417:, and only gradually, as production permitted, was the Enigma machine to be replaced by the 39 at Armies, and finally perhaps at Army Corps. There were, during 1943 and 1944 between the various HQs interested, many and lengthy discussions and arguments for and against the introduction of the 39 machine. Special wishes of the Navy had to be taken into account. The industrial firm complained of lack of material and labour. Owing to these and similar difficulties, development stopped altogether at one time, and it was resumed however. At any rate the vagueness of the decisive authorities was, in addition to difficulties of production, the chief reason why the machine was never completed.
389:). A noteworthy feature was that when the clear-text letter was keyed, the corresponding cipher letter could be sent out simultaneously by the transmitter as a Morse character. This from a technical point of view, a fairly complicated operation. The machine thus was like a cipher teleprinter except that instead of the 5-element alphabet the ordinary Morse alphabet was used. The maximum keying speed was also the same as on a current (1940s) cipher teleprinter. It could not however be made use of when working on direct transmission, because reception at the other end was not automatic as in the case of a cipher teleprinter, but had to be done
180:
277:
100:
1479:
39:. The device was the evolution of the Enigma rotors coupled with three Hagelin pin wheels to provide variable stepping of the rotors. All three wheels stepped once with each encipherment. Rotors stepped according to normal Enigma rules, except that an active pin at the reading station for a pin wheel prevented the coupled rotor from stepping. The cycle for a normal Enigma was 17,576 characters. When the
462:
273:
purposes were however given. Buggisch could not remember the details of these somewhat investigations. The extraordinary length of many pre-periods (lengths of some thousands were not uncommon) and the complication of their branches were remarkable. The general type can be illustrated by the following diagram:
187:
The pin wheels have a uniform motion, i.e. they move one position for every letter keyed. As for the movement of the key wheels and other details, the machine passed through different stages of development in the course of time, for which there were no specific names and which will be denoted here by
272:
Things are much more complicated in the case of Model b). Investigations into this problem in the winter of 1942/1943 were only partly successful; above all it was not possible exactly to calculate the lengths of the pure periods and the pre-periods. Estimates which were quite adequate for practical
250:
of OKW/Chi told
Buggisch that the reciprocal influencing of the wheels was to be altered in some way. Buggisch could not remember the details but nothing fundamental on the principle of the machine described under c) was changed. Interchangeable working with army and naval Enigma remained possible.
334:
39, 5. then no longer appears vital. On the other hand, however, the giving up of the adjustable rings and of the stecker gave rise to weaknesses which the Enigma did not have. In fact, the absence of stecker S cannot be compensated for by making the reflector wheel U pluggable; investigations into
196:
Wheels I, I and III, whose wiring now correspond exactly to those of the Enigma, have adjustable rings; they can be moved around the body of the wheels and have a fixed pin, which, by analogy with the Enigma, is to be called the turn-over notch, although mechanically it is not so made. Opposite the
192:
Each of three wheels moves on one place when there is an active pin at the sensing point of the relevant pin-wheel, and it only moves then. The wheels have no moveable rings on the body of the wheel, with the result that, unlike the Enigma, the initial position of the body of the wheel is determine
128:
cipher machine. A direct current passes through 3 or 4 wheels, with 26 positions, I, II, II, a reflector wheel U, and the again through the 3 wheels in reverse order, III II and I. Unlike the Enigma, the wheels here do not control their own movement: this is done through 3 independent pin-wheels N1
393:
by the operator. That was one of the many reasons why the automatic transmission part of the machine was omitted in later models. This was done when Oberst Kahn, the director of the Pruef 7 department of the
Waffenamt, left, he having especially advocated this strange principle. The second model
354:
The above-mentioned weakness of model a) were eliminated by the introduction of steckering and adjustable rings of model b), although this had been done primarily for quite a different reason, namely to make interchangeable working with Enigma possible. It was not now thought that there was any
284:
In this circle represents the pure period and the straight lines the pre-periods. There were usually several pure periods, each one of them having a complicated system of pre-periods branching into it. Several separate figures of the above type side by side are then necessary to give a graphic
311:
was comparatively small, so that when there was a large amount of traffic on one day, on one key, one had to reckon with the concurrence of critical depths (this applies at least to the Army Enigma; the naval machine had a fourth wheel, so that a days traffic on one key was spread out over 26
243:
interchangeable working with the Enigma remains. In addition, the machine now gets a fourth wheel, which is placed between III and U and does not move on when a key is touched. It corresponds to the fourth wheel on the Naval Enigma and is used for interchangeable working with this machine.
242:
A sensing-point is also provided opposite wheel III. If the turn-over notch on the ring of III is touched by it, then I turns on one place when the next letter is keyed. If this movement coincides with the step caused by N1, this again results in the single step. Thus the possibility of
358:
Finally in model c), the total number of periods was multiplied by 26 compared with a) and b), but the introduction of a fourth wheel; it was not, it is true, intended primarily for this purpose but was added to carry out interchangeable working with the Naval Enigma.
355:
longer a serious possibility of a break-in. As however the system of I and N1 still had a relatively small period of 21 x 26 it appeared desirable to destroy this too. This was done on model c) by making III react to I, and presented no technical difficulties.
204:
Working on own wiring: N1 N2 and N3 are given a certain pin arrangements, there being, it is true, certain limitations to the number of activating pins. Wheel I moves as under a) above. For wheel II there are the following 3 causes of movement:
288:
The questions of periodicities in the case of model c) was still more involved. It was just not possible to calculate the lengths of the pure periods and pre-periods, let alone give the lower limits which are themselves not inconsiderable.
237:, the pins of N2 and N3 all remaining inactive. Then the movements identical with that of the Enigma. As all other factors also agree with the corresponding ones on the Enigma interchangeable working between both machines is possible.
268:
as long as the number of active pins on each of the pin wheels is prime to 2 and 13. This last condition should be laid down in the cipher regulations; otherwise the 676 periods would be further broken in a manner easily seen.
193:
absolutely, at the same time as the clear message setting. The reflector wheel is pluggable like the reflector wheel D on the Enigma; it can be quickly exchanged for the second reflector wheel with prepared reflector plugging.
342:
If the inner wiring and the clear message setting of wheels I, II and II are known, the wiring of the reflector wheel and the pin arrangement of N1 N2 N3 can be found out from a crib of 25 letters, this was a fairly laborious
394:
actually constructed was like the model designated with c) in the section above. It only printed clear text and cipher text on 2 separate strips. Buggisch saw it in
January 1944 when I was visiting Wa Pruef 7 Section II at
197:
wheels I and II are two sensing points which pick up the turn-over notch as it passes. U is pluggable as in a). In addition there is between the point of input and I, a stecker S like the Enigma
346:
If the inner wiring of wheels I, I and II and of the reflector wheel U is known, it is likewise possible to find out the clear message-setting and the pin-arrangement of N1 N2 and N3 from a
326:
The number of possible wheel combinations was only 60, since the set of wheels belonging to the machine, at least in the case of the Army Enigma, only consisted of 5 different wheels.
74:
221:
If any of these three causes of movement take effect simultaneously on II, it nevertheless only moves on one place. There are three causes of movement for wheel III.
1459:
1289:
80:
39 was fully automatic, in that when a key was pressed, the plain and cipher letters were printed on separate paper tapes, divided into five-digit groups. The
440:
1527:
1517:
405:
who laid down the principle that any newly introduced cipher machine for higher HQs should permit interchangeable working with the Enigma. The Army (
214:
When the turn-over notch comes to the sensing point of II, II turns on one place when the next letter is keyed (at the same time as III, as with the
984:
701:
413:) also adopted this standpoint: In the first instance only the highest authorities were to be issued with the new machine, e.g. OKW, OKH and the
285:
representation of the periodicities. A lower limit for the lengths of the pure periods was, as far as I remember: 25 x 21 x 23 x 25 = 8,162,700.
1532:
1142:
211:
When the turn-over notch on the ring of I comes to the sensing point, II is caused to move on when the next letter is keyed (as with Enigma).
1522:
315:
The reflector wheel was not plugable and had remained unchanged for years (and because of (5), the enemy could easily establish by
230:
Just as in the case of II, if the two causes of the movement for III operation simultaneously the combine to produce one stop.
129:
N2 and N3 with periods 21,23 and 25. The figures were distributed among N1 N2 and N2 in possibly two different configurations.
517:
490:
260:
In the case of model first a) above, the question of periodicity is elementary, there are 26=676 pure periods of the length
227:
When the turn-over notch on the ring of II comes to the sensing point, III moves on one place when the next letter is keyed.
694:
401:
The change from cipher-technical a) to b) and also c) was made at the end of 1942. It was made at the instigation of the
1135:
335:
Enigma had shown that it was considerably more difficult to find out the steckering S than the reflectoring wheel U.
1507:
1338:
687:
385:, and was made by the firm Telefonbau und Normalzeit (literally 'Telephone and Standard Time', later called
1128:
1512:
1454:
1409:
1222:
1333:
247:
450:. Document ref:2757002. Cryptologic Quarterly, Vol. 2, Nos. 3-4; autumn/winter 1983-84. pp. 21–36
1449:
1080:
999:
1439:
1429:
1284:
764:
224:
An active pin at the sensing-point of N3 causes III to move to one place, as in the first a) above,
989:
482:
Codeknacker gegen
Codemacher: die faszinierende Geschichte der Verschlüsselung; [Sachbuch]
1537:
1434:
1424:
1227:
1187:
1180:
1170:
1165:
1065:
724:
406:
46:
1175:
926:
789:
347:
85:
507:
480:
124:
Gerät 39 is an electrically operated cipher machine. The cipher technique is derived from the
1482:
1328:
1274:
1060:
1055:
1030:
835:
830:
316:
179:
1444:
1368:
1093:
779:
739:
8:
1207:
1088:
974:
198:
1313:
1297:
1244:
653:"TICOM I-137 Final report written by Wachtmeister Otto Buggisch of OKH/Chi and OKW/Chi"
208:
An active pin at the sensing point of N2 causes II to move on one place as in a) above
1373:
1363:
1234:
513:
486:
280:
Figure 2 Circle representing the pure period and the straight lines the pre-periods.
1308:
276:
774:
534:"I-137 Final report written by Wachtmeister Otto Buggisch of OKH/Chi and OKW/Chi"
652:
533:
76:
characters, which was more than 15,000 times longer than a standard Enigma. The
1383:
1303:
1264:
1212:
1197:
875:
860:
825:
769:
729:
381:. In the summer of 1942, a prototype was available at Dr. Pupp's laboratory at
125:
441:"Regierungs-Overinspektor Fritz Menzer: Cryptographic Inventor Extraordinaire"
99:
1501:
1464:
1419:
1378:
1358:
1254:
1217:
1192:
921:
716:
466:
111:
28:
1414:
1259:
1249:
1239:
1202:
1151:
941:
402:
36:
32:
1393:
979:
845:
1353:
1323:
1318:
1279:
954:
414:
1343:
410:
377:
1388:
1348:
1103:
1098:
1009:
994:
949:
901:
880:
465:
This article incorporates text from this source, which is in the
395:
390:
386:
371:
Model a) had been developed as early as the year 1939 or 1940 at
1269:
1070:
1050:
1014:
1004:
931:
804:
799:
794:
754:
734:
338:
In detail, the results of the investigations were as follows:
1045:
1040:
1035:
969:
964:
916:
911:
906:
896:
870:
855:
840:
809:
759:
744:
115:
114:
gave the technical description of the cipher unit as part of
959:
865:
850:
749:
330:
Faults 1 to 4 had already been eliminated on model a) of
304:
Wheel II and above all, wheel III moved too infrequently.
297:
The principal weaknesses of the Enigma were as follows:
233:
Working on Enigma wiring. All the pins of N1 are set at
1290:
Cryptographically secure pseudorandom number generator
201:. The following two methods of working are possible:
49:
671:
84:39 was abandoned by German forces in favour of the
68:
43:39 was correctly configured, its cycle length was
323:substitution alphabets of the unplugged machines.
1499:
255:
350:of 25 letters; this too is a laborious process.
1136:
695:
505:
478:
1528:World War II military equipment of Germany
1143:
1129:
702:
688:
472:
1518:History of telecommunications in Germany
499:
275:
178:
106:39 - With hood removed. Early photograph
98:
94:
579:
577:
575:
573:
571:
569:
183:Figure 1 DC current route configuration
1500:
609:
607:
605:
603:
593:
591:
589:
362:
1124:
683:
625:
623:
621:
619:
438:
1533:Signals intelligence of World War II
566:
559:
557:
555:
526:
512:. Biteback Publishing. p. 339.
432:
709:
600:
586:
13:
1523:Military communications of Germany
616:
292:
14:
1549:
552:
506:Michael Smith (20 January 2011).
1478:
1477:
1150:
460:
319:methods for example, all of the
645:
632:
509:The Bletchley Park Codebreakers
27:) was an electrically operated
1339:Information-theoretic security
1:
425:
256:Investigations in Periodicity
420:
264:21 x 23 x 25 x 26 = 313, 950
7:
1455:Message authentication code
1410:Cryptographic hash function
1223:Cryptographic hash function
10:
1554:
1334:Harvest now, decrypt later
69:{\displaystyle 2.7x10^{8}}
1473:
1450:Post-quantum cryptography
1402:
1158:
1120:
1079:
1023:
940:
889:
818:
715:
679:
675:
485:. W3l GmbH. p. 223.
