Click for homepage
Data
Philips
  
← Aroflex
  
Aroflex II   T-1285/CA
Online/Offline cipher machine - wanted item

Aroflex II is an online/offline encryption device developed in the early 1990s jointly by Siemens (Germany) and Philips Usfa (Netherlands) as the successor to the highly successful Aroflex cipher machine used by NATO. It is also known as PDLX-6141 (Philips) and as T-1285/CA (Siemens). Development of the machine took many years and only a limited quantity was ever produced.

The image on the right shows a basic Aroflex II setup. It consists of a main unit – similar to a personal computer (PC) – a separate moni­tor and an enhanced keyboard. The output is delivered to an external printer that is similar in design.

At the front of the main unit is the Crypto Ignition Key (CIK), which is used to protect the internally stored Traffic Encryption Keys (TEK). An optional paper-tape reader/puncher can be attached for backward compatibility with legacy 5-bit teleprinter equipment. All units are fully shielded and meet NATO TEMPEST requirements.
  

The basic T-1285 teleprinter was completely developed by Siemens AG in München (Germany). It has a built-in text editor that allows text to be formatted in a variety of ways. Philips Crypto BV in Eindhoven (Netherlands) was responsible for the crytographic part, in the form of a plug-in card. The display is fully EMC shielded, whilst the matrix printer is connected via optical fibres. Aroflex II was available in two colours: green for military environments, and cream for civil/office use.

The crypto-part consists of a Crypto Ignition Key (CIK), an interface for a standard key filler and a crypto module with two Philips-developed cryptographic algorithms: (1) a new Aroflex II algo­rithm, and (2) a legacy algorithm for backward compatibility with Aroflex I. The latter allowed a smooth transition from the thousands of original Aroflex units in the field, to the new Aroflex II.


PLEASE HELP — Only a limited number of Aroflex II machines was ever built and even fewer machines have survived. We are still looking for an Aroflex II for our collection. If you have more information about this machine, please contact us.
Setup
The diagram below shows a typical Aroflex II setup. Central to this setup is the basic Siemens T-1285 teleprinter with its peripherals, shown here in blue. The T-1285 teleprinter is converted into a cipher machine by installing an (internal) crypto card with suitable firmware, shown here in red. Keyboard, main unit (T-1285) and monitor are always present. A printer is used for creating a physical message (when needed). Optionally, a tape reader/puncher (TRP) can be added for saving an loading messages. For TEMPEST reasons, printer and TRP are both connected via optic fibres.


The crypto card has two connections: an NF7 receptacle for connection of a Crypto Ignition Key (CIK), and a U229 receptacle for connection of a standard DS-102 compatible KEY FILL device, such as the KYK-13, the KSP-1 or the UP-2001. The CIK is used to store the randomly generated Key Encryption Key (KEK), which in turn is used to protect the Traffic Encryption Keys (TEK).


Key management
Aroflex II is suitable for encryption and decryption of text in 26, 32 and 256 character alpha­bets, both online and offline. It has room for 2 x 32 cryptographic keys that can be loaded with a DS-102 compatible fill device, such as the KYK-13. The Traffic Encryption Keys (TEK) are protected by a Key Encryption Key (KEK), that is divided over the machine's battery-backed Static RAM and the Crypto Ignition Key (CIK), so that both are needed in order to recover the actual keys.

The image on the right shows two rare surviving Aroflex II Crypto Ignition Keys. It consists of a robust metal enclosure with a 7-pin NF-7 audio connector at the end, and is small enough to be carried in a pocket. It is slighly shorter than the intial version and has a knurled edge to allow it to be installed and removed more easily.

The CIK communicates with the Aroflex II via a standard 2-wire I2C interface. When loading the crypto keys, half of the Key Encryption Key (KEK) is stored in the machine's battery-backed RAM, whilst the other half is stored inside the CIK.
  

Once the keys are loaded, the CIK and the Aroflex II are said to be paired. Removing the CIK from the Aroflex, renders the keys stored inside the Aroflex II useless. Likewise, a paired CIK can not be used on another Aroflex II unit which has its own set of keys loaded. In case of an emergency or compromise, the user would remove the CIK and destroy it (if possible) or throw it away.

