2006
DOI: 10.1080/01611190600632457
|View full text |Cite
|
Sign up to set email alerts
|

The East German Encryption Machine T-310 and the Algorithm It Used

Abstract: This article gives an overview on the T-310 encryption machine, which was widely used by East German state authorities in the 1980s. The T-310 was based on a U880 processor and it encrypted 5 bit words as used by the teleprinters of the time. The encryption algorithm the T-310 used is a stream cipher working on 5 bit units. A complete description of this previously unpublished algorithm is given in this article. Although most of the content of this publication is based on information found by Bernd Lippmann in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(44 citation statements)
references
References 0 publications
0
35
0
Order By: Relevance
“…The original Feistel cipher construction had 2 branches and was invented around 1971 [15]. Then East German cipher designers had already in 1970s [22] mandated a substantially more complex structure. The actual connections depend on the so-called long-term key, a.k.a.…”
Section: Basic Description Of T-310mentioning
confidence: 99%
See 4 more Smart Citations
“…The original Feistel cipher construction had 2 branches and was invented around 1971 [15]. Then East German cipher designers had already in 1970s [22] mandated a substantially more complex structure. The actual connections depend on the so-called long-term key, a.k.a.…”
Section: Basic Description Of T-310mentioning
confidence: 99%
“…It remains to specify how the U 1−9 are computed inside one round. In [22] this is defined using a function T : {0, 1} 2+27 → IF 9 2 which is also illustrated in Fig. 3 below.…”
Section: One Block Cipher Round φmentioning
confidence: 99%
See 3 more Smart Citations