954:
46:
Wadsworth's system involved a set of two disks, one inside the other, where the outer disk had the 26 letters of the alphabet and the numbers 2-8, and the inner disk had only the 26 letters. The disks were geared together at a ratio of 26:33. To encipher a message, the inner disk was turned until
51:. Due to the gearing, a ciphertext substitution for a character did not repeat until all 33 characters for the plaintext letter had been used. A similar device was invented by
934:
764:
459:
176:
617:
140:
169:
610:
32:
813:
162:
47:
the desired letter was at the top position, with the number of turns required for the result transmitted as
603:
929:
884:
697:
982:
808:
24:
924:
555:
474:
914:
904:
759:
239:
464:
909:
899:
702:
662:
655:
645:
640:
540:
199:
650:
401:
264:
259:
957:
803:
749:
535:
530:
505:
310:
305:
128:
919:
843:
568:
254:
214:
8:
682:
563:
449:
788:
772:
719:
52:
39:, establishing a method that was continuously improved upon and used until the end of
848:
838:
709:
783:
101:
36:
249:
858:
778:
739:
687:
672:
350:
335:
300:
244:
204:
105:
35:. In 1817, he developed a progressive cipher system based on a 1790 design by
976:
939:
894:
853:
833:
729:
692:
667:
396:
191:
87:
889:
734:
724:
714:
677:
626:
416:
40:
122:
868:
454:
320:
134:
92:
828:
798:
793:
754:
429:
48:
818:
863:
823:
578:
573:
484:
469:
424:
376:
355:
28:
744:
545:
525:
489:
479:
406:
279:
274:
269:
229:
209:
520:
515:
510:
444:
439:
391:
386:
381:
371:
345:
330:
315:
284:
234:
219:
434:
340:
325:
224:
88:"THE MYSTERY OF COLONEL DECIUS WADSWORTH'S CIPHER DEVICE"
81:
79:
77:
75:
73:
71:
765:
Cryptographically secure pseudorandom number generator
68:
146:
974:
611:
170:
618:
604:
177:
163:
975:
599:
158:
85:
184:
13:
14:
994:
137:, Carl Ellison, December 11, 2004
123:"A Short History of Cryptography"
116:
33:United States Army Ordnance Corps
953:
952:
625:
55:several years after Wadsworth.
814:Information-theoretic security
1:
61:
7:
930:Message authentication code
885:Cryptographic hash function
698:Cryptographic hash function
23:, was a cipher invented by
10:
999:
809:Harvest now, decrypt later
948:
925:Post-quantum cryptography
877:
633:
595:
554:
498:
415:
364:
293:
190:
154:
150:
143:, Richard A. Mollin, 2005
106:10.1080/0161-118291857037
915:Quantum key distribution
905:Authenticated encryption
760:Random number generation
910:Public-key cryptography
900:Symmetric-key algorithm
703:Key derivation function
663:Cryptographic primitive
656:Authentication protocol
646:Outline of cryptography
641:History of cryptography
135:"Cryptography Timeline"
131:, Jose Mari Reyes, 2001
651:Cryptographic protocol
402:Siemens and Halske T52
804:End-to-end encryption
750:Cryptojacking malware
465:Sectéra Secure Module
129:"Cryptography Primer"
920:Quantum cryptography
844:Trusted timestamping
569:Intel SHA extensions
86:Kruh, Louis (1982).
683:Cryptographic nonce
564:AES instruction set
21:Wheatstone's cipher
789:Subliminal channel
773:Pseudorandom noise
720:Key (cryptography)
125:, Fred Cohen, 1995
53:Charles Wheatstone
17:Wadsworth's cipher
983:Classical ciphers
970:
969:
966:
965:
849:Key-based routing
839:Trapdoor function
710:Digital signature
591:
590:
587:
586:
556:Computer hardware
301:Bazeries cylinder
990:
956:
955:
784:Insecure channel
620:
613:
606:
597:
596:
179:
172:
165:
156:
155:
152:
151:
148:
147:
110:
109:
83:
37:Thomas Jefferson
25:Decius Wadsworth
998:
997:
993:
992:
991:
989:
988:
987:
973:
972:
971:
962:
944:
873:
629:
624:
583:
550:
494:
411:
397:Lorenz SZ 40/42
360:
289:
186:
185:Cipher machines
183:
119:
114:
113:
84:
69:
64:
58:
12:
11:
5:
996:
986:
985:
968:
967:
964:
963:
961:
960:
949:
946:
945:
943:
942:
937:
935:Random numbers
932:
927:
922:
917:
912:
907:
902:
897:
892:
887:
881:
879:
875:
874:
872:
871:
866:
861:
859:Garlic routing
856:
851:
846:
841:
836:
831:
826:
821:
816:
811:
806:
801:
796:
791:
786:
781:
779:Secure channel
776:
770:
769:
768:
757:
752:
747:
742:
740:Key stretching
737:
732:
727:
722:
717:
712:
707:
706:
705:
700:
690:
688:Cryptovirology
685:
680:
675:
673:Cryptocurrency
670:
665:
660:
659:
658:
648:
643:
637:
635:
631:
630:
623:
622:
615:
608:
600:
593:
592:
589:
588:
585:
584:
582:
581:
576:
571:
566:
560:
558:
552:
551:
549:
548:
543:
538:
533:
528:
523:
518:
513:
508:
502:
500:
496:
495:
493:
492:
487:
482:
477:
472:
467:
462:
457:
452:
447:
442:
437:
432:
427:
421:
419:
413:
412:
410:
409:
404:
399:
394:
389:
384:
379:
374:
368:
366:
362:
361:
359:
358:
353:
351:Reihenschieber
348:
343:
338:
336:Jefferson disk
333:
328:
323:
318:
313:
308:
303:
297:
295:
291:
290:
288:
287:
282:
277:
272:
267:
262:
257:
252:
247:
242:
237:
232:
227:
222:
217:
212:
207:
202:
196:
194:
192:Rotor machines
188:
187:
182:
181:
174:
167:
159:
145:
144:
138:
132:
126:
118:
117:External links
115:
112:
111:
66:
65:
63:
60:
9:
6:
4:
3:
2:
995:
984:
981:
980:
978:
959:
951:
950:
947:
941:
940:Steganography
938:
936:
933:
931:
928:
926:
923:
921:
918:
916:
913:
911:
908:
906:
903:
901:
898:
896:
895:Stream cipher
893:
891:
888:
886:
883:
882:
880:
876:
870:
867:
865:
862:
860:
857:
855:
854:Onion routing
852:
850:
847:
845:
842:
840:
837:
835:
834:Shared secret
832:
830:
827:
825:
822:
820:
817:
815:
812:
810:
807:
805:
802:
800:
797:
795:
792:
790:
787:
785:
782:
780:
777:
774:
771:
766:
763:
762:
761:
758:
756:
753:
751:
748:
746:
743:
741:
738:
736:
733:
731:
730:Key generator
728:
726:
723:
721:
718:
716:
713:
711:
708:
704:
701:
699:
696:
695:
694:
693:Hash function
691:
689:
686:
684:
681:
679:
676:
674:
671:
669:
668:Cryptanalysis
666:
664:
661:
657:
654:
653:
652:
649:
647:
644:
642:
639:
638:
636:
632:
628:
621:
616:
614:
609:
607:
602:
601:
598:
594:
580:
577:
575:
572:
570:
567:
565:
562:
561:
559:
557:
553:
547:
544:
542:
539:
537:
534:
532:
529:
527:
524:
522:
519:
517:
514:
512:
509:
507:
504:
503:
501:
497:
491:
488:
486:
483:
481:
478:
476:
473:
471:
468:
466:
463:
461:
458:
456:
453:
451:
448:
446:
443:
441:
438:
436:
433:
431:
428:
426:
423:
422:
420:
418:
414:
408:
405:
403:
400:
398:
395:
393:
390:
388:
385:
383:
380:
378:
375:
373:
370:
369:
367:
363:
357:
354:
352:
349:
347:
344:
342:
339:
337:
334:
332:
329:
327:
324:
322:
319:
317:
314:
312:
309:
307:
304:
302:
299:
298:
296:
292:
286:
283:
281:
278:
276:
273:
271:
268:
266:
263:
261:
258:
256:
253:
251:
248:
246:
243:
241:
238:
236:
233:
231:
228:
226:
223:
221:
218:
216:
213:
211:
208:
206:
203:
201:
198:
197:
195:
193:
189:
180:
175:
173:
168:
166:
161:
160:
157:
153:
149:
142:
139:
136:
133:
130:
127:
124:
121:
120:
107:
103:
99:
95:
94:
89:
82:
80:
78:
76:
74:
72:
67:
59:
56:
54:
50:
44:
42:
38:
34:
30:
26:
22:
18:
890:Block cipher
735:Key schedule
725:Key exchange
715:Kleptography
678:Cryptosystem
627:Cryptography
417:Secure voice
210:M-125 Fialka
97:
91:
57:
45:
41:World War II
20:
16:
15:
878:Mathematics
869:Mix network
365:Teleprinter
321:Cipher disk
93:Cryptologia
829:Ciphertext
799:Decryption
794:Encryption
755:Ransomware
430:FASCINATOR
294:Mechanical
62:References
49:ciphertext
819:Plaintext
977:Category
958:Category
864:Kademlia
824:Codetext
767:(CSPRNG)
579:IBM 4764
574:IBM 4758
541:Pinwheel
634:General
485:STU-III
470:SIGSALY
425:BID 150
377:BID 770
356:Scytale
280:Singlet
240:Mercury
31:in the
29:Colonel
745:Keygen
546:Rockex
536:Purple
526:Noreen
490:VINSON
480:STU-II
450:NESTOR
407:SIGTOT
275:SIGCUM
270:SIGABA
230:Lacida
215:Hebern
205:Enigma
19:, or
775:(PRN)
521:KL-51
516:KL-43
511:KG-84
499:Other
445:KY-68
440:KY-58
392:KW-37
387:KW-26
382:DUDEK
372:5-UCO
346:M-209
331:Kryha
316:CD-57
285:Typex
265:SG-41
260:SG-39
235:M-325
220:HX-63
141:Codes
100:(3).
506:JADE
460:SCIP
455:OMNI
435:KY-3
341:M-94
326:HC-9
311:C-52
306:C-36
245:NEMA
225:KL-7
27:, a
531:Red
475:STE
255:RED
250:OMI
200:CCM
102:doi
979::
96:.
90:.
70:^
43:.
619:e
612:t
605:v
178:e
171:t
164:v
108:.
104::
98:6
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.