Rose Mary Sheldon

Total Page:16

File Type:pdf, Size:1020Kb

Rose Mary Sheldon 1 The Friedman Collection: An Analytical Guide Rose Mary Sheldon 2 In Memoriam David Atlee Phillips ―It‘s a dirty job, but somebody has to do it.‖ 3 Preface and Grateful Acknowledgements No project of this size could be attempted or completed without the help of many other people. First and foremost I must thank Brian Shaw, President of the George C. Marshall Foundation and Paul B. Barron, Director of the Library and Archives for their permission to publish the collection. The staff of the Library, both past and present, was exceedingly helpful in getting the materials to me, especially JoAnn Hartog and Anne Wells, who arranged to have items delivered to the reading room before the Friedman Room itself was open to researchers. Peggy Dillard, now Director of the Woodrow Wilson Library in Staunton, Virginia, granted me unfettered access to the Friedman Collection and facilitated this publication in many ways. I thank my secretary Deneise Shafer for helping with the data input stage and helping to prepare the manuscript. Judy Rogers edited the final manuscript and the accuracy of the text is due entirely to her. Paul B. Barron, in particular, has understood the importance of getting this guide online and out to the interested public. A printed manuscript would not only have been too long to publish, but also too cumbersome to use, not to mention the time it would have taken to index the work. Now, researchers can simply scan the complete catalogue for topics of interest. We plan to update the work if corrections need to be made or if missing items are found. Readers who may have information on the missing items or who may wish to donate copies of the missing items are welcome to contact the Marshall Library The Friedman Collection would not be nearly as complete if it were not for the work of Megan Newman, the Inter-Library Loan officer at VMI. She provided us with duplicate copies of many articles that had disappeared from the collection and have now been replaced. She verified the bibliographical information on a good many more entries. The Staff of the Preston Library at the Virginia Military Institute has always been supportive of my projects. 4 William F. Friedman: A Man and His Collection William F. Friedman has always been famous among cryptographers. Since the publication of Ronald W. Clark‘s The Man Who Broke Purple: The Life of Colonel William F. Friedman, (London: Weidenfeld & Nicolson, 1977), however, he has become even better known to the general public. For anyone left not knowing about his work, Friedman was the U.S. Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s. In the late 1930s, subordinates of his led by Frank Rowlett broke Japan's PURPLE cipher, thus disclosing Japanese diplomatic secrets beginning before World War II. William F. Friedman was married to Elizebeth Smith Friedman a cryptanalyst and author, and a pioneer in U.S. cryptography. Too often referred to only as William Friedman‘s wife, she is credited with numerous contributions to cryptology, and she enjoyed many successes in her own right. It was Elizebeth who first introduced her husband to the field. Together, these superbly talented people collected a library of books on cryptography and actual cryptographic machines that included everything from a Captain Midnight decoder ring to an actual Enigma machine. As they served the military, worked for various departments of the government, and raised a family they continued to add to the collection until William Friedman‘s death in 1969. Mrs. Friedman sent the collection to the Marshall Library in 1970 consisting of 74 boxes, 3 items (desk, file cabinet, card file), author file by author and decimal number, contracts, and donation papers. WFF (as he will be referred to hereafter) was a collector of information not a collector of rare books. He was happy to have Xerox copies of originals. Unlike Charles Jastrow Mendelsohn, who built the largest collection of antiquarian books on cryptology in the world, the Friedmans 5 did not have that kind of expendable cash for collecting purposes. WFF was interested in the content of the book and its importance in the history of cryptology. The Mendelsohn Collection is now housed in the Rare Books and Manuscript Department of the Van Pelt-Dietrich Library of the University of Pennsylvania. Fortunately for the Marshall Library, WFF became Mendelsohn‘s literary executor and many of the items that are now in the FC are copies of Mendelsohn‘s originals. WFF‘s library helped him to write the many public and classified lectures he gave over the years. His knowledge of the history of cryptology was so immense and