952:
17:
52:
military approached
Hagelin to design a printing, pocket-size cipher machine; Hagelin carved a piece of wood to outline the dimensions of a machine that would fit into a pocket. He adapted one of his previous inventions from three years earlier: an adding device designed for use in vending machines,
68:
for testing in
October 1937. Both machines had five pinwheels with 17, 19, 21, 23 and 25 pins, each individually settable, giving a maximum period of 3,900,225 for the machine. The C-362 revision included a few other improvements, most notably movable lugs instead of fixed.
40:
in the 1930s. These were the first of
Hagelin's cipher machines to feature the pin-and-lug mechanism. A later machine in the same series, the C-38, was designated CSP-1500 by the United States Navy and
932:
762:
64:
A revised machine, the C-36, was similar to the C-35, but had a different distribution of the lugs on the bars. Six C-36 machines were purchased by the
54:
457:
174:
615:
167:
608:
90:
811:
160:
57:). The French ordered 5,000 in 1935. Italy and the USA declined the machine, although both would later use the
601:
980:
927:
882:
695:
806:
61:. Completely mechanical, the C-35 machine measured 6 Ă— 4.5 Ă— 2 inches, and weighed less than 3 pounds.
922:
553:
472:
912:
902:
757:
237:
462:
907:
897:
700:
660:
653:
643:
638:
538:
197:
648:
399:
262:
257:
955:
801:
747:
533:
528:
503:
308:
917:
841:
566:
252:
212:
8:
680:
561:
447:
786:
770:
717:
846:
836:
707:
781:
247:
53:
and combined it with the pinwheel mechanism from an earlier cipher machine (the
856:
776:
737:
685:
670:
348:
333:
298:
242:
202:
77:
21:
974:
937:
892:
851:
831:
727:
690:
665:
394:
189:
104:
David Kahn, The
Codebreakers, 1967, 2nd ed 1996, Chapter 13, pp426–427.
73:
37:
887:
732:
722:
712:
675:
624:
414:
65:
866:
452:
318:
97:
826:
796:
791:
752:
427:
123:
816:
861:
821:
576:
571:
482:
467:
422:
374:
353:
742:
543:
523:
487:
477:
404:
277:
272:
267:
227:
207:
49:
518:
513:
508:
442:
437:
389:
384:
379:
369:
343:
328:
313:
282:
232:
217:
58:
42:
432:
338:
323:
222:
137:
C. A. Deavours, Solution of C-35 Texts with
Partial Key,
45:
by the United States military, who used it extensively.
36:
were cipher machines designed by
Swedish cryptographer
16:
763:
Cryptographically secure pseudorandom number generator
144:
107:
Unknown, information card for a C-36 machine in the
95:
Boris CW Hagelin, The Story of the
Hagelin Cryptos,
972:
609:
168:
89:Torbjörn Andersson, The Hagelin C-35/C-36,
616:
602:
175:
161:
76:on the pinwheels, rather than the usual
15:
111:exhibit at Bletchley Park Museum, 2005.
973:
597:
156:
101:, 18(3), July 1994, pp 204–242.
141:, 14(2), April 1990 pp162–168.
182:
13:
131:
14:
992:
951:
950:
623:
812:Information-theoretic security
116:
1:
92:, retrieved 15 November 2005.
83:
7:
928:Message authentication code
883:Cryptographic hash function
696:Cryptographic hash function
122:Jerry Proc, Hagelin C-362,
10:
997:
807:Harvest now, decrypt later
125:, retrieved 15 April 2010.
946:
923:Post-quantum cryptography
875:
631:
593:
552:
496:
413:
362:
291:
188:
152:
148:
913:Quantum key distribution
903:Authenticated encryption
758:Random number generation
908:Public-key cryptography
898:Symmetric-key algorithm
701:Key derivation function
661:Cryptographic primitive
654:Authentication protocol
644:Outline of cryptography
639:History of cryptography
649:Cryptographic protocol
400:Siemens and Halske T52
25:
802:End-to-end encryption
748:Cryptojacking malware
463:Sectéra Secure Module
20:A C-36 on display at
19:
918:Quantum cryptography
842:Trusted timestamping
567:Intel SHA extensions
681:Cryptographic nonce
562:AES instruction set
981:Encryption devices
787:Subliminal channel
771:Pseudorandom noise
718:Key (cryptography)
109:Enigma and Friends
72:One variant had a
26:
968:
967:
964:
963:
847:Key-based routing
837:Trapdoor function
708:Digital signature
589:
588:
585:
584:
554:Computer hardware
299:Bazeries cylinder
988:
954:
953:
782:Insecure channel
618:
611:
604:
595:
594:
177:
170:
163:
154:
153:
150:
149:
146:
145:
126:
120:
996:
995:
991:
990:
989:
987:
986:
985:
971:
970:
969:
960:
942:
871:
627:
622:
581:
548:
492:
409:
395:Lorenz SZ 40/42
358:
287:
184:
183:Cipher machines
181:
134:
132:Further reading
129:
121:
117:
86:
12:
11:
5:
994:
984:
983:
966:
965:
962:
961:
959:
958:
947:
944:
943:
941:
940:
935:
933:Random numbers
930:
925:
920:
915:
910:
905:
900:
895:
890:
885:
879:
877:
873:
872:
870:
869:
864:
859:
857:Garlic routing
854:
849:
844:
839:
834:
829:
824:
819:
814:
809:
804:
799:
794:
789:
784:
779:
777:Secure channel
774:
768:
767:
766:
755:
750:
745:
740:
738:Key stretching
735:
730:
725:
720:
715:
710:
705:
704:
703:
698:
688:
686:Cryptovirology
683:
678:
673:
671:Cryptocurrency
668:
663:
658:
657:
656:
646:
641:
635:
633:
629:
628:
621:
620:
613:
606:
598:
591:
590:
587:
586:
583:
582:
580:
579:
574:
569:
564:
558:
556:
550:
549:
547:
546:
541:
536:
531:
526:
521:
516:
511:
506:
500:
498:
494:
493:
491:
490:
485:
480:
475:
470:
465:
460:
455:
450:
445:
440:
435:
430:
425:
419:
417:
411:
410:
408:
407:
402:
397:
392:
387:
382:
377:
372:
366:
364:
360:
359:
357:
356:
351:
349:Reihenschieber
346:
341:
336:
334:Jefferson disk
331:
326:
321:
316:
311:
306:
301:
295:
293:
289:
288:
286:
285:
280:
275:
270:
265:
260:
255:
250:
245:
240:
235:
230:
225:
220:
215:
210:
205:
200:
194:
192:
190:Rotor machines
186:
185:
180:
179:
172:
165:
157:
143:
142:
133:
130:
128:
127:
114:
113:
112:
105:
102:
93:
85:
82:
78:Latin alphabet
22:Bletchley Park
9:
6:
4:
3:
2:
993:
982:
979:
978:
976:
957:
949:
948:
945:
939:
938:Steganography
936:
934:
931:
929:
926:
924:
921:
919:
916:
914:
911:
909:
906:
904:
901:
899:
896:
894:
893:Stream cipher
891:
889:
886:
884:
881:
880:
878:
874:
868:
865:
863:
860:
858:
855:
853:
852:Onion routing
850:
848:
845:
843:
840:
838:
835:
833:
832:Shared secret
830:
828:
825:
823:
820:
818:
815:
813:
810:
808:
805:
803:
800:
798:
795:
793:
790:
788:
785:
783:
780:
778:
775:
772:
769:
764:
761:
760:
759:
756:
754:
751:
749:
746:
744:
741:
739:
736:
734:
731:
729:
728:Key generator
726:
724:
721:
719:
716:
714:
711:
709:
706:
702:
699:
697:
694:
693:
692:
691:Hash function
689:
687:
684:
682:
679:
677:
674:
672:
669:
667:
666:Cryptanalysis
664:
662:
659:
655:
652:
651:
650:
647:
645:
642:
640:
637:
636:
634:
630:
626:
619:
614:
612:
607:
605:
600:
599:
596:
592:
578:
575:
573:
570:
568:
565:
563:
560:
559:
557:
555:
551:
545:
542:
540:
537:
535:
532:
530:
527:
525:
522:
520:
517:
515:
512:
510:
507:
505:
502:
501:
499:
495:
489:
486:
484:
481:
479:
476:
474:
471:
469:
466:
464:
461:
459:
456:
454:
451:
449:
446:
444:
441:
439:
436:
434:
431:
429:
426:
424:
421:
420:
418:
416:
412:
406:
403:
401:
398:
396:
393:
391:
388:
386:
383:
381:
378:
376:
373:
371:
368:
367:
365:
361:
355:
352:
350:
347:
345:
342:
340:
337:
335:
332:
330:
327:
325:
322:
320:
317:
315:
312:
310:
307:
305:
302:
300:
297:
296:
294:
290:
284:
281:
279:
276:
274:
271:
269:
266:
264:
261:
259:
256:
254:
251:
249:
246:
244:
241:
239:
236:
234:
231:
229:
226:
224:
221:
219:
216:
214:
211:
209:
206:
204:
201:
199:
196:
195:
193:
191:
187:
178:
173:
171:
166:
164:
159:
158:
155:
151:
147:
140:
136:
135:
124:
119:
115:
110:
106:
103:
100:
99:
94:
91:
88:
87:
81:
79:
75:
74:Thai alphabet
70:
67:
62:
60:
56:
51:
48:In 1934, the
46:
44:
39:
38:Boris Hagelin
35:
31:
23:
18:
888:Block cipher
733:Key schedule
723:Key exchange
713:Kleptography
676:Cryptosystem
625:Cryptography
415:Secure voice
303:
208:M-125 Fialka
138:
118:
108:
96:
71:
66:Swedish Navy
63:
59:M-209 / C-38
47:
33:
29:
27:
876:Mathematics
867:Mix network
363:Teleprinter
319:Cipher disk
139:Cryptologia
98:Cryptologia
827:Ciphertext
797:Decryption
792:Encryption
753:Ransomware
428:FASCINATOR
292:Mechanical
84:References
817:Plaintext
975:Category
956:Category
862:Kademlia
822:Codetext
765:(CSPRNG)
577:IBM 4764
572:IBM 4758
539:Pinwheel
632:General
483:STU-III
468:SIGSALY
423:BID 150
375:BID 770
354:Scytale
278:Singlet
238:Mercury
743:Keygen
544:Rockex
534:Purple
524:Noreen
488:VINSON
478:STU-II
448:NESTOR
405:SIGTOT
273:SIGCUM
268:SIGABA
228:Lacida
213:Hebern
203:Enigma
50:French
24:museum
773:(PRN)
519:KL-51
514:KL-43
509:KG-84
497:Other
443:KY-68
438:KY-58
390:KW-37
385:KW-26
380:DUDEK
370:5-UCO
344:M-209
329:Kryha
314:CD-57
283:Typex
263:SG-41
258:SG-39
233:M-325
218:HX-63
43:M-209
504:JADE
458:SCIP
453:OMNI
433:KY-3
339:M-94
324:HC-9
309:C-52
304:C-36
243:NEMA
223:KL-7
55:B-21
34:C-36
32:and
30:C-35
28:The
529:Red
473:STE
253:RED
248:OMI
198:CCM
977::
80:.
617:e
610:t
603:v
176:e
169:t
162:v
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.