This Electronic Thesis Or Dissertation Has Been Downloaded from Explore Bristol Research

Total Page:16

File Type:pdf, Size:1020Kb

This Electronic Thesis Or Dissertation Has Been Downloaded from Explore Bristol Research This electronic thesis or dissertation has been downloaded from Explore Bristol Research, http://research-information.bristol.ac.uk Author: Diepenbroek, Martine L M Title: Myths and Histories of the Spartan scytale A comprehensive review and reassessment of the extant sources describing the cryptographic Spartan device known as the scytale to challenge the view promoted by modern historians of cryptography that denies the scytale its deserved status as a vehicle for secret communication in the ancient world General rights Access to the thesis is subject to the Creative Commons Attribution - NonCommercial-No Derivatives 4.0 International Public License. A copy of this may be found at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode This license sets out your rights and the restrictions that apply to your access to the thesis so it is important you read this before proceeding. Take down policy Some pages of this thesis may have been removed for copyright restrictions prior to having it been deposited in Explore Bristol Research. However, if you have discovered material within the thesis that you consider to be unlawful e.g. breaches of copyright (either yours or that of a third party) or any other law, including but not limited to those relating to patent, trademark, confidentiality, data protection, obscenity, defamation, libel, then please contact [email protected] and include the following information in your message: •Your contact details •Bibliographic details for the item, including a URL •An outline nature of the complaint Your claim will be investigated and, where appropriate, the item in question will be removed from public view as soon as possible. Myths and Histories of the Spartan scytale A comprehensive review and reassessment of the extant sources describing the cryptographic Spartan device known as the scytale to challenge the view promoted by modern historians of cryptography that denies the scytale its deserved status as a vehicle for secret communication in the ancient world Martine Loekie Mariska Diepenbroek A dissertation submitted to the University of Bristol in accordance with the requirements for the award of the degree of Doctor of Philosophy in the Faculty of Arts School of Humanities Department of Classics and Ancient History Date of submission: January 2020 Word count: 69.727 (excluding footnotes, references, and appendices) Abstract The current study is a comprehensive review and reassessment of the extant sources describing the cryptographic Spartan device known as the scytale, to challenge the view promoted by modern historians of cryptography that denies the scytale its deserved status as a vehicle for secret communication in the ancient world. Modern historians of cryptography see the scytale essentially as a simple ‘stick’ that would have served little practical use as a vehicle for secret communication. Yet, this study seeks to demonstrate that the cryptographic principles employed in the Spartan scytale show an encryption and coding system that is no less complex than some 20th century transposition ciphers. It will be shown that, contrary to the accepted point of view, scytale encryption is as complex and secure as other known ancient ciphers. The study will draw salient comparisons with a selection of modern transposition ciphers (and their historical predecessors), and offer a detailed review and comprehensive new analysis of the surviving classical sources that similarly reveal the potential of the scytale as an actual cryptographic tool in ancient Sparta in order to illustrate the relative sophistication of the Spartan scytale as a practical device for secret communication. This helps to establish the conceptual basis that the scytale would, in theory, have offered its ancient users a potentially secure method for secret communication – particularly over long distances. The study will be complemented by two appendices to the work in which an overview is given of all surviving ancient literary sources on cryptography and steganography as well as an overview of all extant medieval, Renaissance, and modern sources referring back to these classical sources, making this study the most comprehensive collection of Greek and Roman cryptographic and steganographic sources created so far – and thereby making an original and significant contribution to the current scholarship on the ancient history of cryptography. 2 Dedication and acknowledgements My thanks and appreciation to my supervisors at the University of Bristol. First, many thanks to Professor Neville Morley, who supervised me during my first year, and who helped me to start the research, and to create a plan to make it possible to finish the research and dissertation within the duration of the course. Secondly, many thanks to Dr. Genevieve Liveley who became my supervisor at the end of the first year, and who helped me to get through my upgrade process. Your enthusiasm, support, and valuable comments have been a major help throughout the duration of the course. It certainly improved my writing and research skills in many ways. My thanks also go to Dr. Isabella Sandwell for acting as my second supervisor throughout the duration of the course, to Professor Patrick Finglass for proofreading various drafts of the dissertation and especially for his invaluable suggestions on Herodotus. I also thank Dr. Amy Coker for being my upgrade assessor at the end of the first year. Many thanks and appreciation also to Dr. John Black, an independent