43:
31:
969:
997:
72:
According to the NSA, "apparently, the JADE machine did not stand up to heavy usage in the field, and, after an initial high volume of traffic, it was used much less." While CORAL traffic was also low, an important user was a
Japanese representative, Vice Admiral Abe, to an Axis war-planning council
42:
65:
used the machine for communications from late 1942 until 1944. JADE was similar to another cipher machine, CORAL, with the main difference that JADE was used to encipher messages in
949:
779:
140:
Separate
Mathematical Sciences Cryptography, Science Inc., 1982, “Deciphering Japanese Machine Cryptography in the United States and Its Theoretical Considerations”, Masataka Kato
474:
191:
632:
1058:
124:
1034:
184:
625:
155:
History of
Kitajima Island Naval Forces, "Cryptographic Printing Machine and Thin-Bar Type Replacement Board", Kakuji Ishigami, 1985
828:
177:
618:
1063:
1053:
944:
899:
712:
35:
823:
1027:
939:
570:
489:
30:
929:
919:
774:
254:
479:
125:
https://www.nsa.gov/about/cryptologic-heritage/center-cryptologic-history/pearl-harbor-review/early-japanese/
924:
914:
717:
677:
670:
660:
655:
555:
279:
274:
214:
73:
whose reports coded in CORAL were intercepted and proved vital to Allied planning in the
European theater.
665:
416:
62:
972:
818:
764:
550:
545:
325:
320:
88:
82:
1020:
934:
858:
583:
269:
229:
697:
578:
464:
803:
787:
734:
143:
Machine
Cryptography and Modern Cryptanalysis, Cipher A. Deavours, Louis Kruh, ARTECH HOUSE, 1985
101:
863:
853:
724:
1004:
158:"A review of correspondence warfare and correspondence warfare measures", Yoshio Nakano, 1955
798:
264:
873:
793:
754:
702:
687:
365:
350:
315:
259:
219:
1047:
954:
909:
868:
848:
744:
707:
682:
411:
206:
17:
904:
749:
739:
729:
692:
641:
431:
58:
883:
469:
335:
843:
813:
808:
769:
444:
149:"Naval Operational Communication History", Guard Corps School of Art, Showa 28
833:
996:
878:
838:
593:
588:
66:
54:
499:
484:
439:
391:
370:
759:
560:
540:
504:
494:
421:
294:
289:
284:
244:
224:
535:
530:
525:
459:
454:
406:
401:
396:
386:
360:
345:
330:
299:
249:
234:
41:
29:
152:"Shin Takayama Tore 128," Miyauchi Kanto, Rokuko Publishing, 1975
449:
355:
340:
239:
614:
173:
102:
TENTATIVE LIST OF ENIGMA AND OTHER MACHINE USAGES 30 March 1945
127:
Early
Japanese Systems NSA Center for Cryptologic History
146:
BIG MACHINES, Stephen J. Kelley, Aegean Park Press, 2001
1008:
780:
Cryptographically secure pseudorandom number generator
161:
892:
648:
569:
513:
430:
379:
308:
205:
120:
118:
1028:
626:
185:
8:
1035:
1021:
633:
619:
611:
192:
178:
170:
166:
162:
34:A captured JADE machine on display in the
135:References from Japanese Knowledge (XXG)
1003:This cryptography-related article is a
114:
57:given by US codebreakers to a Japanese
7:
993:
991:
27:Japanese World War II cipher machine
1059:World War II Japanese cryptography
1007:. You can help Knowledge (XXG) by
25:
69:using an alphabet of 50 symbols.
