Write reply to post related to cipher system

Assignment Help Computer Engineering
Reference no: EM131920331

You need to write reply to this post with 2 APA format references.

LD Thomas Jefferson created a cipher system using 26 wheels with the alphabet randomly scattered on each wheel. The wheels were arranged with a specified order. This order is the encryption key to the encryption algorithm. The message to be encrypted is spelled on the wheels by lining up the wheels such that the message is shown.

The ciphertext is any other line not containing the original message. The person decrypting the ciphertext must arrange the wheels according to the key.

As the ciphertext is made on the wheels, the plaintext is lined up somewhere else on the wheels. Viewing the wheels quickly reveals the words of the plaintext. There is an extremely small chance that more than one non-gibberish message will emerge on the wheels during decryption.

The United States Army rediscovered and reinvented the wheel cipher over a hundred years After Jefferson first conceived it. The Army used this system from 1923 to 1942. The US Navy also used this system and it was broken by the Germans, this assisted in creating in "the second happy time" from January 1942 to about August of that year.

In this time, German U-boat captains caused extensive death and destruction. The hunting was good for Capt Reinhard Hardegen who in U-123 sank seven ships totaling 46,744 tons before he ran out of torpedoes and returned to base. It can be argued that war is evil and it can be proven that some good came from the United States Army's use of encryption, cryptography, and codes.

It is clear that the army being able to communicate in encrypted code is a good thing as the loss of secrecy and security in communications can have disastrous effects on human casualties and destruction. It is also reasonably clear that operating in secrecy can cause destruction and loss of life on the side of the enemy.

Encryption used by warring forces is definitely a two-edged sword. That has stunning results good and bad. Failure in cryptography is also known to provide stunning results and if the failure is bad enough can cause battles as well as the war, in general, to be lost.

The Bible speaks much about war in Psalms 144:1(KJV) - "(A Psalm of David.) Blessed [be] the LORD my strength, which teacheth my hands to war, [and] my fingers to fight:" the Bible seems to indicate that wars are a reality.

References Budanovic, N. (2018). Operation Drumbeat - U-Boat Happy Days On The USA East Coast. WAR HISTORY ONLINE.

USS Pampanito - CSP-488. (2018). Maritime website.

Verified Expert

This paper provides a response to the discussion. It is true that secrecy and particularly the use of encryption, cryptography, and codes in communication had been used by the US army for a long time. This high level of secrecy and unique communication among the US army is what gave the army its competitive advantage over their enemies. Therefore, encryption and cryptography is a necessary component in successful armies but needs to be used carefully for positive results.

Reference no: EM131920331

Questions Cloud

Developing a vision that integrates personal beliefs : Leaders believe in creating change out of a spirit of community, building a collaborative vision through dialogue, and developing a vision that integrates.
Calculate the historical growth rate in earnings : Calculate the historical growth rate in earnings. What is Radon's cost of equity, rs?
Assume that any expenditures or revenues : Assume that any expenditures or revenues are realized at the end of their assigned years. Show your work for partial credit.
What is the main purpose of the argument : Please find an argument to analyze. Be creative! Some suggestions are to use a commercial, letter to the editor (or op/ed piece).
Write reply to post related to cipher system : Write reply to post with 2 APA format references - created a cipher system using 26 wheels with the alphabet randomly scattered on each wheel
Would the firm temporarilyshut down in the short run : Would the firm temporarilyshut down in the short run? Would the firm permanently exit in the long run, if market conditions stayed the same?
Equation to forecast broussard additional funds : Use the AFN equation to forecast Broussard's additional funds needed for the coming year.
Discuss how nurses use professional communication skills : Discuss how nurses use professional communication skills to develop a therapeutic relationship with patients.
Prepare the journal entries for record income tax expense : Prepare the journal entries for record income tax expense, deferred income tax, and income tax payable for the year 2013 and 2012

Reviews

Write a Review

Computer Engineering Questions & Answers

  Feature detection and tracking or key frame

The algorithm to be built is either Feature Detection and tracking or Key frame mapping and the options I have explored is to use Kinect SDK+ Microsoft Visual Studio+ C++or C#(WPF)(MRPT Libraries as an option)

  Quantifying the software development

This organization is interested in quantifying its software development. Write down a report proposing suitalbe metrics and propose how these can be collected.

  Relation schema about teaching classes

Suppose you have a relation schema about teaching classes that has the following attributes: Class, Instructor, Time and Room

  Write a macro to perform the subtraction of two numbers

Compare the solutions in Problems in terms of speed and memory requirements.

  What is joptionpane class or the scanner class

What is JOptionPane class or the Scanner class

  Questiongenerate a new java project in eclipse and complete

questiongenerate a new java project in eclipse and complete following requirements based on the threads. some threads

  How can you make your database more hacker-proof

How can you make your database more hacker-proof? How do you ensure the security of an organizations' distributed databases? What specific vulnerabilities affect Web enabled databases?

  Write program that make calculations for arbitrary purchases

Write a program that can make these calculations for arbitrary purchases and sales of shares in a single company.

  Your job is to made a risk-management policy which

you have just been hired as an information security engineer for a large multi-international corporation. unfortunately

  What alternative approaches were considered

What alternative approaches were considered and why were they rejected? What did you learn from doing this project and what would you do differently?

  What is a mutator method and what is an accessor method

What is a mutator method? What is an accessor method? What is an implicit parameter? How does it differ from an explicit parameter?

  Discuss what are the common causes of problem

The focus of the research paper is Data Leakage. How does data leakage occur in an organization. What are the common causes of this problem

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd