The CX-II encryption device has three components. The first is the CX-II unit itself, a molded epoxy brick (1.1″ X 3.0″ X 5.3″ and weighing 1 lb.) which has no exterior lights or buttons. This is the unit that performs the hardware-based computations for encryption and decryption. It has a connection for a 40 pin I/O cable. The I/O extension cable is the second component and attaches the CX-II unit to the Applecrypt interface card, which is the third component. The Applecrypt card was manufactured by Intercrypt and mounts in one of the I/O slots in the Apple II computer, using the standard 25 pin connector. The same CX-II unit could be used with other computers, using the interface card appropriate for that computer.
The technology used by the CX-II is a pseudo-random number generator using a proprietary algorithm.3 In the late 1970s, DES was the accepted encryption standard and public key encryption was just becoming adopted. There were also many software-based encryption programs available. The CX-II was a hardware-based device which gave faster encryption and decryption compared to software-based programs.Cryptext claimed the device could encrypt or decrypt at a rate of 15,000 characters per second, which was adequate for the microcomputers and storage needs of the early 1980s. A full, 5.25″ double-density floppy disk holds 360KB and would take 24 seconds to encrypt. The story is a little better for the transmission of data, since the CX-II was 100 times faster than the typical 1200bps modems of the time, which transmitted only 150 characters per second.
The CX-II uses a proprietary algorithm to encipher data before storage or transmission. The key is ten characters in length and chosen by the user to encipher and later decipher the data. A ten character key (80 bits) provides a key length of 280, which was greater than the DES standard at the time, which only had a key length of 256.
A “Code Branch” feature allowed the CX-II to dynamically alter its code sequence. This option could be used after a set block of characters, after a varying number of characters or even multiple times after each character. The CX-II alters its code sequence in a way that is random to the user but repeatable when decrypting the data. The Cryptext Corporation claims that this feature allows for an effective key of 2350 which is “Greater than 1 googol!”.3The CX-II was a relatively robust encryption device for its time and intended use. It was physically protected against tampering or passive detection of plaintext by having all components encapsulated in epoxy. It also used a built-in delay in the internal initialization sequence to prevent “brute force” codebreaking attempts by preventing rapid key cycling3. Also, a “lockout” feature defeats cryptanalysts attempts to derive relationships between the key and code sequences.
Cryptext Corporation was formed in May, 1979 and the CX-II encryption device was its first product. It later developed proprietary, software-based encryption programs and by the mid-1980s was largely inactive. There was a revolution in encryption technology during this timeframe, with the rapid adoption of public key encryption and open source software. The acceptance and use of proprietary hardware and software encryption declined sharply and Cryptext finally dissolved in 2003.4
by Ralph Simpson, September 2012
(1) “Plug-in Data Encryption Device for TRS-80’s,” InfoWorld Magazine, Issue 15, October 3, 1979
(2) Louis Kruh, “Cipher Devices,” Cryptologia Magazine, Volume 4, Issue 3, July, 1980
(3) R. Humphries, R. Religa and B. McCaleb, CX-II User’s Manual for Apple II, Intercrypt Corp., 1981, Document UM-A2-3
(4) Secretary of State, State of Washington, http://www.sos.wa.gov/corps/search_results.aspx?search_type=simple&criteria=all&name_type=contains&name=cryptext&ubi=