Knowledge

Schlüsselgerät 39

Source 📝

417:, and only gradually, as production permitted, was the Enigma machine to be replaced by the 39 at Armies, and finally perhaps at Army Corps. There were, during 1943 and 1944 between the various HQs interested, many and lengthy discussions and arguments for and against the introduction of the 39 machine. Special wishes of the Navy had to be taken into account. The industrial firm complained of lack of material and labour. Owing to these and similar difficulties, development stopped altogether at one time, and it was resumed however. At any rate the vagueness of the decisive authorities was, in addition to difficulties of production, the chief reason why the machine was never completed. 389:). A noteworthy feature was that when the clear-text letter was keyed, the corresponding cipher letter could be sent out simultaneously by the transmitter as a Morse character. This from a technical point of view, a fairly complicated operation. The machine thus was like a cipher teleprinter except that instead of the 5-element alphabet the ordinary Morse alphabet was used. The maximum keying speed was also the same as on a current (1940s) cipher teleprinter. It could not however be made use of when working on direct transmission, because reception at the other end was not automatic as in the case of a cipher teleprinter, but had to be done 180: 277: 100: 1479: 39:. The device was the evolution of the Enigma rotors coupled with three Hagelin pin wheels to provide variable stepping of the rotors. All three wheels stepped once with each encipherment. Rotors stepped according to normal Enigma rules, except that an active pin at the reading station for a pin wheel prevented the coupled rotor from stepping. The cycle for a normal Enigma was 17,576 characters. When the 462: 273:
purposes were however given. Buggisch could not remember the details of these somewhat investigations. The extraordinary length of many pre-periods (lengths of some thousands were not uncommon) and the complication of their branches were remarkable. The general type can be illustrated by the following diagram:
187:
The pin wheels have a uniform motion, i.e. they move one position for every letter keyed. As for the movement of the key wheels and other details, the machine passed through different stages of development in the course of time, for which there were no specific names and which will be denoted here by
272:
Things are much more complicated in the case of Model b). Investigations into this problem in the winter of 1942/1943 were only partly successful; above all it was not possible exactly to calculate the lengths of the pure periods and the pre-periods. Estimates which were quite adequate for practical
250:
of OKW/Chi told Buggisch that the reciprocal influencing of the wheels was to be altered in some way. Buggisch could not remember the details but nothing fundamental on the principle of the machine described under c) was changed. Interchangeable working with army and naval Enigma remained possible.
334:
39, 5. then no longer appears vital. On the other hand, however, the giving up of the adjustable rings and of the stecker gave rise to weaknesses which the Enigma did not have. In fact, the absence of stecker S cannot be compensated for by making the reflector wheel U pluggable; investigations into
196:
Wheels I, I and III, whose wiring now correspond exactly to those of the Enigma, have adjustable rings; they can be moved around the body of the wheels and have a fixed pin, which, by analogy with the Enigma, is to be called the turn-over notch, although mechanically it is not so made. Opposite the
192:
Each of three wheels moves on one place when there is an active pin at the sensing point of the relevant pin-wheel, and it only moves then. The wheels have no moveable rings on the body of the wheel, with the result that, unlike the Enigma, the initial position of the body of the wheel is determine
128:
cipher machine. A direct current passes through 3 or 4 wheels, with 26 positions, I, II, II, a reflector wheel U, and the again through the 3 wheels in reverse order, III II and I. Unlike the Enigma, the wheels here do not control their own movement: this is done through 3 independent pin-wheels N1
393:
by the operator. That was one of the many reasons why the automatic transmission part of the machine was omitted in later models. This was done when Oberst Kahn, the director of the Pruef 7 department of the Waffenamt, left, he having especially advocated this strange principle. The second model
354:
The above-mentioned weakness of model a) were eliminated by the introduction of steckering and adjustable rings of model b), although this had been done primarily for quite a different reason, namely to make interchangeable working with Enigma possible. It was not now thought that there was any
284:
In this circle represents the pure period and the straight lines the pre-periods. There were usually several pure periods, each one of them having a complicated system of pre-periods branching into it. Several separate figures of the above type side by side are then necessary to give a graphic
311:
was comparatively small, so that when there was a large amount of traffic on one day, on one key, one had to reckon with the concurrence of critical depths (this applies at least to the Army Enigma; the naval machine had a fourth wheel, so that a days traffic on one key was spread out over 26
243:
interchangeable working with the Enigma remains. In addition, the machine now gets a fourth wheel, which is placed between III and U and does not move on when a key is touched. It corresponds to the fourth wheel on the Naval Enigma and is used for interchangeable working with this machine.
242:
A sensing-point is also provided opposite wheel III. If the turn-over notch on the ring of III is touched by it, then I turns on one place when the next letter is keyed. If this movement coincides with the step caused by N1, this again results in the single step. Thus the possibility of
358:
Finally in model c), the total number of periods was multiplied by 26 compared with a) and b), but the introduction of a fourth wheel; it was not, it is true, intended primarily for this purpose but was added to carry out interchangeable working with the Naval Enigma.
355:
longer a serious possibility of a break-in. As however the system of I and N1 still had a relatively small period of 21 x 26 it appeared desirable to destroy this too. This was done on model c) by making III react to I, and presented no technical difficulties.
204:
Working on own wiring: N1 N2 and N3 are given a certain pin arrangements, there being, it is true, certain limitations to the number of activating pins. Wheel I moves as under a) above. For wheel II there are the following 3 causes of movement:
288:
The questions of periodicities in the case of model c) was still more involved. It was just not possible to calculate the lengths of the pure periods and pre-periods, let alone give the lower limits which are themselves not inconsiderable.
237:, the pins of N2 and N3 all remaining inactive. Then the movements identical with that of the Enigma. As all other factors also agree with the corresponding ones on the Enigma interchangeable working between both machines is possible. 268:
as long as the number of active pins on each of the pin wheels is prime to 2 and 13. This last condition should be laid down in the cipher regulations; otherwise the 676 periods would be further broken in a manner easily seen.
193:
absolutely, at the same time as the clear message setting. The reflector wheel is pluggable like the reflector wheel D on the Enigma; it can be quickly exchanged for the second reflector wheel with prepared reflector plugging.
342:
If the inner wiring and the clear message setting of wheels I, II and II are known, the wiring of the reflector wheel and the pin arrangement of N1 N2 N3 can be found out from a crib of 25 letters, this was a fairly laborious
394:
actually constructed was like the model designated with c) in the section above. It only printed clear text and cipher text on 2 separate strips. Buggisch saw it in January 1944 when I was visiting Wa Pruef 7 Section II at
197:
wheels I and II are two sensing points which pick up the turn-over notch as it passes. U is pluggable as in a). In addition there is between the point of input and I, a stecker S like the Enigma
346:
If the inner wiring of wheels I, I and II and of the reflector wheel U is known, it is likewise possible to find out the clear message-setting and the pin-arrangement of N1 N2 and N3 from a
326:
The number of possible wheel combinations was only 60, since the set of wheels belonging to the machine, at least in the case of the Army Enigma, only consisted of 5 different wheels.
74: 221:
If any of these three causes of movement take effect simultaneously on II, it nevertheless only moves on one place. There are three causes of movement for wheel III.
1459: 1289: 80:
39 was fully automatic, in that when a key was pressed, the plain and cipher letters were printed on separate paper tapes, divided into five-digit groups. The
440: 1527: 1517: 405:
who laid down the principle that any newly introduced cipher machine for higher HQs should permit interchangeable working with the Enigma. The Army (
214:
When the turn-over notch comes to the sensing point of II, II turns on one place when the next letter is keyed (at the same time as III, as with the
984: 701: 413:) also adopted this standpoint: In the first instance only the highest authorities were to be issued with the new machine, e.g. OKW, OKH and the 285:
representation of the periodicities. A lower limit for the lengths of the pure periods was, as far as I remember: 25 x 21 x 23 x 25 = 8,162,700.
1532: 1142: 211:
When the turn-over notch on the ring of I comes to the sensing point, II is caused to move on when the next letter is keyed (as with Enigma).
1522: 315:
The reflector wheel was not plugable and had remained unchanged for years (and because of (5), the enemy could easily establish by
230:
Just as in the case of II, if the two causes of the movement for III operation simultaneously the combine to produce one stop.
129:
N2 and N3 with periods 21,23 and 25. The figures were distributed among N1 N2 and N2 in possibly two different configurations.
517: 490: 260:
In the case of model first a) above, the question of periodicity is elementary, there are 26=676 pure periods of the length
227:
When the turn-over notch on the ring of II comes to the sensing point, III moves on one place when the next letter is keyed.
694: 401:
The change from cipher-technical a) to b) and also c) was made at the end of 1942. It was made at the instigation of the
1135: 335:
Enigma had shown that it was considerably more difficult to find out the steckering S than the reflectoring wheel U.
1507: 1338: 687: 385:, and was made by the firm Telefonbau und Normalzeit (literally 'Telephone and Standard Time', later called 1128: 1512: 1454: 1409: 1222: 1333: 247: 450:. Document ref:2757002. Cryptologic Quarterly, Vol. 2, Nos. 3-4; autumn/winter 1983-84. pp. 21–36 1449: 1080: 999: 1439: 1429: 1284: 764: 224:
An active pin at the sensing-point of N3 causes III to move to one place, as in the first a) above,
989: 482:
Codeknacker gegen Codemacher: die faszinierende Geschichte der Verschlüsselung; [Sachbuch]
1537: 1434: 1424: 1227: 1187: 1180: 1170: 1165: 1065: 724: 406: 46: 1175: 926: 789: 347: 85: 507: 480: 124:
Gerät 39 is an electrically operated cipher machine. The cipher technique is derived from the
1482: 1328: 1274: 1060: 1055: 1030: 835: 830: 316: 179: 1444: 1368: 1093: 779: 739: 8: 1207: 1088: 974: 198: 1313: 1297: 1244: 653:"TICOM I-137 Final report written by Wachtmeister Otto Buggisch of OKH/Chi and OKW/Chi" 208:
An active pin at the sensing point of N2 causes II to move on one place as in a) above
1373: 1363: 1234: 513: 486: 280:
Figure 2 Circle representing the pure period and the straight lines the pre-periods.
1308: 276: 774: 534:"I-137 Final report written by Wachtmeister Otto Buggisch of OKH/Chi and OKW/Chi" 652: 533: 76:
characters, which was more than 15,000 times longer than a standard Enigma. The
1383: 1303: 1264: 1212: 1197: 875: 860: 825: 769: 729: 381:. In the summer of 1942, a prototype was available at Dr. Pupp's laboratory at 125: 441:"Regierungs-Overinspektor Fritz Menzer: Cryptographic Inventor Extraordinaire" 99: 1501: 1464: 1419: 1378: 1358: 1254: 1217: 1192: 921: 716: 466: 111: 28: 1414: 1259: 1249: 1239: 1202: 1151: 941: 402: 36: 32: 1393: 979: 845: 1353: 1323: 1318: 1279: 954: 414: 1343: 410: 377: 1388: 1348: 1103: 1098: 1009: 994: 949: 901: 880: 465:
This article incorporates text from this source, which is in the
395: 390: 386: 371:
Model a) had been developed as early as the year 1939 or 1940 at
1269: 1070: 1050: 1014: 1004: 931: 804: 799: 794: 754: 734: 338:
In detail, the results of the investigations were as follows:
1045: 1040: 1035: 969: 964: 916: 911: 906: 896: 870: 855: 840: 809: 759: 744: 115: 114:
gave the technical description of the cipher unit as part of
959: 865: 850: 749: 330:
Faults 1 to 4 had already been eliminated on model a) of
304:
Wheel II and above all, wheel III moved too infrequently.
