Elp1 26

458 views
400 views

Published on

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
458
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide













  • Elp1 26

    1. 1. Military Code Through The Ages By: Mike Dobiecki
    2. 2. Navajo Code Talkers These were field cryptographers breaking out a whole new code. Before the code-talkers, easy, well-known algorithms were all that were available. Right before the Navajo Code-Talkers, A few Comanche Indians were used for code-talkers.
    3. 3. Why did they use the Navajo Language?
    4. 4. Why did they use the Navajo Language? Was Philip Johnston the real mastermind?
    5. 5. Why did they use the Navajo Language? Was Philip Johnston the real mastermind? Why was he credited?
    6. 6. 1st Age of NSA Encrption After the code-talkers, in 1952, the NSA was created. The first generation of NSA Encryption was electromechanical. These were modeled after the very crude models worked on in the WWII.
    7. 7. 2nd Age of NSA Encryption These were made in the 1970's. They were all electronically designed and based on vacuuim tubes. They used morse code and an alternating encryption algorithm.
    8. 8. 3rd Age of NSA Encryption Made in the 1980’s. Integrated circuits, smaller units. Easier maintenance, stronger algorithms.
    9. 9. 4th Age of NSA Encryption Made in the 1990’s. Electronic key distribution. Commercial packaging. Even less maintenance.
    10. 10. 5th Age of NSA Encryption Modern encryption. Computer networking, largely machine based. Practically runs itself.
    11. 11. Why? In our advancing society, everything is relying less on people, including encryption, it’s just the times. No system is better than the other, they accomplish the same thing.
    12. 12. Why? Trust issues. Less people, less need for trust.
    13. 13. Works Cited "Melville Klein, "Securing Record Communications: The TSEC/KW-26", 2003, NSA brochure, p. 4. Thomas R. Johnson (2009-12-18). ""American Cryptology during the Cold War, 1945-1989.Book III: Retrenchment and Reform, 1972-1980, page 232"" (html). NSA, DOCID 3417193 (file released on 2009-12-18, hosted at cryptome.org). http://cryptome.org/0001/nsa-meyer.htm. Retrieved 2010-01-03. Official Site of the Navajo Code Talkers. Web. 02 Feb. 2010. <http:// www.navajocodetalkers.org>.

    ×