28:
103:
139:
message. To remedy this, some cipher disks now have multiple characters that stand for "end of word." Similarly a cipher disk may also have multiple characters that could be used for the letter "e" (the most common letter in
English) so that instead of having a character with a frequency of roughly 13%, there would be two characters that stood for "e" - each with a frequency of 6% or so. Users could also use a keyword so that all the characters including the letter e would change throughout the ciphertext.
114:, which was 3.75 inches (95 mm) in diameter and made of light yellow heavy card stock. It consisted of two concentric disks of unequal size revolving on a central pivot. The disks were divided along their outer edges into 30 equal compartments. The smaller inner disk contained letters, terminations and word pauses, while the outer disk contained groups of signal numbers. For easier recognition, the number eight represented two. The initials A.J.M. represent the Chief Signal Officer General
1036:
20:
65:
The first incarnation of the disk had plates made of copper and featured the alphabet, in order, inscribed on the outer edge of each disk in cells split evenly along the circumference of the circle. This enabled the two alphabets to move relative to each other creating an easy to use key. Rather than
126:
Cipher disks had many small variations on the basic design. Instead of letters it would occasionally use combinations of numbers on the outer disk with each combination corresponding to a letter. To make the encryption especially hard to crack, the advanced cipher disk would only use combinations of
74:
The cipher disk can be used in one of two ways. The code can be a consistent monoalphabetic substitution for the entire cipher or the disks can be moved periodically throughout the cipher making it polyalphabetic. For a monoalphabetic use, the sender and the person receiving the messages would agree
138:
When encoding a message using a cipher disk, a character is always used to mean “end of word.” The frequency of said character is abnormally high and thus easily detected. If this character, however, is omitted, then the words run together and it takes much longer for the recipient to read the
90:. An easy way to do this is for the sender and the recipient to agree that a certain number of characters into the message, the scales would be shifted one character to the right, repeating the procedure every (say) tenth letter. This would make it more difficult to crack, using
62:) consisting of two concentric circular plates mounted one on top of the other. The larger plate is called the "stationary" and the smaller one the "moveable" since the smaller one could move on top of the "stationary".
66:
using an impractical and complicated table indicating the encryption method, one could use the much simpler cipher disk. This made both encryption and decryption faster, simpler and less prone to error.
130:
Cipher disks would also add additional symbols for commonly used combinations of letters like "ing", "tion", and "ed". Symbols were also frequently added to indicate "and" at the end of a word.
1016:
846:
127:
two numbers. Instead of 1 and 2 though, 1 and 8 were used since these numerals look the same upside down (as things often are on a cipher disk) as they do right side up.
36:
79:
setting (e.g., the "G" in the regular alphabet would be positioned next to the "Q" in the cipher alphabet). The entire message is then encoded according to this key.
541:
258:
699:
251:
27:
692:
147:
Since the 1930s, cipher disks have been labeled "decoders" and have been used for novelties. Many of the cipher disks that were
895:
244:
119:
685:
1064:
1011:
966:
779:
890:
107:
1006:
637:
556:
996:
986:
841:
321:
546:
991:
981:
784:
744:
737:
727:
722:
622:
346:
341:
281:
732:
483:
1039:
885:
831:
617:
612:
587:
392:
387:
87:
55:
102:
187:
Deavours, Cipher, et al. Cryptology: Machines, History & Methods. Norwood, MA: Artech House, 1989.
1001:
925:
650:
336:
296:
764:
645:
531:
164:
152:
83:
59:
870:
854:
801:
111:
91:
76:
930:
920:
791:
865:
331:
32:
940:
860:
821:
769:
754:
432:
417:
382:
326:
286:
148:
115:
1058:
1021:
976:
935:
915:
811:
774:
749:
478:
273:
217:
971:
816:
806:
796:
759:
708:
498:
212:
950:
536:
910:
880:
875:
836:
511:
900:
19:
16:
Encryption and decryption tool consisting of two metal plates with alphabets
201:
The
History of Codes and Ciphers in the United States Prior to World War I
945:
905:
660:
655:
51:
47:
566:
551:
506:
458:
437:
826:
627:
607:
571:
561:
488:
361:
356:
351:
311:
291:
602:
597:
592:
526:
521:
473:
468:
463:
453:
427:
412:
397:
366:
316:
301:
101:
26:
18:
516:
422:
407:
306:
681:
240:
54:
tool developed in 1470 by the
Italian architect and author
847:
Cryptographically secure pseudorandom number generator
228:
959:
715:
636:
580:
497:
446:
375:
272:
58:. He constructed a device, (eponymously called the
37:Thessaloniki Science Center and Technology Museum
86:, the cipher disk opened the way for convenient
693:
252:
203:. Vol. 20. Laguna Hills: Aegean Park P, 1978.
