32:
20:
958:
986:
61:
According to the NSA, "apparently, the JADE machine did not stand up to heavy usage in the field, and, after an initial high volume of traffic, it was used much less." While CORAL traffic was also low, an important user was a
Japanese representative, Vice Admiral Abe, to an Axis war-planning council
31:
54:
used the machine for communications from late 1942 until 1944. JADE was similar to another cipher machine, CORAL, with the main difference that JADE was used to encipher messages in
938:
768:
129:
Separate
Mathematical Sciences Cryptography, Science Inc., 1982, “Deciphering Japanese Machine Cryptography in the United States and Its Theoretical Considerations”, Masataka Kato
463:
180:
621:
1047:
113:
1023:
173:
614:
144:
History of
Kitajima Island Naval Forces, "Cryptographic Printing Machine and Thin-Bar Type Replacement Board", Kakuji Ishigami, 1985
817:
166:
607:
1052:
1042:
933:
888:
701:
24:
812:
1016:
928:
559:
478:
19:
918:
908:
763:
243:
468:
114:
https://www.nsa.gov/about/cryptologic-heritage/center-cryptologic-history/pearl-harbor-review/early-japanese/
913:
903:
706:
666:
659:
649:
644:
544:
268:
263:
203:
62:
whose reports coded in CORAL were intercepted and proved vital to Allied planning in the
European theater.
654:
405:
51:
961:
807:
753:
539:
534:
314:
309:
77:
71:
1009:
923:
847:
572:
258:
218:
686:
567:
453:
792:
776:
723:
132:
Machine
Cryptography and Modern Cryptanalysis, Cipher A. Deavours, Louis Kruh, ARTECH HOUSE, 1985
90:
852:
842:
713:
993:
147:"A review of correspondence warfare and correspondence warfare measures", Yoshio Nakano, 1955
787:
253:
862:
782:
743:
691:
676:
354:
339:
304:
248:
208:
1036:
943:
898:
857:
837:
733:
696:
671:
400:
195:
893:
738:
728:
718:
681:
630:
420:
47:
872:
458:
324:
832:
802:
797:
758:
433:
138:"Naval Operational Communication History", Guard Corps School of Art, Showa 28
822:
985:
867:
827:
582:
577:
55:
43:
488:
473:
428:
380:
359:
748:
549:
529:
493:
483:
410:
283:
278:
273:
233:
213:
524:
519:
514:
448:
443:
395:
390:
385:
375:
349:
334:
319:
288:
238:
223:
30:
18:
141:"Shin Takayama Tore 128," Miyauchi Kanto, Rokuko Publishing, 1975
438:
344:
329:
228:
603:
162:
91:
TENTATIVE LIST OF ENIGMA AND OTHER MACHINE USAGES 30 March 1945
116:
Early
Japanese Systems NSA Center for Cryptologic History
135:
BIG MACHINES, Stephen J. Kelley, Aegean Park Press, 2001
997:
769:
Cryptographically secure pseudorandom number generator
150:
881:
637:
558:
502:
419:
368:
297:
194:
109:
107:
1017:
615:
174:
8:
1024:
1010:
622:
608:
600:
181:
167:
159:
155:
151:
23:A captured JADE machine on display in the
124:References from Japanese Knowledge (XXG)
992:This cryptography-related article is a
103:
46:given by US codebreakers to a Japanese
7:
982:
980:
16:Japanese World War II cipher machine
1048:World War II Japanese cryptography
996:. You can help Knowledge (XXG) by
14:
58:using an alphabet of 50 symbols.
984:
957:
956:
818:Information-theoretic security
1:
934:Message authentication code
889:Cryptographic hash function
702:Cryptographic hash function
25:National Cryptologic Museum
1069:
979:
813:Harvest now, decrypt later
952:
929:Post-quantum cryptography
599:
158:
154:
919:Quantum key distribution
909:Authenticated encryption
764:Random number generation
35:Keyboard of Jade machine
914:Public-key cryptography
904:Symmetric-key algorithm
707:Key derivation function
667:Cryptographic primitive
660:Authentication protocol
650:Outline of cryptography
645:History of cryptography
93:— JADE is covered
655:Cryptographic protocol
406:Siemens and Halske T52
52:Imperial Japanese Navy
36:
28:
808:End-to-end encryption
754:Cryptojacking malware
469:Sectéra Secure Module
78:Type B Cipher Machine
72:Type A Cipher Machine
34:
22:
924:Quantum cryptography
848:Trusted timestamping
573:Intel SHA extensions
50:cipher machine. The
687:Cryptographic nonce
568:AES instruction set
1053:Cryptography stubs
1043:Encryption devices
793:Subliminal channel
777:Pseudorandom noise
724:Key (cryptography)
37:
29:
1005:
1004:
974:
973:
970:
969:
853:Key-based routing
843:Trapdoor function
714:Digital signature
595:
594:
591:
590:
560:Computer hardware
305:Bazeries cylinder
1060:
1026:
1019:
1012:
988:
981:
960:
959:
788:Insecure channel
624:
617:
610:
601:
183:
176:
169:
160:
156:
152:
117:
111:
1068:
1067:
1063:
1062:
1061:
1059:
1058:
1057:
1033:
1032:
1031:
1030:
977:
975:
966:
948:
877:
633:
628:
587:
554:
498:
415:
401:Lorenz SZ 40/42
364:
293:
190:
189:Cipher machines
187:
126:
121:
120:
112:
105:
100:
87:
68:
17:
12:
11:
5:
1066:
1064:
1056:
1055:
1050:
1045:
1035:
1034:
1029:
1028:
1021:
1014:
1006:
1003:
1002:
989:
972:
971:
968:
967:
965:
964:
953:
950:
949:
947:
946:
941:
939:Random numbers
936:
931:
926:
921:
916:
911:
906:
901:
896:
891:
885:
883:
879:
878:
876:
875:
870:
865:
863:Garlic routing
860:
855:
850:
845:
840:
835:
830:
825:
820:
815:
810:
805:
800:
795:
790:
785:
783:Secure channel
780:
774:
773:
772:
761:
756:
751:
746:
744:Key stretching
741:
736:
731:
726:
721:
716:
711:
710:
709:
704:
694:
692:Cryptovirology
689:
684:
679:
677:Cryptocurrency
674:
669:
664:
663:
662:
652:
647:
641:
639:
635:
634:
629:
627:
626:
619:
612:
604:
597:
596:
593:
592:
589:
588:
586:
585:
580:
575:
570:
564:
562:
556:
555:
553:
552:
547:
542:
537:
532:
527:
522:
517:
512:
506:
504:
500:
499:
497:
496:
491:
486:
481:
476:
471:
466:
461:
456:
451:
446:
441:
436:
431:
425:
423:
417:
416:
414:
413:
408:
403:
398:
393:
388:
383:
378:
372:
370:
366:
365:
363:
362:
357:
355:Reihenschieber
352:
347:
342:
340:Jefferson disk
337:
332:
327:
322:
317:
312:
307:
301:
299:
295:
294:
292:
291:
286:
281:
276:
271:
266:
261:
256:
251:
246:
241:
236:
231:
226:
221:
216:
211:
206:
200:
198:
196:Rotor machines
192:
191:
188:
186:
185:
178:
171:
163:
149:
148:
145:
142:
139:
136:
133:
130:
125:
122:
119:
118:
102:
101:
99:
96:
95:
94:
86:
85:External links
83:
82:
81:
75:
67:
64:
15:
13:
10:
9:
6:
4:
3:
2:
1065:
1054:
1051:
1049:
1046:
1044:
1041:
1040:
1038:
1027:
1022:
1020:
1015:
1013:
1008:
1007:
1001:
999:
995:
990:
987:
983:
978:
963:
955:
954:
951:
945:
944:Steganography
942:
940:
937:
935:
932:
930:
927:
925:
922:
920:
917:
915:
912:
910:
907:
905:
902:
900:
899:Stream cipher
897:
895:
892:
890:
887:
886:
884:
880:
874:
871:
869:
866:
864:
861:
859:
858:Onion routing
856:
854:
851:
849:
846:
844:
841:
839:
838:Shared secret
836:
834:
831:
829:
826:
824:
821:
819:
816:
814:
811:
809:
806:
804:
801:
799:
796:
794:
791:
789:
786:
784:
781:
778:
775:
770:
767:
766:
765:
762:
760:
757:
755:
752:
750:
747:
745:
742:
740:
737:
735:
734:Key generator
732:
730:
727:
725:
722:
720:
717:
715:
712:
708:
705:
703:
700:
699:
698:
697:Hash function
695:
693:
690:
688:
685:
683:
680:
678:
675:
673:
672:Cryptanalysis
670:
668:
665:
661:
658:
657:
656:
653:
651:
648:
646:
643:
642:
640:
636:
632:
625:
620:
618:
613:
611:
606:
605:
602:
598:
584:
581:
579:
576:
574:
571:
569:
566:
565:
563:
561:
557:
551:
548:
546:
543:
541:
538:
536:
533:
531:
528:
526:
523:
521:
518:
516:
513:
511:
508:
507:
505:
501:
495:
492:
490:
487:
485:
482:
480:
477:
475:
472:
470:
467:
465:
462:
460:
457:
455:
452:
450:
447:
445:
442:
440:
437:
435:
432:
430:
427:
426:
424:
422:
418:
412:
409:
407:
404:
402:
399:
397:
394:
392:
389:
387:
384:
382:
379:
377:
374:
373:
371:
367:
361:
358:
356:
353:
351:
348:
346:
343:
341:
338:
336:
333:
331:
328:
326:
323:
321:
318:
316:
313:
311:
308:
306:
303:
302:
300:
296:
290:
287:
285:
282:
280:
277:
275:
272:
270:
267:
265:
262:
260:
257:
255:
252:
250:
247:
245:
242:
240:
237:
235:
232:
230:
227:
225:
222:
220:
217:
215:
212:
210:
207:
205:
202:
201:
199:
197:
193:
184:
179:
177:
172:
170:
165:
164:
161:
157:
153:
146:
143:
140:
137:
134:
131:
128:
127:
123:
115:
110:
108:
104:
97:
92:
89:
88:
84:
79:
76:
73:
70:
69:
65:
63:
59:
57:
53:
49:
45:
41:
33:
26:
21:
998:expanding it
991:
976:
894:Block cipher
739:Key schedule
729:Key exchange
719:Kleptography
682:Cryptosystem
631:Cryptography
509:
421:Secure voice
214:M-125 Fialka
60:
48:World War II
39:
38:
882:Mathematics
873:Mix network
369:Teleprinter
325:Cipher disk
1037:Categories
833:Ciphertext
803:Decryption
798:Encryption
759:Ransomware
434:FASCINATOR
298:Mechanical
98:References
80:("Purple")
823:Plaintext
962:Category
868:Kademlia
828:Codetext
771:(CSPRNG)
583:IBM 4764
578:IBM 4758
545:Pinwheel
66:See also
56:katakana
44:codename
42:was the
638:General
489:STU-III
474:SIGSALY
429:BID 150
381:BID 770
360:Scytale
284:Singlet
244:Mercury
74:("Red")
749:Keygen
550:Rockex
540:Purple
530:Noreen
494:VINSON
484:STU-II
454:NESTOR
411:SIGTOT
279:SIGCUM
274:SIGABA
234:Lacida
219:Hebern
209:Enigma
779:(PRN)
525:KL-51
520:KL-43
515:KG-84
503:Other
449:KY-68
444:KY-58
396:KW-37
391:KW-26
386:DUDEK
376:5-UCO
350:M-209
335:Kryha
320:CD-57
289:Typex
269:SG-41
264:SG-39
239:M-325
224:HX-63
994:stub
510:JADE
464:SCIP
459:OMNI
439:KY-3
345:M-94
330:HC-9
315:C-52
310:C-36
249:NEMA
229:KL-7
40:JADE
535:Red
479:STE
259:RED
254:OMI
204:CCM
1039::
106:^
1025:e
1018:t
1011:v
1000:.
623:e
616:t
609:v
182:e
175:t
168:v
27:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.