2
10
30
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/80ae8a216fd024b773f6416b361a900a.jpg?Expires=1712793600&Signature=uBDUKD4F%7Er7rAmWMVpXKUMyeFMeMmWymbP%7E22%7EiDirAX7QQo1TsO-VpDM9ORTfqPUG6Oa7CYnLLHhFYuMXy%7ETDuExxob98YZzEHrvH5N1Z0aVA4pURqMiv1uNcjlDsLyPSx37vo8tjty86ME89FLDTxS9oTnAOafxMeWPJi65EY8vn6S8TinXmAQTKidWbqv7GABdPHYKP1hhcQkG97NTuMRadCueadg7nkYTfjwnfyJ2QtKDB5tzfJigzKd5J4eeTQz3HhH1ojs16a38%7EkK5EekJHodMCQMj3eiwzBmH2IxS8bXtKjvcU9XpHr8SgUIOyHtibNiuHC-QzfL65ewQw__&Key-Pair-Id=K6UGZS9ZTDSZM
45f793ff4fab4ef28c7e27eb57eca10d
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Classical Ciphers and Application
Subject
The topic of the resource
Classical Ciphers and Application
Description
An account of the resource
Classical Ciphers and Application features analyses of various ciphers- including classical ciphers and the application of ciphers used during WWII. The purpose of the collection is to explain how classical ciphers work and show the patterns among substitution (replacement) and transposition(scramble) ciphers. For further understanding in application, it attempts to provide an analysis of the famous substitution ciphers- the Zimmerman Telegram and WWII Pigeon Cipher.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
.JPEG
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Atbash Cipher
Subject
The topic of the resource
Atbash Cipher
Description
An account of the resource
The Atbash Cipher is a monoalphabetic substitution cipher that is relatively simple and does not require a key. Instead of a key, the substitution simply relies on reversing the alphabet. Therefore, 'A' becomes 'Z', 'B' becomes 'Y', and so forth. This makes it a weak cipher in terms of how easy it is to decode. However, it does have one notable security measure- including numbers and punctuation on either side of the alphabet that also has to be reversed.
Creator
An entity primarily responsible for making the resource
Israel (Hebrew origin)
Source
A related resource from which the described resource is derived
https://crypto.interactive-maths.com/atbash-cipher.html
Publisher
An entity responsible for making the resource available
Crypto Corner
Contributor
An entity responsible for making contributions to the resource
Daniel Rodriguez-Clark
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
Hebrew, English
Atbash Cipher
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/f303666b6edb47ea835d11f84d2fc00b.jpg?Expires=1712793600&Signature=Jd5kB6ffP5oszyPNqd38cM4iTwwZqw49NH9KYiiVRHFd9wpE%7EUs%7EKQiXT07QSlrQnN8T-b5txveyCT3eokiICya25KGzLM6Vn85LBoGT7qQlfANoK6mMR0sUo0pywkE0Zx-z1nT2zVCSd%7Eg8-vqCSB1ghcpouH49dFSEUGcwlD6RaXZs5iY4MJuqJdzZO%7E8hcNiAEwHEWgkcvEj92cNYMMywOKpgwJ5z2Y7Zej6Ob8xpZ0doSADUSs1GxM2HhtNf9xk%7EUUZ6vX5HzIZpF4PkvWH5p07RD7s1ZafXjH9r087%7EDjYtRVXyDLo3qLY7DwspaBmhqi3DXhAzM6WQAqkF5Q__&Key-Pair-Id=K6UGZS9ZTDSZM
b385f3adf677ba95a700e5a4a47daae5
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Cipher Tools and Machines
Subject
The topic of the resource
Cipher tools and machines
Description
An account of the resource
Cipher Tools and Machines contains examples of cipher tools and machines seen through out history, particularly within the context of military history. From Ancient Greece to the Cold War, cryptology has played a significant part in the communication and intelligence efforts between opposing forces.
