186:
the mutually prime factors in the pin counts. The CX-52 version has 6 pinwheels with 47 pins each and a flexible wheel movement system. The lug cage of both models contains 32 movable bars: 27 of the bars are used for encryption and the remaining 5 bars control the stepping of the pinwheels. The early CX models used the control bars also for encryption but due to complications in creating acceptable lug settings later CX models used these bars only for controlling of the wheel stepping. The stepping of the CX wheels was controlled by adjustable lugs on the control bars.
20:
1277:
44:
36:
28:
189:
The C-52 and CX-52 were very flexible machines that could be produced in various ways, creating a unique machine with unique cryptographic characteristics for each customer. There were special detachable wheel movement bars and their position on the drum could change, interchangeable print wheels,
185:
Both C and CX models are equipped with six pinwheels. In the C-52 version, these six wheels are chosen from a possible set of 12, with the number of pins on each wheel being 25, 26, 29, 31, 34, 37, 38, 41, 42, 43, 46, and 47. The C model had a fixed stepping system with a large wheel cycle due to
1257:
1087:
190:
custom pinwheel labels, versions with One-time Tape reader instead of wheels, versions that only enciphered numbers, and many other details that influenced the enciphering process.
782:
499:
940:
435:
218:
120:
inches (22 cm × 14 cm × 11 cm). The device is mechanical, but when combined with an electric keyboard attachment, the
213:
Many of the C-52 and CX-52 machines sold by Crypto AG were compromised to benefit the US and
British national signals intelligence agencies,
444:
492:
441:
933:
1136:
485:
459:
234:
432:
429:
926:
1305:
1252:
1207:
1020:
207:
31:
A combination of a C-52 cipher machine with a B-52 keyboard attachment, such as pictured here, was denoted the BC-52.
412:
1131:
198:
There is some speculation that the CX-52 might have been broken by the signals intelligence services of
Communist
1247:
878:
797:
1237:
1227:
1082:
562:
214:
787:
1232:
1222:
1025:
985:
978:
968:
963:
863:
587:
582:
522:
973:
724:
1280:
1126:
1072:
858:
853:
828:
628:
244:
1242:
1166:
891:
577:
537:
365:
H. Paul
Greenough, Cryptanalysis of the Hagelin C-52 and similar machines a known plaintext attack,
1005:
886:
772:
391:
1111:
1095:
1042:
315:
438:
74:
starting 1951/1952. These pin-and-lug type cipher machines were advanced successors of the C-38/
380:
19:
1171:
1161:
1032:
307:
401:
1106:
299:
407:
572:
454:
1181:
1101:
1062:
1010:
995:
673:
658:
623:
567:
527:
203:
1299:
1262:
1217:
1176:
1156:
1052:
1015:
990:
719:
514:
61:
319:
1212:
1057:
1047:
1037:
1000:
949:
739:
199:
1191:
777:
643:
290:
Bury, Jan (2009-09-18). "From the
Archives: CX–52 Messages Read by Red Poles?".
1151:
1121:
1116:
1077:
752:
303:
52:
311:
1141:
222:
71:
47:
Hagelin CX-52 from the
Argentine Computer Museum, exhibited at Ekoparty 2023
464:
43:
1186:
1146:
901:
896:
448:
807:
792:
747:
699:
678:
422:
334:
270:
1067:
868:
848:
812:
802:
729:
602:
597:
592:
552:
532:
416:
392:
Polish Cold War
Codebreaking of 1959–1989: A Preliminary Assessment
35:
843:
838:
833:
767:
762:
714:
709:
704:
694:
668:
653:
638:
607:
557:
542:
249:
239:
75:
42:
34:
26:
18:
757:
663:
648:
547:
27:
922:
481:
404:
Encryption principle and machine variations, by Dirk
Rijmenants
342:
51:"BC-52" redirects here. For the music band, the BC-52's, see
415:
by
Torbjorn Andersson — a write-up, photograph and a
170:
inches (32 cm × 22 cm × 16 cm).
177:
was a licensed copy of the C-52 by German company Hell.
1088:
Cryptographically secure pseudorandom number generator
460:
CX-52 Cryptographic
Machine & B-52 Motorized Base
469:
381:
From the
Archives: CX-52 Messages Read by Red Poles?