8:
700:
686:
678:
259:
245:
237:
233:
229:
195:
193:
180:
7:
14:
1035:
1034:
896:Information-theoretic security
1:
106:Modern representation of the
35:cipher disk, 5th century BC,
1012:Message authentication code
967:Cryptographic hash function
780:Cryptographic hash function
1081:
891:Harvest now, decrypt later
222:New York: Doubleday, 1999.
1030:
1007:Post-quantum cryptography
677:
236:
232:
997:Quantum key distribution
987:Authenticated encryption
842:Random number generation
122:used for accountability.
992:Public-key cryptography
982:Symmetric-key algorithm
785:Key derivation function
745:Cryptographic primitive
738:Authentication protocol
728:Outline of cryptography
723:History of cryptography
733:Cryptographic protocol
484:Siemens and Halske T52
199:Barker, Wayne G., ed.
123:
110:Cipher Disk, from the
88:polyalphabetic ciphers
82:In addition to simple
39:
24:
886:End-to-end encryption
832:Cryptojacking malware
547:Sectéra Secure Module
105:
70:Methods of encryption
56:Leon Battista Alberti
31:Reconstruction of an
30:
22:
1002:Quantum cryptography
926:Trusted timestamping
651:Intel SHA extensions
153:secret decoder rings
84:substitution ciphers
765:Cryptographic nonce
646:AES instruction set
165:Alberti cipher disk
92:statistical methods
60:Alberti cipher disk
23:A metal cipher disk
1065:Encryption devices
871:Subliminal channel
855:Pseudorandom noise
802:Key (cryptography)
124:
118:. Each disk had a
112:American Civil War
40:
25:
1052:
1051:
1048:
1047:
931:Key-based routing
921:Trapdoor function
792:Digital signature
673:
672:
669:
668:
638:Computer hardware
383:Bazeries cylinder
1072:
1038:
1037:
866:Insecure channel
702:
695:
688:
679:
261:
254:
247:
238:
234:
230:
223:
210:
204:
197:
188:
185:
167:, also known as
1080:
1079:
1075:
1074:
1073:
1071:
1070:
1069:
1055:
1054:
1053:
1044:
1026:
955:
711:
706:
665:
632:
576:
493:
479:Lorenz SZ 40/42
442:
371:
268:
267:Cipher machines
265:
227:
226:
211:
207:
198:
191:
186:
182:
177:
161:
145:
143:Popular culture
136:
100:
72:
17:
12:
11:
5:
1078:
1076:
1068:
1067:
1057:
1056:
1050:
1049:
1046:
1045:
1043:
1042:
1031:
1028:
1027:
1025:
1024:
1019:
1017:Random numbers
1014:
1009:
1004:
999:
994:
989:
984:
979:
974:
969:
963:
961:
957:
956:
954:
953:
948:
943:
941:Garlic routing
938:
933:
928:
923:
918:
913:
908:
903:
898:
893:
888:
883:
878:
873:
868:
863:
861:Secure channel
858:
852:
851:
850:
839:
834:
829:
824:
822:Key stretching
819:
814:
809:
804:
799:
794:
789:
788:
787:
782:
772:
770:Cryptovirology
767:
762:
757:
755:Cryptocurrency
752:
747:
742:
741:
740:
730:
725:
719:
717:
713:
712:
707:
705:
704:
697:
690:
682:
675:
674:
671:
670:
667:
666:
664:
663:
658:
653:
648:
642:
640:
634:
633:
631:
630:
625:
620:
615:
610:
605:
600:
595:
590:
584:
582:
578:
577:
575:
574:
569:
564:
559:
554:
549:
544:
539:
534:
529:
524:
519:
514:
509:
503:
501:
495:
494:
492:
491:
486:
481:
476:
471:
466:
461:
456:
450:
448:
444:
443:
441:
440:
435:
433:Reihenschieber
430:
425:
420:
418:Jefferson disk
415:
410:
405:
400:
395:
390:
385:
379:
377:
373:
372:
370:
369:
364:
359:
354:
349:
344:
339:
334:
329:
324:
319:
314:
309:
304:
299:
294:
289:
284:
278:
276:
274:Rotor machines
270:
269:
266:
264:
263:
256:
249:
241:
225:
224:
205:
189:
179:
178:
176:
173:
172:
171:
160:
157:
149:radio premiums
144:
141:
135:
132:
120:control number
