The Web Cryptology Game CODEBREAKERS.EU edition 2015

Size: px
Start display at page:

Download "The Web Cryptology Game CODEBREAKERS.EU edition 2015"

Transcription

1 Lecture 2, in which we look at the main methods of concealing information. We will learn that what used to be an unbreakable cipher can today be compared to a child play. We will also see how this children game can complicate the work of a codebreaker. In the present lecture we will devote our attention to the subject of the basic methods od concealing information. Probably we already can explain what steganography is and can tell the difference between codes and ciphers. It is time to look at how they work in reality. STEGANOGRAPHY Please take note of the word subject above: the letter t is written in a slightly smaller font than the other letters. You might have overlooked that while reading it for the first time. Now, however, knowing what you need to look for, you will find, in the first two sentences, several other characters that differ in size from the rest of the text. When you put these letters together they will form a phrase thisisthekey. The meaningful letters in a text can be made distinctive in many ways: by changing the font size, or type; by underlining or inserting an unexpected ápostrophe. Yet another method of transmitting information secretly consisted in formulating an apparently innocent message, in which only certain characters (plain to the receiver of the message) were meaningful. Let s take as an example the following sentence: Their gentlemanly spirits sagged almost tragically, taking out of every word only the third letter we get a secret message enigma. To compose a logical and unsuspicious masking text was a certain problem, however, dispatches of that kind were usually sent as trade correspondence, in which the use of e.g. a list of items or accepted abbreviations is natural. It was a Greek historian, Herodotus, who related the story of a Greek named Histiayos serving at the court of the great king of Persia. He decided once to send to his cousin in Miletus a message about a convenient moment to stir the uprising against the Persian rulers. He summoned one of his slaves, shaved his head and tattooed the text of warning on it. When the hair on the messenger s head grew back, he sent him to his country. These examples show that there is much reason behind hiding the fact of sending information. The point is that no one should know that the head of the slave (mentioned when the word steganography appeared in our course for the first time) has been tattooed. The guards of the Persian royal

2 road all too often had to search the messengers passing through, and might have failed to notice a message hidden under the hair - steganography thus fulfilled its role. In time, its methods became more sophisticated, as the users came to the conclusion that the fact of sending a courier or a parcel itself arouses suspicions of the enemy if no innocent and credible reason for sending them is provided. They would, therefore, send apparently innocent messages, hiding the proper message in their text or on their carrier. The illustration on the right is an example of such a situation. It was drawn by an insect researcher who happened to be a general in British army, Roberta Baden-Powell. As it turns out, the butterfly is an issue of secondary importance here, in reality the drawing presented the layout and distribution of guns of one of enemy s fortresses. A typical method of this kind was the use of the so-called invisible ink. The proper content of the message was written on a sheet of papyrus, parchment or paper with milk or lemon juice and then, after the invisible ink had dried, an ordinary letter, e.g. greetings for a cousin, was written on the same page with normal ink. Even during a detailed inspection the messenger could claim that he was transporting only some family correspondence. The addressee, later, heated the message over a burning candle or rubbed the sheet with a cloth soaked in an appropriate reagent, thus deciphering the hidden message. Just when it seemed that steganography would soon become a remnant of the past replaced by codes and ciphers, the era of computers has brought its unexpected revival. A substantial amount of information can be transmitted almost unnoticeably, without a visible or audible deterioration in the quality, in the graphic and music files sent via the Internet. MORE ABOUT CIPHERS Steganography has still not lost its significance, however, at the turn of our era cryptology made its comeback. It was largely due to Julius Caesar, who had to have at his disposal reliable methods to secretly pass on orders to the commanders of his military units. So he invented and used his own

3 cipher, eventually named after him. According to the contemporary standards the Caesar cipher was not very sophisticated. Each letter of the plaintext was replaced by a letter three positions down the alphabet. In this manner the letter A was replaced in the cipher message by D, B by E etc. The full modification in the cipher used by Caesar is shown below: plain alphabet: cipher alphabet: ABCDEFGHIKLMNOPQRSTUVXYZ DEFGHIKLMNOPQRSTUVXYZABC His own name, IULIUS CAESAR, thus became LXNLXV FDHVDU. For unclear reasons, or simply out of habit, Caesar would continue to use a shift of three. In other words, he encrypted his messages without changing the key, which is not a safe practice. Presumably, Caesar could feel confident as the tribes he fought were not aware of the existence of alphabets, let alone a cipher. If, however, he had to fight with some more civilised enemies, his cipher would have turned out dangerously weak. The structure of the cipher allowed for the use of merely 23 keys, corresponding to different shifts between the alphabets. To put it differently, the enemy, aware of the construction of the Caesar s cipher, would have to test only 23 possibilities to be able to break any message sent by Caesar. LET S BREAK THE FIRST CODE! It is a mystery why Caesar would never change the key to his cipher, which means that the letters were moved always by three positions. It was not the safest approach though safe enough as the tribes he fought were illiterate and therefore unaware of the existence of ciphers. How could then a potential literate enemy try to break Caesar s code? Let s assume a coded message of the following content: EXXEGOEXSRGI. We can check all possible moves by 1 letter (where A changes into B) up to the movement by the whole alphabet (where A changes into Z). Let s assume that the author has used the English alphabet: ABCDEFGHIJKLMNOPQRSTUVWXYZ

