3
10
30
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/2f7963a474910e7624182e046e6f102b.png?Expires=1712793600&Signature=Nsx-hFrCnnvIq%7Eo%7E48eVUQ3LwH0p82LieMoC5Afum1nE6DYec8DOYHC2ulgyVcDps20NzqqseHD0vlOcyUbZHy2qSqq1fCuwTwTMKCFItVk04mYCjGu2GLHW-7D-oEgvjy2M9Dq1uHVvPHD4LmtCT26F8ngwc7q3MB2-GaBU2QLHqpsG8DDKvfFqsbOvjKtt-RiZ4wLidxRkIq6ylfldxHgPA5G-ysYzoudstTT%7E85etH9C6L01O%7EPoKD6xGMVKL8F%7ERjHOchxnP%7EIrIPXJxYuIlLj6HZu70YbZiZb--BLQMFOkZ5WdV0ks7rDWMQEHCNgPJxUuv9mghhSq9TPOQzg__&Key-Pair-Id=K6UGZS9ZTDSZM
4a6d1d5e2506745ea4fb9d707ae7cae5
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Cipher Tools and Machines
Subject
The topic of the resource
Cipher tools and machines
Description
An account of the resource
Cipher Tools and Machines contains examples of cipher tools and machines seen through out history, particularly within the context of military history. From Ancient Greece to the Cold War, cryptology has played a significant part in the communication and intelligence efforts between opposing forces.
They, along with cryptanalysts, have even been credited with shortening the duration of wars. Without the British intelligence project ULTRA, WWII may have lasted for another two years. However, while many great cryptanalysts hail from Britain, the UK is not exclusive in their cryptographic abilities. The Enigma was invented in Germany, and its stronger rendition, Fialka- in Russia. In comparison to these cryptomachines, the US SIGABA remains unbroken. Those are only a few cipher machines flound in this collection.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher machine
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
G-Schreiber "STURGEON"
Subject
The topic of the resource
T-52 Geheimschreiber
Description
An account of the resource
The T-52 G-Schreiber was developed around 1930 by Siemens & Halske. It was used by the Germans in WWII in conjunction with the Enigma and Lorenz. Intercepting messages that were in-depth enough to decipher was difficult for Allied codebreakers because it was used via land lines and only occasionally over radio. However, it was possible and Swedish and British codebreakers were able to decipher pieces of traffic ciphered by the machine Bletchly Park(UK) dubbed "STURGEON".
Creator
An entity primarily responsible for making the resource
Siemens & Halske
Source
A related resource from which the described resource is derived
https://cryptomuseum.com/crypto/siemens/t52/index.htm
Publisher
An entity responsible for making the resource available
Cryptomuseum
Date
A point or period of time associated with an event in the lifecycle of the resource
1930
Contributor
An entity responsible for making contributions to the resource
Cryptomuseum
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
English
Type
The nature or genre of the resource
Cipher machine
G-Schreiber
STURGEON
WWII
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/e1f4acd56e8781e23c4e9191ac7cde55.jpg?Expires=1712793600&Signature=VV6fxxgQFUn0i9M3Mhk2dyfodPY-Oy9TOtedCsI2Gwb6f%7EhDtjqSFS8igiGgCu4loIutqRqnfims-VrM5at0rF7KCenvFn6J3R1X0-oz-WTha5OR38pU2ibgYyzDwHzkj8U-mhZtekajQoWy2-fXtWrrdgiLUyGd5-GcK5qbFr%7EpRYdfx9Eh-uWpW8KTGqrSyBLLPwHBOZwKb7XI8FVBXSkXbNHe2jhGCGBHAYY5EReo-TfSMW0l8VdqVwkTaYqqtU%7ED%7EhjVJNA3w5a9Lf-CZvG6aklq0oSWBXLw8%7EufikJXB1RfnnKFzt7Gz-Ygg1QlG3sJio9US7IKkRaS2RAfyw__&Key-Pair-Id=K6UGZS9ZTDSZM
26d249e9751ce2ca29150e2121bb1a30
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Cipher Tools and Machines
Subject
The topic of the resource
Cipher tools and machines
Description
An account of the resource
Cipher Tools and Machines contains examples of cipher tools and machines seen through out history, particularly within the context of military history. From Ancient Greece to the Cold War, cryptology has played a significant part in the communication and intelligence efforts between opposing forces.
