1 / 26

Museum Entrance

Welcome to the Museum of [Name of Museum]. Museum Entrance. Alan Turing. The Enigma Cipher Machine. Ultra. Bletchley Park. Cryptography. Curator ’ s Offices. Tara Ingersoll, Lindsey Horan and Margaret Durling. Curator ’ s Office. We love social studies!.

lcalkins
Download Presentation

Museum Entrance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Welcome to the Museum of [Name of Museum] Museum Entrance Alan Turing The Enigma Cipher Machine Ultra Bletchley Park Cryptography Curator’s Offices

  2. Tara Ingersoll, Lindsey Horan and Margaret Durling. Curator’s Office We love social studies! Contact me at [Your linked email address] Return to Entry Note: Virtual museums were first introduced by educators at Keith Valley Middle School in Horsham, Pennsylvania. This template was designed by Dr. Christy Keeler. View the Educational Virtual Museums website for more information on this instructional technique.

  3. Bletchley Park Room 1 Return to Entry

  4. The Enigma Cipher Machine Room 2 Return to Entry

  5. The Ultra Team Room 3 Return to Entry

  6. Cryptography Room 4 Return to Entry

  7. Extra.? Room 5 Brochure Return to Entry

  8. Bletchley Park Building The Bletchley Park mansion is in Bletchley park, Buckinghamshire. It was the main decryption center in WW2. The use of the mansion during ww2 was under great secrecy until recently because of the importance that the mansion had during the war. When the war ended the all the work that was produced at the mansion, it was moved forward and called the Government Communications center or the GCHQ. Linked citation goes here Return to Exhibit

  9. Decrypting Room The intelligence produced at Bletchley park helped shorten the war, if they hadn’t have gotten the information they did then the winner or outcome of the war would have been unknown. The members were part of MI6, and the Government Code and Cypher School or the GC and CS. They didn’t just break enigma, though that was the biggest and most important code that was broken, but they also broke several other lower level Axis codes as well. Linked citation goes here Return to Exhibit

  10. Bletchley Park Map Text goes here. Linked citation goes here Return to Exhibit

  11. Extra info about Bletchley Park As more and more people came to come and help break the code they had to move into wooden huts that were built on the lawn of the park. As a security reason the huts were only known by their numbers. Linked citation goes here Return to Exhibit

  12. Arthur Scherbius This is Arthur Scherbius and he was the creator of the Enigma machine. Scherbius was a German engineer and was granted his PhD title at Technical University in Munich. On February 23 of 1918, Scherbius was co-partnered with the Ritter Company and moved for registration copy write the rotor cipher machine, also known now as the Enigma machine. Soon after he offered the machine to the German Ministry of Foreign Affairs and the Command of Navy. German Reichswehr authorized the machine for general use in its units in the year of 1928. http://enigma.umww.pl/index.php?page=Scherbius Return to Exhibit

  13. Enigma Machine Introduction This is one of the versions of the Enigma machines. Many Enigma machines look like a type writer, but are definitely more complex. The Enigma machine was used to cipher and decipher messages and could not type a message out or send any messages in standard form. The Enigma machine was also used in the Abwehr, the Sicherheitsdienst, the railways, and other government departments. http://www.pbs.org/wgbh/nova/military/how-enigma-works.html Return to Exhibit

  14. How The Enigma Machine Works This will explain how the Enigma machine works. There is first a keyboard with twenty-six letters. This includes just letters and no punctuation or numbers. Behind the keyboard is the “lampboard.” The lampboard is made up of twenty-six small circular windows. Behind the lampboard is the scrambler unit which consists of a fixed wheel at each end and space for three rotating wheels. The letters get scrambled by the reversing wheel that is to the left of the space. This is the basic way to explain the machine. This machine is very complex, but basically the machine scrambles the alphabet to different letters that creates a secret code. http://www.pbs.org/wgbh/nova/military/how-enigma-works.html Return to Exhibit

  15. Enigma Coding Message This is an example of the Enigma coding. There was a lot of messages that used Enigma coding. Most messages were harder to decipher than other messages. The Enigma machine was used during the wars for messages that had to be deciphered in order to find out the mission. This hardware was not known well that this machine was invented by Germans and it soon leaked to the French. http://www.bbc.co.uk/history/worldwars/wwtwo/enigma_01.shtml Return to Exhibit

