Knowledge (XXG)

JADE (cipher machine)

Source đź“ť

43: 31: 969: 997: 72:
According to the NSA, "apparently, the JADE machine did not stand up to heavy usage in the field, and, after an initial high volume of traffic, it was used much less." While CORAL traffic was also low, an important user was a Japanese representative, Vice Admiral Abe, to an Axis war-planning council
42: 65:
used the machine for communications from late 1942 until 1944. JADE was similar to another cipher machine, CORAL, with the main difference that JADE was used to encipher messages in
949: 779: 140:
Separate Mathematical Sciences Cryptography, Science Inc., 1982, “Deciphering Japanese Machine Cryptography in the United States and Its Theoretical Considerations”, Masataka Kato
474: 191: 632: 1058: 124: 1034: 184: 625: 155:
History of Kitajima Island Naval Forces, "Cryptographic Printing Machine and Thin-Bar Type Replacement Board", Kakuji Ishigami, 1985
828: 177: 618: 1063: 1053: 944: 899: 712: 35: 823: 1027: 939: 570: 489: 30: 929: 919: 774: 254: 479: 125:
https://www.nsa.gov/about/cryptologic-heritage/center-cryptologic-history/pearl-harbor-review/early-japanese/
924: 914: 717: 677: 670: 660: 655: 555: 279: 274: 214: 73:
whose reports coded in CORAL were intercepted and proved vital to Allied planning in the European theater.
665: 416: 62: 972: 818: 764: 550: 545: 325: 320: 88: 82: 1020: 934: 858: 583: 269: 229: 697: 578: 464: 803: 787: 734: 143:
Machine Cryptography and Modern Cryptanalysis, Cipher A. Deavours, Louis Kruh, ARTECH HOUSE, 1985
101: 863: 853: 724: 1004: 158:"A review of correspondence warfare and correspondence warfare measures", Yoshio Nakano, 1955 798: 264: 873: 793: 754: 702: 687: 365: 350: 315: 259: 219: 1047: 954: 909: 868: 848: 744: 707: 682: 411: 206: 17: 904: 749: 739: 729: 692: 641: 431: 58: 883: 469: 335: 843: 813: 808: 769: 444: 149:"Naval Operational Communication History", Guard Corps School of Art, Showa 28 833: 996: 878: 838: 593: 588: 66: 54: 499: 484: 439: 391: 370: 759: 560: 540: 504: 494: 421: 294: 289: 284: 244: 224: 535: 530: 525: 459: 454: 406: 401: 396: 386: 360: 345: 330: 299: 249: 234: 41: 29: 152:"Shin Takayama Tore 128," Miyauchi Kanto, Rokuko Publishing, 1975 449: 355: 340: 239: 614: 173: 102:
TENTATIVE LIST OF ENIGMA AND OTHER MACHINE USAGES 30 March 1945
127:
Early Japanese Systems NSA Center for Cryptologic History
146:
BIG MACHINES, Stephen J. Kelley, Aegean Park Press, 2001
1008: 780:
Cryptographically secure pseudorandom number generator
161: 892: 648: 569: 513: 430: 379: 308: 205: 120: 118: 1028: 626: 185: 8: 1035: 1021: 633: 619: 611: 192: 178: 170: 166: 162: 34:A captured JADE machine on display in the 135:References from Japanese Knowledge (XXG) 1003:This cryptography-related article is a 114: 57:given by US codebreakers to a Japanese 7: 993: 991: 27:Japanese World War II cipher machine 1059:World War II Japanese cryptography 1007:. You can help Knowledge (XXG) by 25: 69:using an alphabet of 50 symbols. 