297:
The principal weaknesses of the Enigma were as follows:
233:
Working on Enigma wiring. All the pins of N1 are set at
1290:
Cryptographically secure pseudorandom number generator
201:. The following two methods of working are possible: 49: 671: 84:39 was abandoned by German forces in favour of the 68: 43:39 was correctly configured, its cycle length was 323:substitution alphabets of the unplugged machines. 1499: 255: 350:of 25 letters; this too is a laborious process. 1136: 695: 505: 478: 1528:World War II military equipment of Germany 1143: 1129: 702: 688: 472: 1518:History of telecommunications in Germany 499: 275: 178: 106:39 - With hood removed. Early photograph 98: 94: 579: 577: 575: 573: 571: 569: 183:Figure 1 DC current route configuration 1500: 609: 607: 605: 603: 593: 591: 589: 362: 1124: 683: 625: 623: 621: 619: 438: 1533:Signals intelligence of World War II 566: 559: 557: 555: 526: 512:. Biteback Publishing. p. 339. 432: 709: 600: 586: 13: 1523:Military communications of Germany 616: 292: 14: 1549: 552: 506:Michael Smith (20 January 2011). 1478: 1477: 1150: 460: 319:methods for example, all of the 645: 632: 509:The Bletchley Park Codebreakers 27:) was an electrically operated 1339:Information-theoretic security 1: 425: 256:Investigations in Periodicity 420: 264:21 x 23 x 25 x 26 = 313, 950 7: 1455:Message authentication code 1410:Cryptographic hash function 1223:Cryptographic hash function 10: 1554: 1334:Harvest now, decrypt later 69:{\displaystyle 2.7x10^{8}} 1473: 1450:Post-quantum cryptography 1402: 1158: 1120: 1079: 1023: 940: 889: 818: 715: 679: 675: 485:. W3l GmbH. p. 223. 143: 31:, invented by the German 1440:Quantum key distribution 1430:Authenticated encryption 1285:Random number generation 1435:Public-key cryptography 1425:Symmetric-key algorithm 1228:Key derivation function 1188:Cryptographic primitive 1181:Authentication protocol 1171:Outline of cryptography 1166:History of cryptography 659:. TICOM. 8 October 1945 540:. TICOM. 8 October 1945 439:Mowry, David P (1983). 301:Wheel I moved uniformly 246:In the summer of 1944, 1508:Cryptographic hardware 1176:Cryptographic protocol 927:Siemens and Halske T52 281: 202: 190: 184: 107: 70: 1329:End-to-end encryption 1275:Cryptojacking malware 990:Sectéra Secure Module 479:Klaus Schmeh (2008). 279: 182: 102: 95:Technical description 71: 1445:Quantum cryptography 1369:Trusted timestamping 1094:Intel SHA extensions 47: 29:rotor cipher machine 1208:Cryptographic nonce 1089:AES instruction set 1513:Encryption devices 1314:Subliminal channel 1298:Pseudorandom noise 1245:Key (cryptography) 282: 185: 108: 66: 1495: 1494: 1491: 1490: 1374:Key-based routing 1364:Trapdoor function 1235:Digital signature 1116: 1115: 