Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

You need to write reply to this post with 2 APA format references.

LD Thomas Jefferson created a cipher system using 26 wheels with the alphabet randomly scattered on each wheel. The wheels were arranged with a specified order. This order is the encryption key to the encryption algorithm. The message to be encrypted is spelled on the wheels by lining up the wheels such that the message is shown.

The ciphertext is any other line not containing the original message. The person decrypting the ciphertext must arrange the wheels according to the key.

As the ciphertext is made on the wheels, the plaintext is lined up somewhere else on the wheels. Viewing the wheels quickly reveals the words of the plaintext. There is an extremely small chance that more than one non-gibberish message will emerge on the wheels during decryption.

The United States Army rediscovered and reinvented the wheel cipher over a hundred years After Jefferson first conceived it. The Army used this system from 1923 to 1942. The US Navy also used this system and it was broken by the Germans, this assisted in creating in "the second happy time" from January 1942 to about August of that year.

In this time, German U-boat captains caused extensive death and destruction. The hunting was good for Capt Reinhard Hardegen who in U-123 sank seven ships totaling 46,744 tons before he ran out of torpedoes and returned to base. It can be argued that war is evil and it can be proven that some good came from the United States Army's use of encryption, cryptography, and codes.

It is clear that the army being able to communicate in encrypted code is a good thing as the loss of secrecy and security in communications can have disastrous effects on human casualties and destruction. It is also reasonably clear that operating in secrecy can cause destruction and loss of life on the side of the enemy.

Encryption used by warring forces is definitely a two-edged sword. That has stunning results good and bad. Failure in cryptography is also known to provide stunning results and if the failure is bad enough can cause battles as well as the war, in general, to be lost.

The Bible speaks much about war in Psalms 144:1(KJV) - "(A Psalm of David.) Blessed [be] the LORD my strength, which teacheth my hands to war, [and] my fingers to fight:" the Bible seems to indicate that wars are a reality.

References Budanovic, N. (2018). Operation Drumbeat - U-Boat Happy Days On The USA East Coast. WAR HISTORY ONLINE.

USS Pampanito - CSP-488. (2018). Maritime website.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92758994
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

In terms of reducing the total number of memory accesses a

In terms of reducing the total number of memory accesses a program might require. Using the arithmetic expression S = (A+B)-(C+D), support this statement.

Q1 the market for apples is perfectly competitive say a

Q1. The market for apples is perfectly competitive. Say a typical firm has a marginal cost function of MC(q) = 2q. (1) The optimal quantity of apples to produce is 10 for the typical firm. How much revenue does the firm ...

Question suppose that a remote transmitter sends a message

Question : Suppose that a remote transmitter sends a message at 2500 Baud and the receiver is expecting the data rate to be 2400 Baud. Calculate the accumulated sample error for one character. Give the answer in bits.

You are the security manager for a mid-sized company 3000

You are the security manager for a mid-sized company (3,000 to 5,000 employees). Your company has determined that confidentiality (or privacy) and data integrity are the security services you must provide to your work fo ...

The following data is the results of a random sample of the

The following data is the results of a random sample of the ages (in years) of 12 houses in a community: 18, 22, 23, 19, 18, 24, 26, 20, 17, 12, 27, 28. Assume the population is normal. Construct a 90% confidence interva ...

What statistic was calculated to determine differences

What statistic was calculated to determine differences between the intervention and control groups for the lumbar and femur neck BMDs? Were the groups significantly different for BMDs?

Question what are some risks of the project development

Question : What are some risks of the project development process you might encounter and what can you do to mitigate or avoid the problems? The response must be typed, single spaced, must be in times new roman font (siz ...

Question nested lists and cascading style sheetsdeliverable

Question: Nested Lists and Cascading Style Sheets Deliverable: Three (3) Web pages and two (2) Cascading Style Sheets (.css) Complete the weekly lab based on the following: • Write the code for each lab assignment. • The ...

When a source operand is ambiguous such as a value defined

When a source operand is ambiguous, such as a value defined as CR EQU 0DH, which can be either a 16 bit value or an 8 bit value, how can the ambiguity be removed. This is typical of an error staring "Is it byte or word?" ...

Find minimal dfas for the following languages in each case

Find minimal dfa's for the following languages. In each case prove that the result is minimal. (1) L = {a n bm> :n≥2,m≥1}. (2)L = {a n :n ≥ 0,n ≠ 3} (3) L = {a n :n mod 3 = 0}∪{a n : n mod 5 = 1}

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As