The new machine was called Typex (originally
RAF Enigma with TypeX attachments). The first experimental model was delivered
to the Air Ministry in 1934 and after a period of testing 30 more Mark I Typex
machines were produced in 1937. The new model Typex Mark II, demonstrated in
1938, was equipped with two printers for printing the plaintext and ciphertext
version of each message. It was this model that was built in large numbers and
the first contract for 350 machines was signed in 1938. Typex production was
slow during the war with 500 machines built by June 1940, 2,300 by the end of 1942, 4,078 by December
1943 and 5,016 by May 1944. By the summer of 1945 about 11.000 (8.200 Mk
II and 3.000 Mk VI) had been built (1).
The following pics from Crypto museum show the Mark II version on the left and the portable Mark VI version on the right:
The Typex
cipher machine was used by British civilian and military authorities during
WWII and up to the early/mid 1950’s.
The Typex on the other hand had rotors with 3-9 notches. For example (2):
The Army also
used an ‘open’ indicator system till May ’41 (for the UK) and November ’41 (for
worldwide users), also at the start of the war there was only one set of 5
rotors available. Another weak spot for the Army was the use of stereotyped
beginnings till January ’41, when codress burying was introduced (meaning that
the address at the start of the message was moved to the middle before being
enciphered) (9).
The Royal
Navy used the same settings for both Code and Cypher traffic till August ’40
when different settings were made effective. The settings changed weekly till
September 1940 when daily change was introduced. Just like the Army the rotors
available at the start of the war were only 5 but in June ’41 two more were
introduced. Indicators were sent in the clear till November ’41, when the first
edition of the Naval message settings book was introduced (10).
‘As with book cypher, the method of use of
the machine became more complex. Indicators, instead of being self-evident,
were first of all chosen from a disguised-true indicator book, and, later,
indicators were recyphered in addition. A. plugboard scrambling device was
fixed to all machines and the drums were provided with removable wirings, which
were changed about 3 or 4 times a month. The effect on output in cypher offices
was most marked, not only because encyphering and decyphering became slower,
but because more messages became indecypherable, and more time had to be spent
on correcting them. The rate at which cipher work could be done, even in large
offices, fell to about a quarter of that at the beginning of the war.’
Progress
report:
The studies of the English cipher machine Type “X” were continued. A summary report of the present results was written by Dr. Pictsch (see Vol. 45); a more accurate report on the individual results with appendixes is still in process.
The studies of
Type X made progress. Mainly it was the completion of a very extensive and detailed
report on the present results. Besides the study into the explanation of the
movement rules for the wheels, the transport notches and the wheel order,
studies were started on the possibility of a deciphering under the condition
that the wheel wirings are known.
The studies of
Type X made progress. The detailed Report 1 was completed, furthermore 2
memoranda of which one investigated the question what period lengths Type X
will have considering three to four transport notches on the wheels or
respectively how long stretches without stepping one can expect for special
studies. The second memorandum dealt with the possible reconstruction of the
machine settings with given cleartext and ciphertext (for further information
see Volume 45).
The studies of
Type X were temporarily ended. Some further statistical studies were in
addition put down in writing. So far the studies of this machine and the
statements of the prisoners show it is pointless to process material enciphered
with this machine when the wheel wirings are not known.
Under normal circumstances their statements would have been dismissed as lies but the fact that both had assignments dealing with radio intelligence and their accurate description of a Typex device (with 5 rotors and two sets of printers) meant that a thorough investigation had to be undertaken to check whether Typex had been compromised.
The
investigation focused on locating the intelligence officer ‘Wagner’ and on
ascertaining whether a Typex device had been captured by the Germans at Tobruk in 1942. These investigations
during WWII were inconclusive however at the end of the war they resumed, since
many German cryptanalysts had fallen into Allied hands and could clear things
up.
