Knowledge (XXG)

C-52 (cipher machine)

Source 📝

186:
the mutually prime factors in the pin counts. The CX-52 version has 6 pinwheels with 47 pins each and a flexible wheel movement system. The lug cage of both models contains 32 movable bars: 27 of the bars are used for encryption and the remaining 5 bars control the stepping of the pinwheels. The early CX models used the control bars also for encryption but due to complications in creating acceptable lug settings later CX models used these bars only for controlling of the wheel stepping. The stepping of the CX wheels was controlled by adjustable lugs on the control bars.
20: 1277: 44: 36: 28: 189:
The C-52 and CX-52 were very flexible machines that could be produced in various ways, creating a unique machine with unique cryptographic characteristics for each customer. There were special detachable wheel movement bars and their position on the drum could change, interchangeable print wheels,
185:
Both C and CX models are equipped with six pinwheels. In the C-52 version, these six wheels are chosen from a possible set of 12, with the number of pins on each wheel being 25, 26, 29, 31, 34, 37, 38, 41, 42, 43, 46, and 47. The C model had a fixed stepping system with a large wheel cycle due to
1257: 1087: 190:
custom pinwheel labels, versions with One-time Tape reader instead of wheels, versions that only enciphered numbers, and many other details that influenced the enciphering process.
782: 499: 940: 435: 218: 120:
inches (22 cm × 14 cm × 11 cm). The device is mechanical, but when combined with an electric keyboard attachment, the
213:
Many of the C-52 and CX-52 machines sold by Crypto AG were compromised to benefit the US and British national signals intelligence agencies,
444: 492: 441: 933: 1136: 485: 459: 234: 432: 429: 926: 1305: 1252: 1207: 1020: 207: 31:
A combination of a C-52 cipher machine with a B-52 keyboard attachment, such as pictured here, was denoted the BC-52.
412: 1131: 198:
There is some speculation that the CX-52 might have been broken by the signals intelligence services of Communist
1247: 878: 797: 1237: 1227: 1082: 562: 214: 787: 1232: 1222: 1025: 985: 978: 968: 963: 863: 587: 582: 522: 973: 724: 1280: 1126: 1072: 858: 853: 828: 628: 244: 1242: 1166: 891: 577: 537: 365:
H. Paul Greenough, Cryptanalysis of the Hagelin C-52 and similar machines a known plaintext attack,
1005: 886: 772: 391: 1111: 1095: 1042: 315: 438: 74:
starting 1951/1952. These pin-and-lug type cipher machines were advanced successors of the C-38/
380: 19: 1171: 1161: 1032: 307: 401: 1106: 299: 407: 572: 454: 1181: 1101: 1062: 1010: 995: 673: 658: 623: 567: 527: 203: 1299: 1262: 1217: 1176: 1156: 1052: 1015: 990: 719: 514: 61: 319: 1212: 1057: 1047: 1037: 1000: 949: 739: 199: 1191: 777: 643: 290:
Bury, Jan (2009-09-18). "From the Archives: CX–52 Messages Read by Red Poles?".
1151: 1121: 1116: 1077: 752: 303: 52: 311: 1141: 222: 71: 47:
Hagelin CX-52 from the Argentine Computer Museum, exhibited at Ekoparty 2023
464: 43: 1186: 1146: 901: 896: 448: 807: 792: 747: 699: 678: 422: 334: 270: 1067: 868: 848: 812: 802: 729: 602: 597: 592: 552: 532: 416: 392:
Polish Cold War Codebreaking of 1959–1989: A Preliminary Assessment
35: 843: 838: 833: 767: 762: 714: 709: 704: 694: 668: 653: 638: 607: 557: 542: 249: 239: 75: 42: 34: 26: 18: 757: 663: 648: 547: 27: 922: 481: 404:
Encryption principle and machine variations, by Dirk Rijmenants
342: 51:"BC-52" redirects here. For the music band, the BC-52's, see 415:
by Torbjorn Andersson — a write-up, photograph and a
170:
inches (32 cm × 22 cm × 16 cm).
177:
was a licensed copy of the C-52 by German company Hell.
1088:
Cryptographically secure pseudorandom number generator
460:
CX-52 Cryptographic Machine & B-52 Motorized Base
469: 381:
From the Archives: CX-52 Messages Read by Red Poles?
