Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

Size: px
Start display at page:

Download "Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device"

Transcription

1 1 sur 5 17/04/ :59 Le Sphinx Pocket cipher device Homepage Crypto Index Glossary Enigma Hagelin Fialka Siemens Philips Nema Racal Motorola STK Transvertex Gretag OMI HELL Telsy Teltron TST Mils AT&T Tadiran USA USSR UK Yugoslavia Voice Hand OTP LE SPHINX 1 was a pocket cryptographic device, developed around 1930 by Société des Codes Télégraphiques Georges Lugagne in Paris (France). The device consists of 10 sliding bars with two scrambled alphabets each, and should therefore be classed as an alphabet transposition cipher. At the time, it was advertised as a method for secret writing when sending (radio) telegrams. The device consists of a metal frame with ten lanes, each of which holds two movable rods with scrambled alphabets. The 20 transposed alphabets are identified by a number, imprinted in red, and are always used in pairs, with the upper alphabet representing the clear text and the lower alphabet used for the cipher text. 2 The rods can be moved by treaded knobs at the right side which engage gears at the bottom. Two fixed ruler windows are present for setting and reading the plain text and cipher text. The source text is processed 10 characters at a time. The device is based on the 1912 invention of a mechanical pocket transposition cipher device by Georges Lugagne of Boches-du-Rhône (near Marseille, France), which was registered in 1913 as French Patent [1]. Around the same time, the device was patented in the United Kingdom as British patent 23,204 [2]. The device was marketed in France by Lugagne's companies in Paris and Marseille, who had become known for their international telegraphic code books of The image on the right shows the original design of 1912, which is mechanically less complex, but works very similar. It also consists of 20 paired scrambled alphabets, but they are not linked mechanically. The sliding rods are made of ivory. In 1931, the design was improved by Lugagne's employee Paul Godillon, who added the gears and the 10 treaded knobs at the right hand side. He was also responsible for adding the S-shaped gaps at each end of the alphabet rods, allowing the scrambled alphabets to be coupled in pairs. His invention was patented in France on 4 Feb [3]. The same patent was filed in the US on 1 December 1931 by Albert Gentet [4], who also added the movable index to each window [5]. It is currently unclear where Le Sphinx was manufactured and by whom, but it is possible that it was made by the famous slide rule manufacturer BARBOTHEU in Paris, who also manufactured the 1912 version [7]. The original Transpositeur is further described in an article by Daniel Tant [8]. 1. 'Le Sphinx' is French for 'The Sphinx'. Also see the discussion about the name. 2. This is just an assumption. There is no reason why it could not be used the other way around, as long as both parties do it in the same way. Mixers Phones FILL Codebooks Spy radio Burst encoders Intercept Covert Controls The diagram below gives an overview of the various features of Le Sphinx. The device measures just 162 x 87 x 20 mm and consist of a die-cast metal alloy frame with 10 cogwheel driven lanes, each of which accomodates two physically locked scrambled alphabets. This effectively results in 10 different transposition ciphers that allow the text to be enciphered in groups of 10 letters.

2 2 sur 5 17/04/ :59 Radio PC Telex People Agencies Manufacturers Donate Kits Shop News Events Wanted Contact About Links On top of the device are two horizontal windows: one for the plaintext and one for the ciphertext. The position of the rods or rulers with the alphabets can be altered by means of 10 treaded knobs at the right side. Each knob drives a cogwheel that in turn engages the teeth at the bottom of a rod. Each position has a 'click' to ensure that the letters are properly shown in the windows. Name Le Sphinx The pocket cryptographic device featured on this page, was marketed by Société des Codes Télégraphiques Georges Lugagne, which had offices in Paris and Marseille (France). It is currently unclear under what name the device was sold, but since the bakelite storage case holds a raised image of a sphinx, it is commonly referred to as SPHINX. The metal label at the left side of the device shows the company name and the image of the sphinx, with the text 'LE SPHINX' (the sphinx). In order to distinguish it from the Sphinx Cipher Machine, we will call it 'Le Sphinx'. The name 'Sphinx' originates from the Greek language and represents a mythical creature that generally consists of the body of a lion with the head of a human. In Greek tradition it may also have the wings of a bird. Sphinx' also exist in Egyptian culture (e.g. Great Sphinx of Giza) [9]. Permutations When calculating the total number of combinations that can be made with the device, we will first look at the original design of It had 20 alphabet rulers, 10 of which were intended as the upper alphabets and the other 10 were the lower alphabets [1]. This gives us 10! (or 3,628,800) possible combinations of alphabets 1 for the upper half only. As the same is true for the lower half, the total number of combinations would be 3,628,800 x 3,628,800, which is no less than: 13,168,189,440,000 After the design had been improved by Paul Godillon in 1931, there was no longer a differece between the upper and the lower alphabets, allowing them to be mixed freely [3]. As a result the total number of combinations in which the 20 alphabets can be mixed, increased to 20! or: 2,432,902,008,176,640,000

