KW-37
   HOME
*



picture info

KW-37
The KW-37, code named JASON, was an encryption system developed In the 1950s by the U.S. National Security Agency to protect fleet broadcasts of the U.S. Navy. Naval doctrine calls for warships at sea to maintain radio silence to the maximum extent possible to prevent ships from being located by potential adversaries using radio direction finding. To allow ships to receive messages and orders, the navy broadcast a continuous stream of information, originally in Morse code and later using radioteletype. Messages were included in this stream as needed and could be for individual ships, battle groups or the fleet as a whole. Each ship's radio room would monitor the broadcast and decode and forward those messages directed at her to the appropriate officer. The KW-37 was designed to automate this process. It consisted of two major components, the KWR-37 receive unit and the KWT-37 transmit unit. Each ship had a complement of KWR-37 receivers (usually at least two) that decrypted ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




John Anthony Walker
John Anthony Walker Jr. (July 28, 1937 – August 28, 2014) was a United States Navy chief warrant officer and communications specialist convicted of spying for the Soviet Union from 1967 to 1985 and sentenced to life in prison. In late 1985, Walker made a plea bargain with federal prosecutors, which required him to provide full details of his espionage activities and testify against his co-conspirator, former senior chief petty officer Jerry Whitworth. In exchange, prosecutors agreed to a lesser sentence for Walker's son, former Seaman Michael Walker, who was also involved in the spy ring. During his time as a Soviet spy, Walker helped the Soviets decipher more than one million encrypted naval messages, organizing a spy operation that ''The New York Times'' reported in 1987 "is sometimes described as the most damaging Soviet spy ring in history." After Walker's arrest, Caspar Weinberger, President Ronald Reagan's Secretary of Defense, concluded that the Soviet Union mad ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees. Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of pers ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

USS Pueblo (AGER-2)
USS ''Pueblo'' (AGER-2) is a , attached to Navy intelligence as a spy ship, which was attacked and captured by North Korean forces on 23 January 1968, in what was later known as the "''Pueblo'' incident" or alternatively, as the "''Pueblo'' crisis". The seizure of the U.S. Navy ship and her 83 crew members, one of whom was killed in the attack, came less than a week after President Lyndon B. Johnson's State of the Union address to the United States Congress, a week before the start of the Tet Offensive in South Vietnam during the Vietnam War and three days after 31 men of North Korea's KPA Unit 124 had crossed the Korean Demilitarized Zone (DMZ) and killed 26 South Koreans in an attempt to attack the South Korean Blue House (executive mansion) in the capital Seoul. The taking of ''Pueblo'' and the abuse and torture of her crew during the subsequent eleven months became a major Cold War incident, raising tensions between western and eastern powers. North Korea stated that ''Pue ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Cryptographic Key
A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be different sizes and varieties, but in all cases, the strength of the encryption relies on the security of the key being maintained. A key’s security strength is dependent on its algorithm, the size of the key, the generation of the key, and the process of key exchange. Scope The key is what is used to encrypt data from plaintext to ciphertext. There are different methods for utilizing keys and encryption. Symmetric cryptography Symmetric cryptography refers to the practice of the same key being used for both encryption and decryption. Asymmetric cryptography Asymmetric cryptography has separate keys for encrypting and decrypting. These keys are known as the public and private keys, respectively. Purpose Since the key pro ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Cryptoperiod
A cryptoperiod is the time span during which a specific key (cryptography), cryptographic key is authorized for use. Common government guidelines range from 1 to 3 years for asymmetric cryptography, and 1 day to 7 days for symmetric cipher traffic keys. Factors to consider include the strength of the underlying encryption algorithm, key length, the likelihood of compromise through a security breach and the availability of mechanisms of revoking keys. In traditional cryptographic practice, keys were changed at regular intervals, typically at the same time each day. The code word for a key change, in NSA parlance, is HJ or Hotel Juliet in the NATO phonetic alphabet. When cryptographic devices began to be used in large scale, those who had to update the key had to set a specific time to synchronize the re-key. This was accomplished at the hour (H) the Julian (J) Date changed, among crypto-accountants, managers and users the jargon "HJ" became the accepted term meaning it was time to ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Soviet Union
The Soviet Union,. officially the Union of Soviet Socialist Republics. (USSR),. was a transcontinental country that spanned much of Eurasia from 1922 to 1991. A flagship communist state, it was nominally a federal union of fifteen national republics; in practice, both its government and its economy were highly centralized until its final years. It was a one-party state governed by the Communist Party of the Soviet Union, with the city of Moscow serving as its capital as well as that of its largest and most populous republic: the Russian SFSR. Other major cities included Leningrad (Russian SFSR), Kiev (Ukrainian SSR), Minsk ( Byelorussian SSR), Tashkent (Uzbek SSR), Alma-Ata (Kazakh SSR), and Novosibirsk (Russian SFSR). It was the largest country in the world, covering over and spanning eleven time zones. The country's roots lay in the October Revolution of 1917, when the Bolsheviks, under the leadership of Vladimir Lenin, overthrew the Russian Provisional Government ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

North Korea
North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korea, Korean Peninsula and shares borders with China and Russia to the north, at the Yalu River, Yalu (Amnok) and Tumen River, Tumen rivers, and South Korea to the south at the Korean Demilitarized Zone. North Korea's border with South Korea is a disputed border as both countries claim the entirety of the Korean Peninsula. The country's western border is formed by the Yellow Sea, while its eastern border is defined by the Sea of Japan. North Korea, like South Korea, its southern counterpart, claims to be the legitimate government of the entire peninsula and List of islands of North Korea, adjacent islands. Pyongyang is the capital and largest city. In 1910, Korean Empire, Korea was Korea under Japanese rule, annexed by the Empire of Japan. In 1945, after the Surrender of Japan, Japanese surrender at the End of World War II in Asia, end ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Remington Rand
Remington Rand was an early American business machine manufacturer, originally a typewriter manufacturer and in a later incarnation the manufacturer of the UNIVAC line of mainframe computers. Formed in 1927 following a merger, Remington Rand was a diversified conglomerate (company), conglomerate making other office equipment, electric shavers, etc. The Remington Rand Building at 315 Park Avenue (Manhattan), Park Avenue South in New York City is a 20-floor skyscraper completed in 1911. After 1955, Remington Rand had a long series of mergers and acquisitions that eventually resulted in the formation of Unisys. History Remington Rand was formed in 1927 by the merger of the Remington Typewriter Company and James Rand, Jr.#Rand Ledger and American Kardex, Rand Kardex Corporation. One of its earliest factories, the former Herschell–Spillman Motor Company Complex, was listed on the National Register of Historic Places in 2013. ''Note:'' This includes an''Accompanying photographs ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Punched Cards
A punched card (also punch card or punched-card) is a piece of stiff paper that holds digital data represented by the presence or absence of holes in predefined positions. Punched cards were once common in data processing applications or to directly control automated machinery. Punched cards were widely used through much of the 20th century in the data processing industry, where specialized and increasingly complex unit record machines, organized into semiautomatic data processing systems, used punched cards for data input, output, and storage. The IBM 12-row/80-column punched card format came to dominate the industry. Many early digital computers used punched cards as the primary medium for input of both computer programs and data. While punched cards are now obsolete as a storage medium, as of 2012, some voting machines still used punched cards to record votes. They also had a significant cultural impact. History The idea of control and data storage via punched holes ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


KW-26
The TSEC/KW-26, code named ROMULUS, (in 1966 the machine based encryption system was not code-named "Romulus," rather the code-name was "Orion," at least in the US Army's variant) was an encryption system used by the U.S. Government and, later, by NATO countries. It was developed in the 1950s by the National Security Agency (NSA) to secure fixed teleprinter circuits that operated 24 hours a day. It used vacuum tubes and magnetic core logic, replacing older systems, like SIGABA and the British 5-UCO, that used rotors and electromechanical relays. A KW-26 system (transmitter or receiver) contained over 800 cores and approximately 50 vacuum-tube driver circuits, occupying slightly more than one half of a standard 19-inch rack. Most of the space in the rack and most of the 1 kW input power were required for the special-purpose vacuum tube circuits needed to provide compatibility with multiple input and output circuit configurations. The military services' requirements for numer ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]