As the
diplomatic situation deteriorated a parallel system was created that would
afford better security. This was the Z organization, created in 1936 and headed
by Claude Dansey. The
Z organization was supposed to operate independently of British embassies and
thus avoid the attention of foreign internal security agencies.
At the start
of WWII both networks were unable to perform as intended. As British embassies
closed down, the PCO’s lost their networks. The undercover Z organization on
the other hand had been compromised from double agents and British intelligence
suffered a grievous defeat in the Venlo incident.
Since both groups
had neglected to build up ‘stay behind’ networks and supply them with the necessary
radio equipment this meant that Britain had practically no reliable
intelligence networks available after the fall of France. In this void the need
for extreme measures led to the creation of the SOE (Special Operations Executive) organization in 1940. SOE was
responsible for intelligence and sabotage operations against the Axis powers
but since it had the same mission as SIS countless power struggles ensued
between these two agencies.
The wartime
performance of SOE was mixed
at best. Although they certainly had their successes, countless SOE
networks were compromised and their members arrested and executed. In Holland
their entire network fell under German control in the famous Englandspiel operation. In France they lost countless agents and
networks. Just the fall of their Prosper network in 1943 led to the arrest of hundreds
of resistance members.
SOE was
disbanded in 1946 and most of its archives were destroyed postwar with some lost
in a fire. Unfortunately the loss of the archives means that many questions
about SOE wartime operations can never be answered.
Were some of the
failures of SOE in Western Europe
connected with their insecure cryptosystems? Leo Marks, head of the
SOE cipher section, was constantly worried about the insecurity of their poem
code but it took him till late 1943 to introduce the unbreakable letter one
time pad. The change was gradual and even in 1944 many insecure systems
continued to be used.
Let’s have a look at this whole affair.
SOE cryptosystems
WWII intelligence
services had two conflicting requirements when it came to cryptologic systems
for their agents.
On the one
hand they needed systems that would be easy to use in the field (so that ruled
out like complicated/bulky systems like cipher machines).
On the other
hand these messages had to be kept secure from enemy codebreakers, since each
one contained information that could compromise their entire networks.
Unlike
military messages that are usually unimportant on their own the traffic of a
spy group contains names, addresses and other sensitive information that can be
used by the enemy to untangle the entire group.
The only
system that satisfied both requirements was the one time pad system and it was
introduced gradually in late 1943. However for most of the war SOE used systems
that were both insecure and prone to errors by the user.
Let’s take a
look at them:
1). Playfair
square
The first
crypto system used by SOE was the well known Playfair cipher.
The security
afforded by this system was very low and from 1942 it was restricted to
internal network communications and its use prohibited for messages sent by
radio.
2). Columnar
transposition
The main system used by SOE for most of the
war was the transposition
of the text based on a numerical key.
Simple
transposition
First the
text is written underneath the key. Then each column is written vertically in
the order specified by the key. This results in a ‘scrambled’ text.
For example
let’s say our message is the following ‘Gestapo
has arrested our radio operator cipher material compromised’ and the ‘key’
is ‘automobile’:
First we
write the key and number each letter according to their position in the
alphabet. If the same letter is present more than once we number them starting
from the one to the left.