995: 968: 967: 829:Information-theoretic security 1: 945:Message authentication code 900:Cryptographic hash function 713:Cryptographic hash function 36:National Cryptologic Museum 1080: 990: 824:Harvest now, decrypt later 963: 940:Post-quantum cryptography 610: 169: 165: 930:Quantum key distribution 920:Authenticated encryption 775:Random number generation 46:Keyboard of Jade machine 925:Public-key cryptography 915:Symmetric-key algorithm 718:Key derivation function 678:Cryptographic primitive 671:Authentication protocol 661:Outline of cryptography 656:History of cryptography 104:— JADE is covered 666:Cryptographic protocol 417:Siemens and Halske T52 63:Imperial Japanese Navy 47: 39: 819:End-to-end encryption 765:Cryptojacking malware 480:SectĂ©ra Secure Module 89:Type B Cipher Machine 83:Type A Cipher Machine 45: 33: 18:JADE (cypher machine) 935:Quantum cryptography 859:Trusted timestamping 584:Intel SHA extensions 61:cipher machine. The 698:Cryptographic nonce 579:AES instruction set 1064:Cryptography stubs 1054:Encryption devices 804:Subliminal channel 788:Pseudorandom noise 735:Key (cryptography) 48: 40: 1016: 1015: 985: 984: 981: 980: 864:Key-based routing 854:Trapdoor function 725:Digital signature 606: 605: 602: 601: 571:Computer hardware 316:Bazeries cylinder 16:(Redirected from 1071: 1037: 1030: 1023: 999: 992: 971: 970: 799:Insecure channel 635: 628: 621: 612: 194: 187: 180: 171: 167: 163: 128: 122: 21: 1079: 1078: 1074: 1073: 1072: 1070: 1069: 1068: 1044: 1043: 1042: 1041: 988: 986: 977: 959: 888: 644: 639: 598: 565: 509: 426: 412:Lorenz SZ 40/42 375: 304: 201: 200:Cipher machines 198: 137: 132: 131: 123: 116: 111: 98: 79: 28: 23: 22: 15: 12: 11: 5: 1077: 1075: 1067: 1066: 1061: 1056: 1046: 1045: 1040: 1039: 1032: 1025: 1017: 1014: 1013: 1000: 983: 982: 979: 978: 976: 975: 964: 961: 960: 958: 957: 952: 950:Random numbers 947: 942: 937: 932: 927: 922: 917: 912: 907: 902: 896: 894: 890: 889: 887: 886: 881: 876: 874:Garlic routing 871: 866: 861: 856: 851: 846: 841: 836: 831: 826: 821: 816: 811: 806: 801: 796: 794:Secure channel 791: 785: 784: 783: 772: 767: 762: 757: 755:Key stretching 752: 747: 742: 737: 732: 727: 722: 721: 720: 715: 705: 703:Cryptovirology 700: 695: 690: 688:Cryptocurrency 685: 680: 675: 674: 673: 663: 658: 652: 650: 646: 645: 640: 638: 637: 630: 623: 615: 608: 607: 604: 603: 600: 599: 597: 596: 591: 586: 581: 575: 573: 567: 566: 564: 563: 558: 553: 548: 543: 538: 533: 528: 523: 517: 515: 511: 510: 508: 507: 502: 497: 492: 487: 482: 477: 472: 467: 462: 457: 452: 447: 442: 436: 434: 428: 427: 425: 424: 419: 414: 409: 404: 399: 394: 389: 383: 381: 377: 376: 374: 373: 368: 366:Reihenschieber 363: 358: 353: 351:Jefferson disk 348: 343: 338: 333: 328: 323: 318: 312: 310: 306: 305: 303: 302: 297: 292: 287: 282: 277: 272: 267: 262: 257: 252: 247: 242: 237: 232: 227: 222: 217: 211: 209: 207:Rotor machines 203: 202: 199: 197: 196: 189: 182: 174: 160: 159: 156: 153: 150: 147: 144: 141: 136: 133: 130: 129: 113: 112: 110: 107: 106: 105: 97: 96:External links 94: 93: 92: 86: 78: 75: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1076: 1065: 1062: 1060: 1057: 1055: 1052: 1051: 1049: 1038: 1033: 1031: 1026: 1024: 1019: 1018: 1012: 1010: 1006: 1001: 998: 994: 989: 974: 966: 965: 962: 956: 955:Steganography 953: 951: 948: 946: 943: 941: 938: 936: 933: 931: 928: 926: 923: 921: 918: 916: 913: 911: 910:Stream cipher 908: 906: 903: 901: 898: 897: 895: 891: 885: 882: 880: 877: 875: 872: 870: 869:Onion routing 