:369
Avg rating:3.0/5.0
Slides: 17
Provided by: ccGa
Category:

less

Transcript and Presenter's Notes

Title: Cryptography During World War II


1
Cryptography During World War II
  • Wednesday, December 7, 2005
  • CS 4235 A
  • Mohammad Abolfathian
  • Ashley Durham
  • Michel Mansour
  • Michael Norris
  • Kalpit Patel
  • Vimal Patel

2
Agenda
  • Discuss context of war and cryptography.
  • German encryption systems.
  • Battle of the Atlantic.
  • Bletchley Parks successes.
  • Japanese cryptography.
  • Influences on battles in the Pacific
  • Allied invasion of France.
  • Victory.
  • Legacy left by the conflict.

3
Trivia Question!
  • What happened on this infamous date, sixty-four
    years ago?
  • /-5 EC points on your final average!!! N-P
    Approved!
  • Note EC not really approved.

4
Introduction to WWII
  • 1939-1941 Germany invades Poland, France, and
    Russia
  • Battle of the Atlantic
  • July Oct 1940 - Battle of Britain
  • Dec 1941 America enters the war
  • 1942-1944 Allied landings in Africa, Italy and
    France
  • May 1945 - VE Day
  • 1937 Japan continues expansion in China and
    Pacific
  • Dec 1941 Pearl Harbor
  • 1942 Battle of the Coral Sea, Battle of Midway
  • 1943-1945 Allied island hopping
  • Aug 1945 Atomic bombs detonated
  • Sep 1945 VJ Day

5
Cryptography in the Conflict
  • Both sides realize need for secure communications
  • Cryptographic equipment deployed
  • Focused intelligence effort on attacking these
    systems
  • Encrypted traffic broken
  • High impact on the war
  • Laid foundation for modern cryptography and
    computing

6
Enigma Fish
  • Enigma
  • Rotor-based encryption device
  • Poly-alphabetic Substitution Cipher
  • Introduced 1920s
  • Evolved during war
  • Fish (Lorenz or T52)
  • Stream Cipher (more than a PNGXOR)
  • Deployed 1940
  • Broken early 1942 at Bletchley Park
  • Used by German High Command

7
Battle of the Atlantic/Britain
  • Fought 1939-1945
  • German offensive against Allied shipping
  • U-boat tactics relied heavily on Enigma
    communication
  • By 1941, most traffic was read by Allies
  • Blitz Jul-Oct 1940
  • Intelligence provided command view of battle
  • Enigma traffic defeated regularly
  • Maintained Allied foothold on Europe

8
Bletchley Park
  • British code-breaking headquarters
  • Occupied by British intelligence in August, 1939
  • Brilliant mathematicians
  • Alan Turing
  • Important cryptanalytical breakthroughs
  • Cracking Enigma
  • Colossus

9
Bombes Colossus
  • Bombe (1940)
  • Enigma killer
  • First built by Polish scientists in 1937
  • British built their own in 1940
  • Enigma's fundamental flaw no character encoded
    as itself
  • Factory-style attack
  • Colossus (1943)
  • First programmable computer
  • Designed to break Fish
  • Human weeks vs. Colossus hours
  • Produced intelligence used in the precise timing
    of D-Day

10
Purple
  • Japanese diplomatic cryptosystem
  • Intelligence stored in purple binders
  • Electromechanical step-switching device
  • Used from 1939 to the end of the war
  • Poor key choices allowed it to be broken

11
JN-25
  • Japanese Military code
  • Broken after the attack on
    Pearl Harbor
  • Provided intelligence that
    aided in the U.S. victories
    at the Battle of Midway
  • and the Battle of Coral Sea
  • Provided intelligence that provided the U.S. with
    the location of Yamamoto Isoroku that allowed his
    assassination

12
Pacific Theater
  • Battle of Coral Sea
  • May 1942
  • Major turning point in
  • the Pacific War
  • First carrier naval engagement
  • Indecisive
  • Battle of Midway
  • June 1942
  • Prevented Japan from
  • becoming a hegemony
  • in the Pacific

13
D-Day
  • June 6, 1944
  • Timing dictated by intelligence
  • Several German battalions were expected to be
    absent
  • Intelligence turned out to be incorrect
  • Nature of intelligence

14
Victory
  • V-E Day
  • May 8, 1945
  • V-J Day
  • August 15, 1945
  • Intelligence directly led to both victories.
  • Significantly shorted duration of conflict

15
Conclusion
  • Intelligence and cryptanalysis was decisive in
    both theaters
  • Programmable computers born
  • Modern cryptography and Computing linked
  • Foundations for applied cryptography

16
Thank you. Any questions?
Write a Comment
User Comments (0)
About PowerShow.com