1112: 1111: 1081:Computer hardware 826:Bazeries cylinder 519:978-1-84954-623-2 492:978-3-937137-89-6 177: 176: 1545: 1481: 1480: 1309:Insecure channel 1145: 1138: 1131: 1122: 1121: 704: 697: 690: 681: 680: 677: 676: 673: 672: 668: 666: 664: 657:Internet Archive 639: 636: 630: 627: 614: 611: 598: 595: 584: 581: 564: 561: 550: 549: 547: 545: 538:Internet Archive 530: 524: 523: 503: 497: 496: 476: 470: 464: 463: 459: 457: 455: 445: 436: 322: 310: 132: 131: 75: 73: 72: 67: 65: 64: 1553: 1552: 1548: 1547: 1546: 1544: 1543: 1542: 1498: 1497: 1496: 1487: 1469: 1398: 1154: 1149: 1108: 1075: 1019: 936: 922:Lorenz SZ 40/42 885: 814: 711: 710:Cipher machines 708: 662: 660: 651: 648: 643: 642: 637: 633: 628: 617: 612: 601: 596: 587: 582: 567: 562: 553: 543: 541: 532: 531: 527: 520: 504: 500: 493: 477: 473: 461: 453: 451: 443: 437: 433: 428: 423: 369: 320: 308: 295: 293:Cipher Security 258: 188:a, b, c and d. 97: 60: 56: 48: 45: 44: 12: 11: 5: 1551: 1541: 1540: 1538:Rotor machines 1535: 1530: 1525: 1520: 1515: 1510: 1493: 1492: 1489: 1488: 1486: 1485: 1474: 1471: 1470: 1468: 1467: 1462: 1460:Random numbers 1457: 1452: 1447: 1442: 1437: 1432: 1427: 1422: 1417: 1412: 1406: 1404: 1400: 1399: 1397: 1396: 1391: 1386: 1384:Garlic routing 1381: 1376: 1371: 1366: 1361: 1356: 1351: 1346: 1341: 1336: 1331: 1326: 1321: 1316: 1311: 1306: 1304:Secure channel 1301: 1295: 1294: 1293: 1282: 1277: 1272: 1267: 1265:Key stretching 1262: 1257: 1252: 1247: 1242: 1237: 1232: 1231: 1230: 1225: 1215: 1213:Cryptovirology 1210: 1205: 1200: 1198:Cryptocurrency 1195: 1190: 1185: 1184: 1183: 1173: 1168: 1162: 1160: 1156: 1155: 1148: 1147: 1140: 1133: 1125: 1118: 1117: 1114: 1113: 1110: 1109: 1107: 1106: 1101: 1096: 1091: 1085: 1083: 1077: 1076: 1074: 1073: 1068: 1063: 1058: 1053: 1048: 1043: 1038: 1033: 1027: 1025: 1021: 1020: 1018: 1017: 1012: 1007: 1002: 997: 992: 987: 982: 977: 972: 967: 962: 957: 952: 946: 944: 938: 937: 935: 934: 929: 924: 919: 914: 909: 904: 899: 893: 891: 887: 886: 884: 883: 878: 876:Reihenschieber 873: 868: 863: 861:Jefferson disk 858: 853: 848: 843: 838: 833: 828: 822: 820: 816: 815: 813: 812: 807: 802: 797: 792: 787: 782: 777: 772: 767: 762: 757: 752: 747: 742: 737: 732: 727: 721: 719: 717:Rotor machines 713: 712: 707: 706: 699: 692: 684: 670: 669: 647: 644: 641: 640: 631: 615: 599: 585: 565: 551: 525: 518: 498: 491: 471: 430: 429: 427: 424: 422: 419: 368: 361: 352: 351: 344: 332:Schlüsselgerät 328: 327: 324: 313: 307:The period of 305: 302: 294: 291: 266: 265: 257: 254: 253: 252: 244: 240: 239: 238: 231: 229: 228: 225: 220: 219: 212: 209: 194: 175: 174: 171: 168: 165: 162: 159: 155: 154: 151: 148: 145: 142: 139: 136: 104:Schlüsselgerät 96: 93: 87:Schlüsselgerät 82:Schlüsselgerät 