They, along with cryptanalysts, have even been credited with shortening the duration of wars. Without the British intelligence project ULTRA, WWII may have lasted for another two years. However, while many great cryptanalysts hail from Britain, the UK is not exclusive in their cryptographic abilities. The Enigma was invented in Germany, and its stronger rendition, Fialka- in Russia. In comparison to these cryptomachines, the US SIGABA remains unbroken. Those are only a few cipher machines flound in this collection.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cypher Machine
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
PURPLE
Subject
The topic of the resource
Japanese Purple cipher
Description
An account of the resource
PURPLE was a Japanese cipher machine used during WWII and based off the Enigma's rotor technology. While it was developed in 1937 with four rotors (compared to the Enigma's three), it was broken only a few years later in 1940 without being seen by the successful cryptanalysts. William Friedman and the U.S. Signal Intelligence Service did this by building a working replica of the highest Japanese security code.
Creator
An entity primarily responsible for making the resource
Japan
Source
A related resource from which the described resource is derived
https://ciphermachines.com/purple
Publisher
An entity responsible for making the resource available
Ciphermachines
Date
A point or period of time associated with an event in the lifecycle of the resource
1937
Contributor
An entity responsible for making contributions to the resource
Ciphermachines
Relation
A related resource
https://crypto.omeka.net/items/show/5
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
English
Type
The nature or genre of the resource
Cypher Machine
PURPLE
WWII
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/feeba9a7b6508e8800ef8ea3142fb85c.jpg?Expires=1712793600&Signature=UXTOF9fwDHSbkwd2HONjqfeceSOoLaeSEAgXpRX27-q9z2cEmUIx224mzgVgwG6t4pLMNQ6ez0AiiAHK72oY5nGvZ0qhkbOr11LPQxgP5rEW8vuiVp7DwuR-aaX9eYgseHlmrOaio3s3igpg9nfB30FS3sas1MrDDcXlzgRrznfbrVYHRqoWM5SjRhkLR2dLhtlReTMrfQZuHVCA3upJwgorf1wevTDsn%7EeM%7E%7EwAhbsP5vWGyMoX65uMk8zdWUvPFi6IQ3l61uHtSJSegwvtnDw0XblevieWXVyjiBUuOyBhllNjFIh4gdDBbZyBkNtMJ4MY-kWD%7EJG825Fvt1%7EuWQ__&Key-Pair-Id=K6UGZS9ZTDSZM
2d36d5e6fb5060596af8bc1325c77fc2
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Cipher Tools and Machines
Subject
The topic of the resource
Cipher tools and machines
Description
An account of the resource
Cipher Tools and Machines contains examples of cipher tools and machines seen through out history, particularly within the context of military history. From Ancient Greece to the Cold War, cryptology has played a significant part in the communication and intelligence efforts between opposing forces.
They, along with cryptanalysts, have even been credited with shortening the duration of wars. Without the British intelligence project ULTRA, WWII may have lasted for another two years. However, while many great cryptanalysts hail from Britain, the UK is not exclusive in their cryptographic abilities. The Enigma was invented in Germany, and its stronger rendition, Fialka- in Russia. In comparison to these cryptomachines, the US SIGABA remains unbroken. Those are only a few cipher machines flound in this collection.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher device
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
M-94
Subject
The topic of the resource
M-94
Description
An account of the resource
The M-94 was a cipher device based off the polyalphabetic manual substitution cipher. It was created by US Army major Joseph Mauborgne in 1917 with inspiration from a similar device invented by Thomas Jefferson in 1795. In 1921, it was introduced to the Army.
This device consisted of 25 circular discs- each with a different mixed alphabet of 26 letters. Although the security of the pocket device wasn't impressive, companies like Doehler, Reeve, and Alcoa had produced 9,432 of these tools by 1943 for use in the US Army.
The growing obsolete nature of this cipher device would inspire the need for the M-209.
