Friday, September 27, 2024

Ralph Simpson on Cracking the Enigma

Ralph Simpson was speaker of the month at the California Historical Radio Society where he gave a talk on the early development of encryption devices. He focused on the Enigma cipher machine, its inventors and patents, and its use by the German military during the Second World War. He also explains why the machine was considered unbreakable, but eventually proved to be the Achilles' heel of the German armed forces during the Second World War.

Ralph had a career in the computer industry but also developed a passion for old cipher machines and their history. He is a respected member of the cryptologic history community and runs a website with a wealth of historical crypto devices and equipment for secret communications, all accompanied by technical details and relevant historical information. Be sure to visit his website Cipher History.

Monday, July 08, 2024

A Call to Former KL-7 and KL-47 Operators

TSEC/KL-7 © Dirk Rijmenants

The TSEC/KL-7 crypto machine was developed by the Army Security Agency (ASA) and Armed Forces Security Agency (AFSA) under the name AFSAM-7, and introduced in 1953 by the National Security Agency (NSA) into the U.S. Army and Air Force, and later also into the CIA and FBI. The machine also served in all NATO forces, their embassies and some state departments. The U.S. Navy AFSAM-47B, later known as TSEC/KL-47, was compatible with the KL-7. The last machines  retired in the early 1980s. It's been little over 40 years ago that the last machines left the service and time is running out to document first-hand accounts on these machines.

If you are a retired signals veteran with experience on the KL-7 or KL-47 as operator or technician, a member of a signals association or organization, or worked in the communications section of a state department that used the KL-7, then contact us through our website to document your story. The KL-7 is fully declassified and we're not interested in classified information, we only want to preserve the cryptologic history of these Cold War icons.

Besides the United States, the KL-7 was also used by its NATO allies Australia, Belgium, Canada, Denmark, England, France, Germany, Greece, Italy, Luxemburg, the Netherlands, Norway, New Zealand, Portugal and Turkey. Outside NATO, the KL-7 was also on loan to South Korea, South Vietnam and Taiwan. If you're a signals veteran from any of these countries, a state department or embassy in the 1950s to 1980s era, then contact us, or spread the word.

Unfortunately, time is running out to document first-hand accounts, as the people involved are age seventy or older, and memories fade. Please share this request with all signals communities that might have former KL-7 or KL-47 operators and technicians. Those who share their story retain full control over the content and how it is published.

Let's preserve cryptologic history!

Visit the U.S. TSEC/KL-7 ADONIS & POLLUX webpage to learn more about the KL-7, its development, technical details and full history, including some first-hand accounts, also shown below, to get an idea of the kind of stories we hope to document. You can contact us through the contact page on our website Cipher Machines and Cryptology.

Enjoy reading!

Thursday, June 06, 2024

Martin Gillow's Virtual Colossus and Other Machines

The Virtual Colossus
© Image Martin Gillow

The history of crypto equipment is quite fascinating, but diving into the archives, searching for historical publications, or collecting those old machines is not everyone’s cup of tea. Luckily, we have a community, dedicated to preserving the history of old crypto equipment, research the technical details, publish their history and operational use, and bring those old crypto machines back to life, either physically, which can be quite expensive, or virtually though software simulations.

Writing software that works exactly like the real crypto machine requires extensive study of the original machine, its mechanical and/or electrical properties, and many hours to write the software that reproduces the plaintext or ciphertext exactly like the original machine. However, you could take it one step further, and make a virtual three-dimensional machine where you can manipulate all components and encrypt, decrypt or break messages, just like the wartime operators.

Martin Gillow created a website with no less than ten 3D simulations. The virtual British Colossus machine is the first ever digital computer, developed in WW2 to break the German Lorenz SZ40/42 encrypted telex, of which he also created a virtual version. There’s also the virtual Enigma machine, and the Bombe that was used by the Bletchley Park codebreakers to decrypt the German Enigma messages.

Hagelin's U.S. M-209
© Image Martin Gillow
Also the British Typex machine and the U.S. M-209, developed by the renown Swedish engineer Boris Hagelin, have their 3D version. Moreover, the collection includes the ICT 1301 ”Flossie” second-generation computer, the E.R.N.I.E electronic random number generator, and the American crib dragging machine Dragon that helped to break the Lorenz messages.

Of course, the countless hours of work by Martin to research and study those machines, and write accurate 3D versions, is just enormous, and makes this 3D collection simply unaffordable… unless you just want to preserve and share the history of old crypto machines, and make the simulations available to everyone for free. A big Thank You to Martin for creating all those virtual machines, and for being part of that small community, dedicated to preserve cryptologic history.

Make sure to scroll all the way down his main page, to find all virtual 3D simulations and read the various tutorials on how to use them. Also click the relevant "find out more" buttons to learn about each machine and its history. Visit the Virtual Colossus website.
 
Highly recommended, and no better day than D-day to share Martin's work and commemorate all codebreakers.

Thursday, March 28, 2024

Crypto's Cast with Dr. Carola Dahlke as First Guest

I'm pleased to announce the first guest on our brand new Crypto's Cast. The goal is to bring interesting bite-size stories for crypto enthusiasts, but also to tickle the interest of listeners with limited or no knowledge on cryptography.
 
The Cast is a group of crypto experts, historians and collectors that will bring fascinating stories, with topics ranging from cryptologic history, its technology and science, important historical events, influenced by cryptography, renown cryptologists, cipher machines, the making and breaking of codes and crypto algorithms, crypto and privacy, to books and websites.
 
Our first guest is Dr. Carola Dahlke. She is the curator of the department of Computer Science and Cryptology at the Deutsches Museum in Munich, Germany, and expert in historical crypto equipment. There's hardly a better guest to start our podcast, as she was instrumental in documenting and preserving the Schlüsselgerät 41, a German cipher machine, far more secure than the famous Enigma, but unknown until recently.
 

Saturday, February 17, 2024

Ringway Manchester

Ringway Manchester

The Ringway Manchester YouTube channel is a fascinating journey into radio waves, but hard to describe, as it covers so many subjects with signals as the common theme. Lewis created hundreds of videos on various signals from across the world and explains the equipment and historical context behind them.

No extensive documentaries, but interesting bite-sized 5 to 15 minutes videos about shortwave listening, numbers stations, military transmitters, pirate radio, Cold War relics, clandestine radios and spies, transmitter locations and mysterious and even frightening signals, but also reviews of transceivers, receivers and handheld scanners.

Click banner to visit the YouTube channel

Visit also Lewis Ringway Facebook, RingwayManchester X (Twitter) and M3HHY Instagram, well worth following.

Below some Ringway Manchester videos that might want you to buy a shortwave receiver and start surfing the radio waves. Many more videos available at his YouTube channel. Enjoy listening!


 


 


The Most Terrifying Shortwave Signal Ever