Skip to main content (Press Enter).
Toggle navigation
National Security Agency Central Security Service
National Security Agency Central Security Service
Search
Search NSA CSS:
Search
Search NSA CSS:
Search
CryptoComics
NSA.gov Navigation Menu Button
About Us
Mission & Values
Current Leadership
Former Directors
Former D/Directors
Former D/CSS
Central Security Service (CSS)
Cryptologic Centers
NSA/CSS Colorado
NSA/CSS Georgia
NSA/CSS Hawaii
NSA/CSS Texas
Diversity, Equality & Inclusion
Accommodations & Accessibility
Discrimination Complaints
No FEAR Act & Data
Employee Resource Groups
Civil Liberties and Privacy
About
Leadership
Reports
Resources
Contact
Cryptologic Heritage
Cryptologic Heritage FAQs
Center for Cryptologic History
Pre 1952 Timeline
Pearl Harbor Review
Voices from the Past
About the NSA/CSS Insignia
Historical Figures & Publications
African Americans
Cryptologic Hall of Honor
NSA 60th Anniversary
Publications
Women
National Cryptologic Memorial
National Cryptologic Museum
About the Museum
Exhibits & Artifacts
Hours of Operation
Tours & Education Programs
Map & Directions
Office of General Counsel
Office of the Inspector General
Frequently Asked Questions
Contact NSA
What We Do
Understanding the Threat
Signals Intelligence
SIGINT FAQs
Cybersecurity
Cybersecurity Advisories & Technical Guidance
Telework and Mobile Security Guides
Threat Intelligence & Assessments
Cybersecurity Products & Services
Cybersecurity Education
Cybersecurity Careers
Partnership
Press & Public Engagements
Cybersecurity Collaboration Center
Support to the Military
Customers & Partners
Research
Cybersecurity Research
Math Sciences Program
Computer and Analytic Sciences Research
Technology Transfer Program
Publications
Research Papers
Science of Security
News & Features
Feature Stories
Press Room
Speeches and Testimonies
Declassified Documents
The Next Wave
Digital Media Center
Video Audio Clips
Image Galleries
Publications
Resources
Students and Educators
National Centers of Academic Excellence in Cybersecurity
Centers of Academic Excellence in Cyber Operations
Criteria for Measurement for CAE in Cyber Operations Advanced
Requirements
Application
Criteria for Measurement for CAE in Cyber Operations Fundamental
application
Application
CAE-Cyber Operations Announcements
K-12 Partnership
Research Partnership
Featured Schools
UMBC
North Carolina Agricultural & Technical State University (N.C. A&T)
University of Texas San Antonio
University of Hawaii
Illinois at Urbana-Chapaign
Carnegie Mellon University
OnRamp II Program
Cybersecurity Professionals
Request an NSA Speaker
Freedom of Information Act
Open Source @ NSA
Prepublication Review
Commercial Solutions for Classified Program (CSfC)
Threat Prevention
Capability Packages
Archived Capability Packages
Components List
Archived Components List
CNSA Suite
Solution Registration
Newsletter
Trusted Integrator List
Archived Trusted Integrator List
Customer Handbook
Frequently Asked Question
Coming Soon
Points of Contact
Media Destruction Guidance
Vendor Information
FAQ
Classified Material Conversion
Join our Team
Apply Now!
Career Fields
Development Programs
Student Programs
Diversity at NSA
Employee Spotlights
Doing Business With Us
Getting Started
Conferences & Events
Office of Small Business Programs
Acquisition Resource Center
Business Programs and Resources
Contacts
Home
News & Features
Declassified Documents
Cryptologs
Cryptologs
FAQs for Cryptologs
Vol. I, No. 1 - August 1974
Vol. I, No. 2 - September 1974
Vol. I, No. 3 - October 1974
Vol. I, No. 4 - November 1974
Vol. I, No. 5 - December 1974
Vol. II, No. 1 - January 1975
Vol. II, Nos. 2 - 3 - February - March 1975
Vol. II, No. 4 - April 1975
Vol. II, No. 5 - May 1975
Vol. II, No. 6 - June 1975
Vol. II, No. 7 - July 1975
Vol. II, Nos. 8 - 9 - August - September 1975
Vol. II, No. 10 - October 1975
Vol. II, No. 11 - November 1975
Vol. II, No. 12 - December 1975
Vol. III, No. 1 - January 1976
Vol. III, No. 2 - February 1976