his collection so replete with materials, that when the NSA commissioned him to write the history of cryptology in six lectures, he found it immensely difficult. The scope of the lectures he planned did not include World War II, which he wanted to leave for a new contract. M The first thing one notices about the Friedman Collection (hereafter referred to as the FC), is that there are some items missing. This had nothing to do with the efficiency of the Friedmans or the Marshall Library. Because of a little known statute passed in 1957, some of the material was reclassified by NSA and removed. When the―Restricted‖ classification used during World War II had been lifted by Executive Order No. 10503, effective 15 December 1953, it meant many of the items in the FC could be made public. However, five years later, DOD Directive 5200.1, dated 8 July 1957, made all material related to cryptologic systems previously classified Restricted upgraded to Confidential. At first WFF did not even know about the DOD directive until told by NSA. WFF wrote in a document dated October 22, 1969: ―What to do about those early writings of mine which are still held in the vaults of the NSA and copies of which I was not permitted to retain? I have practically given up hope of being able, at long last, to get those things released so that they might be integrated with the things included in my gift to 6 the Marshall Library.‖ All of the old Signal Corps Bulletins were affected and WFF was unable to republish some of his earlier articles on topics such as the Zimmermannn Telegram. The law also applied to his Elements of Cryptanalysis and his technical brochures. There is an NSA transmittal form for the classified documents taken from his house on June 26, 1959. They included: 1. An envelope with his lecture cards. 2. COMINT hard facts on the Cold War 3. Machine identification of words 4. Envelope of misc. memos, regulations, etc. 5. First three lectures of his contract 6. Marine Corps lecture series. Draft and final copies 7. Lectures given at SCAMP 1958. 6 folders and cards. 8. The Zimmermannn Telegram lecture 9. One folder marked NSA Consultant 10. Folder of receipts 11. One folder marked NSA Scientific Advisory Board. WFF also sent back the Principles of the Solution of Military Field Codes used by the German Army in 1917. German Military Ciphers from February to November 1918, Studies in German Diplomatic Codes employed during the World War. American Army Field Codes in the AEF Forces during the First World War, Field Codes Used by the German Army during the World War and General Solution for the ADFGVX Cipher System, Statistical Methods of Cryptanalysis, Statistics for Cryptology, The Zimmermannn Telegram of January 16, 1917 and 7 its cryptographic background, Military Cryptanalysis pts 1-4. All of these had previously been in WFF‘s collection. These documents have now been returned to the FC by NSA. WFF was not a great fan of the classification system used by the U.S. Government. In Item 1102, for example, he cites on article on cryptography in the American Civil War that was marked ―Unclassified‖ and yet an article on cryptography in Greek and Roman times is labeled ―restricted‖! Why the NSA would classify codes from WWI was incomprehensible to him. WFF himself wrote in Item 1405.1 that ―The days when hand ciphers were all that were available are gone.‖ Automation in cryptography had already been used for over a dozen years when he wrote those words. ―Even the smallest nations,‖ he said, ―don‘t care a fig about them.‖ Yet the NSA hung onto all of the material. It seemed bizarre that NSA took copies of certain books from the FC and yet they remained available in the Mendelsohn Collection and from the Library of Congress. In a letter of September 10, 1991, Glenn S. Cook, Archivist Librarian at the Marshall Library sent Ms. Jean Schable of the National Archives Declassification Bureau, 34 folders of material in three boxes marked ―Classified.‖ Cook wrote: ―This is all of the classified material that had been held in security . at the Marshall Library. Much of the material consisted of microfilm reels. Of those items marked ―From the Friedman Collection‖ 34 are letters between Lester Bensinger and WFF (1942). There are also numerous letters between WFF and Boris Hagelin (1945), letters between Hedden and WFF and vice versa. Letters between Yves Gylden and WFF (1938, 1945), letters between General Canine and WFF, and Qvarnstrom. There is an oral history interview with Wm. G. Foster (August 5, 1964); A memo from Ch. Morrissey to Ned Nordness, Letters to General Canine from Penny, and audio cassette interview with Mrs. Friedman (80 page transcript), and a Xeroxed memo from W.B.
Recommended publications
  • United States Navy and World War I: 1914–1922
    Cover: During World War I, convoys carried almost two million men to Europe. In this 1920 oil painting “A Fast Convoy” by Burnell Poole, the destroyer USS Allen (DD-66) is shown escorting USS Leviathan (SP-1326). Throughout the course of the war, Leviathan transported more than 98,000 troops. Naval History and Heritage Command 1 United States Navy and World War I: 1914–1922 Frank A. Blazich Jr., PhD Naval History and Heritage Command Introduction This document is intended to provide readers with a chronological progression of the activities of the United States Navy and its involvement with World War I as an outside observer, active participant, and victor engaged in the war’s lingering effects in the postwar period. The document is not a comprehensive timeline of every action, policy decision, or ship movement. What is provided is a glimpse into how the 20th century’s first global conflict influenced the Navy and its evolution throughout the conflict and the immediate aftermath. The source base is predominately composed of the published records of the Navy and the primary materials gathered under the supervision of Captain Dudley Knox in the Historical Section in the Office of Naval Records and Library. A thorough chronology remains to be written on the Navy’s actions in regard to World War I. The nationality of all vessels, unless otherwise listed, is the United States. All errors and omissions are solely those of the author. Table of Contents 1914..................................................................................................................................................1
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • Quantum Cryptography Without Basis Switching 2004
    Quantum Cryptography Without Basis Switching Christian Weedbrook B.Sc., University of Queensland, 2003. A thesis submitted for the degree of Bachelor of Science Honours in Physics The Australian National University October 2004 ii iii Listen, do you want to know a secret? Do you promise not to tell? - John Lennon and Paul McCartney iv Declaration This thesis is an account of research undertaken with the supervision of Dr Ping Koy Lam, Dr Tim Ralph and Dr Warwick Bowen between February 2004 and October 2004. It is a partial fulfilment of the requirements for the degree of a Bachelor of Science with Honours in theoretical physics at the Australian National University, Canberra, Australia. Except where acknowledged in the customary manner, the material presented in this thesis is, to the best of my knowledge, original and has not been submitted in whole or part for a degree in any university. Christian Weedbrook 29th October 2004 v vi Acknowledgements During the three years of residency, it was the relationships that got you through. - J.D., Scrubs I have met a lot of people during my Honours year, and a lot of people to thank and be thankful for. First I would like to thank my supervisors Ping Koy Lam, Tim Ralph, Warwick Bowen and my “unofficial” supervisor Andrew Lance. Ping Koy, thank you for your positive approach and enthusiasm. It was excellent having you as my supervisor, as you have many ideas and the ability to know the best way to proceed. I would like to thank you for my scholarship and also for organizing that I could do my Honours at ANU, and to spend some time up at UQ.
    [Show full text]
  • VISIT to BLETCHLEY PARK
    REPORT of STAR GROUP – VISIT to BLETCHLEY PARK It was 8-30 on the damp drizzly Monday morning of 5th October when our intrepid group of bleary-eyed third-agers left Keyworth to visit the former codebreaking and cipher centre at Bletchley Park. As we progressed south along the M1 motorway the weather started to clear and by the time we arrived in Milton Keynes the rain and drizzle had stopped. For me the first stop was a cup of coffee in the Block C Visitor Centre. We moved out of the Visitor Centre and towards the lake. We were told that many a wartime romantic coupling around this beautiful lake had led to marriage. The beautiful Bletchley Park Lake So… Moving on. We visited the Mansion House with it’s curious variety of styles of architecture. The original owners of the estate had travelled abroad extensively and each time they returned home they added an extension in the styles that they visited on their travels. The Mansion House At the Mansion we saw the sets that had been designed for the Film “The Imitation Game.” The attention to detail led one to feel that you were back there in the dark days of WWII. History of The Mansion Captain Ridley's Shooting Party The arrival of ‘Captain Ridley's Shooting Party’ at a mansion house in the Buckinghamshire countryside in late August 1938 was to set the scene for one of the most remarkable stories of World War Two. They had an air of friends enjoying a relaxed weekend together at a country house.