4 If the author has moved by three letters forward - has changed A to D, in the coded message we have to move three letters backwards - from D to A. The table illustrates what messages we get by checking one by one each of the possible shifts. Because the message has already been deciphered there is no need to check further shifts. As you can see the messages are written with no spaces or punctuation marks. As you can see breaking the Caesar cipher has not caused any difficulty. There is, however, a simple way of making the Caesar cipher more secure, in reality - any cipher, and even now cryptologists make use of the opportunities it offers. If we have two relatively weak ciphers, we can increase the security level applying them to the plaintext one after another. There is a type of a word game that children from certain language circles like to play, in which the order of letters of a particular word is reversed in order to hide e.g. not a very favourable nickname of a teacher. In this manner LILLIPUT would change into TUPILLIL, LETTER into RETTEL, and SUPER into REPUS. In the early phase of the development of cryptology modifications of this type were taken quite seriously. We could, for instance, apply the child cipher with the reversed order to the word CAESAR first, and then encrypt the result with the classic Caesar cipher. Let s look at the process: plaintext: child cipher : Caesar cipher: CAESAR RASEAC UDVHDF Anyone trying to break this cryptogram by applying all of the possible keys of the Caesar cipher, would get a non-existent Latin word RASEAC. Whether he or she manages to discover the reversed word CAESAR in it depends on their intuition and ingenuity. MORE ABOUT THE CODES The reports related to the method used by Julius Caesar can indicate that ciphers developed as the second, after steganography, method of hiding information. Codes developed later.

5 Speaking of which, the language that we use on everyday basis is also a certain type of a code. In our early childhood we tend to give names to concepts using the language of the people surrounding us. Each word that we utter or a phrase we construct represents some concept, and that correlation is a matter of convention. After all people speaking languages foreign to us can understand each other perfectly well, even though the words that they use to represent the same concepts as we do are completely different. The analogy with foreign languages manifests the code nature of our language: people speaking a common language use one common code, allowing them to communicate. However, it is enough to use this code when speaking to a person of a different language circle to encounter an information barrier. Besides, there are particular variations of language the goal of which is to hide information from an unwelcome eye. Such are the prison or smugler slangs, as well as the language of most disciplines of science. In the first lecture we have already mentioned the subject of codes and the fact that during certain periods they were particularly popular as a practical tool for concealing information. In order to effectively hide the transmitted messages all that had to be done in this strategy was to assign a string of characters to words or even whole expressions. Below an example of a typical message: To staff. Company commander reports enemy movement noticed. It can be expressed in the following manner: In this case the numbers in the code would have the following meaning: 2133 TO STAFF, 3246 ENEMY MOVEMENT, 3452 COMPANY COMMANDER, 4354 REPORT, 9045 NOTICE,

6 It s easy to notice that this way of hiding information, although relatively easily applied, imposes certain restrictions. The code language is fairly rigid (and also of limited capacity) and therefore it was impossible to prepare codes for every situation. Because of that, a new code was invented in the period of the Renaissance, the so-called nomenclator. In its most typical form, it contained only the code equivalents of the notions most often used in correspondence and an accompanying simple cipher, which served to secure those fragments of the text for which there were no equivalents in the code. Here is an example of a simple nomenclator: COMPANY 8381 BATTALION 9211 REGIMENT 1153 DIVISION 0455 ATTACKING 9802 DEFENDING 6653 RETREATING 1388 DELIVER AMMUNITION 9077 SEND REINFORCEMENTS 6615 ABCDEFGHIJKLMNOPQRSTUVWXYZ CIPHERABDFGJKLMNOQSTUVWXYZ a report: Third company attacking. Deliver ammunition encrypted with the use of the nomenclator above will look as follows: TBDQH This short theoretical introduction will let you have a deeper insight into the issues related to cryptology, as well as solve the tasks accompanying the present lecture. Good luck!

