Early 1970s - Unix: weak cryptographic hash crypt(3) of Unix up to 6th Edition inclusive reused code from an "encryption program [that] simulated the M-209 cipher machine used by the U.S. Army during World War II. [...] the password was used not as the text to be encrypted but as the key, and a constant was encrypted using this key." M-209B, cryptography collection of the Swiss Army headquarters Photograph by Rama, Wikimedia Commons, licensed under CeCILL v2 and CC-BY-SA-2.0-FR