They, along with cryptanalysts, have even been credited with shortening the duration of wars. Without the British intelligence project ULTRA, WWII may have lasted for another two years. However, while many great cryptanalysts hail from Britain, the UK is not exclusive in their cryptographic abilities. The Enigma was invented in Germany, and its stronger rendition, Fialka- in Russia. In comparison to these cryptomachines, the US SIGABA remains unbroken. Those are only a few cipher machines flound in this collection.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher tool
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Scytale
Subject
The topic of the resource
Scytale
Description
An account of the resource
The scytale is known as the first cryptographic device, used in 400 B.C. by the Spartans. It consisted of a baton and a papyrus strips with letters. These papyrus strips would only reveal the message sent between Spartan generals if the baton they were wrapped around had the same dimensions as the one that the message was written on.
Creator
An entity primarily responsible for making the resource
Sparta
Source
A related resource from which the described resource is derived
https://en.wikipedia.org/wiki/Scytale
Publisher
An entity responsible for making the resource available
Wikipedia
Date
A point or period of time associated with an event in the lifecycle of the resource
400 B.C.
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
Greek
Type
The nature or genre of the resource
Cipher tool
Greek
Scytale
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/9afd2e9faf508e9c1fe04d548f5cb1c0.jpg?Expires=1712793600&Signature=esq1SsQOakA5TSU4X8ereS6let%7ECoRn0bt22OiGHRVPOtQppI1ZrchyOLltQv7EOyHtzF4pRziePsWpNPUKsA0zrGihCXFcPflhVn0HGZnkgmL4zfAIMF-n8M4DV7dWEFuDfqt23TSaOgBD8SIkEXpe1HfI7qLgY6D%7EC%7E3NCJBY6kZm2IzS2bEU7YJMWzInyrjxEn9djq-qrPjrlqe-vPcfC3WNRqDTZJelYfMwyVra0LKXemMdYoCDGUOzIbbo6S-JuguyGVr-D3bSnFD7FYcxbgQ477BoblNNCI5d9QzI2ZICzrhudqKFQ3jI9MfuyqtTbOGtPuOVoh47jEC2tkA__&Key-Pair-Id=K6UGZS9ZTDSZM
76904a7f2b5dcf222dd5bddef4d74319
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Modern Encryption
Subject
The topic of the resource
The analysis of modern encryption techniques
Description
An account of the resource
Modern Encryption Analyses features the performance analyses of encryption techniques and methodologies. These encryption techniques are unique due to their platform application. Unlike preceding cryptographic efforts, these take place on the relatively recent technological advancement of computers. Therefore, the efforts are for the purpose of data encryption. Such analyses include the obsolete Data Encryption Standard (DES), its iteration Triple Data Encryption Standard(3DES), and its successor Advanced Encryption Standard (AES).
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Encryption
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
AES
Subject
The topic of the resource
Advanced Encryption Standard
Description
An account of the resource
The Advanced Encryption Standard (AES) is a symmetric block cipher that was began development in 1997 to replace the Data Encryption Standard. It chosen as the U.S. federal government standard encryption algorithm in 2002. In 2003, it became the standard for classified information.
AES includes three block ciphers that identify the secret key lengths involved. In addition to the key lengths, these block ciphers differ with the number of rounds that plaintext is processed and transformed.