An Introduction to Cryptography

An Introduction to Cryptography An Introduction to http://www.southernct.edu/~fields/ Terminology is the study of secret writing. This is the only branch of mathematics to be designated by the U.S. government as export-controlled. Cryptographic

More information

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography. International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 164 High Security Video Steganography Putti DeepthiChandan, Dr. M. Narayana Abstract- Video Steganography is a technique

More information

Exploring the Enigma [The MATH Connection]

Exploring the Enigma [The MATH Connection] Exploring the Enigma [The MATH Connection] by Claire Ellis, from Issue 34 of PLUS Magazine As long ago as the Ancient Greeks, warring armies have encrypted their communications in an attempt to keep their

More information

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography Cryptography A Bit of History 1 Seminal Text on Cryptography The Codebreakers: The Story of Secret Writing by David Kahn 1967 2 Early Cryptology - India Secret writing was well known and practiced in India

More information

Sherlock Holmes and the adventures of the dancing men

Sherlock Holmes and the adventures of the dancing men Sherlock Holmes and the adventures of the dancing men Kseniya Garaschuk May 30, 2013 1 Overview Cryptography (from Greek for hidden, secret ) is the practice and study of hiding information. A cipher is

More information

Most people familiar with codes and cryptography have at least heard of the German

Most people familiar with codes and cryptography have at least heard of the German Hunt 1 John Hunt Professor Derek Bruff FYWS Cryptography 28 October 2010 Most people familiar with codes and cryptography have at least heard of the German Enigma Machines. However, very few people have

More information

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE AUTHOR: Arturo Ribagorda Garnacho Carlos III University of Madrid, Spain Hello and welcome to Intypedia. Today we are

More information

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page Today s Topics Cipher Systems Substitution Ciphers Cracking Caesar s Cipher Polyalphabetic Substitution The Enigma Machine Rotors,

More information

Appendix Cryptograms

Appendix Cryptograms Fall 2006 Chris Christensen MAT/CSC 483 Appendix Cryptograms Here is a more detailed discussion of the history and techniques for solution of aristocrats and patristocrats (the generic term for them is

More information

Note: This document should only be used as a reference and should not replace assignment guidelines.

Note: This document should only be used as a reference and should not replace assignment guidelines. APA Quick Guide Note: This document should only be used as a reference and should not replace assignment guidelines. Page numbers below refer to the APA Manual 6 th edition, 2 nd printing. Title Page (pp.

More information

PA Substitution Cipher

PA Substitution Cipher Anuj Kumar 1 PA Substitution Cipher Ankur Kumar Varshney 2 Pankaj Kumar 3 1 M.Tech*, Computer Science & Engineering IEC CET, Greater Noida, (U.P.) India 2 M.Tech*, Computer Science & Engineering B.S.A

More information

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS PART FOUR Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS CHAPTER 8 Section I Characteristics of Periodic Systems 8-1. Types of Polyalphabetic Systems All the substitution

More information

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University CRYPTOGRAPHY IN CREATIVE MEDIA by Olivia Grace Vanarthos Honors Thesis Appalachian State University Submitted to The Honors College in partial fulfillment of the requirements for the degree of Bachelor

More information

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, 2017 The Enigma Machine In World War II, a team of British mathematicians working at a secret facility called Bletchley Park was able to break the

More information

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015 Breaking the Enigma Dmitri Gabbasov June 2, 2015 1 Introduction Enigma was an electro-mechanical machine that was used before and during the World War II by Germany to encrypt and decrypt secret messages.

More information

Editing EndNote Output Styles Rosemary Rodd 5/23/ Configuring EndNote at the University Managed Cluster sites

Editing EndNote Output Styles Rosemary Rodd 5/23/ Configuring EndNote at the University Managed Cluster sites University of Cambridge Computing Service Editing EndNote Output Styles Rosemary Rodd 5/23/14 1. Configuring EndNote at the University Managed Cluster sites When you edit output styles on your own machine

More information

FOR OFFICIAL USE ONLY

FOR OFFICIAL USE ONLY *FM 34-40-2 FIELD MANUAL NO 34-40-2 HEADQUARTERS DEPARTMENT OF THE ARMY Washington, DC, 13 September 1990 FOR OFFICIAL USE ONLY i ii iii PREFACE This field manual is intended as a training text in basic

More information

Many books on cryptography were published prior to the 1609

Many books on cryptography were published prior to the 1609 Early Cryptology N accurate assessment of a proposed cryptogram in the work of "Shake-speare" can only take place when the evidence is judged in the light of both the history and techniques of cryptology.

More information

ANCIENT WORLD WRITING SYSTEMS

ANCIENT WORLD WRITING SYSTEMS ANCIENT WORLD WRITING SYSTEMS Introduction For millenia, human beings have communicated through writing. The earliest forms of written communication date back to 25,000-30,000 BC when humans used symbols

More information

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the Baldwin 1 Erin Baldwin Dr. Bruff FYWS Cryptology October 27, 2010 Playfair Cipher From the earliest forms of stenography to the most advanced forms of encryption, the field of cryptography has advanced

More information

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher INTRODUCTION INTRODUCTION For centuries, some people, organisations and governments have wanted to send information secretly. Different ways of sending secret messages have been developed over time but

More information

Narrative #4. i didn t understand family i understood my grandparents my mom my brothers and sisters

Narrative #4. i didn t understand family i understood my grandparents my mom my brothers and sisters Narrative #4 in the winter time it got really cold on this side of the community hall sleeping on the floor in a very small boarded house i guess something like a 10 by 20 square building the old time

More information

LFSR stream cipher RC4. Stream cipher. Stream Cipher

LFSR stream cipher RC4. Stream cipher. Stream Cipher Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 89 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers

More information

Chapter 2 Divide and conquer

Chapter 2 Divide and conquer 8 8 Chapter 2 Divide and conquer How can ancient Sumerian history help us solve problems of our time? From Sumerian times, and maybe before, every empire solved a hard problem how to maintain dominion

More information

CS408 Cryptography & Internet Security

CS408 Cryptography & Internet Security CS408 Cryptography & Internet Security Lecture 4: Rotor Machines Enigma Reza Curtmola Department of Computer Science / NJIT How to move from pencil and paper to more automatic ways of encrypting and decrypting?