The fact that
Bletchley Park with its vast resources had neglected the security of Typex for
so long shows that cryptologic centralization does not automatically lead to
better outcomes. Moreover the emphasis on codebreaking at the expense of cipher
security affected not only Typex but also other important cryptosystems such as
the Navy’s Cypher No3. According to the article ‘Tunny
Reveals B-Dienst Successes Against the ‘Convoy Code’: ‘GC&CS
excelled at breaking the codes and ciphers of the Axis powers, and devoted huge
resources to doing so. In March 1942, GC&CS employed about 1.600 people on
codebreaking operations, but only Travis (in theory) and Dudley-Smith were then
assigned to investigating cipher security, even though Comsec was one of
GC&CS’s two main functions. It was clearly too few, especially since Travis
had no time to devote to Comsec, and Dudley-Smith was not a cryptanalyst. Even
in October 1943, when GC&CS’s staff had more than trebled to over 4.800,
only Dudley-Smith (in a ‘part-time’ capacity!) and ‘two or three girls’ worked
in the ‘Security of Allied Communications’ section, which investigated the
security of the Army’s and Royal Air Force’s signals (and even those of some
allies), in addition to the Royal Navy’s signals. Comsec is not as glamorous as
codebreaking, but is probably more important.’
The fact that a global power like Britain took more than a decade in order to select a suitable cipher machine, then made it too complex for mass production and finally had to rely on ‘sheer good fortune’ to keep it secure from enemy codebreakers must be rated as a significant failure in the field of communications security.
‘When encyphering on the Typex machine, the
encyphered version of a letter can never be the letter itself. This sometimes
makes it possible to assign with absolute accuracy even a small number of words
known or estimated to be in a message to the actual letters of the cypher
version by which they are represented. To obviate this danger operators must
from time to time press a key not demanded by the text of the message; the
additional letters resulting will make the accurate fitting to the cypher
version of a piece of clear text quite impossible. Such an insertion should be
made on average once in every 10 words while the body of the message is being
encyphered; it should be made on average once in every three words during the
encypherment of the codress, the prefatory details and the beginnings and
endings, whichever of the methods of encypherment in paragraph 25 is being
followed; it should also be made on average once in every three words
throughout very short messages when they have to be encyphered separately in
Typex (see paragraph 27). The insertion should be made within words and not
between them.’
Acknowledgments: I have to thank Ralph Erskine for sharing lots of information on the Typex machine, Frode Weierud for translating the relevant passages from the War Diary of Inspectorate 7/VI and Randy Rezabek for TICOM report IF-272, listing the Typex reports of In 7/VI.
The following pics from Crypto museum show the Mark II version on the left and the portable Mark VI version on the right:
Typex compared to Enigma
The Typex was
much more secure than the commercial Enigma device since it had 5 rotors in the
scrambler unit compared to 3 in the Enigma D and K versions. The 2 rotors at
the right end of the scrambler did not move but could be set by hand. The 3
rotors on the left moved according to the same principle as the other Enigma
devices. The ‘fast’ rotor moved with each letter and also caused the other two
rotors to move thanks to the notches in their ratchet wheels. Unlike other
Enigma devices the Typex had multiple notches per rotor. The commercial Enigma
and the improved version used by the German Army and Airforce had one notch per
rotor, making wheel movement very predictable. The German Navy had three additional
rotors, each with two notches.The Typex on the other hand had rotors with 3-9 notches. For example (2):
The use of
multiple notches per rotor meant that the ‘fast’ rotor turned the other two
movable rotors much more often than in the commercial Enigma or the German
military’s version thus defeating certain types of cryptanalytic attacks. The Typex
also had an advantage in terms of speed and ease of use since it automatically
printed the cipher text. In the standard Enigma models the cipher clerk had to
write down the cipher text after depressing each key.
However compared
to the German military’s Enigma I and its plugboard the Typex, despite its
multistep rotors, was not superior cryptologically (3). According to ‘The Typex cryptograph’:
‘The Enigma plugboard offers more
security, in spite of its reciprocal nature, than the two stator setup in the
Typex. While the Army Enigma and the Typex are roughly comparable in design and
cryptographic strength, the German Naval Enigma probably possessed an edge over
the Typex due to the introduction of the three "thin" reflector
rotors which, in effect, made the machine a four rotor device (the reflector
was a stator however).’
The same article
admits that this comparison is only theoretical since the security of each
device depended on the way it was used (indicator procedure, introduction of
new rotors etc).
The problems with Typex were:
1). Due to the failure of the Inter-Departmental
Cypher Committee to select a cipher machine for mass production and the
solitary efforts of the RAF in the mid 1930’s there were only a small number of
Typex machines available at the start of WWII. The first contract in 1938 was
for 350 machines and it’s doubtful that all would have been delivered by
September 1939. Note that at that time the Germans had about 10.000 Enigmas in
use (4).
