Wednesday, May 25, 2016

NSA releases TICOM material to the US National Archives

According to an NSA press release:

More than 29,000 pages of declassified material related to the World War II-era Target Intelligence Committee (TICOM) are now publicly available following a recent transfer from the National Security Agency to the National Archives and Records Administration.
It was NSA’s final transfer of its material related to TICOM, a joint project that began in 1944 between the United States and the United Kingdom. The now-famous “Monuments Men” searched for precious works of art that had been looted by the Nazis with the goal of returning items to their rightful owners. In contrast, TICOM teams followed Allied armies into occupied areas of Western Europe to seize material and equipment Axis powers used for code-breaking and code-making, including the German Enigma cipher. The teams also tried to determine how successful the Germans had been in breaking Allied codes. Through these efforts, the United States and the United Kingdom aimed to read more of the encrypted communications of retreating Nazi armies and better protect their own information from German eavesdropping.

The declassified material is housed at the Archives II facility in College Park, Md. More information about how to locate records held by the National Archives is available at https://catalog.archives.gov/id/5957379.

Information about the National Security Agency is available at www.nsa.gov.

A list of all the files is available from NARA’s website. There are a lot of interesting files, for example:

7131N, Interrogation of Kapitan von Baumbach, Head of OKM/III from 1942-1944 [(U) INTERROGATION OF CAPTAIN VON BAUMBACH]

7252 PAJ Interrogation Report - Comdr. Hashimoto and Lt. Fuji (No TICOM REF #)

7254 PAJ Interrogation Report - Rear Admiral Nomura; Capt. Morikawa; Comdr. Ozawa (No TICOM #)

10663N PAJ Interrogation Report on MAX (Parts 1 - 7) TICOM IF 118a-g

2778 Misc., Data on the Soviet Union (C-1190) [TICOM DF-242 DATA ON THE SOVIET UNION (TRANSLATION OF GERMANY DOCUMENT) ]

2781 Soviet Subversive Activities Against Germany [TICOM DF-288 SOVIET SUBVERSEIVE ACTIVITIES AGAINST GERMANY (TRANSLATION OF GREMAN DOCUMENT) ]

2841 Report on Cipher Device #40 (S-4219 to 4133) [TICOM DF-200A-D REPORTS ON CIPHER DIVICE 40 (TRANSLATION OF GERMAN DOCUMENT) ]

2847 The Russian Cipher Device - K37 (5-4146) [TICOM DF-217 RUSSIAN CIPHER DEVICE K-37 (TRANSLATION OF GERMAN DOCUMENT) ]

2855 The French Cipher Machine, C-36 (Hagelin) (5-4190) [TICOM DF-247B ON FRENCH CIPHER MACHINE C-36 (HAGELIN) (TRANSLATION OF GREMAN DOCUMENT) ]

2986 Regulations for Staff Cryptologic Service in the Red Army (5-3740) [TICOM DF-96 REGULATIONS FOR STAFF CRYPTOLOGIC SERVICE IN THE RED ARMY (TRANSLATION OF GERMAN DOCUMENT) ]

2988 Encipherment of OKK6 (Russian) (5-3742) [TICOM DF-97 ENCIPHERMENT OF OKK6 (TRANSLATION OF GREMAN DOCUMENT WITH PHOTOGRAPHIC PRINTS AND NEGATIVES) ]

3005 Russian Map Keys - 1944 to March 1945 (5-3821) [TICOM DF-131 RUSSIAN MAP KEYS USED 1944 [MARCH 1945] (TRANSLATION OF GERMAN DOCUMENT) ]

3343 Japanese Special Intelligence (SIGINT) Organization [TICOM REPORT ON JAPENESE SPECIAL INTELLEGENCE (SIGINT) ORGANIZATION ]

3419 Report on Japanese Cryptologic and cryptanalytic Operations [TICOM REPORTS ON JAPENESE CRYPTOLOGIC AND CRYPTANALYTIC OPERATIONS ]

5098 Finnish Monthly Reports on Russian Naval Message to 1944 [CIPHERT SURVEY # 17M (NAVAL MESSAGES) COPY OF TICOM DOCUMENT 542 AND TRANSLATIONS ]

