1,347
3
Essay, 2 pages (250 words)

Zimmermann telegram and encryption assignment

Doing some research about the “ Zimmermann Telegram” (image shown below) and then answer the following questions: 1) Which technique was used in encrypting this telegram: substitution, transposition/permutation or stenography? 2) If you were an intelligence officer, what lessons you could learn from this “ weak” encryption? (There is no need to decrypt the telegram yourself. It requires lots of efforts to solve this puzzle, even though the classical encryption technique dates back to a hundred years ago. ) Image of Zimmermann Telegram: Zimmermann. Jpg 1 .

Upon doing my own research, since I do not know anything about encryption, Believe the technique used in encrypting this specific telegram is substitution. Came to this reasoning because transposition involves the positioning of the letters/numbers, such as columnar positioning and includes a more complicated order; stenography is when a hidden message is part of something else, like an image, article, in a list or other form of language. Stenography is intended to not attract attention to the message itself. The specific telegram we are looking at obviously looks coded and is not covert at al, that is how I ruled out stenography. Led out transposition because our telegram’s codes are positioned as if each set of numbers is a word. Then the signature at the end definitely leads me to believe it is the format of a letter. 2. If I was an intelligence officer, something I could learn from this weak encryption is that if I need to send a message, need to definitely use something more complex, because when using substitution, once someone catches on to the pattern, it will get easier and easier to code the message . Honestly, I would use stenography as much as possible.

Thank's for Your Vote!
Zimmermann telegram and encryption assignment. Page 1
Zimmermann telegram and encryption assignment. Page 2

This work, titled "Zimmermann telegram and encryption assignment" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'Zimmermann telegram and encryption assignment'. 17 December.

Reference

AssignBuster. (2021, December 17). Zimmermann telegram and encryption assignment. Retrieved from https://assignbuster.com/zimmermann-telegram-and-encryption-assignment/

References

AssignBuster. 2021. "Zimmermann telegram and encryption assignment." December 17, 2021. https://assignbuster.com/zimmermann-telegram-and-encryption-assignment/.

1. AssignBuster. "Zimmermann telegram and encryption assignment." December 17, 2021. https://assignbuster.com/zimmermann-telegram-and-encryption-assignment/.


Bibliography


AssignBuster. "Zimmermann telegram and encryption assignment." December 17, 2021. https://assignbuster.com/zimmermann-telegram-and-encryption-assignment/.

Work Cited

"Zimmermann telegram and encryption assignment." AssignBuster, 17 Dec. 2021, assignbuster.com/zimmermann-telegram-and-encryption-assignment/.

Get in Touch

Please, let us know if you have any ideas on improving Zimmermann telegram and encryption assignment, or our service. We will be happy to hear what you think: [email protected]