2). The ability to print the enciphered text came at a
heavy (literally!) price. While the German Enigma machine was relatively small
and compact, the Typex version built in large numbers Typex Mk II was bulky, weighed
54kg and required electrical supply. Thus it could only be used at prepared
sites.
3). For the same reason Typex
was too complex to mass produce during the war. According to ‘The Development of Typex’:
‘Some of the reasons for
the low production rate are clear. Any rotor-based machine tends to be very
complex mechanically. Figures 2 and 3 illustrate just how many different parts
a Typex machine included. Typex Mk. VI contained about 700 parts, few of which
were common to other models. Typex must have been a quartermaster's nightmare -
much more so than Enigma, because of Typex's printer. Typex's relative complexity
proved too much for the British machine tool industry. Overloaded as the
industry was with the demands of the war economy generally, it took almost two
years to obtain the machine tools required to manufacture Typex, despite the
priority that would have been accorded to it. Only 2,300 Typex machines had
been made by the end of 1942, 4,078 by December 1943 and 5,016 by May 1944.’
4). Because they were complex the machines often malfunctioned (5).
4). Because they were complex the machines often malfunctioned (5).
The production problems meant that during the war the Brits did
not have a cipher machine in widespread use like the Germans did. For comparison’s
purposes at least 40.000 Enigma machines were built by the Germans (6).
Use of
Typex by British armed forces
The Typex
device was originally developed by the RAF but once full scale production
started devices were also requested by the Army. Both the Army and the RAF used
the Typex as a high level cryptosystem but due to the production problems they
couldn’t replace their codebooks with it. Instead the available devices were
used for securing the most important communications.
The Royal
Navy was also interested in acquiring a large number of Typex machines and
equipping its shore stations and naval units with it (7). In fact the first
Navy order in 1939 for 630 devices was three times that of the War Office.
Unfortunately for the Royal Navy this plan could not be carried out due to the
production difficulties. Instead the limited number of Typex devices were used
by shore stations, fleet flagships and landing ships headquarters.
During the
war the device was upgraded significantly in terms of security. In that sense it’s
possible to differentiate between the ‘simple’ Typex of the period 1939-42 and
the ‘improved’ Typex of 1943-45.
In the period
1939-42 it doesn’t seem like Typex was used in a completely secure manner and
this was despite Bletchley Park’s centralization and intimate knowledge of
Enigma theory.
Insecure
procedures
Up to
February 1941 the RAF had two sets of rotors for its Typex machines, the Mk I
for higher formations and the Mk II for all units but they both used the same
settings. From February onwards different sets of settings were introduced for
each set of rotors and during the war many additional ‘keys’ were issued for
different geographical areas (Middle East, Med, Home, Empire, India, Australia,
Canada etc). Regarding the indicator system (showing the starting positions of
the 5 rotors) initially the indicators were not enciphered but then an
indicator book was introduced with disguised-true indicators and finally the
disguised indicators were further enciphered on Typex. (8)
Security
over efficiency
Although
initially the Typex was not used in the most secure way possible during the war
it was significantly upgraded through the use of a rewirable reflector, ‘split’
rotors and several sets of indicator books and ‘key’ settings. At the same time
different sets of rotors were introduced for different areas and higher levels
of command.
The rewirable
reflector (called plugboard) was
introduced in 1941 but it took time before all machines were equipped with it. For
example the Navy did not introduce Naval plugboard settings keys till March
1942 and it wasn’t until May 1944 that the three services had enough plugboards
to introduce an inter-service plugboard key (11).
The ‘split’
rotors were Typex rotors with detachable rotor cores (called inserts). This way the cores could be
switched between different rotors. Also the cores could be inserted in two
different ways, effectively doubling their numbers. According to report HW
40/89 the first series of split rotors were introduced in November 1942 (12).
The indicator
procedure was further modified, first through the use of disguised-true
indicator books and then in 1944 by further enciphering the indicator on the
Typex to get the message ‘key’ (similar procedure used by the Germans). The new
procedure was introduced in February 1944 and used two disguised indicators
taken from the indicator book. The true setting of the first one was used to
set the Typex rotors and the true setting of the second one was enciphered on
it. The resulting 5 letters were the message ‘key’ (13).
Many different
sets of machine ‘keys’ (meaning the 5 rotors valid for each day and the order
they were inserted into the machine) were introduced for each geographical area
and also for higher commands. For
example by the end of the war the RAF had ‘no
less than 30 machine settings in use, excluding Chief Of Staff and Y settings’
(14).
Finally the
introduction of several sets of rotors with different wirings meant that even
if one network was compromised in some way this would not affect the security
of the other networks. At the start of the war the Army and the Navy had only 5
rotors for their machines but during the war they received several more sets.
The Navy got 2 more rotors in June 1941 and in 1943 introduced two sets of 7
rotors each, one for Cypher and the other for Code traffic. The original 7
rotors were then used only for inter-service traffic. The RAF also had
different sets for Cypher and Code traffic and it is possible that the Army
followed this system too. According to ‘The
Development of Typex’ the
total number of rotors must have been somewhere between 120-252 (15).
All these measures
meant that the ‘improved’ Typex was much more secure than the German military Enigma
but this came at a cost, as significant resources had to be allocated for the
production of Typex rotors, cores, reflectors etc (including an entire RAF unit
with 200 personnel tasked with wiring the rotors) (16).
Also the new indicator
procedures and the use of different ‘keys’, rotors and inserts meant that the
work of the cipher clerks was negatively impacted. This is clearly admitted in
reports ADM
1/27186 (17) and AIR 20/1531 (18), which state:
‘Moreover, Typex operation has been
complicated in recent years by the progressive introduction of numerous and
tiresome procedures and restrictions which the operator must bear constantly in
mind in the interest of security. What the Navy requires, and must press for, is
a machine which, whilst providing the highest possible security, is
nevertheless reasonably simple to operate and maintain in good running order.
The Typex Mark II machine is far from reaching this standard.’
Research
on Typex by German Army codebreakers
The German
codebreakers solved many British cryptosystems during WWII, both high and low
level. The most important systems compromised were the Royal
Navy’s Code and Cypher, the Army’s
Cypher, the RAF Cypher
and the Interdepartmental
Cypher.
Regarding
Typex, several sources claim that the Germans tried to solve it but gave up
shortly afterwards because they considered the task hopeless (19). These
statements are correct for the codebreakers of the Navy, Airforce, OKW/Chi,
Foreign ministry and Forschungsamt. However their Army counterparts did not
give up so easily!
In the period
1940-41 the cipher research department of the German Army’s signal intelligence
agency Inspectorate 7/VI had several talented mathematicians (Pietsch,
Steinberg, Marquart, Schulz, Rinow) tasked with
examining difficult foreign cryptosystems. The war diary of Inspectorate 7/VI
shows that these individuals investigated the Typex device and by May ’41 had ascertained that it was an Enigma type device with 5
multistep rotors, the last two of which did not move during encipherment. Their
research was confirmed in May, when they visited the facilities of
the Signal Intelligence Agency of the Supreme Command of the Armed Forces -
OKW/Chi and were able to examine a Typex machine captured at Dunkirk. The device
worked according to the Enigma principle with the two rotors on the left
remaining stationary and the wiring of the entry and reflector wheels could be
recovered. The studies of the English cipher machine Type “X” were continued. A summary report of the present results was written by Dr. Pictsch (see Vol. 45); a more accurate report on the individual results with appendixes is still in process.
The most
important result was the information about a model of Type “X” at Chi/OKW. This
resulted in the following fundamental characteristics: the machine works after
the Enigma principle. The entry wheel and reflector wheel are known. The wiring
of the five wheels, which are situated between the entry and reflector wheels
and which are selected from a set of 10 wheels, is unfortunately unknown. Two
of the five wheels, next to the entry wheel, are always at rest; they are not
moved during operation, but can only be adjusted manually from message to
message. The middle wheel moves at every step and for every complete rotation
it moves several times the second wheel from the left, which in turn at every
complete rotation moved several times the first wheel from left. The machine
prints plaintext and ciphertext at the same time, it is driven by a motor,
which results in very light typing. The ciphertext is written in groups of
five, the plain text with word spaces. The wheels are equipped with double
rings of contact pins and contact pads, which guarantees better electrical
contacts than with the Enigma. Due to these facts, partly also due to suspected
facts from the previous work that now has become a certainty, could the further
studies be directed in a more definite direction. It was now pointless to
search over a larger material of several months for parallel passages. These
studies should now rather be limited to a single day’s material.
