KL-7 ADONIS NATO eight-rotor machine · 1952
Eight rotors, irregular stepping, re-entrant alphabet — the rotor machine NATO trusted with everything until John Walker handed the keys to the Soviets.
Why This Matters
The KL-7, code-named ADONIS, was the rotor machine that carried NATO’s most sensitive traffic for almost two decades. It encrypted everything from US Navy submarine orders to NATO command messages. By 1965 the United States alone had over 25,000 KL-7 units in service.
Cryptanalytically, the KL-7 was never broken. Operationally, it suffered the most damaging spy compromise in modern American history: Navy Chief Warrant Officer John Walker sold its key lists to the Soviets from 1968 to 1985, allowing the KGB to read US Navy traffic in near real time.
Eight rotors sit on a spindle, but only seven step; the eighth is stationary and acts as a permutation between the rotor stack and the keyboard mapping. The seven moving rotors advance under the control of a notch table that changes daily, producing an irregular stepping pattern reminiscent of SIGABA but mechanically lighter.
Two further details matter for security:
- Re-entrant alphabet. The rotor alphabet is wider than 26 (it carries numerals, space, and control codes), so the keyboard mapping is not a fixed bijection on A–Z. This breaks the symmetry that crib-fitters exploited in Enigma.
- No reflector. Signal flow is one-way through the rotor stack — there is no Enigma-style reflection that forces “no letter encrypts to itself”.
Through 17 years of operational use and another 30 of declassified study, no published attack on the KL-7 cipher itself has appeared. The eight-rotor stack with irregular stepping puts it well beyond Enigma-class workloads.
John Walker, a US Navy communications watch officer, photographed KL-7 key lists and sold them to the KGB through a network that included his brother, son, and a friend. The Soviets read US Navy traffic for the entire period — the most damaging American cipher compromise of the Cold War. Walker was arrested in 1985.
| KL-7 lesson | Modern echo |
|---|---|
| Rotor stepping that breaks Enigma’s regularity | Modern stream ciphers irregularly clock multiple LFSRs (A5/1) |
| Re-entrant alphabet defeats fixed-bijection cribs | Authenticated encryption breaks the “known header” crib path |
| Walker compromise: stolen keys are total breaks | Why HSMs, key wrapping, and split-knowledge protocols exist |
| The whole machine was secure; the people leaked | Modern threat models put insider risk near the top |
| Origin | United States (NSA), then NATO-wide |
| Year | In service 1952 – 1968 (replaced by KW-26 / KL-43) |
| Rotors | 8 (one stationary; the other 7 step irregularly) |
| Alphabet | Re-entrant 36 contacts (26 letters + control codes) |
| Compromise | Walker spy ring delivered key lists 1968–1985 |