An official website of the United States government
Here's how you know

Official websites use .gov

A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock (lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Home Logo: National Security Agency I Central Security Service Home
National Security Agency/Central Security Service
NSA/CSS
Search
Search
Search
  • About
    • Leadership
    • Mission & Combat Support
    • Cybersecurity
    • Signals Intelligence
    • Central Security Service
    • Locations
    • Research
    • Cybersecurity Collaboration Center
      • Collaborative Partnerships
      • Enduring Security Framework
      • DIB Cybersecurity Services
      • Standards and Certifications
      • Artificial Intelligence Security Center
  • Press Room
    • Press Releases & Statements
    • News & Highlights
    • Podcast
    • Declassification & Transparency Initiatives
    • Cybersecurity Advisories & Guidance
    • Telework and Mobile Security Guidance
    • DoD Microelectronics Guidance
    • Research Publications
  • Careers
  • History
    • National Cryptologic Museum
    • Cryptologic History
    • National Cryptologic Memorial

HomeHistoryCryptologic HistoryHistorical PublicationsHistorical Publications Lists
  • Upload Date
  • Document Date
  • Title
Subject: Rumrunners
Date: 2001
Format: Brochure

A New Kind of Detective Work

Subject: Cryptology
Date: 1978
Format: Monograph

The Voynich Manuscript - an Elegant Enigma *

Subject: Revolutionary War
Date: 2012
Format: Brochure

Revolutionary Secrets: The Secret Communications of the American Revolution

Subject: Revolutionary War
Format: Monograph

American Cryptology: Two Centuries of Tradition *

Subject: Cipher Disk
Format: Brochure

The Cipher Disk *

Subject: Cipher Disk
Date: 1993
Format: Monograph

Masked Dispatches: Cryptograms and Cryptology in American History, 1775-1900 *

  • Upload Date
  • Document Date
  • Title
From the Ground Up: American Cryptology during World War I APPENDIX A: Cryptologists of World War I

By Betsy Rohaly Smoot

Center for Cryptologic History
First edition published 2023

From the Ground Up: APPENDIX A: Cryptologists of World War I

From the Ground Up: American Cryptology during World War I 

By Betsy Rohaly Smoot

Center for Cryptologic History
First edition published 2023

From the Ground Up: American Cryptology during World War I

Issues in British and American Signals Intelligence 1919-1932

Issues in British and American Signals Intelligence 1919-1932

  • Upload Date
  • Document Date
  • Title
Enigma Patent

Enigma Patent

Solving the ENIGMA: History of the Cryptanalytic Bombe by Jennifer Wilcox

Center for Cryptologic History National Security Agency
Revised Edition 2024

Solving the ENIGMA: History of the Cryptanalytic Bombe

Subject: SIGSALY
Date: 2000
Format: Brochure

SIGSALY Story

Subject: Mathematics
Date: 2005
Format: Brochure

How Mathematicians Helped Win WWII

Subject: Women
Date: 2013
Format: Brochure

Sharing the Burden: Women in Cryptology during WWII *

Subject: SIGSALY
Date: 2001
Format: Brochure

A History of Secure Voice Coding: Insights Drawn from the Career of One of the Earliest Practitioners of the Art of Speech Coding

Subject: War in the Pacific	
Date: 2017
Format: Monograph

A Priceless Advantage: U.S. Navy Communications Intelligence and the Battles of Coral Sea Midway and the Aleutians *

Subject: Signals Intelligence	
Date: 2010
Format: Monograph

American Signal Intelligence in Northwest Africa and Western Europe *

Subject: SIGSALY	
Date: 2000
Format: Brochure

The Start of the Digital Revolution: SIGSALY - Secure Digital Voice Communications in WWII *

Subject: Midway	
Date: 2000
Format: Brochure

The Battle of Midway: AF is Short of Water

Subject: Pearl Harbor	
Date: 2008
Format: Monograph

West Wind Clear: Cryptology and the Winds Message Controversy - A Documentary History *

Subject: Holocaust	
Date: 2004
Format: Monograph

Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and the Holocaust 1939-1945 *

Subject: German Intelligence	
Date: 2011
Format: Monograph

Cryptologic Aspects of German Intelligence Activities in South America during World War II *

Subject: Enigma	
Date: 2019
Format: Monograph

The Cryptographic Mathematics of Enigma

Subject: Enigma	
Date: 2016
Format: Monograph

The First Americans: The 1941 US Codebreaking Mission to Bletchley Park

Subject: Pearl Harbor	
Date: 2013
Format: Monograph

Pearl Harbor Revisited: United States Navy Communications Intelligence 1924-1941 *

Subject: Code Talkers		
Date: 2002
Format: Brochure

Origins of the Navajo Code Talkers

Subject: Bombes		
Date: 2002
Format: 	Brochure

The Secret of Adam and Eve

Subject: Cipher Machines	
Date: 2014
Format: 	Brochure

German Cipher Machines of World War II *

  • Upload Date
  • Document Date
  • Title
The Cold war gets Hot...

SIGINT and COMSEC Help Save the Day at Pusan

This paper has been cobbled together from summaries prepared during or immediately after the period of hostilities, some original documents, and the memories of some of the participants. Some of the materials on which this history is based may not be declassified by its publication date (June 2000). I have prepared the booklet in this unusual manner in order to have a general history in time for the 50th anniversary of the beginning of the war.

This booklet is therefore intended only as an introduction to the subject, an interim history until further declassification allows the fuller history of cryptologic support during the Korean War to be written. I would like to emphasize that much remains to be researched and studied about cryptology in Korea and, in fact, I look forward to more detailed studies of cryptology in the Korean War in the near future.

The SIGINT Background

Subject: Korean War
Date: 2001
Format: Brochure

SIGINT and COMSEC Help Save the Day at Pusan

Subject: Pusan Perimeter	
Date: 2000
Format: Brochure

So Power Can be Brought into Play: SIGINT and the Pusan Perimeter *

Subject: Korean War		
Date: 2001
Format: Brochure

PFC Jay Stoner

  • Upload Date
  • Document Date
  • Title
Subject: Vietnam
Date: 2017
Format: Monograph

Essential Matters: A History of the Cryptographic Branch of the People's Army of Viet Nam 1945-1975

  • Upload Date
  • Document Date
  • Title
NSA and the Cuban Missile Crisis by Thomas R. Johnson and David A. Hatch

Center for Cryptologic History National Security Agency
Reprinted 2014

NSA and the Cuban Missile Crisis

Subject: VENONA
Date: 
Format: Brochure
Reprinted 2012, 2019

The VENONA Story *

Subject: Cold War	
Date: 
Format: Brochure

Dedication and Sacrifice: National Aerial Reconnaissance in the Cold War *

Subject: Cold War	
Date: 2004
Format: Brochure

A Dangerous Business: The U.S. Navy and National Reconnaissance During the Cold War *

Subject: Cold War	
Date: 2017
Format: Monograph

Candle in the Dark: COMINT and Soviet Industrial Secrets , 1946-1956

Subject: Cold War	
Date: 2018
Format: Monograph

Learning from the Enemy: The GUNMAN Project

Subject: VENONA
Date: 1996
Format: Booklet

VENONA: Soviet Espionage and the American Response 1939-1957

  • Upload Date
  • Document Date
  • Title
CryptoComics #017: The Gold Bug

CryptoComics - The Gold Bug

CryptoComics 016 – Solving Purple

CryptoComics - Solving Purple

CryptoComics 015 – Red Carnation

CryptoComics – Red Carnation

CryptoComics 015 – “Louie”

CryptoComics – “Louie”

CryptoComics 014 – America’s First Spy Story

CryptoComics – America’s First Spy Story

CryptoComics 012 – From the Ambassador

CryptoComics – From the Ambassador

CryptoComics 011 – A Noble Life

CryptoComics – A Noble Life

CryptoComics 010 – First African American Cryptologists

CryptoComics – First African American Cryptologists

CryptoComics 009 – Civil War Signal Security

CryptoComics – Civil War Signal Security

CryptoComics 008 – A Revolution in Communications

CryptoComics – A Revolution in Communications

CryptoComics 007 – Beneath the Surface

CryptoComics – Beneath the Surface

CryptoComics 006 – Critical Communications

CryptoComics – Critical Communications

CryptoComics 005 – GuadalCanal

CryptoComics – GuadalCanal

CryptoComics 004 – Teaching an Old General New Tricks

CryptoComics – Teaching an Old General New Tricks

CryptoComics 003 – The Juanita Moody Story

CryptoComics – The Juanita Moody Story

CryptoComics 002 – The Unbreakable Kryha Machine

CryptoComics – The Unbreakable Kryha Machine

CryptoComics 001 – NSOC

CryptoComics – NSOC

  • Upload Date
  • Document Date
  • Title
“Give to Ferner” The Untold Story of an American Master Cryptanalyst

By Brenda J. McIntire

Center for Cryptologic History
First edition published 2023

“Give to Ferner” The Untold Story of an American Master Cryptanalyst

Subject:Driscoll
Date:2015
Format:Monograph

The Neglected Giant: Agnes Meyer Driscoll

Subject: Tordella
Date:
Format: Brochure

In Memoriam Dr. Louis Tordella

Subject: Tltman
Date:  2007 
Format: Brochure

Brigadier John Tiltman: A Giant Among Cryptanalysts *

Subject: Rumrunners
Date:  2014
Format: Brochure

Listening to the Rumrunners: Radio Intelligence during Prohibition *

Subject: Caracristi
Date:  2019
Format: Monograph

Ann's War: One Woman's Journey to the Codebreaking Victory over Japan

  • Upload Date
  • Document Date
  • Title
Cryptologic Quarterly, 2023-01 Article "National Computer Security Center and the Origins of NSA's Information Assurance Mission."

National Computer Security Center and the Origins of NSA's Information Assurance Mission

Settings, Keys, Hats, and Head Scratching: The Headline Puzzle

Center for Cryptologic History

Settings, Keys, Hats, and Head Scratching: The Headline Puzzle

Ninety Years of Assessing Civilian Cryptologic Performance at the National Security Agency

By Betsy Rohaly Smoot

Series VI | Volume 16

Center for Cryptologic History
Revised edition 2024
(original title: “Efficiency Rating” to “Contribution Evaluations”: 90 Years of Assessing Civilian Cryptologic Performance)

Ninety Years of Assessing Civilian Cryptologic Performance at the National Security Agency

NSA Directors: The Selection and Confirmation Process
A History and Lessons Learned Study

By Trumbull D. Soule

Center for Cryptologic History
First edition published 2022

NSA Directors: The Selection and Confirmation Process

Subject: Museum
Date: 2003
Format: Article

Showcase of the National Security Agency The National Cryptologic Museum: A 10-Year Anniversary Retrospective

Subject: Mathematics
Date: 2003
Format: Article

Women in Mathematics Society

Subject: Key Tape Production	
Date: 2016
Format: Article

Tale of the Tape

Subject: Books	
Date: 
Format: Article

Rare Books in the National Cryptologic Museum *

Subject: NSA	
Date: 
Format: Brochure

The Origins of NSA *

Subject: Cryptology
Date: 2017
Format: Brochure

Fun Facts about Cryptology

Subject: Anniversary	
Date: 2002	
Format: Brochure

50th Anniversary Brochure

  • Upload Date
  • Document Date
  • Title
Subject: Information Security
Date: 2003
Format:Brouchure

Securing Record Communications: The TSEC/KW-26 *

Subject: TELINT	
Date: 2003
Format:Brouchure

Telemetry Intelligence (TELINT) During the Cold War

Subject: ELINT
Date: 2003
Format: Monograph

Electronic Intelligence (ELINT) at NSA *

Subject: SIGABA/ECM II	
Date: 2015
Format: Monograph

The SIGABA/ECM II Cipher Machine: "A Beautiful Idea"