Creator
An entity primarily responsible for making the resource
Joseph O. Mauborgne
Source
A related resource from which the described resource is derived
https://www.campx.ca/crypto.html
Publisher
An entity responsible for making the resource available
Cryptographic Artifacts
Date
A point or period of time associated with an event in the lifecycle of the resource
1917-1943
Contributor
An entity responsible for making contributions to the resource
Richard Brisson
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Type
The nature or genre of the resource
Cipher device
M-94
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/84712dcc7f7179ef5dbca911a2de3d9b.png?Expires=1712793600&Signature=cUpXWF0dUbRBr-sWhodS9uGJH%7EK0NSWTFm%7E9iJdT29SuEvXU7H0Pt3KpQB1ENRMh2hZQnlcMAVjOkQeMw2V49qdSWsuSQkTphGadiIJFRUK57Vwr2pQ%7EpqU%7E6MCnLhimN-e4jqDbiOM5QahNxfAf97OcAdIMmmW3WwtDG0KEGESYjtReu7MmRpiUtnq350PtLWFBTuYqZTgtItiDu8aVqfWQvAaXUHiqV9Y5eZ5asZnLwMZ4PjVuC31U8Jm3habz%7EsNPSMNUygugtfHR4pTzdnVUH2p13fete%7EqweCInxc%7E-5GtpaJarRn35fYjrbd096FvSZ-N1UM7JgjizrEAJ%7Ew__&Key-Pair-Id=K6UGZS9ZTDSZM
9a559be465682b6b55a5787eef9103e6
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Classical Ciphers and Application
Subject
The topic of the resource
Classical Ciphers and Application
Description
An account of the resource
Classical Ciphers and Application features analyses of various ciphers- including classical ciphers and the application of ciphers used during WWII. The purpose of the collection is to explain how classical ciphers work and show the patterns among substitution (replacement) and transposition(scramble) ciphers. For further understanding in application, it attempts to provide an analysis of the famous substitution ciphers- the Zimmerman Telegram and WWII Pigeon Cipher.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Caesar Cipher
Subject
The topic of the resource
Caesar Cipher
Description
An account of the resource
The Caesar Cipher is one of the oldest ciphers, used by Julius Caesar to communicate with his generals. It works by shifting the alphabet down by a fixed number, or key. Due to the simplicity, it can be broken if the crypanalyst knows that a simple substitution method has been used to get the ciphertext, or the Caesar Cipher itself.<br /><br />One method of deciphering a Caesar Cipher is by using a brute approach and noting the frequency of each letter used- then comparing those frequencies to a frequency distribution chart of the alphabet. For example, 'E' is the most freqently used letter in the alphabet. Theoretically, if 'G' is the most freqently used letter in the ciphertext, you may able to shift the alphabets so that 'E' aligns with 'G' to decipher the rest of the ciphertext.
Creator
An entity primarily responsible for making the resource
Julius Caesar
Source
A related resource from which the described resource is derived
https://www.cs.mcgill.ca/~rwest/wikispeedia/wpcd/wp/c/Caesar_cipher.htm
Publisher
An entity responsible for making the resource available
Cs.mcgill.ca
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
English
Type
The nature or genre of the resource
Cipher
Date
A point or period of time associated with an event in the lifecycle of the resource
44 B.C.
Caesar Cipher
Greek
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/7e22a44502c60171c6d27aa873a7b138.jpg?Expires=1712793600&Signature=eqAVKxbsXhrwwDGmFvnmrI7Q01iz1SaCsLcGlb42rJS9xb5qNG-vDBmxyKmSsbA0GIipbs0W-1PBQstx6BzCvpjnx-33rFJyfjZbn3I57RDeybsitsdx9G8Uy6vc-mQvLni4Z1meMV7ItLo17D0B7kdIsWFq1NGJNaft3zmAxKKCsi9avxwCDm%7EgKWNsfp%7EhDstIJ6RFapIK3IXLrfiLIJNEVDbVHQyezy0e7A5CpUjN502WEk20RdToXJuxosPrmCfbXZTbIZ8l1DPbMqYrOrlUf5t1eP9KgUO0rR%7Ef1iu6baa5wNHenxA5epD-y3Thm2eKqe7zvLJpEuSrvvqg1Q__&Key-Pair-Id=K6UGZS9ZTDSZM
0ea1e78a9ef2dd39d051ca1afb45407f
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/f94d8520747ca75af31570792a6d9291.jpg?Expires=1712793600&Signature=On%7E6z%7EHsko847NRUJ8elEAlfxGr2QO7JIQjv4iNIGVxmgYGlz2h5BcBiGuR85HxZCvrbUA6iKefVXZsU4KRLW120y5%7EMXj0lMNt%7Elsz8tsX7m-m9zpGuL1ZcbHA%7E3%7EUqxK5HfW6Qd7P82gCdxBUxYrLdWwS-1jbwWMtnciQFNkFmcqibMusoV2gDfDByD5xSO8eu20ui3wVeuaQwbWFdv7PtVLQtezV%7ETUsXGt47iiElIOc4WmB7OyO%7EX6KzNewA9-YmQw6BwMPY45vfk59Kbhc9ddy2rPZ-gbnQRFLvQNc5aMEg4ID5Fw8KynxMvARlTd5WQU6N-a4MIHjMhHNVhQ__&Key-Pair-Id=K6UGZS9ZTDSZM