1200:
956:
877:
821:
738:
687:
616:
513:
455:
Descriptions from sales of C-52 and CX-52 equipment
372:Louis Kruh, The Hagelin Cryptographer, Type C-52,
335:"How NSA and GCHQ spied on the Cold War world"
934:
493:
39:A Hell 54, a licensed German copy of the C-52
8:
451:— a licensed copy of the C-52 by Hell
425:— also covers the B-52 keyboard unit.
941:
927:
919:
500:
486:
478:
474:
470:
408:Dirk Rijmenants' Hagelin BC-52 Simulator
402:Technical details of the C-52 and CX-52
261:
221:(GCHQ), respectively. For details, see
219:Government Communications Headquarters
398:36(4), October 2012, pp341–379.
387:33(4), October 2009, pp347–352.
124:, the resultant system is termed the
70:were cipher machines manufactured by
7:
369:, 23(2), July 1999, pp139–156.
16:1950s cipher machines by Crypto AG
14:
1276:
1275:
449:Jerry Proc's page on the Hell 54
376:3(2), April 1979, pp78–82.
223:Crypto AG § Compromised machines
128:. The B-52 is larger, measuring
413:The HAGELIN cryptographer CX-52
1137:Information-theoretic security
423:Jerry Proc's page on the CX-52
1:
333:Corera, Gordon (2015-07-28).
235:Operation Rubicon (Crypto AG)
1253:Message authentication code
1208:Cryptographic hash function
1021:Cryptographic hash function
1322:
1132:Harvest now, decrypt later
50:
1271:
1248:Post-quantum cryptography
918:
477:
473:
465:CX-52-related Stasi files
304:10.1080/01611190902742467
271:"CX-52/C-52 by Crypto AG"
194:Breaking and compromising
1238:Quantum key distribution
1228:Authenticated encryption
1083:Random number generation
215:National Security Agency
1233:Public-key cryptography
1223:Symmetric-key algorithm
1026:Key derivation function
986:Cryptographic primitive
979:Authentication protocol
969:Outline of cryptography
964:History of cryptography
181:Structure and operation
78:. The machine measures
974:Cryptographic protocol
725:Siemens and Halske T52
48:
40:
32:
24:
1127:End-to-end encryption
1073:Cryptojacking malware
788:Sectéra Secure Module
245:C-36 (cipher machine)
46:
38:
30:
22:
1243:Quantum cryptography
1167:Trusted timestamping
892:Intel SHA extensions
256:Notes and references
1006:Cryptographic nonce
887:AES instruction set
1306:Encryption devices
1112:Subliminal channel
1096:Pseudorandom noise
1043:Key (cryptography)
49:
41:
33:
25:
1293:
1292:
1289:
1288:
1172:Key-based routing
1162:Trapdoor function
1033:Digital signature
914:
913:
910:
909:
879:Computer hardware
624:Bazeries cylinder
1313:
1279:
1278:
1107:Insecure channel
943:
936:
929:
920:
502:
495:
488:
479:
475:
471:
353:
352:
350:
349:
330:
324:
323:
287:
281:
280:
278:
277:
266:
169:
168:
164:
161:
155:
154:
150:
147:
141:
140:
136:
133:
119:
118:
114:
111:
105:
104:
100:
97:
91:
90:
86:
83:
1321:
1320:
1316:
1315:
1314:
1312:
1311:
1310:
1296:
1295:
1294:
1285:
1267:
1196:
952:
947:
906:
873:
817:
734:
720:Lorenz SZ 40/42
683:
612:
509:
508:Cipher machines
506:
362:
357:
356:
347:
345:
332:
331:
327:
289:
288:
284:
275:
273:
268:
267:
263:
258:
231:
196:
183:
166:
162:
159:
157:
152:
148:
145:
143:
138:
134:
131:
129:
116:
112:
109:
107:
102:
98:
95:
93:
88:
84:
81:
79:
56:
17:
12:
11:
5:
1319:
1317:
1309:
1308:
1298:
1297:
1291:
1290:
1287:
1286:
1284:
1283:
1272:
1269:
1268:
1266:
1265:
1260:
1258:Random numbers
1255:
1250:
1245:
1240:
1235:
1230:
1225:
1220:
1215:
1210:
1204:
1202:
1198:
1197:
1195:
1194:
1189:
1184:
1182:Garlic routing
1179:
1174:
1169:
1164:
1159:
1154:
1149:
1144:
1139:
1134:
1129:
1124:
1119:
1114:
1109:
1104:
1102:Secure channel
1099:
1093:
1092:
1091:
1080:
1075:
1070:
1065:
1063:Key stretching
1060:
1055:
1050:
1045:
1040:
1035:
1030:
1029:
1028:
1023:
1013:
1011:Cryptovirology
1008:
1003:
998:
996:Cryptocurrency
993:
988:
983:
982:
981:
971:
966:
960:
958:
954:
953:
948:
946:
945:
938:
931:
923:
916:
915:
912:
911:
908:
907:
905:
904:
899:
894:
889:
883:
881:
875:
874:
872:
871:
866:
861:
856:
851:
846:
841:
836:
831:
825:
823:
819:
818:
816:
815:
810:
805:
800:
795:
790:
785:
780:
775:
770:
765:
760:
755:
750:
744:
742:
736:
735:
733:
732:
727:
722:
717:
712:
707:
702:
697:
691:
689:
685:
684:
682:
681:
676:
674:Reihenschieber
671:
666:
661:
659:Jefferson disk
656:
651:
646:
641:
636:
631:
626:
620:
618:
614:
613:
611:
610:
605:
600:
595:
590:
585:
580:
575:
570:
565:
560:
555:
550:
545:
540:
535:
530:
525:
519:
517:
515:Rotor machines
511:
510:
507:
505:
504:
497:
490:
482:
468:
467:
462:
457:
452:
446:
426:
420:
410:
405:
399:
388:
377:
370:
361:
360:External links
358:
355:
354:
325:
298:(4): 347–352.
282:
260:
259:
257:
254:
253:
252:
247:
242:
237:
230:
227:
204:Czechoslovakia
195:
192:
182:
179:
15:
13:
10:
9:
6:
4:
3:
2:
1318:
1307:
1304:
1303:
1301:
1282:
1274:
1273:
1270:
1264:
1263:Steganography
1261:
1259:
1256:
1254:
1251:
1249:
1246:
1244:
1241:
1239:
1236:
1234:
1231:
1229:
1226:
1224:
1221:
1219:
1218:Stream cipher
1216:
1214:
1211:
1209:
1206:
1205:
1203:
1199:
1193:
1190:
1188:
1185:
1183:
1180:
1178:
1177:Onion routing
1175:
1173:
1170:
1168:
1165:
1163:
1160:
1158:
1157:Shared secret
1155:
1153:
1150:
1148:
1145:
1143:
1140:
1138:
1135:
1133:
1130:
1128:
1125:
1123:
1120:
1118:
1115:
1113:
1110:
1108:
1105:
1103:
1100:
1097:
1094:
1089:
1086:
1085:
1084:
1081:
1079:
1076:
1074:
1071:
1069:
1066:
1064:
1061:
1059:
1056:
1054:
1053:Key generator
1051:
1049:
1046:
1044:
1041:
1039:
1036:
1034:
1031:
1027:
1024:
1022:
1019:
1018:
1017:
1016:Hash function
1014:
1012:
1009:
1007:
1004:
1002:
999:
997:
994:
992:
991:Cryptanalysis
989:
987:
984:
980:
977:
976:
975:
972:
970:
967:
965:
962:
961:
959:
955:
951:
944:
939:
937:
932:
930:
925:
924:
921:
917:
903:
900:
898:
895:
893:
890:
888:
885:
884:
882:
880:
876:
870:
867:
865:
862:
860:
857:
855:
852:
850:
847:
845:
842:
840:
837:
835:
832:
830:
827:
826:
824:
820:
814:
811:
809:
806:
804:
801:
799:
796:
794:
791:
789:
786:
784:
781:
779:
776:
774:
771:
769:
766:
764:
761:
759:
756:
754:
751:
749:
746:
745:
743:
741:
737:
731:
728:
726:
723:
721:
718:
716:
713:
711:
708:
706:
703:
701:
698:
696:
693:
692:
690:
686:
680:
677:
675:
672:
670:
667:
665:
662:
660:
657:
655:
652:
650:
647:
645:
642:
640:
637:
635:
632:
630:
627:
625:
622:
621:
619:
615:
609:
606:
604:
601:
599:
596:
594:
591:
589:
586:
584:
581:
579:
576:
574:
571:
569:
566:
564:
561:
559:
556:
554:
551:
549:
546:
544:
541:
539:
536:
534:
531:
529:
526:
524:
521:
520:
518:
516:
512:
503:
498:
496:
491:
489:
484:
483:
480:
476:
472:
466:
463:
461:
458:
456:
453:
450:
447:
445:
442:
439:
436:
433:
430:
428:Photographs:
427:
424:
421:
418:
414:
411:
409:
406:
403:
400:
397:
393:
389:
386:
382:
378:
375:
371:
368:
364:
363:
359:
344:
340:
336:
329:
326:
321:
317:
313:
309:
305:
301:
297:
293:
286:
283:
272:
265:
262:
255:
251:
248:
246:
243:
241:
238:
236:
233:
232:
228:
226:
224:
220:
216:
211:
209:
205:
201:
193:
191:
187:
180:
178:
176:
171:
127:
123:
77:
73:
69:
65:
63:
54:
45:
37:
29:
21:
1213:Block cipher
1058:Key schedule
1048:Key exchange
1038:Kleptography
1001:Cryptosystem
950:Cryptography
740:Secure voice
633:
533:M-125 Fialka
395:
384:
373:
366:
346:. Retrieved
338:
328:
295:
291:
285:
274:. Retrieved
269:Sims, Mark.
264:
212:
200:East Germany
197:
188:
184:
174:
172:
125:
121:
67:
59:
57:
1201:Mathematics
1192:Mix network
688:Teleprinter
644:Cipher disk
396:Cryptologia
385:Cryptologia
374:Cryptologia
367:Cryptologia
292:Cryptologia
1152:Ciphertext
1122:Decryption
1117:Encryption
1078:Ransomware
753:FASCINATOR
617:Mechanical
419:simulator.
390:Jan Bury,
379:Jan Bury,
348:2015-10-09
276:2015-10-09
217:(NSA) and
1142:Plaintext
312:0161-1194
72:Crypto AG
23:The CX-52
1300:Category
1281:Category
1187:Kademlia
1147:Codetext
1090:(CSPRNG)
902:IBM 4764
897:IBM 4758
864:Pinwheel
339:BBC News
320:42774841
229:See also
957:General
808:STU-III
793:SIGSALY
748:BID 150
700:BID 770
679:Scytale
603:Singlet
563:Mercury
175:Hell 54
165:⁄
151:⁄
137:⁄
115:⁄
101:⁄
87:⁄
62:Hagelin
53:BC-52's
1068:Keygen
869:Rockex
859:Purple
849:Noreen
813:VINSON
803:STU-II
773:NESTOR
730:SIGTOT
598:SIGCUM
593:SIGABA
553:Lacida
538:Hebern
528:Enigma
417:QBASIC
318:
310:
208:Poland
206:, and
64:) C-52
1098:(PRN)
844:KL-51
839:KL-43
834:KG-84
822:Other
768:KY-68
763:KY-58
715:KW-37
710:KW-26
705:DUDEK
695:5-UCO
669:M-209
654:Kryha
639:CD-57
608:Typex
588:SG-41
583:SG-39
558:M-325
543:HX-63
316:S2CID
250:CD-57
240:M-209
126:BC-52
76:M-209
68:CX-52
829:JADE
783:SCIP
778:OMNI
758:KY-3
664:M-94
649:HC-9
634:C-52
629:C-36
568:NEMA
548:KL-7
308:ISSN
173:The
122:B-52
66:and
58:The
854:Red
798:STE
578:RED
573:OMI
523:CCM
343:BBC
300:doi
156:by
142:by
106:by
92:by
1302::
443:,
440:,
437:,
434:,
431:,
394:,
383:,
341:.
337:.
314:.
306:.
296:33
294:.
225:.
210:.
202:,
130:12
942:e
935:t
928:v
501:e
494:t
487:v
351:.
322:.
302::
279:.
167:8
163:3
160:+
158:6
153:2
149:1
146:+
144:8
139:2
135:1
132:+
117:8
113:3
110:+
108:4
103:8
99:3
96:+
94:5
89:2
85:1
82:+
80:8
60:(
55:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.