• Corpus ID: 10028457

The Impact of the Allied Cryptographers on World War II : Cryptanalysis of the Japanese and German Cipher Machines

@inproceedings{Callahan2014TheIO,
  title={The Impact of the Allied Cryptographers on World War II : Cryptanalysis of the Japanese and German Cipher Machines},
  author={Katelyn Callahan},
  year={2014}
}
Throughout history, cryptography has played an important role during times of war. The ability to read enemy messages can lead to invaluable knowledge that can be used to lessen casualties and secure victories. The Allied cryptographers during World War II had a major impact on the outcome of the war. The Allies’ ability to intercept and decrypt messages encrypted on the Japanese cipher machine, Purple, and the German cipher machine, Enigma, empowered the Allies with a major advantage during… 
Cryptanalysis of the Purple Cipher using Random Restarts
TLDR
Cryptanalysis of the Purple Cipher using Random Restarts shows clear trends in the values of the letters A-Z, which indicate the direction of travel for the Purple and Z is determined by the letters B-Z.

References

SHOWING 1-9 OF 9 REFERENCES
Introduction to Cryptography with Coding Theory
TLDR
A full chapter on error correcting codes introduces the basic elements of coding theory and provides a flexible organization, as each chapter is modular and can be covered in any order.
The code book: the science of secrecy from ancient egypt to quantum cryptography [Book Review]
  • V. F. Kleist
  • Computer Science
    IEEE Annals of the History of Computing
  • 2002
TLDR
The Cipher of Mary Queen of Scots: From Shunning Vigenère to the Man in the Iron Mask is a posthumous publication based on a manuscript originally written by Gordon C. Dickinson in 2005 and then edited by David I. Dickinson.
The Cryptographic Mathematics of Enigma, Center for Cryptologic History, indent
  • National Security Agency,
  • 2011
Solving the Enigma: History of the Cryptanalytic Bombe, Center for Cryptological History
  • National Security Agency,
  • 2006
The Cryptographic Mathematics of Enigma
TLDR
This paper derives for the first time the exact number of theoretical cryptographic key settings and machine configurations for the Enigma cipher machine and calculates the number of practical key settings Allied cryptanalysts were faced with on a daily basis throughout World War II.
Solving the Enigma: History of the Cryptanalytic Bombe
  • Solving the Enigma: History of the Cryptanalytic Bombe
  • 2006
Bonhams : A Rare Three-rotor German Enigma Enciphering Machine Bonhams
  • Bonhams : A Rare Three-rotor German Enigma Enciphering Machine Bonhams
  • 1944