1
10
1
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/fb11dd658ed11bec365bacf16a061cfb.jpg?Expires=1712793600&Signature=FrCVUhOlmFc-4X4CB50W-xhBB8w7y0J%7EtKpMGv8Z3LGqC7Rg%7EzhUtpSvAnKR0bpj-Y5L7PGYw4YOQJUkq2EW-c-T-YmXA6OU-kq1fWHbAmJqhpeM-SQ677aggoJ%7ENVI0zJZnzBOC9cd76wwu-0a4FGE0E1F8zC5gT1Uu1z9SlbwMbV2Y6mPlkPGwZ8Rnjpx9ZieLBU0QalxIivRTYB0KwWGObVrkrwgpAReXGL8w8fPSwppso--8XPcuBsZvO9m6fHl5vFeRcmoFxt3hxkHI%7ElWBOh8%7E%7EMI3uMhgUttPiYZlLF9NNfKYJNwETMAMCi0cT4N8H0vT7GG3klaN4cIVag__&Key-Pair-Id=K6UGZS9ZTDSZM
0e09391ee3914411503b2ac9d830bd8d
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Classical Ciphers and Application
Subject
The topic of the resource
Classical Ciphers and Application
Description
An account of the resource
Classical Ciphers and Application features analyses of various ciphers- including classical ciphers and the application of ciphers used during WWII. The purpose of the collection is to explain how classical ciphers work and show the patterns among substitution (replacement) and transposition(scramble) ciphers. For further understanding in application, it attempts to provide an analysis of the famous substitution ciphers- the Zimmerman Telegram and WWII Pigeon Cipher.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
ADFGVX Cipher
Subject
The topic of the resource
ADFGVX Cipher
Description
An account of the resource
The ADFGVX cipher was developed by Colonel Fritz Nebel and introduced in March 1918. Germany used it as a field cipher during WWI. It was named the ADFGVX cipher for the letters used to create ciphertext, chosen for their distinctiveness in morse code. Its cryptanalysis requires two keys- a key matrix and a keyword. The key matrix is a 6x6 square with the letters A, D, F, G, V, and X above and to the side- populated with letters from the plaintext message and numbers 0-9. The first step of encoding is done through substitution- each letter of the plaintext is replaced by its two intersecting ADFGVX letters. The next step includes writing the enciphered text under the keyword in horizontal rows. A columnar transposition is then performed- the keyword is rearranged into alphabetical order and the vertical columns with each letter of the key word. The final ciphertext is formed by reading off the columns in vertical fashion. To decipher the ciphertext, you reverse the steps- using the same keyword and key matrix. <iframe width="560" height="315" src="https://www.youtube.com/embed/Y5-ory-Z25g" frameborder="0"></iframe>
Creator
An entity primarily responsible for making the resource
Fritz Nebel
Source
A related resource from which the described resource is derived
http://practicalcryptography.com/ciphers/classical-era/adfgvx/
Publisher
An entity responsible for making the resource available
Practical Cryptography
Date
A point or period of time associated with an event in the lifecycle of the resource
1918
Contributor
An entity responsible for making contributions to the resource
Practical Cryptography
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
English
Type
The nature or genre of the resource
Cipher
ADFGVX Cipher
WWI