22:
79:
1074:
86:
1054:
884:
109:
machines. Compact, the CD-57 measured merely 5 1/8in Ă— 3 1/8in Ă— 1 1/2in (13 Ă— 8 Ă— 3.8 cm) and weighed 1.5 pounds (680 gr). The CD-57 used six wheels.
579:
296:
249:
246:
243:
737:
237:
43:
289:
730:
65:
261:
191:
163:
933:
282:
723:
1102:
1049:
1004:
817:
36:
30:
928:
1044:
675:
594:
47:
1034:
1024:
879:
359:
584:
1029:
1019:
822:
782:
775:
765:
760:
660:
384:
379:
319:
770:
521:
1077:
923:
869:
655:
650:
625:
430:
425:
106:
1039:
963:
688:
374:
334:
802:
683:
569:
908:
892:
839:
968:
958:
829:
903:
78:
369:
195:
978:
898:
859:
807:
792:
470:
455:
420:
364:
324:
1096:
1059:
1014:
973:
953:
849:
812:
787:
516:
311:
128:
189:
167:
1009:
854:
844:
834:
797:
746:
536:
117:
988:
574:
440:
948:
918:
913:
874:
549:
938:
98:
85:
983:
943:
698:
693:
216:
Louis Kruh, Cipher
Equipment: Hagelin Pocket Cryptographer, Type CD-57,
604:
589:
544:
496:
475:
257:
254:
159:
864:
665:
645:
609:
599:
526:
399:
394:
389:
349:
329:
640:
635:
630:
564:
559:
511:
506:
501:
491:
465:
450:
404:
354:
339:
140:
84:
77:
554:
460:
445:
344:
719:
278:
15:
223:
Geoff
Sullivan, Cryptanalysis of Hagelin machine pin wheels,
127:
Sullivan (2002) shows how the CD-57 can be attacked using a
164:"Cd-57 Handheld 6-Rotor Cryptographic Machine by Crypto Ag"
158:
one website gives the production dates as "1956 and 1957"
101:, first produced in 1957. It was derived from the earlier
97:
was a portable, mechanical cipher machine manufactured by
209:
Wayne G. Baker, Solving a
Hagelin, Type CD-57, Cipher,
885:
Cryptographically secure pseudorandom number generator
266:
105:, and was designed to be compatible with the larger
997:
753:
674:
618:
535:
484:
413:
310:
161:, another website says "first produced in 1957"
731:
290:
8:
738:
724:
716:
297:
283:
275:
271:
267:
124:was a licensed copy of the CD-57 by Hell.
66:Learn how and when to remove this message
120:system rather than rotating wheels. The
29:This article includes a list of general
227:, 26(4), pp257–273, October 2002.
151:
238:Photographs and a simulator (Windows)
7:
220:, Volume 1, 1977, pp255–260.
213:, 2(1), January 1978, pp1–8.
35:it lacks sufficient corresponding
14:
1073:
1072:
20:
934:Information-theoretic security
1:
262:Information about the STG-61
1050:Message authentication code
1005:Cryptographic hash function
818:Cryptographic hash function
116:, a similar device using a
1119:
929:Harvest now, decrypt later
242:Photographs of the CD-57:
194:December 29, 2004, at the
1068:
1045:Post-quantum cryptography
715:
274:
270:
1035:Quantum key distribution
1025:Authenticated encryption
880:Random number generation
1030:Public-key cryptography
1020:Symmetric-key algorithm
823:Key derivation function
783:Cryptographic primitive
776:Authentication protocol
766:Outline of cryptography
761:History of cryptography
50:more precise citations.
771:Cryptographic protocol
522:Siemens and Halske T52
90:
82:
924:End-to-end encryption
870:Cryptojacking malware
585:Sectéra Secure Module
88:
81:
1040:Quantum cryptography
964:Trusted timestamping
689:Intel SHA extensions
253:Jerry Proc's pages:
803:Cryptographic nonce
684:AES instruction set
1103:Encryption devices
909:Subliminal channel
893:Pseudorandom noise
840:Key (cryptography)
131:search technique.