As an extra safety measure, the user could also press the ZEROIZE button in order to delete the other half of the KEK which was stored in battery-backed RAM. The function of the CIK is similar to that of the Spendex 40 and Spendex 50. More photographs of the CIK are available below.

Inside the CIK is a small PCB with only six electronic components. At the heart is one of the first EEPROMs that had just become available in the early 1990s. The small 8-pin PCD-8582 contains 256 bytes of non-volatile memory and interfaces via a Philips-standard I2C bus [4]. The rightmost photograph below shows the PCB inside the CIK as it came from the assembly-line.

Initial CIK design (left) and final version (right)
Initial CIK design
New design CIK
Holding the CIK
Close-up of the connector of the CIK
Aroflex II - Crypto Ignition Key (CIK) in the palm of a hand
The PCB inside the CIK during production
A
×
A
1 / 8
Initial CIK design (left) and final version (right)
A
2 / 8
Initial CIK design
A
3 / 8
3 / 8
A
4 / 8
New design CIK
A
5 / 8
Holding the CIK
A
6 / 8
Close-up of the connector of the CIK
A
7 / 8
Aroflex II - Crypto Ignition Key (CIK) in the palm of a hand
A
8 / 8
The PCB inside the CIK during production

Technical description
Aroflex II has its own built-in word processor with full formatting capabilities, allowing text messages to be prepaired in a variety of ways, including ACP127, or as standard 5-letter groups. The 720 KB floppy disc drive, hidden behind a TEMPEST-safe door at the front panel, allows text messages to be stored on proprietary formatted discs. For security reasons, the Aroflex used its own Siemens-developed proprietary operating system, making it immune to virusses.

The machine further contains two independent 1 cryptographic units: the all-new Aroflex II crypto unit, using state-of-the art cryptographic algorithms, and a separate Aroflex I crypto unit, making it interoperable with the existing Aroflex. It has a standard key-fill interface that was compatible with DS-102 and CSESD. The machine is TEMPEST-proof in accordance with the AMSG720B standard. Obtaining TEMPEST approval for the monitor appeared to be the biggest challenge, as a Cathode Ray Tube (CRT) is generally an enormous source of unwanted radiation. 2 The printer and the paper-tape unit are connected to the main unit by means of optical fibres.

Aroflex II was capable of handling both 5-bit (ITA-2 or or Baudot-Murray code) and 8-bit data (ITA-5, derived from ASCII) with automatic code conversion between the two standards. This allowed encryption and decryption in 26, 32 and 256 character modes. Data could be transmitted via existing telephone lines, using an external modem connected to the CCITT V.24 (RS-232) interface, or via legacy telex lines (TTY 15V/20mA or 60V/50mA).

  1. Although the brochure [2] suggests that there were two physically independent crypto units, there was in fact just one. The OQ4436 cryptographic chip that was used, was backward compatible with the older OQ4406 and supported both algorithms. The firmware was able to select between the two algorithms.
  2. It was known that adversaries could reconstruct the image that was displayed on a CRT from a considerable distance, by exploiting the emanations from the CRT. This phenomenon is known as Van Eck Phreaking [9].
History
Introduction
The original Aroflex machine (Aroflex I) is arguably the most successful encryption device ever built by Philips Usfa/Crypto. As it was NATO-approved, many thousands of units were sold to the NATO-countries, including, Canada, Germany, The Netherlands, Sweden and Türkiye. It was also used by the Dutch government and by the Dutch police. The original Aroflex was based on a Siemens T-1000 teleprinter, that had a black Philips encryption module mounted to its bottom.

Complete Siemens T-1285CA setup. Photograph taken from the brochure [3].

Development
In the late 1980s, when the end-of-life for the T-1000 teleprinter was nearing, Siemens decided to develop a completely new fully-electronic alternative that could be expanded with an (optional) internal encryption module. Called T-1285 it was compatible with existing data-standards. The optional crypto plug-in offered full backward compatibility with the older Aroflex. It was agreed that Siemens would take care of the basic teleprinter, keyboard, monitor and (optional) puncher, whilst Philips Crypto was responsible for the development of the crypto module that could be installed inside the T-1285. The complete setup, with the optional tape unit, is shown above.

