SlideShare una empresa de Scribd logo
1 de 14
Military Code Through
       The Ages
      By: Mike Dobiecki
Navajo Code Talkers

These were field cryptographers breaking out a whole new
code.
Before the code-talkers, easy, well-known algorithms were all
that were available.
Right before the Navajo Code-Talkers, A few Comanche
Indians were used for code-talkers.
Why did they use the Navajo Language?
Why did they use the Navajo Language?


 Was Philip Johnston the real mastermind?
Why did they use the Navajo Language?


 Was Philip Johnston the real mastermind?


         Why was he credited?
1st Age of NSA Encrption

After the code-talkers, in 1952, the NSA was created.
The first generation of NSA Encryption was
electromechanical.
These were modeled after the very crude models worked on
in the WWII.
2nd Age of NSA Encryption

These were made in the 1970's.
They were all electronically designed and based on vacuuim
tubes.
They used morse code and an alternating encryption
algorithm.
3rd Age of NSA Encryption

Made in the 1980’s.
Integrated circuits, smaller units.
Easier maintenance, stronger algorithms.
4th Age of NSA Encryption	

Made in the 1990’s.
Electronic key distribution. Commercial packaging.
Even less maintenance.
5th Age of NSA Encryption

Modern encryption.
Computer networking, largely machine based.
Practically runs itself.
Why?

In our advancing society, everything is relying less on
people, including encryption, it’s just the times.
No system is better than the other, they accomplish the same
thing.
Why?


Trust issues.
Less people, less need for trust.
Works Cited
"Melville Klein, "Securing Record Communications: The TSEC/KW-26", 2003,

    NSA brochure, p. 4.

Thomas R. Johnson (2009-12-18). ""American Cryptology during the Cold War,

   1945-1989.Book III: Retrenchment and Reform, 1972-1980, page

   232"" (html). NSA, DOCID 3417193 (file released on 2009-12-18, hosted at

   cryptome.org). http://cryptome.org/0001/nsa-meyer.htm. Retrieved

   2010-01-03.

Official Site of the Navajo Code Talkers. Web. 02 Feb. 2010. <http://

   www.navajocodetalkers.org>.

Más contenido relacionado

Similar a Elp1 26

The History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfThe History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfonline Marketing
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - PaperBernhard Hofer
 
Final Paper for Senior Seminar
Final Paper for Senior SeminarFinal Paper for Senior Seminar
Final Paper for Senior SeminarKasner Margaret
 
Introduction to the cryptography behind blockchain (from roots to quantum cry...
Introduction to the cryptography behind blockchain (from roots to quantum cry...Introduction to the cryptography behind blockchain (from roots to quantum cry...
Introduction to the cryptography behind blockchain (from roots to quantum cry...Marcelo Sávio
 
Phreaks, hackers & trolls
Phreaks, hackers & trollsPhreaks, hackers & trolls
Phreaks, hackers & trollsEJThompson
 
DIKULT103 Digital Genres: Intro lecture
DIKULT103 Digital Genres: Intro lectureDIKULT103 Digital Genres: Intro lecture
DIKULT103 Digital Genres: Intro lectureJill Walker Rettberg
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYijcisjournal
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technologyTricon Infotech
 
Computer generations
Computer generationsComputer generations
Computer generationsSai Ram
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growthrahchauh
 
Form4 cd1
Form4 cd1Form4 cd1
Form4 cd1smktsj2
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growthankurbhala
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growthmister aabid
 
2002 0918 Internet History And Growth
2002 0918 Internet History And Growth2002 0918 Internet History And Growth
2002 0918 Internet History And Growthvenkatesh y
 
Internet History And Growth
Internet History And GrowthInternet History And Growth
Internet History And Growthmayday1429
 

Similar a Elp1 26 (20)

The History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfThe History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdf
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
 
Final Paper for Senior Seminar
Final Paper for Senior SeminarFinal Paper for Senior Seminar
Final Paper for Senior Seminar
 
Generations of
Generations ofGenerations of
Generations of
 
Introduction to the cryptography behind blockchain (from roots to quantum cry...
Introduction to the cryptography behind blockchain (from roots to quantum cry...Introduction to the cryptography behind blockchain (from roots to quantum cry...
Introduction to the cryptography behind blockchain (from roots to quantum cry...
 
Phreaks, hackers & trolls
Phreaks, hackers & trollsPhreaks, hackers & trolls
Phreaks, hackers & trolls
 
DIKULT103 Digital Genres: Intro lecture
DIKULT103 Digital Genres: Intro lectureDIKULT103 Digital Genres: Intro lecture
DIKULT103 Digital Genres: Intro lecture
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technology
 
Internet
InternetInternet
Internet
 
ENCRYPTION
ENCRYPTIONENCRYPTION
ENCRYPTION
 
Computer generations
Computer generationsComputer generations
Computer generations
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth
 
Form4 cd1
Form4 cd1Form4 cd1
Form4 cd1
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth
 
2002 0918 Internet History And Growth
2002 0918 Internet History And Growth2002 0918 Internet History And Growth
2002 0918 Internet History And Growth
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth
 
2002 0918 Internet History And Growth
2002 0918 Internet History And Growth2002 0918 Internet History And Growth
2002 0918 Internet History And Growth
 
Internet History And Growth
Internet History And GrowthInternet History And Growth
Internet History And Growth
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Elp1 26

  • 1. Military Code Through The Ages By: Mike Dobiecki
  • 2. Navajo Code Talkers These were field cryptographers breaking out a whole new code. Before the code-talkers, easy, well-known algorithms were all that were available. Right before the Navajo Code-Talkers, A few Comanche Indians were used for code-talkers.
  • 3.
  • 4. Why did they use the Navajo Language?
  • 5. Why did they use the Navajo Language? Was Philip Johnston the real mastermind?
  • 6. Why did they use the Navajo Language? Was Philip Johnston the real mastermind? Why was he credited?
  • 7. 1st Age of NSA Encrption After the code-talkers, in 1952, the NSA was created. The first generation of NSA Encryption was electromechanical. These were modeled after the very crude models worked on in the WWII.
  • 8. 2nd Age of NSA Encryption These were made in the 1970's. They were all electronically designed and based on vacuuim tubes. They used morse code and an alternating encryption algorithm.
  • 9. 3rd Age of NSA Encryption Made in the 1980’s. Integrated circuits, smaller units. Easier maintenance, stronger algorithms.
  • 10. 4th Age of NSA Encryption Made in the 1990’s. Electronic key distribution. Commercial packaging. Even less maintenance.
  • 11. 5th Age of NSA Encryption Modern encryption. Computer networking, largely machine based. Practically runs itself.
  • 12. Why? In our advancing society, everything is relying less on people, including encryption, it’s just the times. No system is better than the other, they accomplish the same thing.
  • 13. Why? Trust issues. Less people, less need for trust.
  • 14. Works Cited "Melville Klein, "Securing Record Communications: The TSEC/KW-26", 2003, NSA brochure, p. 4. Thomas R. Johnson (2009-12-18). ""American Cryptology during the Cold War, 1945-1989.Book III: Retrenchment and Reform, 1972-1980, page 232"" (html). NSA, DOCID 3417193 (file released on 2009-12-18, hosted at cryptome.org). http://cryptome.org/0001/nsa-meyer.htm. Retrieved 2010-01-03. Official Site of the Navajo Code Talkers. Web. 02 Feb. 2010. <http:// www.navajocodetalkers.org>.

Notas del editor