1
|
10
|
9
|
7
|
6
|
8
|
2
|
4
|
5
|
3
|
a
|
u
|
t
|
o
|
m
|
o
|
b
|
i
|
l
|
e
|
Then we write
the plain text below the key:
1
|
10
|
9
|
7
|
6
|
8
|
2
|
4
|
5
|
3
|
g
|
e
|
s
|
t
|
a
|
p
|
o
|
h
|
a
|
s
|
a
|
r
|
r
|
e
|
s
|
t
|
e
|
d
|
o
|
u
|
r
|
r
|
a
|
d
|
i
|
o
|
o
|
p
|
e
|
r
|
a
|
t
|
o
|
r
|
c
|
i
|
p
|
h
|
e
|
r
|
m
|
a
|
t
|
e
|
r
|
i
|
a
|
l
|
c
|
o
|
m
|
p
|
r
|
o
|
m
|
i
|
s
|
e
|
d
|
garammoeopassurrohdphleaoeecdasicrmtedreoptoiiisraotrerrtap
Double transposition
The same
procedure is then repeated one more time but with a different key of a
different length. For example let’s assume the second ‘key’ is ‘elephant’:
2
|
5
|
3
|
7
|
4
|
1
|
6
|
8
|
e
|
l
|
e
|
p
|
h
|
a
|
n
|
t
|
2
|
5
|
3
|
7
|
4
|
1
|
6
|
8
|
g
|
a
|
r
|
a
|
m
|
m
|
o
|
e
|
o
|
p
|
a
|
s
|
s
|
u
|
r
|
r
|
o
|
h
|
d
|
p
|
h
|
l
|
e
|
a
|
o
|
e
|
e
|
c
|
d
|
a
|
s
|
i
|
c
|
r
|
m
|
t
|
e
|
d
|
r
|
e
|
o
|
p
|
t
|
o
|
i
|
i
|
i
|
s
|
r
|
a
|
o
|
t
|
r
|
e
|
r
|
r
|
t
|
a
|
p
|
muladiegooocortrademtopmshdeirapherpaaoresriraspctoteraiesr.
Then the text is broken up in 5-letter groups and null letters are inserted to
make the total divisible by 5.
Each message
had to contain at least 100 letters and no more than 400-500.
The security
of the transposition system depended on the use of different keys for each
message. How were these keys selected?
Key taken
from a book
In the early
years the transposition keys were taken from a book. Both the agent and the
receiving station had the same edition of a specific book and the indicator at
the start of the message specified the page number, the line and the number of
letters to be used for the two tables. Since the indicator had to be sent in
letter groups a number to letter conversion table was used to turn the page
numbers etc into letters. Before converting the numbers however the agent had
to encipher this group by adding (without carrying) his own secret
identification number.
This whole
operation was time consuming and prone to errors. Moreover the use of a book as
a key generator was found to be impractical in the field. Instead a poem or
verse was used to create transposition keys.
Key taken
from a poem
Each agent
had to memorize a specific poem and could then use it to create different
transposition keys for each message. After writing down the poem each word was
assigned a letter of the alphabet. According to Lorain the user then had to choose at random 6
consecutive letters.
Let’s say our
poem is ‘Mary Had
a Little Lamb’:
MARY
|
HAD
|
A |
LITTLE |
LAMB
|
WHOSE |
FLEECE
|
WAS
|
A
|
B
|
C |
D
|
E
|
F
|
G
|
H
|
WHITE
|
AS
|
SNOW
|
AND
|
EVERYWHERE
|
THAT
|
MARY
|
WENT
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
THE
|
LAMB
|
WAS
|
SURE
|
TO
|
GO
|
IT
|
FOLLOWED
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
HER
|
TO
|
||||||
Y
|
Z
|
Note that Marks doesn’t say anything about six consecutive letters. On the contrary in his book page 324 he says ‘every poem code message began with a five letter indicator group to show which five words of the poem had been used’.
This system
was preferred by agents because they did not have to carry a book around.
However if the agent was captured and tortured he might reveal his poem to the
Germans with the result that they would be able to decode all his messages.
The
problem of indecipherables
As can be
seen in the aforementioned examples the slightest mistake in numbering the key
or enciphering the plaintext will result in an indecipherable message. This was
the biggest problem with the double transposition system and as a result a
large percentage of the messages received at SOE HQ were unreadable. This
forced HQ to request another transmission of the same message, with the
following problems for the agents:
1). Forcing
an agent to resend the message led to loss of time. If the information was time
sensitive then obviously there was danger of it becoming useless.
2). The
Germans monitored radio traffic in the occupied areas and used direction finding equipment in order
to locate the sites of illegal transmissions. The longer an agent stayed ‘on
the air’ the easier it was for the Germans to triangulate his position.
3). Sending
the same message enciphered with different keys was dangerous from a security
point because it could provide enemy cryptanalysts with a way to solve it.
4). SOE
agents were taught a series of secret signs that could be inserted in their
messages in order to warn HQ that they had been captured and were under German
control. Usually these were spelling mistakes at a prearranged point. However
the huge number of indecipherables completely negated the value of this security
system since messages had so many mistakes that it was not possible to know If
they were a result of operator error or a deliberate attempt to warn HQ!