3 3 sur 5 17/04/ : ! is the mathematical notation for 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1 Operation Before exchanging a message by means of Le Sphinx, both parties first have to agree which alphabet is used in each position. This is done by quoting the red number that is printed on the top of each rod. This is known as the settings or the key and is usually pre-arranged between the parties. For the default position, which we have used on this page, the key would be: Both users should now install the alphabets in the order indicated on the key sheet. Each pair (e.g ) should be coupled by fitting the S-shaped gap at the top of the lower alphabet into the S-shaped gap at the bottom of the upper alphabet. For the above key, the setup would be: Le Sphinx is constructed in such a way that the user can move the rulers by means of treaded knobs at the right side. There are 5 sets of two knobs. The leftmost knobs (i.e. the larger ones) are used to control the rightmost 5 lanes, whilst the rightmost knobs control the leftmost 5 lanes. Furthermore, there are two windows through which we can read a row of letters. Now rotate the knobs so that the first 10 letters of the plaintext are visible in the upper window, for example: TOPSECRETS All you now have to do is read the ciphertext from the lower window, which in this case is: IRUVPYQHWB All the receiving party has to do, is rotate the rulers so that the ciphertext is visible in the lower window. The original plaintext can now be read from the upper window.

4 4 sur 5 17/04/ :59 Cipher security Despite the large number of possible arrangements of the alphabets, Le Sphinx provides only low-grade cipher security. This is mainly caused by the fact that the arrangment of the alphabets does not change during the course of a message. If a message is long enough, it can be solved by frequency analysis. For very short messages, the cipher would be relatively secure though. Another weakness of the system is that there is no provision to send the key at the start of a message. Instead, it has to be pre-arranged. This was also the case with the German Enigma cipher machine, although in that case, procedures were in place to add a random message key. Alphabets The table below shows each of the 20 scrambled alphabets of our device. Note that the alphabets are printed in the regular order, but that they are shifted by a few positions on each ruler. Also note that the alphabets on the first 10 rulers (1-10) are in ascending order, whilst the alphabets on the last 10 rulers (11-20) are in descending order. 1 ABCDEFGHIJKLMNOPQRSTUVWXYZ 2 CDEFGHIJKLMNOPQRSTUVWXYZAB 3 EFGHIJKLMNOPQRSTUVWXYZABCD 4 GHIJKLMNOPQRSTUVWXYZABCDEF 5 IJKLMNOPQRSTUVWXYZABCDEFGH 6 MNOPQRSTUVWXYZABCDEFGHIJKL 7 PQRSTUVWXYZABCDEFGHIJKLMNO 8 RSTUVWXYZABCDEFGHIJKLMNOPQ 9 TUVWXYZABCDEFGHIJKLMNOPQRS 10 VWXYZABCDEFGHIJKLMNOPQRSTU 11 BAZYXWVUTSRQPONMLKJIHGFEDC 12 DCBAZYXWVUTSRQPONMLKJIHGFE 13 FEDCBAZYXWVUTSRQPONMLKJIHG 14 HGFEDCBAZYXWVUTSRQPONMLKJI 15 LKJIHGFEDCBAZYXWVUTSRQPONM 16 ONMLKJIHGFEDCBAZYXWVUTSRQP 17 SRQPONMLKJIHGFEDCBAZYXWVUT 18 UTSRQPONMLKJIHGFEDCBAZYXWV 19 WVUTSRQPONMLKJIHGFEDCBAZYX 20 YXWVUTSRQPONMLKJIHGFEDCBAZ References 1. Georges Lugagne, French Patent Filed 24 October 1913, granted 23 December Priority date 23 October George Lugagne, British Patent 23,204 Filed 14 October 1913, granted 9 April Paul Godillon, French Patent 710,604 Filed 4 February 1931, granted 27 August 1931.] 4. Albert Gentet, US Patent 1,956,384 Filed 1 December 1931, granted 24 April Albert Gentet, French patent Filed 1 February 1937, granted 11 May Pendergrass to Friedman, Classified files of US Patent Office US Government Internal Memorandum, 8 October pp Linialis, Règles Rares ou Originales Website Linealis.org. Retrieved April Daniel Tant, Le transpositeur à permutations secrètes Date unknown. Retrieved April 2016 (French) Wikipedia, Sphinx 1

5 5 sur 5 17/04/ :59 Retrieved April Approved for release by NSA on 16 July 2014, E.O Reproduced here by kind permission of the president of the Association des Réservistes du Chiffre et de la Sécurité de l'information. Further information Le Sphinx on Jerry Proc's crypto pages Other Lugagne cipher systems Other manual cipher methods Other cipher systems Any links shown in red are currently unavailable. If you like the information on this website, why not make a donation? Crypto Museum. Created: Friday 15 April Last changed: Friday, 15 April :04 CET.

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015 Breaking the Enigma Dmitri Gabbasov June 2, 2015 1 Introduction Enigma was an electro-mechanical machine that was used before and during the World War II by Germany to encrypt and decrypt secret messages.

More information

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page Today s Topics Cipher Systems Substitution Ciphers Cracking Caesar s Cipher Polyalphabetic Substitution The Enigma Machine Rotors,

More information

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, 2017 The Enigma Machine In World War II, a team of British mathematicians working at a secret facility called Bletchley Park was able to break the

More information

CS408 Cryptography & Internet Security

CS408 Cryptography & Internet Security CS408 Cryptography & Internet Security Lecture 4: Rotor Machines Enigma Reza Curtmola Department of Computer Science / NJIT How to move from pencil and paper to more automatic ways of encrypting and decrypting?

More information

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany Enigma Enigma 1 Enigma Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany o For both military and diplomatic use o Many variations used Broken

More information

Sherlock Holmes and the adventures of the dancing men

Sherlock Holmes and the adventures of the dancing men Sherlock Holmes and the adventures of the dancing men Kseniya Garaschuk May 30, 2013 1 Overview Cryptography (from Greek for hidden, secret ) is the practice and study of hiding information. A cipher is

More information

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS PART FIVE Transposition Systems TYPES OF TRANSPOSITION SYSTEMS CHAPTER 11 11-1. Nature of Transposition Transposition systems are fundamentally different from substitution systems. In substitution systems,

More information

Cabinet War Rooms SIGSALY. The A-3 scrambler

Cabinet War Rooms SIGSALY. The A-3 scrambler F, 5 January Cabinet War Rooms SIGSALY The first devices to secure transmission of voice were developed just after World War I. They were substitution devices; they inverted frequencies. High frequencies

More information

Exploring the Enigma [The MATH Connection]

Exploring the Enigma [The MATH Connection] Exploring the Enigma [The MATH Connection] by Claire Ellis, from Issue 34 of PLUS Magazine As long ago as the Ancient Greeks, warring armies have encrypted their communications in an attempt to keep their

More information

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

Code-makers & Codebreakers. Substitution ciphers and frequency analysis Code-makers & Codebreakers Substitution ciphers and frequency analysis Introductiion to Substiitutiion Ciiphers Author: Will Mitchell william.mitchell@ic.ac.uk A substitution cipher replaces each letter

More information

PA Substitution Cipher

PA Substitution Cipher Anuj Kumar 1 PA Substitution Cipher Ankur Kumar Varshney 2 Pankaj Kumar 3 1 M.Tech*, Computer Science & Engineering IEC CET, Greater Noida, (U.P.) India 2 M.Tech*, Computer Science & Engineering B.S.A

More information

The Paper Enigma Machine

The Paper Enigma Machine The Paper Enigma Machine http://mckoss.com/crypto/enigma.htm Mike Koss mike04@mckoss.com Wednesday, April 28, 2004 Introduction Having been fascinated with codes and secret writing since I was young, I

More information

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE AUTHOR: Arturo Ribagorda Garnacho Carlos III University of Madrid, Spain Hello and welcome to Intypedia. Today we are

More information

Tens Carry only by Geometry Josef Funke's Adding Device. Stephan Weiss

Tens Carry only by Geometry Josef Funke's Adding Device. Stephan Weiss Tens Carry only by Geometry Josef Funke's Adding Device Stephan Weiss Sometimes calculating aids hide a mechanism no one ever thinks of. Recently I analyzed a single digit adder. In fig. 1 an addition

More information

The Swiss cipher machine NeMa

The Swiss cipher machine NeMa Faculty of Science, Technology and Communication The Swiss cipher machine NeMa Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master in Information and Computer Sciences

More information

Update to 8 June 2011 Press Release

Update to 8 June 2011 Press Release 19 August 2011 Update to 8 June 2011 Press Release In June 2011, the National Security Agency (NSA) declassified and released to the National Archives and Records Administration (NARA) over 50,000 pages

More information

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS PART FOUR Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS CHAPTER 8 Section I Characteristics of Periodic Systems 8-1. Types of Polyalphabetic Systems All the substitution

More information

An Introduction to Cryptography

An Introduction to Cryptography An Introduction to http://www.southernct.edu/~fields/ Terminology is the study of secret writing. This is the only branch of mathematics to be designated by the U.S. government as export-controlled. Cryptographic

More information

LFSR stream cipher RC4. Stream cipher. Stream Cipher

LFSR stream cipher RC4. Stream cipher. Stream Cipher Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 89 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers

More information

Substitution cipher. Contents

Substitution cipher. Contents Substitution cipher In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the "units" may be single letters

More information

OWNER S MANUAL. Model 861 Hand Held Bale Scanner # REVISED 4-10

OWNER S MANUAL. Model 861 Hand Held Bale Scanner # REVISED 4-10 OWNER S MANUAL Model 861 Hand Held Bale Scanner #010-0861 REVISED 4-10 HARVEST TEC 861 TABLE OF CONTENTS PAGE INTRODUCTION 3 OVERVIEW 4 INSTALLATION OF ANTENNA 5 1. INSTALLATION OF ANTENNA FOR HAND HELD

More information

Sequences and Cryptography

Sequences and Cryptography Sequences and Cryptography Workshop on Shift Register Sequences Honoring Dr. Solomon W. Golomb Recipient of the 2016 Benjamin Franklin Medal in Electrical Engineering Guang Gong Department of Electrical

More information

EECS 270 Group Homework 4 Due Friday. June half credit if turned in by June

EECS 270 Group Homework 4 Due Friday. June half credit if turned in by June EES 270 Group Homework 4 ue Friday. June 1st @9:45am, half credit if turned in by June 1st @4pm. Name: unique name: Name: unique name: Name: unique name: This is a group assignment; all of the work should

More information

FOR OFFICIAL USE ONLY

FOR OFFICIAL USE ONLY *FM 34-40-2 FIELD MANUAL NO 34-40-2 HEADQUARTERS DEPARTMENT OF THE ARMY Washington, DC, 13 September 1990 FOR OFFICIAL USE ONLY i ii iii PREFACE This field manual is intended as a training text in basic

More information

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever.

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever. Cryptography Assign. 1A Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever. How to Encipher- Each letter is assigned a number beginning from k

More information

ivw-fd122 Video Wall Controller MODEL: ivw-fd122 Video Wall Controller Supports 2 x 2 Video Wall Array User Manual Page i Rev. 1.

ivw-fd122 Video Wall Controller MODEL: ivw-fd122 Video Wall Controller Supports 2 x 2 Video Wall Array User Manual Page i Rev. 1. MODEL: ivw-fd122 Video Wall Controller Supports 2 x 2 Video Wall Array User Manual Rev. 1.01 Page i Copyright COPYRIGHT NOTICE The information in this document is subject to change without prior notice

More information

69 th INTERNATIONAL ASTRONAUTICAL CONGRESS BREMEN, GERMANY 1-5 OCTOBER 2018 INSTRUCTIONS TO AUTHORS

69 th INTERNATIONAL ASTRONAUTICAL CONGRESS BREMEN, GERMANY 1-5 OCTOBER 2018 INSTRUCTIONS TO AUTHORS 69 th INTERNATIONAL ASTRONAUTICAL CONGRESS BREMEN, GERMANY 1-5 OCTOBER 2018 INSTRUCTIONS TO AUTHORS The following guidelines provide document formatting requirements and uploading instructions for authors

More information

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography Cryptography A Bit of History 1 Seminal Text on Cryptography The Codebreakers: The Story of Secret Writing by David Kahn 1967 2 Early Cryptology - India Secret writing was well known and practiced in India

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver. Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 2 Stream Ciphers ver. October 29, 2009 These slides were prepared by

More information

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1 30 March l945 page 1 TENTATIVE LIST OF ENIGMA AND OTHER MACHINE USAGES Contents 1. Naval Enigma. 2. German Army and Air Force Enigma (including a few other miscellaneous devices). 3. Commercial Type Machines.

More information

Cover Sheet. Scanning Report of Flexible Riser Pipe Section EVI /7/2005. Inspection Report

Cover Sheet. Scanning Report of Flexible Riser Pipe Section EVI /7/2005. Inspection Report Cover Sheet Document Number EVI-2005-0002 Document Date 7/7/2005 Document Title Customer -other- AEA Technologies Type Inspection Report Prepared by: Date: Reviewed by: Date: Approved by: Date: Evisive,

More information

A.M. Stephenson and His Adder (1873)

A.M. Stephenson and His Adder (1873) Vol. 13, No. 2, Fall 2004 55 A.M. Stephenson and His Adder (1873) Bob Otnes 1860 The family moves to Tolono, Illinois. ca. 1863 Stephenson starts employment with the Illinois Central Railroad as an agent,

More information

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7 Breaking Enigma Samantha Briasco-Stewart, Kathryn Hendrickson, and Jeremy Wright 1 Introduction 2 2 The Enigma Machine 2 2.1 Encryption and Decryption Process 3 2.2 Enigma Weaknesses 4 2.2.1 Encrypting

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver. Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 2 Stream Ciphers ver. October 29, 2009 These slides were prepared by

More information

The Web Cryptology Game CODEBREAKERS.EU edition 2015

The Web Cryptology Game CODEBREAKERS.EU edition 2015 Lecture 2, in which we look at the main methods of concealing information. We will learn that what used to be an unbreakable cipher can today be compared to a child play. We will also see how this children

More information

User Manual. Multi-Screen Splicing Processor J6

User Manual. Multi-Screen Splicing Processor J6 User Manual Multi-Screen Splicing Processor J6 Rev1.0.0 NS160100147 Statement Dear users, Welcome to use the J6, a multi-screen splicing processor. This manual is intended to help you to understand and

More information

Cryptography in Criminal Investigations

Cryptography in Criminal Investigations Journal of Criminal Law and Criminology Volume 26 Issue 6 March-April Article 10 Spring 1936 Cryptography in Criminal Investigations Don L. Kooken Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc

More information

ivw-fd133 Video Wall Controller MODEL: ivw-fd133 Video Wall Controller Supports 3 x 3 and 2 x 2 Video Wall Array User Manual Page i Rev. 1.

ivw-fd133 Video Wall Controller MODEL: ivw-fd133 Video Wall Controller Supports 3 x 3 and 2 x 2 Video Wall Array User Manual Page i Rev. 1. MODEL: ivw-fd133 Video Wall Controller Supports 3 x 3 and 2 x 2 Video Wall Array User Manual Rev. 1.01 Page i Copyright COPYRIGHT NOTICE The information in this document is subject to change without prior

More information

A NUMERIC COMPRESSION ALGORITHM FOR THE HP PRIME CALCULATOR DR. JACKIE F. WOLDERING HHC SEPT , 2015 NASHVILLE, TN.

A NUMERIC COMPRESSION ALGORITHM FOR THE HP PRIME CALCULATOR DR. JACKIE F. WOLDERING HHC SEPT , 2015 NASHVILLE, TN. A NUMERIC COMPRESSION ALGORITHM FOR THE HP PRIME CALCULATOR DR. JACKIE F. WOLDERING HHC SEPT. 26 27, 2015 NASHVILLE, TN. ABSTRACT VCR Plus+ Instant Programmer uses short (1 8 digit) codes to encrypt television

More information

Tube feeding systems TZ , TZM TZS TZK.

Tube feeding systems TZ , TZM TZS TZK. Tube feeding systems TZ 101-104, 201-204 TZM TZS TZK www.oystar-group.com Tube feeding technology gaining your confidence With Oystar IWK you have a most competent partner at your side for solving complex

More information

What is TEMPEST Chapter 1

What is TEMPEST Chapter 1 TEMPEST Engineering and Hardware Design Dr. Bruce C. Gabrielson, NCE 1998 What is TEMPEST Chapter 1 Introduction This text presents an overall introduction to classical information theory, basic communications

More information

Institute of Southern Punjab, Multan

Institute of Southern Punjab, Multan Institute of Southern Punjab, Multan Network Security Substitution Techniques Lecture#4 Mazhar Hussain E-mail: mazhar.hussain@isp.edu.pk Lecture 4: Substitution Techniques Polybius Cipher Playfair Cipher

More information

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University The Evolution of the Cryptologic Bombe Chris Christensen Department of Mathematics Northern Kentucky University Electronic Communications 1844 Samuel F. B. Morse: What hath God Wrought? Telegraph. 1876

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 (19) United States US 2003O152221A1 (12) Patent Application Publication (10) Pub. No.: US 2003/0152221A1 Cheng et al. (43) Pub. Date: Aug. 14, 2003 (54) SEQUENCE GENERATOR AND METHOD OF (52) U.S. C.. 380/46;

More information

Algorithmic Composition: The Music of Mathematics

Algorithmic Composition: The Music of Mathematics Algorithmic Composition: The Music of Mathematics Carlo J. Anselmo 18 and Marcus Pendergrass Department of Mathematics, Hampden-Sydney College, Hampden-Sydney, VA 23943 ABSTRACT We report on several techniques

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD IEC 61834-2 First edition 1998-08 Recording Helical-scan digital video cassette recording system using 6,35 mm magnetic tape for consumer use (525-60, 625-50, 1125-60 and 1250-50

More information

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving transmitted signal. CDMA signals can easily be hidden within the noise floor, and it is impossible to recover the desired user s signal without knowing both the user s spreading code and scrambling sequence.

More information

A-ATF (1) PictureGear Pocket. Operating Instructions Version 2.0

A-ATF (1) PictureGear Pocket. Operating Instructions Version 2.0 A-ATF-200-11(1) PictureGear Pocket Operating Instructions Version 2.0 Introduction PictureGear Pocket What is PictureGear Pocket? What is PictureGear Pocket? PictureGear Pocket is a picture album application

More information

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher Lecturers: Mark D. Ryan and David Galindo. Cryptography 2015. Slide: 90 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers

More information

V.Sorge/E.Ritter, Handout 5

V.Sorge/E.Ritter, Handout 5 06-20008 Cryptography The University of Birmingham Autumn Semester 2015 School of Computer Science V.Sorge/E.Ritter, 2015 Handout 5 Summary of this handout: Stream Ciphers RC4 Linear Feedback Shift Registers

More information

SP02 Series Tape Feeder. Operator Guide. All rights reserved Revision 1 29 Feb D-E36

SP02 Series Tape Feeder. Operator Guide. All rights reserved Revision 1 29 Feb D-E36 SP02 Series Tape Feeder SP02 Series Tape Feeder Operator Guide All rights reserved Revision 1 29 Feb 08 380D-E36 This page intentionally left blank. SP02 Series Tape Feeders Operator Guide Hover-Davis,

More information

Linkage 3.6. User s Guide

Linkage 3.6. User s Guide Linkage 3.6 User s Guide David Rector Friday, December 01, 2017 Table of Contents Table of Contents... 2 Release Notes (Recently New and Changed Stuff)... 3 Installation... 3 Running the Linkage Program...

More information

Video System Characteristics of AVC in the ATSC Digital Television System

Video System Characteristics of AVC in the ATSC Digital Television System A/72 Part 1:2014 Video and Transport Subsystem Characteristics of MVC for 3D-TVError! Reference source not found. ATSC Standard A/72 Part 1 Video System Characteristics of AVC in the ATSC Digital Television

More information

Force & Motion 4-5: ArithMachines

Force & Motion 4-5: ArithMachines Force & Motion 4-5: ArithMachines Physical Science Comes Alive: Exploring Things that Go G. Benenson & J. Neujahr City Technology CCNY 212 650 8389 Overview Introduction In ArithMachines students develop

More information

4 UNIFIED SIGNAGE MANUAL

4 UNIFIED SIGNAGE MANUAL 4 UNIFIED SIGNAGE MANUAL Introduction In order to unify the HINO brand image, this manual establishes Unified Signage Design and Installation Standards as an important element. Unified Signage is the important

More information

Perfect Localized Security of the Fourtytwofish Cipher in the Delphic Oracle Model

Perfect Localized Security of the Fourtytwofish Cipher in the Delphic Oracle Model Perfect Security of the Cipher in the Delphic Model La spatialisation de Poisson de Pharse à Trappes TELECOM ParisTech david.madore@enst.fr http://perso.enst.fr/~madore/ 2008-W14-2 1/16 1 Background on

More information

velocity standard 07 velocity features and benefits: dimensions: additional information:

velocity standard 07 velocity features and benefits: dimensions: additional information: velocity standard 07 V-S-07 Chic and robust - a highly-structural portable 10 x10 exhibit that emphasizes your identity and message seamlessly with a combinaton of fabric graphics, rigid accents and accessories.

More information

Reason Overview3. Reason Overview

Reason Overview3. Reason Overview Reason Overview3 In this chapter we ll take a quick look around the Reason interface and get an overview of what working in Reason will be like. If Reason is your first music studio, chances are the interface

More information

The perforator machine below shows in the front, the three keys. The left is for dots, the centre is for space and the right is for dashes.

The perforator machine below shows in the front, the three keys. The left is for dots, the centre is for space and the right is for dashes. MACHINE TELEGRAPHY SYSTEMS USED IN AUSTRALIA By Ron McMullen former Telegraphist, Telegraph Supervisor, Instructor, Senior Postal Clerk and Postmaster in the former Australian P.M.G. Department. The Wheatstone

More information

Lab Determining the Screen Resolution of a Computer

Lab Determining the Screen Resolution of a Computer Lab 1.3.3 Determining the Screen Resolution of a Computer Objectives Determine the current screen resolution of a PC monitor. Determine the maximum resolution for the highest color quality. Calculate the

More information

Statement SmartLCT User s Manual Welcome to use the product from Xi an NovaStar Tech Co., Ltd. (hereinafter referred to as NovaStar ). It is our great

Statement SmartLCT User s Manual Welcome to use the product from Xi an NovaStar Tech Co., Ltd. (hereinafter referred to as NovaStar ). It is our great LED Display Configuration Software SmartLCT User s Manual Software Version: V3.0 Rev3.0.0 NS110100239 Statement SmartLCT User s Manual Welcome to use the product from Xi an NovaStar Tech Co., Ltd. (hereinafter

More information

IMPORTANT NOTICE. Company name - STMicroelectronics NV is replaced with ST-NXP Wireless.

IMPORTANT NOTICE. Company name - STMicroelectronics NV is replaced with ST-NXP Wireless. IMPORTANT NOTICE Dear customer, As from August 2 nd 2008, the wireless operations of STMicroelectronics have moved to a new company, ST-NXP Wireless. As a result, the following changes are applicable to

More information

COLOUR CHANGING USB LAMP KIT

COLOUR CHANGING USB LAMP KIT TEACHING RESOURCES SCHEMES OF WORK DEVELOPING A SPECIFICATION COMPONENT FACTSHEETS HOW TO SOLDER GUIDE SEE AMAZING LIGHTING EFFECTS WITH THIS COLOUR CHANGING USB LAMP KIT Version 2.1 Index of Sheets TEACHING

More information

velocity standard 08 velocity features and benefits: dimensions:

velocity standard 08 velocity features and benefits: dimensions: velocity standard 08 V-S-08 Chic and robust - a highly-structural portable 10 x20 exhibit that emphasizes your identity and message seamlessly with a combinaton of fabric graphics, rigid accents and accessories.

More information

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Qi Ling, Tongtong Li and Jian Ren Department of Electrical & Computer Engineering Michigan State University, East Lansing,

More information

CrossLine Generator Operation Manual

CrossLine Generator Operation Manual WARRANTY MicroImage Video Systems warrants that each CL5400A is free from defects due to faulty materials or improper workmanship for a period of one (1) year. MicroImage Video Systems further warrants

More information

Convention Paper 6930

Convention Paper 6930 Audio Engineering Society Convention Paper 6930 Presented at the 121st Convention 2006 October 5 8 San Francisco, CA, USA This convention paper has been reproduced from the author's advance manuscript,

More information

Thank you for your continued support, and as always your feedback is welcome.

Thank you for your continued support, and as always your feedback is welcome. Subject: New Tait Logo Dear Sir/Madam, To visually demonstrate the importance of the relationship between Tait Communications and your business, we have created a new Tait logo for you to use. The term

More information

Rehoboth Christian College - Secondary

Rehoboth Christian College - Secondary Rehoboth Christian College - Secondary YEAR TEN 2018 PLEASE ORDER ONLINE AT www.campion.com.au USING "AWRS" AS YOUR CODE BEFORE Friday 8th December 2017 OR SEND YOUR COMPLETED LIST TO CAMPION VIA DETAILS

More information

The National Cryptologic Museum Library

The National Cryptologic Museum Library Cross References The National Cryptologic Museum Library Eugene Becker Last year, a widely published German technical author, Klaus Schmeh, e-mailed the library of the National Cryptologic Museum from

More information

Setting up the app. Press the Setting button (gear symbol) on the upper screen to go setup app. Before you

Setting up the app. Press the Setting button (gear symbol) on the upper screen to go setup app. Before you Setting up the app Press the Setting button (gear symbol) on the upper screen to go setup app. Before you simulate the air settings, be sure to configure the app s setting properly. Language Please choose

More information

DTS-12C Standalone Scrambler. User Manual

DTS-12C Standalone Scrambler. User Manual DTS-12C Standalone Scrambler User Manual Chapter 1 Product Outline 1.1 Outline DTS-12A stand alone scrambler is applied in the simultcrypt scrambling of input code stream. It can send fixed or agile word

More information

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher INTRODUCTION INTRODUCTION For centuries, some people, organisations and governments have wanted to send information secretly. Different ways of sending secret messages have been developed over time but

More information

J.M. Stewart Corporation 2201 Cantu Ct., Suite 218 Sarasota, FL Stewartsigns.com

J.M. Stewart Corporation 2201 Cantu Ct., Suite 218 Sarasota, FL Stewartsigns.com DataMax INDOOR LED MESSAGE CENTER OWNER S MANUAL QUICK START J.M. Stewart Corporation 2201 Cantu Ct., Suite 218 Sarasota, FL 34232 800-237-3928 Stewartsigns.com J.M. Stewart Corporation Indoor LED Message

More information

Quick Start Guide. Soundcraft Si Series Quick Start Guide Issue 1010

Quick Start Guide. Soundcraft Si Series Quick Start Guide Issue 1010 Quick Start Guide Soundcraft Si Series Quick Start Guide Issue 1010 Page 1 INTRODUCTION IMPORTANT Please read this manual carefully before using your mixer for the first time. Firstly, thanks for choosing

More information

Basic TV Technology: Digital and Analog

Basic TV Technology: Digital and Analog Basic TV Technology: Digital and Analog Fourth Edition Robert L. Hartwig AMSTERDAM. BOSTON. HEIDELBERG LONDON. NEW YORK. OXFORD PARIS. SAN DIEGO. SAN FRANCISCO SINGAPORE. SYDNEY TOKYO ELSEVIER Focal Press

More information

COMP2611: Computer Organization Building Sequential Logics with Logisim

COMP2611: Computer Organization Building Sequential Logics with Logisim 1 COMP2611: Computer Organization Building Sequential Logics with COMP2611 Fall2015 Overview 2 You will learn the following in this lab: building a SR latch on, building a D latch on, building a D flip-flop

More information

Adapting PV*SOL for the UK Feed-In and Export Tariffs

Adapting PV*SOL for the UK Feed-In and Export Tariffs Adapting PV*SOL for the UK Feed-In and Export Tariffs Relates to: PV*SOL premium 7.0 PV*SOL 7.0 Last Updated: 18 th Oct 2014 Scope of this Document: PV*SOL uses an economic analysis method based on the

More information

X-Sign 2.0 User Manual

X-Sign 2.0 User Manual X-Sign 2.0 User Manual Copyright Copyright 2018 by BenQ Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated

More information

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers CS555 Spring 2012/Topic 5 1 Outline and Readings Outline Stream ciphers LFSR RC4 Pseudorandomness Readings: Katz and Lindell: 3.3, 3.4.1

More information

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013 Grade School Crypto Part 1 Dr. Rick Smith, Cryptosmith October, 2013 What We ll Learn About Substitution ciphers, especially the Caesar Ciphers Algorithms and Keys Cipher Disks Cracking a cipher key using

More information

Pre-processing of revolution speed data in ArtemiS SUITE 1

Pre-processing of revolution speed data in ArtemiS SUITE 1 03/18 in ArtemiS SUITE 1 Introduction 1 TTL logic 2 Sources of error in pulse data acquisition 3 Processing of trigger signals 5 Revolution speed acquisition with complex pulse patterns 7 Introduction

More information

Appendix B: Project Literature Review

Appendix B: Project Literature Review Appendix B: Project Literature Review Student: Jonathan Wong Supervisor: Dr. Peter Smith Course Title: MSc Object Orientated Software Systems Introduction...ii 1. Pre-War History of the Enigma...ii 2.

More information

Curriculum Catalog

Curriculum Catalog 2017-2018 Curriculum Catalog 2017 Glynlyon, Inc. Table of Contents MUSIC THEORY COURSE OVERVIEW... 1 UNIT 1: RHYTHM AND METER... 1 UNIT 2: NOTATION AND PITCH... 2 UNIT 3: SCALES AND KEY SIGNATURES... 2

More information

66 th INTERNATIONAL ASTRONAUTICAL CONGRESS JERUSALEM, OCTOBER 2015 INSTRUCTIONS TO AUTHORS

66 th INTERNATIONAL ASTRONAUTICAL CONGRESS JERUSALEM, OCTOBER 2015 INSTRUCTIONS TO AUTHORS 66 th INTERNATIONAL ASTRONAUTICAL CONGRESS JERUSALEM, 12 16 OCTOBER 2015 INSTRUCTIONS TO AUTHORS The following guidelines provide document formatting requirements and uploading instructions for authors

More information

INTERVIEW WITH MANFRED MOHR: ART AS A CALCULATION

INTERVIEW WITH MANFRED MOHR: ART AS A CALCULATION Pau Waelder, Manfred Mohr: Art as a Calculation, Arte y Cultura Digital, June 2012 INTERVIEW WITH MANFRED MOHR: ART AS A CALCULATION 22 junio 2012 by Pau Waelder in Entrevistas Manfred Mohr. Photo: bitforms