78:Schlüsselgerät 63: 59: 55: 52: 41:Schlüsselgerät 19:Schlüsselgerät 9: 6: 4: 3: 2: 1550: 1539: 1536: 1534: 1531: 1529: 1526: 1524: 1521: 1519: 1516: 1514: 1511: 1509: 1506: 1505: 1503: 1484: 1476: 1475: 1472: 1466: 1465:Steganography 1463: 1461: 1458: 1456: 1453: 1451: 1448: 1446: 1443: 1441: 1438: 1436: 1433: 1431: 1428: 1426: 1423: 1421: 1420:Stream cipher 1418: 1416: 1413: 1411: 1408: 1407: 1405: 1401: 1395: 1392: 1390: 1387: 1385: 1382: 1380: 1379:Onion routing 1377: 1375: 1372: 1370: 1367: 1365: 1362: 1360: 1359:Shared secret 1357: 1355: 1352: 1350: 1347: 1345: 1342: 1340: 1337: 1335: 1332: 1330: 1327: 1325: 1322: 1320: 1317: 1315: 1312: 1310: 1307: 1305: 1302: 1299: 1296: 1291: 1288: 1287: 1286: 1283: 1281: 1278: 1276: 1273: 1271: 1268: 1266: 1263: 1261: 1258: 1256: 1255:Key generator 1253: 1251: 1248: 1246: 1243: 1241: 1238: 1236: 1233: 1229: 1226: 1224: 1221: 1220: 1219: 1218:Hash function 1216: 1214: 1211: 1209: 1206: 1204: 1201: 1199: 1196: 1194: 1193:Cryptanalysis 1191: 1189: 1186: 1182: 1179: 1178: 1177: 1174: 1172: 1169: 1167: 1164: 1163: 1161: 1157: 1153: 1146: 1141: 1139: 1134: 1132: 1127: 1126: 1123: 1119: 1105: 1102: 1100: 1097: 1095: 1092: 1090: 1087: 1086: 1084: 1082: 1078: 1072: 1069: 1067: 1064: 1062: 1059: 1057: 1054: 1052: 1049: 1047: 1044: 1042: 1039: 1037: 1034: 1032: 1029: 1028: 1026: 1022: 1016: 1013: 1011: 1008: 1006: 1003: 1001: 998: 996: 993: 991: 988: 986: 983: 981: 978: 976: 973: 971: 968: 966: 963: 961: 958: 956: 953: 951: 948: 947: 945: 943: 939: 933: 930: 928: 925: 923: 920: 918: 915: 913: 910: 908: 905: 903: 900: 898: 895: 894: 892: 888: 882: 879: 877: 874: 872: 869: 867: 864: 862: 859: 857: 854: 852: 849: 847: 844: 842: 839: 837: 834: 832: 829: 827: 824: 823: 821: 817: 811: 808: 806: 803: 801: 798: 796: 793: 791: 788: 786: 783: 781: 778: 776: 773: 771: 768: 766: 763: 761: 758: 756: 753: 751: 748: 746: 743: 741: 738: 736: 733: 731: 728: 726: 723: 722: 720: 718: 714: 705: 700: 698: 693: 691: 686: 685: 682: 678: 674: 658: 654: 650: 649: 635: 626: 624: 622: 620: 610: 608: 606: 604: 594: 592: 590: 580: 578: 576: 574: 572: 570: 560: 558: 556: 539: 535: 529: 521: 515: 511: 510: 502: 494: 488: 484: 483: 475: 468: 467:public domain 449: 442: 435: 431: 418: 416: 412: 408: 404: 399: 397: 392: 388: 384: 380: 379: 374: 366: 360: 356: 349: 345: 341: 340: 339: 336: 333: 325: 318: 314: 306: 303: 300: 299: 298: 290: 286: 278: 274: 270: 263: 262: 261: 249: 245: 241: 236: 232: 226: 223: 222: 217: 213: 210: 207: 206: 203: 200: 195: 191: 189: 181: 172: 169: 166: 163: 160: 157: 156: 152: 149: 146: 140: 137: 134: 133: 130: 127: 122: 120: 117: 113: 112:Otto Buggisch 105: 101: 92: 90: 88: 83: 79: 61: 57: 53: 50: 42: 38: 34: 30: 26: 22: 20: 1415:Block cipher 1260:Key