116:Albert J. Myer
99:
96:
71:
68:
15:
13:
10:
9:
6:
4:
3:
2:
1077:
1066:
1063:
1062:
1060:
1041:
1033:
1032:
1029:
1023:
1022:Steganography
1020:
1018:
1015:
1013:
1010:
1008:
1005:
1003:
1000:
998:
995:
993:
990:
988:
985:
983:
980:
978:
977:Stream cipher
975:
973:
970:
968:
965:
964:
962:
958:
952:
949:
947:
944:
942:
939:
937:
936:Onion routing
934:
932:
929:
927:
924:
922:
919:
917:
916:Shared secret
914:
912:
909:
907:
904:
902:
899:
897:
894:
892:
889:
887:
884:
882:
879:
877:
874:
872:
869:
867:
864:
862:
859:
856:
853:
848:
845:
844:
843:
840:
838:
835:
833:
830:
828:
825:
823:
820:
818:
815:
813:
812:Key generator
810:
808:
805:
803:
800:
798:
795:
793:
790:
786:
783:
781:
778:
777:
776:
775:Hash function
773:
771:
768:
766:
763:
761:
758:
756:
753:
751:
750:Cryptanalysis
748:
746:
743:
739:
736:
735:
734:
731:
729:
726:
724:
721:
720:
718:
714:
710:
703:
698:
696:
691:
689:
684:
683:
680:
676:
662:
659:
657:
654:
652:
649:
647:
644:
643:
641:
639:
635:
629:
626:
624:
621:
619:
616:
614:
611:
609:
606:
604:
601:
599:
596:
594:
591:
589:
586:
585:
583:
579:
573:
570:
568:
565:
563:
560:
558:
555:
553:
550:
548:
545:
543:
540:
538:
535:
533:
530:
528:
525:
523:
520:
518:
515:
513:
510:
508:
505:
504:
502:
500:
496:
490:
487:
485:
482:
480:
477:
475:
472:
470:
467:
465:
462:
460:
457:
455:
452:
451:
449:
445:
439:
436:
434:
431:
429:
426:
424:
421:
419:
416:
414:
411:
409:
406:
404:
401:
399:
396:
394:
391:
389:
386:
384:
381:
380:
378:
374:
368:
365:
363:
360:
358:
355:
353:
350:
348:
345:
343:
340:
338:
335:
333:
330:
328:
325:
323:
320:
318:
315:
313:
310:
308:
305:
303:
300:
298:
295:
293:
290:
288:
285:
283:
280:
279:
277:
275:
271:
262:
257:
255:
250:
248:
243:
242:
239:
235:
231:
221:
219:
218:The Code Book
214:
209:
206:
202:
196:
194:
190:
184:
181:
174:
170:
166:
163:
162:
158:
156:
154:
151:were called "
150:
142:
140:
133:
131:
128:
121:
117:
113:
109:
104:
97:
95:
93:
89:
85:
80:
78:
69:
67:
63:
61:
57:
53:
49:
45:
38:
34:
29:
21:
972:Block cipher
817:Key schedule
807:Key exchange
797:Kleptography
760:Cryptosystem
709:Cryptography
499:Secure voice
402:
292:M-125 Fialka
216:
213:Singh, Simon
208:
200:
183:
168:
146:
137:
129:
125:
81:
73:
64:
43:
41:
960:Mathematics
951:Mix network
447:Teleprinter
403:Cipher disk
52:deciphering
48:enciphering
44:cipher disk
911:Ciphertext
881:Decryption
876:Encryption
837:Ransomware
512:FASCINATOR
376:Mechanical
175:References
134:Weaknesses
98:Variations
77:cipher key
901:Plaintext
1059:Category
1040:Category
946:Kademlia
906:Codetext
849:(CSPRNG)
661:IBM 4764
656:IBM 4758
623:Pinwheel
159:See also
716:General
567:STU-III
552:SIGSALY
507:BID 150
459:BID 770
438:Scytale
362:Singlet
322:Mercury
169:formula
827:Keygen
628:Rockex
618:Purple
608:Noreen
572:VINSON
562:STU-II
532:NESTOR
489:SIGTOT
357:SIGCUM
352:SIGABA
312:Lacida
297:Hebern
287:Enigma
46:is an
33:Aeneas
857:(PRN)
603:KL-51
598:KL-43
593:KG-84
581:Other
527:KY-68
522:KY-58
474:KW-37
469:KW-26
464:DUDEK
454:5-UCO
428:M-209
413:Kryha
398:CD-57
367:Typex
347:SG-41
342:SG-39
317:M-325
302:HX-63
108:Union
75:on a
588:JADE
542:SCIP
537:OMNI
517:KY-3
423:M-94
408:HC-9
393:C-52
388:C-36
327:NEMA
307:KL-7
50:and
613:Red
557:STE
337:RED
332:OMI
282:CCM
155:."
1061::
215:.
192:^
94:.
42:A
701:e
694:t
687:v
260:e
253:t
246:v
220:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.