867: 865: 862: 860: 857: 855: 852: 850: 849:Shared secret 847: 845: 842: 840: 837: 835: 832: 830: 827: 825: 822: 820: 817: 815: 812: 810: 807: 805: 802: 800: 797: 795: 792: 789: 786: 781: 778: 777: 776: 773: 771: 768: 766: 763: 761: 758: 756: 753: 751: 748: 746: 745:Key generator 743: 741: 738: 736: 733: 731: 728: 726: 723: 719: 716: 714: 711: 710: 709: 708:Hash function 706: 704: 701: 699: 696: 694: 691: 689: 686: 684: 683:Cryptanalysis 681: 679: 676: 672: 669: 668: 667: 664: 662: 659: 657: 654: 653: 651: 647: 643: 636: 631: 629: 624: 622: 617: 616: 613: 609: 595: 592: 590: 587: 585: 582: 580: 577: 576: 574: 572: 568: 562: 559: 557: 554: 552: 549: 547: 544: 542: 539: 537: 534: 532: 529: 527: 524: 522: 519: 518: 516: 512: 506: 503: 501: 498: 496: 493: 491: 488: 486: 483: 481: 478: 476: 473: 471: 468: 466: 463: 461: 458: 456: 453: 451: 448: 446: 443: 441: 438: 437: 435: 433: 429: 423: 420: 418: 415: 413: 410: 408: 405: 403: 400: 398: 395: 393: 390: 388: 385: 384: 382: 378: 372: 369: 367: 364: 362: 359: 357: 354: 352: 349: 347: 344: 342: 339: 337: 334: 332: 329: 327: 324: 322: 319: 317: 314: 313: 311: 307: 301: 298: 296: 293: 291: 288: 286: 283: 281: 278: 276: 273: 271: 268: 266: 263: 261: 258: 256: 253: 251: 248: 246: 243: 241: 238: 236: 233: 231: 228: 226: 223: 221: 218: 216: 213: 212: 210: 208: 204: 195: 190: 188: 183: 181: 176: 175: 172: 168: 164: 157: 154: 151: 148: 145: 142: 139: 138: 134: 126: 121: 119: 115: 108: 103: 100: 99: 95: 90: 87: 84: 81: 80: 76: 74: 70: 68: 64: 60: 56: 52: 44: 37: 32: 19: 1009:expanding it 1002: 987: 905:Block cipher 750:Key schedule 740:Key exchange 730:Kleptography 693:Cryptosystem 642:Cryptography 520: 432:Secure voice 225:M-125 Fialka 71: 59:World War II 50: 49: 893:Mathematics 884:Mix network 380:Teleprinter 336:Cipher disk 1048:Categories 844:Ciphertext 814:Decryption 809:Encryption 770:Ransomware 445:FASCINATOR 309:Mechanical 109:References 91:("Purple") 834:Plaintext 973:Category 879:Kademlia 839:Codetext 782:(CSPRNG) 594:IBM 4764 589:IBM 4758 556:Pinwheel 77:See also 67:katakana 55:codename 53:was the 649:General 500:STU-III 485:SIGSALY 440:BID 150 392:BID 770 371:Scytale 295:Singlet 255:Mercury 85:("Red") 760:Keygen 561:Rockex 551:Purple 541:Noreen 505:VINSON 495:STU-II 465:NESTOR 422:SIGTOT 290:SIGCUM 285:SIGABA 245:Lacida 230:Hebern 220:Enigma 790:(PRN) 536:KL-51 531:KL-43 526:KG-84 514:Other 460:KY-68 455:KY-58 407:KW-37 402:KW-26 397:DUDEK 387:5-UCO 361:M-209 346:Kryha 331:CD-57 300:Typex 280:SG-41 275:SG-39 250:M-325 235:HX-63 1005:stub 521:JADE 475:SCIP 470:OMNI 450:KY-3 356:M-94 341:HC-9 326:C-52 321:C-36 260:NEMA 240:KL-7 51:JADE 546:Red 490:STE 270:RED 265:OMI 215:CCM 1050:: 117:^ 1036:e 1029:t 1022:v 1011:. 634:e 627:t 620:v 193:e 186:t 179:v 38:. 20:)

Index

JADE (cypher machine)

National Cryptologic Museum

codename
World War II
Imperial Japanese Navy
katakana
Type A Cipher Machine
Type B Cipher Machine
TENTATIVE LIST OF ENIGMA AND OTHER MACHINE USAGES 30 March 1945


https://www.nsa.gov/about/cryptologic-heritage/center-cryptologic-history/pearl-harbor-review/early-japanese/
v
t
e
Rotor machines
CCM
Enigma
M-125 Fialka
Hebern
HX-63
KL-7
Lacida
M-325
Mercury
NEMA
OMI
RED

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