In order to
deal with indecipherables a codebreaking department was created in the SOE
cipher section and was tasked with solving the incoming messages.
WOK’s
(Worked-Out Keys)
The use of a
poem as a source of keys was found to be cumbersome and prone to errors and was
replaced with a new system called the ‘A-Z system’ by Lorain and ‘WOK’ by Leo Marks.
Instead of
choosing the transposition keys from a poem the agent was given a silk
handkerchief with prepared keys. Each key had its own discriminant. Once the
key was used then it was cut off and destroyed.
This system
guaranteed that even if the agent was captured he would not be able to reveal
the key to his captors since he did not have to memorize it. It also minimized
operator errors.
3). Delastelle
system
The cipher of
Felix Marie Delastelle
(1840–1902) is mentioned by Pierre Lorain but not by Leo Marks. According to Lorain
it was a transitional system used in 1942-43.
4). LOP’s
- (Letter One time Pads)
The epitome
of the spy field cipher was the letter one time pad. This was adopted thanks to
the efforts of Leo Marks and was gradually introduced in late 1943. The system
used a substitution table together with a set of prepared ‘keys’. Each letter
of the ‘key’ was ‘coupled’ with the opposite letter of the plaintext and they
were substituted using the conversion table.
‘Between Silk
and Cyanide: The Story of SOE's Code War’, p248 has an example of a conversion
table:
For example if
we want to encode the message ‘Jacques has arrived safely’ using the ‘key’
aqgtfdpxwmvxtdndixvhydk then the cipher text will be ooleifdvmqwckwxfuewygtb
as aj=o, qa=o, gc=l etc
The OTP
system is mathematically unbreakable provided the key is as long as the message
and each key is only used once. The security of the system was such that
messages could be as small as 10 letters.
However the
OTP has the problem of distribution of keys, as both the sending and the
receiving party need to have the same keys.
German
exploitation of SOE codes
The German
agencies responsible for monitoring illicit radio transmissions were the Radio
Defence Corps of the Armed Forces High Command – OKW Funkabwehr and the similar
department of the regular police – Ordnungspolizei.
Both agencies operated in Western Europe but they were assigned different
areas.
These agencies not only monitored the agents’ traffic but in many cases
they were able to locate the
site of transmissions through D/F (direction finding). In such cases the radio
center was raided and often the operator and his cipher material were captured.
This cipher
material was then used by Dr Vaucks agents section to identify the
crypto-systems, solve them and decode the traffic. This
section, headed by Dr Wilhelm Vauck, was originally part of the Army’s signal
intelligence agency OKH/In 7/VI but worked closely with the Radio Defense Corps. It was established
in 1942 and by the end of the year two-man teams were detached to regional
Aussenstellen in Paris, Marseilles, Lyons, Prague, Oslo, Vienna, Brussels. In
late 1943 the entire department was moved to the OKW Funkabwehr.
According to
postwar reports they usually had success with a system if it had been
physically compromised. However in some cases it was possible to solve enemy
systems cryptanalytically. Mettig, head of the Army’s signal intelligence
agency in 1941-43 says in TICOM I-115 that
‘a special weakness of Allied agents’ ciphers
was the use of books for enciphering. Usually only a minor inroad or other clue
was required to reproduce a piece of the cipher text and conclusions could
thence be drawn as to which book was used. In the case of one Allied
transmission in the summer of ’42, five or six French words of a text were
ascertained, leading to the conclusion that the cipher book dealt with the
Spanish civil war. In view of this assumption, all French books about the
Spanish civil war in the State libraries of Paris, Madrid and Lisbon were read
with the object of trying in these 5-6 words. The book was found. PW always
looked on a great research effort as worthwhile. The greatest weakness in using
books for enciphering lay in the fact that, once a book had been compromised,
an entire transmission could be broken automatically. The weakness existed even
if the book in question could not be secured in the same edition or impression.
It was still possible for Referat Vauck (though again only after considerable
research) to find the right place in the book and to secure a fluent
deciphering system by means of conversion tables.
Another weakness of Allied agent
ciphers was the use of poetry. Here the verse metre was an additional help in
solving the cipher text, as was done in the case of a Czech transmission in the
autumn of 42/43.’
