Wednesday, March 5, 2025

The Combined Cipher machine - 1942-1962

Cipher machines were extensively used by both the Axis and the Allies during WWII.

The Germans had the Enigma, the Lorenz SZ 40/42 and the Siemens T-52.

The Japanese had the Type B Cipher Machine (Angooki Taipu B).

The Americans had the Converter M-134-C (SIGABA) and the Hagelin M-209.

The British had the Typex.

Another machine that became increasingly important for the Allies, in the period 1943-45, was the Combined Cipher Machine - CCM. Unfortunately, this machine has not received a lot of attention from historians because there is limited information available on its internal operation and use in the field.

Here I have attempted to present information on the CCM from various sources that are not easy to find (the timelines section has detailed sources): 

Historical overview

The need for a combined US-UK cipher system was apparent by 1941 so the British gave the Americans their Naval Cypher No 3 (a codebook enciphered with additive tables) for use in the N. Atlantic convoy operations.

The Americans wanted to use the M-138-A strip cipher and the M-209 cipher machine for intercommunication but both were rejected by the British. On the other hand, the Typex cipher machine which was considered secure could not be manufactured in large numbers. The British wanted the SIGABA but the Americans were not willing to share their high-level cipher machine or divulge its operating principle to their Allies.

Instead, a compromise solution was reached. A cipher attachment was developed by the US Navy (by Lt. Commander Donald W. Seiler USNR) that could be installed in the SIGABA and the Typex and it turned them into the Combined Cipher Machine – CCM. The CCM cipher attachment was a 5-rotor non reciprocal system issued with 10 reversible rotors.

Three versions were produced:

1). The CSP 1600 (CCM Mk I), which was a modification of an existing SIGABA with the CCM attachment installed.


2). The CSP 1700 (CCM Mk II), which was a SIGABA with a fixed CCM attachment.

3). The CSP 1800 (CCM Mk III), which was an adapter for the British Typex cipher machine (Typex Mk 23).

Production started in December 1942 and by November 1943 enough machines had been distributed to naval units to introduce the system in the North Atlantic. In April ’44 the CCM became operational with all five British and American armed services. By May ’45 the CCM was used extensively by the British Army, RAF and Navy.

Total production was at least 8.631 adapters and self-contained machines.

Operation and crypto security of the CCM (standard version) (a):

5 rotors – Positions 12345

Rotors have fixed cam contours (notches).

Rotor No3 steps with every key depression, it moves rotors No2 and No4, rotor No2 moves rotor No1 and rotor No4 moves rotor No5.

Non reciprocal encipherment (cipher-decipher function)

10 reversible rotors issued - 967.680 possible wheel orders

Certain rotor combinations can cause a machine period of only 338.

Message length limited to 200 groups in a message 

Message procedure (1944):                                                      

Two 5-letter indicators placed at the start and the end of the message. First indicator is the crypto net indicator, the second is the enciphered message wheel order.

The wheel order used to encipher the message (chosen at random) is enciphered on the key list’s initial code wheel alignment (contained in the keylist) before being sent as the second message indicator.

US procedure: Different initial code wheel alignment for SECRET, CONFIDENTIAL and RESTRICTED messages.

US-UK combined cipher procedure:  Two different initial code wheel alignments titled (A) and (B). The key list in use will define the classifications of messages for which (A) and (B) are to be used.

Cryptosecurity problems:

As early as 1943 it was discovered that under certain conditions the device had a dangerously low cipher period of 338.

A detailed study of the CCM’s period was not begun by OP-20-GM until 16 January 1944, six months after the short cycle defect was first discovered. The OP-20-GM investigation showed that, on one CCM circuit alone, seven daily keys between 12 February and 20 April 1944 produced the short 338 period. Once the problem of the short period had been fully identified, it could be avoided by taking various precautions, including the banning of certain rotor combinations and drastically restricting the length of messages. However, problems with lobstering rotors and the resulting short cycles were still being detected as late as March 1945.

A security evaluation in July ’44 came to the conclusion that despite these problems the CCM was a well-designed cipher machine since it had close to a million possible wheel orders, was non reciprocal so cribs could not be placed with certainty and the irregular stepping of the end rotors countered the cyclometric stepping of the fast-moving rotor No3.

Postwar developments:

In 1946 the CCM was acquired by the State Department and given the designation MCB. The modified version used by the State Department was the CSP 2200, with some rotors moving backwards. It continued to be used till July 1959. It was replaced by a cipher machine developed by the State Department called MEC.