143:
31:, invented by the German
1440:Quantum key distribution
1430:Authenticated encryption
1285:Random number generation
1435:Public-key cryptography
1425:Symmetric-key algorithm
1228:Key derivation function
1188:Cryptographic primitive
1181:Authentication protocol
1171:Outline of cryptography
1166:History of cryptography
659:. TICOM. 8 October 1945
540:. TICOM. 8 October 1945
439:Mowry, David P (1983).
301:Wheel I moved uniformly
246:In the summer of 1944,
1508:Cryptographic hardware
1176:Cryptographic protocol
927:Siemens and Halske T52
281:
202:
190:
184:
107:
70:
1329:End-to-end encryption
1275:Cryptojacking malware
990:Sectéra Secure Module
479:Klaus Schmeh (2008).
279:
182:
102:
95:Technical description
71:
1445:Quantum cryptography
1369:Trusted timestamping
1094:Intel SHA extensions
47:
29:rotor cipher machine
1208:Cryptographic nonce
1089:AES instruction set
1513:Encryption devices
1314:Subliminal channel
1298:Pseudorandom noise
1245:Key (cryptography)
282:
185:
108:
66:
1495:
1494:
1491:
1490:
1374:Key-based routing
1364:Trapdoor function
1235:Digital signature
1116:
1115:
1112:
1111:
1081:Computer hardware
826:Bazeries cylinder
519:978-1-84954-623-2
492:978-3-937137-89-6
177:
176:
1545:
1481:
1480:
1309:Insecure channel
1145:
1138:
1131:
1122:
1121:
704:
697:
690:
681:
680:
677:
676:
673:
672:
668:
666:
664:
657:Internet Archive
639:
636:
630:
627:
614:
611:
598:
595:
584:
581:
564:
561:
550:
549:
547:
545:
538:Internet Archive
530:
524:
523:
503:
497:
496:
476:
470:
464:
463:
459:
457:
455:
445:
436:
322:
310:
132:
131:
75:
73:
72:
67:
65:
64:
1553:
1552:
1548:
1547:
1546:
1544:
1543:
1542:
1498:
1497:
1496:
1487:
1469:
1398:
1154:
1149:
1108:
1075:
1019:
936:
922:Lorenz SZ 40/42
885:
814:
711:
710:Cipher machines
708:
662:
660:
651:
648:
643:
642:
637:
633:
628:
617:
612:
601:
596:
587:
582:
567:
562:
553:
543:
541:
532:
531:
527:
520:
504:
500:
493:
477:
473:
461:
453:
451:
443:
437:
433:
428:
423:
369:
320:
308:
295:
293:Cipher Security
258:
188:a, b, c and d.
97:
60:
56:
48:
45:
44:
12:
11:
5:
1551:
1541:
1540:
1538:Rotor machines
1535:
1530:
1525:
1520:
1515:
1510:
1493:
1492:
1489:
1488:
1486:
1485:
1474:
1471:
1470:
1468:
1467:
1462:
1460:Random numbers
1457:
1452:
1447:
1442:
1437:
1432:
1427:
1422:
1417:
1412:
1406:
1404:
1400:
1399:
1397:
1396:
1391:
1386:
1384:Garlic routing
1381:
1376:
1371:
1366:
1361:
1356:
1351:
1346:
1341:
1336:
1331:
1326:
1321:
1316:
1311:
1306:
1304:Secure channel
1301:
1295:
1294:
1293:
1282:
1277:
1272:
1267:
1265:Key stretching
1262:
1257:
1252:
1247:
1242:
1237:
1232:
1231:
1230:
1225:
1215:
1213:Cryptovirology
1210:
1205:
1200:
1198:Cryptocurrency
1195:
1190:
1185:
1184:
1183:
1173:
1168:
1162:
1160:
1156:
1155:
1148:
1147:
1140:
1133:
1125:
1118:
1117:
1114:
1113:
1110:
1109:
1107:
1106:
1101:
1096:
1091:
1085:
1083:
1077:
1076:
1074:
1073:
1068:
1063:
1058:
1053:
1048:
1043:
1038:
1033:
1027:
1025:
1021:
1020:
1018:
1017:
1012:
1007:
1002:
997:
992:
987:
982:
977:
972:
967:
962:
957:
952:
946:
944:
938:
937:
935:
934:
929:
924:
919:
914:
909:
904:
899:
893:
891:
887:
886:
884:
883:
878:
876:Reihenschieber
873:
868:
863:
861:Jefferson disk
858:
853:
848:
843:
838:
833:
828:
822:
820:
816:
815:
813:
812:
807:
802:
797:
792:
787:
782:
777:
772:
767:
762:
757:
752:
747:
742:
737:
732:
727:
721:
719:
717:Rotor machines
713:
712:
707:
706:
699:
692:
684:
670:
669:
647:
644:
641:
640:
631:
615:
599:
585:
565:
551:
525:
518:
498:
491:
471:
430:
429:
427:
424:
422:
419:
368:
361:
352:
351:
344:
332:Schlüsselgerät
328:
327:
324:
313:
307:The period of
305:
302:
294:
291:
266:
265:
257:
254:
253:
252:
244:
240:
239:
238:
231:
229:
228:
225:
220:
219:
212:
209:
194:
175:
174:
171:
168:
165:
162:
159:
155:
154:
151:
148:
145:
142:
139:
136:
104:Schlüsselgerät
96:
93:
87:Schlüsselgerät
82:Schlüsselgerät
78:Schlüsselgerät
63:
59:
55:
52:
41:Schlüsselgerät
19:Schlüsselgerät
9:
6:
4:
3:
2:
1550:
1539:
1536:
1534:
1531:
1529:
1526:
1524:
1521:
1519:
1516:
1514:
1511:
1509:
1506:
1505:
1503:
1484:
1476:
1475:
1472:
1466:
1465:Steganography
1463:
1461:
1458:
1456:
1453:
1451:
1448:
1446:
1443:
1441:
1438:
1436:
1433:
1431:
1428:
1426:
1423:
1421:
1420:Stream cipher
1418:
1416:
1413:
1411:
1408:
1407:
1405:
1401:
1395:
1392:
1390:
1387:
1385:
1382:
1380:
1379:Onion routing
1377:
1375:
1372:
1370:
1367:
1365:
1362:
1360:
1359:Shared secret
1357:
1355:
1352:
1350:
1347:
1345:
1342:
1340:
1337:
1335:
1332:
1330:
1327:
1325:
1322:
1320:
1317:
1315:
1312:
1310:
1307:
1305:
1302:
1299:
1296:
1291:
1288:
1287:
1286:
1283:
1281:
1278:
1276:
1273:
1271:
1268:
1266:
1263:
1261:
1258:
1256:
1255:Key generator
1253:
1251:
1248:
1246:
1243:
1241:
1238:
1236:
1233:
1229:
1226:
1224:
1221:
1220:
1219:
1218:Hash function
1216:
1214:
1211:
1209:
1206:
1204:
1201:
1199:
1196:
1194:
1193:Cryptanalysis
1191:
1189:
1186:
1182:
1179:
1178:
1177:
1174:
1172:
1169:
1167:
1164:
1163:
1161:
1157:
1153:
1146:
1141:
1139:
1134:
1132:
1127:
1126:
1123:
1119:
1105:
1102:
1100:
1097:
1095:
1092:
1090:
1087:
1086:
1084:
1082:
1078:
1072:
1069:
1067:
1064:
1062:
1059:
1057:
1054:
1052:
1049:
1047:
1044:
1042:
1039:
1037:
1034:
1032:
1029:
1028:
1026:
1022:
1016:
1013:
1011:
1008:
1006:
1003:
1001:
998:
996:
993:
991:
988:
986:
983:
981:
978:
976:
973:
971:
968:
966:
963:
961:
958:
956:
953:
951:
948:
947:
945:
943:
939:
933:
930:
928:
925:
923:
920:
918:
915:
913:
910:
908:
905:
903:
900:
898:
895:
894:
892:
888:
882:
879:
877:
874:
872:
869:
867:
864:
862:
859:
857:
854:
852:
849:
847:
844:
842:
839:
837:
834:
832:
829:
827:
824:
823:
821:
817:
811:
808:
806:
803:
801:
798:
796:
793:
791:
788:
786:
783:
781:
778:
776:
773:
771:
768:
766:
763:
761:
758:
756:
753:
751:
748:
746:
743:
741:
738:
736:
733:
731:
728:
726:
723:
722:
720:
718:
714:
705:
700:
698:
693:
691:
686:
685:
682:
678:
674:
658:
654:
650:
649:
635:
626:
624:
622:
620:
610:
608:
606:
604:
594:
592:
590:
580:
578:
576:
574:
572:
570:
560:
558:
556:
539:
535:
529:
521:
515:
511:
510:
502:
494:
488:
484:
483:
475:
468:
467:public domain
449:
442:
435:
431:
418:
416:
412:
408:
404:
399:
397:
392:
388:
384:
380:
379:
374:
366:
360:
356:
349:
345:
341:
340:
339:
336:
333:
325:
318:
314:
306:
303:
300:
299:
298:
290:
286:
278:
274:
270:
263:
262:
261:
249:
245:
241:
236:
232:
226:
223:
222:
217:
213:
210:
207:
206:
203:
200:
195:
191:
189:
181:
172:
169:
166:
163:
160:
157:
156:
152:
149:
146:
140:
137:
134:
133:
130:
127:
122:
120:
117:
113:
112:Otto Buggisch
105:
101:
92:
90:
88:
83:
79:
61:
57:
53:
50:
42:
38:
34:
30:
26:
22:
20:
1415:Block cipher
1260:Key schedule
1250:Key exchange
1240:Kleptography
1203:Cryptosystem
1152:Cryptography
942:Secure voice
784:
735:M-125 Fialka
661:. Retrieved
656:
646:Bibliography
634:
542:. Retrieved
537:
528:
508:
501:
481:
474:
452:. Retrieved
447:
434:
403:Kriegsmarine
400:
382:
376:
372:
370:
364:
357:
353:
337:
331:
329:
296:
287:
283:
271:
267:
259:
234:
215:
186:
123:
118:
109:
103:
86:
81:
77:
40:
37:World War II
33:Fritz Menzer
24:
18:
17:
15:
1403:Mathematics
1394:Mix network
890:Teleprinter
846:Cipher disk
415:Army groups
363:History of
216:double step
1502:Categories
1354:Ciphertext
1324:Decryption
1319:Encryption
1280:Ransomware
955:FASCINATOR
819:Mechanical
638:I-137, p.7
454:30 January
426:References
383:Wa Pruef 7
373:Wa Pruef 7
248:Karl Stein
218:on Enigma)
1344:Plaintext
629:I-137 p.6
613:I-137 p.5
597:I-137 p.4
583:I-137 p.3
563:I-137 p.2
421:Citations
411:Wehrmacht
378:Waffenamt
317:Hollerith
312:periods).
1483:Category
1389:Kademlia
1349:Codetext
1292:(CSPRNG)
1104:IBM 4764
1099:IBM 4758
1066:Pinwheel
663:20 April
544:20 April
343:process.
119:homework
1159:General
1010:STU-III
995:SIGSALY
950:BID 150
902:BID 770
881:Scytale
805:Singlet
765:Mercury
448:nsa.gov
396:Planken
391:aurally
387:Tenovis
375:at the
321:60 x 26
309:25 x 26
199:stecker
35:during
1270:Keygen
1071:Rockex
1061:Purple
1051:Noreen
1015:VINSON
1005:STU-II
975:NESTOR
932:SIGTOT
800:SIGCUM
795:SIGABA
755:Lacida
740:Hebern
730:Enigma
516:
489:
235:active
126:Enigma
110:Note:
1300:(PRN)
1046:KL-51
1041:KL-43
1036:KG-84
1024:Other
970:KY-68
965:KY-58
917:KW-37
912:KW-26
907:DUDEK
897:5-UCO
871:M-209
856:Kryha
841:CD-57
810:Typex
790:SG-41
785:SG-39
760:M-325
745:HX-63
444:(PDF)
365:Gerät
116:TICOM
25:SG-39
1031:JADE
985:SCIP
980:OMNI
960:KY-3
866:M-94
851:HC-9
836:C-52
831:C-36
770:NEMA
750:KL-7
665:2024
546:2024
514:ISBN
487:ISBN
456:2016
409:and
407:Heer
348:crib
16:The
1056:Red
1000:STE
780:RED
775:OMI
725:CCM
173:21
170:23
167:25
164:25
161:23
158:21
153:N3
150:N2
147:N1
144:Or
141:N3
138:N2
135:N1
51:2.7
1504::
655:.
618:^
602:^
588:^
568:^
554:^
536:.
446:.
398:.
367:39
121:.
91:.
89:41
58:10
21:39
1144:e
1137:t
1130:v
703:e
696:t
689:v
667:.
548:.
522:.
495:.
469:.
458:.
62:8
54:x
23:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.