historian and researcher, for acting as my advisor and for proofreading parts of the dissertation throughout the time it took me to complete this research and to write the dissertation. Finally, on a more personal note, I would like to thank everyone at the Bristol International Student Centre (BISC) with whom I worked during my Ph.D. years in Bristol next to my studies. Thank you all for being great friends who always supported me, and for often enquiring after my research and my personal well-being! Special thanks go to Eve Scott for proofreading the final draft and for being a great friend over the years. And most importantly, this dissertation is dedicated to my parents who have always been extremely supportive in countless ways, since I was a little girl. You have always believed that studying Classics and Ancient History was an excellent choice for me, and I agree. Therefore, this work 3 is for you. I am very grateful for the support and help that I have received from every one of you. Otherwise, I would not have been able to complete my research degree. 4 Author’s declaration I declare that the work in this dissertation was carried out in accordance with the requirements of the University’s Regulations and Code of Practice for Research Degree Programmes and that it has not been submitted for any other academic award. Except where indicated by specific reference in the text, the work is the candidate’s own work. Work done in collaboration with, or with the assistance of, others, is indicated as such. Any views expressed in the dissertation are those of the author. The prologue of the thesis is based on a publication on part of the research: Diepenbroek, M. L. M. (2019). From Fire Signals to ADFGX. A case study in the Adaptation of Ancient Methods of Secret Communication. KLEOS - The Amsterdam Bulletin of Ancient Studies and Archaeology, 63-76. References to the publication are also made in chapters 3 and 5. SIGNED: DATE: 5 Table of Contents Abstract ................................................................................................................................................... 2 Dedication and acknowledgements ......................................................................................................... 3 Author’s declaration ................................................................................................................................ 5 Table of Contents .................................................................................................................................... 6 List of tables and illustrative material ..................................................................................................... 9 Introduction ........................................................................................................................................... 11 Working definitions: steganography and cryptography .................................................................... 15 Overview ........................................................................................................................................... 17 Review of literature ........................................................................................................................... 19 Research methodology ...................................................................................................................... 32 Prologue ................................................................................................................................................ 35 Chapter 1: Ancient steganography: Herodotus’ contributions .............................................................. 51 1.1: Ancient cryptography and steganography ................................................................................. 52 1.1.1: Bellerophon’s tablet ............................................................................................................ 54 1.2: Secret communication in Herodotus’ Histories
Recommended publications
  • Quantum Cryptography Without Basis Switching 2004
    Quantum Cryptography Without Basis Switching Christian Weedbrook B.Sc., University of Queensland, 2003. A thesis submitted for the degree of Bachelor of Science Honours in Physics The Australian National University October 2004 ii iii Listen, do you want to know a secret? Do you promise not to tell? - John Lennon and Paul McCartney iv Declaration This thesis is an account of research undertaken with the supervision of Dr Ping Koy Lam, Dr Tim Ralph and Dr Warwick Bowen between February 2004 and October 2004. It is a partial fulfilment of the requirements for the degree of a Bachelor of Science with Honours in theoretical physics at the Australian National University, Canberra, Australia. Except where acknowledged in the customary manner, the material presented in this thesis is, to the best of my knowledge, original and has not been submitted in whole or part for a degree in any university. Christian Weedbrook 29th October 2004 v vi Acknowledgements During the three years of residency, it was the relationships that got you through. - J.D., Scrubs I have met a lot of people during my Honours year, and a lot of people to thank and be thankful for. First I would like to thank my supervisors Ping Koy Lam, Tim Ralph, Warwick Bowen and my “unofficial” supervisor Andrew Lance. Ping Koy, thank you for your positive approach and enthusiasm. It was excellent having you as my supervisor, as you have many ideas and the ability to know the best way to proceed. I would like to thank you for my scholarship and also for organizing that I could do my Honours at ANU, and to spend some time up at UQ.