More information

An Analysis of the Enlightenment of Greek and Roman Mythology to English Language and Literature. Hong Liu

An Analysis of the Enlightenment of Greek and Roman Mythology to English Language and Literature. Hong Liu 4th International Education, Economics, Social Science, Arts, Sports and Management Engineering Conference (IEESASM 2016) An Analysis of the Enlightenment of Greek and Roman Mythology to English Language

More information

Institute of Southern Punjab, Multan

Institute of Southern Punjab, Multan Institute of Southern Punjab, Multan Network Security Substitution Techniques Lecture#4 Mazhar Hussain E-mail: mazhar.hussain@isp.edu.pk Lecture 4: Substitution Techniques Polybius Cipher Playfair Cipher

More information

Name: Ancient Egypt Detective: Research paper

Name: Ancient Egypt Detective: Research paper Name: Ancient Egypt Detective: Research paper Dear Student, Did you know? Historians and Archaeologists are detectives. They solve the mysteries of the past using artifacts, primary sources, critical thinking,

More information

National Standards for Visual Art The National Standards for Arts Education

National Standards for Visual Art The National Standards for Arts Education National Standards for Visual Art The National Standards for Arts Education Developed by the Consortium of National Arts Education Associations (under the guidance of the National Committee for Standards

More information

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher Lecturers: Mark D. Ryan and David Galindo. Cryptography 2015. Slide: 90 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers

More information

Different jobs called for different kinds of writing in the Roman world. Here are the three most common:

Different jobs called for different kinds of writing in the Roman world. Here are the three most common: Different jobs called for different kinds of writing in the Roman world. Here are the three most common: Tablets Crafty Idea Try making one for yourself. You can find instructions on the AshLI worksheet

More information

Ciphers that Substitute Symbols

Ciphers that Substitute Symbols Fall 2006 Chris Christensen MAT/CSC 483 Ciphers that Substitute Symbols I Δ ℵ Ω Δ ℵ Some historical simple substitution ciphers substitute symbols for plaintext letters. The ciphertext then looks less

More information

Personal Narrative STUDENT SELF-ASSESSMENT

Personal Narrative STUDENT SELF-ASSESSMENT 1 Personal Narrative Does my topic relate to a real event in my life? Do I express the events in time order and exclude unnecessary details? Does the narrative have an engaging introduction? Does the narrative

More information

LEARN * DREAM * AWAKEN* DISCOVER * ENLIGHTEN * INVESTIGATE * QUESTION * EXPLORE

LEARN * DREAM * AWAKEN* DISCOVER * ENLIGHTEN * INVESTIGATE * QUESTION * EXPLORE Egyptian scribes in Focus This Enrichment4You E-guide focuses on the Egyptian Scribes. In this e-guide you will: *Read about Egyptian Scribes *Write about an Egyptian Scribes *Make Faux Papyrus & Write

More information

AUSTRALIAN HOMESCHOOLING SERIES SAMPLE. Successful English 7B. Years 7 9. Written by Valerie Marett. CORONEOS PUBLICATIONS Item No 559

AUSTRALIAN HOMESCHOOLING SERIES SAMPLE. Successful English 7B. Years 7 9. Written by Valerie Marett. CORONEOS PUBLICATIONS Item No 559 AUSTRALIAN HOMESCHOOLING SERIES Successful English 7B Years 7 9 Written by Valerie Marett CORONEOS PUBLICATIONS Item No 559 Successful English 7B Contents Writing Checklist...... 3 Antonyms...5 Adverbial

More information

ENGLISH 1201: Essays and Prose

ENGLISH 1201: Essays and Prose Name: Slot: ENGLISH 1201: Essays and Prose Introductory Handout ESSAY DEVELOPMENT TYPES NARRATION: tells a story about an event or experience in the writer s life. The purpose of this writing is to reveal

More information

Writing Styles Simplified Version MLA STYLE

Writing Styles Simplified Version MLA STYLE Writing Styles Simplified Version MLA STYLE MLA, Modern Language Association, style offers guidelines of formatting written work by making use of the English language. It is concerned with, page layout

More information

The Paper Enigma Machine

The Paper Enigma Machine The Paper Enigma Machine http://mckoss.com/crypto/enigma.htm Mike Koss mike04@mckoss.com Wednesday, April 28, 2004 Introduction Having been fascinated with codes and secret writing since I was young, I

More information

A-LEVEL CLASSICAL CIVILISATION

A-LEVEL CLASSICAL CIVILISATION A-LEVEL CLASSICAL CIVILISATION CIV3B The Persian Wars Report on the Examination 2020 June 2015 Version: 1.0 Further copies of this Report are available from aqa.org.uk Copyright 2015 AQA and its licensors.

