199
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

The Story of Mamba: Aligning Messages Against Recovered Additives

References

  • “1551 Historical Notes Book Ciphers,” RG 38, Radio Intelligence Publications, Box 180. National Archives at College Park, MD (NARAII).
  • “1552 Historical Notes Strip Ciphers,” RG 38, Radio Intelligence Publications, Box 180. National Archives at College Park, MD (NARAII).
  • Aid, M. 2009. The Secret Sentry: The Untold Story of the National Security Agency. New York: Bloomsbury Press.
  • Brief Description of RAM Equipment. 30 October 1947. Colin Burke Archive, National Cryptologic Museum Library. (This document is very similar to [12].)
  • Budiansky, S. 2000. Battle of Wits: The Complete Story of Codebreaking in World War II. New York: The Free Press.
  • Budiansky, S. 2001. Codebreaking with IBM Machines in World War II, Cryptologia, 25(4):241–255.
  • Burke, C. 1994. Information and Secrecy: Vannevar Bush, Ultra, and the Other Memex. London: The Scarecrow Press.
  • Burke, C. B. 2002. It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis, 1930s–1960s. United States Cryptologic History, Special Series, Vol. 6. Fort George G. Meade, MD: Center for Cryptologic History, National Security Agency. The document has been declassified and is available at http://cryptome.org/2013/06/NSA-WasntAllMagic_2002.pdf (accessed 27 June 2013).
  • Christensen, C. 2011. “U.S. Navy Cryptologic Mathematicians during World War II,” Cryptologia, 35(3):267–276.
  • Christensen, C. 2014. “The National Cash Register Company Additive Recovery Machine,” Cryptologia, 38(2):152–177.
  • Christensen, C. and D. Agard. 2011. “William Dean Wray (1910–1962) the Evolution of a Cryptanalyst,” Cryptologia, 35(1):73–96.
  • Communications Intelligence Technical Paper TS-48 “Machine Comparisons.” June 1948. Colin Burke Archive, National Cryptologic Museum Library. (This document is very similar to [4].)
  • “Copperhead I, 1945,” RG 457, Historic Cryptographic Collection, Pre-World War I Through World War II, Box 600, NR 1547. National Archives at College Park, MD (NARAII).
  • DeBrosse, J. and C. Burke. 2004. The Secret in Building 26: The Untold Story of America's Ultra War against the U-Boat Enigma Codes. New York: Random House.
  • Erskine, R. and P. Freeman. 2010. “Brigadier John Tiltman: One of Britain's Finest Cryptologists,” Cryptologia, 27(4):289–318.
  • Erskine, R. and M. Smith Eds. 2011. The Bletchley Park Codebreakers: How Ultra Shortened the War and Led to the Birth of the Computer. London: Biteback Publishing.
  • “GCCS—Cryptographic Memorandum No. 82, The Function, Organization and Distribution of Japanese Naval Codes and Ciphers, 1/8/44–31/12/44,” RG 38, Records of the Naval Security Group Central Depository, Crane, IN, CNSG Library, Box 44, File 3222/69. National Archives at College Park, MD (NARAII).
  • “GCCS—Cryptographic Memorandum No. 119, The JN 11 Cyphers Naval General Purpose System,” RG 38, Records of the Naval Security Group Central Depository, Crane, IN, CNSG Library, Box 44, File 3222/71. National Archives at College Park, MD (NARAII).
  • Hatch, D. A. 2004. “DDE & NSA: An Introductory Survey,” Cryptologic Quarterly, 23(1–17).
  • “The History of GYP-1,” RG 38, Records of the Naval Security Group Central Depository, Crane, IN, CNSG Library, Box 116, File 5750/202. National Archives at College Park, MD (NARAII).
  • “History of JN-11, Japanese Fleet Auxiliary System, Reg. 1 and 4,” RG 38, Radio Intelligence Publications, Box 138, RIP 214. National Archives at College Park, MD (NARAII).
  • “JN-25 Cryptographic System,” RG 457, Historic Cryptographic Collection, Pre-World War I through World War II, Box 578, NR 1391. National Archives at College Park, MD (NARAII).
  • “Mamba, 1944–1945,” RG 457, Historic Cryptographic Collection, Pre-World War I Through World War II, Box 705, NR 1742. National Archives at College Park, MD (NARAII).
  • “The Mamba Process,” RG 38, Records of the Naval Security Group Central Depository, Crane, IN, CNSG Library, Box 15, File 3222/54. National Archives at College Park, MD (NARAII).
  • McDonald, D. 12 September 2012. Personal correspondence with Chris Christensen.
  • Meader, Captain R. I. 21 January 1949. Meader Postwar Report on the NCML. http://daytoncodebreakers.org/.
  • 1945. “Operations and Maintenance Schedule for Mamba,” RG 457, Historic Cryptographic Collection, Pre-World War I through World War II, Box 584, NR 1446. National Archives at College Park, MD (NARAII).
  • “Photographs—Naval Security Station Cryptanalytic Machine Installations, 1945,” RG 457, Historic Cryptographic Collection, Pre-World War I through World War II, Box 584, NR 1443. National Archives at College Park, MD (NARAII).
  • “Research Report on Alignment of JN-25,” RG 457, Historic Cryptographic Collection, Pre-World War I through World War II, Box 622, NR 1628. National Archives at College Park, MD (NARAII).
  • Simpson, E. 4 January 2012. Personal correspondence with Chris Christensen.
  • Smith, M. 2000. The Emperor's Codes: The Breaking of Japan's Secret Codes. New York: Arcade Publishing.
  • “Techniques and Procedures Used in the Cryptanalysis of JN-25 by Station Negat Reg. No. 1,” RG 38, Radio Intelligence Publications, Box 138, RIP 171. National Archives at College Park, MD (NARAII).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.