HX-63

Last updated
HX-63
Loopback-rotor.png
A diagram of a loopback-rotor construction; in this simplified example, two rotors with nine contacts each are used. There are six inputs and outputs, leaving three loop-back wires.
Typerotor machine

The HX-63 was an advanced rotor machine designed by Crypto AG founder Boris Hagelin. Development of the device started in 1952 and lasted a decade. [1] [2] The machine had nine rotors, each with 41 contacts. There were 26 keyboard inputs and outputs, leaving 15 wires to "loop back" through the rotors via a different path. Moreover, each rotor wire could be selected from one of two paths. The movement of the rotors was irregular and controlled by switches. There were two plugboards with the machine; one to scramble the input, and one for the loop-back wires. The machine also used a technique called reinjection (also called reentry), which increased its security exponentially. The machine could be set up in around 10600 different configurations. [2]

Contents

William Friedman, the first chief cryptologist of the U.S. National Security Agency (NSA), was alarmed when he read Hagelin's patent on the machine. Friedman realized that the machine was more secure than the NSA's KL-7 and unbreakable. Friedman and Hagelin were good friends from World War II, and Friedman called on Hagelin to terminate the program, which CryptoAG did. [2]

Only twelve of these machines were manufactured, and it was adopted by only one department of the French Government (about 1960). [3]

See also

Related Research Articles

<span class="mw-page-title-main">Enigma machine</span> German cipher machine

The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the German military. The Enigma machine was considered so secure that it was used to encipher the most top-secret messages.

<span class="mw-page-title-main">Typex</span> British cipher machine

In the history of cryptography, Typex machines were British cipher machines used from 1937. It was an adaptation of the commercial German Enigma with a number of enhancements that greatly increased its security. The cipher machine was used until the mid-1950s when other more modern military encryption systems came into use.

<span class="mw-page-title-main">SIGABA</span> American cipher machine

In the history of cryptography, the ECM Mark II was a cipher machine used by the United States for message encryption from World War II until the 1950s. The machine was also known as the SIGABA or Converter M-134 by the Army, or CSP-888/889 by the Navy, and a modified Navy version was termed the CSP-2900.

<span class="mw-page-title-main">William F. Friedman</span> American cryptologist (1891–1969)

William Frederick Friedman was a US Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s. In 1940, subordinates of his led by Frank Rowlett broke Japan's PURPLE cipher, thus disclosing Japanese diplomatic secrets before America's entrance into World War II.

<span class="mw-page-title-main">Rotor machine</span>

In cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting messages. Rotor machines were the cryptographic state-of-the-art for much of the 20th century; they were in widespread use in the 1920s–1970s. The most famous example is the German Enigma machine, the output of which was deciphered by the Allies during World War II, producing intelligence code-named Ultra.

Articles related to cryptography include:

<span class="mw-page-title-main">Crypto AG</span> Swiss company specialising in communications and information security

Crypto AG was a Swiss company specialising in communications and information security founded by Boris Hagelin in 1952. The company was secretly purchased for US $5.75 million and jointly owned by the American Central Intelligence Agency (CIA) and West German Federal Intelligence Service (BND) from 1970 until about 1993, with the CIA continuing as sole owner until about 2018. The mission of breaking encrypted communication using a secretly owned company was known as "Operation Rubikon". With headquarters in Steinhausen, the company was a long-established manufacturer of encryption machines and a wide variety of cipher devices.

Cryptography was used extensively during World War II because of the importance of radio communication and the ease of radio interception. The nations involved fielded a plethora of code and cipher systems, many of the latter using rotor machines. As a result, the theoretical and practical aspects of cryptanalysis, or codebreaking, were much advanced.

<span class="mw-page-title-main">KL-7</span> Rotor encryption machine

The TSEC/KL-7, also known as Adonis was an off-line non-reciprocal rotor encryption machine. The KL-7 had rotors to encrypt the text, most of which moved in a complex pattern, controlled by notched rings. The non-moving rotor was fourth from the left of the stack. The KL-7 also encrypted the message indicator.

<span class="mw-page-title-main">Kryha</span> Device for encryption and decryption

In the history of cryptography, the Kryha machine was a device for encryption and decryption, appearing in the early 1920s and used until the 1950s. The machine was the invention of Alexander von Kryha. During the Second World War, Kryha worked as an officer for the German Wehrmacht. There were several versions; the standard Kryha machine weighed around five kilograms, and was totally mechanical. A scaled down pocket version was introduced later on, termed the "Lilliput" model. There was also a more bulky electrical version.

<span class="mw-page-title-main">JADE (cipher machine)</span> Japanese World War II cipher machine

JADE was the codename given by US codebreakers to a Japanese World War II cipher machine. The Imperial Japanese Navy used the machine for communications from late 1942 until 1944. JADE was similar to another cipher machine, CORAL, with the main difference that JADE was used to encipher messages in katakana using an alphabet of 50 symbols.

<span class="mw-page-title-main">Arvid Gerhard Damm</span> Swedish engineer and inventor (1869–1928)

Arvid Gerhard Damm was a Swedish engineer and inventor. He designed a number of cipher machines, and was one of the early inventors of the wired rotor principle for machine encipherment. The company, AB Cryptograph, was an early predecessor of Crypto AG.

<span class="mw-page-title-main">HC-9</span>

The HC-9 was a mechanical cipher device manufactured by the Swedish company AB Transvertex. It was designed in the early 1950's for the Swedish Armed Forces and in use from 1963 to 1995 as Krypteringsapparat 301. This machine was used for low-level communications such as platoon, company, up to battalion levels and in regimental and brigade staffs.The machine dimensions are 18 x 15 x 7 cm.

<span class="mw-page-title-main">CD-57</span>

The (Hagelin) CD-57 was a portable, mechanical cipher machine manufactured by Crypto AG, first produced in 1957. It was derived from the earlier CD-55, and was designed to be compatible with the larger C-52 machines. Compact, the CD-57 measured merely 5 1/8in × 3 1/8in × 1 1/2in and weighed 1.5 pounds. The CD-57 used six wheels.

<span class="mw-page-title-main">C-52 (cipher machine)</span> 1950s cipher machines by Crypto AG

The (Hagelin) C-52 and CX-52 were cipher machines manufactured by Crypto AG starting 1951/1952. These pin-and-lug type cipher machines were advanced successors of the C-38/M-209. The machine measures 8+12 by 5+38 by 4+38 inches. The device is mechanical, but when combined with an electric keyboard attachment, the B-52, the resultant system is termed the BC-52. The B-52 is larger, measuring 12+12 by 8+12 by 6+38 inches.

<span class="mw-page-title-main">Pinwheel (cryptography)</span> Cryptographic device

In cryptography, a pinwheel was a device for producing a short pseudorandom sequence of bits, as a component in a cipher machine. A pinwheel consisted of a rotating wheel with a certain number of positions on its periphery. Each position had a "pin", "cam" or "lug" which could be either "set" or "unset". As the wheel rotated, each of these pins would in turn affect other parts of the machine, producing a series of "on" or "off" pulses which would repeat after one full rotation of the wheel. If the machine contained more than one wheel, usually their periods would be relatively prime to maximize the combined period. Pinwheels might be turned through a purely mechanical action or electromechanically.

Below is a timeline of notable events related to cryptography.

<span class="mw-page-title-main">OMI cryptograph</span>

The OMI cryptograph was a rotor cipher machine produced and sold by Italian firm Ottico Meccanica Italiana (OMI) in Rome.

The following outline is provided as an overview of and topical guide to cryptography:

<i>Schlüsselgerät</i> 41 Rotor cipher machine

The Schlüsselgerät 41, also known as the SG-41 or Hitler mill, was a rotor cipher machine, first produced in 1941 in Nazi Germany, that was designed as a potential successor for the Enigma machine. It saw limited use by the Abwehr towards the end of World War II.

References

  1. Klaus Schmeh (2008). Codeknacker gegen Codemacher: die faszinierende Geschichte der Verschlüsselung; [Sachbuch]. W3l GmbH. pp. 208–. ISBN   978-3-937137-89-6.
  2. 1 2 3 Paul, Jon D. (August 31, 2021). "The Scandalous History of the Last Rotor Cipher Machine". IEEE . Retrieved September 15, 2021.
  3. Cipher A. Deavours; Louis Kruh (1 January 1985). Machine Cryptography and Modern Cryptanalysis. Artech House. pp. 199–. ISBN   978-0-89006-161-9.

Further reading