    [Show full text]
  • COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere a Long & Rich History
    COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere A Long & Rich History Examples: • ~50 B.C. – Caesar Cipher • 1587 – Babington Plot • WWI – Zimmermann Telegram • WWII – Enigma • 1976/77 – Public Key Cryptography • 1990’s – Widespread adoption on the Internet Increasingly Important COS 433 Practice Theory Inherent to the study of crypto • Working knowledge of fundamentals is crucial • Cannot discern security by experimentation • Proofs, reductions, probability are necessary COS 433 What you should expect to learn: • Foundations and principles of modern cryptography • Core building blocks • Applications Bonus: • Debunking some Hollywood crypto • Better understanding of crypto news COS 433 What you will not learn: • Hacking • Crypto implementations • How to design secure systems • Viruses, worms, buffer overflows, etc Administrivia Course Information Instructor: Mark Zhandry (mzhandry@p) TA: Fermi Ma (fermima1@g) Lectures: MW 1:30-2:50pm Webpage: cs.princeton.edu/~mzhandry/2017-Spring-COS433/ Office Hours: please fill out Doodle poll Piazza piaZZa.com/princeton/spring2017/cos433mat473_s2017 Main channel of communication • Course announcements • Discuss homework problems with other students • Find study groups • Ask content questions to instructors, other students Prerequisites • Ability to read and write mathematical proofs • Familiarity with algorithms, analyZing running time, proving correctness, O notation • Basic probability (random variables, expectation) Helpful: • Familiarity with NP-Completeness, reductions • Basic number theory (modular arithmetic, etc) Reading No required text Computer Science/Mathematics Chapman & Hall/CRC If you want a text to follow along with: Second CRYPTOGRAPHY AND NETWORK SECURITY Cryptography is ubiquitous and plays a key role in ensuring data secrecy and Edition integrity as well as in securing computer systems more broadly.
    [Show full text]
  • A Covert Encryption Method for Applications in Electronic Data Interchange
    Technological University Dublin ARROW@TU Dublin Articles School of Electrical and Electronic Engineering 2009-01-01 A Covert Encryption Method for Applications in Electronic Data Interchange Jonathan Blackledge Technological University Dublin, [email protected] Dmitry Dubovitskiy Oxford Recognition Limited, [email protected] Follow this and additional works at: https://arrow.tudublin.ie/engscheleart2 Part of the Digital Communications and Networking Commons, Numerical Analysis and Computation Commons, and the Software Engineering Commons Recommended Citation Blackledge, J., Dubovitskiy, D.: A Covert Encryption Method for Applications in Electronic Data Interchange. ISAST Journal on Electronics and Signal Processing, vol: 4, issue: 1, pages: 107 -128, 2009. doi:10.21427/D7RS67 This Article is brought to you for free and open access by the School of Electrical and Electronic Engineering at ARROW@TU Dublin. It has been accepted for inclusion in Articles by an authorized administrator of ARROW@TU Dublin. For more information, please contact [email protected], [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License A Covert Encryption Method for Applications in Electronic Data Interchange Jonathan M Blackledge, Fellow, IET, Fellow, BCS and Dmitry A Dubovitskiy, Member IET Abstract— A principal weakness of all encryption systems is to make sure that the ciphertext is relatively strong (but not that the output data can be ‘seen’ to be encrypted. In other too strong!) and that the information extracted is of good words, encrypted data provides a ‘flag’ on the potential value quality in terms of providing the attacker with ‘intelligence’ of the information that has been encrypted.