Notice that Mettig
mentions in his report the use of poems
and books as key generators. As we
have seen these were indeed the main SOE systems (and probably SIS too).
How
successful was the German effort vs SOE codes?
Unfortunately
it is impossible to answer this question conclusively since I have not seen any
TICOM reports giving details on the work of the Vauck section. Nor does it seem
that Dr Vauck was interrogated by TICOM authorities after the war.
The Germans
certainly decoded some messages as can be seen in file HW 40/76 ‘Enemy
exploitation of SIS and SOE codes and cyphers: miscellaneous reports and
correspondence’:
Fenner, head
of the cryptanalysis department of OKW/Chi, said in DF-187F, p20 about the Vauck section that ‘there may have been some 50 messages decrypted weekly, among them some
to be sure which were almost a year old and hence had only historical
significance’. Fenner however was not the best source since he makes many
‘mistakes’ in his reports. TICOM report DF-9
‘Captured Wehrmacht Sigint Document: Translation of Activity Report of OKW/Chi
for the Period 1st January, 1944 to 25th June, 1944’, p4 gives the messages
decoded by month and says in the end ‘The
6.000 agents messages handed to Fu III are not included in these figures.’
Hans Kurfess,
a member of the Agents section detailed to the Paris Aussenstelle says in
report CSDIC/CMF/SD 80, p24 ‘KURFESS, whose attachment was more
"normal" than that of LENTZ and who consequently has a clearer idea
of the sort of traffic that came through the Aussenstelle, states that most of
the deciphered messages were short (40-50 groups) and used a double transposition
cipher with a key phrase consisting of a line of poetry. They nearly all
concerned the resistance movement in FRANCE, giving times of rendezvous,
parachute dropping of supplies and WT sets. He remembers the code names
"LYSANDER" and "EIFFEL" but cannot state in exactly what
connection, and also one message of about 250 groups giving military
information. He has forgotten for whom it was intended.’
There is also
this information from ‘The German Penetration of SOE: France, 1941-44’ by Jean
Overton Fuller:
One day `Archambaud' was all on edge,
and to my question, 'What is the matter?' he replied. "Mr Goetz has given
me, in clear, the text of a radiophonic message I received from London several
weeks before my arrest. He had received the deciphered text of the message from
Berlin. Now that was a message I had never been able to decipher myself, as
London had committed a fault in the ciphering. Well, in Berlin they had
deciphered it, and so it is from the Germans that I learn what it
contained."I know that the central department in Berlin recorded almost
all the enemy radiophonic messages from France and elsewhere, and that every
time we arrested a radio operator Kieffer immediately asked Berlin to send,
still ciphered or deciphered, the texts of the messages which he had sent to
and received from London. For a long time after that `Archambaud' racked his
brains as to how Berlin had been able to decipher his messages.
This passage seems to support the Abbe
Guillaume's belief that the arrival of the two Canadians by parachute in the
Sologne was known to the Germans through their having broken Archambaud's code,
while he was still at liberty. Germaine Tambour, two days before her arrest,
had told Laure Lebras the Germans seemed to know of parachutings at the same
time as the Resistance and she believed they had the code. Professor Foot wrote
that he had seen no evidence causing him to believe the Germans ever broke the
code of an operator still at liberty, but Professor Foot had not the benefit of
having seen Vogt's letter to me about this. That they asked the agents to give
their codes may seem evidence against their ability to break them, but I
suspect it may have been a question of time. From Vogt's letter, it appears to
me that sometimes they could and sometimes they could not break the code.
Perhaps the British know more about what really happened since the first page in HW 40/76 says:
So I guess we’ll have to wait…
Sources:
‘Secret Warfare: The Arms and Techniques of the Resistance’ by Pierre Lorain, ‘Between Silk and Cyanide: The Story of SOE's Code War’ by Leo Marks, ‘Secret War: The Story of SOE, Britain's Wartime Sabotage Organization’, ‘MI6: The History of the Secret Intelligence Service 1909-1949’, ‘European Axis Signals Intelligence’ vol3 and 4, TICOM reports I-115, I-200, DF-187B, DF-187F, DF-9 , HW 40/76 ‘Enemy exploitation of SIS and SOE codes and cyphers’, ‘The German Penetration of SOE: France, 1941-44’, CSDIC/CMF/SD 80 - 'First Detailed Interrogation Report on LENTZ, Waldemar, and KURFESS, Hans', CSDIC (UK) SIR 1106 ‘Report on information obtained from PW CS/495 Uffz MIERSEMANN’, S.O.E. FIELD CIPHERS
Acknowledgements: Once again I have to thank Ralph Erskine for helping me identify the SOE cryptosystems.
Updates:
1). More information on SOE indicator procedures is available in SOE cryptosystems – The German view.
2). An overview of the work of Referat 12 is available from Allied agents codes and Referat 12.
‘Secret Warfare: The Arms and Techniques of the Resistance’ by Pierre Lorain, ‘Between Silk and Cyanide: The Story of SOE's Code War’ by Leo Marks, ‘Secret War: The Story of SOE, Britain's Wartime Sabotage Organization’, ‘MI6: The History of the Secret Intelligence Service 1909-1949’, ‘European Axis Signals Intelligence’ vol3 and 4, TICOM reports I-115, I-200, DF-187B, DF-187F, DF-9 , HW 40/76 ‘Enemy exploitation of SIS and SOE codes and cyphers’, ‘The German Penetration of SOE: France, 1941-44’, CSDIC/CMF/SD 80 - 'First Detailed Interrogation Report on LENTZ, Waldemar, and KURFESS, Hans', CSDIC (UK) SIR 1106 ‘Report on information obtained from PW CS/495 Uffz MIERSEMANN’, S.O.E. FIELD CIPHERS
Acknowledgements: Once again I have to thank Ralph Erskine for helping me identify the SOE cryptosystems.
Updates:
1). More information on SOE indicator procedures is available in SOE cryptosystems – The German view.
2). An overview of the work of Referat 12 is available from Allied agents codes and Referat 12.
Lokk here:
ReplyDeletehttp://scz.bplaced.net/m.html#dwa
double transposition from year 1960.
Again a fascinating post with a good overview on the SOE ciphers. I'm constantly looking for information on one-time pad so all information is most welcome.
ReplyDeleteKeep up the excellent work!
grtz,
Dirk
I really appreciate your hard work here. This is very interesting.
ReplyDeleteHI, this is my main interest in codes and ciphers.
ReplyDeleteI am just about to receive and original microphoto for the poem key, it has numbers instead of letters.
There is another version of the poem key, the agents were to select 4 words to be used, 2 for normal cipher 2 for emergency, the numbers were generated from letter position in the alphabet.
for example BUTTER
b=1 e=2 r=3 t=4 t=5 u=6 , this idea was also used in the book variant, (Which was used by SIS predominantly).
The WOK had a 5 letter code at the end of the 2 strings of numbers this was transmitted so they knew which line to use.
the biggest issue with SOE ciphers was the lack of security checking, there were various devices in pace but they were ignored in the UK. That could have saved a lot of lives!
well done on the blog, when i get the sheet ill post a copy of it.
Are you referring to the indicator procedure? I’ve covered this here:
Deletehttp://chris-intel-corner.blogspot.gr/2013/10/soe-cryptosystems-german-view.html
yes, sorry force of habit .
DeleteI was pointing out that the micro sheets had numbers on the ones that i have seen, which they used with the substitution cipher they had on their radio Schedules.
They also used 2 predefined poem words which was an early attempt at the one time memory pad. Rather than the sheet initially.
Books keys were mainly the SIS, the free french mainly used Playfair and single transposition, the Dutch sections used a single word repeated and shifted the letters to the left depending on day of the month. Theses were all dropped when they finally got the code sheet working.
Re OTP they had 25,000 sets of 5 letter groups per booklet.
There were also other systems brought in CODE 53, Code type X, but i can't find any info out on these yet.
One of the other things they did was to use a modified Q code system.
One further system SOE had developed was a form of steganography, where they wrote out various versions of the same sentence slightly differently and these each had a separate meaning. Very complicated.
The Code Sheet they developed was initially for JEDBURGH teams, but it was also used by Force 136, SAS,SBS and is still used in a different variant by other groups.
hope this is helpful info