Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
History of cryptography
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Allies=== The Americans referred to the intelligence resulting from cryptanalysis, perhaps especially that from the Purple machine, as '[[Magic cryptography|Magic]]'. The British eventually settled on '[[Ultra (cryptography)|Ultra]]' for intelligence resulting from cryptanalysis, particularly that from message traffic protected by the various Enigmas. An earlier British term for Ultra had been 'Boniface' in an attempt to suggest, if betrayed, that it might have an individual agent as a source. [[Image:SIGABA-patent.png|right|320px|thumbnail|SIGABA is described in {{US patent|6175625}}, filed in 1944 but not issued until 2001.]] [[Allies of World War II|Allied]] cipher machines used in World War II included the British [[TypeX]] and the American [[SIGABA]]; both were electromechanical rotor designs similar in spirit to the Enigma, albeit with major improvements. Neither is known to have been broken by anyone during the War. The Poles used the [[Lacida]] machine, but its security was found to be less than intended (by Polish Army cryptographers in the UK), and its use was discontinued. US troops in the field used the [[M-209]] and the still less secure [[M-94]] family machines. British [[Special Operations Executive|SOE]] agents initially used 'poem ciphers' (memorized poems were the encryption/decryption keys), but later in the War, they began to [[Leo Marks|switch]] to [[one-time pad]]s. The [[VIC cipher]] (used at least until 1957 in connection with [[Rudolf Abel]]'s NY spy ring) was a very complex hand cipher, and is claimed to be the most complicated known to have been used by the Soviets, according to David Kahn in ''Kahn on Codes''. For the decrypting of Soviet ciphers (particularly when ''one-time pads'' were reused), see [[Venona project]].
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)