• The Japanese M-1 cipher machine was a mechanical device the Japanese used for performing cryptography sometime during the 1930s. More specifically it was...
    826 bytes (80 words) - 22:48, 27 September 2021
  • Thumbnail for Type B Cipher Machine
    ōbun injiki) or "Type B Cipher Machine", codenamed Purple by the United States, was an encryption machine used by the Japanese Foreign Office from February...
    31 KB (3,931 words) - 14:58, 29 January 2025
  • Thumbnail for Enigma machine
    The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication...
    93 KB (11,280 words) - 19:30, 25 May 2025
  • Thumbnail for Type A Cipher Machine
    (暗号機 タイプA, "Type A Cipher Machine"), codenamed Red by the United States, was a diplomatic cryptographic machine used by the Japanese Foreign Office before...
    9 KB (1,108 words) - 19:27, 6 March 2025
  • Thumbnail for Agnes Meyer Driscoll
    attack on the Japanese M-1 cipher machine (also known to the U.S. as the ORANGE machine), which was used to encrypt the messages of Japanese naval attaches...
    15 KB (1,572 words) - 17:14, 26 March 2025
  • Thumbnail for Transposition cipher
    In cryptography, a transposition cipher (also known as a permutation cipher) is a method of encryption which scrambles the positions of characters (transposition)...
    27 KB (3,838 words) - 16:24, 25 May 2025
  • Thumbnail for Code Girls
    Driscoll – broke the Japanese M-1 cipher machine Genevieve Grotjan Feinstein – found the crucial break in the Japanese Purple cipher Elizebeth Smith Friedman...
    17 KB (2,170 words) - 21:34, 4 May 2025
  • Japan. The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project. The cipher has security...
    18 KB (1,805 words) - 02:28, 19 April 2025
  • Thumbnail for Rotor machine
    cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting messages. Rotor machines were the cryptographic...
    17 KB (2,462 words) - 12:35, 29 November 2024
  • Thumbnail for Cryptanalysis of the Enigma
    transmissions, was given the codename Ultra. The Enigma machines were a family of portable cipher machines with rotor scramblers. Good operating procedures,...
    139 KB (17,820 words) - 04:38, 15 May 2025
  • Thumbnail for SIGABA
    SIGABA (redirect from M-134-C)
    the ECM Mark II was a cipher machine used by the United States for message encryption from World War II until the 1950s. The machine was also known as the...
    20 KB (2,712 words) - 23:59, 15 September 2024
  • Thumbnail for VIC cipher
    The VIC cipher was a pencil and paper cipher used by the Soviet spy Reino Häyhänen, codenamed "VICTOR". If the cipher were to be given a modern technical...
    19 KB (2,669 words) - 19:07, 16 February 2025
  • Thumbnail for Simon (cipher)
    which is the value m. Therefore, a Simon cipher implementation is denoted as Simon2n/nm. For example, Simon64/128 refers to the cipher operating on a 64-bit...
    18 KB (1,841 words) - 00:06, 14 November 2024
  • Thumbnail for Frequency analysis
    letters in a ciphertext. The method is used as an aid to breaking classical ciphers. Frequency analysis is based on the fact that, in any given stretch of...
    16 KB (1,663 words) - 06:05, 8 April 2024
  • Thumbnail for Polybius square
    used as a basic cipher called the Polybius cipher. This cipher is quite insecure by modern standards, as it is a substitution cipher with characters being...
    10 KB (1,134 words) - 07:37, 25 May 2025
  • Navy's Agnes Driscoll. All the Japanese machine ciphers were broken, to one degree or another, by the Allies. The Japanese Navy and Army largely used code...
    53 KB (6,893 words) - 19:25, 5 May 2025
  • Thumbnail for Ultra (cryptography)
    its decrypts from Japanese sources, including the "Purple" cipher. Much of the German cipher traffic was encrypted on the Enigma machine. Used properly,...
    80 KB (10,384 words) - 05:36, 25 May 2025
  • Thumbnail for Encryption
    Encryption (redirect from CipheR)
    jumbled message to a receiver with an identical cipher. A similar device to the Jefferson Disk, the M-94, was developed in 1917 independently by US Army...
    34 KB (3,645 words) - 17:52, 2 May 2025
  • Thumbnail for Cryptanalysis
    success cryptanalysis of the German ciphers – including the Enigma machine and the Lorenz cipher – and Japanese ciphers, particularly 'Purple' and JN-25...
    45 KB (5,235 words) - 11:22, 20 May 2025
  • CRYPTREC (category Standards of Japan)
    "e-Government Recommended Ciphers List", "Candidate Recommended Ciphers List", and "Monitored Ciphers List". Most of the Japanese ciphers listed in the previous...
    8 KB (974 words) - 00:22, 19 August 2023
  • client presents a list of supported cipher suites (ciphers and hash functions). From this list, the server picks a cipher and hash function that it also supports...
    178 KB (17,517 words) - 09:45, 16 May 2025
  • In the history of cryptography, the Nihilist cipher is a manually operated symmetric encryption cipher, originally used by Russian Nihilists in the 1880s...
    6 KB (805 words) - 19:42, 12 September 2024
  • Thumbnail for Serpent (cipher)
    Serpent is a symmetric key block cipher that was a finalist in the Advanced Encryption Standard (AES) contest, in which it ranked second to Rijndael. Serpent...
    16 KB (1,962 words) - 07:47, 17 April 2025
  • intercepted.[citation needed] The Japanese Foreign Office used a cipher machine to encrypt its diplomatic messages. The machine was called "PURPLE" by U.S....
    37 KB (5,378 words) - 22:26, 23 December 2024
  • Thumbnail for Bombe
    bringing, amongst other things, a replica of the "Purple" cipher machine for Bletchley Park's Japanese section in Hut 7. The four returned to America after...
    67 KB (7,962 words) - 14:21, 24 May 2025
  • KASUMI (redirect from Kasumi (cipher))
    KASUMI is a block cipher used in UMTS, GSM, and GPRS mobile communications systems. In UMTS, KASUMI is used in the confidentiality (f8) and integrity algorithms...
    17 KB (2,555 words) - 01:42, 17 October 2023
  • Thumbnail for International Data Encryption Algorithm
    Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described...
    12 KB (1,499 words) - 19:07, 14 April 2024
  • Thumbnail for Bletchley Park
    Enigma cipher machine, but an important minority were produced by the even more complicated twelve-rotor Lorenz SZ42 on-line teleprinter cipher machine used...
    92 KB (9,291 words) - 06:35, 26 May 2025
  • Thumbnail for Cipher Department of the High Command of the Wehrmacht
    control of its own key processes and machinery, such as the rotor cipher ENIGMA machine. It was the successor to the former Chi bureau (German: Chiffrierstelle)...
    132 KB (15,440 words) - 22:35, 17 November 2024
  • Articles related to cryptography include: A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis...
    67 KB (2,932 words) - 23:20, 16 May 2025