AES-128 | 128-bit key length | 10 rounds
AES-192 | 192-bit key length | 12 rounds
AES-256 | 256-bit key length | 14 rounds
Creator
An entity primarily responsible for making the resource
The National Institute of Standards and Technology
Source
A related resource from which the described resource is derived
https://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard
Publisher
An entity responsible for making the resource available
Searchsecurity.techtarget
Date
A point or period of time associated with an event in the lifecycle of the resource
2002
Contributor
An entity responsible for making contributions to the resource
Corinne Bernstein, Michael Cobb, GEM100, Borys Pawliw
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
English
Type
The nature or genre of the resource
Encryption
AES
Encryption
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/ad0cd08052fdb8b8e0198937630a3db5.gif?Expires=1712793600&Signature=p77hWvckvMlwo%7EM1eLg3BKemFXtOpKiXKXUUseyO9LwuR8lemgABFBFMVsIA41kQK67dul8Flh-L8R3vI%7EycE0npTyvzeO5yEb58SsYCZuVwmJysbJ6rPblGVl4%7EFajzmDudwUdLL2kC%7EDJUFhGON%7E5LPOOFc9j02YEyEjW-6AlvFOS%7Es-vXB538iaG0pz2NVLygNndVeK31ZSbfQcKEsBF72EHTJmDng4afsq-53PY8LYdwMRyiDrO5b8LZKxccHeX7jYdsDrb6XZkbU9mr6KuGop8vVrXaMmKLY%7E8jOndv7mZmo0p0GjENvZK1x7MwNmDJRIaM8ltGmllmx-8REA__&Key-Pair-Id=K6UGZS9ZTDSZM
a4c06a513f07fbf8e6fb27ed7e204091
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Classical Ciphers and Application
Subject
The topic of the resource
Classical Ciphers and Application
Description
An account of the resource
Classical Ciphers and Application features analyses of various ciphers- including classical ciphers and the application of ciphers used during WWII. The purpose of the collection is to explain how classical ciphers work and show the patterns among substitution (replacement) and transposition(scramble) ciphers. For further understanding in application, it attempts to provide an analysis of the famous substitution ciphers- the Zimmerman Telegram and WWII Pigeon Cipher.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Pigpen Cipher
Subject
The topic of the resource
Pigpen Cipher
Description
An account of the resource
The Pigpen Cipher is a form of substitution cipher that uses symbols, rather than other letters. Although its origin is unknown, this cipher was most famously used by the Freemasons in the 18th century- to the point that some know it as the Freemasons Cipher. However, it was also used during the Civil War. Imprisoned Union soldiers used it as a method of communication, while in Confederate camps.
The image for this entry shows the easiest way to remember what the symbols are for each letter. The symbol for each letter is the part of the grid/dot pattern that contains the letter. These symbols can be transposed directly without any rotation.
Source
A related resource from which the described resource is derived
https://crypto.interactive-maths.com/pigpen-cipher.html
Publisher
An entity responsible for making the resource available
Crypto Corner
Format
The file format, physical medium, or dimensions of the resource
Cypher
Type
The nature or genre of the resource
.JPEG
Creator
An entity primarily responsible for making the resource
Unknown
Contributor
An entity responsible for making contributions to the resource
Daniel Rodriguez-Clark
Civil War
Freemasons
Pigpen Cipher
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/13af888865d3100258320016b2b58317.jpg?Expires=1712793600&Signature=X1odAvt%7EjWJIFXPrmmYtcW3KhtPF0xs4zFHZKmNp28srK03m7mbQwSu3hQJvXbvdBcRiQoCGxVimVzco3lwlGdh%7EcclASJjKyjOuNdWSAKnmUZ6bIw2cIaK2ApbHLdYDZycp2EU4cTQ3ZfQh516oIoehpOvEtMIXi57F4pIyATMDlIkbCnU4dITsNkgSnXCfxEVLGm8bOecHDCGx2NlZBrSWEvkOq9WsGCwmp1hKHiuzuch5dUIAJBsjJBPq0F22ILIg1MZWAt0F8ODwkExXpnw6T6Q3xjZf7ftO8%7EOHfOPjrs4fUlRJ0t3fVMDQrnrJ6yKxcG4PQjWefWMwB24Eiw__&Key-Pair-Id=K6UGZS9ZTDSZM
c272e70e9130a0e1ebc6827c744df291
