• Thumbnail for Cipher device
    A cipher device was a term used by the US military in the first half of the 20th century to describe a manually operated cipher equipment that converted...
    1 KB (155 words) - 19:46, 5 January 2025
  • Thumbnail for Enigma machine
    The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication...
    93 KB (11,282 words) - 06:35, 28 June 2025
  • Thumbnail for Jefferson disk
    Jefferson disk (redirect from Wheel cipher)
    of the disks is the cipher key, and both sender and receiver must arrange the disks in the same predefined order. Jefferson's device had 36 disks while...
    13 KB (1,601 words) - 21:45, 24 May 2025
  • Thumbnail for Syko Cipher Device
    The SYKO cipher device was a compact British cipher apparatus in use during World War II. It was invented and patented by Morgan O'Brien before the war...
    11 KB (1,592 words) - 22:52, 28 January 2025
  • Thumbnail for Rotor machine
    In cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting messages. Rotor machines were the cryptographic...
    17 KB (2,462 words) - 12:35, 29 November 2024
  • Thumbnail for Cryptography
    automatic cipher device, a wheel that implemented a partial realization of his invention. In the Vigenère cipher, a polyalphabetic cipher, encryption...
    100 KB (11,007 words) - 01:11, 20 June 2025
  • NSA encryption systems (category National Security Agency encryption devices)
    number of cipher devices. Rotor machines from the 1940s and 1950s were mechanical marvels. The first generation electronic systems were quirky devices with...
    26 KB (3,315 words) - 06:34, 29 June 2025
  • Thumbnail for List of telecommunications encryption terms
    Algorithm – a block cipher which was used for securing mobile phones in the United States. Cipher Cipher device Cipher system Cipher text Ciphony Civision...
    5 KB (446 words) - 21:24, 28 August 2024
  • Thumbnail for M-94
    M-94 (category Classical ciphers)
    developments but only the final form of the one adopted by the Army, Strip Cipher Device Type, M-138-A. This form used an aluminum base into which channels with...
    8 KB (1,054 words) - 15:10, 26 January 2024
  • Thumbnail for Stream cipher
    stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each...
    23 KB (2,231 words) - 12:20, 23 June 2025
  • Thumbnail for Lorenz cipher
    The Lorenz SZ40, SZ42a and SZ42b were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz...
    34 KB (3,793 words) - 06:34, 25 May 2025
  • Thumbnail for German Army cryptographic systems of World War II
    level. These were the Enigma machine, the teleprinter cipher attachment (Lorenz cipher), and the cipher teleprinter the Siemens and Halske T52, (Siemens T-43)...
    31 KB (4,418 words) - 22:28, 4 November 2024
  • Thumbnail for Étienne Bazeries
    improved version of Thomas Jefferson's cipher cylinder. It was later refined into the US Army M-94 cipher device. Historian David Kahn describes him as...
    4 KB (438 words) - 07:24, 1 April 2024
  • A cipher suite is a set of algorithms that help secure a network connection. Suites typically use Transport Layer Security (TLS) or its deprecated predecessor...
    19 KB (2,358 words) - 16:00, 5 September 2024
  • Thumbnail for Encryption
    Encryption (redirect from CipheR)
    identical cipher. A similar device to the Jefferson Disk, the M-94, was developed in 1917 independently by US Army Major Joseph Mauborne. This device was used...
    34 KB (3,645 words) - 08:51, 26 June 2025
  • number in the cryptogram. For this encipherment Alberti used a decoder device, his cipher disk, which implemented a polyalphabetic substitution with mixed alphabets...
    6 KB (735 words) - 02:16, 26 May 2025
  • Thumbnail for HC-9
    HC-9 (category Encryption devices)
    The HC-9 was a mechanical cipher device manufactured by the Swedish company AB Transvertex. It was designed in the early 1950s for the Swedish Armed Forces...
    2 KB (191 words) - 02:52, 9 March 2025
  • The Japanese M-1 cipher machine was a mechanical device the Japanese used for performing cryptography sometime during the 1930s. More specifically it was...
    826 bytes (80 words) - 22:48, 27 September 2021
  • Thumbnail for Playfair cipher
    The Playfair cipher or Playfair square or Wheatstone–Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution...
    20 KB (2,541 words) - 19:04, 1 April 2025
  • Thumbnail for Polybius square
    checkerboard, is a device invented by the ancient Greeks Cleoxenus and Democleitus, and made famous by the historian and scholar Polybius. The device is used for...
    10 KB (1,134 words) - 07:37, 25 May 2025
  • Thumbnail for Block cipher mode of operation
    In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or...
    52 KB (5,828 words) - 12:52, 13 June 2025
  • using digits. It also is known as a monôme-binôme cipher. In 1555, Pope Paul IV created the office of Cipher Secretary to the Pontiff. In the late 1580s, this...
    9 KB (1,029 words) - 22:05, 30 January 2024
  • Adiantum is a cipher composition for disk encryption. It uses a new cipher construction called HBSH (hash, block cipher, stream cipher, hash), specifically...
    4 KB (317 words) - 21:37, 11 February 2025
  • Thumbnail for Feistel cipher
    cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the...
    10 KB (1,316 words) - 19:41, 2 February 2025
  • In the history of cryptography, a grille cipher was a technique for encrypting a plaintext by writing it onto a sheet of paper through a pierced sheet...
    17 KB (2,249 words) - 10:46, 25 May 2025
  • method is slow and requires literary skill. Above all, any physical cipher device is subject to loss, theft and seizure; so to lose one grille is to lose...
    6 KB (784 words) - 22:27, 22 January 2024
  • Code-O-Graph (category Encryption devices)
    The Code-O-Graph is a field cipher device and identifier from the Captain Midnight radio serial. In the story line they were used by agents of the Secret...
    6 KB (975 words) - 18:00, 26 October 2023
  • device was invented by Charles Wheatstone several years after Wadsworth. Kruh, Louis (1982). "THE MYSTERY OF COLONEL DECIUS WADSWORTH'S CIPHER DEVICE"...
    2 KB (213 words) - 01:41, 28 May 2025
  • Thumbnail for Bruce Edwards Ivins
    University, and had once stolen a sorority chapter's ritual book and cipher device. In more recent years, he made extensive online posts about Kappa Kappa...
    62 KB (6,604 words) - 02:48, 28 June 2025
  • Thumbnail for Bomba (cryptography)
    Bomba (cryptography) (category Cipher Bureau (Poland))
    stated that the device had been dubbed a "bomb" "for lack of a better idea". Perhaps the most credible explanation is given by a Cipher Bureau technician...
    10 KB (1,323 words) - 19:06, 21 June 2025