SlideShare una empresa de Scribd logo
1 de 14
Military Code Through
       The Ages
      By: Mike Dobiecki
Navajo Code Talkers

These were field cryptographers breaking out a whole new
code.
Before the code-talkers, easy, well-known algorithms were all
that were available.
Right before the Navajo Code-Talkers, A few Comanche
Indians were used for code-talkers.
Why did they use the Navajo Language?
Why did they use the Navajo Language?


 Was Philip Johnston the real mastermind?
Why did they use the Navajo Language?


 Was Philip Johnston the real mastermind?


         Why was he credited?
1st Age of NSA Encrption

After the code-talkers, in 1952, the NSA was created.
The first generation of NSA Encryption was
electromechanical.
These were modeled after the very crude models worked on
in the WWII.
2nd Age of NSA Encryption

These were made in the 1970's.
They were all electronically designed and based on vacuuim
tubes.
They used morse code and an alternating encryption
algorithm.
3rd Age of NSA Encryption

Made in the 1980’s.
Integrated circuits, smaller units.
Easier maintenance, stronger algorithms.
4th Age of NSA Encryption	

Made in the 1990’s.
Electronic key distribution. Commercial packaging.
Even less maintenance.
5th Age of NSA Encryption

Modern encryption.
Computer networking, largely machine based.
Practically runs itself.
Why?

In our advancing society, everything is relying less on
people, including encryption, it’s just the times.
No system is better than the other, they accomplish the same
thing.
Why?


Trust issues.
Less people, less need for trust.
Works Cited
"Melville Klein, "Securing Record Communications: The TSEC/KW-26", 2003,

    NSA brochure, p. 4.

Thomas R. Johnson (2009-12-18). ""American Cryptology during the Cold War,

   1945-1989.Book III: Retrenchment and Reform, 1972-1980, page

   232"" (html). NSA, DOCID 3417193 (file released on 2009-12-18, hosted at

   cryptome.org). http://cryptome.org/0001/nsa-meyer.htm. Retrieved

   2010-01-03.

Official Site of the Navajo Code Talkers. Web. 02 Feb. 2010. <http://

   www.navajocodetalkers.org>.

Más contenido relacionado

Similar a Elp1 26

Final Paper for Senior Seminar
Final Paper for Senior SeminarFinal Paper for Senior Seminar
Final Paper for Senior Seminar
Kasner Margaret
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
ijcisjournal
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth
rahchauh
 
Form4 cd1
Form4 cd1Form4 cd1
Form4 cd1
smktsj2
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth
ankurbhala
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth
mister aabid
 
2002 0918 Internet History And Growth
2002 0918 Internet History And Growth2002 0918 Internet History And Growth
2002 0918 Internet History And Growth
venkatesh y
 
Internet History And Growth
Internet History And GrowthInternet History And Growth
Internet History And Growth
mayday1429
 

Similar a Elp1 26 (20)

The History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfThe History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdf
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
 
Final Paper for Senior Seminar
Final Paper for Senior SeminarFinal Paper for Senior Seminar
Final Paper for Senior Seminar
 
Generations of
Generations ofGenerations of
Generations of
 
Introduction to the cryptography behind blockchain (from roots to quantum cry...
Introduction to the cryptography behind blockchain (from roots to quantum cry...Introduction to the cryptography behind blockchain (from roots to quantum cry...
Introduction to the cryptography behind blockchain (from roots to quantum cry...
 
Phreaks, hackers & trolls
Phreaks, hackers & trollsPhreaks, hackers & trolls
Phreaks, hackers & trolls
 
DIKULT103 Digital Genres: Intro lecture
DIKULT103 Digital Genres: Intro lectureDIKULT103 Digital Genres: Intro lecture
DIKULT103 Digital Genres: Intro lecture
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technology
 
Internet
InternetInternet
Internet
 
ENCRYPTION
ENCRYPTIONENCRYPTION
ENCRYPTION
 
Computer generations
Computer generationsComputer generations
Computer generations
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth
 
Form4 cd1
Form4 cd1Form4 cd1
Form4 cd1
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth
 
2002 0918 Internet History And Growth
2002 0918 Internet History And Growth2002 0918 Internet History And Growth
2002 0918 Internet History And Growth
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth
 
2002 0918 Internet History And Growth
2002 0918 Internet History And Growth2002 0918 Internet History And Growth
2002 0918 Internet History And Growth
 
Internet History And Growth
Internet History And GrowthInternet History And Growth
Internet History And Growth
 

Último

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Último (20)

The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 

Elp1 26

  • 1. Military Code Through The Ages By: Mike Dobiecki
  • 2. Navajo Code Talkers These were field cryptographers breaking out a whole new code. Before the code-talkers, easy, well-known algorithms were all that were available. Right before the Navajo Code-Talkers, A few Comanche Indians were used for code-talkers.
  • 3.
  • 4. Why did they use the Navajo Language?
  • 5. Why did they use the Navajo Language? Was Philip Johnston the real mastermind?
  • 6. Why did they use the Navajo Language? Was Philip Johnston the real mastermind? Why was he credited?
  • 7. 1st Age of NSA Encrption After the code-talkers, in 1952, the NSA was created. The first generation of NSA Encryption was electromechanical. These were modeled after the very crude models worked on in the WWII.
  • 8. 2nd Age of NSA Encryption These were made in the 1970's. They were all electronically designed and based on vacuuim tubes. They used morse code and an alternating encryption algorithm.
  • 9. 3rd Age of NSA Encryption Made in the 1980’s. Integrated circuits, smaller units. Easier maintenance, stronger algorithms.
  • 10. 4th Age of NSA Encryption Made in the 1990’s. Electronic key distribution. Commercial packaging. Even less maintenance.
  • 11. 5th Age of NSA Encryption Modern encryption. Computer networking, largely machine based. Practically runs itself.
  • 12. Why? In our advancing society, everything is relying less on people, including encryption, it’s just the times. No system is better than the other, they accomplish the same thing.
  • 13. Why? Trust issues. Less people, less need for trust.
  • 14. Works Cited "Melville Klein, "Securing Record Communications: The TSEC/KW-26", 2003, NSA brochure, p. 4. Thomas R. Johnson (2009-12-18). ""American Cryptology during the Cold War, 1945-1989.Book III: Retrenchment and Reform, 1972-1980, page 232"" (html). NSA, DOCID 3417193 (file released on 2009-12-18, hosted at cryptome.org). http://cryptome.org/0001/nsa-meyer.htm. Retrieved 2010-01-03. Official Site of the Navajo Code Talkers. Web. 02 Feb. 2010. <http:// www.navajocodetalkers.org>.

Notas del editor