Hall VII · Machines Cold War · 1952 Never broken cryptanalytically

KL-7 ADONIS NATO eight-rotor machine · 1952

Eight rotors, irregular stepping, re-entrant alphabet — the rotor machine NATO trusted with everything until John Walker handed the keys to the Soviets.

OriginUnited States (NSA), then NATO-wide
YearIn service 1952 – 1968 (replaced by KW-26 / KL-43)
Rotors8 (one stationary; the other 7 step irregularly)
AlphabetRe-entrant 36 contacts (26 letters + control codes)
CompromiseWalker spy ring delivered key lists 1968–1985

Why This Matters

The KL-7, code-named ADONIS, was the rotor machine that carried NATO’s most sensitive traffic for almost two decades. It encrypted everything from US Navy submarine orders to NATO command messages. By 1965 the United States alone had over 25,000 KL-7 units in service.

Cryptanalytically, the KL-7 was never broken. Operationally, it suffered the most damaging spy compromise in modern American history: Navy Chief Warrant Officer John Walker sold its key lists to the Soviets from 1968 to 1985, allowing the KGB to read US Navy traffic in near real time.

⚙️How It Works

Eight rotors sit on a spindle, but only seven step; the eighth is stationary and acts as a permutation between the rotor stack and the keyboard mapping. The seven moving rotors advance under the control of a notch table that changes daily, producing an irregular stepping pattern reminiscent of SIGABA but mechanically lighter.

Two further details matter for security:

  • Re-entrant alphabet. The rotor alphabet is wider than 26 (it carries numerals, space, and control codes), so the keyboard mapping is not a fixed bijection on A–Z. This breaks the symmetry that crib-fitters exploited in Enigma.
  • No reflector. Signal flow is one-way through the rotor stack — there is no Enigma-style reflection that forces “no letter encrypts to itself”.
💀How It Was (Not) Broken
No public cryptanalytic break
Complexity: Believed infeasible without key material

Through 17 years of operational use and another 30 of declassified study, no published attack on the KL-7 cipher itself has appeared. The eight-rotor stack with irregular stepping puts it well beyond Enigma-class workloads.

The Walker spy ring (1968–1985)
Complexity: N/A — keys were stolen, not derived

John Walker, a US Navy communications watch officer, photographed KL-7 key lists and sold them to the KGB through a network that included his brother, son, and a friend. The Soviets read US Navy traffic for the entire period — the most damaging American cipher compromise of the Cold War. Walker was arrested in 1985.

🔬What It Teaches Modern Cryptography
KL-7 lessonModern echo
Rotor stepping that breaks Enigma’s regularityModern stream ciphers irregularly clock multiple LFSRs (A5/1)
Re-entrant alphabet defeats fixed-bijection cribsAuthenticated encryption breaks the “known header” crib path
Walker compromise: stolen keys are total breaksWhy HSMs, key wrapping, and split-knowledge protocols exist
The whole machine was secure; the people leakedModern threat models put insider risk near the top
Quick Facts
OriginUnited States (NSA), then NATO-wide
YearIn service 1952 – 1968 (replaced by KW-26 / KL-43)
Rotors8 (one stationary; the other 7 step irregularly)
AlphabetRe-entrant 36 contacts (26 letters + control codes)
CompromiseWalker spy ring delivered key lists 1968–1985
← Previous Fialka M-125