1200: 956: 877: 821: 738: 687: 616: 513: 455:
Descriptions from sales of C-52 and CX-52 equipment
372:Louis Kruh, The Hagelin Cryptographer, Type C-52, 335:"How NSA and GCHQ spied on the Cold War world" 934: 493: 39:A Hell 54, a licensed German copy of the C-52 8: 451:— a licensed copy of the C-52 by Hell 425:— also covers the B-52 keyboard unit. 941: 927: 919: 500: 486: 478: 474: 470: 408:Dirk Rijmenants' Hagelin BC-52 Simulator 402:Technical details of the C-52 and CX-52 261: 221:(GCHQ), respectively. For details, see 219:Government Communications Headquarters 398:36(4), October 2012, pp341–379. 387:33(4), October 2009, pp347–352. 124:, the resultant system is termed the 70:were cipher machines manufactured by 7: 369:, 23(2), July 1999, pp139–156. 16:1950s cipher machines by Crypto AG 14: 1276: 1275: 449:Jerry Proc's page on the Hell 54 376:3(2), April 1979, pp78–82. 223:Crypto AG § Compromised machines 128:. The B-52 is larger, measuring 413:The HAGELIN cryptographer CX-52 1137:Information-theoretic security 423:Jerry Proc's page on the CX-52 1: 333:Corera, Gordon (2015-07-28). 235:Operation Rubicon (Crypto AG) 1253:Message authentication code 1208:Cryptographic hash function 1021:Cryptographic hash function 1322: 1132:Harvest now, decrypt later 50: 1271: 1248:Post-quantum cryptography 918: 477: 473: 465:CX-52-related Stasi files 304:10.1080/01611190902742467 271:"CX-52/C-52 by Crypto AG" 194:Breaking and compromising 1238:Quantum key distribution 1228:Authenticated encryption 1083:Random number generation 215:National Security Agency 1233:Public-key cryptography 1223:Symmetric-key algorithm 1026:Key derivation function 986:Cryptographic primitive 979:Authentication protocol 969:Outline of cryptography 964:History of cryptography 181:Structure and operation 78:. The machine measures 974:Cryptographic protocol 725:Siemens and Halske T52 48: 40: 32: 24: 1127:End-to-end encryption 1073:Cryptojacking malware 788:Sectéra Secure Module 245:C-36 (cipher machine) 46: 38: 30: 22: 1243:Quantum cryptography 1167:Trusted timestamping 892:Intel SHA extensions 256:Notes and references 1006:Cryptographic nonce 887:AES instruction set 1306:Encryption devices 1112:Subliminal channel 1096:Pseudorandom noise 1043:Key (cryptography) 49: 41: 33: 25: 1293: 1292: 1289: 1288: 1172:Key-based routing 1162:Trapdoor function 1033:Digital signature 914: 913: 910: 909: 879:Computer hardware 624:Bazeries cylinder 1313: 1279: 1278: 1107:Insecure channel 943: 936: 929: 920: 502: 495: 488: 479: 475: 471: 353: 352: 350: 349: 330: 324: 323: 287: 281: 280: 278: 277: 266: 169: 168: 164: 161: 155: 154: 150: 147: 141: 140: 136: 133: 119: 118: 114: 111: 105: 104: 100: 97: 91: 90: 86: 83: 1321: 1320: 1316: 1315: 1314: 1312: 1311: 1310: 1296: 1295: 1294: 1285: 1267: 1196: 952: 947: 906: 873: 817: 734: 720:Lorenz SZ 40/42 683: 612: 509: 508:Cipher machines 506: 362: 357: 356: 347: 345: 332: 331: 327: 289: 288: 284: 275: 273: 268: 267: 263: 258: 231: 196: 183: 166: 162: 159: 157: 152: 148: 145: 143: 138: 134: 131: 129: 116: 112: 109: 107: 102: 98: 95: 93: 88: 84: 81: 79: 56: 17: 12: 11: 5: 1319: 1317: 1309: 1308: 1298: 