schedule 1250:Key exchange 1240:Kleptography 1203:Cryptosystem 1152:Cryptography 942:Secure voice 784: 735:M-125 Fialka 661:. Retrieved 656: 646:Bibliography 634: 542:. Retrieved 537: 528: 508: 501: 481: 474: 452:. Retrieved 447: 434: 403:Kriegsmarine 400: 382: 376: 372: 370: 364: 357: 353: 337: 331: 329: 296: 287: 283: 271: 267: 259: 234: 215: 186: 123: 118: 109: 103: 86: 81: 77: 40: 37:World War II 33:Fritz Menzer 24: 18: 17: 15: 1403:Mathematics 1394:Mix network 890:Teleprinter 846:Cipher disk 415:Army groups 363:History of 216:double step 1502:Categories 1354:Ciphertext 1324:Decryption 1319:Encryption 1280:Ransomware 955:FASCINATOR 819:Mechanical 638:I-137, p.7 454:30 January 426:References 383:Wa Pruef 7 373:Wa Pruef 7 248:Karl Stein 218:on Enigma) 1344:Plaintext 629:I-137 p.6 613:I-137 p.5 597:I-137 p.4 583:I-137 p.3 563:I-137 p.2 421:Citations 411:Wehrmacht 378:Waffenamt 317:Hollerith 312:periods). 1483:Category 1389:Kademlia 1349:Codetext 1292:(CSPRNG) 1104:IBM 4764 1099:IBM 4758 1066:Pinwheel 663:20 April 544:20 April 343:process. 119:homework 1159:General 1010:STU-III 995:SIGSALY 950:BID 150 902:BID 770 881:Scytale 805:Singlet 765:Mercury 448:nsa.gov 396:Planken 391:aurally 387:Tenovis 375:at the 321:60 x 26 309:25 x 26 199:stecker 35:during 1270:Keygen 1071:Rockex 1061:Purple 1051:Noreen 1015:VINSON 1005:STU-II 975:NESTOR 932:SIGTOT 800:SIGCUM 795:SIGABA 755:Lacida 740:Hebern 730:Enigma 516:  489:  235:active 126:Enigma 110:Note: 1300:(PRN) 1046:KL-51 1041:KL-43 1036:KG-84 1024:Other 970:KY-68 965:KY-58 917:KW-37 912:KW-26 907:DUDEK 897:5-UCO 871:M-209 856:Kryha 841:CD-57 810:Typex 790:SG-41 785:SG-39 760:M-325 745:HX-63 444:(PDF) 365:Gerät 116:TICOM 25:SG-39 1031:JADE 985:SCIP 980:OMNI 960:KY-3 866:M-94 851:HC-9 836:C-52 831:C-36 770:NEMA 750:KL-7 665:2024 546:2024 514:ISBN 487:ISBN 456:2016 409:and 407:Heer 348:crib 16:The 1056:Red 1000:STE 780:RED 775:OMI 725:CCM 173:21 170:23 167:25 164:25 161:23 158:21 153:N3 150:N2 147:N1 144:Or 141:N3 138:N2 135:N1 51:2.7 1504:: 655:. 618:^ 602:^ 588:^ 568:^ 554:^ 536:. 446:. 398:. 367:39 121:. 91:. 89:41 58:10 21:39 1144:e 1137:t 1130:v 703:e 696:t 689:v 667:. 548:. 522:. 495:. 469:. 458:. 62:8 54:x 23:(

Index

rotor cipher machine
Fritz Menzer
World War II
Schlüsselgerät 41

Otto Buggisch
TICOM
Enigma

stecker
Karl Stein

Hollerith
crib
Waffenamt
Tenovis
aurally
Planken
Kriegsmarine
Heer
Wehrmacht
Army groups
"Regierungs-Overinspektor Fritz Menzer: Cryptographic Inventor Extraordinaire"
public domain
Codeknacker gegen Codemacher: die faszinierende Geschichte der Verschlüsselung; [Sachbuch]
ISBN
978-3-937137-89-6
The Bletchley Park Codebreakers
ISBN
978-1-84954-623-2

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.