ISM 529 CSU Global Historical Encryption Enigma Cipher Discussion

User Generated

wznpx2020

Computer Science

ISM 529

Colorado State University Global

ISM

Description

Research an encryption method that has been used historically but is no longer used (such as the Enigma cipher of the Germans in World War II). Describe how that encryption method works, paying particular attention to how it contrasts with more modern methods. Be sure to discuss at least one modern method in your comparison.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.

OUTLINE

Historical Encryption

1. Introduction
a. History of Enigma cipher
2. How it works
a. The rotor machine
3. Cryptoanalysis
a. Modifying the substitution letter
4. Modern technique
a. Advanced Encryption Standard (AES)
5. Conclusion


Running Head: HISTORICAL ENCRYPTION

Historical Encryption – Enigma Cipher

Name

Institution

Course Code

1

HISTORICAL ENCRYPTION

2
Introduction

The cryptography field can be traced back to the Roman and Greek periods when
straightforward substitution and transposition ciphers were utilized to encrypt sensitive
information. The procedure of enhancing security in ciphers took place gradually until
mechanical gadgets became widespread at the beginning of the twentieth century (Stoler, 2008).
Nevertheless, there had taken place numerous attempts to make ciphers more secure before this
period. Distinguished encryption milestones in the twentieth century include the creation and
utilization of the Enigma machine.

History of the Enigma Cipher
Blaise de Vigenere had published an Autokey cipher’s description that was utilized in the
First World War. When the First World War ended, and the Vigenere Cipher broke down, it was
clear that enhanced security was required. Many countries realized that nobody could encrypt
data faster and more securely than a mechanical device. As a result, Enigma Machine’s
development was considered. This machine was a cipher gadget that was utilized to decrypt and
encrypt private information. The entire Enigma line included a collectio...


Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags