Write reply to post related to cipher system

Assignment Help Computer Engineering
Reference no: EM131920331

You need to write reply to this post with 2 APA format references.

LD Thomas Jefferson created a cipher system using 26 wheels with the alphabet randomly scattered on each wheel. The wheels were arranged with a specified order. This order is the encryption key to the encryption algorithm. The message to be encrypted is spelled on the wheels by lining up the wheels such that the message is shown.

The ciphertext is any other line not containing the original message. The person decrypting the ciphertext must arrange the wheels according to the key.

As the ciphertext is made on the wheels, the plaintext is lined up somewhere else on the wheels. Viewing the wheels quickly reveals the words of the plaintext. There is an extremely small chance that more than one non-gibberish message will emerge on the wheels during decryption.

The United States Army rediscovered and reinvented the wheel cipher over a hundred years After Jefferson first conceived it. The Army used this system from 1923 to 1942. The US Navy also used this system and it was broken by the Germans, this assisted in creating in "the second happy time" from January 1942 to about August of that year.

In this time, German U-boat captains caused extensive death and destruction. The hunting was good for Capt Reinhard Hardegen who in U-123 sank seven ships totaling 46,744 tons before he ran out of torpedoes and returned to base. It can be argued that war is evil and it can be proven that some good came from the United States Army's use of encryption, cryptography, and codes.

It is clear that the army being able to communicate in encrypted code is a good thing as the loss of secrecy and security in communications can have disastrous effects on human casualties and destruction. It is also reasonably clear that operating in secrecy can cause destruction and loss of life on the side of the enemy.

Encryption used by warring forces is definitely a two-edged sword. That has stunning results good and bad. Failure in cryptography is also known to provide stunning results and if the failure is bad enough can cause battles as well as the war, in general, to be lost.

The Bible speaks much about war in Psalms 144:1(KJV) - "(A Psalm of David.) Blessed [be] the LORD my strength, which teacheth my hands to war, [and] my fingers to fight:" the Bible seems to indicate that wars are a reality.

References Budanovic, N. (2018). Operation Drumbeat - U-Boat Happy Days On The USA East Coast. WAR HISTORY ONLINE.

USS Pampanito - CSP-488. (2018). Maritime website.

Verified Expert

This paper provides a response to the discussion. It is true that secrecy and particularly the use of encryption, cryptography, and codes in communication had been used by the US army for a long time. This high level of secrecy and unique communication among the US army is what gave the army its competitive advantage over their enemies. Therefore, encryption and cryptography is a necessary component in successful armies but needs to be used carefully for positive results.

Reference no: EM131920331

Questions Cloud

Developing a vision that integrates personal beliefs : Leaders believe in creating change out of a spirit of community, building a collaborative vision through dialogue, and developing a vision that integrates.
Calculate the historical growth rate in earnings : Calculate the historical growth rate in earnings. What is Radon's cost of equity, rs?
Assume that any expenditures or revenues : Assume that any expenditures or revenues are realized at the end of their assigned years. Show your work for partial credit.
What is the main purpose of the argument : Please find an argument to analyze. Be creative! Some suggestions are to use a commercial, letter to the editor (or op/ed piece).
Write reply to post related to cipher system : Write reply to post with 2 APA format references - created a cipher system using 26 wheels with the alphabet randomly scattered on each wheel
Would the firm temporarilyshut down in the short run : Would the firm temporarilyshut down in the short run? Would the firm permanently exit in the long run, if market conditions stayed the same?
Equation to forecast broussard additional funds : Use the AFN equation to forecast Broussard's additional funds needed for the coming year.
Discuss how nurses use professional communication skills : Discuss how nurses use professional communication skills to develop a therapeutic relationship with patients.
Prepare the journal entries for record income tax expense : Prepare the journal entries for record income tax expense, deferred income tax, and income tax payable for the year 2013 and 2012

Reviews

Write a Review

Computer Engineering Questions & Answers

  What are requirements specifications for a program

What are requirements specifications for a program? Name at least six phases of the software life cycle and state what each is.

  Features of good program design

Provide one (1) example of a prompt that is unclear. Explain why the prompt is unclear, and suggest the changes you would make to the prompt to make it clearer. Provide a rationale for your response

  Select what technologies you feel would be appropriate

select what technologies you feel would be appropriate (cost-wise and maintenance-wise) for a site's implementation.

  Problem 0choose the correct answer for the following

problem 0choose the correct answer for the following multiple-choice questions0.0 you are offered old homework

  How ip addressing work with dns servers to process a request

Draw a map, labeling every aspect, which represents how IP addressing works with DNS servers to process a request for a web page from your computer that returns the web page. Assume that it takes a few DNS servers to find the IP address.

  Write down a program that prompts the user to input

Write the program that prompts the user to input the x-y coordinate of a point in a Cartesian plane. The program should then output a message indicating whether the point is the orgin, is located on the x (or y) axis, or appears in a particular qu..

  Producing the random permutation

Write down a program which generates ten random permutations of numbers 1 to 10. To produce a random permutation, you require filling the vector with numbers 1 to 10 so that no two entries of vector have the same contents.

  What is a data bus

Give short answers to the following: (a.g] What is a data bus? Why is an address decoder used in I/O interfaces?

  Which security goal was violated by the it director

Which security goal was violated by the IT Director? What plan would you suggest to Sally to meet the above security controls requirements? Justify your answer

  Derive excitation tables for given circuit

For the following circuit, Complete the timing diagram starting with Y1Y2 = 00 (at time = 0). Derive excitation tables.

  Discussing the different stakeholders and clients interest

discussing the different stakeholders and clients' interests and any potential political conflicts in implementing your information system project

  The organization has asked for a new web-based customer

this week you will submit a draft of your key assignment template. be sure to add the new material to this document

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd