Here is a list of past presentations at ICCH. The most recent presentation is at the top. Click on each listing to reveal more information below, including the speaker, presentation description and to access recordings.
Note: Effort has been made to ensure that the information on each presentation is accurate and up-to-date. To suggest a correction please contact the ICCH webmaster Patrick Hayes at .
Last summer I spent two days reading through Elizebeth Smith Friedman’s papers at the George C. Marshall Library in Lexington, VA. As a result, I have begun compiling a collection of complete crypto systems solved by Elizebeth Friedman. These examples are perfect for those who have read Jason Fagone’s excellent biography but want a bit more hands-on work with the plaintext and ciphertext associated with the rumrunning smugglers of the Prohibition era. I will share examples of crypto systems solved by Elizebeth Friedman, point out a correction to one of the examples from David Kahn’s Codebreakers, and end with some fun ciphers Elizebeth and William Friedman used to challenge their dinner guests on one November evening in 1938.
June 9, 2022
Here is a list of past presentations at ICCH. The most recent presentation is at the top. Click on each listing to reveal more information below, including the speaker, as well as the presentation date and description. Presentation recordings are available separately, in the ICCH Portal.
To view upcoming ICCH presentations, click here.
Note: Effort has been made to ensure that the information on each presentation is accurate and up-to-date. To suggest a correction please contact the ICCH webmaster Patrick Hayes at info@cryptologichistory.org.
Last summer I spent two days reading through Elizebeth Smith Friedman’s papers at the George C. Marshall Library in Lexington, VA. As a result, I have begun compiling a collection of complete crypto systems solved by Elizebeth Friedman. These examples are perfect for those who have read Jason Fagone’s excellent biography but want a bit more hands-on work with the plaintext and ciphertext associated with the rumrunning smugglers of the Prohibition era. I will share examples of crypto systems solved by Elizebeth Friedman, point out a correction to one of the examples from David Kahn’s Codebreakers, and end with some fun ciphers Elizebeth and William Friedman used to challenge their dinner guests on one November evening in 1938.
June 9, 2022