160 likes | 427 Views
Intelligence Training I. Between World War I and World War II, intelligence training schools were founded in the United States. Signal Intelligence School (1929) Signal Corps School (1933). Intelligence Training II.
E N D
Intelligence Training I Between World War I and World War II, intelligence training schools were founded in the United States. • Signal Intelligence School (1929) • Signal Corps School (1933)
Intelligence Training II Then, with the outbreak of World War II, there was a corresponding boom in U. S. intelligence training. • Military Intelligence Service Language School (1941) • Military Intelligence Training Center (1942) • Vint Hill Farms School (1942)
Cryptologist: Edward Hebern • U.S. Navy rejected his cipher machine • His machine was then taken and used by the Japanese during WWII In World War II: In World War I: • Developed the Mark II (SIGABA) • Most secure U.S. cipher system during the WWII conflict
Worked for the U.S. Navy Cryptologic Office, 1918 - 1959 • One of three key U.S. cryptanalysts during World War I • 1930, solved Japanese “Grand Maneuvers” system • Later, broke Japanese “Blue Book” • Along with Mrs. Friedman, paved the way for scores of women to join them in the cryptological field during W. War II Cryptologist: Agnes Driscoll
President FDR authorized women to take noncombatant military roles • Thousands of women volunteered • Freed men to fill fighting positions • The women cryptologists: Cryptologists: U.S. Women in WWII • Dorothy Blum • Barbara Clark • Wilma Davis • Juanita Moody • Katharine Swift • Juliana Mickwitz • Velva Klaessy • Marie Meyer • Agnes Meyer Driscoll • Genevieve Grotjan Feinstein • Mary “Polly” Budenbach • Mary Louise Prather
Cryptologists: Polish Cipher Bureau • In late 1932, Rejewski applied group theory to the Enigma machine ciphers; later solved a crucial structure question • In 1939, Bureau leaders revealed their latest achievements to France & England • Provided details “in the nick of time” for the British Ultra operation • Many members died and / or were captured, but none gave up their secrets
Cryptologist: Alan Turing • He was a young British mathematician • He invented the “Turing Bombe” • This machine was used to crack Enigma codes • It also laid the foundation for modern computing • Without it, computers would not have developed until sometime later
Headquarters of the British Military Intelligence Government Code and Cipher School during World War II • Employed 12,000 code breakers & staff • Recruited heavily all college disciplines, especially at Oxford and at Cambridge • Produced impressive results from limited resources • Significantly aided the Allied war effort and saved thousands of lives Cryptologists: Bletchley Park
Enigma (Germany) • Invented by Arthur Scherbius in 1918 • Used for commercial use in banks • German Navy adapted it for military Composed of: • Motors, keyboard, and electrical wires • Cipher was a series of substitutions • Substitutions by electrical connections
Combination of ciphers • ex: Substitution cipher • Caesar cipher • Substitution cipher • 26 x 26 = 676 possible alphabets Enigma Complexity • Willi Korn added a reflector 26³=17,576 • A swap of letters of the output in pairs • Then the ciphertext was fed back through the rotors, yet again
Enigma Weaknesses • No letter could be enciphered as itself • ex: A = A • Wiring was seldom changed • Use of predictable introductions • ex: “To General Puttkammer ” • Reflector made Enigma reciprocal • ex: if A = Q, Q=A • Limitation to three rotors
Cracking Enigma • Polish made some advances: 1930s • A British "Y Station" intercepted a repeat transmission that used the same settings!! • Alan Turing built the Turing Bombe • Computer-like machine • Could crack an Enigma code in about 15 hours
Purple Code (Japan) • Similar to the Enigma • Cracked by U. S. before Pearl Harbor • U. S. then built their own machines Two key cryptologists for breaking Purple: • William Friedman • Genevieve Grotjan Feinstein
Navajo Code Talkers • Philip Johnston in 1942 • Idea to use Navajo native Americans for secure communications • In a combat simulation, Navajos could transmit, and decode a three-line English message in 20 s • Machines took 30 minutes • Marine Corps recruits 200 Navajos
Navajo Code Advantages • Little known Medium (Navajo) • Most letters had more than one Navajo word to represent them • 450 military terms had direct word representation • ex: “besh- lo” (iron fish) = “submarine” • Code was never cracked by Japan
Looking Forward • WWII was a turning point in the advancement of cryptology – it was the beginning of the modernization of the field. • The machines made in WWII revolutionize cryptology as well as laid the foundation for the modern computer.