In US and UK service the standard CCM was given the codename AJAX and in the early 1950’s the rotor stepping system was modified in order to increase crypto security. This version was called HERMES. It was replaced in the mid 1950’s by the KL-7 ADONIS. Another CCM version was codenamed LUCIFER but there is no information available on whether its stepping system had been modified.

NATO selected the CCM in 1951 to serve as the cipher system for second level communications (Naval, Army and Air Force Commands, down to Divisional H.Q. plus NATO war vessels). It was modified into the HERMES standard in 1952 and replaced by the KL-7 ADONIS in 1956. A number of CCM machines continued to be used for meteorological traffic and as a reserve till 1962.

The CCM HERMES modification (1952) (b)

In the early 1950’s the standard CCM was modified:

The stepping of the rotors was changed so that ‘The purpose of this modification is to change the rotor stepping pattern so that the No. 1 rotor stepping contact (operated by rotor No. 2) will control the stepping of rotor No. 5, and the No. 4 rotor stepping contact (operated by rotor No. 4) will control the stepping of rotor No. 1’.

Thus, it seems that in the HERMES version rotor No3 steps with every key depression, it moves rotors No2 and No4, rotor No2 moves rotor No5 and rotor No4 moves rotor No1.

Non reciprocal encipherment (cipher-decipher function)

20 reversible rotors were issued per machine (instead of the original 10) so that the possible wheel orders were increased to 59.535.360.

The wheels were equipped with rotatable cam contours (notches).

Use of message bisection, padding and variable spacing in order to counter cribbing.

Message length was 300 groups.

Simplex message procedure - HERMES (1952):

Two indicators placed at the start and the end of the message. First indicator is the crypto net indicator, the second is the message wheel order. The second indicator is phoneticized and transmitted in clear as the second to sixth groups of the message.

a). For messages classified Restricted, Confidential and Secret:

Single encipherment.

A 5-letter indicator is selected at random and sent with the message as the second to sixth 5-letter group (phoneticized). The machine is set up according to the daily key, the rotors are aligned to the letters of the message indicator, then the 10-letter Random Group No1 (contained in the keylist, different for each day) is enciphered and the resultant 10 letters are known as the intermediate sequence. The intermediate sequence is formed into five digraphs by pairing the 1st letter with the 6th, the 2nd with the 7th, the 3rd with the 8th, the 4th with the 9th and the 5th with the 10th. The digraphs are then used on the rotor-setting Table No. 1 (contained in the keylist) in order to identify the 5 rotors to be used for the message and their initial position. If a rotor number found in a cell is one that has been found in a cell that has already been recorded, the next cell to the right, which contains an available rotor number, is used. If the end of the row is reached, the first cell in the same row is resorted to. The rotors are rearranged and aligned according to the arrangement and alignment thus recorded from Table No 1. This is the message rotor arrangement and message rotor alignment on which the message is then enciphered.

b). For messages classified Top Secret:

Double encipherment.

A 5-letter indicator is selected at random and sent with the message as the second to sixth 5-letter group (phoneticized). The machine is set up according to the daily key, the rotors are aligned to the letters of the message indicator and the 10-letter Random Group No1 and 10-letter Random Group No2 (contained in the keylist) are enciphered. The resultant 20 letters are the intermediate sequence. The first ten letters of the intermediate sequence are formed into five digraphs and used with the rotor-setting Table No. 1 to identify the 5 rotors to be used for the message and their initial position (as above). The rotors are rearranged and aligned according to the arrangement and alignment thus recorded from Table No 1 and the message is enciphered. The result is known as the intermediate cipher text.

The message is enciphered a second time using the following procedure: The second ten letters of the intermediate sequence are formed into five digraphs by matching the 11th with the 16th, the 12th with the 17th, the 13th with the 18th, the 14th with the 19th and the 15th with the 20th. The digraphs are then used on the Table No. 2 (containing letters) and the letters found in the cells are recorded, regardless of repeats. The rotors are realigned to the letters thus recorded but they are not rearranged. The intermediate cipher text is enciphered preceded by the 11th to the 15th letters of the intermediate sequence and followed by the 16th to the 20th. These groups are enciphered in these positions to provide a check to the deciphering operator who, on recognizing them as part of the intermediate sequence, is assured that the first phase of decipherment has been accomplished correctly.

