TypexIn the history of cryptography, Typex (alternatively, Type X or TypeX) machines were British cipher machines used from 1937. It was an adaptation of the commercial German Enigma with a number of enhancements that greatly increased its security. The cipher machine (and its many revisions) was used until the mid-1950s when other more modern military encryption systems came into use. Like Enigma, Typex was a rotor machine. Typex came in a number of variations, but all contained five rotors, as opposed to three or four in the Enigma.
Traffic analysisTraffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted. In general, the greater the number of messages observed, the greater information be inferred. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is also a concern in computer security. Traffic analysis tasks may be supported by dedicated computer software programs.
Magic (cryptography)Magic was an Allied cryptanalysis project during World War II. It involved the United States Army's Signals Intelligence Service (SIS) and the United States Navy's Communication Special Unit. Magic was set up to combine the US government's cryptologic capabilities in one organization dubbed the Research Bureau. Intelligence officers from the Army and Navy (and later civilian experts and technicians) were all under one roof. Although they worked on a series of codes and cyphers, their most important successes involved RED, BLUE, and PURPLE.
Type B Cipher MachineIn the history of cryptography, the "System 97 Typewriter for European Characters" (九七式欧文印字機 kyūnana-shiki ōbun injiki) or "Type B Cipher Machine", codenamed Purple by the United States, was an encryption machine used by the Japanese Foreign Office from February 1939 to the end of World War II. The machine was an electromechanical device that used stepping-switches to encrypt the most sensitive diplomatic traffic. All messages were written in the 26-letter English alphabet, which was commonly used for telegraphy.
Battle of Alam el HalfaThe Battle of Alam el Halfa took place between 30 August and 5 September 1942 south of El Alamein during the Western Desert Campaign of the Second World War. Panzerarmee Afrika (Generalfeldmarschall Erwin Rommel), attempted an envelopment of the British Eighth Army (Lieutenant-General Bernard Montgomery). In Unternehmen Brandung (Operation Surf), the last big Axis offensive of the Western Desert Campaign, Rommel intended to defeat the Eighth Army before Allied reinforcements arrived.
Double agentIn the field of counterintelligence, a double agent is an employee of a secret intelligence service for one country, whose primary purpose is to spy on a target organization of another country, but who is now spying on their own country's organization for the target organization. Double agentry may be practiced by spies of the target organization who infiltrate the controlling organization or may result from the turning (switching sides) of previously loyal agents of the controlling organization by the target.
M-209In cryptography, the M-209, designated CSP-1500 by the United States Navy (C-38 by the manufacturer) is a portable, mechanical cipher machine used by the US military primarily in World War II, though it remained in active use through the Korean War. The M-209 was designed by Swedish cryptographer Boris Hagelin in response to a request for such a portable cipher machine, and was an improvement of an earlier machine, the C-36. The M-209 is about the size of a lunchbox, in its final form measuring and weighing (plus for the case).
Stepping switchIn electrical control engineering, a stepping switch or stepping relay, also known as a uniselector, is an electromechanical device that switches an input signal path to one of several possible output paths, directed by a train of electrical pulses. The major use of stepping switches was in early automatic telephone exchanges to route telephone calls. Later, they were often used in industrial control systems. During World War II, Japanese cypher machines, known in the United States as CORAL, JADE, and PURPLE contained them.