Knowledge (XXG)

JADE (cipher machine)

Source đź“ť

32: 20: 958: 986: 61:
According to the NSA, "apparently, the JADE machine did not stand up to heavy usage in the field, and, after an initial high volume of traffic, it was used much less." While CORAL traffic was also low, an important user was a Japanese representative, Vice Admiral Abe, to an Axis war-planning council
31: 54:
used the machine for communications from late 1942 until 1944. JADE was similar to another cipher machine, CORAL, with the main difference that JADE was used to encipher messages in
938: 768: 129:
Separate Mathematical Sciences Cryptography, Science Inc., 1982, “Deciphering Japanese Machine Cryptography in the United States and Its Theoretical Considerations”, Masataka Kato
463: 180: 621: 1047: 113: 1023: 173: 614: 144:
History of Kitajima Island Naval Forces, "Cryptographic Printing Machine and Thin-Bar Type Replacement Board", Kakuji Ishigami, 1985
817: 166: 607: 1052: 1042: 933: 888: 701: 24: 812: 1016: 928: 559: 478: 19: 918: 908: 763: 243: 468: 114:
https://www.nsa.gov/about/cryptologic-heritage/center-cryptologic-history/pearl-harbor-review/early-japanese/
913: 903: 706: 666: 659: 649: 644: 544: 268: 263: 203: 62:
whose reports coded in CORAL were intercepted and proved vital to Allied planning in the European theater.
654: 405: 51: 961: 807: 753: 539: 534: 314: 309: 77: 71: 1009: 923: 847: 572: 258: 218: 686: 567: 453: 792: 776: 723: 132:
Machine Cryptography and Modern Cryptanalysis, Cipher A. Deavours, Louis Kruh, ARTECH HOUSE, 1985
90: 852: 842: 713: 993: 147:"A review of correspondence warfare and correspondence warfare measures", Yoshio Nakano, 1955 787: 253: 862: 782: 743: 691: 676: 354: 339: 304: 248: 208: 1036: 943: 898: 857: 837: 733: 696: 671: 400: 195: 893: 738: 728: 718: 681: 630: 420: 47: 872: 458: 324: 832: 802: 797: 758: 433: 138:"Naval Operational Communication History", Guard Corps School of Art, Showa 28 822: 985: 867: 827: 582: 577: 55: 43: 488: 473: 428: 380: 359: 748: 549: 529: 493: 483: 410: 283: 278: 273: 233: 213: 524: 519: 514: 448: 443: 395: 390: 385: 375: 349: 334: 319: 288: 238: 223: 30: 18: 141:"Shin Takayama Tore 128," Miyauchi Kanto, Rokuko Publishing, 1975 438: 344: 329: 228: 603: 162: 91:
TENTATIVE LIST OF ENIGMA AND OTHER MACHINE USAGES 30 March 1945
116:
Early Japanese Systems NSA Center for Cryptologic History
135:
BIG MACHINES, Stephen J. Kelley, Aegean Park Press, 2001
997: 769:
Cryptographically secure pseudorandom number generator
150: 881: 637: 558: 502: 419: 368: 297: 194: 109: 107: 1017: 615: 174: 8: 1024: 1010: 622: 608: 600: 181: 167: 159: 155: 151: 23:A captured JADE machine on display in the 124:References from Japanese Knowledge (XXG) 992:This cryptography-related article is a 103: 46:given by US codebreakers to a Japanese 7: 982: 980: 16:Japanese World War II cipher machine 1048:World War II Japanese cryptography 996:. You can help Knowledge (XXG) by 14: 58:using an alphabet of 50 symbols. 