Vol. III, No. 3 - March 1976
Vol. III, No. 4 - April 1976
Vol. III, No. 5 - May 1976
Vol. III, Nos. 6 - 7 - June - July 1976
Vol. III, No. 8 - August 1976
Vol. III, No. 9 - September 1976
Vol. III, No. 10 - October 1976
Vol. III, No. 11 - November 1976
Vol. III, No. 12 - December 1976
Vol. IV, Nos. 1 - 2 - January - February 1977
Vol. IV, No. 3 - March 1977
Vol. IV, No. 4 - April 1977
Vol. IV, No. 5 - May 1977
Vol. IV, No. 6 - June 1977
Vol. IV, No. 7 - July 1977
Vol. IV, No. 8 - August 1977
Vol. IV, No. 9 - September 1977
Vol. IV, No. 10 - October 1977
Vol. IV, No. 11 - November 1977
Vol. IV, No. 12 - December 1977
Vol. V, No. 1 - January 1978
Vol. V, No. 2 - February 1978
Vol. V, No. 3 - March 1978
Vol. V, No. 4 - April 1978
Vol. V, No. 5 - May 1978
Vol. V, No. 6 - June 1978
Vol. V, Nos. 7 - 8 - July - August 1978
Vol. V, No. 9 - September 1978
Vol. V, No. 10 - October 1978
Vol. V, No. 11 - November 1978
Vol. V, No. 12 - December 1978
Vol. VI, No. 1 - January 1979
Vol. VI, No. 2 - February 1979
Vol. VI, No. 3 - March 1979
Vol. VI, No. 4 - April 1979
Vol. VI, No. 5 - May 1979
Vol. VI, No. 6 - June 1979
Vol. VI, No. 7 - July 1979
Vol. VI, Nos. 8 - 9 - August - September 1979
Vol. VI, No. 10 - October 1979
Vol. VII, Nos. 1 - 3 - January - March 1980
Vol. VII, Nos. 4 - 6 - April - June 1980
Vol. VIII, Nos. 1 - 3 - January - March 1981
Vol. VIII, Nos. 4 - 6 - April - June 1981
Vol. VIII, No. 10 - October 1981
Vol. VIII, No. 11 - November 1981
Vol. VIII, No. 12 - December 1981
Vol. IX, No. 1 - January 1982
Vol. IX, No. 2 - February 1982
Vol. IX, No. 3 - March 1982
Vol. IX, No. 4 - April 1982
Vol. IX, No. 5 - May 1982
Vol. IX, Nos. 6 - 7 - June - July 1982
Vol. IX, No. 8 - August 1982
Vol. IX, No. 9 - September 1982
Vol. IX, No. 10 - October 1982
Vol. IX, No. 11 - November 1982
Vol. IX, No. 12 - December 1982
Vol. X, Nos. 1 - 2 - January - February 1983
Vol. X, No. 3 - March 1983
Vol. X, No. 4 - April 1983
Vol. X, No. 5 - May 1983
Vol. X, Nos. 6 - 7 - June - July 1983
Vol. X, No. 8 - August 1983
Vol. X, No. 9 - September 1983
Vol. X, No. 10 - October 1983
Vol. X, No. 11 - November 1983
Vol. X, No. 12 - December 1983
Vol. XI, No. 1 - January 1984
Vol. XI, Nos. 2 - 3 - February - March 1984
Vol. XI, No. 4 - April 1984
Vol. XI, No. 5 - May 1984
Vol. XI, Nos. 6 - 7 - June - July 1984
Vol. XI, Nos. 8 - 9 - August - September 1984
Vol. XI, No. 10 - October 1984
Vol. XI, Nos. 11 - 12 - November - December 1984
Vol. XII, Nos. 1 - 3 - January - March 1985
Vol. XII, No. 4 - April 1985
Vol. XII, No. 5 - May 1985
Vol. XII, Nos. 6 - 8 - June - August 1985
Vol. XII, Nos. 9 - 10 - September - October 1985
Vol. XII, Nos. 11 - 12 - November - December 1985
Vol. XIII, Nos. 1 - 2 - January - February 1986
Vol. XIII, Nos. 3 - 4 - March - April 1986
Vol. XIII, Nos. 5 - 7 - May - July 1986
Vol. XIII, Nos. 8 - 9 - August - September 1986
Vol. XIII, Nos. 10 - 11 - October - November 1986
Vol. XIII, No. 12 - December 1986
Vol. XIV, No. 1 - 1st Issue 1987
Vol. XIV, No. 2 - 2nd Issue 1987
Vol. XIV, No. 3 - 3rd Issue 1987
Vol. XIV, No. 4 - 4th Issue 1987
Vol. XV, No. 1 - 1st Issue 1988
Vol. XV, No. 2 - 2nd Issue 1988
Vol. XV, No. 3 - 3rd Issue 1988
Vol. XV, No. 4 - 4th Issue 1988
Vol. XVI, No. 1 - 1st Issue 1989
Vol. XVI, No. 2 - 2nd Issue 1989
Vol. XVI, No. 3 - 3rd Issue 1989
Vol. XVII, No. 1 - 1st Issue 1990
Vol. XVII, No. 2 - 2nd Issue 1990
Vol. XVII, No. 3 - 3rd Issue 1990
Vol. XVIII, No. 1 - 1st Issue 1991
Vol. XVIII, No. 2 - 2nd Issue 1991
Vol. XVIII, No. 3 - 3rd Issue 1991
Vol. XIX, No. 1 - 1st Issue 1992
Vol. XIX, No. 2 - 2nd Issue 1992
Vol. XIX, No. 3 - 3rd Issue 1992
Vol. XX, No. 1 - 1st Issue 1994
Vol. XX, No. 2 - 2nd Issue 1994
Vol. XXI, No. 1 - Issue 1 1995
Vol. XXI, No. 2 - Summer 1995
Vol. XXI, No. 3 - Fall 1995
Vol. XXI, No. 4 - Winter 1995
Vol. XXII, No. 1 - Spring 1996
Vol. XXII, No. 2 - Summer 1996
Vol. XXII, No. 4 - Winter 1996
Vol. XXIII, No. 1 - Spring 1997
Vol. XXIII, No. 2 - Summer 1997