7490326ae49a755306e57482f2f134e9
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Classical Ciphers and Application
Subject
The topic of the resource
Classical Ciphers and Application
Description
An account of the resource
Classical Ciphers and Application features analyses of various ciphers- including classical ciphers and the application of ciphers used during WWII. The purpose of the collection is to explain how classical ciphers work and show the patterns among substitution (replacement) and transposition(scramble) ciphers. For further understanding in application, it attempts to provide an analysis of the famous substitution ciphers- the Zimmerman Telegram and WWII Pigeon Cipher.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Hill Cipher
Subject
The topic of the resource
Hill Cipher
Description
An account of the resource
The Hill Cipher was developed in 1929 by Lester Hill. A digraph substitution cipher, it works using groups of letters to encrypt. However, it is different from other digraph substitution ciphers because it can work on different group sizes of letters- technically making it a polygraphic substitution cipher.
The Hill Cipher is also exceptional because it uses linear algebra, matrices, and arithmetic. This is a relatively significant amount of mathematics compared to other ciphers that can be used by hand and without a machine. For the example outlined in the images, the resulting ciphertext is: "APADJ TFTWLFJ".
Creator
An entity primarily responsible for making the resource
Lester S. Hill
Source
A related resource from which the described resource is derived
https://crypto.interactive-maths.com/hill-cipher.html
Publisher
An entity responsible for making the resource available
Crypto Corner
Contributor
An entity responsible for making contributions to the resource
Daniel Rodriguez-Clark
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Type
The nature or genre of the resource
Cipher
Hill Cipher
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/2d3a31de7181223e15e41b5f90982404.jpg?Expires=1712793600&Signature=PG8oA3YeBHjgtmLL%7Eq626V46axGcm1yFUo4TkdRvQ0oKwq1MAimfuCYm75o2KqzRYO84aLj4R1y7PVwfkzVqQlUwITb66NBTkcJRC0n3I5CtfsivZZzozLFOPBe0yjozziNH8HvRyr5mlg3hyEMe8toICFXcL-B2OlhSwYRbO2d8dr-QQOdaiT27N08TAZmrWji%7EzryZGATTMtTEeBUJrde9WFTewZAImhix9TAjJvQdTBOX%7EZci6Jvlf%7EbVbQ3Haw8mjHMMU5q66yoyYCzcehMU74HB72kCRon2%7E28Dgm6CErnHaBusO5r2Tb-W0XMxlYf%7EmykZVHy6n0IFiH6NeQ__&Key-Pair-Id=K6UGZS9ZTDSZM
9430e8e4308da44cbae40eb3c7ec471a
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Cipher Tools and Machines
Subject
The topic of the resource
Cipher tools and machines
Description
An account of the resource
Cipher Tools and Machines contains examples of cipher tools and machines seen through out history, particularly within the context of military history. From Ancient Greece to the Cold War, cryptology has played a significant part in the communication and intelligence efforts between opposing forces.
They, along with cryptanalysts, have even been credited with shortening the duration of wars. Without the British intelligence project ULTRA, WWII may have lasted for another two years. However, while many great cryptanalysts hail from Britain, the UK is not exclusive in their cryptographic abilities. The Enigma was invented in Germany, and its stronger rendition, Fialka- in Russia. In comparison to these cryptomachines, the US SIGABA remains unbroken. Those are only a few cipher machines flound in this collection.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher machine
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Lorenz "TUNNY"
Subject
The topic of the resource
Lorenz SZ-40/42 "TUNNY"
Description
An account of the resource
The Lorenz cipher machine was developed by Lorenz and used in WWII by the German Army High Command. Hilter used it to communicate with his generals. This cipher machine was dubbed "TUNNY" by British codebreakers at Bletchly Park. In August 1941, Bill Tutte led them to intercept two in-depth messages and key stream. By January of 1942, they had figured out how TUNNY worked and built a replica.
