IEEE
You are not logged in, please sign in to edit > Log in / create account  

The encryption war of WWII: the Enigma encryption machine

From GHN

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
 +
'''Blog'''
 +
Please check out my blog:[http://study-enigma.blogspot.com/] for updates on my research and what to expect for things to come on the GHN article.
 +
----
 +
 
'''Brief Overview'''
 
'''Brief Overview'''
  
Line 10: Line 14:
  
 
''"Necessity is the mother of invention."''
 
''"Necessity is the mother of invention."''
 +
 +
[[Category:Radio_communication]]
 +
[[Category:Information_theory]]
 +
[[Category:Codes]]
 +
[[Category:World_War_II]]

Revision as of 07:42, 11 November 2011

Blog Please check out my blog:[1] for updates on my research and what to expect for things to come on the GHN article.


Brief Overview

Iā€™m a student in the History of Computing class at San Jose State University ([2]). This is a work in progress that will turn into a final article by the end of the semester in December of 2011. I welcome your comments and advice.

I am developing a java simulation of one of the encryption machines used in World War II by the Nazi military--The Enigma. During my research and development, I have been learning a lot about the disciplined effort that was made toward creating this encryption system that was (presumably) unbreakable; but this task at hand calls for the mentioning of even greater events happening simultaneously. The efforts of the computer scientists at Bletchley Park unarguably changed the course of WWII, and using one of the first modern day concepts of the computer in history -- the Colossus.

Upon completion of my Enigma simulator, I want to apply what I have learned about the machine's construction and use in war time and apply it to the perspective of the allied forces. I intend to define how Bletchley Park scientists determined their decryption algorithms and more importantly draw a relationship to the magnitude of their efforts in both revolutionary thinking in the field of computers as well as respective technological growth.

By December I intend to have a working simulation of the Enigma encryption machine along with algorithms derived from computer scientists at the time that can be applied to the simulator for decryption. Like with any history article, I intend to provide a solid historical grounding in the events which incited these technologies.

"Necessity is the mother of invention."