London Winter Program 2004/2005

December 26, 2004January 8, 2005

Cryptology: The Evolution of Secrecy

 

Here is a blurb about the 2004/2005 course.

Here is a bit more detail about the 2004/2005 course.

For more information Christensen@nku.edu

 

 

Below are pictures and course materials from the 2002/2003 course.  While I suspect that there will be changes in the course for 2004/2005, the materials reflect the nature and level of the course.


 After the pictures of the London trip are some pictures from the National Cryptological Museum at Fort Meade.
 

Pictures from the 2002/2003 London trip


Three pictures of the Admiralty:    The Admiralty    Admiralty  Admiralty   Recall that Room 40 of the Admiralty was were the British cryptologists worked until their move to Bletchley Park.  Notice the antenna on the roof.

Pictures of our tour of Bletchley Park:   Bletchley station   Bletchley stationBletchley station  Bletchley station The entrance to Bletchley Park  The Mansion  The Mansion   Station X (the wireless station) is located in the turret.   The Mansion ; the parking lot was the site of Hut 2.   Churchill's window    Alan Turing's hideaway and apartment 3 where the first break into Enigma was made. Hut 4 (Naval intelligence)   Hut 1 Huts 1 and 6 (Army and Air Force Enigma)  Huts 1 and 6 Huts 1 and 6   Hut 6 (Army and Air Force Enigma)   The entrance to Hut 3 (Army and Air Force intelligence)   Hut 3   Huts 3 (Army and Air Force intelligence) and Hut 6 (Army and Air Force Enigma)   HutsA block   The grounds at Bletchley Park   TourTour  Tour Tour  The bombe replica in Hut 11  Bombe Bombe  Bombe One drum of a (replica) bombe   Our class meeting in the mansion   Class Class  On the train from Bletchley to London  TrainTrain  Train

Pictures of our tour of the Defence Intelligence Museum at Chicksands.  Chicksands was a Y-Station (an intecept station) during World War II and an intecept station for the United States Army Security Agency after World War II.   Y-station   Y-station Y-station   ASA intercept station   ASA intercept station   ASA antenna array   Antenna array Enigma  Enigma Enigma  Enigma with open cover   Open enigma Open enigma   A view of the plugboard
 
 

Pictures from the National Cryptological Museum at Fort Meade (which was not part of the London trip).


The Museum's Enigma display:  Enigma display    Enigma display   Enigma display    Enigma display    Enigma display   Enigma display    Enigma display    Enigma display   A commercial Enigma   A Japanese Enigma

An Engima machine:    Closed Enigma    Closed Enigma   Closed Enigma    Open Enigma     The Enigma plugboard

Engima rotors:   An Enigma rotor   An Enigma rotor    The interior of an Enigma rotor    A box of rotors    Three rotors ready to be installed

The Museum's USN bombe:   Bombe   Bombe    Bombe   Bombe    Bombe   Bombe

The German Sturgeon machine:   Sturgeon   Sturgeon

The Japanese Jade:   Jade   Jade

piece of the Japanese PURPLE machine   and the  PURPLE analog   constructed by US codebreakers.

SIGSALY protected US communications.  In particular, it protected communications between Roosevelt and Churchill.    The SIGSALY display     The SIGSALY display    The SIGSALY turntables

The  Korean War display

The US-Russian  Hotline

M-209

 M-94

A Kryha device:   Kryha   Kryha    Kryha

Various cipher devices from the Museum's display:   Cipher devices    Cipher devices   Cipher devices    Cipher devices    Cipher devices   Cipher devices
 

Here is a copy of the syllabus for the 2002/2003 course in London:
 Syllabus
 

Here is a copy of the day-by-day schedule for the 2002/2003 class in London

Day-by-day schedule for 2002/2003 class

 

Here are some notes that we were used for the 2002/2003 London course.
 Introduction to cryptology
 Frequencies and patterns in English
 Random alphabet ciphers
 Keyword ciphers
 Caesar ciphers
 Cryptography of the Vigenere cipher
 Cryptanalysis of the Vigenere cipher
 One-time pads
 Transposition ciphers
 Playfair cipher
 ADFGVX cipher
 The Enigma machine
 

This was optional material:
 The Friedman attack
 Timeline of communication changes
 Bibliography

For students who did the course for upper-division credit, this was the assignment in lieu of the paper on privacy:

Read  Multiplication modulo n

Read  Multiplicative ciphers

Read  the Hill cipher  and do exercises 2, 3, and 9 and send them to me.

Read An introduction to public-key cryptology

Read Knapsack cryptosystem and do exercises 1 and 2 and send them to me.

Read RSA cryptosystem and do exercises 2, 3, and 5 and send them to me.
 

This was the final project:

1.  This   message   has been enciphered with a Vigenere cipher.  The Friedman test results provide evidence of that: the index of coincidence is 0.0408 (which suggests that the cipher is polyalphabetic) and the estimated length of the keyword is 9.4855.  Here are the  frequencies  of individual letters and of the  trigraphs .  Cryptanalyze the message.  Try to determine the keyword.  You need not decipher the entire message, but do at least one fourth of it.

2.  This   message   has been enciphered with a (full rectangle) transposition cipher.  The Friedman test results are: the index of coincidence is 0.0749 (which suggest that the cipher is monoalphabetic) and the estimated length of the keyword (which is useless information for this exercise) is 0.7327.  Here are the  frequencies  of individual letters (notice that these frequencies are similar to what we expect for plaintext) and of the  trigraphs .  Cryptanalyze the message.

3.  Here is an enciphered  message .  The Friedman test results are: the index of coincidence is 0.0671 and the estimated length of the keyword is 0.9283.  Here are the frequencies  of individual letters and of the  trigraphs .  What method of encipherment do you think was used?  Explain why you think that was the method that was used.  Try to cryptanalyze the message.  Explain how you attacked the ciphertext.

4.  Here is an enciphered   message  .  The Friedman test results are: the index of coincidence is 0.0649 and the estimated length of the keyword is 1.0025.  Here are the frequencies  of individual letters and of the  trigraphs .  What method of encipherment do you think was used?  Explain why you think that was the method that was used.  Try to cryptanalyze the message.  Explain how you attacked the ciphertext.

5.  Here is an enciphered   message .  The Friedman test results are: the index of coincidence is 0.0496 and the estimated length of the keyword is 2.3177.  Here are the frequencies   of individual letters and of the  trigraphs .  What method of encipherment do you think was used?  Explain why you think that was the method that was used.  Try to cryptanalyze the message.  Explain how you attacked the ciphertext.

6.  Here is an enciphered   message .  The Friedman test results are: the index of coincidence is 0.0425 and the estimated length of the keyword is 5.9105.  Here are the frequencies  of individual letters and of the  trigraphs .  What method of encipherment do you think was used?  Explain why you think that was the method that was used.  Try to cryptanalyze the message.  Explain how you attacked the ciphertext.