Cryptosecurity problems:

Despite the modifications to the rotor stepping system, the rotatable cam contours and the issuing of more rotors the CCM was only expected to remain secure for a few years and its security depended mainly on the laborious cipher procedures (key lists, simplex indicators, message bisection, padding, variable spacing) not on the underlying cryptosecurity of the device.

Compromise of the CCM by foreign powers

The CCM entered service with the Allied armies in 1943-44 and by that time the German codebreakers had neither the resources nor the time needed to mount a determined effort to analyze and solve this cipher machine. Instead, they focused their limited resources on the Allied systems that they could reliably exploit.

According to the available information the German Navy’s codebreaking department B-Dienst investigated the CCM in 1944. Traffic was first recognized in April ’44. During the summer a study of indicators was carried out. In October ’44 seven messages with identical first and second indicators were discovered. The system was thought to use non reciprocal substitution alphabets on plain text. Research ended in January ’45. No information is available on whether the other German codebreaking agencies (Inspectorate 7/VI, Luftwaffe Chi Stelle, OKW/Chi) evaluated the CCM traffic.

The use of the CCM in the postwar period meant that it became a target for the codebreakers of the Soviet Union. There is information pointing to the exploitation of the State Department’s MCB and of the Army’s CSP-1700/SIGROD (used by military attachés) in the 1950’s.  

The CCM must have been used by US and British forces during the Korean War of 1950-53. At this time there is no information on its use and possible compromise in Korea.

Timelines:

1940 - US Navy Department and British Admiralty agree to use Naval Cypher No3 as the British-American Naval Cypher (1), US ciphers not authorized to be shared with other countries (2)

1941 - Naval Cypher No3 distributed to ships in early 1941 and made effective on 16 June 1941. (3)

1942 – Talks between US and British officials regarding a combined cipher system, British book ciphers rejected by US, US side proposed M-138-A and M-209 and these were rejected by British. Typex production too low to satisfy need for a combined machine. SIGABA not released to the British by the US authorities for reasons of national security. (4)  

CCM attachments for SIGABA and Typex were developed mainly by the US Navy by Lt. Commander Donald W. Seiler USNR (5). By October ’42 a prototype adapter was demonstrated to the British (6) and the CCM was officially approved by the Anglo-American Combined Communications Board in October 1942 (7). Production started in December 1942. (8).

Three versions of the CCM were produced (9):

1). The CSP 1600, which was a modification of an existing SIGABA with the CCM attachment installed. The machine could be converted back into the standard SIGABA.

2). The CSP 1700, which was a SIGABA with a fixed CCM attachment. Thus, it could not be modified back into the standard SIGABA.

3). The CSP 1800, which was an adapter for the British Typex cipher machine. The version with the CCM attachment was called Typex Mk 23.

Production (10):

ECM adapter (CSP 1600) – 3.500 units

CCM (CSP 1700) – 631 units

Typex adapter (CSP 1800/Typex Mk23) – 4.500 units

Alternatively: (10a)

CSP 1600 - 6.500 

CSP 1700 - 2.000 

1943 – CCM Mk II (self-contained version) rushed into service with first deliveries in May ’43, Typex Mk 23 adapters first delivered in July ’43. (11)

By 1st November 1943 enough machines had been distributed to Atlantic naval units to introduce the system in the North Atlantic (about 250 British and Canadian ships equipped with the cipher machine).  (12)

By 31 December ’43 the system was made effective for Limited Combined Naval Use for areas outside the North Atlantic.  (13)

By the end of 1943, 2,200 Typex adaptors and about 114,000 CCM rotors had been delivered to Britain and 1,525 ECM adaptors distributed to the US Navy in the Atlantic, while distribution in the Pacific was about to begin. In addition, about 500 CCM Mk II/CSP 1700 had been supplied to the British and the Canadians, and about 100 to the US Navy. (14).

Tests carried out during the spring of 1943 at the US Naval Computing Machine Laboratory in Dayton, Ohio revealed that, when using some rotors, its period was only 338.  (15).

