M-325: Difference between revisions
Content deleted Content added
built in 1944 not in 1936 |
Patent filed August 11, 1944 |
||
Line 7: | Line 7: | ||
| image-size = |
| image-size = |
||
| caption = The M-325 (SIGFOY) cipher machine was inspired by the German [[Enigma (machine)|Enigma]] |
| caption = The M-325 (SIGFOY) cipher machine was inspired by the German [[Enigma (machine)|Enigma]] |
||
| invent-date = 1944<ref name="Bauer2013">{{cite book|author=F.L. Bauer|title=Decrypted Secrets: Methods and Maxims of Cryptology|url=https://books.google.com/books?id=E-epCAAAQBAJ&pg=PA133|date=9 March 2013|publisher=Springer Science & Business Media|isbn=978-3-662-03452-1|pages=133–}}</ref> |
|||
| invent-date = 1944 |
|||
| invent-name = |
| invent-name = |
||
| conn1 = |
| conn1 = |
||
Line 37: | Line 37: | ||
}} |
}} |
||
In the [[history of cryptography]], '''M-325''', also known as '''SIGFOY''',<ref name="Bauer2002">{{cite book|author=Friedrich Ludwig Bauer|title=Decrypted Secrets: Methods and Maxims of Cryptology|url=https://books.google.com/books?id=s9y9p2jP6pQC&pg=PA137|year=2002|publisher=Springer Science & Business Media|isbn=978-3-540-42674-5|pages=137–}}</ref> was an [[United States|American]] [[rotor machine]] designed by [[William F. Friedman]] and built in 1944.<ref name="LeeuwBergstra2007">{{cite book|author1=Karl Maria Michael de Leeuw|author2=Jan Bergstra|title=The History of Information Security: A Comprehensive Handbook|url=https://books.google.com/books?id=pQBrsonDp6cC&pg=PA407|date=28 August 2007|publisher=Elsevier|isbn=978-0-08-055058-9|pages=407–}}</ref> Between 1944 and 1946, more than 1,100 machines were deployed within the [[United States Foreign Service]]. Its use was discontinued in 1946 because of faults in operation. Friedman applied for a patent on the M-325 on 11 August 1944; it was granted on 17 March 1959 (US patent #2,877,565). |
In the [[history of cryptography]], '''M-325''', also known as '''SIGFOY''',<ref name="Bauer2002">{{cite book|author=Friedrich Ludwig Bauer|title=Decrypted Secrets: Methods and Maxims of Cryptology|url=https://books.google.com/books?id=s9y9p2jP6pQC&pg=PA137|year=2002|publisher=Springer Science & Business Media|isbn=978-3-540-42674-5|pages=137–}}</ref> was an [[United States|American]] [[rotor machine]] designed by [[William F. Friedman]] and built in 1944.<ref name="LeeuwBergstra2007">{{cite book|author1=Karl Maria Michael de Leeuw|author2=Jan Bergstra|title=The History of Information Security: A Comprehensive Handbook|url=https://books.google.com/books?id=pQBrsonDp6cC&pg=PA407|date=28 August 2007|publisher=Elsevier|isbn=978-0-08-055058-9|pages=407–}}</ref> Between 1944 and 1946, more than 1,100 machines were deployed within the [[United States Foreign Service]]. Its use was discontinued in 1946 because of faults in operation. Friedman applied for a patent on the M-325 on 11 August 1944; <ref name="Bauer2006">{{cite book|author=Friedrich L. Bauer|title=Decrypted Secrets: Methods and Maxims of Cryptology|url=https://books.google.com/books?id=hfWTDr_bvMwC&pg=PA151|date=24 November 2006|publisher=Springer Science & Business Media|isbn=978-3-540-48121-8|pages=151–}}</ref> it wasand was granted on 17 March 1959 (US patent #2,877,565). |
||
Like the [[Enigma machine|Enigma]], the M-325 contains three intermediate rotors and a reflecting rotor. |
Like the [[Enigma machine|Enigma]], the M-325 contains three intermediate rotors and a reflecting rotor. |
Revision as of 13:11, 8 January 2020
Date invented | 1944[1] |
---|---|
Type | rotor machine |
In the history of cryptography, M-325, also known as SIGFOY,[2] was an American rotor machine designed by William F. Friedman and built in 1944.[3] Between 1944 and 1946, more than 1,100 machines were deployed within the United States Foreign Service. Its use was discontinued in 1946 because of faults in operation. Friedman applied for a patent on the M-325 on 11 August 1944; [4] it wasand was granted on 17 March 1959 (US patent #2,877,565).
Like the Enigma, the M-325 contains three intermediate rotors and a reflecting rotor.
See also
References
- ^ F.L. Bauer (9 March 2013). Decrypted Secrets: Methods and Maxims of Cryptology. Springer Science & Business Media. pp. 133–. ISBN 978-3-662-03452-1.
- ^ Friedrich Ludwig Bauer (2002). Decrypted Secrets: Methods and Maxims of Cryptology. Springer Science & Business Media. pp. 137–. ISBN 978-3-540-42674-5.
- ^ Karl Maria Michael de Leeuw; Jan Bergstra (28 August 2007). The History of Information Security: A Comprehensive Handbook. Elsevier. pp. 407–. ISBN 978-0-08-055058-9.
- ^ Friedrich L. Bauer (24 November 2006). Decrypted Secrets: Methods and Maxims of Cryptology. Springer Science & Business Media. pp. 151–. ISBN 978-3-540-48121-8.
Further reading
- Louis Kruh, Converter M-325(T), Cryptologia 1, 1977, pp143–149.
External links
- Operating and Keying Instructions for Converter M-325(T) Headquarters, Army Security Agency, July 1948, scanned and transcribed by Bob Lord.
- Friedman M-325 — information and photographs.
- U.S. patent 2,877,565