HOME



picture info

Slidex
Slidex was a hand-held, paper-based encryption system used at a low, front line (platoon, troop and section) level in the British Army during the Cold War period. It was replaced by the BATCO tactical code, which, in turn has been largely made obsolete by the Bowman secure voice radios. Design Slidex used a series of vocabulary cards arranged in a grid of 12 rows and 17 columns. Each of the 204 resulting cells has a word or phrase, as well as a letter or number. The latter allowed the system to spell out words and transmit numbers. The cards were stored in a folding case that had a pair of cursors to facilitate locating cells. Messages were encrypted and decrypted using code strips that could be placed in holder along the top and left side of the vocabulary card. Blank vocabulary cards were provided to allow units to create a word set for a specific mission. See also *Encryption algorithm *Military intelligence Military intelligence is a military discipline that uses inform ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

BATCO
BATCO, short for Battle Code, is a hand-held, paper-based encryption system used at a low, front line (platoon, troop and section) level in the British Army. It was introduced along with the Clansman combat net radio in the early 1980s and was largely obsolete by 2010 due to the wide deployment of the secure Bowman radios. BATCO consists of a code, contained on a set of vocabulary cards, and cipher sheets for superencryption of the numeric code words. The cipher sheets, which are typically changed daily, also include an authentication table and a radio call sign protection system. BATCO is similar to older Slidex system. The use of BATCO is still taught to Royal Signals Communication Systems Operators as a back-up should secure equipment fail or be unavailable. It is also taught to Army Cadets and Combined Cadets as part of the Signal Classification qualification. Code Messages in BATCO are first encoded into numbers using one of several vocabulary cards. The BATCO ciph ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Encryption
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users. Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often used in milit ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

British Army
The British Army is the principal land warfare force of the United Kingdom, a part of the British Armed Forces along with the Royal Navy and the Royal Air Force. , the British Army comprises 79,380 regular full-time personnel, 4,090 Gurkhas, and 28,330 volunteer reserve personnel. The modern British Army traces back to 1707, with antecedents in the English Army and Scots Army that were created during the Restoration in 1660. The term ''British Army'' was adopted in 1707 after the Acts of Union between England and Scotland. Members of the British Army swear allegiance to the monarch as their commander-in-chief, but the Bill of Rights of 1689 and Claim of Right Act 1689 require parliamentary consent for the Crown to maintain a peacetime standing army. Therefore, Parliament approves the army by passing an Armed Forces Act at least once every five years. The army is administered by the Ministry of Defence and commanded by the Chief of the General Staff. The British ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cold War
The Cold War is a term commonly used to refer to a period of Geopolitics, geopolitical tension between the United States and the Soviet Union and their respective allies, the Western Bloc and the Eastern Bloc. The term ''Cold war (term), cold war'' is used because there was no large-scale fighting directly between the two superpowers, but they each supported major regional conflicts known as proxy wars. The conflict was based around the ideological and geopolitical struggle for global influence by these two superpowers, following their temporary Allies of World War II, alliance and victory against Nazi Germany and Empire of Japan, Imperial Japan in 1945. Aside from the Nuclear arms race, nuclear arsenal development and conventional military deployment, the struggle for dominance was expressed via indirect means such as psychological warfare, propaganda campaigns, Cold War espionage, espionage, far-reaching Economic sanctions, embargoes, rivalry at sports events, and technolog ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Bowman (communications System)
Bowman is the name of the tactical communications system used by the British Armed Forces. The Bowman C4I system consists of a range of HF radio, VHF radio and UHF radio sets designed to provide secure integrated voice, data services to dismounted soldiers, individual vehicles and command HQs up to Division level. Bowman has a number of specific applications installed on the base radio infrastructure known as BISAs. Bowman has been released incrementally as a number of phased capability releases, known as BCIP releases, with BCIP 5.5 being released in the field in 2013. Bowman replaced the Clansman series of radios. As of 2016, the MoD publicised plans to replace Bowman with a system named Morpheus. Procurement history The concept of Bowman dates from a 1989 UK MoD General Staff Requirement (GSR) for a system to replace the ageing Clansman radio system. The GSR was subsequently modified to accommodate post Cold War scenarios. The procurement had a long and chequered hist ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

A Slidex And Separate Cards
A, or a, is the first Letter (alphabet), letter and the first vowel of the Latin alphabet, Latin alphabet, used in the English alphabet, modern English alphabet, the alphabets of other western European languages and others worldwide. Its name in English is English alphabet#Letter names, ''a'' (pronounced ), plural English alphabet#Letter names, ''aes''. It is similar in shape to the Greek alphabet#History, Ancient Greek letter alpha, from which it derives. The Letter case, uppercase version consists of the two slanting sides of a triangle, crossed in the middle by a horizontal bar. The lowercase version can be written in two forms: the double-storey a and single-storey ɑ. The latter is commonly used in handwriting and fonts based on it, especially fonts intended to be read by children, and is also found in italic type. In English grammar, "English articles, a", and its variant "English articles#Indefinite article, an", are Article (grammar)#Indefinite article, indefinite arti ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Encryption Algorithm
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users. Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often used in milit ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Military Intelligence
Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions. This aim is achieved by providing an assessment of data from a range of sources, directed towards the commanders' mission requirements or responding to questions as part of operational or campaign planning. To provide an analysis, the commander's information requirements are first identified, which are then incorporated into intelligence collection, analysis, and dissemination. Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations, and other broader areas of interest. Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war, and during a war itself. Most governments maintain a military intelligence capability to provide analytical and ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

History Of Cryptography
Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classical cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper. The development of cryptography has been paralleled by the development of cryptanalysis — the "breaking" of codes and ciphers. The discovery and application, early on, of frequency analysis to the reading of encrypted communications has, on occasion, altered the course of history. Thus the Zimmermann Telegram triggered the United States ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]