1097:
73:
125:
20:
101:
The "Combined Cipher
Machine" was approved in October 1942, and production began two months later. The requisite adapters, designed by Don Seiler, were all manufactured in the US, as Britain did not have sufficient manufacturing resources at the time. The CCM was initially used on a small scale for
85:
The
British had shown their main cipher machine — Typex — to the US on their entry into the war, but the Americans were reluctant to share their machine, the
1077:
907:
117:). The adapter was a replacement rotor basket, so the ECM could be easily converted for CCM use in the field. A specially converted ECM, termed the
89:. There was a need for secure inter-Allied communications, and so a joint cipher machine adapted from both countries' systems was developed by the
602:
319:
760:
171:
had a period of 16,900. In addition, the rotor wiring could be recovered from a 1,000-group message that had been sent using the machine.
138:
was an implementation of the CCM which, at one point, was proposed as a replacement for the ECM Mark II (Savard and
Pekelney, 1999).
205:
163:
However, there were security problems with the CCM. It was discovered that certain rotor combinations produced a dangerously short
312:
753:
1130:
266:
128:
Typex Mark 23, pictured, was similar to the Mark 22, but modified for use with the
Combined Cypher Machine (CCM).
956:
305:
746:
1135:
1072:
1027:
840:
240:
Ralph
Erskine, "The Admiralty and Cipher Machines During the Second World War: Not So Stupid after All",
951:
257:
CSP 1100(C), Operating
Instructions for ECM Mark 2 (CSP 888/889) and CCM Mark 1 (CSP 1600), May 1944,
1067:
698:
617:
160:, their German counterparts, although performing some initial analysis, had no success with the CCM.
102:
naval use from 1 November 1943, becoming operational on all US and UK armed services in April 1944.
1057:
1047:
902:
382:
607:
1125:
1052:
1042:
845:
805:
798:
788:
783:
683:
793:
544:
407:
402:
44:
250:
John J. G. Savard and
Richard S. Pekelney, "The ECM Mark II: Design, History and Cryptology",
1100:
946:
892:
678:
673:
648:
453:
448:
1062:
986:
711:
397:
357:
8:
825:
706:
592:
225:
931:
915:
862:
247:
Ralph
Erskine, "The Development of Typex", The Enigma Bulletin 2 (1997): pp69–86.
156:
While Allied codebreakers had much success reading the equivalent German machine, the
991:
981:
852:
164:
283:
113:
by the US Navy (the Navy referred to the entire ECM machine with CCM adapter as the
926:
258:
217:
174:
In 1952, a later version of CCM, "Ajax", was also found to have security problems.
392:
270:
1001:
921:
882:
830:
815:
493:
478:
443:
387:
347:
168:
56:
221:
1119:
1082:
1037:
996:
976:
872:
835:
810:
539:
334:
157:
63:
1032:
877:
867:
857:
820:
769:
559:
48:
1011:
597:
463:
72:
66:
971:
941:
936:
897:
572:
206:"Enigma: Actions Involved in the 'Double-Stepping' of the Middle Rotor"
23:
CSP 1600, the replacement stepping unit to adapt the ECM Mark II to CCM
264:
961:
186:– a rotor-based cipher machine used by the US in the 1950s and 1960s
1006:
966:
721:
716:
627:
612:
567:
519:
498:
90:
19:
887:
688:
668:
632:
622:
549:
422:
417:
412:
372:
352:
124:
86:
40:
663:
658:
653:
587:
582:
534:
529:
524:
514:
488:
473:
458:
427:
377:
362:
145:
141:
59:
105:
The adapter to convert the ECM into the CCM was denoted the
577:
483:
468:
367:
183:
148:
that was adapted for use with the
Combined Cipher Machine.
52:
908:
Cryptographically secure pseudorandom number generator
289:
284:
Combined Cipher
Machine on the Crypto Museum website
69:
were both modified so that they were interoperable.
121:, was also made available to Britain and Canada.
1117:
263:Crypto-Operating Instructions for ASAM 1, 1949,
754:
313:
197:
761:
747:
320:
306:
254:, Vol 23(3), July 1999, pp211–228.
123:
71:
18:
1118:
132:The CCM programme cost US$ 6 million.
742:
301:
203:
327:
13:
76:Stepping mechanism in the CSP 1600
14:
1147:
277:
144:Mark 23 was a later model of the
1096:
1095:
768:
242:Journal of Intelligence History
51:and, for a few years after, by
957:Information-theoretic security
1:
204:Hamer, David (January 1997).