1944 – In April ’44 the CCM became operational with all five British and American armed services.  (16)

By 31 December ’44 1.220 naval Typex machines had been modified into CCM versions.  (17)

A detailed study of the CCM’s period was not begun by OP-20-GM until 16 January 1944, six months after the short cycle defect was first discovered. The OP-20-GM investigation showed that, on one CCM circuit alone, seven daily keys between 12 February and 20 April 1944 produced the short 338 period. Once the problem of the short period had been fully identified, it could be avoided by taking various precautions, including the banning of certain rotor combinations and drastically restricting the length of messages. However, problems with lobstering rotors and the resulting short cycles were still being detected as late as March 1945. (18)

A security evaluation in July ’44 came to the conclusion that despite these problems the CCM was a well-designed cipher machine since it had close to a million possible wheel orders, was non reciprocal so cribs could not be placed with certainty and the irregular stepping of the end rotors countered the cyclometric stepping of the fast-moving rotor No3. (19)

New key lists and cipher wheel were issued in the period 1944-45.  (20)

The German Navy’s codebreaking department B-Dienst investigated the CCM in 1944. Traffic first recognized in April ’44. During the summer a study of indicators was carried out. In October ’44 seven messages with identical first and second indicators were discovered. The system was thought to use non reciprocal substitution alphabets on plain text. Research ended in January ’45. (21)

No information is available on whether the other German codebreaking agencies (Inspectorate 7/VI, Luftwaffe Chi Stelle, OKW/Chi) worked on the CCM.

1945 – From the middle of ’44 up to February ’45 the CCM was distributed to the British Pacific Fleet and equipped all major war vessels. (22)

By May ’45 the CCM was used extensively by the British Army, RAF and Navy. (23)

On 1 January 1945 a new indicator system was introduced. (24)

In February ’45 the CCM rotor basket (CSP 1600 – SIGAMUG) and basic rotors (CCBP 0111) are considered compromised (Colmar incident). The CCM material is lost when a truck containing the 28th Infantry Division’s SIGABA cipher machine was stolen from Colmar, France. Traffic in the compromised systems was initially suspended. Eventually, this basic rotor set continued to be used by the fighting forces because there was no other alternative. The compromise of the CCM rotors revealed a serious deficiency in the emergency plan for the CCM since no provision had been made for the production and storing of reserve rotors. (25)

In March ’45 the crypto material lost in Colmar was discovered submerged in the Greesen River. (25)

From February to August ’45 17.840 new rotors were wired to replace the compromised set CCBP 0111. (25)

CCM rotors and keylists (25)

CCM rotors: initial worldwide rotors CCBP 0111, replacement CCBP 0211 (new worldwide), CCBP 0311 (reserve worldwide), CCBP 0113 (Pacific area), CCBP 0213 (reserve Pacific)

CCM keylists: CCBP 0101 (worldwide), CCBP 0131 (European area combined), 514-ESG (Special limited combined)

Postwar developments (AJAX, SIGROD, HERMES, LUCIFER, MCB):

The standard CCM system in US service is codenamed AJAX. The Army’s CSP 1700 is designated SIGROD. The SIGROD is distributed to military attachés. The HERMES modification is introduced in 1952. A CCM LUCIFER is mentioned in 1953. (26)

State Department

1946-1950’s - In early ’46 the State Department retired the M-325 SIGFOY cipher machine and replaced it with the CCM. The version used by the State Department was the CSP 2200 (HCM Mark 4/SCM Mark 2) (27). In State Department use the CCM was designated MCB (28). The MCB continued to be used till July 1959 (29).

US, UK, NATO

1946-1950’s – Discussions are held between US and British crypto experts on the need to modify the CCM in order to increase its security or design a new cipher machine to replace it. Concern over CCM security problems. Some interesting statements are made in these reports:

1947 – ‘In the opinion of the British, the present Combined Cipher Machine (CCM) is not sufficiently secure to resist increasingly effective cryptanalytic techniques. In addition, the British are anxious to develop a replacement for their present high level cipher machine (Typex)’. (30a)

 Almost one year has gone by since our last conference with the British on cryptographic equipment for use in Combined Communications. At that conference the principal subject was the possible improvement of the CCM to increase its cryptographic security’. (30b)

The Army Security Agency has carefully studied the Navy proposal for modifying the CCM and finds the following objections thereto: a. Although the proposed changes would increase the cryptographic security of the machine, this increase would not be of sufficient degree to justify their adoption in view of the practical difficulties that would be encountered: ….’ (30b)

As the CCM machines now stand, we know that mechanically and electrically they are satisfactory and stand up well in operation; cryptographically we know where we stand, as a result of several years study of the present arrangements. But we have not had any lengthy period to study the new proposals for motion and reversed stepping; it is impossible to forecast what unforeseen cryptographic weaknesses might be uncovered by further intensive study’. (30b)