91:
83:
1090:
1089:
1086:
1085:
969:Key-based routing
959:Trapdoor function
830:Digital signature
711:
710:
707:
706:
676:Computer hardware
421:Bazeries cylinder
170:on March 17, 2006
112:A variant is the
76:
75:
68:
1110:
1076:
1075:
904:Insecure channel
740:
733:
726:
717:
299:
292:
285:
276:
272:
268:
198:
187:
181:
179:
177:
175:
166:. Archived from
156:
71:
64:
60:
57:
51:
46:this article by
37:inline citations
24:
23:
16:
1118:
1117:
1113:
1112:
1111:
1109:
1108:
1107:
1093:
1092:
1091:
1082:
1064:
993:
749:
744:
703:
670:
614:
531:
517:Lorenz SZ 40/42
480:
409:
306:
305:Cipher machines
303:
234:
206:
201:
196:Wayback Machine
188:
184:
173:
171:
162:
157:
153:
149:
137:
95:(Hagelin) CD-57
72:
61:
55:
52:
42:Please help to
41:
25:
21:
12:
11:
5:
1116:
1114:
1106:
1105:
1095:
1094:
1088:
1087:
1084:
1083:
1081:
1080:
1069:
1066:
1065:
1063:
1062:
1057:
1055:Random numbers
1052:
1047:
1042:
1037:
1032:
1027:
1022:
1017:
1012:
1007:
1001:
999:
995:
994:
992:
991:
986:
981:
979:Garlic routing
976:
971:
966:
961:
956:
951:
946:
941:
936:
931:
926:
921:
916:
911:
906:
901:
899:Secure channel
896:
890:
889:
888:
877:
872:
867:
862:
860:Key stretching
857:
852:
847:
842:
837:
832:
827:
826:
825:
820:
810:
808:Cryptovirology
805:
800:
795:
793:Cryptocurrency
790:
785:
780:
779:
778:
768:
763:
757:
755:
751:
750:
745:
743:
742:
735:
728:
720:
713:
712:
709:
708:
705:
704:
702:
701:
696:
691:
686:
680:
678:
672:
671:
669:
668:
663:
658:
653:
648:
643:
638:
633:
628:
622:
620:
616:
615:
613:
612:
607:
602:
597:
592:
587:
582:
577:
572:
567:
562:
557:
552:
547:
541:
539:
533:
532:
530:
529:
524:
519:
514:
509:
504:
499:
494:
488:
486:
482:
481:
479:
478:
473:
471:Reihenschieber
468:
463:
458:
456:Jefferson disk
453:
448:
443:
438:
433:
428:
423:
417:
415:
411:
410:
408:
407:
402:
397:
392:
387:
382:
377:
372:
367:
362:
357:
352:
347:
342:
337:
332:
327:
322:
316:
314:
312:Rotor machines
308:
307:
304:
302:
301:
294:
287:
279:
265:
264:
259:
251:
240:
233:
232:External links
230:
229:
228:
221:
214:
205:
202:
200:
199:
182:
150:
148:
145:
144:
143:
136:
133:
74:
73:
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
1115:
1104:
1101:
1100:
1098:
1079:
1071:
1070:
1067:
1061:
1060:Steganography
1058:
1056:
1053:
1051:
1048:
1046:
1043:
1041:
1038:
1036:
1033:
1031:
1028:
1026:
1023:
1021:
1018:
1016:
1015:Stream cipher
1013:
1011:
1008:
1006:
1003:
1002:
1000:
996:
990:
987:
985:
982:
980:
977:
975:
974:Onion routing
972:
970:
967:
965:
962:
960:
957:
955:
954:Shared secret
952:
950:
947:
945:
942:
940:
937:
935:
932:
930:
927:
925:
922:
920:
917:
915:
912:
910:
907:
905:
902:
900:
897:
894:
891:
886:
883:
882:
881:
878:
876:
873:
871:
868:
866:
863:
861:
858:
856:
853:
851:
850:Key generator
848:
846:
843:
841:
838:
836:
833:
831:
828:
824:
821:
819:
816:
815:
814:
813:Hash function