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/e17654bcae4a88686a521129d7948f4a.jpg?Expires=1712793600&Signature=cHr7tAa8UxEnsYtQ6yPuWWJZ7YMZvDcaaZz1mAUzh2MZfrLd8DyoGg6bmIi5gUOV29WhHM1lZ2NMcH-XVDJguqV4TRFLYz1DvZVcZLvoNAXdnooP8cmIRmpBd0cYQbHFVSAZFwJm5sMml1UVA8bGZB26nX7%7EuJkgEZOLkzO36GwLJO15tCViD%7Eca9UxU0dzWo2XpjHV%7EPEY0E7ToH7Jimpa-SIBdIdOP-qr6eBooSynATf9Q4ta0XG795nfe%7EC%7ElPnQQ9ishY6Dd%7Ewc1wVJM6P8rSVbHgY7ACUVlEqabiXNvO1lAo1%7E2WvCH-uY6EUwy1hI34tXnrlHDTPAMHShaQw__&Key-Pair-Id=K6UGZS9ZTDSZM
aabdfb081b798c51d9d91d90f4761a5a
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Classical Ciphers and Application
Subject
The topic of the resource
Classical Ciphers and Application
Description
An account of the resource
Classical Ciphers and Application features analyses of various ciphers- including classical ciphers and the application of ciphers used during WWII. The purpose of the collection is to explain how classical ciphers work and show the patterns among substitution (replacement) and transposition(scramble) ciphers. For further understanding in application, it attempts to provide an analysis of the famous substitution ciphers- the Zimmerman Telegram and WWII Pigeon Cipher.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Affine Cipher
Subject
The topic of the resource
Affine Cipher
Description
An account of the resource
The Affine Cipher is a form of substitution cipher that involves math. The shift of the alphabet- while transpositioning plaintext into ciphertext is determined by a mathematical equation. This equation is:
E(x) = (ax+b) mod m
E(x) = The number equaling the letter to be used in the cipher text
a, b = Any given number
x = the number correlating to the plaintext letter
mod m = A mathematical way (subtraction, division, etc.) to bring (ax+b) back within range of 26 for all answers.
To decrypt, the equation is c(x-b) mod m.
c = the modular multiplicative inverse of a
Creator
An entity primarily responsible for making the resource
Unknown
Source
A related resource from which the described resource is derived
https://crypto.interactive-maths.com/affine-cipher.html
Publisher
An entity responsible for making the resource available
Crypto Corner
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
English
Contributor
An entity responsible for making contributions to the resource
Daniel Rodriguez-Clark
Affine Cipher
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/76c3c1e38b36d332973b33e234269046.jpg?Expires=1712793600&Signature=KDxb7KOt82Q3rWzpZFIY9FSYMRn-fsJgzZ3kA9dctlDC8qcYSs9ejt-34rmFat85OgevxeCKVLccSiAyessR0y4oqbmyDO-yZweuSDBcZu8fqhL-A0XXrynbPxBqkkbEWd9cfC8iVoS4mF1YHKV4GoZrDCslN2RZmv-bG45aH%7ELieE9uaDTAFfQiCRTAn1CuGHtjLMNINw3ROmAZSA5U36a1wjdap-l7T5NRaLiafDco6DTZ%7E0y3GGTlIekNrL6U-G8MLm3Ugb4lYr-%7EDLKX%7EKSVpo%7EQNtlfiS-BcD0GKy1pDJRu0FB6%7EQzuoNrmIuiV%7Ef8FFzNLvknvnGU8LfZO1Q__&Key-Pair-Id=K6UGZS9ZTDSZM
ad3abf283dcabeb1b81d3d98a177b3e8
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Classical Ciphers and Application
Subject
The topic of the resource
Classical Ciphers and Application
Description
An account of the resource
Classical Ciphers and Application features analyses of various ciphers- including classical ciphers and the application of ciphers used during WWII. The purpose of the collection is to explain how classical ciphers work and show the patterns among substitution (replacement) and transposition(scramble) ciphers. For further understanding in application, it attempts to provide an analysis of the famous substitution ciphers- the Zimmerman Telegram and WWII Pigeon Cipher.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Rail Fence Cipher
Subject
The topic of the resource
Rail Fence Cipher
Description
An account of the resource
The Rail Fence Cipher is form of transposition cipher that scrambles the letters. It does this by using a grid of x many rows, and the sender writes the plaintext in the grid in a vertical zig-zag pattern. The key for this cipher is the number of rows (x) that the sender decides to write the message across.
