172:
186:. The SG-41 had six encryption rotors, compared to the Enigma, which had either three or four, in addition to a number of advanced features, making it much more resistant to cryptanalysis than the Enigma or other contemporary Hagelin machines. While the Enigma rotors advanced by one for each letter enciphered, the SG-41's wheels interacted with each other and moved irregularly. Similar functionality was not adopted in a mass-produced cipher machine until 1952 with the advent of the Hagelin
164:
22:
2310:
1484:
82:
107:, a leading typewriter manufacturer. The machine also acquired the nickname "Hitler mill" because of the large crank attached to the side of the unit. Instead of using a lampboard like the Enigma, the SG-41 printed both the plaintext and ciphertext of the message onto two paper tapes. Due to wartime shortages of
206:" i.e. encrypted with the same key. The inner workings of the device were unclear until after the war, so it was not possible to perform a systematic cryptanalysis on the messages. Allied codebreakers referred to it as a "remarkable machine".
574:
606:
584:
293:
395:
Pröse, Michael (December 2004). Chiffriermaschinen und
Entzifferungsgeräte im Zweiten Weltkrieg – Technikgeschichte und informatikhistorische Aspekte.
2290:
2120:
1464:
1294:
638:
2368:
96:
2358:
249:
721:
1815:
1532:
2363:
1973:
1147:
616:
2383:
202:
considered the device a "mystery". Only a handful of messages were able to be deciphered during the war, namely when two messages were "
141:
shortages, but production was halted after 1,000 units, as it was considered too heavy for use on the front. In
December 1943, General
667:
2338:
714:
1525:
517:"European Axis Signal Intelligence in World War II – Volume 2: Notes on German High Level Cryptography and Cryptanalysis"
453:
397:
1966:
1140:
428:
937:
927:
137:
A total of 1,000 units were produced. Various sources have reported production figures as low as 500 units due to
2348:
707:
932:
2343:
2169:
1518:
1343:
119:, the SG-41 weighed approximately 13.5 kilograms (30 lb), which made it unsuitable for the front lines.
1959:
1133:
145:
ordered production to cease by the end of 1944. Beginning on 12 October 1944, the first deliveries to the
2373:
2285:
2240:
2053:
1459:
1414:
1227:
327:
130:
947:
2164:
1338:
122:
Menzer intended for the SG-41 to fully replace Enigma, which he considered to no longer be secure; the
2280:
1911:
1830:
1454:
2270:
2260:
2115:
1595:
1444:
1434:
1289:
524:
304:
175:
The "J" key was red and was used to switch between letters and numbers; "JRQJ" would represent "41"
1820:
2378:
2353:
2265:
2255:
2058:
2018:
2011:
2001:
1996:
1896:
1555:
1439:
1429:
1232:
1192:
1185:
1175:
1170:
244:, buried approximately 40 centimetres (16 in) deep. The hobbyists donated their find to the
214:
In the final months of the war, an additional 550 units were built, which are referred to as the
2006:
1757:
1615:
1180:
265:
643:
418:
2313:
2159:
2105:
1891:
1886:
1861:
1666:
1661:
1487:
1333:
1279:
1058:
749:
548:
983:
516:
2275:
2199:
1924:
1610:
1570:
1449:
1373:
1089:
993:
919:
611:
8:
2038:
1919:
1805:
1212:
1108:
1103:
1017:
851:
446:
Codeknacker gegen
Codemacher. Die faszinierende Geschichte der Verschlüsselung Gebundenes
2144:
2128:
2075:
