Knowledge (XXG)

CD-57

Source đź“ť

22: 79: 1074: 86: 1054: 884: 109:
machines. Compact, the CD-57 measured merely 5 1/8in Ă— 3 1/8in Ă— 1 1/2in (13 Ă— 8 Ă— 3.8 cm) and weighed 1.5 pounds (680 gr). The CD-57 used six wheels.
579: 296: 249: 246: 243: 737: 237: 43: 289: 730: 65: 261: 191: 163: 933: 282: 723: 1102: 1049: 1004: 817: 36: 30: 928: 1044: 675: 594: 47: 1034: 1024: 879: 359: 584: 1029: 1019: 822: 782: 775: 765: 760: 660: 384: 379: 319: 770: 521: 1077: 923: 869: 655: 650: 625: 430: 425: 106: 1039: 963: 688: 374: 334: 802: 683: 569: 908: 892: 839: 968: 958: 829: 903: 78: 369: 195: 978: 898: 859: 807: 792: 470: 455: 420: 364: 324: 1096: 1059: 1014: 973: 953: 849: 812: 787: 516: 311: 128: 189: 167: 1009: 854: 844: 834: 797: 746: 536: 117: 988: 574: 440: 948: 918: 913: 874: 549: 938: 98: 85: 983: 943: 698: 693: 216:
Louis Kruh, Cipher Equipment: Hagelin Pocket Cryptographer, Type CD-57,
604: 589: 544: 496: 475: 257: 254: 159: 864: 665: 645: 609: 599: 526: 399: 394: 389: 349: 329: 640: 635: 630: 564: 559: 511: 506: 501: 491: 465: 450: 404: 354: 339: 140: 84: 77: 554: 460: 445: 344: 719: 278: 15: 223:
Geoff Sullivan, Cryptanalysis of Hagelin machine pin wheels,
127:
Sullivan (2002) shows how the CD-57 can be attacked using a
164:"Cd-57 Handheld 6-Rotor Cryptographic Machine by Crypto Ag" 158:
one website gives the production dates as "1956 and 1957"
101:, first produced in 1957. It was derived from the earlier 97:
was a portable, mechanical cipher machine manufactured by
209:
Wayne G. Baker, Solving a Hagelin, Type CD-57, Cipher,
885:
Cryptographically secure pseudorandom number generator
266: 105:, and was designed to be compatible with the larger 997: 753: 674: 618: 535: 484: 413: 310: 161:, another website says "first produced in 1957" 731: 290: 8: 738: 724: 716: 297: 283: 275: 271: 267: 124:was a licensed copy of the CD-57 by Hell. 66:Learn how and when to remove this message 120:system rather than rotating wheels. The 29:This article includes a list of general 227:, 26(4), pp257–273, October 2002. 151: 238:Photographs and a simulator (Windows) 7: 220:, Volume 1, 1977, pp255–260. 213:, 2(1), January 1978, pp1–8. 35:it lacks sufficient corresponding 14: 1073: 1072: 20: 934:Information-theoretic security 1: 262:Information about the STG-61 1050:Message authentication code 1005:Cryptographic hash function 818:Cryptographic hash function 116:, a similar device using a 1119: 929:Harvest now, decrypt later 242:Photographs of the CD-57: 194:December 29, 2004, at the 1068: 1045:Post-quantum cryptography 715: 274: 270: 1035:Quantum key distribution 1025:Authenticated encryption 880:Random number generation 1030:Public-key cryptography 1020:Symmetric-key algorithm 823:Key derivation function 783:Cryptographic primitive 776:Authentication protocol 766:Outline of cryptography 761:History of cryptography 50:more precise citations. 771:Cryptographic protocol 522:Siemens and Halske T52 90: 82: 924:End-to-end encryption 870:Cryptojacking malware 585:SectĂ©ra Secure Module 88: 81: 1040:Quantum cryptography 964:Trusted timestamping 689:Intel SHA extensions 253:Jerry Proc's pages: 803:Cryptographic nonce 684:AES instruction set 1103:Encryption devices 909:Subliminal channel 893:Pseudorandom noise 840:Key (cryptography) 131:search technique. 