IT Colorado State University Cryptanalysis Discussion

User Generated

snvfnyD0011

Computer Science

Colorado State University

Description

One of the first truly difficult cryptanalysis and hacking examples was the enigma machine.Write a short paper discussing how cypher text machines work and approximately how long it would take to break your code using a standard brute force method.

The paper is required to be 2-3 pages in length, not including the title and reference pages, and use APA style for citation.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.Please mark this question as complete if you find my work satisfactory.

OUTLINE
I.

Cover Page

II.

Abstract: Gives a brief overview of what will be covered in the entire paper

III.

Cryptography Technology: Gives an introduction of cryptography and creates a
basis for the discussion

IV.

The Functionalities of a Ciphertext Machine: This topic discusses the operational
concepts of a ciphertext machine

V.

Bruteforce Attack on Ciphertext Machine: Discusses brute force attack and how it
affects ciphertext machines

VI.
VII.

Conclusion: Conclusive remarks regarding all that has been discussed in the paper.
References: Provides sources referred to while writing the paper


Running Head: CIPHERTEXT

1

Ciphertext Machines
Students Name:
Institutional Affiliation:

CIPHERTEXT

2

Abstract
This paper explores the functionalities of ciphertext machines with relation to cryptanalysis.
It discusses the basic operations that enable a ciphertext machine to encrypt and decrypt
strings of characters. Finally, it discusses the brute force method and gives an estimate of the
time-length that a standard brute force attack takes to successfully break code generated by a
ciphertext machine.

CIPHERTEXT

3
Cryptography Technology

Cryptography is a vital aspect of computer security. It is performed to protect
confidential and valuable information from access by unauthorized persons. Humans have
been practicing cryptography for thousands of years. However, the demand for more security
has risen over time, prompting the creation of more complex cryptographic machines that are
more resistant to compromise (Dooley, 2018). A major achievement in this field was the
invention of ciphertext machines. A good example of the ciphertext machine series is the
enigma machine which was developed by a German engineer, Arthur Scherbius. The enigma
machine was later used by the German military to cipher and decipher confidential
communication during World War II (Oriyano, 2013). However, the enigma machine was
later cracked by opponents, enabling them to decrypt communication messages exchanged by
the German military. The opponents would then carry out espionage, helping them to avoid
German war-boats.
The Functionalities of a Ciphertext Machine
Ciphertext machines work by replacing plain text with non-readable substitutes through
the use of cipher algorithms. For a human to read and understand a ciphered item, it has to be
deciphered back to the original plaintext form. A ciphertext machine is an electrical device
with 26 switches, each switch denoting one character of the alphabet. These switches are
attached to 26 light bulbs for indicating each letter. Ciphertext machines also have
electromechanical rotors and gears used to scramble and randomize all letters of the alphabet
(Biswas, Ali, Rahman, & S...


Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags