1,355 research outputs found

    The Engima Cipher Machine

    Get PDF
    There can be little doubt that the German “Enigma” was the best and safest mechanical cipher machine available in any country at the outbreak of the Second World War. Its general use by all three services of the German armed forces presented the Allies with a very serious impediment to their efforts to read the German military message traffic and a great deal of time and effort was expended in attempts to devise a rapid and accurate method of deciphering it. That these efforts were in the end successful, was due in the main to the work of a dedicated team of scientists and academics based at the Bletchley Park facility north of London, England, and the stablishment of the “Ultra” intelligence gathering and distribution operation that worked so well for the Allies throughout the most crucial parts of the conflict. The author’s interest in the Enigma began when working as a volunteer communications specialist at the Canadian War Museum. Two Enigma machines were discovered stored with the radio and other electronic equipment at the Vimy Ridge storage facility. Further investigation of these machines found that one was the three-cipher-cylinder Type “A.” It was even found to be in operating condition, being essentially complete with three of its five cipher cylinders in place. The other machine was a four-cylinder Type “M.” It was in generally good condition, but lacked most of its cipher cylinders. It currently forms part of a Naval display at the Canadian War Museum on Sussex Drive in Ottawa, Ontario

    Cryptography: Mathematical Advancements on Cyber Security

    Get PDF
    The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information. Eventually, the realm of cryptography grew to include the concealment of more important information, and cryptography quickly became the backbone of cyber security. Many companies today use encryption to protect online data, and the government even uses encryption to conceal confidential information. Mathematics played a huge role in advancing the methods of cryptography. By looking at the math behind the most basic methods to the newest methods of cryptography, one can learn how cryptography has advanced and will continue to advance

    Phase ordering and shape deformation of two-phase membranes

    Full text link
    Within a coupled-field Ginzburg-Landau model we study analytically phase separation and accompanying shape deformation on a two-phase elastic membrane in simple geometries such as cylinders, spheres and tori. Using an exact periodic domain wall solution we solve for the shape and phase ordering field, and estimate the degree of deformation of the membrane. The results are pertinent to a preferential phase separation in regions of differing curvature on a variety of vesicles.Comment: 4 pages, submitted to PR

    An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box

    Get PDF
    The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. BA key varies from 32 to 448 bits to ensure a high level of security. However, the substitution box (S-Box) in BA occupies a high percentage of memory and has problems in security, specifically in randomness of output with text and image files that have large strings of identical bytes. Thus, the objective of this research is to enhance the BA to overcome these problems. The research involved three phases, algorithm design, implementation, and evaluation. In the design phase, a dynamic 3D S-Box, a dynamic permutation box (P-Box), and a Feistal Function (F-Function) were improved. The improvement involved integrating Cylindrical Coordinate System (CCS) and dynamic P-Box. The enhanced BA is known as Ramlan Ashwak Faudziah (RAF) algorithm. The implementation phase involved performing key expansion, data encryption, and data decryption. The evaluation phase involved measuring the algorithm in terms of memory and security. In terms of memory, the results showed that the RAF occupied 256 bytes, which is less than the BA (4096 bytes). In terms of randomness of text and image files that have large strings of identical bytes, the average rate of randomness for 188 statistical tests obtained values of more than 96%. This means that the RAF has high randomness indicating that it is more secured. Thus, the results showed that the RAF algorithm that integrates the CCS and dynamic P-Box serves as an effective approach that can consume less memory and strengthen security

    The Partnership Between Canada and Britain in Winning the Battle of the Atlantic

    Get PDF

    Best S-box amongst differently sized S-boxes based on the avalanche effect in ‎the advance encryption standard algorithm

    Get PDF
    Substitution boxes are essential nonlinear modules that are popular in block ‎cipher algorithms. They ‎also play a significant role in the security area because of ‎their robustness to different linear ‎cryptanalysis. Each element of the state in a S-‎box is nonlinearly replaced using a lookup table. This ‎research presents the S-‎box, one of the fundamental parts of the advanced encryption standard ‎‎(AES) ‎algorithm. The S-box represents the confusion part in the AES. However, when ‎information ‎is shared between different devices in an authorized manner, the ‎algorithm should be able to ‎combine a sufficient number of confusion layers to ‎guarantee the avalanche effect (AE). ‎Subsequently, this research selects the best ‎S-box by comparing different sizes (4×4, 8×8, and ‎‎16×16) and measuring them ‎on the basis of the million-bit encryption. The AE is the main criterion ‎used in ‎choosing the best S-box. A robust and strong cryptography algorithm should be ‎able to ‎confirm the AEs. Results indicate that the 16×16 S-box with a 52% AE ‎ratio is the superior S-bo
    • …
    corecore