Skip to main content

Image / Cryptext CX-II Data Encryption Device

Have a question about this item?

Item information. View source record on contributor's website.

Title
Cryptext CX-II Data Encryption Device
Creator
Cryptext Corporation
Date Created and/or Issued
1981/ /
Contributing Institution
History San Jose Research Library
Collection
History San Jose Online Catalog
Rights Information
Please contact the contributing institution for more information regarding the copyright status of this object.
Description
Applecrypt (TM) peripheral circuit board by Intercrypt, copyright 1981, S/N 1004-002. This is connected to the CX-II encryption device for the Apple II, manufactured by CRYPTEXT Corporation, 1981. The Cryptext CX-II is a hardware encryption device introduced by the Cryptext Corporation for use in mini and micro computers in 1979. It was originally designed for use in the Radio Shack TRS-80 computer and in 1980 was available for the Apple II computer for a list price of $295. Data is encrypted before being stored in memory, on physical media such as disk or tape, or transmitted by telephone lines. The CX-II encryption device has three components. The first is the CX-II unit itself, a molded epoxy brick (1.1 X 3.0 X 5.3 in. and weighing 1 lb.) which has no exterior lights or buttons. This is the unit that performs the hardware-based computations for encryption and decryption. It has a connection for a 40 pin I/O cable. The I/O extension cable is the second component and attaches the CX-II unit to the Applecrypt interface card, which is the third component. The Applecrypt card was manufactured by Intercrypt and mounts in one of the I/O slots in the Apple II computer, using the standard 25 pin connector. The same CX-II unit could be used with other computers, using the interface card appropriate for that computer. The technology used by the CX-II is a pseudo-random number generator using a proprietary algorithm. In the late 1970s, DES was the accepted encryption standard and public key encryption was just becoming adopted. There were also many software-based encryption programs available. The CX-II was a hardware-based device which gave faster encryption and decryption compared to software-based programs. Cryptext claimed the device could encrypt or decrypt at a rate of 15,000 characters per second, which was adequate for the microcomputers and storage needs of the early 1980s. A full, 5.25 in. double-density floppy disk holds 360KB and would take 24 seconds to encrypt. The story is a little better for the transmission of data, since the CX-II was 100 times faster than the typical 1200bps modems of the time, which transmitted only 150 characters per second. The CX-II uses a proprietary algorithm to encipher data before storage or transmission. The key is ten characters in length and chosen by the user to encipher and later decipher the data. A ten character key (80 bits) provides a key length of 280, which was greater than the DES standard at the time, which only had a key length of 256. A "Code Branch" feature allowed the CX-II to dynamically alter its code sequence. This option could be used after a set block of characters, after a varying number of characters or even multiple times after each character. The CX-II alters its code sequence in a way that is random to the user but repeatable when decrypting the data. The Cryptext Corporation claims that this feature allows for an effective key of 2 to the 350th power which is "Greater than 1 googol!". The CX-II was a relatively robust encryption device for its time and intended use. It was physically protected against tampering or passive detection of plaintext by having all components encapsulated in epoxy. It also used a built-in delay in the internal initialization sequence to prevent "brute force" codebreaking attempts by preventing rapid key cycling. Also, a "lockout" feature defeats cryptanalysts attempts to derive relationships between the key and code sequences. Cryptext Corporation was formed in May, 1979 and the CX-II encryption device was its first product. It later developed proprietary, software-based encryption programs and by the mid-1980s was largely inactive. There was a revolution in encryption technology during this timeframe, with the rapid adoption of public key encryption and open source software. The acceptance and use of proprietary hardware and software encryption declined sharply and Cryptext finally dissolved in 2003.
Type
image
Identifier
59FD9CC3-3EDB-409F-9AAA-816315143107
2005-73-3
Subject
Apple Computer, Inc
Cryptography (LCSH)

About the collections in Calisphere

Learn more about the collections in Calisphere. View our statement on digital primary resources.

Copyright, permissions, and use

If you're wondering about permissions and what you can do with this item, a good starting point is the "rights information" on this page. See our terms of use for more tips.

Share your story

Has Calisphere helped you advance your research, complete a project, or find something meaningful? We'd love to hear about it; please send us a message.

Explore related content on Calisphere: