KW-37
   HOME

TheInfoList



OR:

The KW-37, code named JASON, was an encryption system developed In the 1950s by the U.S.
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collect ...
to protect fleet broadcasts of the
U.S. Navy The United States Navy (USN) is the maritime service branch of the United States Armed Forces and one of the eight uniformed services of the United States. It is the largest and most powerful navy in the world, with the estimated tonnage o ...
. Naval doctrine calls for warships at sea to maintain radio silence to the maximum extent possible to prevent ships from being located by potential adversaries using radio direction finding. To allow ships to receive messages and orders, the navy broadcast a continuous stream of information, originally in Morse code and later using
radioteletype Radioteletype (RTTY) is a telecommunications system consisting originally of two or more electromechanical teleprinters in different locations connected by radio rather than a wired link. Radioteletype evolved from earlier landline teleprinter ...
. Messages were included in this stream as needed and could be for individual ships, battle groups or the fleet as a whole. Each ship's radio room would monitor the broadcast and decode and forward those messages directed at her to the appropriate officer. The KW-37 was designed to automate this process. It consisted of two major components, the KWR-37 receive unit and the KWT-37 transmit unit. Each ship had a complement of KWR-37 receivers (usually at least two) that decrypted the fleet broadcast and fed the output to teleprinter machines. KWT-37's were typically located at shore facilities, where high power transmitters were located. The KWR-37 weighed 100 pounds (45 kg) and contained some 500 subminiature
vacuum tube A vacuum tube, electron tube, valve (British usage), or tube (North America), is a device that controls electric current flow in a high vacuum between electrodes to which an electric potential difference has been applied. The type known as ...
s, whose leads were
solder Solder (; NA: ) is a fusible metal alloy used to create a permanent bond between metal workpieces. Solder is melted in order to wet the parts of the joint, where it adheres to and connects the pieces after cooling. Metals or alloys suitable ...
ed to printed circuit boards. Each flip-flop in the KW-37 required three tubes, placing an upper bound on the total number of stages in any
shift registers A shift register is a type of digital circuit using a cascade of flip-flops where the output of one flip-flop is connected to the input of the next. They share a single clock signal, which causes the data stored in the system to shift from one lo ...
used at 166. Squeezing so much logic in such a small and rugged package was quite a feat in the 1950s. Each KWT-37 filled an entire relay rack with five stacked modules. A precision time reference occupied the bottom, three key generators ( stream cyphers in civilian parlance) occupied the middle and an alarm panel occupied the top position. The outputs of the three key generators were combined in a voting circuit. If one of the units' output did not match the other two, an alarm was sounded and the output from the two units that did agree continued to be used. Each KWR-37 and each key generator in the KWT-37 had a common fill device (CFD) for loading keys (or as NSA calls them cryptovariables). The CFDs were similar to that first used in the
KW-26 The TSEC/KW-26, code named ROMULUS, (in 1966 the machine based encryption system was not code-named "Romulus," rather the code-name was "Orion," at least in the US Army's variant) was an encryption system used by the U.S. Government and, later, ...
, accepting
punched cards A punched card (also punch card or punched-card) is a piece of stiff paper that holds digital data represented by the presence or absence of holes in predefined positions. Punched cards were once common in data processing applications or to di ...
in
Remington Rand Remington Rand was an early American business machine manufacturer, originally a typewriter manufacturer and in a later incarnation the manufacturer of the UNIVAC line of mainframe computers. Formed in 1927 following a merger, Remington Rand w ...
format. The key was changed every day at 0000 hours
GMT Greenwich Mean Time (GMT) is the mean solar time at the Royal Observatory in Greenwich, London, counted from midnight. At different times in the past, it has been calculated in different ways, including being calculated from noon; as a cons ...
. The receivers were synchronized to the transmitter at that time. If a receiver ever got out of sync, say due to a power failure, an operator had to set the current hour and minute on dials on the front panel. The KWR-37 would then "fast forward" through its key stream sequence until synchronization was re-established. Large numbers of fleet broadcast key cards had to be produced and distributed to every navy ship and many shore installations on a monthly basis, so many people had access to them. While the key cards were strictly accounted for, they were easy to copy. This proved to be a fatal weakness. KWR-37s fell into North Korean hands when the USS ''Pueblo'' was captured in 1968. New keying material was issued to ships throughout the world to limit the ongoing damage. In 1985 it was revealed that the Walker spy ring had been selling key lists and cards to the
Soviet Union The Soviet Union,. officially the Union of Soviet Socialist Republics. (USSR),. was a List of former transcontinental countries#Since 1700, transcontinental country that spanned much of Eurasia from 1922 to 1991. A flagship communist state, ...
for decades. KW-37 systems were taken out of service by the early 1990s. The received input to the KW(R)-37 was in the form of a multiple broadcast (multicast) signal, consisting of many channels condensed into one tone pack which was deciphered at one stage by the KW(R)-37 and then the output was sent to several KG-14's which further deciphered the then split signals into each channel of the fleet broadcast. The KG-14 also received its timing signal from the KW(R)-37; if the 37 was out of sync, all the 14's were fall out of sync as well. Each KG-14 could process one channel of the tone pack; most fleet units had six KG-14's, larger units even more.


Experiences operating the KWR-37

Typically, fleet units utilizing the KWR-37 units were outfitted with two devices for redundancy. Should one unit fail, the other one would already be online and patches via a high level, 60-milliamp patch panel would quickly be changed around so that the current offline unit could be changed over to online status at a moment's notice, to ensure that there was no interruption of message traffic. Later in their life, when KWR-37 units were aged and worn, sometimes the circuit cards inside had to be reseated with a rubber mallet which helped ensure the cards were seated properly. Other problems with the KWR-37's were related to the startup times. Fleet radiomen, and those stationed in the shore transmitting stations, had to listen to an HF signal for coordinated universal time. Radiomen called this broadcast the "time tick," which gave them a sharp tone, signalling them to press the restart button so that the unit could then start up for " new day" or otherwise known as "HJ's" by the radiomen. This took place after the new day's crypto keylist card was properly inserted into the "crib" or the card reader by securing it onto pins and then firmly closing the card access door and then locking it with a key. Once the unit(s) were restarted, the key was placed back in the safe using two-person integrity (TPI) which was stringently enforced following the Walker spy investigation. In the early nineties when the KWR-37 units were retired from the navy and replaced by the more reliable and modern KWR-46's, fleet Radiomen breathed a sigh of relief because the KWR-37 units were often unreliable and would occasionally fall out of synchronization timing, resulting in a loss of broadcast messages from the various fleet channels.


Sources


The KWR-37 On-line Crypto Receiver
— Jerry Proc: "Crypto Machines", HMCS ''Haida'' National Historic Site (2010). Experiences operating the KWR-37 - a personal account from a retired US Navy fleet Radioman {{Cryptography navbox , machines National Security Agency encryption devices