SlideShare ist ein Scribd-Unternehmen logo
Military Code Through
       The Ages
      By: Mike Dobiecki
Navajo Code Talkers

These were field cryptographers breaking out a whole new
code.
Before the code-talkers, easy, well-known algorithms were all
that were available.
Right before the Navajo Code-Talkers, A few Comanche
Indians were used for code-talkers.
Why did they use the Navajo Language?
Why did they use the Navajo Language?


 Was Philip Johnston the real mastermind?
Why did they use the Navajo Language?


 Was Philip Johnston the real mastermind?


         Why was he credited?
1st Age of NSA Encrption

After the code-talkers, in 1952, the NSA was created.
The first generation of NSA Encryption was
electromechanical.
These were modeled after the very crude models worked on
in the WWII.
2nd Age of NSA Encryption

These were made in the 1970's.
They were all electronically designed and based on vacuuim
tubes.
They used morse code and an alternating encryption
algorithm.
3rd Age of NSA Encryption

Made in the 1980’s.
Integrated circuits, smaller units.
Easier maintenance, stronger algorithms.
4th Age of NSA Encryption	

Made in the 1990’s.
Electronic key distribution. Commercial packaging.
Even less maintenance.
5th Age of NSA Encryption

Modern encryption.
Computer networking, largely machine based.
Practically runs itself.
Why?

In our advancing society, everything is relying less on
people, including encryption, it’s just the times.
No system is better than the other, they accomplish the same
thing.
Why?


Trust issues.
Less people, less need for trust.
Works Cited
"Melville Klein, "Securing Record Communications: The TSEC/KW-26", 2003,

    NSA brochure, p. 4.

Thomas R. Johnson (2009-12-18). ""American Cryptology during the Cold War,

   1945-1989.Book III: Retrenchment and Reform, 1972-1980, page

   232"" (html). NSA, DOCID 3417193 (file released on 2009-12-18, hosted at

   cryptome.org). http://cryptome.org/0001/nsa-meyer.htm. Retrieved

   2010-01-03.

Official Site of the Navajo Code Talkers. Web. 02 Feb. 2010. <http://

   www.navajocodetalkers.org>.

Weitere ähnliche Inhalte

Ähnlich wie Elp1 26

The History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfThe History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfonline Marketing
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - PaperBernhard Hofer
 
Final Paper for Senior Seminar
Final Paper for Senior SeminarFinal Paper for Senior Seminar
Final Paper for Senior SeminarKasner Margaret
 
Introduction to the cryptography behind blockchain (from roots to quantum cry...
Introduction to the cryptography behind blockchain (from roots to quantum cry...Introduction to the cryptography behind blockchain (from roots to quantum cry...
Introduction to the cryptography behind blockchain (from roots to quantum cry...Marcelo Sávio
 
Phreaks, hackers & trolls
Phreaks, hackers & trollsPhreaks, hackers & trolls
Phreaks, hackers & trollsEJThompson
 
DIKULT103 Digital Genres: Intro lecture
DIKULT103 Digital Genres: Intro lectureDIKULT103 Digital Genres: Intro lecture
DIKULT103 Digital Genres: Intro lectureJill Walker Rettberg
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYijcisjournal
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technologyTricon Infotech
 
Computer generations
Computer generationsComputer generations
Computer generationsSai Ram
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growthrahchauh
 
Form4 cd1
Form4 cd1Form4 cd1
Form4 cd1smktsj2
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growthankurbhala
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growthmister aabid
 
2002 0918 Internet History And Growth
2002 0918 Internet History And Growth2002 0918 Internet History And Growth
2002 0918 Internet History And Growthvenkatesh y
 
Internet History And Growth
Internet History And GrowthInternet History And Growth
Internet History And Growthmayday1429
 

Ähnlich wie Elp1 26 (20)

The History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfThe History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdf
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
 
Final Paper for Senior Seminar
Final Paper for Senior SeminarFinal Paper for Senior Seminar
Final Paper for Senior Seminar
 
Generations of
Generations ofGenerations of
Generations of
 
Introduction to the cryptography behind blockchain (from roots to quantum cry...
Introduction to the cryptography behind blockchain (from roots to quantum cry...Introduction to the cryptography behind blockchain (from roots to quantum cry...
Introduction to the cryptography behind blockchain (from roots to quantum cry...
 