    [Show full text]
  • COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere a Long & Rich History
    COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere A Long & Rich History Examples: • ~50 B.C. – Caesar Cipher • 1587 – Babington Plot • WWI – Zimmermann Telegram • WWII – Enigma • 1976/77 – Public Key Cryptography • 1990’s – Widespread adoption on the Internet Increasingly Important COS 433 Practice Theory Inherent to the study of crypto • Working knowledge of fundamentals is crucial • Cannot discern security by experimentation • Proofs, reductions, probability are necessary COS 433 What you should expect to learn: • Foundations and principles of modern cryptography • Core building blocks • Applications Bonus: • Debunking some Hollywood crypto • Better understanding of crypto news COS 433 What you will not learn: • Hacking • Crypto implementations • How to design secure systems • Viruses, worms, buffer overflows, etc Administrivia Course Information Instructor: Mark Zhandry (mzhandry@p) TA: Fermi Ma (fermima1@g) Lectures: MW 1:30-2:50pm Webpage: cs.princeton.edu/~mzhandry/2017-Spring-COS433/ Office Hours: please fill out Doodle poll Piazza piaZZa.com/princeton/spring2017/cos433mat473_s2017 Main channel of communication • Course announcements • Discuss homework problems with other students • Find study groups • Ask content questions to instructors, other students Prerequisites • Ability to read and write mathematical proofs • Familiarity with algorithms, analyZing running time, proving correctness, O notation • Basic probability (random variables, expectation) Helpful: • Familiarity with NP-Completeness, reductions • Basic number theory (modular arithmetic, etc) Reading No required text Computer Science/Mathematics Chapman & Hall/CRC If you want a text to follow along with: Second CRYPTOGRAPHY AND NETWORK SECURITY Cryptography is ubiquitous and plays a key role in ensuring data secrecy and Edition integrity as well as in securing computer systems more broadly.
    [Show full text]
  • Simple Substitution and Caesar Ciphers
    Spring 2015 Chris Christensen MAT/CSC 483 Simple Substitution Ciphers The art of writing secret messages – intelligible to those who are in possession of the key and unintelligible to all others – has been studied for centuries. The usefulness of such messages, especially in time of war, is obvious; on the other hand, their solution may be a matter of great importance to those from whom the key is concealed. But the romance connected with the subject, the not uncommon desire to discover a secret, and the implied challenge to the ingenuity of all from who it is hidden have attracted to the subject the attention of many to whom its utility is a matter of indifference. Abraham Sinkov In Mathematical Recreations & Essays By W.W. Rouse Ball and H.S.M. Coxeter, c. 1938 We begin our study of cryptology from the romantic point of view – the point of view of someone who has the “not uncommon desire to discover a secret” and someone who takes up the “implied challenged to the ingenuity” that is tossed down by secret writing. We begin with one of the most common classical ciphers: simple substitution. A simple substitution cipher is a method of concealment that replaces each letter of a plaintext message with another letter. Here is the key to a simple substitution cipher: Plaintext letters: abcdefghijklmnopqrstuvwxyz Ciphertext letters: EKMFLGDQVZNTOWYHXUSPAIBRCJ The key gives the correspondence between a plaintext letter and its replacement ciphertext letter. (It is traditional to use small letters for plaintext and capital letters, or small capital letters, for ciphertext. We will not use small capital letters for ciphertext so that plaintext and ciphertext letters will line up vertically.) Using this key, every plaintext letter a would be replaced by ciphertext E, every plaintext letter e by L, etc.
