Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Importance of Cryptography
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Importance of Cryptography
The ever evolving method of cryptography, or sending messages through code, can be traced throughout the history of the world. Early Egyptians communicated through mysterious hieroglyphics. Ancient Greeks concealed secret messages beneath wax on tables or with tattoos on a slave’s head. During the Renaissance in Europe, citizens would use a substitution cipher to carry messages about political and religious revolutions. During World War I and previous battles, most countries used codes to contact their navy or army branches abroad, in case of enemy interception. Which subsequently brings us to World War II, and the major role that codebreaking played in the results of the war. Some of the main codebreaking events during World War II, the breaking …show more content…
of the German Enigma and the breaking of the Japanese code, were two of the strongest turning points for the Allied victory. Without the intelligence produced from cryptanalysis, the war would’ve lasted much longer with many more casualties, and machines today would not have been evolved. The cryptanalysts at Bletchley Park disregarded all skeptic thoughts and broke the code that would later change the course of World War II. Before Poland fell, they shared their previous progress on the German Enigma, with Bletchley Park in England, which became the home base for World War II codebreakers. Enigma was the most advance ciphering device of its time. It encoded messages via an electromechanical system incorporating moving wheels or rotors. A character typed on the keyboard was sent through the rotors electrically and the code equivalent read off an illuminated panel. The rotors change their relative positions during encipherment to scramble the pattern a codebreaker looks for. The cipher circuits also went through a plug boar which switched letter pairs. Rotor and plug board configurations were changed at regular intervals. The codebreakers task was to identify the start positions of the rotors and unravel the plugboard setup. The Germans used Enigma because they believed that “the key could not be found, since it is impossible to run through 6 billion (seven rotors) or 100 trillion (thirteen rotors) keys [rotor starting positions].” (Gladwin, 204). But this impossible problem intrigued British mathematician Alan Turing even more. Using intelligence provided by Poland and Turing’s brilliant mind, he concluded that a “universal machine might be devised that could imitate any other” (Gladwin, 209). And so that is what Turing did, he ended up creating the standard British bombe. This machine contained 36 Enigma equivalents, each with three drums wired to produce the same scrambling effect as the Enigma rotors. A bombe could run two or three jobs simultaneously. Since “wartime code breaking was of course a life and death matter, speed was everything” (BBC Horizon, 24:10-24:20), the new machine was a perfect way to decipher the often intercepted German codes. As early as 1943 Turing's machines were cracking a staggering total of 84,000 Enigma messages each month, which was equivalent to two messages every minute. The decryption of the Enigma, which was present on all German u-boats, allowed the Allied forces to know mission details like locations, times, and destruction level. Winston Churchill, the Prime Minister of Great Britain at this time, said that “the only thing that ever really frightened me during the war was the u-boat peril.” By saying this he is referring to the constant torpedoing of American supply boats that were being shipped to Britain. Turing’s brilliant discovery couldn’t have come at a better time for the Allied forces. The cryptanalysis at Station HYPO used breaking of code to defy orders and many opinions, in order to predict the second Japanese attack. After the attack on Pearl Harbor, the US Navy was on high alert. Officer Joseph Rochefort, who was also a cryptologist and engineer, was put in charge of HYPO and spent hours decrypting thousands of Japanese codes. Unlike the Enigma code, which was machine generated, the Japanese used book ciphers for their naval codes. Book ciphers work through the sender composing his message and then consulting the code book. Common words and phrases are replaced with a group of numbers and letters, and any remaining text is encoded character by character. The result is transmitted and the receiver then looks up each group in the corresponding code book and reassembles the message. This code, named JN-25B, used “50,000 5 digit different code groups” disguised through super encipherment “by additives of 55,000 more” (Carlson, 25:35-25:55). The decoding of this code consisted of “pencil and paper” problem solving “one at a time” (Carlson, 26:35-26:45). Each month they use three million IBM punch cards to store and retrieve naval codes. Gradually a usable portion of the JN-25 became readable, which hinted towards a major offensive towards the US. Locations from the decrypted code book pointed towards the location, disguised as “AF”, to be Midway Island. But other naval intelligence organizations, particularly ones in Washington disagreed on the location and timing. But Rochefort and his comrades were strong in their beliefs, and went forward in misleading the Japanese, “despite claims from Washington intelligence officials that it could not be done” (McDowell). Many naval officials didn’t believe in the power of cryptology, and thus doubted the intelligence it could acquire. But wanting to prove themselves, Rochefort and his team planned a clever experiment to confirm Japan’s target. Pearl Harbor and Midway Island were connected by an underwater cable that was invulnerable to Japanese interception.