More information

PSM-003. Micro Polarization Controller/Scrambler. User Guide

PSM-003. Micro Polarization Controller/Scrambler. User Guide PSM-003 Micro Polarization Controller/Scrambler User Guide Version: 1.0 Date: August 23, 2012 General Photonics, Incorporated is located in Chino California. For more information visit the company's website

More information

Operations. BCU Operator Display BMTW-SVU02C-EN

Operations. BCU Operator Display BMTW-SVU02C-EN Operations BCU Operator Display BMTW-SVU02C-EN Operations BCU Operator Display Tracer Summit BMTW-SVU02C-EN June 2006 BCU Operator Display Operations This guide and the information in it are the property

More information

Re-Reading Harry Potter

Re-Reading Harry Potter Re-Reading Harry Potter Also by Suman Gupta LITERATURE AND GLOBALIZATION SOCIAL CONSTRUCTIONIST IDENTITY POLITICS AND LITERARY STUDIES THE THEORY AND REALITY OF DEMOCRACY: A Case Study in Iraq THE REPLICATION

More information

The Cult Of Pythagoras: Math And Myths By Alberto A. Martinez

The Cult Of Pythagoras: Math And Myths By Alberto A. Martinez The Cult Of Pythagoras: Math And Myths By Alberto A. Martinez If searched for the ebook The Cult of Pythagoras: Math and Myths by Alberto A. Martinez in pdf form, then you have come on to right website.

More information

Rehoboth Christian College - Secondary

Rehoboth Christian College - Secondary Rehoboth Christian College - Secondary YEAR NINE 2018 PLEASE ORDER ONLINE AT www.campion.com.au USING "AWRS" AS YOUR CODE BEFORE Friday 8th December 2017 OR SEND YOUR COMPLETED LIST TO CAMPION VIA DETAILS

More information

ANALOGUE AND DIGITAL ELECTRONICS STUDENT S WORKBOOK U1: INTRODUCTION

ANALOGUE AND DIGITAL ELECTRONICS STUDENT S WORKBOOK U1: INTRODUCTION ANALOGUE AND DIGITAL ELECTRONICS STUDENT S WORKBOOK U1: INTRODUCTION Joaquim Crisol Llicència D, Generalitat de Catalunya NILE Norwich, April of 2011 Table of contents Table of contents 1 INTRODUCTION

More information

by Samantha Rabe HOUGHTON MIFFLIN

by Samantha Rabe HOUGHTON MIFFLIN by Samantha Rabe HOUGHTON MIFFLIN by Samantha Rabe PHOTOGRAPHY CREDITS: Cover Lake County Museum/CORBIS. 1 Bettmann/CORBIS. 2 Lake County Museum/ CORBIS. 3 The Granger Collection, New York. 4 American

More information

ART I: UNIT NINE CALLIGRAPHY

ART I: UNIT NINE CALLIGRAPHY Unit 9 ART I: UNIT NINE CALLIGRAPHY CONTENTS INTRODUCTION............................... 1 I. PRACTICE.................................... 3 Proper Positioning............................. 3 Roman Alphabet................................

More information

Classic Cats 2013 Calendar (Multilingual Edition)

Classic Cats 2013 Calendar (Multilingual Edition) Classic Cats 2013 Calendar (Multilingual Edition) If you are searching for the book Classic Cats 2013 Calendar (Multilingual Edition) in pdf format, in that case you come on to loyal site. We presented

More information

ALGEBRAIC PURE TONE COMPOSITIONS CONSTRUCTED VIA SIMILARITY

ALGEBRAIC PURE TONE COMPOSITIONS CONSTRUCTED VIA SIMILARITY ALGEBRAIC PURE TONE COMPOSITIONS CONSTRUCTED VIA SIMILARITY WILL TURNER Abstract. We describe a family of musical compositions constructed by algebraic techniques, based on the notion of similarity between

More information

Note: This document should only be used as a reference and should not replace assignment guidelines.

Note: This document should only be used as a reference and should not replace assignment guidelines. APA Quick Guide Note: This document should only be used as a reference and should not replace assignment guidelines. Page numbers below refer to the APA Manual 6 th edition, 2 nd printing. Title Page (pp.

More information

Word Tutorial 2: Editing and Formatting a Document

Word Tutorial 2: Editing and Formatting a Document Word Tutorial 2: Editing and Formatting a Document Microsoft Office 2010 Objectives Create bulleted and numbered lists Move text within a document Find and replace text Check spelling and grammar Format

More information

Contents Circuits... 1

Contents Circuits... 1 Contents Circuits... 1 Categories of Circuits... 1 Description of the operations of circuits... 2 Classification of Combinational Logic... 2 1. Adder... 3 2. Decoder:... 3 Memory Address Decoder... 5 Encoder...

More information

Instruction for Locking Tuner s Carriage(s) before Shipping

Instruction for Locking Tuner s Carriage(s) before Shipping Instruction for Locking Tuner s Carriage(s) before Shipping Step 1. Configure tuner properties and verify connection From ATS block diagram view, double click on the tuner that needs to be locked. The

More information