An official website of the United States government
Here's how you know
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
National Security Agency/Central Security Service
NSA/CSS
Search
Search NSA:
Search
Search NSA:
Search
About
Leadership
Mission & Combat Support
Cybersecurity
Signals Intelligence
Central Security Service
Locations
Research
Diversity, Equity, Inclusion & Accessibility
Cybersecurity Collaboration Center
Collaborative Partnerships
Enduring Security Framework
DIB Cybersecurity Services
Standards and Certifications
Artificial Intelligence Security Center
Press Room
Press Releases & Statements
News & Highlights
Podcast
Declassification & Transparency Initiatives
Cybersecurity Advisories & Guidance
Telework and Mobile Security Guidance
DoD Microelectronics Guidance
Research Publications
Careers
Innovation
WorkLifeBalance
History
National Cryptologic Museum
Cryptologic History
National Cryptologic Memorial
Home
History
Cryptologic History
Historical Publications
Historical Publications Lists
Search
Search
Upload Date
Upload Date
Document Date
Title
A New Kind of Detective Work
The Voynich Manuscript - an Elegant Enigma *
The Dawn of American Cryptology
Revolutionary Secrets: The Secret Communications of the American Revolution
American Cryptology: Two Centuries of Tradition *
The Cipher Disk *
Masked Dispatches: Cryptograms and Cryptology in American History, 1775-1900 *
Search
Search
Upload Date
Upload Date
Document Date
Title
From the Ground Up: APPENDIX A: Cryptologists of World War I
From the Ground Up: American Cryptology during World War I
Issues in British and American Signals Intelligence 1919-1932
Women Telephone Operators in World War I France
Search
Search
Upload Date
Upload Date
Document Date
Title
Enigma Patent
Solving the ENIGMA: History of the Cryptanalytic Bombe
A History of US Communications Intelligence during WWII: Policy and Administration *
SIGSALY Story
How Mathematicians Helped Win WWII
Sharing the Burden: Women in Cryptology during WWII *
A History of Secure Voice Coding: Insights Drawn from the Career of One of the Earliest Practitioners of the Art of Speech Coding
A Priceless Advantage: U.S. Navy Communications Intelligence and the Battles of Coral Sea Midway and the Aleutians *
American Signal Intelligence in Northwest Africa and Western Europe *
The Start of the Digital Revolution: SIGSALY - Secure Digital Voice Communications in WWII *
The Battle of Midway: AF is Short of Water
West Wind Clear: Cryptology and the Winds Message Controversy - A Documentary History *
Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and the Holocaust 1939-1945 *
Cryptologic Aspects of German Intelligence Activities in South America during World War II *
The Cryptographic Mathematics of Enigma
The First Americans: The 1941 US Codebreaking Mission to Bletchley Park
Pearl Harbor Revisited: United States Navy Communications Intelligence 1924-1941 *
Origins of the Navajo Code Talkers
The Secret of Adam and Eve
German Cipher Machines of World War II *
FIRST
1
(current)
2
LAST
Search
Search
Upload Date
Upload Date
Document Date
Title
SIGINT and COMSEC Help Save the Day at Pusan
The SIGINT Background
SIGINT and COMSEC Help Save the Day at Pusan
So Power Can be Brought into Play: SIGINT and the Pusan Perimeter *
The Korean War: The SIGINT Background *
PFC Jay Stoner
Search
Search
Upload Date
Upload Date
Document Date
Title
Essential Matters: A History of the Cryptographic Branch of the People's Army of Viet Nam 1945-1975
Search
Search
Upload Date
Upload Date
Document Date
Title
NSA and the Cuban Missile Crisis
The VENONA Story *
Dedication and Sacrifice: National Aerial Reconnaissance in the Cold War *
Silent Warriors: The Naval Security Group Reserve 1945 - 2005 *
A Dangerous Business: The U.S. Navy and National Reconnaissance During the Cold War *
Candle in the Dark: COMINT and Soviet Industrial Secrets , 1946-1956
Learning from the Enemy: The GUNMAN Project
VENONA: Soviet Espionage and the American Response 1939-1957
Search
Search
Upload Date
Upload Date
Document Date
Title
CryptoComics - The Gold Bug
CryptoComics - Solving Purple
CryptoComics – Red Carnation
CryptoComics – “Louie”
CryptoComics – America’s First Spy Story
CryptoComics – From the Ambassador
CryptoComics – A Noble Life
CryptoComics – First African American Cryptologists
CryptoComics – Civil War Signal Security
CryptoComics – A Revolution in Communications
CryptoComics – Beneath the Surface
CryptoComics – Critical Communications
CryptoComics – GuadalCanal
CryptoComics – Teaching an Old General New Tricks
CryptoComics – The Juanita Moody Story
CryptoComics – The Unbreakable Kryha Machine
CryptoComics – NSOC
Search
Search
Upload Date
Upload Date
Document Date
Title
“Give to Ferner” The Untold Story of an American Master Cryptanalyst
The Neglected Giant: Agnes Meyer Driscoll
In Memoriam Dr. Louis Tordella
Brigadier John Tiltman: A Giant Among Cryptanalysts *
Listening to the Rumrunners: Radio Intelligence during Prohibition *
Ann's War: One Woman's Journey to the Codebreaking Victory over Japan
The Friedman Legacy: A Tribute to William and Elizebeth Friedman*
Search
Search
Upload Date
Upload Date
Document Date
Title
National Computer Security Center and the Origins of NSA's Information Assurance Mission
Settings, Keys, Hats, and Head Scratching: The Headline Puzzle
Ninety Years of Assessing Civilian Cryptologic Performance at the National Security Agency
NSA Directors: The Selection and Confirmation Process
Showcase of the National Security Agency The National Cryptologic Museum: A 10-Year Anniversary Retrospective
Women in Mathematics Society
Tale of the Tape
Rare Books in the National Cryptologic Museum *
The Origins of NSA *
Fun Facts about Cryptology
The History of Traffic Analysis: World War I - Vietnam *
50th Anniversary Brochure
Search
Search
Upload Date
Upload Date
Document Date
Title
Securing Record Communications: The TSEC/KW-26 *
Telemetry Intelligence (TELINT) During the Cold War
Electronic Intelligence (ELINT) at NSA *
The SIGABA/ECM II Cipher Machine: "A Beautiful Idea"
In the Forefront of Foreign Missile and Space Intelligence - History of the Defense Special Missile and Aerospace Center (DEFSMAC), 1960-2010
Cryptology's Role in the Early Development of Computer Capabilities in the United States
Search
Search
Upload Date
Upload Date
Document Date
Title
Cryptologic Quarterly Vol. 41
Cryptologic Quarterly Vol. 40
Cryptologic Quarterly Vol. 33
Cryptologic Quarterly Vol. 34
Cryptologic Quarterly Vol. 38
Cryptologic Quarterly Vol. 36
Search
Search
Upload Date
Upload Date
Document Date
Title
2021 CCH CALENDAR
2024 CCH CALENDAR
2023 CCH CALENDAR
2022 CCH CALENDAR