The ASA believes that while at this moment the incorporation of either the Navy's or the Army's proposed changes in the CCM appear to offer the possibility of currently improving the CCM cryptographically, this improvement does not even now appear to be quite sufficient to eliminate all questions as to what the security of the so-improved CCM might be say five years from now. We know now that a theoretical solution of CCM messages would still be possible and we also agree that granting that there 'were a sufficient desire to make what is theoretically possible a practical reality, by use of many people and analytic machines, daily solution of CCM keys could be achieved. Thus, nothing substantial or of long-term benefit would be gained by modification of the CCM along the lines of the Navy's or the Army's proposals, which involve mere changes in rotor motion, with or without reversed stepping’. (30b)

In view of the fact that the Army finds the Navy proposal for CCM modification impractical and that the Army is convinced that any proposals which would involve material physical changes in the CCM which cannot be made in the field are impractical and inadvisable, the Army believes that as an interim measure additional security in Combined Communications can more readily, more economically and more practically be achieved by more frequent changes in rotors’.  (30b)

1949 a. It is not in the best Interest of the US to agree to the full and complete interchange of cryptographic principles with the British. b. The release of the ECM under prevent circumstances is not warranted’, ‘Although the CCM, if properly used, is a highly secure machine, the experts of both nations agree that the cryptographic principles employed in the machine are not as secure as is considered desirable for highest level United States - United Kingdom communications’ (30c)

The British state that the (World War II version of the basic ECM) was disclosed to them in 1942. A limited number of Britishers have seen it. They do not however, have enough information to build a duplicate of our ECM. The British probably could construct a machine resembling our ECM’ (30d).

1950 - ‘The US, as a matter of policy, should not disclose to any foreign country the complete details of the ECM, even though technical considerations might favor the use of the ECM for combined communications

As regards the effects on our own communication security, of the disclosure to the British of the detailed information referred to above, there probably would be no change in the security evaluation of the ECM. Although the US has always emphasized the importance of the physical security of our cipher machines, our evaluation of the ECM is predicated on possible ultimate enemy possession of the ECM machine, and our security is based upon regularly changing the rotors and key lists. The privacy of U.S. communications against cryptanalytic attack by any foreign power, including the British, could be assured’ (30e).

Development of KL-7 and KL-47 cipher machines to replace the CCM (31).  

Modification of CCM to HERMES standard (32).

Possible compromise of the MCB and the SIGROD by the Soviet Union (33).

1951 - Selection of CCM to serve as the NATO Second level communications cipher (Naval, Army and Air Force Commands, down to Divisional H.Q. plus NATO war vessels) in June 1951 (34).

1952 - The number of CCM immediately available to NATO are 943 machines (35). Modification of CCM to HERMES standard. Issuing of 20 rotors per machine and use of rotatable cam contours. Change of the rotor stepping mechanism. Changes made effective for NATO on 1 October 1952. (36)

1955 - Approximately 1.875 CCM machines have been distributed to NATO countries. NATO evaluation of the CCM is the following: ‘Both versions of the CCM have been in use for many years and require considerable expenditure for maintenance and spare parts. In addition, the security provided is largely dependent on operating procedures rather than on a strong cryptoprinciple’. Replacement of the CCM by the KL-7 ADONIS is authorized in June 1955 (37). Starting in 1955 the CCM is retired from US service (38).

1956 – NATO CCM to be replaced on 1 July 1956 by KL-7. A small number continued to be used for meteorological traffic and as a reserve (39).

1959 - The State Department retires the MCB worldwide in July 1959 (40).

1962 – NATO military committee orders the disposal of CCM equipment and associated materials (41): ‘As a result of exhaustive studies by the Standing Group Meteorological and Communications-Electronics Committees, it has been determined that the CCM equipment must now be regarded as totally unsuitable for the encryption of meteorological traffic. In fact, the CCM equipment is in such bad condition due to age, past usage, long term storage, lack of spare parts, and lack of adequately trained maintenance personnel, that it is of no further use’.

Sources:

(a). Operating instructions for ECM Mark 2 (CSP 888/889) and CCM Mark 1 (CSP 1600) - dated May 1944, NARA - RG 457 - Entry 9032 - ‘CCM 1943-45’ (NARA id: 2811488): OP-20-G reports: ‘Cross Tie in CCM from 1-wheel to 4-wheel’, ‘C.C.M., termination of researches on at Arlington Hall’, ‘Short Cycles ln CCM’, ‘The period of the CCM’.