    [Show full text]
  • IMPLEMENTASI ALGORITMA CAESAR, CIPHER DISK, DAN SCYTALE PADA APLIKASI ENKRIPSI DAN DEKRIPSI PESAN SINGKAT, Lumasms
    Prosiding Seminar Ilmiah Nasional Komputer dan Sistem Intelijen (KOMMIT 2014) Vol. 8 Oktober 2014 Universitas Gunadarma – Depok – 14 – 15 Oktober 2014 ISSN : 2302-3740 IMPLEMENTASI ALGORITMA CAESAR, CIPHER DISK, DAN SCYTALE PADA APLIKASI ENKRIPSI DAN DEKRIPSI PESAN SINGKAT, LumaSMS Yusuf Triyuswoyo ST. 1 Ferina Ferdianti ST. 2 Donny Ajie Baskoro ST. 3 Lia Ambarwati ST. 4 Septiawan ST. 5 1,2,3,4,5Jurusan Manajemen Sistem Informasi, Universitas Gunadarma [email protected] Abstrak Short Message Service (SMS) merupakan salah satu cara berkomunikasi yang banyak digunakan oleh pengguna telepon seluler. Namun banyaknya pengguna telepon seluler yang menggunakan layanan SMS, tidak diimbangi dengan faktor keamanan yang ada pada layanan tersebut. Banyak pengguna telepon seluler yang belum menyadari bahwa SMS tidak menjamin integritas dan keamanan pesan yang disampaikan. Ada beberapa risiko yang dapat mengancam keamanan pesan pada layanan SMS, diantaranya: SMS spoofing, SMS snooping, dan SMS interception. Untuk mengurangi risiko tersebut, maka dibutuhkan sebuah sistem keamanan pada layanan SMS yang mampu menjaga integritas dan keamanan isi pesan. Dimana tujuannya ialah untuk menutupi celah pada tingkat keamanan SMS. Salah satu penanggulangannya ialah dengan menerapkan algoritma kriptografi, yaitu kombinasi atas algoritma Cipher Disk, Caesar, dan Scytale pada pesan yang akan dikirim. Tujuan dari penulisan ini adalah membangun aplikasi LumaSMS, dengan menggunakan kombinasi ketiga algoritma kriptografi tersebut. Dengan adanya aplikasi ini diharapkan mampu mengurangi masalah keamanan dan integritas SMS. Kata Kunci: caesar, cipher disk, kriptografi, scytale, SMS. PENDAHULUAN dibutuhkan dikarenakan SMS mudah digunakan dan biaya yang dikeluarkan Telepon seluler merupakan salah untuk mengirim SMS relatif murah. satu hasil dari perkembangan teknologi Namun banyaknya pengguna komunikasi.
    [Show full text]
  • Download Full-Text
    IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 4, No 2, July 2013 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784 www.IJCSI.org 89 An Eccentric Scheme for Oblivious Communication Khan Farhan Rafat and Muhammad Sher Department of Computer Science, International Islamic University Islamabad, 44000, Pakistan alphabets and then threading the yarn through these holes Abstract in an order which when detached spelt out letters of hidden Trust is the foremost requirement in any form of communication. message in its correct sequence [3]: Building trust through physical contact, gesture etc. is easy but hard to establish in electronic data communication as one can’t “padielaporsymesarponomeuaspeludynmalpreaxo” be sure of the presence of the intended recipient at the other end. “Ave Maria” is yet another smart method for encoding This necessitated the need to devise and suggest covert schemes secret message where list of distinct words for each unique for oblivious communication that only the intended recipient may alphabet are grouped in a series of Tables. For every unveil. Steganography is one such technique where information alphabet constituting the message, word corresponding to to be sent is seamlessly superimposed on the carrier such that it that letter from the set of Tables gets substituted and easily crosses the information confronting barriers without appeared as innocent rhyme whenever the Tables are used detection. This paper endeavors at evolving a data hiding scheme in sequence. envisaged by Shannon and in adherence to Kerchoff’s principle that hides secret information inside statistically random English Cardano introduced the “Grille System” [4] where every alphabets appearing as cryptogram.
    [Show full text]
  • Curriculum Back Up
    Thucydides and Euripides: The Changing Civic and Moral Values during the Peloponnesian War Mary Ann T. Natunewicz INTRODUCTION This unit is part of a two-semester course taken by tenth graders in the second half of the school year. The course is team-taught by an art teacher and by a language teacher, with one nine-week semester devoted to art and the other nine-week semester to Greek literature, mythology and history. The school is on an accelerated block schedule and the class meets every day for 90 minutes. Smaller sections of this unit could be used in the Ancient History part of a World History course or a literature course that included Greek tragedy. The unit described below is in the literature semester of the course. It has been preceded by a three-week unit on Greek mythology. It will be followed by two weeks spent reading other Greek drama. The approximate length of the unit is four weeks. DISCUSSION OF THE UNIT One of the most fascinating periods that can be studied is fifth century B.C. Greece. So much was happening–painting and sculpture were flowering, scientists and philosophers were speculating on the nature of the universe, playwrights vied with one another in the dramatic contests, storytellers and poets were in demand, citizens were actively involved in running many states and historians were grappling with the significance of both ancient and current events. But what happens when a world war envelops this flourishing culture? What changes occur in individuals and in states? The general aim of this curriculum is to examine the view of late fifth century B.C.