Station HYPO sent orders to Midway by cable to broadcast a radio message that the island's water plant had broken down. The radio message was broadcast without encryption to ensure that Japan could read it if it was intercepted. The radio message was indeed intercepted by Japan and then reported by a message encoded in JN-25 stating that “AF’s” desalination plant was out of order. That message was intercepted by Station HYPO, and “AF” was thus confirmed as Midway. Station HYPO concluded that the attack would come in late May to early June 1942, while Washington argued late June. Station HYPO's intelligence persuaded US Pacific Fleet Commander Nimitz to risk the three remaining US carriers in the Pacific in an attempt to ambush the Japanese attack on Midway, which turned successful by sinking four Japanese carriers. Station HYPO won out again because they had succeeded in cracking JN-25, and later put “cryptanalysis on the map for military, it gave codebreakers the respect and reliability when they needed it the most.” (Carlson, 35:10-35:30). The intelligence that HYPO was able to gather and put into action helped change the course of the Japanese
offensive.
In May of 1942, Japanese Admiral Isorosku Yamamoto devised a plan to draw the US Pacific fleet into battle where he could completely destroy it. To accomplish this master plan of his, he sought out the invasion of Midway Island which would provide a base for the Japan troops to attack Hawaii. Unfortunately for Yamamoto, America decrypted Japanese radio transmissions and Admiral Chester Nimitz was able to establish a counter attack against this offensive. Nimitz sent three aircraft carriers, The USS Enterprise, The USS Hornet and The USS Yorktown to destroy the Japanese. This is just a short overview of The Battle of Midway, or as commonly referred to as, the battle that changed the war. People argue that it had no affect on the war, but those critics couldn’t be farther from the truth. The Battle of Midway was the turning point of the war because it fully enters America into the war, it kicked off the Pacific Campaign, and it had Japan on the defensive, thus preventing them from helping The Axis Forces.
Prior to the dispatch of September 24, the information which the Japanese sought and obtained about Pearl Harbor followed the general pattern of their interest in American Fleet movements in other localities. One might suspect this type of conventional espionage. With the dispatch of September 24, 1941, and those which followed, there was a significant and ominous change in the character of the information which the Japanese Government sought and obtained. The espionage then directed was of an unusual character outside the realm of reasonable suspicion. It was no longer merely directed to ascertaining the general whereabouts of ships of the fleet. It was directed to the presence of particular ships in particular areas; to such minute detail as what ships were double-docked at the same wharf….These Japanese instructions and reports pointed to an attack by Japan upon the ships in Pearl Harbor. The information sought and obtained, with such painstaking detail had no other conceivable usefulness from a military
This code actually proved vital to the success of the Allied efforts in World War II. Because the Code Talkers performed their duty expertly and efficiently, the Marines could count on both the ...