    [Show full text]
  • IMPLEMENTASI ALGORITMA CAESAR, CIPHER DISK, DAN SCYTALE PADA APLIKASI ENKRIPSI DAN DEKRIPSI PESAN SINGKAT, Lumasms
    Prosiding Seminar Ilmiah Nasional Komputer dan Sistem Intelijen (KOMMIT 2014) Vol. 8 Oktober 2014 Universitas Gunadarma – Depok – 14 – 15 Oktober 2014 ISSN : 2302-3740 IMPLEMENTASI ALGORITMA CAESAR, CIPHER DISK, DAN SCYTALE PADA APLIKASI ENKRIPSI DAN DEKRIPSI PESAN SINGKAT, LumaSMS Yusuf Triyuswoyo ST. 1 Ferina Ferdianti ST. 2 Donny Ajie Baskoro ST. 3 Lia Ambarwati ST. 4 Septiawan ST. 5 1,2,3,4,5Jurusan Manajemen Sistem Informasi, Universitas Gunadarma [email protected] Abstrak Short Message Service (SMS) merupakan salah satu cara berkomunikasi yang banyak digunakan oleh pengguna telepon seluler. Namun banyaknya pengguna telepon seluler yang menggunakan layanan SMS, tidak diimbangi dengan faktor keamanan yang ada pada layanan tersebut. Banyak pengguna telepon seluler yang belum menyadari bahwa SMS tidak menjamin integritas dan keamanan pesan yang disampaikan. Ada beberapa risiko yang dapat mengancam keamanan pesan pada layanan SMS, diantaranya: SMS spoofing, SMS snooping, dan SMS interception. Untuk mengurangi risiko tersebut, maka dibutuhkan sebuah sistem keamanan pada layanan SMS yang mampu menjaga integritas dan keamanan isi pesan. Dimana tujuannya ialah untuk menutupi celah pada tingkat keamanan SMS. Salah satu penanggulangannya ialah dengan menerapkan algoritma kriptografi, yaitu kombinasi atas algoritma Cipher Disk, Caesar, dan Scytale pada pesan yang akan dikirim. Tujuan dari penulisan ini adalah membangun aplikasi LumaSMS, dengan menggunakan kombinasi ketiga algoritma kriptografi tersebut. Dengan adanya aplikasi ini diharapkan mampu mengurangi masalah keamanan dan integritas SMS. Kata Kunci: caesar, cipher disk, kriptografi, scytale, SMS. PENDAHULUAN dibutuhkan dikarenakan SMS mudah digunakan dan biaya yang dikeluarkan Telepon seluler merupakan salah untuk mengirim SMS relatif murah. satu hasil dari perkembangan teknologi Namun banyaknya pengguna komunikasi.
    [Show full text]
  • Improved Cryptosystem Using SDES Algorithm with Substitution Ciphers G.Suman * , Ch
    Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved Cryptosystem Using SDES Algorithm with Substitution Ciphers G.Suman * , Ch. Krishna M. Tech (SE) & SNIST. India Abstract— Security is playing a very important and crucial role in the field of network communication system and Internet. Simplified Data encryption standard (SDES) is a private key cryptography system that provides the security in communication system but now a days the advancement in the computational power the SDES seems to be weak against the brute force attacks. To improve the security of SDES algorithm the substitution techniques are added before the SDES algorithm to perform its process. By using an Improved Cryptosystem the security has been improved which is very crucial in the communication and field of Internet. If the substitution techniques are used before the original SDES algorithm then the intruder required first to break the original SDES algorithm and then substitution techniques. So the security is more as compared to a SDES algorithm. Keywords— Cipher text, Decryption, SDES, Encryption, Plain text, OPBFT,OPBTS ,Substitution. I. Introduction The process of encoding the plaintext into cipher text is called Encryption and the process of decoding ciphers text to plaintext is called Decryption. This can be done by two techniques symmetric-key cryptography and asymmetric key cryptography. Symmetric key cryptography involves the usage of the same key for encryption and decryption. But the Asymmetric key cryptography involves the usage of one key for encryption and another different key for decryption.