Creator
An entity primarily responsible for making the resource
Lorenz
Source
A related resource from which the described resource is derived
https://www.cryptomuseum.com/crypto/lorenz/sz40/index.htm
Publisher
An entity responsible for making the resource available
Cryptomuseum
Date
A point or period of time associated with an event in the lifecycle of the resource
1941
Contributor
An entity responsible for making contributions to the resource
Cryptomuseum
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
English
Type
The nature or genre of the resource
Cipher machine
Lorenz
TUNNY
WWII
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/18578c50733bc51a69d7d6bdcd499a39.jpg?Expires=1712793600&Signature=GYKso9lkij19uJljziMj%7EXkx%7EsiSfLPuNDwr75zGj-61xeaUku9Yxv9RQ5kZF6NHydlGbzNCehhyDZldB5iDda514ccdacgq3emozpTWXEVVt11V%7EP8Xdnpa4kyUVD4lBNXeLN1ujX2njYGo9VuREVvfP16jW3w3gZg84WDm9-pvX1hQVfocFEf3FtoOdTK7sgqNVdPc8UaXK9OBALb0jzvT-w2hWhf2MzU29glA5jGEtX2Yaxls90SQnE6SFSZEg6Jag8ooqY2kwjrXGNLon-qPYY2FMjbQcDgMPqVq7wLI45GUYjBQCSf2Eh05xOqyXSJZhtA-a7CFzzGYaMrKWw__&Key-Pair-Id=K6UGZS9ZTDSZM
43c0a05a4b0edcc6c7ff1a2acc9dad9e
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Modern Encryption
Subject
The topic of the resource
The analysis of modern encryption techniques
Description
An account of the resource
Modern Encryption Analyses features the performance analyses of encryption techniques and methodologies. These encryption techniques are unique due to their platform application. Unlike preceding cryptographic efforts, these take place on the relatively recent technological advancement of computers. Therefore, the efforts are for the purpose of data encryption. Such analyses include the obsolete Data Encryption Standard (DES), its iteration Triple Data Encryption Standard(3DES), and its successor Advanced Encryption Standard (AES).
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Encryption
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
3DES
Subject
The topic of the resource
Triple Data Encryption Standard
Description
An account of the resource
The Triple Data Encryption Standard was derived (3DES) was derived from DES, when DES began to falter as a secure form of encryption and before AES was developed.
As suggested by the title, it works by running DES three times with three different 56-bit keys. Key 1 encrypts the plaintext, key 2 decrypts the ciphertext, and key 3 encrypts the decrypted cipher text. The reason this is stronger than DES alone is due to the use of three keys.
However, it's vulnerable to known plaintext attacks and meet-in-the-middle attacks for having the same algorithm repeated a few times.
Creator
An entity primarily responsible for making the resource
National Institute of Standards and Technology
Source
A related resource from which the described resource is derived
https://www.comparitech.com/blog/information-security/3des-encryption/
Publisher
An entity responsible for making the resource available
Comparitech
Date
A point or period of time associated with an event in the lifecycle of the resource
1999
Contributor
An entity responsible for making contributions to the resource
Josh Lake
Relation
A related resource
http://www.crypto-it.net/eng/attacks/meet-in-the-middle.html
Format
The file format, physical medium, or dimensions of the resource
Encryption
Language
A language of the resource
English
Type
The nature or genre of the resource
Encryption
3DES
Encryption
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/a920f58000826b7896a4400332c39011.jpg?Expires=1712793600&Signature=vgG6bKJwZgs-TuiAQ%7Ex2xhdARTDhuW7w1gC9lqKOjd8Q62hk8juA2xVtihc1lL2Y9GnGDxDl%7Ex1UhyyOldHIT7DASvSA4vo1mVlQ6Xf1cd%7EGLE9mQlTC4Fo3TKgOX7KO6koucbAPoO2keUKReIjS3yuSOMyLzB46%7ETco8r5jLU3UHYpNP8ueJCIOEdYcV0j48vUY9MoE1jW6UfPPDm14YvRY3K7tgBkacoZYarZ31mLFByZhQvzM2T5-v93Oko3kB4levFrVTpGQYF1b1dLD1lNWWMLtwEsFvFrWsfyYa5yOJXVSu72LfGTJcsvrVh-D4K99Rg1JX2hTCBpRM8rTLQ__&Key-Pair-Id=K6UGZS9ZTDSZM
db35a5c887bc790dc936aa64b065a0de
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Cipher Tools and Machines
Subject
The topic of the resource
Cipher tools and machines
Description
An account of the resource
Cipher Tools and Machines contains examples of cipher tools and machines seen through out history, particularly within the context of military history. From Ancient Greece to the Cold War, cryptology has played a significant part in the communication and intelligence efforts between opposing forces.
