Paper - Hoover Institution Press
Nobody But Us
The Rise and Fall of the Golden Age of Signals Intelligence
Abstract
The United States’ National Cryptologic Museum in Fort Meade, Maryland, displays versions of two important encryption machines. The first is the Enigma machine, the most famous cryptographic apparatus ever built. The second machine, less well known, is called SIGABA. These devices are similar in certain important respects. Each employs an electromechanical rotor-based design. Each was used during World War II; the Nazis deployed Enigma while US forces relied on SIGABA. It is no exaggeration to say that, during the conflict, these machines protected—or tried to protect—some of the most important messages in the world.
Both sides treated the machines as closely guarded secrets. The United States took enormous steps to protect SIGABA, requiring that it only be deployed to areas where American forces could guard it and instructing these forces to destroy the machines before they could be captured. American cryptologists feared what could happen if the enemy gained access to SIGABA and reverse engineered it. On the other hand, the Allies achieved an enormous success when they captured an Enigma machine. Acquiring the physical device was one of the many factors that enabled the Allies to eventually understand its workings and decrypt the messages it protected.
Want to Read More?
The full text of this publication is available via the original publication source.
For more information on this publication:
Please contact
Cyber Project
For Academic Citation:
Buchanan, Ben . “Nobody But Us.” Paper, Hoover Institution Press, August 30, 2017.
- Recommended
- In the Spotlight
- Most Viewed
Recommended
Analysis & Opinions
- Lawfare
Building a Cyber Insurance Backstop Is Harder Than It Sounds
Analysis & Opinions
- cyberscoop
CFPB’s Proposed Data Rules Would Improve Security, Privacy and Competition
Analysis & Opinions
- WIRED
AI Needs to Be Both Trusted and Trustworthy
In the Spotlight
Most Viewed
Report
- Belfer Center for Science and International Affairs and UiT The Arctic University of Norway
Arctic Climate Science: A Way Forward for Cooperation through the Arctic Council and Beyond
Journal Article
- Research Policy
The Relationship Between Science and Technology
Paper
- Belfer Center for Science and International Affairs, Harvard Kennedy School
Attacking Artificial Intelligence: AI’s Security Vulnerability and What Policymakers Can Do About It
Abstract
The United States’ National Cryptologic Museum in Fort Meade, Maryland, displays versions of two important encryption machines. The first is the Enigma machine, the most famous cryptographic apparatus ever built. The second machine, less well known, is called SIGABA. These devices are similar in certain important respects. Each employs an electromechanical rotor-based design. Each was used during World War II; the Nazis deployed Enigma while US forces relied on SIGABA. It is no exaggeration to say that, during the conflict, these machines protected—or tried to protect—some of the most important messages in the world.
Both sides treated the machines as closely guarded secrets. The United States took enormous steps to protect SIGABA, requiring that it only be deployed to areas where American forces could guard it and instructing these forces to destroy the machines before they could be captured. American cryptologists feared what could happen if the enemy gained access to SIGABA and reverse engineered it. On the other hand, the Allies achieved an enormous success when they captured an Enigma machine. Acquiring the physical device was one of the many factors that enabled the Allies to eventually understand its workings and decrypt the messages it protected.
Want to Read More?
The full text of this publication is available via the original publication source.- Recommended
- In the Spotlight
- Most Viewed
Recommended
Analysis & Opinions - Lawfare
Building a Cyber Insurance Backstop Is Harder Than It Sounds
Analysis & Opinions - cyberscoop
CFPB’s Proposed Data Rules Would Improve Security, Privacy and Competition
Analysis & Opinions - WIRED
AI Needs to Be Both Trusted and Trustworthy
In the Spotlight
Most Viewed
Report - Belfer Center for Science and International Affairs and UiT The Arctic University of Norway
Arctic Climate Science: A Way Forward for Cooperation through the Arctic Council and Beyond
Journal Article - Research Policy
The Relationship Between Science and Technology
Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School
Attacking Artificial Intelligence: AI’s Security Vulnerability and What Policymakers Can Do About It