More information

A Layered Approach for Watermarking In Images Based On Huffman Coding

A Layered Approach for Watermarking In Images Based On Huffman Coding A Layered Approach for Watermarking In Images Based On Huffman Coding D. Lalitha Bhaskari 1 P. S. Avadhani 1 M. Viswanath 2 1 Department of Computer Science & Systems Engineering, Andhra University, 2

More information

THE HEROIC AGE OF EXPLORATION. Sample file

THE HEROIC AGE OF EXPLORATION. Sample file POLAR This Enrichment4You E-guide gives you: *A Brief History about mystery stories *Suggestions on how create a Polar Mystery Box based on the Polar Exploration series ENRICHMENT4YOU Published by Henrich

More information

DESI WULANDARI A

DESI WULANDARI A A CLASS STRUGGLE REFLECTED IN SIR WALTER SCOTT S IVANHOE: A MARXIST PERSPECTIVE RESEARCH PAPER Submitted as a Partial Fulfillment of Requirement for Getting Bachelor Degree of Education in English Department

More information

Build your own: Track Display

Build your own: Track Display Build your own: Track Display! " #! $% $ & ' $ ' ( ) * +, Track Display Manual 0706 web distribution version Table of Contents Section 1 Page 2 Quick Start Guide -Connecting 2 LEDs to Output #1 -Operating

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 (19) United States US 2003O152221A1 (12) Patent Application Publication (10) Pub. No.: US 2003/0152221A1 Cheng et al. (43) Pub. Date: Aug. 14, 2003 (54) SEQUENCE GENERATOR AND METHOD OF (52) U.S. C.. 380/46;

More information

[Meta comment: Page numbering starts at the first page of the anonymous. manuscript; the title page does not have page numbering.

[Meta comment: Page numbering starts at the first page of the anonymous. manuscript; the title page does not have page numbering. TITLE IN CAPITALS 1 [Meta comment: Page numbering starts at the first page of the anonymous manuscript; the title page does not have page numbering.] Abstract This is the abstract. Note how this is not

More information

What is Steganography

What is Steganography STEGANOGRAPHY Outline Introduction Outline What is Steganography History Lesson Why is this important to Digital Forensics Steganography and Cryptography Variations Classifications of Steganography Inside

More information

Style Guides APA Format

Style Guides APA Format *he following document should only be used as a quick reference guide. For more information, see the Publication Manual of the American Psychological Association, 6 th Edition. ILE PAGE (PP.23, 41) RUNNING

More information

PAPER AND FIRE. Volume 2 of the Great Library by Rachel Caine Author of the Morganville Vampires series

PAPER AND FIRE. Volume 2 of the Great Library by Rachel Caine Author of the Morganville Vampires series A Teacher s Guide for PAPER AND FIRE Volume 2 of the Great Library by Rachel Caine Author of the Morganville Vampires series Penguin Group (USA) 375 Hudson Street New York, NY 10014 www.enterthelibrary.com

More information

FROMM CRITICA FREUD. In italiano e in inglese. Articolo di Giuseppe Battaglia pubblicato su :

FROMM CRITICA FREUD. In italiano e in inglese. Articolo di Giuseppe Battaglia pubblicato su : Articolo di Giuseppe Battaglia pubblicato su : Gli amici di Luca Magazine numero 28/29 giugno/settembre 2009 FROMM CRITICA FREUD In italiano e in inglese 1 2 3 The dream conveys a wide range of feelings

More information

WINGS TO YOUR THOUGHTS..

WINGS TO YOUR THOUGHTS.. Review on Various Image Steganographic Techniques Amrit Preet Kaur 1, Gagandeep Singh 2 1 M.Tech Scholar, Chandigarh Engineering College, Department of CSE, Landran, India, kaur.amritpreet13@gmail 2 Assistant

More information

Table of Contents. Introduction...4. Common Core State Standards Alignment Matrix Skill Assessment Skill Assessment Analysis...

Table of Contents. Introduction...4. Common Core State Standards Alignment Matrix Skill Assessment Skill Assessment Analysis... Table of Contents Introduction...4 Common Core State Standards Alignment Matrix... 5... 7 Analysis... 11 Reading Standards for Literature...12 Reading Standards for Informational Text... 28 Reading Standards:

More information

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS PART FIVE Transposition Systems TYPES OF TRANSPOSITION SYSTEMS CHAPTER 11 11-1. Nature of Transposition Transposition systems are fundamentally different from substitution systems. In substitution systems,

More information

The Swiss cipher machine NeMa

The Swiss cipher machine NeMa Faculty of Science, Technology and Communication The Swiss cipher machine NeMa Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master in Information and Computer Sciences

More information

The character who struggles or fights against the protagonist. The perspective from which the story was told in.