Investigations continued, with visits to the
cryptologic departments of the Airforce and the Foreign Ministry in order to
share the available information but at the same time these organisations
admitted that they were interested in receiving information but could not contribute
much because their resources were already stretched too thin. In the period May ’41-November ’41 the
Army codebreakers investigated the stepping motion of the Typex rotors, the
indicator system, the first and last codegroups from past traffic and developed
theories of solution based however on knowing the wirings of the Typex rotors.
Report of
June ’41:
Report of
July ’41:
Furthermore,
studies are underway to clarify the question if the last five-letter group of
Type X messages always are filled with a certain number of letters and if so by
which letters. The previous studies in this direction seem to show that the
last group mostly is filled with the cleartext letter X.
Report of August ’41:
The studies of
Type “X” were continued. In particular, extensive statistical studies of the
last 5 letters and the first 5 letters of the cipher messages were carried out
because, as expected from the nature of this cipher machine, particularly
frequent cleartext letters will appear very seldom in the ciphertext in those
positions. It showed indeed that the plaintext letter X has a clearly visible
minima in the last four ciphertext positions, from which it can be inferred
that the last five-letter group is filled with the cleartext letter X.
Furthermore, the statistics of the first 4 letters revealed that the letter A
is most common in the 1st position, the letter I in the 2nd, the letter R in
the 3rd and the letter X in 4th place, which seems quite understandable, as the
message material mainly comes from the Royal Air Force networks. Further
studies are on-going, that as a precaution deal with the question of when and
under what conditions material can be solved when knowing the wheel wirings or
whether the wheel wirings can be determined under certain conditions.
From the
available reports it seems that without the wheel wirings they could not solve
any traffic, as the report of November ’41 says:
The Typex
compromise investigation
During the fighting in N.Africa
both the German
and Italian
codebreakers were able to exploit many important Allied cryptosystems. Eventually
the Allies secured these systems and from mid 1942 they were the ones solving
enemy high level codes. At that time Typex was only available at Corps level and
there were no indications that it had been compromised in any way. Yet in May
1943, when the fighting ended with the defeat of Axis troops in Tunisia, two
German prisoners claimed that a mysterious officer named Wagner had a Typex
machine and was using it to solve British army traffic. The two men were Lieutenant
Hanswolf Haunhorst, the intelligence officer of the 334th ID, who befriended
the personnel of the signal intelligence unit NFAK 621 (supplying radio
intelligence to Rommel) and First
lieutenant Werner Possel, head of the senior fixed army wireless
station in Africa HeFu 7 (20).Under normal circumstances their statements would have been dismissed as lies but the fact that both had assignments dealing with radio intelligence and their accurate description of a Typex device (with 5 rotors and two sets of printers) meant that a thorough investigation had to be undertaken to check whether Typex had been compromised.
The relevant
reports show that Typex was investigated but could not be solved. The most
important individuals making these claims were Erich Huettenhain (chief
cryptanalyst of OKW/Chi), Walter Fricke (Army cryptanalyst responsible for
evaluating cipher security, later transferred to OKW/Chi), Otto Buggisch (Army
cryptanalyst) and Ferdinand Voegele (chief cryptanalyst of the Luftwaffe’s Chi
Stelle). On the other hand colonel Mettig, head of the Army’s signal
intelligence agency in the period 1941-43 stated that Typex had been solved in
spring 1942 but later claimed that he had made a mistake and the machine had
never been solved (21).
The
investigations seem to have concluded in 1947, when US intelligence located the
archives of the German army’s signal intelligence agency in a camp in Glasenbach,
Austria, where they had been hidden at the end of the war (22). As has been mentioned
earlier the war diary of Inspectorate 7/VI shows that Typex was investigated in
the period 1940-41 but research stopped in November 1941 due to the problem posed
by the unknown rotor wirings.
Bletchley
Park and Typex (in)security
One thing
made clear by the Typex investigation is that Bletchley Park’s knowledge of Enigma
theory had not been used to fortify the Typex machine, at least that was the
case till late 1943. The famous codebreaker Gordon Welchman wrote
in a report (23): ‘after all we ourselves have
made no serious attempt to use the experience of the experts on breaking the
German enigma to improve the security of our Type X’.