Development of the T-1285 took several years and cost many millions of Euros. It appeared to be extremely difficult to meet the tough NATO TEMPEST requirements for the complete setup, but the end-result was a robust text encryptor that fully complied with NATO specifications [1].

A range of options was available and the Aroflex II could be connected to a variety of existing networks, including telex, telephone, radio and (via PAD) to X.28 packet-switched networks.

The T-1285CA was available in two colours: cream for civil and desktop use and olive green for NATO and other military applications. Full-colour brochures were issued both by Siemens and by Philips, the latter aming at the existing Aroflex users at NATO and friendly governments.

A complete training program was developed in order to support customers and maintenance personnel. The certificate on the right was issued to 2nd and 3rd echelon maintenance engineers who completed a training session at Siemens' own training facilities in Unterschleissheim (Germany). Although no dates are present on the certificate, it was probably issued around 1993.
  

Nevertheless, the machine hit the market too late, as by the mid-1990s, computers were rapidly replacing teletype units. As a result, the machine was never taken into mass-production and only very few units were built. It is known that a modest number was delivered to the Belgian Army [1].

The End
At Philips, the Aroflex II project was given a place in its museum. Siemens probably sold some more units and was offering it world-wide in 1994 [5 p.524]. Apparently, they too discontinued the product soon thereafter, as it is no longer listed in the Jane's Catalogue of 1997 [6]. The demise of the T-1285 also marked the end of the close cooperation between the two companies.

Crypto AG   Hagelin
The basic T-1285 terminal was also used in 1994 by Crypto AG (Hagelin) in Switzerland, a com­pany that was rumoured at the time to be controlled by Siemens [7], giving them easy access to the hardware. In reality though, the company was owned by the German intelligence service BND and the American CIA, whilst Siemens acted as a legend and supplied the company directors [8].

Crypto AG developed its own crypto logic (i.e. crypto heart) for the terminal and called it HC-5700 and HC-5750, the difference between the two probably being just the colour. It was compatible with other members of the HC-5000 CRYPTOMATIC family [6 p.547]. One of the differences with the Philips version is the presence of a smart-card reader to the right of the CIK.


