KW-37

Last updated
KW-37 transmitter on display at the Naval History museum at La Spezia, Italy KW-37T.jpg
KW-37 transmitter on display at the Naval History museum at La Spezia, Italy
Remington Rand format punch card similar to the type used by NSA to distribute keys RemingtonRandCard.agr.jpg
Remington Rand format punch card similar to the type used by NSA to distribute keys

The KW-37, code named JASON, was an encryption system developed In the 1950s by the U.S. National Security Agency to protect fleet broadcasts of the U.S. Navy. Naval doctrine calls for warships at sea to maintain radio silence to the maximum extent possible to prevent ships from being located by potential adversaries using radio direction finding. To allow ships to receive messages and orders, the navy broadcast a continuous stream of information, originally in Morse code and later using radioteletype. Messages were included in this stream as needed and could be for individual ships, battle groups or the fleet as a whole. Each ship's radio room would monitor the broadcast and decode and forward those messages directed at her to the appropriate officer. The KW-37 was designed to automate this process. It consisted of two major components, the KWR-37 receive unit and the KWT-37 transmit unit. Each ship had a complement of KWR-37 receivers (usually at least two) that decrypted the fleet broadcast and fed the output to teleprinter machines. KWT-37's were typically located at shore facilities, where high power transmitters were located.

The KWR-37 weighed 100 pounds (45 kg) and contained some 500 subminiature vacuum tubes, whose leads were soldered to printed circuit boards. Each flip-flop in the KW-37 required three tubes, placing an upper bound on the total number of stages in any shift registers used at 166. Squeezing so much logic in such a small and rugged package was quite a feat in the 1950s.

Each KWT-37 filled an entire relay rack with five stacked modules. A precision time reference occupied the bottom, three key generators (stream cyphers in civilian parlance) occupied the middle and an alarm panel occupied the top position. The outputs of the three key generators were combined in a voting circuit. If one of the units' output did not match the other two, an alarm was sounded and the output from the two units that did agree continued to be used.

Each KWR-37 and each key generator in the KWT-37 had a common fill device (CFD) for loading keys (or as NSA calls them cryptovariables). The CFDs were similar to that first used in the KW-26, accepting punched cards in Remington Rand format. The key was changed every day at 0000 hours GMT. The receivers were synchronized to the transmitter at that time. If a receiver ever got out of sync, say due to a power failure, an operator had to set the current hour and minute on dials on the front panel. The KWR-37 would then "fast forward" through its key stream sequence until synchronization was re-established.

Large numbers of fleet broadcast key cards had to be produced and distributed to every navy ship and many shore installations on a monthly basis, so many people had access to them. While the key cards were strictly accounted for, they were easy to copy. This proved to be a fatal weakness.

KWR-37s fell into North Korean hands when the USS Pueblo was captured in 1968. New keying material was issued to ships throughout the world to limit the ongoing damage. In 1985 it was revealed that the Walker spy ring had been selling key lists and cards to the Soviet Union for decades. KW-37 systems were taken out of service by the early 1990s.

The received input to the KW(R)-37 was in the form of a multiple broadcast (multicast) signal, consisting of many channels condensed into one tone pack which was deciphered at one stage by the KW(R)-37 and then the output was sent to several KG-14's which further deciphered the then split signals into each channel of the fleet broadcast. The KG-14 also received its timing signal from the KW(R)-37; if the 37 was out of sync, all the 14's were fall out of sync as well. Each KG-14 could process one channel of the tone pack; most fleet units had six KG-14's, larger units even more.