The character who struggles or fights against the protagonist. The perspective from which the story was told in. Prose Terms Protagonist: Antagonist: Point of view: The main character in a story, novel or play. The character who struggles or fights against the protagonist. The perspective from which the story was

More information

Found Poem USING NIGHT BY ELIE WIESEL

Found Poem USING NIGHT BY ELIE WIESEL Found Poem USING NIGHT BY ELIE WIESEL What is a Found Poem? A found poem is composition made by combining fragments of such printed material as newspapers, signs, or menus, and rearranging them into the

More information

Champions of Invention. by John Hudson Tiner

Champions of Invention. by John Hudson Tiner Champions of Invention by John Hudson Tiner First printing: March 2000 Copyright 1999 by Master Books, Inc. All rights reserved. No part of this book may be used or reproduced in any manner whatsoever

More information

The Anchor Paper Main Logo

The Anchor Paper Main Logo The Anchor Paper Main Logo The 2C version is for offset spot printing, CMYK version is for 4-color printing and RGB versions are for internet, Aside from the full-color versions, black and reversed-out

More information

Introduction to Drama

Introduction to Drama Part I All the world s a stage, And all the men and women merely players: They have their exits and their entrances; And one man in his time plays many parts... William Shakespeare What attracts me to

More information

Antigone by Sophocles

Antigone by Sophocles Antigone by Sophocles Background Information: Drama Read the following information carefully. You will be expected to answer questions about it when you finish reading. A Brief History of Drama Plays have

More information

The Influence of Chinese and Western Culture on English-Chinese Translation

The Influence of Chinese and Western Culture on English-Chinese Translation International Journal of Liberal Arts and Social Science Vol. 7 No. 3 April 2019 The Influence of Chinese and Western Culture on English-Chinese Translation Yingying Zhou China West Normal University,

More information

AXIOLOGY OF HOMELAND AND PATRIOTISM, IN THE CONTEXT OF DIDACTIC MATERIALS FOR THE PRIMARY SCHOOL

AXIOLOGY OF HOMELAND AND PATRIOTISM, IN THE CONTEXT OF DIDACTIC MATERIALS FOR THE PRIMARY SCHOOL 1 Krzysztof Brózda AXIOLOGY OF HOMELAND AND PATRIOTISM, IN THE CONTEXT OF DIDACTIC MATERIALS FOR THE PRIMARY SCHOOL Regardless of the historical context, patriotism remains constantly the main part of

More information

Style (How to Speak) February 19, Ross Arnold, Winter 2015 Lakeside institute of Theology

Style (How to Speak) February 19, Ross Arnold, Winter 2015 Lakeside institute of Theology Style (How to Speak) February 19, 2015 Ross Arnold, Winter 2015 Lakeside institute of Theology Communications & Homiletics (CL2) Jan. 29 Introduction to Rhetoric Feb. 5 Invention (finding the meaning)

More information

ENGLISH 2201: Essays and Prose

ENGLISH 2201: Essays and Prose Name: Slot: ENGLISH 2201: Essays and Prose Introductory Handout ESSAY DEVELOPMENT TYPES NARRATION: tells a story about an event or experience in the writer s life. The purpose of this writing is to reveal

More information

Telairity Dives Deep into Digital Video Technology Part 1

Telairity Dives Deep into Digital Video Technology Part 1 Telairity Dives Deep into Digital Video Technology Part 1 In an age when data is increasingly digital, and video is consuming a disproportionate and ever-increasing share of all digitized data, digital

More information

What are MLA, APA, and Chicago/Turabian Styles?

What are MLA, APA, and Chicago/Turabian Styles? Citing Sources 1 What are MLA, APA, and Chicago/Turabian Styles? Style, or documentation, refers to the method you use to cite your sources when writing a research-based paper. The three most common academic

More information

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University The Evolution of the Cryptologic Bombe Chris Christensen Department of Mathematics Northern Kentucky University Electronic Communications 1844 Samuel F. B. Morse: What hath God Wrought? Telegraph. 1876

More information

Substitution cipher. Contents

Substitution cipher. Contents Substitution cipher In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the "units" may be single letters

More information

Introduction to embodiment

Introduction to embodiment Language has function Language is situated Interpreting language requires experiential, embodied understanding of the world linguistic capabilities are created as humans form associations between linguistic

More information

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf. Rotating Grille Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf. An even number of cells on each side of grille

More information

Excerpts From: Gloria K. Reid. Thinking and Writing About Art History. Part II: Researching and Writing Essays in Art History THE TOPIC

Excerpts From: Gloria K. Reid. Thinking and Writing About Art History. Part II: Researching and Writing Essays in Art History THE TOPIC 1 Excerpts From: Gloria K. Reid. Thinking and Writing About Art History. Part II: Researching and Writing Essays in Art History THE TOPIC Thinking about a topic When you write an art history essay, you

More information

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany Enigma Enigma 1 Enigma Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany o For both military and diplomatic use o Many variations used Broken

More information

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1 30 March l945 page 1 TENTATIVE LIST OF ENIGMA AND OTHER MACHINE USAGES Contents 1. Naval Enigma. 2. German Army and Air Force Enigma (including a few other miscellaneous devices). 3. Commercial Type Machines.