1318:
1302:
1249:
1084:
1003:
909:
841:
104:
772:
361:
2204:
2194:
2065:
1378:
1368:
1239:
1053:
973:
942:
836:
767:
505:
500:
474:
449:
424:
171:
2139:
1313:
730:
672:
579:
245:
203:
1605:
874:
831:
800:
782:
233:
2214:
2134:
2095:
2043:
2028:
1706:
1691:
1656:
1600:
1560:
1388:
1308:
1269:
1217:
1202:
1093:
988:
869:
762:
757:
218:. This model only allowed the numbers 0–9 to be enciphered and was used by the
199:
60:
29:
81:
2332:
2295:
2250:
2209:
2189:
2085:
2048:
2023:
1752:
1547:
1469:
1424:
1383:
1363:
1259:
1222:
1197:
1045:
899:
879:
859:
810:
790:
180:
163:
52:
21:
2245:
2090:
2080:
2070:
2033:
1982:
1772:
1419:
1264:
1254:
1244:
1207:
1156:
978:
889:
795:
142:
100:
70:
56:
2224:
1810:
1676:
1398:
1063:
1030:
1025:
894:
337:
151:
began. In the final months of the war, the SG-41 was used instead of the
108:
2184:
2154:
2149:
2110:
1785:
1358:
1328:
1323:
1284:
1097:
1079:
884:
815:
252:
it in its current condition and display it in a new permanent exhibit,
2174:
1348:
1035:
332:
220:
124:
116:
112:
91:
501:
Schlüsselgerät 41 - Technical aspects of the German WWII Hitlermühle
2219:
2179:
1934:
1929:
1393:
1353:
805:
138:
1840:
1825:
1780:
1732:
1711:
577:[The Cipher Machine 41-Z from Fritz Menzer (1908-2005)].
248:
in Munich instead of selling it privately. The museum intends to
237:
2100:
1901:
1881:
1845:
1835:
1762:
1635:
1630:
1625:
1585:
1565:
1274:
998:
864:
738:
147:
65:
1876:
1871:
1866:
1800:
1795:
1747:
1742:
1737:
1727:
1701:
1686:
1671:
1640:
1590:
1575:
968:
963:
904:
241:
187:
183:
179:
Functionally, the machine had greater similarities with the
1790:
1696:
1681:
1580:
236:
found an SG-41 using a metal detector in a forest near the
639:"Schatzsucher finden seltenes Exemplar der 'Hitlermühle'"
575:"Das Schlüsselgerät SG41-Z von Fritz Menzer (1908-2005)"
2121:
Cryptographically secure pseudorandom number generator
1295:
Cryptographically secure pseudorandom number generator
59:, that was designed as a potential successor for the
1502:
691:
641:[Treasure Hunters Find Rare 'Hitler Mill'].
254:
Bild – Schrift – Codes
607:"Schatzsucher finden Chiffriergerät 'Hitlermühle'"
469:
467:
465:
99:) as a collaboration between German cryptographer
2330:
462:
1967:
1526:
1141:
715:
549:"The Hagelin C-52 and CX-52 Cipher Machines"
288:
286:
284:
69:(military intelligence) towards the end of
2369:World War II military equipment of Germany
1974:
1960:
1533:
1519:
1148:
1134:
729:
722:
708:
281:
89:The SG-41 was created under order of the
43:("Cipher Machine 41"), also known as the
2359:History of telecommunications in Germany
294:"German Cipher Machines of World War II"
170:
162:
80:
20:
412:
410:
408:
390:
388:
386:
384:
382:
362:"Schluesselgeraet SG-41 (Hitlermuehle)"
356:
354:
2331:
546:
443:
325:
1955:
1514:
1129:
703:
665:
416:
394:
2364:Signals intelligence of World War II
670:[Enigma's Successor Found].
405:
379:
351:
319:
1540:
13:
2384:Military communications of Germany
572:
330:[Hitler's Last Machines].
227:
14:
2395:
504:. Crypto Museum, 6 February 2010.
444:Schmeh, Klaus (5 December 2014).
2309:
2308:
1981:
1483:
1482:
1155:
666:Faust, Gerrit (18 August 2017).
615:. 18 August 2017. Archived from
420:Dilly: The Man Who Broke Enigmas
193:
167:The SG-41 had six cipher rotors.
659:
631:
599:
566:
540:
498:Klaus Kopacz and Paul Reuvers,
423:. Dialogue Books. p. 212.
398:Technische Universität Chemnitz
326:Schmeh, Klaus (2 August 2004).
85:An SG-41 ready to encipher text
2170:Information-theoretic security
1344:Information-theoretic security
553:Cipher Machines And Cryptology
509:
492:
437:
301:Center for Cryptologic History
97:Inspectorate 7/VI organisation
1:
668:"Enigmas Nachfolger entdeckt"
274:
134:ordered around 11,000 units.
232:On 5 May 2017, two hobbyist
63:. It saw limited use by the
55:, first produced in 1941 in
7:
2339:Products introduced in 1941
2286:Message authentication code
2241:Cryptographic hash function
2054:Cryptographic hash function
1460:Message authentication code
1415:Cryptographic hash function
1228:Cryptographic hash function
647:(in German). 17 August 2017
583:(in German). Archived from
448:. W3L-Verlag. p. 373.
259:
198:The Allied codebreakers in
158:
10:
2400:
2165:Harvest now, decrypt later
1339:Harvest now, decrypt later
328:"Hitlers letzte Maschinen"
76:
2304:
2281:Post-quantum cryptography
2233:
1989:
1951:
1910:
1854:
1771:
1720:
1649:
1546:
1510:
1506:
1478:
1455:Post-quantum cryptography
1407:
1163:
1125:
1072:
1044:
1016:
956:
918:
850:
824:
781:
748:
737:
699:
695:
401:(Report). pp. 64–65.
209:
2271:Quantum key distribution
2261:Authenticated encryption
2116:Random number generation
1445:Quantum key distribution
1435:Authenticated encryption
1290:Random number generation
528:. 1 May 1946. p. 29
525:National Security Agency
305:National Security Agency
2266:Public-key cryptography
2256:Symmetric-key algorithm
2059:Key derivation function
2019:Cryptographic primitive
2012:Authentication protocol
2002:Outline of cryptography
1997:History of cryptography
1440:Public-key cryptography
1430:Symmetric-key algorithm
1233:Key derivation function
1193:Cryptographic primitive
1186:Authentication protocol
1176:Outline of cryptography
1171:History of cryptography
2349:Cryptographic hardware
2007:Cryptographic protocol
1758:Siemens and Halske T52
1181:Cryptographic protocol
731:Classical cryptography
307:. 2014. pp. 22–25
176:
168:
86:
33:
2344:Broken stream ciphers
2160:End-to-end encryption
2106:Cryptojacking malware
1821:Sectéra Secure Module
1334:End-to-end encryption
1280:Cryptojacking malware
417:Batey, Mavis (2017).
224:for weather reports.
174:
166:
84:
24:
2276:Quantum cryptography
2200:Trusted timestamping
1925:Intel SHA extensions
1450:Quantum cryptography
1374:Trusted timestamping
1090:Index of coincidence
994:Reservehandverfahren
612:Bayerischer Rundfunk
53:rotor cipher machine
16:Rotor cipher machine
2039:Cryptographic nonce
1920:AES instruction set
1213:Cryptographic nonce
1109:Kasiski examination
1104:Information leakage
644:Süddeutsche Zeitung
587:on 16 February 2018
475:"Schlüsselgerät 41"
2374:Encryption devices
2145:Subliminal channel
2129:Pseudorandom noise
2076:Key (cryptography)
1319:Subliminal channel
1303:Pseudorandom noise
1250:Key (cryptography)
1085:Frequency analysis
984:Rasterschlüssel 44
547:Rijmenants, Dirk.
177:
169:
87:
34:
2326:
2325:
2322:
2321:
2205:Key-based routing
2195:Trapdoor function
2066:Digital signature
1947:
1946:
1943:
1942:
1912:Computer hardware
1657:Bazeries cylinder
1500:
1499:
1496:
1495:
1379:Key-based routing
1369:Trapdoor function
1240:Digital signature
1121:
1120:
1117:
1116:
1012:
1011:
619:on 21 August 2017
2391:
2312:
2311:
2140:Insecure channel
1976:
1969:
1962:
1953:
1952:
1535:
1528:
1521:
1512:
1511:
1508:
1507:
1504:
1503:
1486:
1485:
1314:Insecure channel
1150:
1143:
1136:
1127:
1126:
746:
745:
724:
717:
710:
701:
700:
697:
696:
693:
692:
686:
685:
683:
681:
673:Deutsches Museum
663:
657:
656:
654:
652:
635:
629:
628:
626:
624:
603:
597:
596:
594:
592:
580:Deutsches Museum
573:Dahlke, Carola.
570:
564:
563:
561:
559:
544:
538:
537:
535:
533:
521:
513:
507:
496:
490:
489:
487:
485:
471:
460:
459:
441:
435:
434:
414:
403:
402:
392:
377:
376:
374:
372:
358:
349:
348:
346:
344:
323:
317:
316:
314:
312:
298:
290:
246:Deutsches Museum
234:treasure hunters
2399:
2398:
2394:
2393:
2392:
2390:
2389:
2388:
2329:
2328:
2327:
2318:
2300:
2229:
1985:
1980:
1939:
1906:
1850:
1767:
1753:Lorenz SZ 40/42
1716:
1645:
1542:
1541:Cipher machines
1539:
1501:
1492:
1474:
1403:
1159:
1154:
1113:
1068:
1040:
1008:
952:
914:
846:
820:
783:Polybius square
777:
741:
733:
728:
690:
689:
679:
677:
664:
660:
650:
648:
637:
636:
632:
622:
620:
605:
604:
600:
590:
588:
571:
567:
557:
555:
545:
541:
531:
529:
519:
515:
514:
510:
497:
493:
483:
481:
473:
472:
463:
456:
442:
438:
431:
415:
406:
393:
380:
370:
368:
360:
359:
352:
342:
340:
324:
320:
310:
308:
296:
292:
291:
282:
277:
262:
230:
228:Find near Aying
212:
196:
161:
92:Heereswaffenamt
79:
17:
12:
11:
5:
2397:
2387:
2386:
2381:
2379:Enigma machine
2376:
2371:
2366:
2361:
2356:
2354:Rotor machines
2351:
2346:
2341:
2324:
2323:
2320:
2319:
2317:
2316:
2305:
2302:
2301:
2299:
2298:
2293:
2291:Random numbers
2288:
2283:
2278:
2273:
2268:
2263:
2258:
2253:
2248:
2243:
2237:
2235:
2231:
2230:
2228:
2227:
2222:
2217:
2215:Garlic routing
2212:
2207:
2202:
2197:
2192:
2187:
2182:
2177:
2172:
2167:
2162:
2157:
2152:
2147:
2142:
2137:
2135:Secure channel
2132:
2126:
2125:
2124:
2113:
2108:
2103:
2098:
2096:Key stretching
2093:
2088:
2083:
2078:
2073:
2068:
2063:
2062:
2061:
2056:
2046:
2044:Cryptovirology
2041:
2036:
2031:
2029:Cryptocurrency
2026:
2021:
2016:
2015:
2014:
2004:
1999:
1993:
1991:
1987:
1986:
1979:
1978:
1971:
1964:
1956:
1949:
1948:
1945:
1944:
1941:
1940:
1938:
1937:
1932:
1927:
1922:
1916:
1914:
1908:
1907:
1905:
1904:
1899:
1894:
1889:
1884:
1879:
1874:
1869:
1864:
1858:
1856:
1852:
1851:
1849:
1848:
1843:
1838:
1833:
1828:
1823:
1818:
1813:
1808:
1803:
1798:
1793:
1788:
1783:
1777:
1775:
1769:
1768:
1766:
1765:
1760:
1755:
1750:
1745:
1740:
1735:
1730:
1724:
1722:
1718:
1717:
1715:
1714:
1709:
1707:Reihenschieber
1704:
1699:
1694:
1692:Jefferson disk
1689:
1684:
1679:
1674:
1669:
1664:
1659:
1653:
1651:
1647:
1646:
1644:
1643:
1638:
1633:
1628:
1623:
1618:
1613:
1608:
1603:
1598:
1593:
1588:
1583:
1578:
1573:
1568:
1563:
1558:
1552:
1550:
1548:Rotor machines
1544:
1543:
1538:
1537:
1530:
1523:
1515:
1498:
1497:
1494:
1493:
1491:
1490:
1479:
1476:
1475:
1473:
1472:
1467:
1465:Random numbers
1462:
1457:
1452:
1447:
1442:
1437:
1432:
1427:
1422:
1417:
1411:
1409:
1405:
1404:
1402:
1401:
1396:
1391:
1389:Garlic routing
1386:
1381:
1376:
1371:
1366:
1361:
1356:
1351:
1346:
1341:
1336:
1331:
1326:
1321:
1316:
1311:
1309:Secure channel
1306:
1300:
1299:
1298:
1287:
1282:
1277:
1272:
1270:Key stretching
1267:
1262:
1257:
1252:
1247:
1242:
1237:
1236:
1235:
1230:
1220:
1218:Cryptovirology
1215:
1210:
1205:
1203:Cryptocurrency
1200:
1195:
1190:
1189:
1188:
1178:
1173:
1167:
1165:
1161:
1160:
1153:
1152:
1145:
1138:
1130:
1123:
1122:
1119:
1118:
1115:
1114:
1112:
1111:
1106:
1101:
1087:
1082:
1076:
1074:
1070:
1069:
1067:
1066:
1061:
1056:
1050:
1048:
1042:
1041:
1039:
1038:
1033:
1028:
1022:
1020:
1014:
1013:
1010:
1009:
1007:
1006:
1001:
996:
991:
989:Reihenschieber
986:
981:
976:
971:
966:
960:
958:
954:
953:
951:
950:
945:
940:
935:
930:
924:
922:
916:
915:
913:
912:
907:
902:
897:
892:
887:
882:
877:
872:
867:
862:
856:
854:
848:
847:
845:
844:
839:
834:
828:
826:
822:
821:
819:
818:
813:
808:
803:
798:
793:
787:
785:
779:
778:
776:
775:
770:
765:
760:
754:
752:
750:Polyalphabetic
743:
735:
734:
727:
726:
719:
712:
704:
688:
687:
658:
630:
598:
565:
539:
508:
491:
461:
455:978-3868340440
454:
436:
429:
404:
378:
350:
318:
279:
278:
276:
273:
272:
271:
267:Schlüsselgerät
261:
258:
229:
226:
211:
208:
200:Bletchley Park
195:
192:
160:
157:
78:
75:
61:Enigma machine
39:Schlüsselgerät
30:Fort Reuenthal
26:Schlüsselgerät
15:
9:
6:
4:
3:
2:
2396:
2385:
2382:
2380:
2377:
2375:
2372:
2370:
2367:
2365:
2362:
2360:
2357:
2355:
2352:
2350:
2347:
2345:
2342:
2340:
2337:
2336:
2334:
2315:
2307:
2306:
2303:
2297:
2296:Steganography
2294:
2292:
2289:
2287:
2284:
2282:
2279:
2277:
2274:
2272:
2269:
2267:
2264:
2262:
2259:
2257:
2254:
2252:
2251:Stream cipher
2249:
2247:
2244:
2242:
2239:
2238:
2236:
2232:
2226:
2223:
2221:
2218:
2216:
2213:
2211:
2210:Onion routing
2208:
2206:
2203:
2201:
2198:
2196:
2193:
2191:
2190:Shared secret
2188:
2186:
2183:
2181:
2178:
2176:
2173:
2171:
2168:
2166:
2163:
2161:
2158:
2156:
2153:
2151:
2148:
2146:
2143:
2141:
2138:
2136:
2133:
2130:
2127:
2122:
2119:
2118:
2117:
2114:
2112:
2109:
2107:
2104:
2102:
2099:
2097:
2094:
2092:
2089:
2087:
2086:Key generator
2084:
2082:
2079:
2077:
2074:
2072:
2069:
2067:
2064:
2060:
2057:
2055:
2052:
2051:
2050:
2049:Hash function
2047:
2045:
2042:
2040:
2037:
2035:
2032:
2030:
2027:
2025:
2024:Cryptanalysis
2022:
2020:
2017:
2013:
2010:
2009:
2008:
2005:
2003:
2000:
1998:
1995:
1994:
1992:
1988:
1984:
1977:
1972:
1970:
1965:
1963:
1958:
1957:
1954:
1950:
1936:
1933:
1931:
1928:
1926:
1923:
1921:
1918:
1917:
1915:
1913:
1909:
1903:
1900:
1898:
1895:
1893:
1890:
1888:
1885:
1883:
1880:
1878:
1875:
1873:
1870:
1868:
1865:
1863:
1860:
1859:
1857:
1853:
1847:
1844:
1842:
1839:
1837:
1834:
1832:
1829:
1827:
1824:
1822:
1819:
1817:
1814:
1812:
1809:
1807:
1804:
1802:
1799:
1797:
1794:
1792:
1789:
1787:
1784:
1782:
1779:
1778:
1776:
1774:
1770:
1764:
1761:
1759:
1756:
1754:
1751:
1749:
1746:
1744:
1741:
1739:
1736:
1734:
1731:
1729:
1726:
1725:
1723:
1719:
1713:
1710:
1708:
1705:
1703:
1700:
1698:
1695:
1693:
1690:
1688:
1685:
1683:
1680:
1678:
1675:
1673:
1670:
1668:
1665:
1663:
1660:
1658:
1655:
1654:
1652:
1648:
1642:
1639:
1637:
1634:
1632:
1629:
1627:
1624:
1622:
1619:
1617:
1614:
1612:
1609:
1607:
1604:
1602:
1599:
1597:
1594:
1592:
1589:
1587:
1584:
1582:
1579:
1577:
1574:
1572:
1569:
1567:
1564:
1562:
1559:
1557:
1554:
1553:
1551:
1549:
1545:
1536:
1531:
1529:
1524:
1522:
1517:
1516:
1513:
1509:
1505:
1489:
1481:
1480:
1477:
1471:
1470:Steganography
1468:
1466:
1463:
1461:
1458:
1456:
1453:
1451:
1448:
1446:
1443:
1441:
1438:
1436:
1433:
1431:
1428:
1426:
1425:Stream cipher
1423:
1421:
1418:
1416:
1413:
1412:
1410:
1406:
1400:
1397:
1395:
1392:
1390:
1387:
1385:
1384:Onion routing
1382:
1380:
1377:
1375:
1372:
1370:
1367:
1365:
1364:Shared secret
1362:
1360:
1357:
1355:
1352:
1350:
1347:
1345:
1342:
1340:
1337:
1335:
1332:
1330:
1327:
1325:
1322:
1320:
1317:
1315:
1312:
1310:
1307:
1304:
1301:
1296:
1293:
1292:
1291:
1288:
1286:
1283:
1281:
1278:
1276:
1273:
1271:
1268:
1266:
1263:
1261:
1260:Key generator
1258:
1256:
1253:
1251:
1248:
1246:
1243:
1241:
1238:
1234:
1231:
1229:
1226:
1225:
1224:
1223:Hash function
1221:
1219:
1216:
1214:
1211:
1209:
1206:
1204:
1201:
1199:
1198:Cryptanalysis
1196:
1194:
1191:
1187:
1184:
1183:
1182:
1179:
1177:
1174:
1172:
1169:
1168:
1166:
1162:
1158:
1151:
1146:
1144:
1139:
1137:
1132:
1131:
1128:
1124:
1110:
1107:
1105:
1102:
1099:
1095:
1091:
1088:
1086:
1083:
1081:
1078:
1077:
1075:
1073:Cryptanalysis
1071:
1065:
1062:
1060:
1057:
1055:
1052:
1051:
1049:
1047:
1046:Steganography
1043:
1037:
1034:
1032:
1029:
1027:
1024:
1023:
1021:
1019:
1015:
1005:
1002:
1000:
997:
995:
992:
990:
987:
985:
982:
980:
977:
975:
972:
970:
967:
965:
962:
961:
959:
955:
949:
946:
944:
941:
939:
936:
934:
931:
929:
926:
925:
923:
921:
920:Transposition
917:
911:
908:
906:
903:
901:
898:
896:
893:
891:
888:
886:
883:
881:
878:
876:
873:
871:
868:
866:
863:
861:
858:
857:
855:
853:
849:
843:
840:
838:
835:
833:
830:
829:
827:
823:
817:
814:
812:
809:
807:
804:
802:
799:
797:
794:
792:
789:
788:
786:
784:
780:
774:
771:
769:
766:
764:
761:
759:
756:
755:
753:
751:
747:
744:
740:
736:
732:
725:
720:
718:
713:
711:
706:
705:
702:
698:
694:
675:
674:
669:
662:
646:
645:
640:
634:
618:
614:
613:
608:
602:
586:
582:
581:
576:
569:
554:
550:
543:
527:
526:
518:
512:
506:
503:
502:
495:
480:
479:Crypto Museum
476:
470:
468:
466:
457:
451:
447:
440:
432:
430:9781906447151
426:
422:
421:
413:
411:
409:
400:
399:
391:
389:
387:
385:
383:
367:
363:
357:
355:
339:
335:
334:
329:
322:
306:
302:
295:
289:
287:
285:
280:
270:
268:
264:
263:
257:
255:
251:
247:
243:
239:
235:
225:
223:
222:
217:
207:
205:
201:
194:Cryptanalysis
191:
189:
185:
182:
181:Boris Hagelin
173:
165:
156:
154:
150:
149:
144:
140:
135:
133:
132:
127:
126:
120:
118:
114:
110:
106:
102:
98:
94:
93:
83:
74:
72:
68:
67:
62:
58:
54:
50:
46:
42:
40:
31:
27:
23:
19:
2246:Block cipher
2091:Key schedule
2081:Key exchange
2071:Kleptography
2034:Cryptosystem
1983:Cryptography
1773:Secure voice
1620:
1566:M-125 Fialka
1420:Block cipher
1265:Key schedule
1255:Key exchange
1245:Kleptography
1208:Cryptosystem
1157:Cryptography
979:One-time pad
852:Substitution
678:. Retrieved
671:
661:
649:. Retrieved
642:
633:
621:. Retrieved
617:the original
610:
601:
589:. Retrieved
585:the original
578:
568:
556:. Retrieved
552:
542:
530:. Retrieved
523:
511:
499:
494:
482:. Retrieved
478:
445:
439:
419:
396:
369:. Retrieved
365:
341:. Retrieved
331:
321:
309:. Retrieved
300:
266:
253:
231:
219:
215:
213:
197:
178:
152:
146:
143:Fritz Thiele
136:
129:
123:
121:
109:light metals
101:Fritz Menzer
90:
88:
71:World War II
64:
57:Nazi Germany
48:
44:
38:
37:
35:
25:
18:
2234:Mathematics
2225:Mix network
1721:Teleprinter
1677:Cipher disk
1408:Mathematics
1399:Mix network
1031:Code talker
910:Running key
842:Four-square
676:(in German)
49:Hitler mill
2333:Categories
2185:Ciphertext
2155:Decryption
2150:Encryption
2111:Ransomware
1786:FASCINATOR
1650:Mechanical
1359:Ciphertext
1329:Decryption
1324:Encryption
1285:Ransomware
1080:Cryptogram
974:Kama Sutra
943:Rail fence
938:Myszkowski
885:Chaocipher
837:Two-square
816:VIC cipher
768:Trithemius
275:References
28:41 at the
2175:Plaintext
1349:Plaintext
1004:Solitaire
742:by family
333:Telepolis
221:Luftwaffe
125:Luftwaffe
117:magnesium
113:aluminium
2314:Category
2220:Kademlia
2180:Codetext
2123:(CSPRNG)
1935:IBM 4764
1930:IBM 4758
1897:Pinwheel
1488:Category
1394:Kademlia
1354:Codetext
1297:(CSPRNG)
1092:(Units:
928:Columnar
875:Beaufort
832:Playfair
806:Tap code
801:Nihilist
773:Vigenère
366:jproc.ca
260:See also
250:conserve
240:city of
238:Bavarian
204:in depth
184:C-Series
159:Function
155:Enigma.
