1
10
1
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/2d3a31de7181223e15e41b5f90982404.jpg?Expires=1712793600&Signature=PG8oA3YeBHjgtmLL%7Eq626V46axGcm1yFUo4TkdRvQ0oKwq1MAimfuCYm75o2KqzRYO84aLj4R1y7PVwfkzVqQlUwITb66NBTkcJRC0n3I5CtfsivZZzozLFOPBe0yjozziNH8HvRyr5mlg3hyEMe8toICFXcL-B2OlhSwYRbO2d8dr-QQOdaiT27N08TAZmrWji%7EzryZGATTMtTEeBUJrde9WFTewZAImhix9TAjJvQdTBOX%7EZci6Jvlf%7EbVbQ3Haw8mjHMMU5q66yoyYCzcehMU74HB72kCRon2%7E28Dgm6CErnHaBusO5r2Tb-W0XMxlYf%7EmykZVHy6n0IFiH6NeQ__&Key-Pair-Id=K6UGZS9ZTDSZM
9430e8e4308da44cbae40eb3c7ec471a
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Cipher Tools and Machines
Subject
The topic of the resource
Cipher tools and machines
Description
An account of the resource
Cipher Tools and Machines contains examples of cipher tools and machines seen through out history, particularly within the context of military history. From Ancient Greece to the Cold War, cryptology has played a significant part in the communication and intelligence efforts between opposing forces.
They, along with cryptanalysts, have even been credited with shortening the duration of wars. Without the British intelligence project ULTRA, WWII may have lasted for another two years. However, while many great cryptanalysts hail from Britain, the UK is not exclusive in their cryptographic abilities. The Enigma was invented in Germany, and its stronger rendition, Fialka- in Russia. In comparison to these cryptomachines, the US SIGABA remains unbroken. Those are only a few cipher machines flound in this collection.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher machine
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Lorenz "TUNNY"
Subject
The topic of the resource
Lorenz SZ-40/42 "TUNNY"
Description
An account of the resource
The Lorenz cipher machine was developed by Lorenz and used in WWII by the German Army High Command. Hilter used it to communicate with his generals. This cipher machine was dubbed "TUNNY" by British codebreakers at Bletchly Park. In August 1941, Bill Tutte led them to intercept two in-depth messages and key stream. By January of 1942, they had figured out how TUNNY worked and built a replica.
Creator
An entity primarily responsible for making the resource
Lorenz
Source
A related resource from which the described resource is derived
https://www.cryptomuseum.com/crypto/lorenz/sz40/index.htm
Publisher
An entity responsible for making the resource available
Cryptomuseum
Date
A point or period of time associated with an event in the lifecycle of the resource
1941
Contributor
An entity responsible for making contributions to the resource
Cryptomuseum
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
English
Type
The nature or genre of the resource
Cipher machine
Lorenz
TUNNY
WWII