Connections
Crypto Ignition Key   CIK
Specifications
Main unit
  • Device
    Online/offline text encryptor
  • Purpose
    Secure exchange of preformatted telex messages
  • Name
    Aroflex II
  • Designator
    PLDX-6141
  • Manufacturer
    Siemens, Philips Crypto
  • Year
    1993 (est.)
  • Predecessor
    Aroflex (UA-8116)
  • Classification
    TOP SECRET, NATO COSMIC
  • TEMPEST
    AMSG720B
  • Algorithm
    Aroflex I (CEROFF), Aroflex II
  • Keys
    31 net variables, 31 spares
  • Fill
    DS-102, CSESD
  • Speed
    50-2400 baud
  • Data rate
    300 baud (ITA-2), 2400 baud (ITA-5)
  • Alphabet
    ITA-2 (Baudot-Murray), ITA-5 (ASCII)
  • Formatting
    5-letter groups, ACP127
  • Interfaces
    (see below)
  • Memory
    (see below)
  • Power
    24V DC
  • Mains
    115, 120, 230, 240V AC, 42-70 Hz or 400 Hz
  • Consumption
    60W (AC), 50W (DC)
  • Temperature
    0°C to +40°C
  • Storage
    -40°C to +60°C
  • Enclosure
    Cream, Olive green
  • Dimensions
    425 × 145 × 378 mm
  • Weight
    18 kg
Memory
  • Program
    640 KB (locked)
  • Main
    64 KB
  • Message
    192 KB
  • Diskette
    3.5" 720 KB (proprietary format)
Interfaces
  • TTY
    15V/20mA (also: 60V/40mA with external supply)
  • V.24
    RS232-C (CCITT V.24), or MIL-STD 188-114
  • X.28
    Packet switched data networks via PAD
  • Phone
    Via optional modem
Keyboard
  • Manufacturer
    Siemens
  • Layout
    UK layout
  • Keys
    112 keys (47 function keys)
  • LEDs
    24 LEDs
  • Features
    Buzzer
  • Colour
    Cream, Olive green
  • Dimensions
    425 × 22 (51) × 200 mm
  • Weight
    3 kg
Display   VDU
  • Type
    Cathode Ray Tube (CRT)
  • Manufacturer
    Siemens
  • TEMPEST
    AMSG720B
  • Size
    12" (diagonal)
  • Colour
    Monochrome (black on white or inverted)
  • Characters
    80 per line
  • Lines
    27
  • Mounting
    Tilt & swivel pedestal
  • Control
    Brightness
  • Shielding
    TEMPEST
  • Interface
    TNC, 5-pin mil
  • Temperature
    0°C to +40°C
  • Storage
    -40°C to +60°C
  • Enclosure
    Cream, Olive green
  • Dimensions
    348 × 365 × 340 mm
  • Weight
    13 kg
Printer
  • Manufacturer
    Siemens
  • TEMPEST
    AMSG720B
  • System
    Dot-matrix
  • Speed
    60 characters per second bi-directional
  • Paper
    Roll feed, original + 2 copies
  • Interface
    Fibre optic
  • Power
    24V DC
  • Mains
    115, 120, 230, 240V AC, 42-70 Hz or 400 Hz
  • Consumption
    55W (AC), 45W (DC)
  • Temperature
    0°C to +40°C
  • Storage
    -40°C to +60°C
  • Enclosure
    Cream, Olive green
  • Dimensions
    425 × 145 × 378 mm (425 × 260 × 502 mm with paper cartridge)
  • Weight
    21 kg
Tape reader/puncher
  • Manufacturer
    Siemens
  • TEMPEST
    AMSG788A
  • Interface
    Fibre optic
  • Power
    24V DC
  • Mains
    115, 120, 230, 240V AC, 42-70 Hz or 400 Hz
  • Consumption
    55W (AC), 45W (DC)
  • Temperature
    0°C to +40°C
  • Storage
    -40°C to +60°C
  • Enclosure
    Cream, Olive green
  • Dimensions
    361 × 145 × 378 mm (361 × 365 × 504 mm with paper tape)
  • Weight
    18 kg
Features
  • Automatic key selection
  • Automatic and manual remote keying
  • Standard fill interface (DS-102, CSESD)
  • Backward compatibility with Aroflex I
  • Local and remote upate
  • ZEROISE facility
  • Crypto Ignition Key (CIK)
  • Failsafe hardware and software design
  • Traffic Flow Security (TFS)
  • Bult-in Test Equipment (BITE)
Documentation
  1. Crypto Communications System AROFLEX II (PDLX-6141) - Brochure
    Philips Crypto BV, NATO Restricted. 1993. 6 pages.
References
  1. Mathieu Goudsmits, Aroflex II developer at Philips Crypto BV
    Interview, Crypto Museum, July 2011.

  2. Philips Crypto BV, Crypto Communications System AROFLEX II
    Full-colour 6-page brochure of the PDLX-6141 Aroflex II. NATO Restricted. 1993.

  3. Siemens, TEMPEST Crypto Communications System T1285CA
    Full-colour 6-page brochure of the T-1285CA.

  4. Philips Semiconductors, PCX8582X-2 Datasheet
    Datasheet of the EEPROM used inside the CIK. 1992-1994.

  5. Jane's Military Communications, Fifteenth Edition, 1994-95
    ISBN 0-1706-1163-3.

  6. Jane's Military Communications, Eighteenth Edition, 1997-98
    ISBN 0-1706-1530-2.

  7. Res Strehle, Verschlüsselt. Der Fall Hans Bühler
    The full backgrounds about mr. Bühler's arrest in Iran in 1992.
    ISBN 3-85932-141-2.

  8. Paul Reuvers & Marc Simons, Operation RUBICON
    Crypto Museum, 19 March 2020.

  9. Wikipedia, Van Eck phreaking
    Visited 15 June 2024.
Further information
Any links shown in red are currently unavailable. If you like the information on this website, why not make a donation?
© Crypto Museum. Created: Tuesday 16 August 2011. Last changed: Monday, 03 March 2025 - 10:14 CET.
Click for homepage