• Thumbnail for NESTOR (encryption)
    General Charles R. Myer, U.S. Department of the Army, 1982, Chapter 8 http://www.nf6x.net/2009/03/ky-38-nestor-voice-encryption-device-demilitarized/ v t e...
    8 KB (986 words) - 07:00, 14 April 2025
  • telescope NESTOR (encryption), a family of voice encryption devices used by the United States during the Vietnam War era HMS Nestor, three ships of the...
    2 KB (301 words) - 21:24, 8 August 2024
  • Thumbnail for Fill device
    Fill device (category Encryption device accessories)
    a wide variety of devices and keys. KYK-28 pin gun used with the NESTOR (encryption) system KYK-13 Electronic Transfer Device KYX-15 Net Control Device...
    6 KB (724 words) - 22:13, 25 December 2024
  • National Security Agency took over responsibility for all US government encryption systems when it was formed in 1952. The technical details of most NSA-approved...
    26 KB (3,315 words) - 15:22, 1 January 2025
  • Thumbnail for Enigma machine
    positions, although it did not move during encryption. In the Abwehr Enigma, the reflector stepped during encryption in a manner similar to the other wheels...
    93 KB (11,280 words) - 00:18, 16 June 2025
  • Thumbnail for Secure voice
    the encryption of voice communication over a range of communication types such as radio, telephone or IP. The implementation of voice encryption dates...
    12 KB (1,687 words) - 00:30, 11 November 2024
  • VINSON (category National Security Agency encryption devices)
    of voice encryption devices used by U.S. and allied military and law enforcement, based on the NSA's classified Suite A SAVILLE encryption algorithm...
    2 KB (176 words) - 23:22, 28 May 2025
  • Thumbnail for AN/PRC-77 Portable Transceiver
    voice encryption devices, but PRC-77 transmitter audio bandwidth was widened to give it the ability to use the TSEC/KY-38 NESTOR voice encryption system...
    14 KB (1,529 words) - 21:16, 6 June 2025
  • Thumbnail for SIGABA
    SIGABA (category Encryption devices)
    ECM Mark II was a cipher machine used by the United States for message encryption from World War II until the 1950s. The machine was also known as the SIGABA...
    20 KB (2,712 words) - 23:59, 15 September 2024
  • Secure Communications Interoperability Protocol (category National Security Agency encryption devices)
    compression, encryption and a signalling plan for voice, data and multimedia applications. To set up a secure call, a new Traffic Encryption Key (TEK) must...
    9 KB (1,280 words) - 23:47, 9 March 2025
  • United States issued its forces a series of secure voice encryption equipment code-named NESTOR. According to a U.S. Army history: "To maintain compatibility...
    3 KB (385 words) - 00:56, 22 January 2024
  • Thumbnail for Hebern rotor machine
    The Hebern Rotor Machine was an electro-mechanical encryption machine built by combining the mechanical parts of a standard typewriter with the electrical...
    8 KB (1,099 words) - 22:20, 9 January 2024
  • Thumbnail for KL-7
    KL-7 (category National Security Agency encryption devices)
    TSEC/KL-7, also known as Adonis was an off-line non-reciprocal rotor encryption machine.: p.33ff  The KL-7 had rotors to encrypt the text, most of which...
    11 KB (1,306 words) - 15:28, 7 April 2025
  • Thumbnail for KG-84
    KG-84 (category National Security Agency encryption devices)
    The KG-84A and KG-84C are encryption devices developed by the U.S. National Security Agency (NSA) to ensure secure transmission of digital data. The KG-84C...
    2 KB (265 words) - 03:49, 9 May 2025
  • Thumbnail for STU-III
    STU-III (category National Security Agency encryption devices)
    (CTAC) Most STU-III units were built for use with what NSA calls Type 1 encryption. This allows them to protect conversations at all security classification...