190:
109:by the US Army (in 1949) and
16:WWII-era Allied cipher system
43:machine system for securing
7:
1073:Message authentication code
1028:Cryptographic hash function
841:Cryptographic hash function
177:
151:
146:Typex cipher machine family
10:
1152:
952:Harvest now, decrypt later
80:
1091:
1068:Post-quantum cryptography
1020:
776:
738:
697:
641:
558:
507:
436:
333:
297:
293:
222:10.1080/0161-119791885779
1058:Quantum key distribution
1048:Authenticated encryption
903:Random number generation
1053:Public-key cryptography
1043:Symmetric-key algorithm
846:Key derivation function
806:Cryptographic primitive
799:Authentication protocol
789:Outline of cryptography
784:History of cryptography
37:Combined Cypher Machine
29:Combined Cipher Machine
1131:Cryptographic hardware
794:Cryptographic protocol
545:Siemens and Halske T52
167:of 338; a three-rotor
129:
96:
77:
47:communications during
24:
947:End-to-end encryption
893:Cryptojacking malware
608:Sectéra Secure Module
286:with many photographs
244:, 2(2) (Winter 2002).
127:
75:
22:
1063:Quantum cryptography
987:Trusted timestamping
712:Intel SHA extensions
826:Cryptographic nonce
707:AES instruction set
1136:Encryption devices
932:Subliminal channel
916:Pseudorandom noise
863:Key (cryptography)
269:2010-12-03 at the
130:
78:
25:
1113:
1112:
1109:
1108:
992:Key-based routing
982:Trapdoor function
853:Digital signature
734:
733:
730:
729:
699:Computer hardware
444:Bazeries cylinder
1143:
1099:
1098:
927:Insecure channel
763:
756:
749:
740:
739:
322:
315:
308:
299:
298:
295:
294:
291:
290:
233:
232:
231:on 19 July 2011.
230:
224:. Archived from
201:
62:machine and the
1151:
1150:
1146:
1145:
1144:
1142:
1141:
1140:
1116:
1115:
1114:
1105:
1087:
1016:
772:
767:
726:
693:
637:
554:
540:Lorenz SZ 40/42
503:
432:
329:
328:Cipher machines
326:
280:
271:Wayback Machine
237:
236:
228:
202:
198:
193:
180:
154:
99:
83:
39:) was a common
17:
12:
11:
5:
1149:
1139:
1138:
1133:
1128:
1126:Rotor machines
1111:
1110:
1107:
1106:
1104:
1103:
1092:
1089:
1088:
1086:
1085:
1080:
1078:Random numbers
1075:
1070:
1065:
1060:
1055:
1050:
1045:
1040:
1035:
1030:
1024:
1022:
1018:
1017:
1015:
1014:
1009:
1004:
1002:Garlic routing
999:
994:
989:
984:
979:
974:
969:
964:
959:
954:
949:
944:
939:
934:
929:
924:
922:Secure channel
919:
913:
912:
911:
900:
895:
890:
885:
883:Key stretching
880:
875:
870:
865:
860:
855:
850:
849:
848:
843:
833:
831:Cryptovirology
828:
823:
818:
816:Cryptocurrency
813:
808:
803:
802:
801:
791:
786:
780:
778:
774:
773:
766:
765:
758:
751:
743:
736:
735:
732:
731:
728:
727:
725:
724:
719:
714:
709:
703:
701:
695:
694:
692:
691:
686:
681:
676:
671:
666:
661:
656:
651:
645:
643:
639:
638:
636:
635:
630:
625:
620:
615:
610:
605:
600:
595:
590:
585:
580:
575:
570:
564:
562:
556:
555:
553:
552:
547:
542:
537:
532:
527:
522:
517:
511:
509:
505:
504:
502:
501:
496:
494:Reihenschieber
491:
486:
481:
479:Jefferson disk
476:
471:
466:
461:
456:
451:
446:
440:
438:
434:
433:
431:
430:
425:
420:
415:
410:
405:
400:
395:
390:
385:
380:
375:
370:
365:
360:
355:
350:
345:
339:
337:
335:Rotor machines
331:
330:
325:
324:
317:
310:
302:
288:
287:
279:
278:External links
276:
275:
274:
261:
255:
248:
245:
235:
234:
195:
194:
192:
189:
188:
187:
179:
176:
169:Enigma machine
153:
150:
98:
95:
82:
79:
15:
9:
6:
4:
3:
2:
1148:
1137:
1134:
1132:
1129:
1127:
1124:
1123:
1121:
1102:
1094:
1093:
1090:
1084:
1083:Steganography
1081:
1079:
1076:
1074:
1071:
1069:
1066:
1064:
1061:
1059:
1056:
1054:
1051:
1049:
1046:
1044:
1041:
1039:
1038:Stream cipher
1036:
1034:
1031:
1029:
1026:
1025:
1023:
1019:
1013:
1010:
1008:
1005:
1003:
1000:
998:
997:Onion routing
995:
993:
990:
988:
985:
983:
980:
978:
977:Shared secret
975:
973:
970:
968:
965:
963:
960:
958:
955:
953:
950:
948:
945:
943:
940:
938:
935:
933:
930:
928:
925:
923:
920:
917:
914:
909:
906:
905:
904:
901:
899:
896:
894:
891:
889:
886:
884:
881:
879:
876:
874:
873:Key generator
871:
869:
866:
864:
861:
859:
856:
854:
851:
847:
844:
842:
839:
838:
837:
836:Hash function
834:
832:
829:
827:
824:
822:
819:
817:
814:
812:
811:Cryptanalysis
809:
807:
804:
800:
797:
796:
795:
792:
790:
787:
785:
782:
781:
779:
775:
771:
764:
759:
757:
752:
750:
745:
744:
741:
737:
723:
720:
718:
715:
713:
710:
708:
705:
704:
702:
700:
696:
690:
687:
685:
682:
680:
677:
675:
672:
670:
667:
665:
662:
660:
657:
655:
652:
650:
647:
646:
644:
640:
634:
631:
629:
626:
624:
621:
619:
616:
614:
611:
609:
606:
604:
601:
599:
596:
594:
591:
589:
586:
584:
581:
579:
576:
574:
571:
569:
566:
565:
563:
561:
557:
551:
548:
546:
543:
541:
538:
536:
533:
531:
528:
526:
523:
521:
518:
516:
513:
512:
510:
506:
500:
497:
495:
492:
490:
487:
485:
482:
480:
477:
475:
472:
470:
467:
465:
462:
460:
457:
455:
452:
450:
447:
445:
442:
441:
439:
435:
429:
426:
424:
421:
419:
416:
414:
411:
409:
406:
404:
401:
399:
396:
394:
391:
389:
386:
384:
381:
379:
376:
374:
371:
369:
366:
364:
361:
359:
356:
354:
351:
349:
346:
344:
341:
340:
338:
336:
332:
323:
318:
316:
311:
309:
304:
303:
300:
296:
292:
285:
282:
281:
272:
268:
265:
262:
259:
256:
253:
249:
246:
243:
239:
238:
227:
223:
219:
215:
211:
207:
200:
196:
185:
182:
181:
175:
172:
170:
166:
161:
159:
158:Lorenz cipher
149:
147:
143:
139:
137:
133:
126:
122:
120:
116:
112:
108:
103:
94:
92:
88:
74:
70:
68:
65:
61:
58:
54:
50:
46:
42:
38:
34:
30:
21:
1033:Block cipher
878:Key schedule
868:Key exchange
858:Kleptography
821:Cryptosystem
770:Cryptography
560:Secure voice
353:M-125 Fialka
342:
251:
241:
226:the original
216:(1): 47–50.
213:
209:
199:
173:
162:
155:
140:
135:
134:
131:
118:
114:
110:
106:
104:
100:
84:
49:World War II
36:
32:
28:
26:
1021:Mathematics
1012:Mix network
508:Teleprinter
464:Cipher disk
252:Cryptologia
210:Cryptologia
119:CCM Mark II
87:ECM Mark II
67:ECM Mark II
1120:Categories
972:Ciphertext
942:Decryption
937:Encryption
898:Ransomware
573:FASCINATOR
437:Mechanical
191:References
962:Plaintext
1101:Category
1007:Kademlia
967:Codetext
910:(CSPRNG)
722:IBM 4764
717:IBM 4758
684:Pinwheel
267:Archived
178:See also
152:Security
115:CSP 1700
111:CSP 1600
777:General
628:STU-III
613:SIGSALY
568:BID 150
520:BID 770
499:Scytale
423:Singlet
383:Mercury
91:US Navy
81:History
57:British
888:Keygen
689:Rockex
679:Purple
669:Noreen
633:VINSON
623:STU-II
593:NESTOR
550:SIGTOT
418:SIGCUM
413:SIGABA
373:Lacida
358:Hebern
348:Enigma
165:period
136:SIGROD
107:ASAM 5
55:. The
45:Allied
41:cipher
35:) (or
918:(PRN)
664:KL-51
659:KL-43
654:KG-84
642:Other
588:KY-68
583:KY-58
535:KW-37
530:KW-26
525:DUDEK
515:5-UCO
489:M-209
474:Kryha
459:CD-57
428:Typex
408:SG-41
403:SG-39
378:M-325
363:HX-63
229:(zip)
142:TypeX
60:Typex
649:JADE
603:SCIP
598:OMNI
578:KY-3
484:M-94
469:HC-9
454:C-52
449:C-36
388:NEMA
368:KL-7
184:KL-7
53:NATO
27:The
674:Red
618:STE
398:RED
393:OMI
343:CCM
218:doi
97:Use
33:CCM
1122::
214:21
212:.
208:.
93:.
64:US
762:e
755:t
748:v
321:e
314:t
307:v
273:.
260:.
220::
31:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.