    [Show full text]
  • I – Basic Notions
    Provable Security in the Computational Model I – Basic Notions David Pointcheval MPRI – Paris Ecole normale superieure,´ CNRS & INRIA ENS/CNRS/INRIA Cascade David Pointcheval 1/71 Outline Cryptography Provable Security Basic Security Notions Conclusion ENS/CNRS/INRIA Cascade David Pointcheval 2/71 Cryptography Outline Cryptography Introduction Kerckhoffs’ Principles Formal Notations Provable Security Basic Security Notions Conclusion ENS/CNRS/INRIA Cascade David Pointcheval 3/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Secrecy of Communications One ever wanted to communicate secretly The treasure Bob is under Alice …/... With the all-digital world, security needs are even stronger ENS/CNRS/INRIA Cascade David Pointcheval 4/71 Old Methods Substitutions and permutations Security relies on the secrecy of the mechanism ENS/CNRS/INRIA Cascade David Pointcheval 5/71 Old Methods Substitutions and permutations Security relies on the secrecy of the mechanism Scytale - Permutation ENS/CNRS/INRIA
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]
  • An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext
    An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext By Isaac Quinn DuPont A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by Isaac Quinn DuPont 2017 ii An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext Isaac Quinn DuPont Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract Tis dissertation is an archeological study of cryptography. It questions the validity of thinking about cryptography in familiar, instrumentalist terms, and instead reveals the ways that cryptography can been understood as writing, media, and computation. In this dissertation, I ofer a critique of the prevailing views of cryptography by tracing a number of long overlooked themes in its history, including the development of artifcial languages, machine translation, media, code, notation, silence, and order. Using an archeological method, I detail historical conditions of possibility and the technical a priori of cryptography. Te conditions of possibility are explored in three parts, where I rhetorically rewrite the conventional terms of art, namely, plaintext, encryption, and ciphertext. I argue that plaintext has historically been understood as kind of inscription or form of writing, and has been associated with the development of artifcial languages, and used to analyze and investigate the natural world. I argue that the technical a priori of plaintext, encryption, and ciphertext is constitutive of the syntactic iii and semantic properties detailed in Nelson Goodman’s theory of notation, as described in his Languages of Art. I argue that encryption (and its reverse, decryption) are deterministic modes of transcription, which have historically been thought of as the medium between plaintext and ciphertext.
    [Show full text]
  • Taschenchiffriergerat CD-57 Seite 1
    s Taschenchiffriergerat CD-57 Seite 1 Ubung zu Angewandter Systemtheorie Kryptog raph ie SS 1997 - Ubungsleiter^ Dr. Josef Scharinger Taschenchiffriergerat CD-57 Michael Topf, Matr.Nr. 9155665, Kennz. 880 <?- Cm Johannes Kepler Universitat Linz Institut fur Systemwissenschaften Abteilung fur Systemtheorie und Informationstechnik Michael Topf Ubung zu Angewandter Systemtheorie: Kryptographic Seite 2 Taschenchiffriergerat CD-57 I n ha I ts verzei c h n i s I n h a l t s v e r z e i c h n i s 2 Einleitung 3 B o r i s H a g e l i n 3 Die Hagelin M-209 Rotormaschine 3 Das Taschenchiffriergerat CD-57 4 Die Crypto AG 5 Funktionsweise 6 Kryptographisches Prinzip 6 Mechanische Realisierung 7 Black-Box-Betrachtung 7 S c h i e b e r e g i s t e r 8 Ausgangsgewichtung und Summierung. 8 Daten 9 Anfangszustand der Schieberegister (Stiftposition) 9 Gewichtung der Schieberegister-Ausgange (Position der Anschlage) 9 Softwaremodell \\ Quelltext «CD-57.C » \\ Beispiel 12 Schliisseleinstellungen « Schluessel.txt » 12 Primartext « Klartext.txt » 13 Programmaufruf 13 Sekundartext « Geheimtext.txt » 13 Abbildungsverzeichnis 14 Tabellenverzeichnis 14 Quellenverzeichnis , 14 Ubung zu Angewandter Systemtheorie: Kryptographie Michael Topf Taschenchiffriergerat CD-57 Seite 3 Ei nleitu ng Der geistige Vater des betrachtelen Chiffriergerats sowie einer Reihe verwandter Gerate ist der Schwede Boris Hagelin. Daher sollen einleitend er, die Familie der Rotor-Kryptographierer sowie die von ihm gegriindete Schweizer Firma Crypto AG, vorgestellt werden. B o r i s H a g e l i n Boris Hagelin war ein Visionar, der bereits zu seiner Zeit die Probleme der Informationstechnologie erkannte.