More information

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

Code-makers & Codebreakers. Substitution ciphers and frequency analysis Code-makers & Codebreakers Substitution ciphers and frequency analysis Introductiion to Substiitutiion Ciiphers Author: Will Mitchell william.mitchell@ic.ac.uk A substitution cipher replaces each letter

More information

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device 1 sur 5 17/04/2016 18:59 Le Sphinx Pocket cipher device Homepage Crypto Index Glossary Enigma Hagelin Fialka Siemens Philips Nema Racal Motorola STK Transvertex Gretag OMI HELL Telsy Teltron TST Mils AT&T

More information

Modelling Intellectual Processes: The FRBR - CRM Harmonization. Authors: Martin Doerr and Patrick LeBoeuf

Modelling Intellectual Processes: The FRBR - CRM Harmonization. Authors: Martin Doerr and Patrick LeBoeuf The FRBR - CRM Harmonization Authors: Martin Doerr and Patrick LeBoeuf 1. Introduction Semantic interoperability of Digital Libraries, Library- and Collection Management Systems requires compatibility

More information

julius caesar Welcome to

julius caesar Welcome to julius caesar Welcome to Saddleback s Illustrated Classics TM We are proud to welcome you to Saddleback s Illustrated Classics TM. Saddleback s Illustrated Classics TM was designed specifically for the

More information

CLASSIFICATION OF THE METAPHORS ACCORDING TO THE DEGREE OF UNEXPECTEDNESS

CLASSIFICATION OF THE METAPHORS ACCORDING TO THE DEGREE OF UNEXPECTEDNESS UDC: 159.942.5 CLASSIFICATION OF THE METAPHORS ACCORDING TO THE DEGREE OF UNEXPECTEDNESS Nino Kemertelidze, PhD Full Professor at Grigol Robakidze University, Tbilisi, Georgia Tamar Manjavidze, PhD candidate

More information

Humanities Learning Outcomes

Humanities Learning Outcomes University Major/Dept Learning Outcome Source Creative Writing The undergraduate degree in creative writing emphasizes knowledge and awareness of: literary works, including the genres of fiction, poetry,

More information

Quantitative Evaluation of Pairs and RS Steganalysis

Quantitative Evaluation of Pairs and RS Steganalysis Quantitative Evaluation of Pairs and RS Steganalysis Andrew Ker Oxford University Computing Laboratory adk@comlab.ox.ac.uk Royal Society University Research Fellow / Junior Research Fellow at University

More information

Lecture (0) Introduction

Lecture (0) Introduction Lecture (0) Introduction Today s Lecture... What is semiotics? Key Figures in Semiotics? How does semiotics relate to the learning settings? How to understand the meaning of a text using Semiotics? Use

More information

(Refer Slide Time 1:58)

(Refer Slide Time 1:58) Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 1 Introduction to Digital Circuits This course is on digital circuits

More information

A reprint from American Scientist

A reprint from American Scientist A reprint from American Scientist the magazine of Sigma Xi, The Scientific Research Society This reprint is provided for personal and noncommercial use. For any other use, please send a request to Permissions,

More information

Formatting a Document in Word using MLA style

Formatting a Document in Word using MLA style Formatting a Document in Word using MLA style 1. Using MS Word - various versions 2. Using MLA Handbook for Writers of Research Papers 7 th ed. (2009) 3. The 7 th ed. is also in Term Paper Assistance section

More information

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): Nomenclators Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): LO = Spain POM = King of Spain 64 = confederation overlined two-digit groups = null + substitution

More information

On Translating Ulysses into French

On Translating Ulysses into French Papers on Joyce 14 (2008): 1-6 On Translating Ulysses into French JACQUES AUBERT Abstract Jacques Aubert offers in this article an account of the project that led to the second translation of Ulysses into

More information

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2] CRYPTOLOGY Notes & Cryptology is the study of 'hidden writing', but is more generally thought of as being to do with codes and ciphers. It involves working with both language and mathematics. For that

More information

web address: address: Description

web address:   address: Description History of Philosophy: Ancient PHILOSOPHY 157 Fall 2010 Center Hall 222: MWF 12-12:50 pm Monte Ransome Johnson Associate Professor monte@ucsd.edu SSH 7058: MW 2-3 pm web address: http://groups.google.com/group/2010-ucsd-phil-157

More information

AV KEEPS NYC SECURE JAIL IS UNDER CONTROL GREETINGS FROM MARS NYPD S EOC SERVES MULTIPLE PURPOSES.

