0%

Book Description

A translation of cryptologic documents and directives used by the North Vietnamese during the years of conflict.

Table of Contents

  1. Foreword
  2. Notes on the Translation
  3. The Publishing House invites the opinions and criticisms of the readers.
  4. 1. The Genesis of the Cryptographic Branch of the People's Army of Viet Nam
    1. 1.1. APPEARANCE OF THE EARLIEST CRYPTOGRAPHIC ORGANIZATIONS AND TECHNIQUES IN THE ARMY
    2. 1.2. SERVING LEADERSHIP AND COMMAND VIS-A-VIS ENEMY ACTIVITY; PREPARING THE ENTIRE NATION TO RESIST AND COUNTER FRENCH COLONIALISM
    3. 1.3. Notes
  5. 2. Consolidating and Building Organization and Professional Technique, Meeting Command Leadership Requirements in the First Five Months of the Protracted Resistance (1947–1950)
    1. 2.1. THE ARMY CRYPTOGRAPHIC BRANCH BUILDS AND SERVESIN COMBAT IN 1947
    2. 2.2. EXPANDING ORGANIZATION -STEPPING UP THE TRAINING OF CADRE AND PERSONNEL
    3. 2.2. EMULATION TO BRING INTO PLAY AND IMPROVE THE LEVEL OF CRYPTOGRAPHIC TECHNIQUE
    4. 2.3. THE CRYPTOGRAPHIC TASK IN THE AUTUMN-WINTER BORDER CAMPAIGN OF 1950
    5. 2.4. THE CRYPTOGRAPHIC TASK IN THE VOLUNTEER UNITS FIGHTING ON LAOTIAN AND CAMBODIAN SOIL
    6. 2.5. Notes
  6. 3. The Army Cryptographic Branch Continues to Build and Develop in Every Aspect, Serving Command Leadership, Developing Guerrilla Warfare and Stepping Up Mobilization for Progress into War of Movement
    1. 3.1. CHANGE OF NAME TO ARMY ESSENTIAL MATTERS BRANCH CONTINUING TO BUILD AND DEVELOP EXPANDING ORGANIZATIONALLY RAISING CRYPTOGRAPHIC TECHNIQUE
    2. 3.2. SERVING COMMAND LEADERSHIP IN DEFEATING THE ENEMY'S URGENT PACIFICATION SCHEMES AND DECISIVE COUNTEROFFENSIVE
  7. 4. The Army Cryptographic Branch in the Winter-Spring Strategic Offensive of 1953–1954 and the Dien Bien Phu Campaign (1953–1954)
    1. 4.1. Notes
  8. 5. The Army Cryptographic Branch Expands in Every Aspect; Widespread Use of the KTB Technique; Participating in the Discharge of Duties in the New Stage of the Revolution (1955–1965)
    1. 5.1. ESTABLISHING THE CRYPTOGRAPHIC SECTION OF CENTRAL AND THE CENTRAL PARTY SECRETARIAT, PROMULGATING TASK REGULATIONS FOR THE VIETNAMESE CRYPTOGRAPHIC BRANCH
    2. 5.2. ESTABLISHMENT OF THE DIRECTORATE OF ARMY CRYPTOGRAPHY
    3. 5.3. ESTABLISHING A SYSTEM OF CRYPTOGRAPHIC ORGANIZATION IN THE SOUTH
    4. 5.4. COMPLETING THE CHANGEOVER TO THE USE OF TECHNIQUE KTB4 AND PREPARING FOR A NEW DEVELOPMENT OF CRYPTOGRAPHIC TECHNIQUE IN THE ARMY
    5. 5.5. DUTY IN THE LAOTIAN THEATER
    6. 5.6. Notes
  9. 6. Ensuring Leadership and Command Service in Beating the Escalating War of Destruction of the American Aggressors in the North and the Violent Local War in the South (1965–1968)
    1. 6.1. CONTINUING TO BUILD AND TO EXPAND FORCES WHILE SERVING TO DEFEAT IMPERIALIST AMERICAN DESTRUCTIVE WAR IN THE NORTH
    2. 6.2. IMPLEMENTING INSTRUCTIONS CONCERNING INCREASING THE KEEPING OF SECRECY IN THE TASK OF ENSURING COMMAND SECRECY BY CRYPTOGRAPHIC TECHNIQUE VIA THE MEANS OF COMMUNICATION
    3. 6.3. OUTSTANDING ACHIEVEMENT OF THE MISSION IN THE WAR OF THE PEOPLE TO DEFEAT THE AMERICAN IMPERIALISTS' "LIMITED WAR" IN THE SOUTH
    4. 6.4. Notes
  10. 7. Ensuring Service to Leadership, Guidance, and Command in Defeating the American Imperialists' "Vietnamization Strategy" and their Second War of Destruction in the North (1969–1972)
    1. 7.1. FINISHING THE CHANGEOVER TO TECHNIQUE KTB5 AND EXPANDING THE USE OF TECHNIQUE KTC
    2. 7.2. ENSURING SERVICE TO LEADERSHIP AND COMMAND IN ATTACKING AND COUNTERATTACKING THE ENEMY'S "PACIFICATION" SCHEME
    3. 7.3. ENSURING LEADERSHIP AND COMMAND IN THE 1972 STRATEGIC OFFENSIVE
    4. 7.4. NGUYEN HUE: THE "EASTER OFFENSIVE"
    5. 7.5. PARTICIPATING IN THE DEFEAT OF AMERICA'S SECOND DESTRUCTIVE WAR AGAINST THE NORTH
    6. 7.6. Notes
  11. 8. The Army Cryptographic Branch in the Strategic General Offensive to Liberate the South in the Spring of 1975
    1. 8.1. THE ARMY CRYPTOGRAPHIC BRANCH IN THE GENERAL OFFENSIVE AND UPRISING OF SPRING 1975 AND THE HISTORIC HO CHI MINH CAMPAIGN
    2. 8.2. Notes
  12. Conclusion
    1. 8.3. Notes
  13. About the author
  14. Supplement: Cryptography in the Armed Public Security Forces, 1959 – 1989
    1. 8.4. CHANGING OVER TO THE USE OF THE NEW TECHNIQUE THROUGHOUT THE FORCES, RAISING THE LEVEL OF SECURITY OF COMMUNICATION CONTENT THROUGH CRYPTOGRAPHIC TECHNIQUE
3.85.224.214