Experiences operating the KWR-37

TSEC KW-37 Receiver on display at the Naval History museum at La Spezia, Italy KW-37R.jpg
TSEC KW-37 Receiver on display at the Naval History museum at La Spezia, Italy

Typically, fleet units utilizing the KWR-37 units were outfitted with two devices for redundancy. Should one unit fail, the other one would already be online and patches via a high level, 60-milliamp patch panel would quickly be changed around so that the current offline unit could be changed over to online status at a moment's notice, to ensure that there was no interruption of message traffic. Later in their life, when KWR-37 units were aged and worn, sometimes the circuit cards inside had to be reseated with a rubber mallet which helped ensure the cards were seated properly. Other problems with the KWR-37's were related to the startup times. Fleet radiomen, and those stationed in the shore transmitting stations, had to listen to an HF signal for coordinated universal time. Radiomen called this broadcast the "time tick," which gave them a sharp tone, signalling them to press the restart button so that the unit could then start up for "new day" or otherwise known as "HJ's" by the radiomen. This took place after the new day's crypto keylist card was properly inserted into the "crib" or the card reader by securing it onto pins and then firmly closing the card access door and then locking it with a key. Once the unit(s) were restarted, the key was placed back in the safe using two-person integrity (TPI) which was stringently enforced following the Walker spy investigation. In the early nineties when the KWR-37 units were retired from the navy and replaced by the more reliable and modern KWR-46's, fleet Radiomen breathed a sigh of relief because the KWR-37 units were often unreliable and would occasionally fall out of synchronization timing, resulting in a loss of broadcast messages from the various fleet channels.

Sources

Experiences operating the KWR-37 - a personal account from a retired US Navy fleet Radioman

Related Research Articles

Analog television Television that uses analog signals

Analog television is the original television technology that uses analog signals to transmit video and audio. In an analog television broadcast, the brightness, colors and sound are represented by amplitude, phase and frequency of an analog signal.

Signals intelligence Intelligence-gathering by interception of signals

Signals intelligence (SIGINT) is intelligence-gathering by interception of signals, whether communications between people or from electronic signals not directly used in communication. Signals intelligence is a subset of intelligence collection management. As classified and sensitive information is usually encrypted, signals intelligence in turn involves the use of cryptanalysis to decipher the messages. Traffic analysis—the study of who is signaling whom and in what quantity—is also used to integrate information again.

In telecommunications, a scrambler is a device that transposes or inverts signals or otherwise encodes a message at the sender's side to make the message unintelligible at a receiver not equipped with an appropriately set descrambling device. Whereas encryption usually refers to operations carried out in the digital domain, scrambling usually refers to operations carried out in the analog domain. Scrambling is accomplished by the addition of components to the original signal or the changing of some important component of the original signal in order to make extraction of the original signal difficult. Examples of the latter might include removing or changing vertical or horizontal sync pulses in television signals; televisions will not be able to display a picture from such a signal. Some modern scramblers are actually encryption devices, the name remaining due to the similarities in use, as opposed to internal operation.

A signal generator is one of a class of electronic devices that generates electronic signals with set properties of amplitude, frequency, and wave shape. These generated signals are used as a stimulus for electronic measurements, typically used in designing, testing, troubleshooting, and repairing electronic or electroacoustic devices, though it often has artistic uses as well.

Stream cipher Type of symmetric key cipher

A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext stream. Since encryption of each digit is dependent on the current state of the cipher, it is also known as state cipher. In practice, a digit is typically a bit and the combining operation is an exclusive-or (XOR).

Transit (satellite) Satellite navigation system

The Transit system, also known as NAVSAT or NNSS, was the first satellite navigation system to be used operationally. The radio navigation system was primarily used by the U.S. Navy to provide accurate location information to its Polaris ballistic missile submarines, and it was also used as a navigation system by the Navy's surface ships, as well as for hydrographic survey and geodetic surveying. Transit provided continuous navigation satellite service from 1964, initially for Polaris submarines and later for civilian use as well. In the Project DAMP Program, the missile tracking ship USAS American Mariner also used data from the satellite for precise ship's location information prior to positioning its tracking radars.

SIGABA American cipher machine

In the history of cryptography, the ECM Mark II was a cipher machine used by the United States for message encryption from World War II until the 1950s. The machine was also known as the SIGABA or Converter M-134 by the Army, or CSP-888/889 by the Navy, and a modified Navy version was termed the CSP-2900.

Genlock is a common technique where the video output of one source is used to synchronize other picture sources together. The aim in video applications is to ensure the coincidence of signals in time at a combining or switching point. When video instruments are synchronized in this way, they are said to be generator-locked, or genlocked.

KW-26

The TSEC/KW-26, code named ROMULUS, was an encryption system used by the U.S. Government and, later, by NATO countries. It was developed in the 1950s by the National Security Agency (NSA) to secure fixed teleprinter circuits that operated 24 hours a day. It used vacuum tubes and magnetic core logic, replacing older systems, like SIGABA and the British 5-UCO, that used rotors and electromechanical relays.

KL-7

The TSEC/KL-7, also known as Adonis was an off-line non-reciprocal rotor encryption machine. The KL-7 had rotors to encrypt the text, most of which moved in a complex pattern, controlled by notched rings. The non-moving rotor was fourth from the left of the stack. The KL-7 also encrypted the message indicator.

The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA-approved systems are still classified, but much more about its early systems have become known and its most modern systems share at least some features with commercial products.

NAVTEX

NAVTEX, sometimes styled Navtex or NavTex, is an international automated medium frequency direct-printing service for delivery of navigational and meteorological warnings and forecasts, as well as urgent maritime safety information (MSI) to ships.

High-frequency direction finding Electronic equipment for finding radio sources

High-frequency direction finding, usually known by its abbreviation HF/DF or nickname huff-duff, is a type of radio direction finder (RDF) introduced in World War II. High frequency (HF) refers to a radio band that can effectively communicate over long distances; for example, between U-boats and their land-based headquarters. HF/DF was primarily used to catch enemy radios while they transmitted, although it was also used to locate friendly aircraft as a navigation aid. The basic technique remains in use to this day as one of the fundamental disciplines of signals intelligence, although typically incorporated into a larger suite of radio systems and radars instead of being a stand-alone system.

Vision mixer Electronic device for selecting and compositing of live video sources

A vision mixer is a device used to select between several different live video sources and, in some cases, compositing live video sources together to create visual effects.

The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a local area network, it achieves clock accuracy in the sub-microsecond range, making it suitable for measurement and control systems. PTP is currently employed to synchronize financial transactions, mobile phone tower transmissions, sub-sea acoustic arrays, and networks that require precise timing but lack access to satellite navigation signals.

Radioman

Radioman (RM) was a rating for United States Navy and United States Coast Guard enlisted personnel, specializing in communications technology.

SCR-284

The SCR-284 was a World War II era combination transmitter and receiver used in vehicles or fixed ground stations.

In computer networks, a syncword, sync character, sync sequence or preamble is used to synchronize a data transmission by indicating the end of header information and the start of data. The syncword is a known sequence of data used to identify the start of a frame, and is also called reference signal or midamble in wireless communications.

McASP is an acronym for Multichannel Audio Serial Port, a communication peripheral found in Texas Instruments family of digital signal processors (DSPs) and Microcontroller Units (MCUs).
The McASP functions as a general-purpose audio serial port optimized for the needs of multichannel audio applications. Depending on the implementation, the McASP may be useful for time-division multiplexed (TDM) stream, Inter-Integrated Sound (I2S) protocols, and intercomponent digital audio interface transmission (DIT). However, some implementations are limited to supporting just the Inter-Integrated Sound (I2S) protocol.
The McASP consists of transmit and receive sections that may operate synchronized, or completely independently with separate master clocks, bit clocks, and frame syncs, and using different transmit modes with different bit-stream formats. The McASP module also includes up to 16 serializers that can be individually enabled to either transmit or receive. In addition, all of the McASP pins can be configured as general-purpose input/output (GPIO) pins.

The KG-13 was the first transistorized cryptographic machine developed by the NSA in the early 60's. It used the newly developed 2N404 germanium transistor instead of vacuum tubes. It consisted of a KG-3 transmitter a KG-12 receiver. The transmitter used about 500 transistors and the receiver about 300. The transmitter was switchable to function as a receiver.