AV KEEPS NYC SECURE JAIL IS UNDER CONTROL GREETINGS FROM MARS NYPD S EOC SERVES MULTIPLE PURPOSES. Vol. 51 No. 3 March 21, 2005 AV KEEPS NYC SECURE NYPD S EOC SERVES MULTIPLE PURPOSES. JAIL IS UNDER CONTROL CACHE COUNTY JAIL S COMMUNICATION, CONTROL SYSTEMS ARE VITAL. GREETINGS FROM MARS AV HELPS NASA

More information

Style Guides APA Format

Style Guides APA Format ILE PAGE RUNNING HEAD he running head is an abbreviated title on the top left of the title page. It should be less than 50 characters. AUHOR INFORMAION he coversheet should state your name and institutional

More information

Tutor Led Manual v1.7. Table of Contents PREFACE I.T. Skills Required Before Attempting this Course... 1 Copyright... 2 GETTING STARTED...

Tutor Led Manual v1.7. Table of Contents PREFACE I.T. Skills Required Before Attempting this Course... 1 Copyright... 2 GETTING STARTED... EndNote X7 Tutor Led Manual v1.7 Table of Contents PREFACE... 1 I.T. Skills Required Before Attempting this Course... 1 Copyright... 2 GETTING STARTED... 1 EndNote Explained... 1 Opening the EndNote Program...

More information

Essential Histories. The Greek and Persian W ars BC

Essential Histories. The Greek and Persian W ars BC Essential Histories The Greek and Persian W ars 499-386 BC Page Intentionally Left Blank Essential Histories The Greek and Persian W ars 499-386 BC Philip de Souza! J Routledge Taylor &. Francis Group

More information

(12) United States Patent

(12) United States Patent (12) United States Patent USOO71 6 1 494 B2 (10) Patent No.: US 7,161,494 B2 AkuZaWa (45) Date of Patent: Jan. 9, 2007 (54) VENDING MACHINE 5,831,862 A * 11/1998 Hetrick et al.... TOOf 232 75 5,959,869

More information

First Manassas 1861: The Battle of Bull Run (Trade Editions)

First Manassas 1861: The Battle of Bull Run (Trade Editions) First Manassas 1861: The Battle of Bull Run (Trade Editions) Alan Hankinson Click here if your download doesn"t start automatically First Manassas 1861: The Battle of Bull Run (Trade Editions) Alan Hankinson

More information

Correlation to Common Core State Standards Books A-F for Grade 5

Correlation to Common Core State Standards Books A-F for Grade 5 Correlation to Common Core State Standards Books A-F for College and Career Readiness Anchor Standards for Reading Key Ideas and Details 1. Read closely to determine what the text says explicitly and to

More information

Arkansas Learning Standards (Grade 12)

Arkansas Learning Standards (Grade 12) Arkansas Learning s (Grade 12) This chart correlates the Arkansas Learning s to the chapters of The Essential Guide to Language, Writing, and Literature, Blue Level. IR.12.12.10 Interpreting and presenting

More information

56 Discoveries in Egypt Howard Carter discovers Tutankhamen

56 Discoveries in Egypt Howard Carter discovers Tutankhamen 10 56 Discoveries in Egypt Howard Carter discovers Tutankhamen Howard Carter was born on 9 May 1874 in London. His father, Samuel, was a successful animal portrait painter. Howard never went to school,

More information

There is an activity based around book production available for children on the Gothic for England website which you may find useful.

There is an activity based around book production available for children on the Gothic for England website which you may find useful. WRITING AND PRINTING Resource Box NOTES FOR TEACHERS These notes are intended primarily for KS2 teachers and for teachers of History (Britain 1066-1500) at KS3. The notes are divided into three sections

More information

Annotated Bibliography

Annotated Bibliography Annotated Bibliography You will be creating an annotated bibliography pertaining to the topic you have chosen to research. This bibliography will consist of a minimum of 5 sources and annotations. Your

More information

Learning Objectives Lower Grammar Stage. Kindergarten: The Cradle of Civilization Year First Grade: The Greek Year Second Grade: The Roman Year

Learning Objectives Lower Grammar Stage. Kindergarten: The Cradle of Civilization Year First Grade: The Greek Year Second Grade: The Roman Year Learning Objectives Lower Grammar Stage Kindergarten: The Cradle of Civilization Year First Grade: The Greek Year Second Grade: The Roman Year History Objectives Understand history and culture as human

More information

THESIS/DISSERTATION FORMAT AND LAYOUT

THESIS/DISSERTATION FORMAT AND LAYOUT Typing Specifications THESIS/DISSERTATION FORMAT AND LAYOUT When typing a Thesis/Dissertation it is crucial to have consistency of the format throughout the document. Adherence to the specific instructions

More information