1297: 1291: 1290: 1287: 1286: 1284: 1283: 1272: 1269: 1268: 1266: 1265: 1260: 1258:Random numbers 1255: 1250: 1245: 1240: 1235: 1230: 1225: 1220: 1215: 1210: 1204: 1202: 1198: 1197: 1195: 1194: 1189: 1184: 1182:Garlic routing 1179: 1174: 1169: 1164: 1159: 1154: 1149: 1144: 1139: 1134: 1129: 1124: 1119: 1114: 1109: 1104: 1102:Secure channel 1099: 1093: 1092: 1091: 1080: 1075: 1070: 1065: 1063:Key stretching 1060: 1055: 1050: 1045: 1040: 1035: 1030: 1029: 1028: 1023: 1013: 1011:Cryptovirology 1008: 1003: 998: 996:Cryptocurrency 993: 988: 983: 982: 981: 971: 966: 960: 958: 954: 953: 948: 946: 945: 938: 931: 923: 916: 915: 912: 911: 908: 907: 905: 904: 899: 894: 889: 883: 881: 875: 874: 872: 871: 866: 861: 856: 851: 846: 841: 836: 831: 825: 823: 819: 818: 816: 815: 810: 805: 800: 795: 790: 785: 780: 775: 770: 765: 760: 755: 750: 744: 742: 736: 735: 733: 732: 727: 722: 717: 712: 707: 702: 697: 691: 689: 685: 684: 682: 681: 676: 674:Reihenschieber 671: 666: 661: 659:Jefferson disk 656: 651: 646: 641: 636: 631: 626: 620: 618: 614: 613: 611: 610: 605: 600: 595: 590: 585: 580: 575: 570: 565: 560: 555: 550: 545: 540: 535: 530: 525: 519: 517: 515:Rotor machines 511: 510: 507: 505: 504: 497: 490: 482: 468: 467: 462: 457: 452: 446: 426: 420: 410: 405: 399: 388: 377: 370: 361: 360:External links 358: 355: 354: 325: 298:(4): 347–352. 282: 260: 259: 257: 254: 253: 252: 247: 242: 237: 230: 227: 204:Czechoslovakia 195: 192: 182: 179: 15: 13: 10: 9: 6: 4: 3: 2: 1318: 1307: 1304: 1303: 1301: 1282: 1274: 1273: 1270: 1264: 1263:Steganography 1261: 1259: 1256: 1254: 1251: 1249: 1246: 1244: 1241: 1239: 1236: 1234: 1231: 1229: 1226: 1224: 1221: 1219: 1218:Stream cipher 1216: 1214: 1211: 1209: 1206: 1205: 1203: 1199: 1193: 1190: 1188: 1185: 1183: 1180: 1178: 1177:Onion routing 1175: 1173: 1170: 1168: 1165: 1163: 1160: 1158: 1157:Shared secret 1155: 1153: 1150: 1148: 1145: 1143: 1140: 1138: 1135: 1133: 1130: 1128: 1125: 1123: 1120: 1118: 1115: 1113: 1110: 1108: 1105: 1103: 1100: 1097: 1094: 1089: 1086: 1085: 1084: 1081: 1079: 1076: 1074: 1071: 1069: 1066: 1064: 1061: 1059: 1056: 1054: 1053:Key generator 1051: 1049: 1046: 1044: 1041: 1039: 1036: 1034: 1031: 1027: 1024: 1022: 1019: 1018: 1017: 1016:Hash function 1014: 1012: 1009: 1007: 1004: 1002: 999: 997: 994: 992: 991:Cryptanalysis 989: 987: 984: 980: 977: 976: 975: 972: 970: 967: 965: 962: 961: 959: 955: 951: 944: 939: 937: 932: 930: 925: 924: 921: 917: 903: 900: 898: 895: 893: 890: 888: 885: 884: 882: 880: 876: 870: 867: 865: 862: 860: 857: 855: 852: 850: 847: 845: 842: 840: 837: 835: 832: 830: 827: 826: 824: 820: 814: 811: 809: 806: 804: 801: 799: 796: 794: 791: 789: 786: 784: 781: 779: 776: 774: 771: 769: 766: 764: 761: 759: 756: 754: 751: 749: 746: 745: 743: 741: 737: 731: 728: 726: 723: 721: 718: 716: 713: 711: 708: 706: 703: 701: 698: 696: 693: 692: 690: 686: 680: 677: 675: 672: 670: 667: 665: 662: 660: 657: 655: 652: 650: 647: 645: 642: 640: 637: 635: 632: 630: 627: 625: 622: 621: 619: 615: 609: 606: 604: 601: 599: 596: 594: 591: 589: 586: 584: 581: 579: 576: 574: 571: 569: 566: 564: 561: 559: 556: 554: 551: 549: 546: 544: 541: 539: 536: 534: 