Another
report on the Typex case, dated 16 September 1943 (23), says: ‘Colonel Tiltman said that it had been decided some weeks ago that the
time was ripe for a large scale investigation of the security of typex as no
comprehensive examination had ever been made, but only ad hoc investigations
regarding various individual points as they arose’.
Conclusion
In the
interwar period the British military and civilian authorities knew that they
would eventually have to replace their dated codebook system with a cipher
machine, as it could transmit more information than the codebooks, in less time
and do so securely. However their Inter-Departmental Cypher
Committee failed to find a suitable device and in the 1930’s the experimental
RAF Enigma cipher machine with Type X attachments was the only available model
for mass production. In this case it is ironic that the device they chose to
produce was already available in the 1920’s in its commercial version. Thus the
period 1926 (when the Committee started evaluating cipher machines) to 1938
(when the first contract for mass production was signed) was time lost for no
gain.
The Typex machine was similar to the commercial Enigma
but with slight modifications that gave it adequate but not impenetrable
security for that era. Had it been produced in large numbers and used by naval
warships and military units then several WWII campaigns would have ended sooner
and with fewer casualties for the Allies.
Unfortunately the decision to add a printer (two for
the Mk II version) meant that it was needlessly
complex and thus difficult to produce in mass. The numbers built were enough to
equip the higher echelons of command but field units and warships were forced
to rely on enciphered codebooks that were read by the Germans. Especially in
the Battle of the
Atlantic the compromise of the enciphered codebooks gave the Germans
valuable intelligence on the routes of the Allied convoys that they wouldn’t have
been able to get from other sources.
As for its
security, in the period 1943-45 the Typex was used with a rewirable reflector
and several sets of ‘split’ rotors, indicator books and machine settings. In
order to seriously compromise such a device the enemy would have needed to
invest huge resources and build their own version of Bletchley Park, so in that
sense the device was secure enough.
Yet Typex
security in the period 1939-42 was surprisingly weak and this was despite
Bletchley Park’s knowledge of Enigma theory and their work on the German
version. TICOM report D-83 (24) admits this failure and points out that one of
the reasons that the device was not compromised was ‘sheer good fortune’:
‘However,
by about May, 1941, OKH were in full possession of all the theory necessary for
solving the problem and there can be little doubt that, had they been lucky
enough to capture a set of drums at Dunkirk as well as the three machines the
bulk of the Typex traffic up to July 1940 would have been read…..The immunity
which Typex enjoyed in the first two years of the war was due partly to the
care with which the drums were safeguarded, partly to German inability to grasp
the potentialities of the problem, but mostly to sheer good fortune’.
The fact that a global power like Britain took more than a decade in order to select a suitable cipher machine, then made it too complex for mass production and finally had to rely on ‘sheer good fortune’ to keep it secure from enemy codebreakers must be rated as a significant failure in the field of communications security.
Sources: Cryptologia article: ‘The Typex cryptograph’, Enigma
Bulletin article: ‘The Development of Typex’, ‘Intelligence and Strategy: Selected Essays’, Journal of Intelligence History article: ‘The Admiralty And Cipher Machines During The
Second World War: Not So Stupid After All’, AIR 20/1531 ’R.A.F. signal communications: security’, ADM
1/27186 ‘Review of security of naval codes and cyphers 1939-1945’, FO
850/132 ‘Security of cyphers at posts abroad’, HW 40/88 and HW 40/89 ‘Investigation into POW
reports that German Sigint authorities (NFAK 621) were exploiting TYPEX
(British cypher machine) in North Africa’, War diary of Inspectorate 7/VI, Crypto
museum, ‘Alan Turing: The Enigma’
Notes:
(1). Enigma
Bulletin article: ‘The Development of Typex’ and Journal of Intelligence
History article: ‘The Admiralty And Cipher Machines During The Second World
War: Not So Stupid After All’
(2). Enigma
rotor pic from Wikipedia user Matt Crypto, Typex
rotor pic from Ralph Erskine
(3).