    [Show full text]
  • Determining the Significance of Alliance Athologiesp in Bipolar Systems: a Case of the Peloponnesian War from 431-421 BCE
    Wright State University CORE Scholar Browse all Theses and Dissertations Theses and Dissertations 2016 Determining the Significance of Alliance athologiesP in Bipolar Systems: A Case of the Peloponnesian War from 431-421 BCE Anthony Lee Meyer Wright State University Follow this and additional works at: https://corescholar.libraries.wright.edu/etd_all Part of the International Relations Commons Repository Citation Meyer, Anthony Lee, "Determining the Significance of Alliance Pathologies in Bipolar Systems: A Case of the Peloponnesian War from 431-421 BCE" (2016). Browse all Theses and Dissertations. 1509. https://corescholar.libraries.wright.edu/etd_all/1509 This Thesis is brought to you for free and open access by the Theses and Dissertations at CORE Scholar. It has been accepted for inclusion in Browse all Theses and Dissertations by an authorized administrator of CORE Scholar. For more information, please contact [email protected]. DETERMINING THE SIGNIFICANCE OF ALLIANCE PATHOLOGIES IN BIPOLAR SYSTEMS: A CASE OF THE PELOPONNESIAN WAR FROM 431-421 BCE A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts By ANTHONY LEE ISAAC MEYER Dual B.A., Russian Language & Literature, International Studies, Ohio State University, 2007 2016 Wright State University WRIGHT STATE UNIVERSITY SCHOOL OF GRADUATE STUDIES ___April 29, 2016_________ I HEREBY RECOMMEND THAT THE THESIS PREPARED UNDER MY SUPERVISION BY Anthony Meyer ENTITLED Determining the Significance of Alliance Pathologies in Bipolar Systems: A Case of the Peloponnesian War from 431-421 BCE BE ACCEPTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Master of Arts. ____________________________ Liam Anderson, Ph.D.
    [Show full text]
  • Cipher Disk A
    Make It@Home: Cipher Disk A. Materials 1 Tack 1 Small Cipher Disk 1 Large Cipher Disk 1 Small Eraser Scissors B. Directions 1. Download and print the Cipher Disk.pdf document. 2. Cut out the two cipher disks. 3. Put the smaller disk on top of the larger disk and stick the tack thru the center of both disks. 4. Stick the sharp end of the tack into the eraser. This will prevent you from sticking yourself while turning the disks to make your ciphers. C. Encrypting A Code 1. Pick a letter from the smaller disk on top - this will be used as the KEY that will be shared between you and your friends to encrypt and decrypt the message. Once you have picked a letter from the smaller disk, line it up with the “A” from the larger disk. Example Key: LARGE DISK: A SMALL DISK: M KEY = A:M 2. Begin encrypting each letter of your secret message. Find the first letter of your message on the larger disk and write down the cipher letter which appears underneath it on the smaller disk. In the example below, A=M, B=L, C=K, etc. LARGE DISK: ABCDEFGHIJKLMNOPQRSTUVWXYZ SMALL DISK: MLKJIHGFEDCBAZYXWVUTSRQPON 3. Continue finding each letter until your message has been encrypted. Once you are finished, send your friend the encrypted message and KEY seperately. PLAINTEXT: MAKING CODES IS FUN CIPHERTEXT: AMCEZG KYJIU EU HSZ NOTE: Make sure your friend knows the KEY so they can use their Cipher Disk to break the code. For a super secure cipher, create a new KEY every time you send a message OR change the KEY every time you encrypt a letter.
    [Show full text]