Lorenz "TUNNY"
Lorenz SZ-40/42 "TUNNY"
The Lorenz cipher machine was developed by Lorenz and used in WWII by the German Army High Command. Hilter used it to communicate with his generals. This cipher machine was dubbed "TUNNY" by British codebreakers at Bletchly Park. In August 1941, Bill Tutte led them to intercept two in-depth messages and key stream. By January of 1942, they had figured out how TUNNY worked and built a replica.
Lorenz
https://www.cryptomuseum.com/crypto/lorenz/sz40/index.htm
Cryptomuseum
1941
Cryptomuseum
.JPEG
English
Cipher machine
AES
Advanced Encryption Standard
The Advanced Encryption Standard (AES) is a symmetric block cipher that was began development in 1997 to replace the Data Encryption Standard. It chosen as the U.S. federal government standard encryption algorithm in 2002. In 2003, it became the standard for classified information.
AES includes three block ciphers that identify the secret key lengths involved. In addition to the key lengths, these block ciphers differ with the number of rounds that plaintext is processed and transformed.
AES-128 | 128-bit key length | 10 rounds
AES-192 | 192-bit key length | 12 rounds
AES-256 | 256-bit key length | 14 rounds
The National Institute of Standards and Technology
https://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard
Searchsecurity.techtarget
2002
Corinne Bernstein, Michael Cobb, GEM100, Borys Pawliw
.JPEG
English
Encryption
DES
Data Encryption Standard
The Data Encryption Standard (DES) is an outdated form of encryption that became vulnerable to brute-force attacks, and was replaced by AES. Developed by IBM in the 1970s, it was used by the U.S. government as their official Federal Information Processing Standard and officially cycled out by 2005.
The reason DES was vulnerable to brute-force attacks is because decryption was simply the inverse of encryption and used a 64-bit key- reduced to a 54-bit key due to parity checks. Therefore, it only took 2^56 ( or 72,057,594,037,927,936) attempts to find the correct key used to encrypt a plaintext message.
IBM
https://searchsecurity.techtarget.com/definition/Data-Encryption-Standard
Searchsecurity.techtarget
1970s
Michael Cobb, Laura Biasci, Lyne Granum, and Frank Rundatz
https://crypto.omeka.net/admin/items/show/id/13
.JPEG
English
Encryption
3DES
Triple Data Encryption Standard
The Triple Data Encryption Standard was derived (3DES) was derived from DES, when DES began to falter as a secure form of encryption and before AES was developed.
As suggested by the title, it works by running DES three times with three different 56-bit keys. Key 1 encrypts the plaintext, key 2 decrypts the ciphertext, and key 3 encrypts the decrypted cipher text. The reason this is stronger than DES alone is due to the use of three keys.
However, it's vulnerable to known plaintext attacks and meet-in-the-middle attacks for having the same algorithm repeated a few times.
National Institute of Standards and Technology
https://www.comparitech.com/blog/information-security/3des-encryption/
Comparitech
1999
Josh Lake
http://www.crypto-it.net/eng/attacks/meet-in-the-middle.html
Encryption
English
Encryption
Scytale
Scytale
The scytale is known as the first cryptographic device, used in 400 B.C. by the Spartans. It consisted of a baton and a papyrus strips with letters. These papyrus strips would only reveal the message sent between Spartan generals if the baton they were wrapped around had the same dimensions as the one that the message was written on.
Sparta
https://en.wikipedia.org/wiki/Scytale
Wikipedia
400 B.C.
.JPEG
Greek
Cipher tool
TypeX
TypeX
The TypeX was an electromechanical cipher machine used by the British during WWII. It was devloped by Wing Commander O.G.W. Lywood, with the first production batch delivered to the RAF in 1937. As a British variant of the Enigma, versions of it came out to be more compatible for use in decrypting messages encrypted by the German's Enigma.