Cryptologia article: ‘The Typex
cryptograph’:
(4). NSA study:
‘Der Fall WICHER: German Knowledge of Polish Success on ENIGMA’, p22
(5). ADM 1/27186 ‘Review of security of naval codes and
cyphers 1939-1945’, p 105-6
(6). Journal of Intelligence History article:
‘The Admiralty And Cipher Machines During The Second World War: Not So Stupid
After All’, p3
(7). Journal of Intelligence History article:
‘The Admiralty And Cipher Machines During The Second World War: Not So Stupid
After All’
(8). British
national archives AIR 20/1531
(9). British
national archives HW 40/89: ‘Typex questionnaire’
(10). British
national archives ADM 1/27186, p30-36
(11). British
national archives ADM 1/27186, p35
(12). British
national archives HW 40/89: ‘Typex
questionnaire’
(13). British
national archives FO 850/132 ‘Security of
cyphers at posts abroad’
(14). British
national archives AIR 20/1531
(15). Enigma
Bulletin article: ‘The Development of Typex’
(16). Journal of Intelligence History article: ‘The
Admiralty And Cipher Machines During The Second World War: Not So Stupid After
All’, p3
(17). British
national archives ADM 1/27186, p106
(18). British
national archives AIR 20/1531
(19).
‘British intelligence in the second world war - vol2’, p639: ‘Like the Typex, the CCM proved to be totally
secure; indeed the Germans made no serious attempt to solve either system’.
‘Delusions of Intelligence:
Enigma, Ultra, and the End of Secure Ciphers’, p202: ‘No section made an all-out attempt to solve Typex’.
‘Intelligence
and Strategy: Selected Essays’, p165: ‘In
early 1940 German army cryptanalysts did basic research on Typex, which led
nowhere’.
(20). HW
40/88: ‘First interrogation report on two German Army officers captured in
Tunisia’, ‘Answers to GCCS questionnaire’, The
Typex Investigation – A WWII mystery
(21). Various
TICOM reports including I-66, I-112, I-16
(22). HW
40/169 ‘Interrogations
of prisoners of war from the German Army Y Service’
(23). British
national archives HW 40/88
(24). British
national archives HW 40/169
(25). British national archives FO 850/171
Additional
information: (25). British national archives FO 850/171
The files of
Inspectorate 7/VI, recovered in 1947 by the US authorities from a camp in Glasenbach,
Austria include the following reports on Typex:
Countermeasures
against cribbing
As an ENIGMA
type device (with a reflector) Typex was also vulnerable to the plaintext-ciphertext
attacks used by the Allied codebreakers against the German plugboard Enigma. In
order to hinder such attacks several measures were employed, such as burying
the address in the middle of the text, cyclic encipherment for short messages
and insertion of random letters in the text.
For example
report FO 850/171 ‘Preparation of
telegrams: use of code words: cypher machines and traffic: teleprinter
services: en clair messages. Code 651 file 1 (to paper 4968)’ (25) says:
Acknowledgments: I have to thank Ralph Erskine for sharing lots of information on the Typex machine, Frode Weierud for translating the relevant passages from the War Diary of Inspectorate 7/VI and Randy Rezabek for TICOM report IF-272, listing the Typex reports of In 7/VI.
You write: "when US intelligence located the archives of the German army’s signal intelligence agency in a camp in Glasenbach, Austria, where they had been hidden at the end of the war".
ReplyDeleteDo you have a reference for where these archives ended up?
Glasenbach was also home to an Allied internment camp in the years immediately after WWII, is that connected somehow?
It could be. Several reports state that the Inspectorate 7/VI archives were found in Glasenbach. For example check:
Deletehttp://www.scribd.com/doc/91154009/DF-120-M-209
http://www.scribd.com/doc/91334399/DF-114-Cryptanalytic-Device
Did the fact that the Type-X had a reflector rotor mean that it shared with Enigma the very serious flaw that no letter could be enciphered to itself?
ReplyDeleteThat’s correct. The book ‘Alan Turing: The Enigma’ references report FO 850/171 ‘Preparation of telegrams: use of code words: cypher machines and traffic: teleprinter services: en clair messages’:
Delete‘PRO file FO 850/171 contains a memorandum of May 1945, from the Cypher Policy Board to the Foreign Office, with instructions for use of the Typex. It explains that 'When encyphering on the Typex machine, the encyphered version of a letter can never be the letter itself. This sometimes makes it possible to assign with absolute accuracy even a small number of words known or estimated to be in a message to the actual letters of the cypher version ...', and gives procedures for burying addresses’.