984: 957: 956: 818:Information-theoretic security 1: 934:Message authentication code 889:Cryptographic hash function 702:Cryptographic hash function 25:National Cryptologic Museum 1069: 979: 813:Harvest now, decrypt later 952: 929:Post-quantum cryptography 599: 158: 154: 919:Quantum key distribution 909:Authenticated encryption 764:Random number generation 35:Keyboard of Jade machine 914:Public-key cryptography 904:Symmetric-key algorithm 707:Key derivation function 667:Cryptographic primitive 660:Authentication protocol 650:Outline of cryptography 645:History of cryptography 93:— JADE is covered 655:Cryptographic protocol 406:Siemens and Halske T52 52:Imperial Japanese Navy 36: 28: 808:End-to-end encryption 754:Cryptojacking malware 469:SectĂ©ra Secure Module 78:Type B Cipher Machine 72:Type A Cipher Machine 34: 22: 924:Quantum cryptography 848:Trusted timestamping 573:Intel SHA extensions 50:cipher machine. The 687:Cryptographic nonce 568:AES instruction set 1053:Cryptography stubs 1043:Encryption devices 793:Subliminal channel 777:Pseudorandom noise 724:Key (cryptography) 37: 29: 1005: 1004: 974: 973: 970: 969: 853:Key-based routing 843:Trapdoor function 714:Digital signature 595: 594: 591: 590: 560:Computer hardware 305:Bazeries cylinder 1060: 1026: 1019: 1012: 988: 981: 960: 959: 788:Insecure channel 624: 617: 610: 601: 183: 176: 169: 160: 156: 152: 117: 111: 1068: 1067: 1063: 1062: 1061: 1059: 1058: 1057: 1033: 1032: 1031: 1030: 977: 975: 966: 948: 877: 633: 628: 587: 554: 498: 415: 401:Lorenz SZ 40/42 364: 293: 190: 189:Cipher machines 187: 126: 121: 120: 112: 105: 100: 87: 68: 17: 12: 11: 5: 1066: 1064: 1056: 1055: 1050: 1045: 1035: 1034: 1029: 1028: 1021: 1014: 1006: 1003: 1002: 989: 972: 971: 968: 967: 965: 964: 953: 950: 949: 947: 946: 941: 939:Random numbers 936: 931: 926: 921: 916: 911: 906: 901: 896: 891: 885: 883: 879: 878: 876: 875: 870: 865: 863:Garlic routing 860: 855: 850: 845: 840: 835: 830: 825: 820: 815: 810: 805: 800: 795: 790: 785: 783:Secure channel 780: 774: 773: 772: 761: 756: 751: 746: 744:Key stretching 741: 736: 731: 726: 721: 716: 711: 710: 709: 704: 694: 692:Cryptovirology 689: 684: 679: 677:Cryptocurrency 674: 669: 664: 663: 662: 652: 647: 641: 639: 635: 634: 629: 627: 626: 619: 612: 604: 597: 596: 593: 592: 589: 588: 586: 585: 580: 575: 570: 564: 562: 556: 555: 553: 552: 547: 542: 537: 532: 527: 522: 517: 512: 506: 504: 500: 499: 497: 496: 491: 486: 481: 476: 471: 466: 461: 456: 451: 446: 441: 436: 431: 425: 423: 417: 416: 414: 413: 408: 403: 398: 393: 388: 383: 378: 372: 370: 366: 365: 363: 362: 357: 355:Reihenschieber 352: 347: 342: 340:Jefferson disk 337: 332: 327: 322: 317: 312: 307: 301: 299: 295: 294: 292: 291: 286: 281: 276: 271: 266: 261: 256: 251: 246: 241: 236: 231: 226: 221: 216: 211: 206: 200: 198: 196:Rotor machines 192: 191: 188: 186: 185: 178: 171: 163: 149: 148: 145: 142: 139: 136: 133: 130: 125: 122: 119: 118: 102: 101: 99: 96: 95: 94: 86: 85:External links 83: 82: 81: 75: 67: 64: 15: 13: 10: 9: 6: 4: 3: 2: 1065: 1054: 1051: 1049: 1046: 1044: 1041: 1040: 1038: 1027: 1022: 1020: 1015: 1013: 1008: 1007: 1001: 999: 995: 990: 987: 983: 978: 963: 955: 954: 951: 945: 944:Steganography 942: 940: 937: 935: 932: 930: 927: 925: 922: 920: 917: 915: 912: 910: 907: 905: 902: 900: 899:Stream cipher 897: 895: 892: 890: 887: 886: 884: 880: 874: 871: 869: 866: 864: 861: 859: 858:Onion routing 856: 854: 851: 849: 846: 844: 841: 839: 838:Shared secret 836: 834: 831: 829: 826: 824: 821: 819: 816: 814: 811: 809: 806: 804: 801: 799: 796: 794: 791: 789: 786: 784: 781: 778: 775: 770: 767: 766: 765: 762: 760: 757: 755: 752: 750: 747: 745: 742: 740: 737: 735: 734:Key generator 732: 730: 727: 725: 722: 720: 717: 715: 712: 708: 705: 703: 700: 699: 698: 697:Hash function 695: 693: 690: 688: 685: 683: 680: 678: 675: 673: 672:Cryptanalysis 670: 668: 665: 661: 658: 657: 656: 653: 651: 648: 646: 643: 642: 640: 636: 632: 625: 620: 618: 613: 611: 606: 605: 602: 598: 584: 581: 579: 576: 574: 571: 569: 566: 565: 563: 561: 557: 551: 548: 546: 543: 541: 538: 536: 533: 531: 528: 526: 523: 521: 518: 516: 513: 511: 508: 507: 505: 501: 495: 492: 490: 487: 485: 482: 480: 477: 475: 472: 470: 467: 465: 462: 460: 457: 455: 452: 450: 447: 445: 442: 440: 437: 435: 432: 430: 427: 426: 424: 422: 418: 412: 409: 407: 404: 402: 399: 397: 394: 392: 389: 387: 384: 382: 379: 377: 374: 373: 371: 367: 361: 358: 356: 353: 351: 348: 346: 343: 341: 338: 336: 333: 331: 328: 326: 323: 321: 318: 316: 313: 311: 308: 306: 303: 302: 300: 296: 290: 287: 285: 282: 280: 277: 275: 272: 270: 267: 265: 262: 260: 257: 255: 252: 250: 247: 245: 242: 240: 237: 235: 232: 230: 227: 225: 222: 220: 217: 215: 212: 210: 207: 205: 202: 201: 199: 197: 193: 184: 179: 177: 172: 170: 165: 164: 161: 157: 153: 146: 143: 140: 137: 134: 131: 128: 127: 123: 115: 110: 108: 104: 97: 92: 89: 88: 84: 79: 76: 73: 70: 69: 65: 63: 59: 57: 53: 49: 45: 41: 33: 26: 21: 998:expanding it 991: 976: 894:Block cipher 739:Key schedule 729:Key exchange 719:Kleptography 682:Cryptosystem 631:Cryptography 509: 421:Secure voice 214:M-125 Fialka 60: 48:World War II 39: 38: 882:Mathematics 873:Mix network 369:Teleprinter 325:Cipher disk 1037:Categories 833:Ciphertext 803:Decryption 798:Encryption 759:Ransomware 434:FASCINATOR 298:Mechanical 98:References 80:("Purple") 823:Plaintext 962:Category 868:Kademlia 828:Codetext 771:(CSPRNG) 583:IBM 4764 578:IBM 4758 545:Pinwheel 66:See also 56:katakana 44:codename 42:was the 638:General 489:STU-III 474:SIGSALY 429:BID 150 381:BID 770 360:Scytale 284:Singlet 244:Mercury 74:("Red") 749:Keygen 550:Rockex 540:Purple 530:Noreen 494:VINSON 484:STU-II 454:NESTOR 411:SIGTOT 279:SIGCUM 274:SIGABA 234:Lacida 219:Hebern 209:Enigma 779:(PRN) 525:KL-51 520:KL-43 515:KG-84 503:Other 449:KY-68 444:KY-58 396:KW-37 391:KW-26 386:DUDEK 376:5-UCO 350:M-209 335:Kryha 320:CD-57 289:Typex 269:SG-41 264:SG-39 239:M-325 224:HX-63 994:stub 510:JADE 464:SCIP 459:OMNI 439:KY-3 345:M-94 330:HC-9 315:C-52 310:C-36 249:NEMA 229:KL-7 40:JADE 535:Red 479:STE 259:RED 254:OMI 204:CCM 1039:: 106:^ 1025:e 1018:t 1011:v 1000:. 623:e 616:t 609:v 182:e 175:t 168:v 27:.

Index


National Cryptologic Museum

codename
World War II
Imperial Japanese Navy
katakana
Type A Cipher Machine
Type B Cipher Machine
TENTATIVE LIST OF ENIGMA AND OTHER MACHINE USAGES 30 March 1945


https://www.nsa.gov/about/cryptologic-heritage/center-cryptologic-history/pearl-harbor-review/early-japanese/
v
t
e
Rotor machines
CCM
Enigma
M-125 Fialka
Hebern
HX-63
KL-7
Lacida
M-325
Mercury
NEMA
OMI
RED
SG-39

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