They, along with cryptanalysts, have even been credited with shortening the duration of wars. Without the British intelligence project ULTRA, WWII may have lasted for another two years. However, while many great cryptanalysts hail from Britain, the UK is not exclusive in their cryptographic abilities. The Enigma was invented in Germany, and its stronger rendition, Fialka- in Russia. In comparison to these cryptomachines, the US SIGABA remains unbroken. Those are only a few cipher machines flound in this collection.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Speech encryption device
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
NESTOR
Subject
The topic of the resource
NESTOR
Description
An account of the resource
NESTOR is the NSA-developed speech encryption used by American forces during the Vietnamese War. The encryption was compatible between several devices, including the KY-38 manpack unit, KY-8 vehicular unit, and KY-28 aircraft unit.
Creator
An entity primarily responsible for making the resource
NSA
Source
A related resource from which the described resource is derived
https://www.cryptomuseum.com/crypto/usa/ky38/index.htm
Publisher
An entity responsible for making the resource available
Cryptomuseum
Date
A point or period of time associated with an event in the lifecycle of the resource
1964
Contributor
An entity responsible for making contributions to the resource
Cryptomuseum
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
English
Type
The nature or genre of the resource
Speech encryption device
NESTOR
Vietnam War
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/1d9e470a2f1e55658ede30aec8b3af7e.jpg?Expires=1712793600&Signature=mEcO4Y4kN5D4nxOgDzpVlRMxXkjd0-XeEU39%7EM4McEjnVEQ46qxzyqud9aTk8JswXzWUltFUgk2Nj0sKVfd2sCxvv0p84CdXrTlW3YOTblDafdvuFSfV3HF%7E6iEUPmQfFyJZy4tLxtnTvgi39Mj81EHiqOm9p%7EMoqNTPifIZ0HLdng77msH95-P7HmrQUpN2L7H%7ECgDDwLc2lxjvvVpPYDkD7R9ypfanpnw5%7EGA0AH0k8d%7EzYwNdUmjCr2mXD3T0f8ZaV8MPAbm0zETZhcbWPw7p3ZE6b8m0fu0hIfIr8nrZGmKr2bIWcPx51NnaIo9WlX0IN4qyXMKEqIwzaGMjFg__&Key-Pair-Id=K6UGZS9ZTDSZM
9d3c7643cab9c24ad3c2afd81140292c
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Cipher Tools and Machines
Subject
The topic of the resource
Cipher tools and machines
Description
An account of the resource
Cipher Tools and Machines contains examples of cipher tools and machines seen through out history, particularly within the context of military history. From Ancient Greece to the Cold War, cryptology has played a significant part in the communication and intelligence efforts between opposing forces.
They, along with cryptanalysts, have even been credited with shortening the duration of wars. Without the British intelligence project ULTRA, WWII may have lasted for another two years. However, while many great cryptanalysts hail from Britain, the UK is not exclusive in their cryptographic abilities. The Enigma was invented in Germany, and its stronger rendition, Fialka- in Russia. In comparison to these cryptomachines, the US SIGABA remains unbroken. Those are only a few cipher machines flound in this collection.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher machine
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
TypeX
Subject
The topic of the resource
TypeX
Description
An account of the resource
The TypeX was an electromechanical cipher machine used by the British during WWII. It was devloped by Wing Commander O.G.W. Lywood, with the first production batch delivered to the RAF in 1937. As a British variant of the Enigma, versions of it came out to be more compatible for use in decrypting messages encrypted by the German's Enigma.