995:
968:
967:
829:Information-theoretic security
1:
945:Message authentication code
900:Cryptographic hash function
713:Cryptographic hash function
36:National Cryptologic Museum
1080:
990:
824:Harvest now, decrypt later
963:
940:Post-quantum cryptography
610:
169:
165:
930:Quantum key distribution
920:Authenticated encryption
775:Random number generation
46:Keyboard of Jade machine
925:Public-key cryptography
915:Symmetric-key algorithm
718:Key derivation function
678:Cryptographic primitive
671:Authentication protocol
661:Outline of cryptography
656:History of cryptography
104:— JADE is covered
666:Cryptographic protocol
417:Siemens and Halske T52
63:Imperial Japanese Navy
47:
39:
819:End-to-end encryption
765:Cryptojacking malware
480:Sectéra Secure Module
89:Type B Cipher Machine
83:Type A Cipher Machine
45:
33:
18:JADE (cypher machine)
935:Quantum cryptography
859:Trusted timestamping
584:Intel SHA extensions
61:cipher machine. The
698:Cryptographic nonce
579:AES instruction set
1064:Cryptography stubs
1054:Encryption devices
804:Subliminal channel
788:Pseudorandom noise
735:Key (cryptography)
48:
40:
1016:
1015:
985:
984:
981:
980:
864:Key-based routing
854:Trapdoor function
725:Digital signature
606:
605:
602:
601:
571:Computer hardware
316:Bazeries cylinder
16:(Redirected from
1071:
1037:
1030:
1023:
999:
992:
971:
970:
799:Insecure channel
635:
628:
621:
612:
194:
187:
180:
171:
167:
163:
128:
122:
21:
1079:
1078:
1074:
1073:
1072:
1070:
1069:
1068:
1044:
1043:
1042:
1041:
988:
986:
977:
959:
888:
644:
639:
598:
565:
509:
426:
412:Lorenz SZ 40/42
375:
304:
201:
200:Cipher machines
198:
137:
132:
131:
123:
116:
111:
98:
79:
28:
23:
22:
15:
12:
11:
5:
1077:
1075:
1067:
1066:
1061:
1056:
1046:
1045:
1040:
1039:
1032:
1025:
1017:
1014:
1013:
1000:
983:
982:
979:
978:
976:
975:
964:
961:
960:
958:
957:
952:
950:Random numbers
947:
942:
937:
932:
927:
922:
917:
912:
907:
902:
896:
894:
890:
889:
887:
886:
881:
876:
874:Garlic routing
871:
866:
861:
856:
851:
846:
841:
836:
831:
826:
821:
816:
811:
806:
801:
796:
794:Secure channel
791:
785:
784:
783:
772:
767:
762:
757:
755:Key stretching
752:
747:
742:
737:
732:
727:
722:
721:
720:
715:
705:
703:Cryptovirology
700:
695:
690:
688:Cryptocurrency
685:
680:
675:
674:
673:
663:
658:
652:
650:
646:
645:
640:
638:
637:
630:
623:
615:
608:
607:
604:
603:
600:
599:
597:
596:
591:
586:
581:
575:
573:
567:
566:
564:
563:
558:
553:
548:
543:
538:
533:
528:
523:
517:
515:
511:
510:
508:
507:
502:
497:
492:
487:
482:
477:
472:
467:
462:
457:
452:
447:
442:
436:
434:
428:
427:
425:
424:
419:
414:
409:
404:
399:
394:
389:
383:
381:
377:
376:
374:
373:
368:
366:Reihenschieber
363:
358:
353:
351:Jefferson disk
348:
343:
338:
333:
328:
323:
318:
312:
310:
306:
305:
303:
302:
297:
292:
287:
282:
277:
272:
267:
262:
257:
252:
247:
242:
237:
232:
227:
222:
217:
211:
209:
207:Rotor machines
203:
202:
199:
197:
196:
189:
182:
174:
160:
159:
156:
153:
150:
147:
144:
141:
136:
133:
130:
129:
113:
112:
110:
107:
106:
105:
97:
96:External links
94:
93:
92:
86:
78:
75:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
1076:
1065:
1062:
1060:
1057:
1055:
1052:
1051:
1049:
1038:
1033:
1031:
1026:
1024:
1019:
1018:
1012:
1010:
1006:
1001:
998:
994:
989:
974:
966:
965:
962:
956:
955:Steganography
953:
951:
948:
946:
943:
941:
938:
936:
933:
931:
928:
926:
923:
921:
918:
916:
913:
911:
910:Stream cipher
908:
906:
903:
901:
898:
897:
895:
891:
885:
882:
880:
877:
875:
872:
870:
869:Onion routing
867:
865:
862:
860:
857:
855:
852:
850:
849:Shared secret
847:
845:
842:
840:
837:
835:
832:
830:
827:
825:
822:
820:
817:
815:
812:
810:
807:
805:
802:
800:
797:
795:
792:
789:
786:
781:
778:
777:
776:
773:
771:
768:
766:
763:
761:
758:
756:
753:
751:
748:
746:
745:Key generator
743:
741:
738:
736:
733:
731:
728:
726:
723:
719:
716:
714:
711:
710:
709:
708:Hash function
706:
704:
701:
699:
696:
694:
691:
689:
686:
684:
683:Cryptanalysis
681:
679:
676:
672:
669:
668:
667:
664:
662:
659:
657:
654:
653:
651:
647:
643:
636:
631:
629:
624:
622:
617:
616:
613:
609:
595:
592:
590:
587:
585:
582:
580:
577:
576:
574:
572:
568:
562:
559:
557:
554:
552:
549:
547:
544:
542:
539:
537:
534:
532:
529:
527:
524:
522:
519:
518:
516:
512:
506:
503:
501:
498:
496:
493:
491:
488:
486:
483:
481:
478:
476:
473:
471:
468:
466:
463:
461:
458:
456:
453:
451:
448:
446:
443:
441:
438:
437:
435:
433:
429:
423:
420:
418:
415:
413:
410:
408:
405:
403:
400:
398:
395:
393:
390:
388:
385:
384:
382:
378:
372:
369:
367:
364:
362:
359:
357:
354:
352:
349:
347:
344:
342:
339:
337:
334:
332:
329:
327:
324:
322:
319:
317:
314:
313:
311:
307:
301:
298:
296:
293:
291:
288:
286:
283:
281:
278:
276:
273:
271:
268:
266:
263:
261:
258:
256:
253:
251:
248:
246:
243:
241:
238:
236:
233:
231:
228:
226:
223:
221:
218:
216:
213:
212:
210:
208:
204:
195:
190:
188:
183:
181:
176:
175:
172:
168:
164:
157:
154:
151:
148:
145:
142:
139:
138:
134:
126:
121:
119:
115:
108:
103:
100:
99:
95:
90:
87:
84:
81:
80:
76:
74:
70:
68:
64:
60:
56:
52:
44:
37:
32:
19:
1009:expanding it
1002:
987:
905:Block cipher
750:Key schedule
740:Key exchange
730:Kleptography
693:Cryptosystem
642:Cryptography
520:
432:Secure voice
225:M-125 Fialka
71:
59:World War II
50:
49:
893:Mathematics
884:Mix network
380:Teleprinter
336:Cipher disk
1048:Categories
844:Ciphertext
814:Decryption
809:Encryption
770:Ransomware
445:FASCINATOR
309:Mechanical
109:References
91:("Purple")
834:Plaintext
973:Category
879:Kademlia
839:Codetext
782:(CSPRNG)
594:IBM 4764
589:IBM 4758
556:Pinwheel
77:See also
67:katakana
55:codename
53:was the
649:General
500:STU-III
485:SIGSALY
440:BID 150
392:BID 770
371:Scytale
295:Singlet
255:Mercury
85:("Red")
760:Keygen
561:Rockex
551:Purple
541:Noreen
505:VINSON
495:STU-II
465:NESTOR
422:SIGTOT
290:SIGCUM
285:SIGABA
245:Lacida
230:Hebern
220:Enigma
790:(PRN)
536:KL-51
531:KL-43
526:KG-84
514:Other
460:KY-68
455:KY-58
407:KW-37
402:KW-26
397:DUDEK
387:5-UCO
361:M-209
346:Kryha
331:CD-57
300:Typex
280:SG-41
275:SG-39
250:M-325
235:HX-63
1005:stub
521:JADE
475:SCIP
470:OMNI
450:KY-3
356:M-94
341:HC-9
326:C-52
321:C-36
260:NEMA
240:KL-7
51:JADE
546:Red
490:STE
270:RED
265:OMI
215:CCM
1050::
117:^
1036:e
1029:t
1022:v
1011:.
634:e
627:t
620:v
193:e
186:t
179:v
38:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.