Subject: DEFSMAC	
Date: 2012
Format: Monograph

In the Forefront of Foreign Missile and Space Intelligence - History of the Defense Special Missile and Aerospace Center (DEFSMAC), 1960-2010

Subject: Cryptology
Date: 2015
Format: Monograph

Cryptology's Role in the Early Development of Computer Capabilities in the United States

  • Upload Date
  • Document Date
  • Title
Cryptologic Quarterly 2023-02 Volume 41

Cryptologic Quarterly Vol. 41

Cryptologic Quarterly 2021-01 Volume 40

Cryptologic Quarterly Vol. 40

Release of the William and Elizebeth Friedman Collection
William Bundy at Bletchley Park
How Modular Arithmetic Helped Win World War II
Two Cryptologic Nights at the Cinema

Cryptologic Quarterly Vol. 34

What CCH Can Do for You: Make History Relevant!
Decryption in Progress: The Sino-Japanese War of 1894-1895
A Nineteenth-Century SIGINT Success
The Cryptologist's War: How World War I Helped Weave the "Cloak" of Cryptologic Secrecy
Ann's War: One Woman's Journey to the Codebreaking Victory over Japan
Best-Laid Plans: Establishing the Armed Forces Security Agency Legal Counsel
Before the Dawn: Life at a Remote SIGINT Site during the Cold War

Cryptologic Quarterly Vol. 36

  • Upload Date
  • Document Date
  • Title
2025 Center for Cryptologic History Digital Calendar

2024 Center for Cryptologic History Digital Calendar

The Center for Cryptologic History 2021 Digital Calendar

2021 CCH CALENDAR

2024 Center for Cryptologic History Calendar

2024 CCH CALENDAR

2023 Center for Cryptologic History Calendar

2023 CCH CALENDAR

The Center for Cryptologic History 2022 Digital Calendar

2022 CCH CALENDAR

NSA.GOV
  • About
  • Leadership
  • Cybersecurity Collaboration
    Center
  • National Cryptologic Museum
  • Contact NSA
  • Accessibility
  • ABA Notice
  • Site Policies
CULTURE
  • Operating Authorities
  • Civil Liberties, Privacy, & Transparency Office
  • Compliance

  • General Counsel
  • NSA Inspector General
HELPFUL LINKS
  •  
  • NSA Freedom of Information Act
  • Privacy Act Requests
  • Request a Speaker
  • Prepublication Review
  • Media Inquiry
  • Frequently Asked Questions
  • Scams & Safety
  • Reasonable Accommodations Process
  • Personal Assistance Services
RESOURCES
  • Classified Materiel Conversion
  • Commercial Solutions for Classified Program (CSfC)​
  • Cryptographic Support Services
  • Media Destruction Guidance
  • NSA Open Source
RELATED LINKS
  • DNI.gov
  • Defense.gov
  • IC on the Record
  • Intelligence.gov
  • NSA.GOV
    • About
    • Leadership
    • Cybersecurity Collaboration Center
    • National Cryptologic Museum
    • Contact NSA
    • Accessibility
    • ABA Notice
    • Site Policies
  • CULTURE
    • Operating Authorities
    • Civil Liberties & Privacy
    • General Counsel
    • NSA Inspector General
  • HELPFUL LINKS
    • NSA Freedom of Information Act
    • Frequently Asked Questions
    • Privacy Act Requests
    • Request a Speaker
    • Prepublication Review
    • Media Inquiry
  • RESOURCES
    • Commercial Solutions for Classified Material (CSFC)
    • Media Destruction Guidance
    • Classified Materiel Conversion
    • Cross Domain Services
    • NSA Open Source
    • NSA Exhibit Roadshow
  • RELATED LINKS
    • DNI.gov
    • Defense.gov
    • IC on the Record
    • Intelligence.gov
  • Privacy & Security     Links Disclaimer     Section 508     Web Policy     Plain Writing Act    DOD IG    No FEAR Act    Imagery Use    FOIA    Open GOV    Strategic Plan    USA.gov    Small Business Act    Site Map  
 
Hosted by Defense Media Activity - WEB.mil Veterans Crisis Line number. Dial 988 then Press 1