Creator
An entity primarily responsible for making the resource
O.G.W. Lywood
Source
A related resource from which the described resource is derived
https://cryptomuseum.com/crypto/uk/typex/index.htm
Publisher
An entity responsible for making the resource available
Cryptomuseum
Date
A point or period of time associated with an event in the lifecycle of the resource
1934
Contributor
An entity responsible for making contributions to the resource
Cryptomuseum
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
English
Type
The nature or genre of the resource
Cipher machine
TypeX
WWII
-
https://d1y502jg6fpugt.cloudfront.net/50341/archive/files/7c2a3a058f9cb4ac0c8efd953a81f2dc.jpg?Expires=1712793600&Signature=Ida4faugmusYJWEL5e-2dRlQAKIQ3VjYy-epX0PURlbwihN4GoZA34tgVIl2oP%7EIZZE6LO2M-GlMN8oZ95WCfTS%7EDpuTXyzb0gMb32aaKl0NjUTMEyUMgfBIgOQgN6zTfgsmkHqHYpEnO5bUedQf%7EggH7APswJPolRYvpPBK1nrQyGLd2QAJf7JGg5PVHZW7PtQCT7KF-EE9QctLg3GN2UrLwezMjcASgDAAxcrZHxNQX-6hJJJmtqdCKjfz1G9RSQ38Pn7%7EHNEpMU52DB8HQp1W2eLR9DyUeZoboymP-nxjkkWgraSU0lRtLcDY7U5rgxOZ2QTKSWMcbCLB22l3BQ__&Key-Pair-Id=K6UGZS9ZTDSZM
b5d11963fd57ced7f4e0d9cfa67cdfec
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Cipher Tools and Machines
Subject
The topic of the resource
Cipher tools and machines
Description
An account of the resource
Cipher Tools and Machines contains examples of cipher tools and machines seen through out history, particularly within the context of military history. From Ancient Greece to the Cold War, cryptology has played a significant part in the communication and intelligence efforts between opposing forces.
They, along with cryptanalysts, have even been credited with shortening the duration of wars. Without the British intelligence project ULTRA, WWII may have lasted for another two years. However, while many great cryptanalysts hail from Britain, the UK is not exclusive in their cryptographic abilities. The Enigma was invented in Germany, and its stronger rendition, Fialka- in Russia. In comparison to these cryptomachines, the US SIGABA remains unbroken. Those are only a few cipher machines flound in this collection.
Still Image
A static visual representation. Examples include paintings, drawings, graphic designs, plans and maps. Recommended best practice is to assign the type Text to images of textual materials.
Original Format
The type of object, such as painting, sculpture, paper, photo, and additional data
Cipher machine
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Fialka
Subject
The topic of the resource
Fialka
Description
An account of the resource
Fialka was known as a more complex version of the Enigma, created by Russian military for communicating within the Soviet Union and Warsaw pact in the 1960s- early 1970s. Compared to the Enigma's three rotors, Fialka had ten rotors- giving way to approximately 8.6e50 configurations. When a Fialka machine was captured in 1967, the NSA built a computer to decrypt messages.
Creator
An entity primarily responsible for making the resource
Russia
Source
A related resource from which the described resource is derived
https://derekbruff.org/blogs/fywscrypto/historical-crypto/fialka-the-bigger-better-russian-enigma/
Publisher
An entity responsible for making the resource available
Derekbruff
Date
A point or period of time associated with an event in the lifecycle of the resource
1960s-early 1970s
Contributor
An entity responsible for making contributions to the resource
Matthew Gu
Relation
A related resource
https://crypto.omeka.net/items/show/5
Format
The file format, physical medium, or dimensions of the resource
.JPEG
Language
A language of the resource
Russian
Type
The nature or genre of the resource
Cipher machine
Cold War
Fialka
Russia