Francis Raven
   HOME





Francis Raven
Francis Raven (April 26, 1914 – December 1983) was an American cryptologist and an early employee of the National Security Agency. He helped to crack many codes to assist the United States during World War II. He also helped the NSA's training program by creating two cryptology courses. Early career He graduated from Yale University in 1934 and joined the United States Navy as a reserve officer, where he was assigned to the Naval Security Group. His commission was reactivated in 1940 and he rejoined the NSG, working on Japanese problems with Agnes Driscoll. After a brief period working on German ciphers, he returned to Japanese issues, and he was part of a group that systematically solved many of the low level codes starting in 1942. These were important as a source of cribs used in working the JN-25 fleet code. He also worked on the JADE and CORAL machines, both of which were successfully cracked. After the war years After the war, he stayed on as a civilian employee of the NS ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Cryptologist
This is a list of cryptographers. Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. Pre twentieth century * Al-Khalil ibn Ahmad al-Farahidi: wrote a (now lost) book on cryptography titled the "''Book of Cryptographic Messages''". * Al-Kindi, 9th century Arabic polymath and originator of frequency analysis. * Athanasius Kircher, attempts to decipher crypted messages * Augustus the Younger, Duke of Brunswick-Lüneburg, wrote a standard book on cryptography * Ibn Wahshiyya: published several cipher alphabets that were used to encrypt magic formulas. * John Dee, wrote an occult book, which in fact was a cover for crypted text * Ibn 'Adlan: 13th-century cryptographer who made important contributions on the sample size of the frequency analysis. * Duke of Mantua Francesco I Gonzaga is the one who used the earliest example of homophonic Substitution cipher in early 1400s. * Ibn al-Durayhim: gave detailed ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for global intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees. Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of personnel and budget. Still, information available as of 2013 indicates that the C ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Yale University
Yale University is a Private university, private Ivy League research university in New Haven, Connecticut, United States. Founded in 1701, Yale is the List of Colonial Colleges, third-oldest institution of higher education in the United States, and one of the nine colonial colleges chartered before the American Revolution. Yale was established as the Collegiate School in 1701 by Congregationalism in the United States, Congregationalist clergy of the Connecticut Colony. Originally restricted to instructing ministers in theology and sacred languages, the school's curriculum expanded, incorporating humanities and sciences by the time of the American Revolution. In the 19th century, the college expanded into graduate and professional instruction, awarding the first Doctor of Philosophy, PhD in the United States in 1861 and organizing as a university in 1887. Yale's faculty and student populations grew rapidly after 1890 due to the expansion of the physical campus and its scientif ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

United States Navy
The United States Navy (USN) is the naval warfare, maritime military branch, service branch of the United States Department of Defense. It is the world's most powerful navy with the largest Displacement (ship), displacement, at 4.5 million tons in 2021. It has the world's largest aircraft carrier fleet, with List of aircraft carriers in service, eleven in service, one undergoing trials, two new carriers under construction, and six other carriers planned as of 2024. With 336,978 personnel on active duty and 101,583 in the Ready Reserve, the U.S. Navy is the third largest of the United States military service branches in terms of personnel. It has 299 deployable combat vessels and about 4,012 operational aircraft as of 18 July 2023. The U.S. Navy is one of six United States Armed Forces, armed forces of the United States and one of eight uniformed services of the United States. The United States Navy traces its origins to the Continental Navy, which was established during ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

ROTC
The Reserve Officers' Training Corps (ROTC; or ) is a group of college- and university-based officer-training programs for training commissioned officers of the United States Armed Forces. While ROTC graduate officers serve in all branches of the U.S. military, the U.S. Marine Corps, the U.S. Space Force, and the U.S. Coast Guard do not have their own respective ROTC programs; rather, graduates of Naval ROTC programs have the option to serve as officers in the Marine Corps contingent on meeting Marine Corps requirements. Graduates of Air Force ROTC also have the option to be commissioned in the Space Force as a Space Operations Officer. In 2020, ROTC graduates constituted 70 percent of newly commissioned active-duty U.S. Army officers, 83 percent of newly commissioned U.S. Marine Corps officers (through NROTC), 61 percent of newly commissioned U.S. Navy officers and 63 percent of newly commissioned U.S. Air Force officers, for a combined 56 percent of all active-duty of ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Agnes Driscoll
Agnes Meyer Driscoll (July 24, 1889 – September 16, 1971), known as "Miss Aggie" or "Madame X'", was an American cryptanalyst during both World War I and World War II and was known as "the first lady of naval cryptology." Early years Driscoll was born Agnes May Meyer in Geneseo, Illinois, in 1889. She moved with her family to Westerville, Ohio, in 1895, where her father, Gustav Meyer, had taken a job teaching music at Otterbein College. In 1909, he donated the family home to the Anti-Saloon League, which had recently moved its headquarters to Westerville. The home was later donated to the Westerville Public Library and is now home to the Anti-Saloon League Museum and the Westerville Local History Center. Education Driscoll attended Otterbein College from 1907 to 1909. In 1911, she received a Bachelor of Arts degree from Ohio State University, having majored in mathematics and physics and studied foreign languages, statistics and music. She was fluent in English, French, Germ ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Known-plaintext Attack
The known-plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has access to both the plaintext (called a crib) and its encrypted version (ciphertext). These can be used to reveal secret keys and code books. The term "crib" originated at Bletchley Park, the British World War II decryption operation, where it was defined as: History The usage "crib" was adapted from a slang term referring to cheating (e.g., "I cribbed my answer from your test paper"). A "crib" originally was a literal or interlinear translation of a foreign-language text—usually a Latin or Greek text—that students might be assigned to translate from the original language. The idea behind a crib is that cryptologists were looking at incomprehensible ciphertext, but if they had a clue about some word or phrase that might be expected to be in the ciphertext, they would have a "wedge," a test to break into it. If their otherwise random attacks on the cipher managed to sometimes produce ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




JN-25
The vulnerability of Japanese naval codes and ciphers was crucial to the conduct of World War II, and had an important influence on foreign relations between Japan and the west in the years leading up to the war as well. Every Japanese code was eventually broken, and the intelligence gathered made possible such operations as the victorious American ambush of the Japanese Navy at Battle of Midway, Midway in 1942 (by breaking code JN-25b) and the shooting down of Japanese admiral Isoroku Yamamoto a year later in Operation Vengeance. The Imperial Japanese Navy (IJN) used many codes and ciphers. All of these cryptosystems were known differently by different organizations; the names listed below are those given by Western cryptanalytic operations. Red code The Red Book code was an IJN code book system used in World War I and after. It was called "Red Book" because the American photographs made of it were bound in red covers.Greg Goebel"US Codebreakers In The Shadow Of War" 2018. It sh ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


JADE (cypher Machine)
JADE was the codename given by US codebreakers to a Japanese World War II cipher machine. The Imperial Japanese Navy used the machine for communications from late 1942 until 1944. JADE was similar to another cipher machine, CORAL, with the main difference that JADE was used to encipher messages in katakana using an alphabet of 50 symbols.https://www.nsa.gov/about/cryptologic-heritage/center-cryptologic-history/pearl-harbor-review/early-japanese/ Early Japanese Systems NSA Center for Cryptologic History According to the NSA, "apparently, the JADE machine did not stand up to heavy usage in the field, and, after an initial high volume of traffic, it was used much less." While CORAL traffic was also low, an important user was a Japanese representative, Vice Admiral Abe, to an Axis war-planning council whose reports coded in CORAL were intercepted and proved vital to Allied planning in the European theater. See also * Type A Cipher Machine ("Red") * Type B Cipher Machine The ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

CORAL (cipher)
Corals are colonial marine invertebrates within the subphylum Anthozoa of the phylum Cnidaria. They typically form compact colonies of many identical individual polyps. Coral species include the important reef builders that inhabit tropical oceans and secrete calcium carbonate to form a hard skeleton. A coral "group" is a colony of very many genetically identical polyps. Each polyp is a sac-like animal typically only a few millimeters in diameter and a few centimeters in height. A set of tentacles surround a central mouth opening. Each polyp excretes an exoskeleton near the base. Over many generations, the colony thus creates a skeleton characteristic of the species which can measure up to several meters in size. Individual colonies grow by asexual reproduction of polyps. Corals also breed sexually by spawning: polyps of the same species release gametes simultaneously overnight, often around a full moon. Fertilized eggs form planulae, a mobile early form of the coral polyp whi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  



MORE