1
10
1
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/a920f58000826b7896a4400332c39011.jpg?Expires=1712793600&Signature=vgG6bKJwZgs-TuiAQ%7Ex2xhdARTDhuW7w1gC9lqKOjd8Q62hk8juA2xVtihc1lL2Y9GnGDxDl%7Ex1UhyyOldHIT7DASvSA4vo1mVlQ6Xf1cd%7EGLE9mQlTC4Fo3TKgOX7KO6koucbAPoO2keUKReIjS3yuSOMyLzB46%7ETco8r5jLU3UHYpNP8ueJCIOEdYcV0j48vUY9MoE1jW6UfPPDm14YvRY3K7tgBkacoZYarZ31mLFByZhQvzM2T5-v93Oko3kB4levFrVTpGQYF1b1dLD1lNWWMLtwEsFvFrWsfyYa5yOJXVSu72LfGTJcsvrVh-D4K99Rg1JX2hTCBpRM8rTLQ__&Key-Pair-Id=K6UGZS9ZTDSZM
db35a5c887bc790dc936aa64b065a0de
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Cipher Tools and Machines
Subject
The topic of the resource
Cipher tools and machines
Description
An account of the resource
Cipher Tools and Machines contains examples of cipher tools and machines seen through out history, particularly within the context of military history. From Ancient Greece to the Cold War, cryptology has played a significant part in the communication and intelligence efforts between opposing forces.
They, along with cryptanalysts, have even been credited with shortening the duration of wars. Without the British intelligence project ULTRA, WWII may have lasted for another two years. However, while many great cryptanalysts hail from Britain, the UK is not exclusive in their cryptographic abilities. The Enigma was invented in Germany, and its stronger rendition, Fialka- in Russia. In comparison to these cryptomachines, the US SIGABA remains unbroken. Those are only a few cipher machines flound in this collection.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Speech encryption device
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
NESTOR
Subject
The topic of the resource
NESTOR
Description
An account of the resource
NESTOR is the NSA-developed speech encryption used by American forces during the Vietnamese War. The encryption was compatible between several devices, including the KY-38 manpack unit, KY-8 vehicular unit, and KY-28 aircraft unit.
Creator
An entity primarily responsible for making the resource
NSA
Source
A related resource from which the described resource is derived
https://www.cryptomuseum.com/crypto/usa/ky38/index.htm
Publisher
An entity responsible for making the resource available
Cryptomuseum
Date
A point or period of time associated with an event in the lifecycle of the resource
1964
Contributor
An entity responsible for making contributions to the resource
Cryptomuseum
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
English
Type
The nature or genre of the resource
Speech encryption device
NESTOR
Vietnam War