“AIR RAID ON PEARL HARBOR. THIS IS NO DRILL.” This is the message sent out by radioman Kyle Boyer at 7:58 a.m. Sunday December 7, 1941; a date which will live in infamy. The empire of Japan had attacked the United States’ Pacific Fleet based in Pearl Harbor. For months the US Intelligence community, as well as others around the world, had been intercepting and decoding transmissions from mainland Japan to their diplomats and spies in the US. We had cracked their Purple Code, and knew exactly what military intelligence was being transmitted back and forth. The Dutch also cracked Purple and informed our government of the Japanese plan and were shocked to hear reports that we were taken by surprised. Even more disturbing, months before the attack a British double agent, Dusko Popov, codenamed Tricycle, turned over to the F.B.I. detailed plans of the Japanese air raid, which he had obtained from the Germans. The government had the information, and did nothing with it.
Even before the battle started, America saw his attack coming. Japan had bombed the Dutch harbor in Alaska on the days of June 3rd and 4th. Japan landed there instead of on the islands of Attu and Kiska, in fear the United States might be there. There attacks failed when the plan to get the American fleet from Midway to aid the freshly bombed Dutch harbor. At 0900 hours an American patrol boat spotted the Japanese fleet seven hundred miles from Midway. At that point admiral Soroku Yamamoto’s plans of a sneak attack were over. Admiral fletcher commanded the U.S.S. Yorktown before it was sunk by the Japanese. Then at 0750, japan spots nine enemy (American) planes fifteen miles out. Tones, a Japanese cruiser, opened fire on the American pilots. Almost instantly if an American bomber plane were hit it would explode and go down. The bombers dropped their torpedoes to far from their targets, so the torpedoes didn’t land a single blow to Japan. At 1040 japan sent from Hiryu,...
On December 7th 1941, Japanese Planes and submarines attacked the United States Naval base at Pearl Harbor. This event singlehandedly brought the U.S from its then neutral stance in World War Two to a fighting member of the “Allied Powers.” Pearl Harbor was the first of a long series of confrontations between the U.S and the Japanese in an effort to gain control of the Pacific. Unlike the “War in Europe” the Pacific strategy was dominated by naval and aerial battles, with the occasional land-based “Island Hopping” Campaign. As such, one of the most important factors in the war in the pacific was Fleet Size, the more ships a country could send to war, the better. Pearl Harbor was the Japanese’s way of trying to deal with the massive U.S Pacific fleet. However, Pearl Harbor was not the turning point of the war. After December 7th the United States began work on numerous technological developments which would ultimately help them in one of the most important battles of WWII, the largest naval confrontation of the war, The Battle of Midway. The battle, which took place from June 4th to June 7th , 1942 is widely considered the turning point of the Pacific Theater (James & Wells). Through the Post-Pearl Harbor desire for “Revenge” and various technological advantages including code breaking and radar, the U.S were able to outsmart the Japanese at Midway and ultimately win the battle, eventually leading to a victory in the Pacific.
Fuchida, Mitsuo, and Masatake Okumiya. Midway, the Battle That Doomed Japan; The Japanese Navy's Story. Annapolis, Maryland: United States Naval Institute, 1955. Print.
In the morning hours of December 7, 1941 the Japanese attacked the Hawaiian islands at Pearl Harbor. The Japanese had been feeling the pressures of World War II (WWII) as did many others. With the resources of the Japanese dwindling, the Japanese decided to attack the U.S. while simultaneously planning the attack during the negotiations of continued peace between our two countries. The Japanese were able to cover up there planning for nearly a year. Planning for the attack and ultimately war in the pacific, started in January of 1941, and was finalized during the war games in November of 1941. The U.S. on the other hand would become a reactive force after the attack on Pearl Harbor. The inability to crack the Japanese code lead, to a lack of intelligence during this time making the plan of attack for the Japanese a successful one. It would seem that the year of planning and the strategies laid out in the “Combined Fleet Operations Top Secret Order 1” of the Japanese navy would become a reality in the pacific, allowing for an easy sweep of the military targets for the Japanese fleet.