5573 Allied Keys to 1938 [FILES DEALING WITH BRITISH, FRENCH AND DANNISH CODES AND CIPHERS ON ALLIEED KEYS TO 1938]

5608 Mathematical Notes on Polish equipment Encipherment [TRANSLATION OF ARTICLE ENTITLED "MATHEMATICAL NOTES ON THE POLISH ENCIPHERMENT" ]

5654 Observation on French Diplomatic Style [TRANSLATION OF OBSERVATION ON FRENCH DIPLOMATIC STYLE]

5781 Dettman: Conclusion [TICOM DF-181 TRANSLATION OF DETTERMAN CONCLUSION ]

6604 TICOM Team Activity in Far East - 1945 (Folder 1 of 5) [JAPANESE TICOM #1-4 REPORTS OF 7 SEPTEMBER 1945, UNITED STATES TICOM TEAMS ACTIVITY REPORTS]

7007 Analysis & Evaluation of the Japanese Intelligence service and It’s Affect on United States Signal security [TICOM S-2 ANALYSIS AND EVALUATION OF JAPANESE INTELLIGENCE SERVICE AND EFFECT ON U.S. SIGNAL SECURITY]

7212 The Development of Russian Cryptographic Systems [TICOM DF-94 TRANSLATION OF TICOM DOCUMENT 2765, DEVELOPMENT OF RUSSIAN CRYPTOGRAPHIC SYSTEMS]

7723 Survey of Czech Systems - 1945-1949 [TICOM DF-189, TRANSLATION OF SURVEY OF CZECH SYSTEMS 1945-1949]

7762 Correspondence Re: Allied Keys May 1941 - July 1942 [TICOM 515 COPY OF CORRESPONDENCE RELATED TO ALLIED KEYS, MAY 1941 TO JULY 1942]

7765 German Studies Allied Ciphers June 1941 - June 1942 (Folder 1 of 2) [TICOM 517 COPY OF GERMAN STUDIES OF U.S. AND BRITISH CIPHERS, JUNE 1941 - APRIL 1943]

7773 Procedure Used in Breaking Turkish Diplomatic Traffic [TICOM 2258 DF-12 REVISED, COPY OF PERCEDURE USED IN BREAKING TURKISH DIPLOMATIC TRAFFIC]

8125 Czech Diplomatic Messages and Decrypts [COPY OF CZECH LANGUAGE DIPLOMATIC MESSAGE AND DECRYPTS 1920 - 1921]

8143 Reports on Interrogations of Japanese Former Cryptanalysts [INTERROGTAION REPORTS OF EIGHT FORMER JAPANESE CRYPTANALYSIS]

8532 German Deciphering 5-LTR TRF between Tokyo and European Capitals [TICOM 2533 COPY OF GERMAN DECIPHERING ATTEMPTS OF FIVE-LETTER TRAFFIC BETWEEN TOKYO AND EUROPEAN CAPITALS]

8747 German - Vierling (Feuerstein) Library/Laboratory 1946-1952 [TICOM M-1 REPORT ON DR. VIERLING'S LABORATORY AT EBERMANNSTADT AND LIBRARY PAPERS, 1946-1952 ]

8774 Jap Cryptographic Worksheets MA Systems 1934-1939 [TICOM 18, COPIES OF GERMAN WORKSHEETS ON JAPANESE MACHINE SYSTEM 48, 1934 - 1939]

8775 Chinese Diplomatic Code and Translations [TICOM 4 COPY OF CHINESE DIPLOMATIC DECODES AND TRANSLATIONS, 1944 - 1945]

8919 Solution of the M-209 Hagelin Machine [TICOM 1-35A COPY OF SOLUTION IF THE M-209 HAGELIN MACHINE]

10168 Reports on the Solution of the Russian Cipher Procedure "Misteriya" [REPORT ON THE SOLUTION OF THE RUSSIAN CIPHER PROCEDURE "MISTERIYA" ]

10349 German Cryptanalysis on American Cryptographic Systems [TICOM NOTE 23: COPY OF BRIEF SURVEY OF THE CRYPTANALYSIS OF AMERICAN CRYPTOGRAPHIC SYSTEMS BY THE GERMAN CRYPTANALYTIC SERVICE DURING WORLD WAR II]

10955 Scientific Writings from Pers Z Archives [TICOM DOCUMENTS #376, COPY OF SCIENTIFIC WRITINGS FROM PERS Z ARCHIVES, DECEMBER 7, 1942]

