Line 111: Line 111:
Cryptography (from Greek kryptos "secret" ad graphein "writing") is the science of codification. The aim ist to protect communication to all apart from the intendend acceptor. Before electronic processors were used, single letters or grup of letters were simply replaced. This forms of codings are not used anymore, because they are not safe.
Cryptography (from Greek kryptos "secret" ad graphein "writing") is the science of codification. The aim ist to protect communication to all apart from the intendend acceptor. Before electronic processors were used, single letters or grup of letters were simply replaced. This forms of codings are not used anymore, because they are not safe.


[[File:http://de.wikipedia.org/wiki/Datei:CipherDisk2000.jpg]]
[[File:de.wikipedia.org/wiki/Datei:CipherDisk2000.jpg]]


Oldest discoverys of Cryptography are in the third century BC in the old egypt. Unusal hieroglyphs are references for that. Hebrew academics developed 500 - 600 century BC simple sign switch coding. An example for this is the Atbash cipher. 50-60 BC the roman commander Julius Cäsar created the so called Cäsar cipher. In this method every letter is replaced by a in the alphabet three places behind letter (Example: A is replaced by D).  Also in the middle age cryptography was used to save diplomatic letters using the Alphabetum Kaldeorum. In the 16. century AC the frenchman  Blaise de Vigenère graded the Cäsar cipher up and developed the so called Vigenere cipher. Different to the Cäsar cipher not only one secret alphabet was used, but 26.  During the second world war mathematic cryptography made a good progress. The coding machine "ENIGMA", which was used by the german military and thought to be undecipherable, was uncoded by the british project "ULTRA". After the second world war the era of the modern cryptography began. Now the progress in this field was not secret anymore. The privacy was replaced by "security of obscurity". New ideas of ciphering put more and more disciplines in to the cryptography, so today mathematics, computer science and electrical engineering are elementary aspects of it.
Oldest discoverys of Cryptography are in the third century BC in the old egypt. Unusal hieroglyphs are references for that. Hebrew academics developed 500 - 600 century BC simple sign switch coding. An example for this is the Atbash cipher. 50-60 BC the roman commander Julius Cäsar created the so called Cäsar cipher. In this method every letter is replaced by a in the alphabet three places behind letter (Example: A is replaced by D).  Also in the middle age cryptography was used to save diplomatic letters using the Alphabetum Kaldeorum. In the 16. century AC the frenchman  Blaise de Vigenère graded the Cäsar cipher up and developed the so called Vigenere cipher. Different to the Cäsar cipher not only one secret alphabet was used, but 26.  During the second world war mathematic cryptography made a good progress. The coding machine "ENIGMA", which was used by the german military and thought to be undecipherable, was uncoded by the british project "ULTRA". After the second world war the era of the modern cryptography began. Now the progress in this field was not secret anymore. The privacy was replaced by "security of obscurity". New ideas of ciphering put more and more disciplines in to the cryptography, so today mathematics, computer science and electrical engineering are elementary aspects of it.

Revision as of 19:20, 21 October 2014

This page deals with the theme of the influence of computer development by the military and vice versa.

The development of the first World War - to provide industrial and scientific base of the war - continued in the second world war. In the first world war scientific and industrial innovations were used to defeat the enemy. There were used for the first time combat aircraft, poison gas and flamethrowers. At the time of the second world war benefited in the USA, for example the companies who completed business with the military. They received government subsidies, generous budget and a crisis-proof market.


Modern Infantry

This section concentrates on modern weapons and gadgets, either those which are in development or which are used in infantry operations around the world today.

Weapons

CornerShot mounted with a (fake) Glock
The Armatix iP1

HK XM25

Developed in Germany, this modern grenade launcher is capable of firing programmable grenades which detonate at a customly set range. The grenade does so by "counting" its rotations after it's been fired.

CornerShot

A multi-purpose weapon from Israel. It can be mounted with various weapons (e.g. 9mm handgun or 40mm grenade launcher) and allows the wielder to look and fire around corners. Its barrel can be horizontally rotated by 60° in both directions. A camera and display allow to look around corners and fire precisely without exposure to counterattacks.

Armatix iP1

This handgun developed in Germany comes with a corresponding wrist watch. If it's more than 25cm away from it, it won't fire. It also allows tracking of statistics (shots per minute) and can be set to only shoot if it's pointed in the direction of a designated target.

MATADOR

The MATADOR (Man-portable Anti-Tank, Anti-DOoR), originating from Singapore and Israel, is a rocket launcher which fires rockets with two explosion charges. These charges explode with a slight delay between each other. This makes the weapon capable of blasting a hole into armor, doors or walls and explode a second time behind the obstructions. It's one of the few rocket launchers designed to use in confined spaces.

Gadgets

Dragonfly Surveillance Robot

NAVSTAR GPS

The Navigational Satellite Timing and Ranging – Global Positioning System is probably one of the most well-known invention by the U.S. Department of Defense, as nowadays it's vastly used as a positioning and navigation system for civilian purposes. Today there are a total of 67 GPS satellites in orbit. By calculating the distance to each of these satellites, GPS can accurately tell the target's location on the earth's surface.

XC6 M2 Military Tablet

This is a computer tablet designed for military operations. While it's quite bulky, it offers high sturdiness and readability for in-combat use, a vast amount of storage capacity and various in- and outputs for different devices.

Dragonfly Surveillance Robot

This tiny robot can help out the soldiers by scouting ahead into uncertain terrain, being barely noticeable due to its size. This gadget could also be used to look for survivors at accident sides or in collapsed buildings.

Digital weapons systems

Military EMP Test Site ATLAS-I with a Boeing B-52 as a test object on the Kirtland Air Force Base, USA

The research and development conclude that the research of new weapons systems going in the direction of non-lethal weapons. Especially in the microwave and EMP (electromagnetic pulse)-weapons is this observed.

With the explosion of the first atomic bomb tested above ground the researchers noticed that the electromagnetic pulse of the thermonuclear explosion caused such a strong over voltage in electrical devices within range that they were destroyed.

Over time, it has now managed to trigger these electromagnetic pulses without a nuclear explosion. In the near future, airplanes should be equipped with these weapons.

To destroy enemy radar stations a strong signal in the natural frequency of the radar system is triggered from airplanes.

To defend against such attacks, the radars are to be screened and be accessible only with fiber-optic cable from the outside.





UAV (unmanned aircraft vehicle) / drone

Is an aircraft without a human pilot aboard. There are four kinds of drones, UAS (Unmanned Air System), UAV (Unmanned Aerial Vehicle), RPAS (Remote Piloted Aircraft Systems) and Model Aircraft. Its flight is controlled either by the remote control of a pilot on the ground or autonomously by onboard computers.

UAVs are usually deployed for military and special operation applications, but also used in a small but growing number of civil applications, such as policing and firefighting.


Uses in Military

Military drones are used for different purposes. Firstly, to education purposes for fighter pilots, therefor warplanes are rebuilt that they can be remotely controlled and used as a target drone. Further they are used for reconnaissance, for example to explore the region and to make enemy camp identify possible before your own troops move. Or foresee a ambush of enemy troops and to take countermeasures. They are also used to clarify IEDs and to gain an overview of the situation from the air to the troops on the ground.



History

-The first large-scale production, purpose-built drone was the product of Reginald Denny. He served with the British Royal Flying Corps during World War I, and after the war, in 1919

-1931 the British Royal Air Force equipped three machines of the type Fairey IIIF under the name Fairey Queen with radio control and uses them as target drones and exercise goals for fighter pilots.

-The US Navy began experimenting with radio-controlled aircraft during the 1930s as well, resulting in the Curtiss "N2C-2" drone in 1937. The N2C-2 was remotely controlled from another aircraft.


Security


Modern vehicles

There are different types of modern vehicles like artillery and air defence, engineering and logistic vehicles and also armoured vehicles.
All of these modern vehicles have their own purposes.

Self-propelled artillery vehicle owns a system which is programmed to move toward to its target. They resemble a tank but they are not heavy amoured like them but they are still able to protect their crew against arms. Most of them are equipped with machine guns to shoot on the enemies infantry on the defense. This type of modern vehicle is highly computerized with the ability to self survey firing positions using systems such as GPS and inertial navigation systems.

Engineering vehicles are designed for construction work or for the transportation of combat engineers on the battlefield.
There are also different types of engineering vehicles like the "breaching vehicle" which is equipped with mechanical or other means for the breaching of man made obstacles.

Armoured vehicles are equipped by a an armour and armed with different weapons like tactical offensive, operational mobility and defensive capabillities.
They are used as an example for supporting contingency operations, offensive capabilities and crew protection.
Most of the armoured vehicles are powered by diesel engine.


Cryptography

Cryptography (from Greek kryptos "secret" ad graphein "writing") is the science of codification. The aim ist to protect communication to all apart from the intendend acceptor. Before electronic processors were used, single letters or grup of letters were simply replaced. This forms of codings are not used anymore, because they are not safe.

File:De.wikipedia.org/wiki/Datei:CipherDisk2000.jpg

Oldest discoverys of Cryptography are in the third century BC in the old egypt. Unusal hieroglyphs are references for that. Hebrew academics developed 500 - 600 century BC simple sign switch coding. An example for this is the Atbash cipher. 50-60 BC the roman commander Julius Cäsar created the so called Cäsar cipher. In this method every letter is replaced by a in the alphabet three places behind letter (Example: A is replaced by D). Also in the middle age cryptography was used to save diplomatic letters using the Alphabetum Kaldeorum. In the 16. century AC the frenchman Blaise de Vigenère graded the Cäsar cipher up and developed the so called Vigenere cipher. Different to the Cäsar cipher not only one secret alphabet was used, but 26. During the second world war mathematic cryptography made a good progress. The coding machine "ENIGMA", which was used by the german military and thought to be undecipherable, was uncoded by the british project "ULTRA". After the second world war the era of the modern cryptography began. Now the progress in this field was not secret anymore. The privacy was replaced by "security of obscurity". New ideas of ciphering put more and more disciplines in to the cryptography, so today mathematics, computer science and electrical engineering are elementary aspects of it.

Cookies help us deliver our services. By using our services, you agree to our use of cookies.