    10 KB (1,449 words) - 00:50, 14 April 2025
  • Thumbnail for Fialka
    (PRN) Secure channel Insecure channel Subliminal channel Encryption Decryption End-to-end encryption Harvest now, decrypt later Information-theoretic security...
    12 KB (1,494 words) - 11:00, 6 May 2024
  • Thumbnail for Cipher disk
    Cipher disk (category Encryption devices)
    complicated table indicating the encryption method, one could use the much simpler cipher disk. This made both encryption and decryption faster, simpler...
    5 KB (647 words) - 22:52, 4 September 2021
  • Thumbnail for National Security Agency
    transparent process for replacing the outdated Data Encryption Standard (DES) by an Advanced Encryption Standard (AES). Cybersecurity policy expert Susan...
    260 KB (24,829 words) - 20:14, 12 June 2025
  • Thumbnail for List of Gentoo Linux derivatives
    appliance. Notable features in the generated ISO include: (Version 1.4) Encryption is now truly optional (there were issues with how 1.3 handled unencrypted...
    18 KB (1,733 words) - 09:03, 19 December 2024
  • Thumbnail for Rotor machine
    with every key press. In classical cryptography, one of the earliest encryption methods was the simple substitution cipher, where letters in a message...
    17 KB (2,462 words) - 12:35, 29 November 2024
  • Thumbnail for C-52 (cipher machine)
    C-52 (cipher machine) (category Encryption devices)
    used for encryption and the remaining 5 bars control the stepping of the pinwheels. The early CX models used the control bars also for encryption but due...
    6 KB (673 words) - 02:26, 9 March 2025
  • Thumbnail for KW-26
    KW-26 (category National Security Agency encryption devices)
    The TSEC/KW-26, code named ROMULUS, was an encryption system used by the U.S. Government and, later, by NATO countries. It was developed in the 1950s by...
    6 KB (859 words) - 05:53, 29 March 2025
  • Thumbnail for Scytale
    Scytale (category Encryption devices)
    hypothesis is that the scytale was used for message authentication rather than encryption. Only if the sender wrote the message around a scytale of the same diameter...
    5 KB (727 words) - 08:20, 5 June 2025
  • Thumbnail for CD-57
    CD-57 (category Encryption devices)
    (PRN) Secure channel Insecure channel Subliminal channel Encryption Decryption End-to-end encryption Harvest now, decrypt later Information-theoretic security...
    3 KB (250 words) - 07:17, 15 October 2024
  • Thumbnail for Typex
    revisions) was used until the mid-1950s when other more modern military encryption systems came into use. Like Enigma, Typex was a rotor machine. Typex came...
    15 KB (2,010 words) - 03:50, 26 March 2025
  • Thumbnail for M-325
    (PRN) Secure channel Insecure channel Subliminal channel Encryption Decryption End-to-end encryption Harvest now, decrypt later Information-theoretic security...
    3 KB (237 words) - 05:32, 10 January 2022
  • 5-UCO (category Encryption devices)
    5-UCO (5-Unit Controlled) was an on-line one-time tape Vernam cipher encryption system developed by the UK during World War II for use on teleprinter...
    2 KB (329 words) - 15:14, 26 January 2024
  • (PRN) Secure channel Insecure channel Subliminal channel Encryption Decryption End-to-end encryption Harvest now, decrypt later Information-theoretic security...
    5 KB (488 words) - 19:40, 12 March 2025
  • Thumbnail for Hardware-based encryption
    Hardware-based encryption is the use of computer hardware to assist software, or sometimes replace software, in the process of data encryption. Typically...
    15 KB (1,251 words) - 08:41, 27 May 2025
  • Thumbnail for Ubuntu Cinnamon
    release also updated Linux kernel version to 6.5, and introduced full disk encryption. 24.04 "Noble Numbat" was the first Ubuntu Cinnamon LTS release as a flavor...
    16 KB (1,409 words) - 01:19, 13 June 2025