Knowledge

HX-63

Source đź“ť

61:. Development of the device started in 1952 and lasted a decade. The machine had nine rotors, each with 41 contacts. There were 26 keyboard inputs and outputs, leaving 15 wires to "loop back" through the rotors via a different path. Moreover, each rotor wire could be selected from one of two paths. The movement of the rotors was irregular and controlled by switches. There were two plugboards with the machine; one to scramble the input, and one for the loop-back wires. The machine also used a technique called reinjection (also called reentry), which increased its security exponentially. The machine could be set up in around 10 different configurations. 1041: 1069: 24: 30:
A diagram of a loopback-rotor construction; in this simplified example, two rotors with nine contacts each are used. There are six inputs and outputs, leaving three loop-back wires.
1021: 851: 546: 263: 704: 218: 71:, was alarmed when he read Hagelin's patent on the machine. Friedman realized that the machine was more secure than the NSA's 1106: 188: 126: 256: 697: 148: 900: 249: 230:
Cipher A. Deavours and Louis Kruh, "Machine Cryptography and Modern Cryptanalysis", Artech House, 1985, p199.
690: 1130: 1016: 971: 784: 895: 1099: 1011: 642: 561: 1001: 991: 846: 326: 68: 551: 118:
Codeknacker gegen Codemacher: die faszinierende Geschichte der VerschlĂĽsselung; [Sachbuch]
82:
Only twelve of these machines were manufactured, and it was adopted by only one department of the
1125: 996: 986: 789: 749: 742: 732: 727: 627: 286: 737: 488: 351: 346: 116: 1044: 890: 836: 622: 617: 592: 397: 392: 1092: 1006: 930: 655: 341: 301: 8: 769: 650: 536: 213: 875: 859: 806: 935: 925: 796: 184: 122: 83: 870: 64: 336: 174: 1080: 1076: 945: 865: 826: 774: 759: 437: 422: 387: 331: 291: 79:, and Friedman called on Hagelin to terminate the program, which CryptoAG did. 1119: 1026: 981: 940: 920: 816: 779: 754: 483: 278: 58: 50: 976: 821: 811: 801: 764: 713: 503: 180: 76: 955: 541: 407: 915: 885: 880: 841: 516: 207: 905: 54: 950: 910: 665: 660: 571: 556: 511: 463: 442: 23: 1068: 831: 632: 612: 576: 566: 493: 366: 361: 356: 316: 296: 607: 602: 597: 531: 526: 478: 473: 468: 458: 432: 417: 402: 371: 321: 75:
and unbreakable. Friedman and Hagelin were good friends from
172: 521: 427: 412: 311: 152: 95: 72: 149:"The Scandalous History of the Last Rotor Cipher Machine" 852:
Cryptographically secure pseudorandom number generator
233: 173:Cipher A. Deavours; Louis Kruh (1 January 1985). 1117: 166: 142: 140: 138: 1100: 698: 257: 176:Machine Cryptography and Modern Cryptanalysis 114: 210:— photographs and a brief description 135: 1107: 1093: 705: 691: 264: 250: 214:Notice of a past eBay auction of an HX-63 108: 1075:This cryptography-related article is a 219:John Savard's discussion on the machine 1118: 67:, the first chief cryptologist of the 686: 245: 1063: 146: 271: 69:U.S. National Security Agency (NSA) 13: 224: 22: 14: 1142: 201: 1067: 1040: 1039: 712: 147:Paul, Jon D. (August 31, 2021). 901:Information-theoretic security 1: 101: 1079:. You can help Knowledge by 7: 1017:Message authentication code 972:Cryptographic hash function 785:Cryptographic hash function 121:. W3l GmbH. pp. 208–. 