Write reply to post related to cipher system

Assignment Help Computer Engineering
Reference no: EM131920331

You need to write reply to this post with 2 APA format references.

LD Thomas Jefferson created a cipher system using 26 wheels with the alphabet randomly scattered on each wheel. The wheels were arranged with a specified order. This order is the encryption key to the encryption algorithm. The message to be encrypted is spelled on the wheels by lining up the wheels such that the message is shown.

The ciphertext is any other line not containing the original message. The person decrypting the ciphertext must arrange the wheels according to the key.

As the ciphertext is made on the wheels, the plaintext is lined up somewhere else on the wheels. Viewing the wheels quickly reveals the words of the plaintext. There is an extremely small chance that more than one non-gibberish message will emerge on the wheels during decryption.

The United States Army rediscovered and reinvented the wheel cipher over a hundred years After Jefferson first conceived it. The Army used this system from 1923 to 1942. The US Navy also used this system and it was broken by the Germans, this assisted in creating in "the second happy time" from January 1942 to about August of that year.

In this time, German U-boat captains caused extensive death and destruction. The hunting was good for Capt Reinhard Hardegen who in U-123 sank seven ships totaling 46,744 tons before he ran out of torpedoes and returned to base. It can be argued that war is evil and it can be proven that some good came from the United States Army's use of encryption, cryptography, and codes.

It is clear that the army being able to communicate in encrypted code is a good thing as the loss of secrecy and security in communications can have disastrous effects on human casualties and destruction. It is also reasonably clear that operating in secrecy can cause destruction and loss of life on the side of the enemy.

Encryption used by warring forces is definitely a two-edged sword. That has stunning results good and bad. Failure in cryptography is also known to provide stunning results and if the failure is bad enough can cause battles as well as the war, in general, to be lost.

The Bible speaks much about war in Psalms 144:1(KJV) - "(A Psalm of David.) Blessed [be] the LORD my strength, which teacheth my hands to war, [and] my fingers to fight:" the Bible seems to indicate that wars are a reality.

References Budanovic, N. (2018). Operation Drumbeat - U-Boat Happy Days On The USA East Coast. WAR HISTORY ONLINE.

USS Pampanito - CSP-488. (2018). Maritime website.

Verified Expert

This paper provides a response to the discussion. It is true that secrecy and particularly the use of encryption, cryptography, and codes in communication had been used by the US army for a long time. This high level of secrecy and unique communication among the US army is what gave the army its competitive advantage over their enemies. Therefore, encryption and cryptography is a necessary component in successful armies but needs to be used carefully for positive results.

Reference no: EM131920331

Questions Cloud

Developing a vision that integrates personal beliefs : Leaders believe in creating change out of a spirit of community, building a collaborative vision through dialogue, and developing a vision that integrates.
Calculate the historical growth rate in earnings : Calculate the historical growth rate in earnings. What is Radon's cost of equity, rs?
Assume that any expenditures or revenues : Assume that any expenditures or revenues are realized at the end of their assigned years. Show your work for partial credit.
What is the main purpose of the argument : Please find an argument to analyze. Be creative! Some suggestions are to use a commercial, letter to the editor (or op/ed piece).
Write reply to post related to cipher system : Write reply to post with 2 APA format references - created a cipher system using 26 wheels with the alphabet randomly scattered on each wheel
Would the firm temporarilyshut down in the short run : Would the firm temporarilyshut down in the short run? Would the firm permanently exit in the long run, if market conditions stayed the same?
Equation to forecast broussard additional funds : Use the AFN equation to forecast Broussard's additional funds needed for the coming year.
Discuss how nurses use professional communication skills : Discuss how nurses use professional communication skills to develop a therapeutic relationship with patients.
Prepare the journal entries for record income tax expense : Prepare the journal entries for record income tax expense, deferred income tax, and income tax payable for the year 2013 and 2012

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd