2011
DOI: 10.1080/01611194.2011.558978
|View full text |Cite
|
Sign up to set email alerts
|

Operational Use and Cryptanalysis of the Kryha Cipher Machine

Abstract: The Kryha machine was introduced in 1924 and continued to be marketed into the 1950s. The cryptologic literature surveyed for this article includes descriptions of various models of the machine and methods of attacking it, but relatively little has been written about its operational use. This article reviews both published and archival material, and provides some examples of actual use and cryptanalysis from the period immediately before and during the Second World War.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…From cryptological point of view, the cipher is a polyalphabetic substitution with individual alphabets rotated by the amount given by clocking se-quence of the machine. Such a system was known to be broken even before WW2 (Marks, 2011).…”
Section: Cipher Machinesmentioning
confidence: 99%
“…From cryptological point of view, the cipher is a polyalphabetic substitution with individual alphabets rotated by the amount given by clocking se-quence of the machine. Such a system was known to be broken even before WW2 (Marks, 2011).…”
Section: Cipher Machinesmentioning
confidence: 99%