89: 10: 1147: 1062: 896:Harvest now, decrypt later 1035: 1012:Post-quantum cryptography 964: 720: 682: 641: 585: 502: 451: 380: 277: 241: 237: 35: 21: 1002:Quantum key distribution 992:Authenticated encryption 847:Random number generation 997:Public-key cryptography 987:Symmetric-key algorithm 790:Key derivation function 750:Cryptographic primitive 743:Authentication protocol 733:Outline of cryptography 728:History of cryptography 738:Cryptographic protocol 489:Siemens and Halske T52 27: 891:End-to-end encryption 837:Cryptojacking malware 552:SectĂ©ra Secure Module 115:Klaus Schmeh (2008). 26: 1007:Quantum cryptography 931:Trusted timestamping 656:Intel SHA extensions 770:Cryptographic nonce 651:AES instruction set 18: 1131:Cryptography stubs 876:Subliminal channel 860:Pseudorandom noise 807:Key (cryptography) 208:Jerry Proc's pages 28: 16: 1088: 1087: 1057: 1056: 1053: 1052: 936:Key-based routing 926:Trapdoor function 797:Digital signature 678: 677: 674: 673: 643:Computer hardware 388:Bazeries cylinder 190:978-0-89006-161-9 183:. pp. 199–. 128:978-3-937137-89-6 84:French Government 43: 42: 1138: 1109: 1102: 1095: 1071: 1064: 1043: 1042: 871:Insecure channel 707: 700: 693: 684: 683: 266: 259: 252: 243: 242: 239: 238: 235: 234: 195: 194: 170: 164: 163: 161: 159: 144: 133: 132: 112: 65:William Friedman 49:was an advanced 19: 15: 1146: 1145: 1141: 1140: 1139: 1137: 1136: 1135: 1116: 1115: 1114: 1113: 1060: 1058: 1049: 1031: 960: 716: 711: 670: 637: 581: 498: 484:Lorenz SZ 40/42 447: 376: 273: 272:Cipher machines 270: 227: 225:Further reading 204: 199: 198: 191: 171: 167: 157: 155: 145: 136: 129: 113: 109: 104: 92: 31: 12: 11: 5: 1144: 1134: 1133: 1128: 1126:Rotor machines 1112: 1111: 1104: 1097: 1089: 1086: 1085: 1072: 1055: 1054: 1051: 1050: 1048: 1047: 1036: 1033: 1032: 1030: 1029: 1024: 1022:Random numbers 1019: 1014: 1009: 1004: 999: 994: 989: 984: 979: 974: 968: 966: 962: 961: 959: 958: 953: 948: 946:Garlic routing 943: 938: 933: 928: 923: 918: 913: 908: 903: 898: 893: 888: 883: 878: 873: 868: 866:Secure channel 863: 857: 856: 855: 844: 839: 834: 829: 827:Key stretching 824: 819: 814: 809: 804: 799: 794: 793: 792: 787: 777: 775:Cryptovirology 772: 767: 762: 760:Cryptocurrency 757: 752: 747: 746: 745: 735: 730: 724: 722: 718: 717: 710: 709: 702: 695: 687: 680: 679: 676: 675: 672: 671: 669: 668: 663: 658: 653: 647: 645: 639: 638: 636: 635: 630: 625: 620: 615: 610: 605: 600: 595: 589: 587: 583: 582: 580: 579: 574: 569: 564: 559: 554: 549: 544: 539: 534: 529: 524: 519: 514: 508: 506: 500: 499: 497: 496: 491: 486: 481: 476: 471: 466: 461: 455: 453: 449: 448: 446: 445: 440: 438:Reihenschieber 435: 430: 425: 423:Jefferson disk 420: 415: 410: 405: 400: 395: 390: 384: 382: 378: 377: 375: 374: 369: 364: 359: 354: 349: 344: 339: 334: 329: 324: 319: 314: 309: 304: 299: 294: 289: 283: 281: 279:Rotor machines 275: 274: 269: 268: 261: 254: 246: 232: 231: 226: 223: 222: 221: 216: 211: 203: 202:External links 200: 197: 196: 189: 165: 134: 127: 106: 105: 103: 100: 99: 98: 91: 88: 86:(about 1960). 41: 40: 37: 33: 32: 29: 9: 6: 4: 3: 2: 1143: 1132: 1129: 1127: 1124: 1123: 1121: 1110: 1105: 1103: 1098: 1096: 1091: 1090: 1084: 1082: 1078: 1073: 1070: 1066: 1065: 1061: 1046: 1038: 1037: 1034: 1028: 1027:Steganography 1025: 1023: 1020: 1018: 1015: 1013: 1010: 1008: 1005: 1003: 1000: 998: 995: 993: 990: 988: 985: 983: 982:Stream cipher 980: 978: 975: 973: 970: 969: 967: 963: 957: 954: 952: 949: 947: 944: 942: 941:Onion routing 939: 937: 934: 932: 929: 927: 924: 922: 921:Shared secret 919: 917: 914: 912: 909: 907: 904: 902: 899: 897: 894: 892: 889: 887: 884: 882: 879: 877: 874: 872: 869: 867: 864: 