139:materiel
111:such as
105:Wanderer
51:, was a
1990:General
1841:STU-III
1826:SIGSALY
1781:BID 150
1733:BID 770
1712:Scytale
1636:Singlet
1596:Mercury
1164:General
870:Autokey
758:Alberti
739:Ciphers
77:History
32:Museum.
2101:Keygen
1902:Rockex
1892:Purple
1882:Noreen
1846:VINSON
1836:STU-II
1806:NESTOR
1763:SIGTOT
1631:SIGCUM
1626:SIGABA
1586:Lacida
1571:Hebern
1561:Enigma
1275:Keygen
1059:Grille
999:Slidex
933:Double
900:Pigpen
880:Caesar
865:Atbash
860:Affine
825:Square
811:Trifid
791:ADFGVX
763:Enigma
680:4 June
651:4 June
623:4 June
591:4 June
558:4 June
532:3 June
484:2 June
452:
427:
371:4 June
343:2 June
311:2 June
216:SG-41Z
210:SG-41Z
153:Abwehr
148:Abwehr
66:Abwehr
2131:(PRN)
1877:KL-51
1872:KL-43
1867:KG-84
1855:Other
1801:KY-68
1796:KY-58
1748:KW-37
1743:KW-26
1738:DUDEK
1728:5-UCO
1702:M-209
1687:Kryha
1672:CD-57
1641:Typex
1621:SG-41
1616:SG-39
1591:M-325
1576:HX-63
1305:(PRN)
1054:Bacon
1018:Codes
969:DRYAD
964:BATCO
957:Other
948:Route
905:ROT13
890:Great
796:Bifid
520:(PDF)
338:Heise
297:(PDF)
242:Aying
188:CX-52
45:SG-41
1862:JADE
1816:SCIP
1811:OMNI
1791:KY-3
1697:M-94
1682:HC-9
1667:C-52
1662:C-36
1601:NEMA
1581:KL-7
1096:and
1064:Null
1036:Poem
1026:Book
895:Hill
682:2019
653:2019
625:2019
593:2019
560:2019
534:2019
486:2019
450:ISBN
425:ISBN
373:2019
345:2019
313:2019
131:Heer
128:and
115:and
103:and
36:The
1887:Red
1831:STE
1611:RED
1606:OMI
1556:CCM
1098:Nat
1094:Ban
47:or
2335::
609:.
551:.
522:.
477:.
464:^
407:^
381:^
364:.
353:^
336:.
303:.
299:.
283:^
269:39
256:.
190:.
73:.
41:41
1975:e
1968:t
1961:v
1534:e
1527:t
1520:v
1149:e
1142:t
1135:v
1100:)
723:e
716:t
709:v
684:.
655:.
627:.
595:.
562:.
536:.
488:.
458:.
433:.
375:.
347:.
315:.
95:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.