531: 529: 526: 524: 521: 520: 518: 516: 512: 503: 498: 496: 491: 489: 484: 483: 480: 476: 472: 466: 463: 461: 458: 456: 453: 450: 447: 445: 442: 439: 436: 433: 430: 428:Photographs: 427: 424: 421: 418: 414: 411: 409: 406: 403: 400: 397: 393: 389: 386: 382: 378: 375: 371: 368: 364: 363: 359: 344: 340: 336: 329: 326: 321: 317: 313: 309: 305: 301: 297: 293: 286: 283: 272: 265: 262: 255: 251: 248: 246: 243: 241: 238: 236: 233: 232: 228: 226: 224: 220: 216: 211: 209: 205: 201: 193: 191: 187: 180: 178: 176: 171: 127: 123: 77: 73: 69: 65: 63: 54: 45: 37: 29: 21: 1213:Block cipher 1058:Key schedule 1048:Key exchange 1038:Kleptography 1001:Cryptosystem 950:Cryptography 740:Secure voice 633: 533:M-125 Fialka 395: 384: 373: 366: 346:. Retrieved 338: 328: 295: 291: 285: 274:. Retrieved 269:Sims, Mark. 264: 212: 200:East Germany 197: 188: 184: 174: 172: 125: 121: 67: 59: 57: 1201:Mathematics 1192:Mix network 688:Teleprinter 644:Cipher disk 396:Cryptologia 385:Cryptologia 374:Cryptologia 367:Cryptologia 292:Cryptologia 1152:Ciphertext 1122:Decryption 1117:Encryption 1078:Ransomware 753:FASCINATOR 617:Mechanical 419:simulator. 390:Jan Bury, 379:Jan Bury, 348:2015-10-09 276:2015-10-09 217:(NSA) and 1142:Plaintext 312:0161-1194 72:Crypto AG 23:The CX-52 1300:Category 1281:Category 1187:Kademlia 1147:Codetext 1090:(CSPRNG) 902:IBM 4764 897:IBM 4758 864:Pinwheel 339:BBC News 320:42774841 229:See also 957:General 808:STU-III 793:SIGSALY 748:BID 150 700:BID 770 679:Scytale 603:Singlet 563:Mercury 175:Hell 54 165:⁄ 151:⁄ 137:⁄ 115:⁄ 101:⁄ 87:⁄ 62:Hagelin 53:BC-52's 1068:Keygen 869:Rockex 859:Purple 849:Noreen 813:VINSON 803:STU-II 773:NESTOR 730:SIGTOT 598:SIGCUM 593:SIGABA 553:Lacida 538:Hebern 528:Enigma 417:QBASIC 318:  310:  208:Poland 206:, and 64:) C-52 1098:(PRN) 844:KL-51 839:KL-43 834:KG-84 822:Other 768:KY-68 763:KY-58 715:KW-37 710:KW-26 705:DUDEK 695:5-UCO 669:M-209 654:Kryha 639:CD-57 608:Typex 588:SG-41 583:SG-39 558:M-325 543:HX-63 316:S2CID 250:CD-57 240:M-209 126:BC-52 76:M-209 68:CX-52 829:JADE 783:SCIP 778:OMNI 758:KY-3 664:M-94 649:HC-9 634:C-52 629:C-36 568:NEMA 548:KL-7 308:ISSN 173:The 122:B-52 66:and 58:The 854:Red 798:STE 578:RED 573:OMI 523:CCM 343:BBC 300:doi 156:by 142:by 106:by 92:by 1302:: 443:, 440:, 437:, 434:, 431:, 394:, 383:, 341:. 337:. 314:. 306:. 296:33 294:. 225:. 210:. 202:, 130:12 942:e 935:t 928:v 501:e 494:t 487:v 351:. 322:. 302:: 279:. 167:8 163:3 160:+ 158:6 153:2 149:1 146:+ 144:8 139:2 135:1 132:+ 117:8 113:3 110:+ 108:4 103:8 99:3 96:+ 94:5 89:2 85:1 82:+ 80:8 60:( 55:.

Index





BC-52's
Hagelin
Crypto AG
M-209
East Germany
Czechoslovakia
Poland
National Security Agency
Government Communications Headquarters
Crypto AG § Compromised machines
Operation Rubicon (Crypto AG)
M-209
C-36 (cipher machine)
CD-57
"CX-52/C-52 by Crypto AG"
doi
10.1080/01611190902742467
ISSN
0161-1194
S2CID
42774841
"How NSA and GCHQ spied on the Cold War world"
BBC
From the Archives: CX-52 Messages Read by Red Poles?
Polish Cold War Codebreaking of 1959–1989: A Preliminary Assessment
Technical details of the C-52 and CX-52

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.