148
Views
0
CrossRef citations to date
0
Altmetric
Book Reviews

Review of The SIGABA/ECM II Cipher Machine: “A Beautiful Idea” by Timothy J. Mucklow

Mucklow, Timothy J. The SIGABA/ECM II Cipher Machine: “A Beautiful Idea.” Center for Cryptologic History, National Security Agency, 2015. 44 pages, Papercover. Available from the Center for Cryptologic History or online at https://www.nsa.gov/about/_files/cryptologic_heritage/center_crypt_history/publications/The_SIGABA_ECM_Cipher_Machine_A_Beautiful_Idea3.pdf.

Pages 81-84 | Published online: 22 Nov 2016
 

Notes

1Friedman wrote a two-part report, “Analysis of a Mechanico-Electrical Cryptograph.” Part II is available online from the Friedman collection (https://www.nsa.gov/public_info/_files/friedmanDocuments/PatentandEquipmentRecords/FOLDER_102/41709409074875.pdf).

2The quote is from a 3 April 1934 letter from Friedman to the Patent Office, which was written when Friedman was attempting to patent his idea for using an externally generated key to step rotors.

3Teletype machines used the five-level Baudot code, each level being a hole or no hole.

4The quote is from Rowlett’s oral history interviews: #OH-1974-01 through OH-1974-12, Center for Cryptologic History.

5An endnote gives references that suggest that the Navy found plugboards inconvenient to use, that the Navy recognized that plugboards had not prevented solutions of other cipher machines, and that rotors offered more stepping combinations than plugboards.

6The quote is from Rowlett’s oral history interviews: #OH-1974-01 through OH-1974-12, Center for Cryptologic History.

7The appendix contains images of pp. 5–9 of “Crypto-Operating Instructions for Converter M-134-C.” (M-134-C was another Army designation for SIGABA.) Unfortunately, page 9 ends as the instructions just begin to describe the 26–30 check for the “correctness of the daily rotor arrangement and index alignment and the stepping of the stepping control and alphabet rotors.” That check was performed by zeroizing the machine and typing a string of 30 a’s. If the machine were set correctly, the last five encipherments of the letter a (encipherments 26 through 30) should be as listed in the key list.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 92.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.