  16. How it all Started Most Ultra intelligence was derived from reading radioed enemy messages that had been encrypted with various cipher machines. This was complimented by material derived from radio communications using other methods, such as radio traffic signals and direction finding. In the early phases of the war, the Germans could transmit most of their messages using land lines and so had no need to use the radio. This meant that those Bletchley Park had some time to build up experience of collecting and starting to decrypt messages and the various radio networks. Initially, German Enigma Messages were the main source, with those of the German air force predominating, as they used radio more, and their operators were particularly ill-disciplined. Linked citation goes here Return to Exhibit

  17. Security Much of the German cipher traffic was encrypted on the Enigma machine. Used properly, the German military Enigma would have been virtually unbreakable; in practice shortcomings in operation allowed it to be broken. The term “Ultra” has often been used almost synonymously with “Enigma Decrypts”. However Ultra also encompassed decrypts of the German Lorenz SZ 40/42 machines that were used by the German high Command , and the Hagelin machine and other Italian and Japanese ciphers and codes such as PURPLE and Jn-25. Linked citation goes here Return to Exhibit

  18. Why The Name Ultra? The name arose because the intelligence thus obtained was considered more important than that designated by the highest British Security classification then used and was so regarded as being ultra secret. Several other cryptonyms had been used for such intelligence. British intelligence first designated it as Boniface-presumably to imply that it was the result of human intelligence. Linked citation goes here Return to Exhibit

  19. Ultra Ultra was the designation adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the government code and cipher school at Bletchley Park. Ultra eventually became the standard designation among the western allies for such intelligence. Linked citation goes here Return to Exhibit

  20. All About Writing Code Computer programming is a process that leads from an original formulation of a computing problem to executable computer programs. Programming involves activities such as analysis, developing understanding, generating algorithms, verification of requirements of algorithms including their correctness and resources consumption, and implementation (commonly referred to as coding) of algorithms in a target programming language. Source code is written in one or more programming languages The purpose of programming is to find a sequence of instructions that will automate performing a specific task or solving a given problem. The process of programming thus often requires expertise in many different subjects, including knowledge of the application domain, specialized algorithms and formal logic. Linked citation goes here Return to Exhibit

  21. Security With Cryptography. As the internet and other forms of electronic communication become more prevalent, electronic security is becoming increasingly more important. Cryptography is used to protect e-mail messages, credit card information and other important data. Cryptography systems can be broadly classified into sematic-key system that used a single key that both the sender and recipient have, and public-key systems that use two keys, a public known to everyone and approval key that only the recipient of messages has. Linked citation goes here Return to Exhibit

  22. How Cryptography is Ciphered/ Deciphered The art of protecting information by transforming it into an unreadable format, called cipher text. Only those who posses a secret key can decipher the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis also called codebreaking, although modern cryptography techniques are virtually unbreakable. Linked citation goes here Return to Exhibit

  23. Cryptography Cryptography, Practice of enciphering and deciphering of messages in secret code in order to render them unintelligible to all but the intended receiver. Cryptography may also refer to the art of cryptanalysis, by which cryptography codes are broken. Collectively the science of secure and secret communications involving both cryptography and cryptanalysis, is known as cryptology. The possibilities of cryptography are today applied to the encryption of art, television and computer network communications. In particular, the secure exchange of computer data is of great importance to banking, government and commercial communications. Linked citation goes here Return to Exhibit

  24. Guiding Questions Linked citation goes here Return to Exhibit

  25. Brochure Linked citation goes here Return to Exhibit

  26. Alan Turing During World War 2, Turing was a leading participant in wartime code-breaking particularly that of German ciphers. He worked at Bletchley Park which was disguised as a radio factory, wartime station, where he made five advances in the field of cryptanalysis, including specifying the bomb, an electromechanical device used to help decipher German Enigma encrypted signals. He named this machine Christopher, after his friend who died when he was young. Today we call them computers. Turing later wrote two papers about mathematical approaches to code-breaking. Linked citation goes here Return to Exhibit

More Related