After writing the plaintext cross the grid, the ciphertext can be read off. This is done by reading each row across in descending order.
To decrypt, the letters just have to be arranged in the way they were put and read off in the zig-zag pattern. This makes it easy to decipher. Adding spaces between words into the grid can help, but only to a certain degree.
Creator
An entity primarily responsible for making the resource
Unknown
Source
A related resource from which the described resource is derived
https://crypto.interactive-maths.com/rail-fence-cipher.html
Publisher
An entity responsible for making the resource available
Crypto Corner
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
English
Type
The nature or genre of the resource
Cipher
Contributor
An entity responsible for making contributions to the resource
Daniel Rodriguez-Clark
Rail Fence Cipher
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/25deff323ce4b30841760a70fae29cd6.jpg?Expires=1712793600&Signature=p6Tr2TgJ-pE24063aGfRTMhBYLsE6dmOfibVn1cMTWIDN8%7E7etW-tTD7H4gWjnyJ3hL3QmKvlSR2-1lnpBxSNPehullx8H4yxNeIA3CKP2rrTGfePd6ze32jVyS87KFJL9bf2B8Kz4TUpic4Syoa3qYbp3DPuF3jukilPwVmdjMrlVJynt-pnO3-KwOupc832D-8I3MdJNNtIu5nd6afnQtY5w4T3wJ%7E18%7EUynsoO2lgMYRcDgMZpduKkZgVrdFi8aMa9eNXAeFHtEMMW9cIxTpq28ixOYb0nrKCCFTKffVbydfxLjrG9nozE8ZULfK3XvsgGJf%7EqFuLTI8GjZ7Ovw__&Key-Pair-Id=K6UGZS9ZTDSZM
e16d8ddf577103c1075ecaf75c2d3c5a
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Classical Ciphers and Application
Subject
The topic of the resource
Classical Ciphers and Application
Description
An account of the resource
Classical Ciphers and Application features analyses of various ciphers- including classical ciphers and the application of ciphers used during WWII. The purpose of the collection is to explain how classical ciphers work and show the patterns among substitution (replacement) and transposition(scramble) ciphers. For further understanding in application, it attempts to provide an analysis of the famous substitution ciphers- the Zimmerman Telegram and WWII Pigeon Cipher.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Route Cipher
Subject
The topic of the resource
Route Cipher
Description
An account of the resource
A Route Cipher is a type of transposition cipher where you write the message into a grid box and read the letters in a certain route. This cipher was used by the Union forces during the Civil War. However, they took care to use it in a way that moved entire words around. In addition, sometimes the would encode a word or add null words to protect their message.
In order to create a route cipher, the dimensions of the put the plaintext in and decide what route you want it to follow. Once that is decided, the ciphertext becomes the letters in the order of the route. Therefore, decrypting a message requires the grid dimensions and route path as keys.
