Preview

Encryption in the Zimmerman Telegram

Satisfactory Essays
Open Document
Open Document
287 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Encryption in the Zimmerman Telegram
Doing some research about the "Zimmermann Telegram" (image shown below) and then answer the following questions:
1) Which technique was used in encrypting this telegram: substitution, transposition/permutation or steganography?
2) If you were an intelligence officer, what lessons you could learn from this "weak" encryption?
(There is no need to decrypt the telegram yourself. It requires lots of efforts to solve this puzzle, even though the classical encryption technique dates back to a hundred years ago.)
Image of Zimmermann Telegram: zimmermann.jpg

1. Upon doing my own research, since I do not know anything about encryption, Ibelieve the technique used in encrypting this specific telegram is substitution. I came to this reasoning because transposition involves the positioning of the letters/numbers, such as columnar positioning and includes a more complicated order; steganography is when a hidden message is part of something else, like an image, article, in a list or other form of language. Stenography is intended to not attract attention to the message itself. The specific telegram we are looking at obviously looks coded and is not covert at all, that is how I ruled out stenography. I ruled out transposition because our telegram’s codes are positioned as if each set of numbers is a word. Then the signature at the end definitely leads me to believe it is the format of a letter.

2. If I was an intelligence officer, something I could learn from this weak encryption is that if I need to send a message, I need to definitely use something more complex, because when using substitution, once someone catches on to the pattern, it will get easier and easier to code the message . Honestly, I would use stenography as much as possible.

You May Also Find These Documents Helpful

  • Good Essays

    How do you crack something with 158 million million million possible combinations? Many countries have tried, but ultimately failed to accomplish their goal. The movie The Imitation Game accurately portrays the historical events of the era. It correctly informs the viewer on how the Nazis communicated using a machine called enigma, it also shows an accurate depiction of Bletchley Park and the work of cracking enigma and the things they did to ensure that nobody found out about their work, and it also accurately focuses on Alan Turing and his work on creating a machine to instantly crack messages. The Nazis used the extremely complex enigma code for communication purposes. The British worked on cracking enigma at Bletchley Park and were very secretive about their…

    • 1412 Words
    • 6 Pages
    Good Essays
  • Best Essays

    Zimmerman Telegram Notes

    • 1034 Words
    • 5 Pages

    In the telegram Zimmermann reveals Germany’s plan to restart unrestricted submarine warfare the US territory is offered to Mexico in return for joining the German Cause.…

    • 1034 Words
    • 5 Pages
    Best Essays
  • Good Essays

    Home to numerous U.S presidents and first ladies, this presidential palace is the world’s most famous residence of unexplainable footsteps, weird knockings, slamming of doors, and even the sensation of cold chills, all reported by many government officials and workers. Abraham Lincoln, who is said to have foreseen his own death, is reported to be the most frequent visitor to the assembly, walking the huge halls and loitering around the Lincoln Bedroom which served as his office during his presidency. During World War II, British Prime Minister Winston Churchill supposedly refused to stay in the Lincoln Bedroom after seeing the dead president one night. One former seamstress worker reported; she heard the laughter and felt the spirit of Andrew Jackson, has he leaned over her while she was hemming a bedspread in his old bedroom. But not only presidents and first ladies roam this building. The ghost of Annie Surratt,…

    • 854 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The beginning of chapter 5 discusses the importance of cryptography and the legislative issues that surround government access. The debate of whether the government should have access to all encryptions we use, ultimately giving them total ability to read all communication to help fight crime and terrorism or if that is a breach of personal space. As the text attests to, "the tension between enabling secure conduct of electronic commerce and preventing secret communication among outlaws had been in the air for a decade" (Abelson, Ledeen, and Lewis 163). Later however, the government turned to helping citizens and businesses encrypt their messages to ultimately keep more information secure through packets from the construction of a system of routers (Abelson, Ledeen, and Lewis 164). However as technology has improved, the ability to create new encryption systems is…

    • 773 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Mayflower Paper

    • 2116 Words
    • 2 Pages

    the first fifty­five years of the Pilgrims' life, and their journey to, and through the New…

    • 2116 Words
    • 2 Pages
    Powerful Essays
  • Powerful Essays

    Report of the Select Committee on Intelligence United States Senate Covering the Period January 4, 2007 to January 2, 2009. U.S. Government Printing Office, Washington, D.C. March 9, 2009. http://www.gpo.gov/fdsys/pkg/CRPT-111srpt6/pdf/CRPT-111srpt6.pdf.…

    • 17193 Words
    • 69 Pages
    Powerful Essays
  • Powerful Essays

    “It [the telegraph] worked by transmitting electrical signals over a wire laid between stations” (“Morse Code and The Telegraph”). Basically, the telegraph would send electrical impulses over a long wire laid between two points connected by telegraph stations, and once the electricity hit the other station it would pick up the impulses. These electrical impulses were received in a code of dots and dashes called Morse code made by Samuel Morse (Mountjoy 32). Samuel Morse was one of the top contributors to the telegraph along with William Sturgeon and Joseph Henry (Doss 40; Mountjoy 32). Shockingly, the messages sent by telegraph were delivered almost instantly no matter how far (Mountjoy 30). Additionally, these messages were called telegrams, cablegrams, wires, and a cable because of the way they were sent (31). Before the war, the war department in the government did not have the telegraph. To communicate, they sent letters by a person on horseback (Wheeler). By the time the war started, there were about 50,000 miles of telegraph wires strung (Mountjoy 33). In 1857, the Confederates only had 107 telegraph stations compared to the 1,467 that the Union had (Allen and Allen 116). Because of the need to communicate during the war, the Union established a telegraph corps in 1661 with 1,200 operators. To gain an advantage in battle, soldiers would carry telegraph lines into battle areas and other places…