811:
809:
806:
804:
801:
799:
796:
794:
791:
789:
788:Cryptanalysis
786:
784:
781:
777:
774:
773:
772:
769:
767:
764:
762:
759:
758:
756:
752:
748:
741:
736:
734:
729:
727:
722:
721:
718:
714:
700:
697:
695:
692:
690:
687:
685:
682:
681:
679:
677:
673:
667:
664:
662:
659:
657:
654:
652:
649:
647:
644:
642:
639:
637:
634:
632:
629:
627:
624:
623:
621:
617:
611:
608:
606:
603:
601:
598:
596:
593:
591:
588:
586:
583:
581:
578:
576:
573:
571:
568:
566:
563:
561:
558:
556:
553:
551:
548:
546:
543:
542:
540:
538:
534:
528:
525:
523:
520:
518:
515:
513:
510:
508:
505:
503:
500:
498:
495:
493:
490:
489:
487:
483:
477:
474:
472:
469:
467:
464:
462:
459:
457:
454:
452:
449:
447:
444:
442:
439:
437:
434:
432:
429:
427:
424:
422:
419:
418:
416:
412:
406:
403:
401:
398:
396:
393:
391:
388:
386:
383:
381:
378:
376:
373:
371:
368:
366:
363:
361:
358:
356:
353:
351:
348:
346:
343:
341:
338:
336:
333:
331:
328:
326:
323:
321:
318:
317:
315:
313:
309:
300:
295:
293:
288:
286:
281:
280:
277:
273:
269:
263:
260:
258:
255:
252:
250:
247:
244:
241:
239:
236:
235:
231:
226:
222:
219:
215:
212:
208:
207:
203:
197:
193:
190:
186:
183:
169:
165:
160:
155:
152:
146:
142:
139:
138:
134:
132:
130:
129:hill climbing
125:
123:
119:
115:
110:
108:
104:
100:
96:
87:
80:
70:
67:
59:
49:
45:
39:
38:
32:
27:
18:
17:
1010:Block cipher
855:Key schedule
845:Key exchange
835:Kleptography
798:Cryptosystem
747:Cryptography
537:Secure voice
435:
330:M-125 Fialka
224:
217:
210:
185:
172:. Retrieved
168:the original
154:
126:
121:
118:one-time pad
113:
111:
102:
94:
92:
89:Opened CD-57
62:
56:October 2008
53:
34:
998:Mathematics
989:Mix network
485:Teleprinter
441:Cipher disk
225:Cryptologia
218:Cryptologia
211:Cryptologia
174:December 9,
48:introducing
949:Ciphertext
919:Decryption
914:Encryption
875:Ransomware
550:FASCINATOR
414:Mechanical
204:References
31:references
939:Plaintext
114:CD-57(RT)
99:Crypto AG
1097:Category
1078:Category
984:Kademlia
944:Codetext
887:(CSPRNG)
699:IBM 4764
694:IBM 4758
661:Pinwheel
192:Archived
135:See also
754:General
605:STU-III
590:SIGSALY
545:BID 150
497:BID 770
476:Scytale
400:Singlet
360:Mercury
44:improve
865:Keygen
666:Rockex
656:Purple
646:Noreen
610:VINSON
600:STU-II
570:NESTOR
527:SIGTOT
395:SIGCUM
390:SIGABA
350:Lacida
335:Hebern
325:Enigma
122:STG-61
33:, but
895:(PRN)
641:KL-51
636:KL-43
631:KG-84
619:Other
565:KY-68
560:KY-58
512:KW-37
507:KW-26
502:DUDEK
492:5-UCO
466:M-209
451:Kryha
436:CD-57
405:Typex
385:SG-41
380:SG-39
355:M-325
340:HX-63
147:Notes
141:M-209
103:CD-55
626:JADE
580:SCIP
575:OMNI
555:KY-3
461:M-94
446:HC-9
431:C-52
426:C-36
365:NEMA
345:KL-7
176:2005
107:C-52
93:The
651:Red
595:STE
375:RED
370:OMI
320:CCM
1099::
256:,
248:,
245:,
739:e
732:t
725:v
298:e
291:t
284:v
180:.
178:.
69:)
63:(
58:)
54:(
40:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.