Creator
An entity primarily responsible for making the resource
Unknown
Source
A related resource from which the described resource is derived
https://crypto.interactive-maths.com/route-cipher.html
Publisher
An entity responsible for making the resource available
Crypto Corner
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Type
The nature or genre of the resource
Cipher
Contributor
An entity responsible for making contributions to the resource
Daniel Rodriguez-Clark
Civil War
Route Cipher
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/2bac273696f62cdc3af0b65fded7d684.jpg?Expires=1712793600&Signature=I1XvTby177ttKkBNv4iqImsT3yZIinENkoIFj%7EJJzUqIFg0bKxxTFkGpa-DwtdUmRj%7EfhVuNnSenTz5U25Jk7wOxm6%7Eo--TnGavnQfalRpmW6UyLJwj76yAU7BGda7b3pzZCLY8WiIy1XQUff6EQBUZnTZv-nEN2Aao88eblqNtB2MT%7Eb09OBxCcrBp-7uD7nLAjeUu7RwP4yWu9MyWUi3tayzuvfbEZuvhQiXkmH6Kg%7E3B7%7EjCYUV30v8RILb04KRoOkZr0i4CjnlPpykzxwk8eK0B63nJWjtPYAoexIF2NN22eItt7BuafwNYq615n9LqKzAammg2di9QYlG3ZGA__&Key-Pair-Id=K6UGZS9ZTDSZM
4abd65326efd14847c53e72c12943be0
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Classical Ciphers and Application
Subject
The topic of the resource
Classical Ciphers and Application
Description
An account of the resource
Classical Ciphers and Application features analyses of various ciphers- including classical ciphers and the application of ciphers used during WWII. The purpose of the collection is to explain how classical ciphers work and show the patterns among substitution (replacement) and transposition(scramble) ciphers. For further understanding in application, it attempts to provide an analysis of the famous substitution ciphers- the Zimmerman Telegram and WWII Pigeon Cipher.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Analysis
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Frequency Analysis
Subject
The topic of the resource
Frequency Analysis
Description
An account of the resource
Frequency Analysis is a method of code breaking that works to decipher all substitution ciphers. This methods relies on the fact that some letters of the alphabet are used more than other letters of the alphabet. For example, 'E' is more commonly found than 'X'. In fact, 'E' is the most common letter of the English alphabet- appearing roughly 12% of the time in a given sample message compared to other letters.
The way that this analysis works is that by comparing the frequency of the alphabet applied to the ciphertext with the frequency of the plaintext alphabet, the analyst can began making estimations of what letter lines up with which. Once the analyst finds the key- the correct plaintext letter a ciphertext letter aligns with in the alphabet, they can shift the entire alphabet and be able to read the rest of the message.
Creator
An entity primarily responsible for making the resource
Unknown
Source
A related resource from which the described resource is derived
https://crypto.interactive-maths.com/frequency-analysis-breaking-the-code.html
Publisher
An entity responsible for making the resource available
Crypto Corner
Contributor
An entity responsible for making contributions to the resource
Daniel Rodriguez-Clark
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Type
The nature or genre of the resource
Cipher
Frequency Analysis
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/b5880309d123a02be29290053c39826f.png?Expires=1712793600&Signature=Wz4OOxio5d775ElzwiEWAZOAe5qGlnRG6ldLUIE97Zlo0CU6ffJyB%7EaSrDDccbECmB8jfrXsB1WAkUdOXr6HAjsraH-89IxmSTUhczDZ0J5vwmhcpqTsnbQ8lExKllmsjYDWxPaPwqrKdne93U6-HxhPCW%7Epdad1hTTrZOZTHGfzuQIeC1QMERlnIJF3EJaAvRWO3%7EYBLBMGc4GGUiK2Zg4JKL4U%7E38YtRY9mIqiqwrIMrFEHmVEhSOrpqFeQmNdlmMqOWsuamk8wxhTziBhHp4mV%7ESSEqiw2UsOPMaJ4jQ74FBIjdqwuL9H%7EOSUNn7PIsG4lRaC3-YeNw7Hpv7YpQ__&Key-Pair-Id=K6UGZS9ZTDSZM
475241d5c6e467ffa40625a83025571a
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Cipher Tools and Machines
Subject
The topic of the resource
Cipher tools and machines
Description
An account of the resource
Cipher Tools and Machines contains examples of cipher tools and machines seen through out history, particularly within the context of military history. From Ancient Greece to the Cold War, cryptology has played a significant part in the communication and intelligence efforts between opposing forces.
They, along with cryptanalysts, have even been credited with shortening the duration of wars. Without the British intelligence project ULTRA, WWII may have lasted for another two years. However, while many great cryptanalysts hail from Britain, the UK is not exclusive in their cryptographic abilities. The Enigma was invented in Germany, and its stronger rendition, Fialka- in Russia. In comparison to these cryptomachines, the US SIGABA remains unbroken. Those are only a few cipher machines flound in this collection.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cryptomachine
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
SIGABA
Subject
The topic of the resource
SIGABA
Description
An account of the resource
SIGABA was an electro-mechanical cipher machine created in the late 1930s by the US Army and Navy. It was considered an impressive cryptomachine in that time period to the degree that it was used throughout WWII and into the 1950s.