91: 83: 1090: 1089: 1086: 1085: 969:Key-based routing 959:Trapdoor function 830:Digital signature 711: 710: 707: 706: 676:Computer hardware 421:Bazeries cylinder 170:on March 17, 2006 112:A variant is the 76: 75: 68: 1110: 1076: 1075: 904:Insecure channel 740: 733: 726: 717: 299: 292: 285: 276: 272: 268: 198: 187: 181: 179: 177: 175: 166:. Archived from 156: 71: 64: 60: 57: 51: 46:this article by 37:inline citations 24: 23: 16: 1118: 1117: 1113: 1112: 1111: 1109: 1108: 1107: 1093: 1092: 1091: 1082: 1064: 993: 749: 744: 703: 670: 614: 531: 517:Lorenz SZ 40/42 480: 409: 306: 305:Cipher machines 303: 234: 206: 201: 196:Wayback Machine 188: 184: 173: 171: 162: 157: 153: 149: 137: 95:(Hagelin) CD-57 72: 61: 55: 52: 42:Please help to 41: 25: 21: 12: 11: 5: 1116: 1114: 1106: 1105: 1095: 1094: 1088: 1087: 1084: 1083: 1081: 1080: 1069: 1066: 1065: 1063: 1062: 1057: 1055:Random numbers 1052: 1047: 1042: 1037: 1032: 1027: 1022: 1017: 1012: 1007: 1001: 999: 995: 994: 992: 991: 986: 981: 979:Garlic routing 976: 971: 966: 961: 956: 951: 946: 941: 936: 931: 926: 921: 916: 911: 906: 901: 899:Secure channel 896: 890: 889: 888: 877: 872: 867: 862: 860:Key stretching 857: 852: 847: 842: 837: 832: 827: 826: 825: 820: 810: 808:Cryptovirology 805: 800: 795: 793:Cryptocurrency 790: 785: 780: 779: 778: 768: 763: 757: 755: 751: 750: 745: 743: 742: 735: 728: 720: 713: 712: 709: 708: 705: 704: 702: 701: 696: 691: 686: 680: 678: 672: 671: 669: 668: 663: 658: 653: 648: 643: 638: 633: 628: 622: 620: 616: 615: 613: 612: 607: 602: 597: 592: 587: 582: 577: 572: 567: 562: 557: 552: 547: 541: 539: 533: 532: 530: 529: 524: 519: 514: 509: 504: 499: 494: 488: 486: 482: 481: 479: 478: 473: 471:Reihenschieber 468: 463: 458: 456:Jefferson disk 453: 448: 443: 438: 433: 428: 423: 417: 415: 411: 410: 408: 407: 402: 397: 392: 387: 382: 377: 372: 367: 362: 357: 352: 347: 342: 337: 332: 327: 322: 316: 314: 312:Rotor machines 308: 307: 304: 302: 301: 294: 287: 279: 265: 264: 259: 251: 240: 233: 232:External links 230: 229: 228: 221: 214: 205: 202: 200: 199: 182: 150: 148: 145: 144: 143: 136: 133: 74: 73: 28: 26: 19: 13: 10: 9: 6: 4: 3: 2: 1115: 1104: 1101: 1100: 1098: 1079: 1071: 1070: 1067: 1061: 1060:Steganography 1058: 1056: 1053: 1051: 1048: 1046: 1043: 1041: 1038: 1036: 1033: 1031: 1028: 1026: 1023: 1021: 1018: 1016: 1015:Stream cipher 1013: 1011: 1008: 1006: 1003: 1002: 1000: 996: 990: 987: 985: 982: 980: 977: 975: 974:Onion routing 972: 970: 967: 965: 962: 960: 957: 955: 954:Shared secret 952: 950: 947: 945: 942: 940: 937: 935: 932: 930: 927: 925: 922: 920: 917: 915: 912: 910: 907: 905: 902: 900: 897: 894: 891: 886: 883: 882: 881: 878: 876: 873: 871: 868: 866: 863: 861: 858: 856: 853: 851: 850:Key generator 848: 846: 843: 841: 838: 836: 833: 831: 828: 824: 821: 819: 816: 815: 814: 813:Hash function 811: 809: 806: 804: 801: 799: 796: 794: 791: 789: 788:Cryptanalysis 786: 784: 781: 