Phreaks, hackers & trolls
Phreaks, hackers & trollsPhreaks, hackers & trolls
Phreaks, hackers & trolls
 
DIKULT103 Digital Genres: Intro lecture
DIKULT103 Digital Genres: Intro lectureDIKULT103 Digital Genres: Intro lecture
DIKULT103 Digital Genres: Intro lecture
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technology
 
Internet
InternetInternet
Internet
 
ENCRYPTION
ENCRYPTIONENCRYPTION
ENCRYPTION
 
Computer generations
Computer generationsComputer generations
Computer generations
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth
 
Form4 cd1
Form4 cd1Form4 cd1
Form4 cd1
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth
 
2002 0918 Internet History And Growth
2002 0918 Internet History And Growth2002 0918 Internet History And Growth
2002 0918 Internet History And Growth
 
2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth2002 0918 internet_history_and_growth
2002 0918 internet_history_and_growth
 
2002 0918 Internet History And Growth
2002 0918 Internet History And Growth2002 0918 Internet History And Growth
2002 0918 Internet History And Growth
 
Internet History And Growth
Internet History And GrowthInternet History And Growth
Internet History And Growth
 

Kürzlich hochgeladen

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Motion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyMotion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyUXDXConf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Transforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UXTransforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UXUXDXConf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 

Kürzlich hochgeladen (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Motion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyMotion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in Technology
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Transforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UXTransforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UX
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 

Elp1 26

  • 1. Military Code Through The Ages By: Mike Dobiecki
  • 2. Navajo Code Talkers These were field cryptographers breaking out a whole new code. Before the code-talkers, easy, well-known algorithms were all that were available. Right before the Navajo Code-Talkers, A few Comanche Indians were used for code-talkers.
  • 3.
  • 4. Why did they use the Navajo Language?
  • 5. Why did they use the Navajo Language? Was Philip Johnston the real mastermind?
  • 6. Why did they use the Navajo Language? Was Philip Johnston the real mastermind? Why was he credited?
  • 7. 1st Age of NSA Encrption After the code-talkers, in 1952, the NSA was created. The first generation of NSA Encryption was electromechanical. These were modeled after the very crude models worked on in the WWII.
  • 8. 2nd Age of NSA Encryption These were made in the 1970's. They were all electronically designed and based on vacuuim tubes. They used morse code and an alternating encryption algorithm.
  • 9. 3rd Age of NSA Encryption Made in the 1980’s. Integrated circuits, smaller units. Easier maintenance, stronger algorithms.
  • 10. 4th Age of NSA Encryption Made in the 1990’s. Electronic key distribution. Commercial packaging. Even less maintenance.
  • 11. 5th Age of NSA Encryption Modern encryption. Computer networking, largely machine based. Practically runs itself.
  • 12. Why? In our advancing society, everything is relying less on people, including encryption, it’s just the times. No system is better than the other, they accomplish the same thing.
  • 13. Why? Trust issues. Less people, less need for trust.
  • 14. Works Cited "Melville Klein, "Securing Record Communications: The TSEC/KW-26", 2003, NSA brochure, p. 4. Thomas R. Johnson (2009-12-18). ""American Cryptology during the Cold War, 1945-1989.Book III: Retrenchment and Reform, 1972-1980, page 232"" (html). NSA, DOCID 3417193 (file released on 2009-12-18, hosted at cryptome.org). http://cryptome.org/0001/nsa-meyer.htm. Retrieved 2010-01-03. Official Site of the Navajo Code Talkers. Web. 02 Feb. 2010. <http:// www.navajocodetalkers.org>.

Hinweis der Redaktion