2. Navajo Code Talkers
These were field cryptographers breaking out a whole new
code.
Before the code-talkers, easy, well-known algorithms were all
that were available.
Right before the Navajo Code-Talkers, A few Comanche
Indians were used for code-talkers.
5. Why did they use the Navajo Language?
Was Philip Johnston the real mastermind?
6. Why did they use the Navajo Language?
Was Philip Johnston the real mastermind?
Why was he credited?
7. 1st Age of NSA Encrption
After the code-talkers, in 1952, the NSA was created.
The first generation of NSA Encryption was
electromechanical.
These were modeled after the very crude models worked on
in the WWII.
8. 2nd Age of NSA Encryption
These were made in the 1970's.
They were all electronically designed and based on vacuuim
tubes.
They used morse code and an alternating encryption
algorithm.
9. 3rd Age of NSA Encryption
Made in the 1980’s.
Integrated circuits, smaller units.
Easier maintenance, stronger algorithms.
10. 4th Age of NSA Encryption
Made in the 1990’s.
Electronic key distribution. Commercial packaging.
Even less maintenance.
11. 5th Age of NSA Encryption
Modern encryption.
Computer networking, largely machine based.
Practically runs itself.
12. Why?
In our advancing society, everything is relying less on
people, including encryption, it’s just the times.
No system is better than the other, they accomplish the same
thing.
14. Works Cited
"Melville Klein, "Securing Record Communications: The TSEC/KW-26", 2003,
NSA brochure, p. 4.
Thomas R. Johnson (2009-12-18). ""American Cryptology during the Cold War,
1945-1989.Book III: Retrenchment and Reform, 1972-1980, page
232"" (html). NSA, DOCID 3417193 (file released on 2009-12-18, hosted at
cryptome.org). http://cryptome.org/0001/nsa-meyer.htm. Retrieved
2010-01-03.
Official Site of the Navajo Code Talkers. Web. 02 Feb. 2010. <http://
www.navajocodetalkers.org>.