861: 858: 853: 850: 849: 848: 845: 843: 840: 838: 835: 833: 830: 828: 825: 823: 820: 818: 817:Key generator 815: 813: 810: 808: 805: 803: 800: 798: 795: 791: 788: 786: 783: 782: 781: 780:Hash function 778: 776: 773: 771: 768: 766: 763: 761: 758: 756: 755:Cryptanalysis 753: 751: 748: 744: 741: 740: 739: 736: 734: 731: 729: 726: 725: 723: 719: 715: 708: 703: 701: 696: 694: 689: 688: 685: 681: 667: 664: 662: 659: 657: 654: 652: 649: 648: 646: 644: 640: 634: 631: 629: 626: 624: 621: 619: 616: 614: 611: 609: 606: 604: 601: 599: 596: 594: 591: 590: 588: 584: 578: 575: 573: 570: 568: 565: 563: 560: 558: 555: 553: 550: 548: 545: 543: 540: 538: 535: 533: 530: 528: 525: 523: 520: 518: 515: 513: 510: 509: 507: 505: 501: 495: 492: 490: 487: 485: 482: 480: 477: 475: 472: 470: 467: 465: 462: 460: 457: 456: 454: 450: 444: 441: 439: 436: 434: 431: 429: 426: 424: 421: 419: 416: 414: 411: 409: 406: 404: 401: 399: 396: 394: 391: 389: 386: 385: 383: 379: 373: 370: 368: 365: 363: 360: 358: 355: 353: 350: 348: 345: 343: 340: 338: 335: 333: 330: 328: 325: 323: 320: 318: 315: 313: 310: 308: 305: 303: 300: 298: 295: 293: 290: 288: 285: 284: 282: 280: 276: 267: 262: 260: 255: 253: 248: 247: 244: 240: 236: 229: 228: 220: 217: 215: 212: 209: 206: 205: 192: 186: 182: 178: 177: 169: 158:September 15, 154: 150: 143: 141: 139: 130: 124: 120: 119: 111: 107: 97: 94: 93: 87: 85: 80: 78: 74: 70: 66: 62: 60: 59:Boris Hagelin 56: 52: 51:rotor machine 48: 39:rotor machine 38: 34: 25: 20: 1081:expanding it 1074: 1059: 977:Block cipher 822:Key schedule 812:Key exchange 802:Kleptography 765:Cryptosystem 714:Cryptography 504:Secure voice 306: 297:M-125 Fialka 181:Artech House 175: 168: 156:. Retrieved 117: 110: 81: 77:World War II 63: 53:designed by 46: 44: 965:Mathematics 956:Mix network 452:Teleprinter 408:Cipher disk 1120:Categories 916:Ciphertext 886:Decryption 881:Encryption 842:Ransomware 517:FASCINATOR 381:Mechanical 102:References 906:Plaintext 55:Crypto AG 1045:Category 951:Kademlia 911:Codetext 854:(CSPRNG) 666:IBM 4764 661:IBM 4758 628:Pinwheel 90:See also 57:founder 721:General 572:STU-III 557:SIGSALY 512:BID 150 464:BID 770 443:Scytale 367:Singlet 327:Mercury 832:Keygen 633:Rockex 623:Purple 613:Noreen 577:VINSON 567:STU-II 537:NESTOR 494:SIGTOT 362:SIGCUM 357:SIGABA 317:Lacida 302:Hebern 292:Enigma 187:  125:  862:(PRN) 608:KL-51 603:KL-43 598:KG-84 586:Other 532:KY-68 527:KY-58 479:KW-37 474:KW-26 469:DUDEK 459:5-UCO 433:M-209 418:Kryha 403:CD-57 372:Typex 352:SG-41 347:SG-39 322:M-325 307:HX-63 47:HX-63 17:HX-63 1077:stub 593:JADE 547:SCIP 542:OMNI 522:KY-3 428:M-94 413:HC-9 398:C-52 393:C-36 332:NEMA 312:KL-7 185:ISBN 160:2021 153:IEEE 123:ISBN 96:KL-7 73:KL-7 45:The 36:Type 618:Red 562:STE 342:RED 337:OMI 287:CCM 1122:: 179:. 151:. 137:^ 1108:e 1101:t 1094:v 1083:. 706:e 699:t 692:v 265:e 258:t 251:v 193:. 162:. 131:.

Index


rotor machine
Crypto AG
Boris Hagelin
William Friedman
U.S. National Security Agency (NSA)
KL-7
World War II
French Government
KL-7
Codeknacker gegen Codemacher: die faszinierende Geschichte der VerschlĂĽsselung; [Sachbuch]
ISBN
978-3-937137-89-6



"The Scandalous History of the Last Rotor Cipher Machine"
IEEE
Machine Cryptography and Modern Cryptanalysis
Artech House
ISBN
978-0-89006-161-9
Jerry Proc's pages
Notice of a past eBay auction of an HX-63
John Savard's discussion on the machine
v
t
e
Rotor machines
CCM

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