Knowledge

C-36 (cipher machine)

Source đź“ť

952: 17: 52:
military approached Hagelin to design a printing, pocket-size cipher machine; Hagelin carved a piece of wood to outline the dimensions of a machine that would fit into a pocket. He adapted one of his previous inventions from three years earlier: an adding device designed for use in vending machines,
68:
for testing in October 1937. Both machines had five pinwheels with 17, 19, 21, 23 and 25 pins, each individually settable, giving a maximum period of 3,900,225 for the machine. The C-362 revision included a few other improvements, most notably movable lugs instead of fixed.
40:
in the 1930s. These were the first of Hagelin's cipher machines to feature the pin-and-lug mechanism. A later machine in the same series, the C-38, was designated CSP-1500 by the United States Navy and
932: 762: 64:
A revised machine, the C-36, was similar to the C-35, but had a different distribution of the lugs on the bars. Six C-36 machines were purchased by the
54: 457: 174: 615: 167: 608: 90: 811: 160: 57:). The French ordered 5,000 in 1935. Italy and the USA declined the machine, although both would later use the 601: 980: 927: 882: 695: 806: 61:. Completely mechanical, the C-35 machine measured 6 Ă— 4.5 Ă— 2 inches, and weighed less than 3 pounds. 922: 553: 472: 912: 902: 757: 237: 462: 907: 897: 700: 660: 653: 643: 638: 538: 197: 648: 399: 262: 257: 955: 801: 747: 533: 528: 503: 308: 917: 841: 566: 252: 212: 8: 680: 561: 447: 786: 770: 717: 846: 836: 707: 781: 247: 53:
and combined it with the pinwheel mechanism from an earlier cipher machine (the
856: 776: 737: 685: 670: 348: 333: 298: 242: 202: 77: 21: 974: 937: 892: 851: 831: 727: 690: 665: 394: 189: 104:
David Kahn, The Codebreakers, 1967, 2nd ed 1996, Chapter 13, pp426–427.
73: 37: 887: 732: 722: 712: 675: 624: 414: 65: 866: 452: 318: 97: 826: 796: 791: 752: 427: 123: 816: 861: 821: 576: 571: 482: 467: 422: 374: 353: 742: 543: 523: 487: 477: 404: 277: 272: 267: 227: 207: 49: 518: 513: 508: 442: 437: 389: 384: 379: 369: 343: 328: 313: 282: 232: 217: 58: 42: 432: 338: 323: 222: 137:
C. A. Deavours, Solution of C-35 Texts with Partial Key,
45:
by the United States military, who used it extensively.
36:
were cipher machines designed by Swedish cryptographer
16: 763:
Cryptographically secure pseudorandom number generator
144: 107:
Unknown, information card for a C-36 machine in the
95:
Boris CW Hagelin, The Story of the Hagelin Cryptos,
972: 609: 168: 89:Torbjörn Andersson, The Hagelin C-35/C-36, 616: 602: 175: 161: 76:on the pinwheels, rather than the usual 15: 111:exhibit at Bletchley Park Museum, 2005. 973: 597: 156: 101:, 18(3), July 1994, pp 204–242. 141:, 14(2), April 1990 pp162–168. 182: 13: 131: 14: 992: 951: 950: 623: 812:Information-theoretic security 116: 1: 92:, retrieved 15 November 2005. 83: 7: 928:Message authentication code 883:Cryptographic hash function 696:Cryptographic hash function 122:Jerry Proc, Hagelin C-362, 10: 997: 807:Harvest now, decrypt later 125:, retrieved 15 April 2010. 