Beginning with the question of leadership, as it is shown in the film, Admiral Chester Nimitz is portrayed as taking a high-risk high-reward gambit in the context of the US Navy’s WWII Pacific operations. Indeed, and in a context where the Americans were vastly outnumbered by the Japanese fleet, and wherein Midway itself represented a critical piece of ocean space in the context of the Pacific war’s grand strategic portrait, Nimitz was willing to believe in his sailors, and take the steps necessary to make the most of a difficult situation. Given that America had recently broken Japanese cryptography pertaining to its naval communications, Nimitz had a clear advantage over Yamamoto, in spite o...
Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.
The main events that led to the battle of Midway are the attack on Pearl Harbor and the Coral Sea battle. Japan decided to attack Pearl Harbor (U.S. naval base), so that the U.S. would not interfere with Japan conquering the Dutch East Indies. They wanted oil and the land from the Indies. Japan attacked Pearl Harbor on December 7, 1941. America didn’t know that Japan was attacking them, so it was a surprise attack and they were not prepared. Japan was attacking America’s ships and planes. Japan went home with the victory, but the next day America declared war on Japan. The Coral Sea battle lasted from May 4 –May 8 1942. This battle was fought by America and Australia vs Japan. Japan wanted to invade New Guinea and the Solomon Islands for their oil and land. Japan successfully invaded Tulagi in Solomon Islands on May 3- 4. May 8-7 both sides suffered great losses in aircraft and carriers because they were either sunk or damaged so both sides disengaged from the battle area. Both of these were important events that caused the battle of Midway.
Cryptography dates back as early as the Egyptian Hieroglyphs that were carved into the Pyramids and other Egyptian artifacts. They are necessary designed to be secret but do pose the intrigue of anyone who wants to read them. Unless you understand the glyphs you would not be able to understand the code. This is similar to cryptography today. Unless a person has a key to unlock the code, they are left with cipher text. Julius Caesar came up with one of the very first substitution ciphers. This was a simple shift cipher. The letters of the alphabet were shifted based on a predetermined number known only to those involved in the conversation. The Scytale was another early device used for cryptography. A leather strap was wound around a stick of a specific diameter. The message was then stamped into the leather. If the message was intercepted, the leather strap was useless without the stick with the specified diameter. Cryptography was used in both World Wars. The Germans had the Enigma machine which allowed the Germans to communicate securely with other German forces. This was very difficult to crack, but ultimately the code was broken. The United States and other Allies used several Native American tribes to use their native language to convey messages. The Navajo were very popular due to their languag...
The first sign of cryptography was documented on Egyptian scribes where non-standard hieroglyphs were used on clay tablets. (Whitman, 2011, p. 351) The Egyptians were the first documented people to use cryptography in 1900 B.C. (Whitman, 2011, p. 351) With cryptography surviving for so many years it is no wonder that it is still being used today to hide the real meaning of messages. There have been many advances since the time of the Egyptians but the purpose is still the same which is to keep information from unauthorized individuals.
That example does not compare to today’s cryptography, but the idea of creating a code for communication purposes ties the two together. Over the years, other forms of hidden message transmission has occurred, mostly for use in military actions. Around 100 BC, Julius Caesar used a form of encryption, a substitution cipher called the Caesar cipher, to give secret messages to his army generals. To explain further, “a cipher is an algorithm used for encryption or decryption” (Red Hat). So, in the substitution cipher, each character of text you see is represented as a different character according to the cipher
The study of code switching began in the mid-1970s with the work of the sociolinguist John J. Gumperz and Dell Hymes. Both investigated the communicative behavior within “speech communities”. Gumperz and Hymes defined “speech communities” as a, “group of speakers who share knowledge of the communicative constraints and options governing a significant number of social situations” (Diller). Gumperz and Hymes also fashioned the requirements needed to form a “speech community”. The requirements state, “All that is required is that there be at least one language in common and that rules governing basic communicative strategies be shared so that speakers can decode the social meanings carried by alternative modes of communication” (Diller). Once