11099 Finnish Working on Various Russian Codes (S-8778) [COPY OF FINNISH WORKINGS ON VARIOUS RUSSIAN CODES]

12551 German Intelligence and Insight from Working on Radio Traffic of the Soviet Air Force [TICOM DOCUMENT OKL 483 COPY OF GERMAN INTELLIGENCE AND INSIGHT FROM WORKING ON RADIO TRAFFIC OF THE SOVIET AIR FORCE ]

18732 Fills in the History of Russian Diplomatic Systems [TICOM DOCUMENT 1035 COPY OF FILLS IN THE HISTORY OF RUSSIAN DIPLOMATIC AND COMMERCIAL SYSTEMS, 1929 - 1935]

24474 TICOM - "Feuerstein" Technical Project Reports - 1945 (Folder 1 of 4) [DETAILED FEUERSTEIN TECHNICAL PROJECT REPORT]

32957 French/Polish Radio Traffic Regulations in Event of War [TICOM NO.T 3624 FRENCH/POLISH RADIO TRAFFIC REGULATIONS IN EVENT OF WAR ]

44405 Red Army Field Post Listing - Captured German Document 1944 [FIELD POST NUMBERS OF THE RED ARMY]

46891 Pythagoras - Italian Diplomatic Code (Folder 1 of 2) [TICOM DOCUMENT NO. 250, COPY OF PYTHAGORAS, JULY 1936-1939]

46893 TCIOM No. 3293 Berichte Der Grouppe F (Folder 1 of 3) [TICOM DOCUMENT NO. 
3293 COPY OF BERICHTE DER GRUPPE F]

47114 Berichte Uber Den Stand Der Entzifferungsarbeiten April 1916 - October 1918 [BERICHTE UBER DEN STAND DER ENTZIFFERUNGSARBEITEN APRIL 1916 - OCTOBER 1918]

6964 Glossary of German Cryptanalytic Terms [TICOM REPORT I-117: GLOSSARY OF GERMAN CRYPTANALYTIC TERMS ]

10160 State Department Reports on German Foreign Office [TICOM REPORT IF-266: DEPARTMENT OF STATE REPORTS ON THE GERMAN FOREIGN OFFICE (COPY OF STATE DEPARTMENT REPORTS) ]

Saturday, May 21, 2016

Update

I added information and pics in New developments in the strip cipher case.

I also made a correction. I had written that the strips 60-1 were used for intercommunication between Bern, London, Lisbon, Algiers and Washington in 1943 but this is not clearly stated in the list. 

Only strips 60-3 and 60-5 were definitely used for intercommunication between the aforementioned embassies. 

Sunday, May 15, 2016

Einzeldarstellungen aus dem Gebiet der Kryptologie - Hüttenhain’s statements on the State Department’s strip cipher

During WWII the US State Department used several cryptosystems in order to protect its radio communications from the Axis powers. The main systems used were the unenciphered Gray and Brown codebooks along with the enciphered codes A1, B1, C1, D1 and the new M-138 strip cipher. 

In the period 1940-1944 German, Japanese and Finnish codebreakers could solve State Department messages (both low and high level) from embassies around the world. The M-138-A strip cipher was the State Department’s high level system and it was used extensively during that period. Although we still don’t know the full story the information available points to a serious compromise both of the circular traffic (Washington to all embassies) and special traffic (Washington to specific embassy). In this area there was cooperation between Germany, Japan and Finland. The German success was made possible thanks to alphabet strips and key lists they received from the Japanese in 1941 and these were passed on by the Germans to their Finnish allies in 1942. The Finnish codebreakers solved several diplomatic links in that year and in 1943 started sharing their findings with the Japanese. German and Finnish codebreakers cooperated in the solution of the strips during the war, with visits of personnel to each country. The Axis codebreakers took advantage of mistakes in the use of the strip cipher by the State Department’s cipher unit.

Erich Hüttenhain, who was the chief cryptanalyst of OKW/Chi (Signal Intelligence Agency of the Supreme Command, Armed Forces), said in his unpublished manuscript ‘Einzeldarstellungen aus dem Gebiet der Kryptologie’, p20-21 about the strip system:

IV. Das amerikanische streifenverfahren

Im  2. Weltkrieg benutzten die USA bis September 1944 in Diplomatie, Heer, Luftwaffe und Marine neben anderen Verfahren ein unter dem Namen “Streifenverfahren" bekanntes Chiffrierverfahren.