By the end of WWII, over 10,000 machines had been deployed. They were used notably by the US Navy in submarines and battleships. Although the number of machines was less than half the quantity of the Enigma machines used by the Germans, they still kept high-level communications secured. In fact, SIGABA has never been broken.
Creator
An entity primarily responsible for making the resource
US Army and Navy
Source
A related resource from which the described resource is derived
https://www.cryptomuseum.com/crypto/usa/sigaba/index.htm
Publisher
An entity responsible for making the resource available
Cryptomuseum
Date
A point or period of time associated with an event in the lifecycle of the resource
1930s-1950s
Contributor
An entity responsible for making contributions to the resource
Cryptomuseum
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Type
The nature or genre of the resource
Cryptomachine
SIGABA
WWII
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/e37551226242cd87ba71d89ad4905d79.jpg?Expires=1712793600&Signature=LJRU21UB0Ad44AnjIlsJRRZTudy7ZTOEQijJUKTSqIQaZSNR1V9YNavgbaBnueShvzuPxWUt2kGJoAlnKi0HlSd3EFUe0QqyrITFX6YMaQBYSqbyfHR9s8Ku0dnw0W-5hq9lvJyjqoGG-bOdYzZEeJcdkya8bF1pR3IH1B1d-mfjr6VN03p2bAkPbIwV4X8Jvu9upRqXogrL4PIaPMK6DNuIPUDbiU2wFXVLImfcw-w0qcOEPYSTuo8aEOrJBELPzGggyshEIIsc8SY6AgSm%7EBgZLnYNDWhsx2RzdHwmsN-tzJtQrvn11tjpJhI276r6LKCCsFSQcSBQ6Re91mvUxA__&Key-Pair-Id=K6UGZS9ZTDSZM
f337c5b1a2551544a843de33205ab91b
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Classical Ciphers and Application
Subject
The topic of the resource
Classical Ciphers and Application
Description
An account of the resource
Classical Ciphers and Application features analyses of various ciphers- including classical ciphers and the application of ciphers used during WWII. The purpose of the collection is to explain how classical ciphers work and show the patterns among substitution (replacement) and transposition(scramble) ciphers. For further understanding in application, it attempts to provide an analysis of the famous substitution ciphers- the Zimmerman Telegram and WWII Pigeon Cipher.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Paper note
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
WWII Pigeon Cipher
Subject
The topic of the resource
WWII Pigeon Cipher
Description
An account of the resource
The WWII Pigeon Cipher describes a coded message found on the remains of a carrier pigeon discovered in 1982. This message was sent to the curator of the Pigeons at War exhibit at Bletchly Park, however he found it impossible to crack.
In 2012, Canadian researchers at Lakefield Heritage Research believe they have cracked most of the code using a WWI artillery code book. They believe it was from a British paratrooper, Sergeant William Stott, who parachuted into Normandy on a reconnaissance mission and reads:
"Artillery observer at 'K' Sector, Normandy. Requested headquarters supplement report. Panzer attack - blitz. West Artillery Observer Tracking Attack.
"Lt Knows extra guns are here. Know where local dispatch station is. Determined where Jerry's headquarters front posts. Right battery headquarters right here.
Found headquarters infantry right here. Final note, confirming, found Jerry's whereabouts. Go over field notes. Counter measures against Panzers not working.
Jerry's right battery central headquarters here. Artillery observer at 'K' sector Normandy. Mortar, infantry attack panzers.
Hit Jerry's Right or Reserve Battery Here. Already know electrical engineers headquarters. Troops, panzers, batteries, engineers, here. Final note known to headquarters."
Creator
An entity primarily responsible for making the resource
William Stott
Source
A related resource from which the described resource is derived
http://www.thehistoryblog.com/archives/22223
Publisher
An entity responsible for making the resource available
Business Insider
Date
A point or period of time associated with an event in the lifecycle of the resource
WWI
Contributor
An entity responsible for making contributions to the resource
Lakefield Heritage Research
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
English
Type
The nature or genre of the resource
Paper note
WWII
WWII Pigeon Cipher