    • 1488 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The Zimmerman Telegram

    • 394 Words
    • 2 Pages

    The Zimmerman telegram was originally sent by Authur Zimmerman, the German Foreign Secretary on to the German Ambassador in the United States, and directed to the German ambassador in Mexico, von Eckhardt. The subsequent events that instigated the release of the Zimmerman Telegram began with German’s policy of unrestricted submarine warfare. This policy allowed German U-boats to attack merchant ships without warning, in hopes of undermining the British by blocking their line of supply from North America. The United States remained neutral at the time, however in 1915, a German U-boat sunk the British ocean liner Lusitania. The ship consisted mostly of passengers, in which 159 Americans had died. The Sussex Pledge was issued as another sinking of a French ship called, ‘The Sussex,’ caused many American casualties. The US president, Woodrow Wilson became concerned and proposed this ultimatum stating that US would break off diplomatic relations if Germany did not stop sinking passenger ships. However, this did not last long as Germany was outraged over the British naval blockade that deprived thm of supplies and food. Germany abandoned the pledge and in response, the United States cut their diplomatic relations with Germany. The Zimmerman telegram was released on March 1, 1917 to divert United States away from going to war with Germany on the Allies side. The telegram listed that Germany would return to the policy of unrestricted submarine warfare, regardless of the neutrality of the US. It proposed an offer of military alliance to Mexico, in which Germany would provide financial aid and the return of their lost states, Texas, Mexico and Arizona. The telegram further advised Mexico to form an alliance with Japan to form a new Pacific and Central front, which would pose as a threat to the United States if war was declared. Germany’s plan was to use these alliances as a distraction to the United States on their Southern…

    • 394 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Espionage During Wwii

    • 1258 Words
    • 6 Pages

    The sender would type the message in plaintext (not encrypted) and the letters would be illuminated on a glass screen. With the press of each typewriter key the rotor would shift 1/26 of a revolution giving each letter a different encryption each time, which made the code so difficult to crack. Due to the complexity of the code the enigma became very useful for the Germans for radioing messages to u-boats. The cipher was finally broken when the British were able to capture some key documents from a German warship.…

    • 1258 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    7) List and discuss some of the weaknesses associated with U.S. intelligence in the aftermath of September 11, 2001.…

    • 1029 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    In January 1917, the British intercepted a telegram being sent by Germany to Mexico. In the telegram Germany said if Mexico helped Germany defeat the United States then they would help Mexico get their land back from the United States. Although it is argued that the Zimmerman telegram was fake and simply a ploy by England to get the United States involved in the war, it did get the United States involved in the war.…

    • 452 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Text messaging, also referred to as SMS messaging, is a popular form of mediated, interpersonal communication that involves sending short messages to and from individual’s cell phones through a or cellular connection to converse with individuals at anyplace and anytime all over the world. Created in 1992 by Neil Papworth, an engineer for Vodaphone, a software company in England, the first text message was sent by Papworth to an executive of the company attending a Christmas party in a separate building; the message of the first ever text message simply read, “Merry Christmas”, it wouldn’t be until the next year that texting would be available to the general public (Peritz, 2012). So at mere 23 years old, Texting is one of the youngest mediums…

    • 1150 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cognitive Design

    • 343 Words
    • 2 Pages

    A Thousand Splendid Suns by Khalid Hosseini is seen through the eyes of two young female protagonists, who have a strong and well-developed character. In the novel, the author shows their hardship, their lives in a hopeless society, Afghanistan, and how throughout their life they face cruelty and vulnerability.…

    • 343 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Counter Terrorism

    • 2173 Words
    • 9 Pages

    As noted by Carera (2005), the theme of intelligence reform is still fresh in the United States, and with the creation of the Director of National Intelligence (DNI), we can appreciate how deep the concerns over intelligence failure in recent years have been. At the heart of this development lie issues of funding, structure and methodology, of which we are concerned with the last of the three. In order to address the issues surrounding the methodology of collecting intelligence for counter terrorism, we first look at definitions of the intelligence terminology referred to, along with an explanation of the current focus of the debate. We then identify how the modern terrorist threat differs from the traditional Cold War enemy, before suggesting reasons why over reliance on one form of intelligence gathering is wrong. We concentrate on a western perspective of intelligence, in particular, the experiences of the United States. This approach allows us to keep a focus on the issue without wandering into inappropriate areas of debate.…

    • 2173 Words
    • 9 Pages
    Best Essays
  • Good Essays

    Technology Synthesis Essay

    • 1003 Words
    • 5 Pages

    As technology grows the ways of communicating continue to become more effective. We have the ability to communicate through cell phones and the internet. The advancement in technology has invented the way of texting on a cell phone or using the social media on the internet. Lynne Truss, the author of The Joy of Texting, gives a great example of what texting is by saying “texting is a supremely secretive medium of communication-its like passing a note…” Using the example of passing a note is a great way of interpreting a text because no one knows what the text says and it…

    • 1003 Words
    • 5 Pages
    Good Essays

Related Topics