    [Show full text]
  • I – Basic Notions
    Provable Security in the Computational Model I – Basic Notions David Pointcheval MPRI – Paris Ecole normale superieure,´ CNRS & INRIA ENS/CNRS/INRIA Cascade David Pointcheval 1/71 Outline Cryptography Provable Security Basic Security Notions Conclusion ENS/CNRS/INRIA Cascade David Pointcheval 2/71 Cryptography Outline Cryptography Introduction Kerckhoffs’ Principles Formal Notations Provable Security Basic Security Notions Conclusion ENS/CNRS/INRIA Cascade David Pointcheval 3/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... With the all-digital world, security needs are even stronger ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Old Methods Substitutions and permutations Security relies on the secrecy of the mechanism ENS/CNRS/INRIA Cascade David Pointcheval 5/71 Old Methods Substitutions and permutations Security relies on the secrecy of the mechanism Scytale - Permutation ENS/CNRS/INRIA
    [Show full text]
  • Pioneers in U.S. Cryptology Ii
    PIONEERS IN U.S. CRYPTOLOGY II This brochure was produced by the Center for Cryptologic History Herbert 0. Yardley 2 Herbert 0. Yardley Herbert 0 . Yardley was born in 1889 in Worthington, Indiana. After working as a railroad telegrapher and spending a year taking an English course at the University of Chicago, he became a code clerk for the Department of State. In June 1917, Yardley received a commission in the Signal Officers Reserve Corps; in July Colonel Ralph Van Deman appointed him chief of the new cryptanalytic unit, MI-8, in the Military Intelligence division. MI-8, or the Cipher Bureau, consisted of Yardley and two clerks. At MI-8's peak in November 1918, Yardley had 18 officers, 24 civilians, and 109 typists. The section had expanded to include secret inks, code and cipher compilation, communications, and shorthand. This was the first formally organized cryptanalytic unit in the history of the U.S. government. When World War I ended, the Army was considering disbanding MI-8. Yardley presented a persuasive argument for retaining it for peacetime use. His plan called for the permanent retention of a code and cipher organization funded jointly by the State and War Departments. He demonstrated that in the past eighteen months MI-8 had read almost 11,000 messages in 579 cryptographic systems. This was in addition to everything that had been examined in connection with postal censorship. On 17 May Acting Secretary of State Frank L. Polk approved the plan, and two days later the Army Chief of Staff, General Peyton C.
    [Show full text]
  • An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext
    An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext By Isaac Quinn DuPont A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by Isaac Quinn DuPont 2017 ii An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext Isaac Quinn DuPont Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract Tis dissertation is an archeological study of cryptography. It questions the validity of thinking about cryptography in familiar, instrumentalist terms, and instead reveals the ways that cryptography can been understood as writing, media, and computation. In this dissertation, I ofer a critique of the prevailing views of cryptography by tracing a number of long overlooked themes in its history, including the development of artifcial languages, machine translation, media, code, notation, silence, and order. Using an archeological method, I detail historical conditions of possibility and the technical a priori of cryptography. Te conditions of possibility are explored in three parts, where I rhetorically rewrite the conventional terms of art, namely, plaintext, encryption, and ciphertext. I argue that plaintext has historically been understood as kind of inscription or form of writing, and has been associated with the development of artifcial languages, and used to analyze and investigate the natural world. I argue that the technical a priori of plaintext, encryption, and ciphertext is constitutive of the syntactic iii and semantic properties detailed in Nelson Goodman’s theory of notation, as described in his Languages of Art. I argue that encryption (and its reverse, decryption) are deterministic modes of transcription, which have historically been thought of as the medium between plaintext and ciphertext.
    [Show full text]
  • Tsetusuo Wakabayashi, Revealed
    Tsetusuo Wakabayashi, Revealed By Dwight R. Rider Edited by Eric DeLaBarre Preface Most great works of art begin with an objective in mind; this is not one of them. What follows in the pages below had its genesis in a research effort to determine what, if anything the Japanese General Staff knew of the Manhattan Project and the threat of atomic weapons, in the years before the detonation of an atomic bomb over Hiroshima in August 1945. That project drew out of an intense research effort into Japan’s weapons of mass destruction programs stretching back more than two decades; a project that remains on-going. Unlike a work of art, this paper is actually the result of an epiphany; a sudden realization that allows a problem, in this case the Japanese atomic energy and weapons program of World War II, to be understood from a different perspective. There is nothing in this paper that is not readily accessible to the general public; no access to secret documents, unreported interviews or hidden diaries only recently discovered. The information used in this paper has been, for the most part, available to researchers for nearly 30 years but only rarely reviewed. The paper that follows is simply a narrative of a realization drawn from intense research into the subject. The discoveries revealed herein are the consequence of a closer reading of that information. Other papers will follow. In October of 1946, a young journalist only recently discharged from the US Army in the drawdown following World War II, wrote an article for the Atlanta Constitution, the premier newspaper of the American south.
    [Show full text]