777: 774: 773: 772: 769: 767: 764: 762: 759: 758: 756: 752: 748: 741: 736: 734: 729: 727: 722: 721: 718: 714: 700: 697: 695: 692: 690: 687: 685: 682: 681: 679: 677: 673: 667: 664: 662: 659: 657: 654: 652: 649: 647: 644: 642: 639: 637: 634: 632: 629: 627: 624: 623: 621: 617: 611: 608: 606: 603: 601: 598: 596: 593: 591: 588: 586: 583: 581: 578: 576: 573: 571: 568: 566: 563: 561: 558: 556: 553: 551: 548: 546: 543: 542: 540: 538: 534: 528: 525: 523: 520: 518: 515: 513: 510: 508: 505: 503: 500: 498: 495: 493: 490: 489: 487: 483: 477: 474: 472: 469: 467: 464: 462: 459: 457: 454: 452: 449: 447: 444: 442: 439: 437: 434: 432: 429: 427: 424: 422: 419: 418: 416: 412: 406: 403: 401: 398: 396: 393: 391: 388: 386: 383: 381: 378: 376: 373: 371: 368: 366: 363: 361: 358: 356: 353: 351: 348: 346: 343: 341: 338: 336: 333: 331: 328: 326: 323: 321: 318: 317: 315: 313: 309: 300: 295: 293: 288: 286: 281: 280: 277: 273: 269: 263: 260: 258: 255: 252: 250: 247: 244: 241: 239: 236: 235: 231: 226: 222: 219: 215: 212: 208: 207: 203: 197: 193: 190: 186: 183: 169: 165: 160: 155: 152: 146: 142: 139: 138: 134: 132: 130: 129:hill climbing 125: 123: 119: 115: 110: 108: 104: 100: 96: 87: 80: 70: 67: 59: 49: 45: 39: 38: 32: 27: 18: 17: 1010:Block cipher 855:Key schedule 845:Key exchange 835:Kleptography 798:Cryptosystem 747:Cryptography 537:Secure voice 435: 330:M-125 Fialka 224: 217: 210: 185: 172:. Retrieved 168:the original 154: 126: 121: 118:one-time pad 113: 111: 102: 94: 92: 89:Opened CD-57 62: 56:October 2008 53: 34: 998:Mathematics 989:Mix network 485:Teleprinter 441:Cipher disk 225:Cryptologia 218:Cryptologia 211:Cryptologia 174:December 9, 48:introducing 949:Ciphertext 919:Decryption 914:Encryption 875:Ransomware 550:FASCINATOR 414:Mechanical 204:References 31:references 939:Plaintext 114:CD-57(RT) 99:Crypto AG 1097:Category 1078:Category 984:Kademlia 944:Codetext 887:(CSPRNG) 699:IBM 4764 694:IBM 4758 661:Pinwheel 192:Archived 135:See also 754:General 605:STU-III 590:SIGSALY 545:BID 150 497:BID 770 476:Scytale 400:Singlet 360:Mercury 44:improve 865:Keygen 666:Rockex 656:Purple 646:Noreen 610:VINSON 600:STU-II 570:NESTOR 527:SIGTOT 395:SIGCUM 390:SIGABA 350:Lacida 335:Hebern 325:Enigma 122:STG-61 33:, but 895:(PRN) 641:KL-51 636:KL-43 631:KG-84 619:Other 565:KY-68 560:KY-58 512:KW-37 507:KW-26 502:DUDEK 492:5-UCO 466:M-209 451:Kryha 436:CD-57 405:Typex 385:SG-41 380:SG-39 355:M-325 340:HX-63 147:Notes 141:M-209 103:CD-55 626:JADE 580:SCIP 575:OMNI 555:KY-3 461:M-94 446:HC-9 431:C-52 426:C-36 365:NEMA 345:KL-7 176:2005 107:C-52 93:The 651:Red 595:STE 375:RED 370:OMI 320:CCM 1099:: 256:, 248:, 245:, 739:e 732:t 725:v 298:e 291:t 284:v 180:. 178:. 69:) 63:( 58:) 54:( 40:.

Index

references
inline citations
improve
introducing
Learn how and when to remove this message


Crypto AG
C-52
one-time pad
hill climbing
M-209

"Cd-57 Handheld 6-Rotor Cryptographic Machine by Crypto Ag"
the original

Archived
Wayback Machine
Photographs and a simulator (Windows)





Information about the STG-61
v
t
e
Rotor machines
CCM

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