(b). NATO Archives Online: S.G. 171/4 ‘Report by the Communications-Electronics coordination section to the Standing group on plan for the employment of the Combined Cipher Machine (CECS 15/6)’ and S.G. 171/25 ‘Report by the Communications-Electronics coordination section to the Standing group on Provision of an off-line literal cipher machine for general NATO communications (CECS 97)’

(1). UK National archives: ADM 1/27186 ‘Review of security of naval codes and cyphers 1939-1945’, p40-41

(2). NSA’s Friedman collection: ‘Directive to G-2 Covering Interchange of Secret Technical Information with Representatives of British Government’ - A272416 and ‘Background of Policy in Regard to Making SIGABA Available to the British’ - A2435719

(3). UK National archives: ADM 1/27186 ‘Review of security of naval codes and cyphers 1939-1945’, p41

(4). NSA’s Friedman collection: ‘Background of Policy in Regard to Making SIGABA Available to the British’ - A2435719, ‘Establishment of Joint Cryptographic Systems for the United States and Great Britain’ - A2435737, ‘Conference on Joint U.S. and British Cryptographic Systems’ - A2435740

(5). NSA’s Friedman collection: ‘History of Invention and Development of the Mark II ECM-Op-2-- S-5’, p8 - A273704 and ‘U.S. Naval Code and Signal Laboratory-History of’ - A40422

(6). UK National archives: ADM 1/27186 ‘Review of security of naval codes and cyphers 1939-1945’, p37

(7). Journal of Intelligence History: ‘The Admiralty and Cipher Machines During the Second World War: Not So Stupid after All’, p6

(8). Journal of Intelligence History: ‘The Admiralty and Cipher Machines During the Second World War: Not So Stupid after All’, p7

(9). NSA’s Friedman collection: ‘History of Invention and Development of the Mark II ECM-Op-2-- S-5’- A273704 and Center for Cryptologic History: The SIGABA/ECM II Cipher Machine: "A Beautiful Idea"

(10). NSA’s Friedman collection: ‘History of Invention and Development of the Mark II ECM-Op-2-- S-5’, p8 - A273704

(10a). NSA’s Friedman collection: ‘U.S. Naval Code and Signal Laboratory-History of’, p5 - A40422

(11). UK National archives: ADM 1/27186 ‘Review of security of naval codes and cyphers 1939-1945’, p37

(12). UK National archives: ADM 1/27186 ‘Review of security of naval codes and cyphers 1939-1945’, p37

(13). UK National archives: ADM 1/27186 ‘Review of security of naval codes and cyphers 1939-1945’, p38

(14). Journal of Intelligence History: ‘The Admiralty and Cipher Machines During the Second World War: Not So Stupid after All’, p7

(15). Journal of Intelligence History: ‘The Admiralty and Cipher Machines During the Second World War: Not So Stupid after All’, p7

(16). UK National archives: ADM 1/27186 ‘Review of security of naval codes and cyphers 1939-1945’, p38

(17). UK National archives: ADM 1/27186 ‘Review of security of naval codes and cyphers 1939-1945’, p38

(18). Journal of Intelligence History: ‘The Admiralty and Cipher Machines During the Second World War: Not So Stupid after All’, p7-8

(19). OP-20-G report: ‘C.C.M., termination of researches on at Arlington Hall’

(20). UK National archives: ADM 1/27186 ‘Review of security of naval codes and cyphers 1939-1945’, p38

(21). NSA’s Friedman collection: ‘German Naval Communications Intelligence’ Volume If-210-Copy #3, Chapter IV, Pp 135-161 ‘, p8 - A66767

(22). UK National archives: ADM 1/27186 ‘Review of security of naval codes and cyphers 1939-1945’, p39

(23). UK National archives: WO 193/211 ‘Wireless, cable and signal (including cipher) communications: policy and codes: action from report of Godwin-Austen Committee’: Typex and CCM distribution list for operation NESTEGG (1945) (the CCM systems are in columns 5 and 6)

(24). UK National archives: ADM 1/27186 ‘Review of security of naval codes and cyphers 1939-1945’, p38

(25). NSA’s Friedman collection: ‘History of Converter M-134-C Volume 3’ - A523210, chapter XVI ‘The Colmar compromise’.

