HOME
*



picture info

KL-7
The TSEC/KL-7, also known as Adonis was an off-line non-reciprocal rotor encryption machine.A History of U.S. Communications Security; the David G. Boak Lectures
National Security Agency (NSA), Volume I, 1973, partially released 2008, additional portions declassified October 14, 2015
The KL-7 had rotors to encrypt the text, most of which moved in a complex pattern, controlled by notched rings. The non-moving rotor was fourth from the left of the stack. The KL-7 also encrypted the message indicator.


History and development

In 1952, the machine was introduced by AFSA's successor, the

picture info

KL-7
The TSEC/KL-7, also known as Adonis was an off-line non-reciprocal rotor encryption machine.A History of U.S. Communications Security; the David G. Boak Lectures
National Security Agency (NSA), Volume I, 1973, partially released 2008, additional portions declassified October 14, 2015
The KL-7 had rotors to encrypt the text, most of which moved in a complex pattern, controlled by notched rings. The non-moving rotor was fourth from the left of the stack. The KL-7 also encrypted the message indicator.


History and development

In 1952, the machine was introduced by AFSA's successor, the

picture info

NSA Encryption Systems
The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA-approved systems are still classified, but much more about its early systems have become known and its most modern systems share at least some features with commercial products. Rotor machines from the 1940s and 1950s were mechanical marvels. The first generation electronic systems were quirky devices with cantankerous punched card readers for loading keys and failure-prone, tricky-to-maintain vacuum tube circuitry. Late 20th century systems are just black boxes, often literally. In fact they are called '' blackers'' in NSA parlance because they convert plaintext classified signals (''red'') into encrypted unclassified ciphertext signals (''black''). They typically have electrical connectors for the red signals, the black signals, electrical power, and a port for loading keys. Controls can be limited to selecting between ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Rotor Machines
In cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting messages. Rotor machines were the cryptographic state-of-the-art for much of the 20th century; they were in widespread use in the 1920s–1970s. The most famous example is the German Enigma machine, the output of which was deciphered by the Allies during World War II, producing intelligence code-named ''Ultra''. Description The primary component of a rotor machine is a set of ''rotors'', also termed ''wheels'' or ''drums'', which are rotating disks with an array of electrical contacts on either side. The wiring between the contacts implements a fixed substitution of letters, replacing them in some complex fashion. On its own, this would offer little security; however, before or after encrypting each letter, the rotors advance positions, changing the substitution. By this means, a rotor machine produces a complex polyalphabetic substitution cipher, which changes ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Rotor Machine
In cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting messages. Rotor machines were the cryptographic state-of-the-art for much of the 20th century; they were in widespread use in the 1920s–1970s. The most famous example is the German Enigma machine, the output of which was deciphered by the Allies during World War II, producing intelligence code-named ''Ultra''. Description The primary component of a rotor machine is a set of ''rotors'', also termed ''wheels'' or ''drums'', which are rotating disks with an array of electrical contacts on either side. The wiring between the contacts implements a fixed substitution of letters, replacing them in some complex fashion. On its own, this would offer little security; however, before or after encrypting each letter, the rotors advance positions, changing the substitution. By this means, a rotor machine produces a complex polyalphabetic substitution cipher, which changes ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees. Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Known Plaintext Attack
The known-plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has access to both the plaintext (called a crib), and its encrypted version (ciphertext). These can be used to reveal further secret information such as secret keys and code books. The term "crib" originated at Bletchley Park, the British World War II decryption operation, where it was defined as: History The usage "crib" was adapted from a slang term referring to cheating (e.g., "I cribbed my answer from your test paper"). A "crib" originally was a literal or interlinear translation of a foreign-language text—usually a Latin or Greek text—that students might be assigned to translate from the original language. The idea behind a crib is that cryptologists were looking at incomprehensible ciphertext, but if they had a clue about some word or phrase that might be expected to be in the ciphertext, they would have a "wedge," a test to break into it. If their otherwise random attacks on the c ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


John Anthony Walker
John Anthony Walker Jr. (July 28, 1937 – August 28, 2014) was a United States Navy chief warrant officer and communications specialist convicted of spying for the Soviet Union from 1967 to 1985 and sentenced to life in prison. In late 1985, Walker made a plea bargain with federal prosecutors, which required him to provide full details of his espionage activities and testify against his co-conspirator, former senior chief petty officer Jerry Whitworth. In exchange, prosecutors agreed to a lesser sentence for Walker's son, former Seaman Michael Walker, who was also involved in the spy ring. During his time as a Soviet spy, Walker helped the Soviets decipher more than one million encrypted naval messages, organizing a spy operation that ''The New York Times'' reported in 1987 "is sometimes described as the most damaging Soviet spy ring in history." After Walker's arrest, Caspar Weinberger, President Ronald Reagan's Secretary of Defense, concluded that the Soviet Union ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


KL-51
The KL-51 is an off-line keyboard encryption system that read and punched paper tape for use with teleprinters. In NATO it was called RACE (Rapid Automatic Cryptographic Equipment). It was developed in the 1970s by a Norwegian company, Standard Telefon og Kabelfabrik (STK). It used digital electronics for encryption instead of rotors, and it may have been the first machine to use software based crypto algorithms. KL-51 is a very robust machine made to military specifications. U.S. National Security Agency bought it in the 1980s to replace the earlier KL-7 The TSEC/KL-7, also known as Adonis was an off-line non-reciprocal rotor encryption machine.
. As of 2006, the U.S. Navy was developing plans to replace KL-51 units still in use with a unit based on a more modern
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


North Vietnam
North Vietnam, officially the Democratic Republic of Vietnam (DRV; vi, Việt Nam Dân chủ Cộng hòa), was a socialist state supported by the Soviet Union (USSR) and the People's Republic of China (PRC) in Southeast Asia that existed from 1945 to 1976 and was recognized in 1954. Both the North Vietnamese and South Vietnamese states ceased to exist when they unified as the Socialist Republic of Vietnam. During the August Revolution following World War II, Vietnamese communist revolutionary Hồ Chí Minh, leader of the Việt Minh Front, declared independence on 2 September 1945, announcing the creation of the Democratic Republic of Vietnam. The Việt Minh ("League for the Independence of Vietnam"), led by communists, was created in 1941 and designed to appeal to a wider population than the Indochinese Communist Party could command. From the very beginning, the DRV regime sought to consolidate power by purging other nationalist movements. Meanwhile, France moved ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Soviet Union
The Soviet Union,. officially the Union of Soviet Socialist Republics. (USSR),. was a List of former transcontinental countries#Since 1700, transcontinental country that spanned much of Eurasia from 1922 to 1991. A flagship communist state, it was nominally a Federation, federal union of Republics of the Soviet Union, fifteen national republics; in practice, both Government of the Soviet Union, its government and Economy of the Soviet Union, its economy were highly Soviet-type economic planning, centralized until its final years. It was a one-party state governed by the Communist Party of the Soviet Union, with the city of Moscow serving as its capital as well as that of its largest and most populous republic: the Russian Soviet Federative Socialist Republic, Russian SFSR. Other major cities included Saint Petersburg, Leningrad (Russian SFSR), Kyiv, Kiev (Ukrainian Soviet Socialist Republic, Ukrainian SSR), Minsk (Byelorussian Soviet Socialist Republic, Byelorussian SSR), Tas ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Washington, DC
) , image_skyline = , image_caption = Clockwise from top left: the Washington Monument and Lincoln Memorial on the National Mall, United States Capitol, Logan Circle, Jefferson Memorial, White House, Adams Morgan, National Cathedral , image_flag = Flag of the District of Columbia.svg , image_seal = Seal of the District of Columbia.svg , nickname = D.C., The District , image_map = , map_caption = Interactive map of Washington, D.C. , coordinates = , subdivision_type = Country , subdivision_name = , established_title = Residence Act , established_date = 1790 , named_for = George Washington, Christopher Columbus , established_title1 = Organized , established_date1 = 1801 , established_title2 = Consolidated , established_date2 = 1871 , established_title3 = Home Rule Ac ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Adonis 26 Point Rotors
In Greek mythology, Adonis, ; derived from the Canaanite word ''ʼadōn'', meaning "lord". R. S. P. Beekes, ''Etymological Dictionary of Greek'', Brill, 2009, p. 23. was the mortal lover of the goddess Aphrodite. One day, Adonis was gored by a wild boar during a hunting trip and died in Aphrodite's arms as she wept. His blood mingled with her tears and became the anemone flower. Aphrodite declared the Adonia festival commemorating his tragic death, which was celebrated by women every year in midsummer. During this festival, Greek women would plant "gardens of Adonis", small pots containing fast-growing plants, which they would set on top of their houses in the hot sun. The plants would sprout, but soon wither and die. Then the women would mourn the death of Adonis, tearing their clothes and beating their breasts in a public display of grief. The Greeks considered Adonis's cult to be of Near Eastern origin. Adonis's name comes from a Canaanite word meaning "lord" and most mo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]