Browse Items (30 total)

2020-04-26 05_28_04-Frequency Analysis_ Breaking the Code - Crypto Corner.jpg
Frequency Analysis is a method of code breaking that works to decipher all substitution ciphers. This methods relies on the fact that some letters of the alphabet are used more than other letters of the alphabet. For example, 'E' is more commonly…

t52d_layout.png
The T-52 G-Schreiber was developed around 1930 by Siemens & Halske. It was used by the Germans in WWII in conjunction with the Enigma and Lorenz. Intercepting messages that were in-depth enough to decipher was difficult for Allied codebreakers…

2020-04-11 02_00_59-Giddings Field Message Book.jpg
The Giddings Field Message Book was used in 1898 during the Spanish-American War. Designed by Major Howard A. Giddings of the Brigadier Signal Officer Office of the Connecticut National Guard, it composed of a pocket pad with a built in US Army…

2020-04-26 02_15_23-Hill Cipher - Crypto Corner.jpg
The Hill Cipher was developed in 1929 by Lester Hill. A digraph substitution cipher, it works using groups of letters to encrypt. However, it is different from other digraph substitution ciphers because it can work on different group sizes of…

lorenz_sz40_small.jpg
The Lorenz cipher machine was developed by Lorenz and used in WWII by the German Army High Command. Hilter used it to communicate with his generals. This cipher machine was dubbed "TUNNY" by British codebreakers at Bletchly Park. In August 1941, Bill…

Tags: , ,

m209_features.png
The M-209 was a cipher machine invented by Boris Hagelin or AB Cryptoteknik at the beginning of WWII. As a pin-and-lug cipher machine, it did not require electricity. During the war, German cryptanalysts called the machine "AM-1" for "American…

Tags: ,

M94.jpg
The M-94 was a cipher device based off the polyalphabetic manual substitution cipher. It was created by US Army major Joseph Mauborgne in 1917 with inspiration from a similar device invented by Thomas Jefferson in 1795. In 1921, it was introduced to…

Tags:

ky38_soldier_small.jpg
NESTOR is the NSA-developed speech encryption used by American forces during the Vietnamese War. The encryption was compatible between several devices, including the KY-38 manpack unit, KY-8 vehicular unit, and KY-28 aircraft unit.

8059746_orig.gif
The Pigpen Cipher is a form of substitution cipher that uses symbols, rather than other letters. Although its origin is unknown, this cipher was most famously used by the Freemasons in the 18th century- to the point that some know it as the…

Playfair.jpg
The Playfair Cipher was created in 1854 by Charles Wheatstone, and named after Lord Playfair for promoting its use. Initially, it was rejected by the British Foreign Office for appearing complicated. Later, the military began to use it for being…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2