O.G.W. Lywood
https://cryptomuseum.com/crypto/uk/typex/index.htm
Cryptomuseum
1934
Cryptomuseum
.JPEG
English
Cipher machine
G-Schreiber "STURGEON"
T-52 Geheimschreiber
The T-52 G-Schreiber was developed around 1930 by Siemens & Halske. It was used by the Germans in WWII in conjunction with the Enigma and Lorenz. Intercepting messages that were in-depth enough to decipher was difficult for Allied codebreakers because it was used via land lines and only occasionally over radio. However, it was possible and Swedish and British codebreakers were able to decipher pieces of traffic ciphered by the machine Bletchly Park(UK) dubbed "STURGEON".
Siemens & Halske
https://cryptomuseum.com/crypto/siemens/t52/index.htm
Cryptomuseum
1930
Cryptomuseum
.JPEG
English
Cipher machine
NESTOR
NESTOR
NESTOR is the NSA-developed speech encryption used by American forces during the Vietnamese War. The encryption was compatible between several devices, including the KY-38 manpack unit, KY-8 vehicular unit, and KY-28 aircraft unit.
NSA
https://www.cryptomuseum.com/crypto/usa/ky38/index.htm
Cryptomuseum
1964
Cryptomuseum
.JPEG
English
Speech encryption device
ADFGVX Cipher
ADFGVX Cipher
The ADFGVX cipher was developed by Colonel Fritz Nebel and introduced in March 1918. Germany used it as a field cipher during WWI. It was named the ADFGVX cipher for the letters used to create ciphertext, chosen for their distinctiveness in morse code. Its cryptanalysis requires two keys- a key matrix and a keyword. The key matrix is a 6x6 square with the letters A, D, F, G, V, and X above and to the side- populated with letters from the plaintext message and numbers 0-9. The first step of encoding is done through substitution- each letter of the plaintext is replaced by its two intersecting ADFGVX letters. The next step includes writing the enciphered text under the keyword in horizontal rows. A columnar transposition is then performed- the keyword is rearranged into alphabetical order and the vertical columns with each letter of the key word. The final ciphertext is formed by reading off the columns in vertical fashion. To decipher the ciphertext, you reverse the steps- using the same keyword and key matrix. <iframe width="560" height="315" src="https://www.youtube.com/embed/Y5-ory-Z25g" frameborder="0"></iframe>
Fritz Nebel
http://practicalcryptography.com/ciphers/classical-era/adfgvx/
Practical Cryptography
1918
Practical Cryptography
.JPEG
English
Cipher
WWII Pigeon Cipher
WWII Pigeon Cipher
The WWII Pigeon Cipher describes a coded message found on the remains of a carrier pigeon discovered in 1982. This message was sent to the curator of the Pigeons at War exhibit at Bletchly Park, however he found it impossible to crack.
In 2012, Canadian researchers at Lakefield Heritage Research believe they have cracked most of the code using a WWI artillery code book. They believe it was from a British paratrooper, Sergeant William Stott, who parachuted into Normandy on a reconnaissance mission and reads:
"Artillery observer at 'K' Sector, Normandy. Requested headquarters supplement report. Panzer attack - blitz. West Artillery Observer Tracking Attack.
"Lt Knows extra guns are here. Know where local dispatch station is. Determined where Jerry's headquarters front posts. Right battery headquarters right here.
Found headquarters infantry right here. Final note, confirming, found Jerry's whereabouts. Go over field notes. Counter measures against Panzers not working.
Jerry's right battery central headquarters here. Artillery observer at 'K' sector Normandy. Mortar, infantry attack panzers.
Hit Jerry's Right or Reserve Battery Here. Already know electrical engineers headquarters. Troops, panzers, batteries, engineers, here. Final note known to headquarters."
William Stott
http://www.thehistoryblog.com/archives/22223
Business Insider
WWI
Lakefield Heritage Research
.JPEG
English
Paper note