946: 923:Post-quantum cryptography 875: 631: 593: 552: 496: 413: 362: 291: 188: 152: 148: 913:Quantum key distribution 903:Authenticated encryption 758:Random number generation 908:Public-key cryptography 898:Symmetric-key algorithm 701:Key derivation function 661:Cryptographic primitive 654:Authentication protocol 644:Outline of cryptography 639:History of cryptography 649:Cryptographic protocol 400:Siemens and Halske T52 25: 802:End-to-end encryption 748:Cryptojacking malware 463:SectĂ©ra Secure Module 20:A C-36 on display at 19: 918:Quantum cryptography 842:Trusted timestamping 567:Intel SHA extensions 681:Cryptographic nonce 562:AES instruction set 981:Encryption devices 787:Subliminal channel 771:Pseudorandom noise 718:Key (cryptography) 109:Enigma and Friends 72:One variant had a 26: 968: 967: 964: 963: 847:Key-based routing 837:Trapdoor function 708:Digital signature 589: 588: 585: 584: 554:Computer hardware 299:Bazeries cylinder 988: 954: 953: 782:Insecure channel 618: 611: 604: 595: 594: 177: 170: 163: 154: 153: 150: 149: 146: 145: 126: 120: 996: 995: 991: 990: 989: 987: 986: 985: 971: 970: 969: 960: 942: 871: 627: 622: 581: 548: 492: 409: 395:Lorenz SZ 40/42 358: 287: 184: 183:Cipher machines 181: 134: 132:Further reading 129: 121: 117: 86: 12: 11: 5: 994: 984: 983: 966: 965: 962: 961: 959: 958: 947: 944: 943: 941: 940: 935: 933:Random numbers 930: 925: 920: 915: 910: 905: 900: 895: 890: 885: 879: 877: 873: 872: 870: 869: 864: 859: 857:Garlic routing 854: 849: 844: 839: 834: 829: 824: 819: 814: 809: 804: 799: 794: 789: 784: 779: 777:Secure channel 774: 768: 767: 766: 755: 750: 745: 740: 738:Key stretching 735: 730: 725: 720: 715: 710: 705: 704: 703: 698: 688: 686:Cryptovirology 683: 678: 673: 671:Cryptocurrency 668: 663: 658: 657: 656: 646: 641: 635: 633: 629: 628: 621: 620: 613: 606: 598: 591: 590: 587: 586: 583: 582: 580: 579: 574: 569: 564: 558: 556: 550: 549: 547: 546: 541: 536: 531: 526: 521: 516: 511: 506: 500: 498: 494: 493: 491: 490: 485: 480: 475: 470: 465: 460: 455: 450: 445: 440: 435: 430: 425: 419: 417: 411: 410: 408: 407: 402: 397: 392: 387: 382: 377: 372: 366: 364: 360: 359: 357: 356: 351: 349:Reihenschieber 346: 341: 336: 334:Jefferson disk 331: 326: 321: 316: 311: 306: 301: 295: 293: 289: 288: 286: 285: 280: 275: 270: 265: 260: 255: 250: 245: 240: 235: 230: 225: 220: 215: 210: 205: 200: 194: 192: 190:Rotor machines 186: 185: 180: 179: 172: 165: 157: 143: 142: 133: 130: 128: 127: 114: 113: 112: 105: 102: 93: 85: 82: 78:Latin alphabet 22:Bletchley Park 9: 6: 4: 3: 2: 993: 982: 979: 978: 976: 957: 949: 948: 945: 939: 938:Steganography 936: 934: 931: 929: 926: 924: 921: 919: 916: 914: 911: 909: 906: 904: 901: 899: 896: 894: 893:Stream cipher 891: 889: 886: 884: 881: 880: 878: 874: 868: 865: 863: 860: 858: 855: 853: 852:Onion routing 850: 848: 845: 843: 840: 838: 835: 833: 832:Shared secret 830: 828: 825: 823: 