(26). AJAX: ‘A History of U.S. Communications Security Post World-War II’, p92, SIGROD: Center for Cryptologic History: The SIGABA/ECM II Cipher Machine: "A Beautiful Idea", p26 and p41, HERMES: NATO Archives Online: S.G. 171/4 ‘Report by the Communications-Electronics coordination section to the Standing group on plan for the employment of the Combined Cipher Machine (CECS 15/6)’, LUCIFER: NSA’s Friedman collection: ‘UK/US Communications Security Conference 1953 Report of the Security Sub-Committee to the Executive Committee’ - A522921

(27). San Francisco Maritime National Park Association: CSP and Other Crypto Designators, History of the Signal Security Agency’ - Volume 1-Organization, p113, NSA’s Friedman collection: ‘State Department Use of Cipher Machine Electrical Stepping’ - A272413, ‘Establishment of Joint Crypto Centers’ - A67035,  ‘U.S. Naval Code and Signal Laboratory-History of’ - A40422

(28). Intelligence and National Security: ‘State Department cipher machines and communications security in the early Cold War, 1944–1965’, p3

(29). Intelligence and National Security: ‘State Department cipher machines and communications security in the early Cold War, 1944–1965’, p4

(30a). NSA’s Friedman collection: ‘U.S. and British Collaboration on Combined Cipher Machine Development’ - A2435927

(30b). NSA’s Friedman collection: ‘Army/Navy Conference on CCM Modification’ - A2435934

(30c). NSA’s Friedman collection: ‘Replacement of the Present Combined Cipher Machine’ - A2436098

(30d) ‘Replacement of the "Combined Cipher Machine (CCM)’ - A2436048

(30e). NSA’s Friedman collection: ‘Replacement of the Present Combined Cipher Machine (CCM)’ - A2435986

(31). ‘History of the TSEC/KL-7 ADONIS & POLLUX, p9 by Dirk Rijmenants

(32). NATO Archives Online: S.G. 171/4 ‘Report by the Communications-Electronics coordination section to the Standing group on plan for the employment of the Combined Cipher Machine (CECS 15/6)’ and S.G. 171/25 ‘Report by the Communications-Electronics coordination section to the Standing group on Provision of an off-line literal cipher machine for general NATO communications (CECS 97)’

(33). Intelligence and National Security: ‘State Department cipher machines and communications security in the early Cold War, 1944–1965’, p5-8 and ‘Spymaster: Startling Cold War Revelations of a Soviet KGB Chief’ by Tennent H. Bagley

(34). NATO Archives Online: S.G. 7/40 ‘Standing group decision on S.G. 7/40 – A report by the Communications-Electronics coordination Section on Provision of a general high grade cyher system for North Atlantic treaty organization powers’.

(35). NATO Archives Online: S.G. 171/3 ‘Report by the Communications-Electronics coordination section to the Standing group on the provision of secure means for second level communications within NATO forces (CECS 15/4)

(36). NATO Archives Online: S.G. 171/4 ‘Report by the Communications-Electronics coordination section to the Standing group on plan for the employment of the Combined Cipher Machine (CECS 15/6)’

(37). NATO Archives Online: S.G. 171/25 ‘Report by the Communications-Electronics coordination section to the Standing group on Provision of an off-line literal cipher machine for general NATO communications (CECS 97)’

(38). ‘A History of U.S. Communications Security Post World-War II’, p92

(39). NATO Archives Online: SGWM-809-56 ‘Memorandum for the Standing group meteorological committee - Subject: Cryptographic Equipment for Meteorological Use’

(40). Intelligence and National Security: ‘State Department cipher machines and communications security in the early Cold War, 1944–1965’, p4

(41). NATO Archives Online: SGM-279-62 ‘North Atlantic military committee standing group – Subject: ‘Disposal of the Combined Cipher Machine (CCM) and associated materials’.


Pics: CSP 1600 and 1700 pics from Crypto museum, Typex Mk 23 pic from National Cryptologic Museum. Reprinted with permission.

Additional information: Frode Weierud has also presented information on the CCM at his site Crypto Cellar Research.

Acknowledgements: It was Ralph Erskine (a legend of cryptologic history) who, years ago, sent me files on the CCM. Without those reports I wouldn’t have thought to research the CCM further. I also have to thank Frode Weierud for his insightful comments.

No comments:

Post a Comment