820: 818: 815: 813: 810: 808: 805: 803: 800: 798: 795: 793: 790: 788: 785: 783: 780: 778: 775: 772: 769: 764: 761: 760: 759: 756: 754: 751: 749: 746: 744: 741: 739: 736: 734: 731: 729: 728:Key generator 726: 724: 721: 719: 716: 714: 711: 709: 706: 702: 699: 697: 694: 693: 692: 691:Hash function 689: 687: 684: 682: 679: 677: 674: 672: 669: 667: 666:Cryptanalysis 664: 662: 659: 655: 652: 651: 650: 647: 645: 642: 640: 637: 636: 634: 630: 626: 619: 614: 612: 607: 605: 600: 599: 596: 592: 578: 575: 573: 570: 568: 565: 563: 560: 559: 557: 555: 551: 545: 542: 540: 537: 535: 532: 530: 527: 525: 522: 520: 517: 515: 512: 510: 507: 505: 502: 501: 499: 495: 489: 486: 484: 481: 479: 476: 474: 471: 469: 466: 464: 461: 459: 456: 454: 451: 449: 446: 444: 441: 439: 436: 434: 431: 429: 426: 424: 421: 420: 418: 416: 412: 406: 403: 401: 398: 396: 393: 391: 388: 386: 383: 381: 378: 376: 373: 371: 368: 367: 365: 361: 355: 352: 350: 347: 345: 342: 340: 337: 335: 332: 330: 327: 325: 322: 320: 317: 315: 312: 310: 307: 305: 302: 300: 297: 296: 294: 290: 284: 281: 279: 276: 274: 271: 269: 266: 264: 261: 259: 256: 254: 251: 249: 246: 244: 241: 239: 236: 234: 231: 229: 226: 224: 221: 219: 216: 214: 211: 209: 206: 204: 201: 199: 196: 195: 193: 191: 187: 178: 173: 171: 166: 164: 159: 158: 155: 151: 147: 140: 136: 135: 124: 119: 115: 110: 106: 103: 100: 99: 94: 91: 88: 87: 81: 79: 75: 74:Thai alphabet 70: 67: 62: 60: 56: 51: 48:In 1934, the 46: 44: 39: 38:Boris Hagelin 35: 31: 23: 18: 888:Block cipher 733:Key schedule 723:Key exchange 713:Kleptography 676:Cryptosystem 625:Cryptography 415:Secure voice 303: 208:M-125 Fialka 138: 118: 108: 96: 71: 66:Swedish Navy 63: 59:M-209 / C-38 47: 33: 29: 27: 876:Mathematics 867:Mix network 363:Teleprinter 319:Cipher disk 139:Cryptologia 98:Cryptologia 827:Ciphertext 797:Decryption 792:Encryption 753:Ransomware 428:FASCINATOR 292:Mechanical 84:References 817:Plaintext 975:Category 956:Category 862:Kademlia 822:Codetext 765:(CSPRNG) 577:IBM 4764 572:IBM 4758 539:Pinwheel 632:General 483:STU-III 468:SIGSALY 423:BID 150 375:BID 770 354:Scytale 278:Singlet 238:Mercury 743:Keygen 544:Rockex 534:Purple 524:Noreen 488:VINSON 478:STU-II 448:NESTOR 405:SIGTOT 273:SIGCUM 268:SIGABA 228:Lacida 213:Hebern 203:Enigma 50:French 24:museum 773:(PRN) 519:KL-51 514:KL-43 509:KG-84 497:Other 443:KY-68 438:KY-58 390:KW-37 385:KW-26 380:DUDEK 370:5-UCO 344:M-209 329:Kryha 314:CD-57 283:Typex 263:SG-41 258:SG-39 233:M-325 218:HX-63 43:M-209 504:JADE 458:SCIP 453:OMNI 433:KY-3 339:M-94 324:HC-9 309:C-52 304:C-36 243:NEMA 223:KL-7 55:B-21 34:C-36 32:and 30:C-35 28:The 529:Red 473:STE 253:RED 248:OMI 198:CCM 977:: 80:. 617:e 610:t 603:v 176:e 169:t 162:v

Index


Bletchley Park
Boris Hagelin
M-209
French
B-21
M-209 / C-38
Swedish Navy
Thai alphabet
Latin alphabet

Cryptologia

v
t
e
Rotor machines
CCM
Enigma
M-125 Fialka
Hebern
HX-63
KL-7
Lacida
M-325
Mercury
NEMA
OMI
RED
SG-39

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