Des Diplomaten—Streifenverfahren war das aufwendigste und mit den meisten Variations möglichkeiten versehen. Deshalb soll hier nur auf dieses Verfahren eingegangen werden.
Des Streifenverfahren in der Diplomatie war ein Chiffrierverfahren für den Linienverkehr; es bestand aber die Möglichkeit, von der Zentrale aus cq-Sprüche abzusetzen.
Fast jede US-Vertretung im Ausland hat zum chiffrierten Verkehr mit Washington einen Satz von 50 Stäben, auf denen je ein anderes verwürfeltes Alphabet zweimal hintereinander aufgezeichnet war. Täglich wurden 25 dieser Stäbe ausgewählt und in vorgeschriebener Reihenfolge zum Schlüsseln benutzt: Tagesschlüssel.

Nach einigen Monaten wurde der ganze Satz von 50 Stäben gegen einen anderen  satz von 50 Stäben ausgetauscht. Außerdem hatte jede Vertretung des US-Außenministeriums noch einen Stabsatz zur Entschlüsselung von cq-meldungen aus Washington. Auch dieser cq-Satz wurde von Zeit zu Zeit ausgewechselt.

Vom Standpunkt der Kryptologie war dieses Streifenverfahren ein mehrfach belegter Spaltencäsar.

Bald nach dem Beginn der Untersuchungen dieses Chiffrierverfahrens gelang es, die Periode von 25 zu erkennen. Es gelang auch, einige besonders lange Geheimtexte wenigstens teilweise zu entziffern. Es wäre eine harte und langwierige Arbeit geworden, wenn nicht besondere Umstände hinzugekommen wären. Einer dieser umstände war die Tatsache, daß die USA den bei einer Stelle abgelösten Stabsatz an anderer Stelle wieder einsetzten, anstatt ihn außer Kraft zu setzen.

Ein zweiter für die Entzifferung günstiger Umstand war, daß es wegen der U-Boot-Blockade nicht immer gelang, den auszuwechselnden Stabsatz rechtzeitig an alle Außenstellen zu bringen.  In solchen Fällen wurde z.B. ein cq-Spruch an die Stelle, bei der der neue cq-Stabsatz noch nicht eingetroffen war, mit dem bei der Stelle vorhandenen und seit längerer Zeit in Benutzung befindlichen Spezial-Stabsatz verschlüsselt.

Wenn nun dieses Spezial-Verfahren gelöst war, - und das war in der Regel der Fall — so war der Klartext des cq-Spruches bekannt, und es lag ein Klar-Geheim-Kompromiß im neuen cq-Verfahren vor, aus dem die Stäbe des neuen cq-Verfahrens rekonstruiert wurden.
Auf diese Weise wurden von 1942 bis September 1944 insgesamt 22 verschiedene Linien und alle cq-Sprüche mitgelesen.

Aus dieser erfolgreichen EntzifferungsArbeit muß gefolgert werden:

1. Es ist unzulässig, bereits einmal verwendete Schlüssel an anderen Stellen wieder zu verwenden.

2. Es ist nicht zulässig, Chiffrierverfahren einzusetzen‚ die gegen Klar-Geheim-Kompromisse anfällig sind.


Google translation with corrections by Frode Weierud:

IV. The American strip cipher system

During the Second World War and until September 1944, the United States used, together other cipher procedures, an encryption system in its Diplomatic Service, Army, Air Force and Navy that was known as the "Strip procedure."

The diplomatic strip system was the most elaborate and equipped with the most variation possibilities. That is why we will concentrate only on this procedure.

The strip procedure in the diplomatic service was an encryption system for regular, scheduled services; but it also allowed for sending broadcast messages from headquarters.
Almost every U.S. mission abroad had a set of 50 strips for encrypted traffic with Washington, on each of which a different scrambled alphabet was recorded twice in succession. Daily 25 of these rods were selected and used in a prescribed order for ciphering: the daily key.

After a few months the whole set of 50 strips was replaced by another set of 50 strips. In addition, every mission of the US State Department had yet another set of strips for decrypting broadcast messages from Washington. Also this broadcast set was changed from time to time.

From a cryptologic point of view the strip system was a periodic substitution cipher.

Soon after starting the investigations of this encryption procedure we succeeded in identifying the period of 25. We also succeeded to partially decipher some extra long cipher texts. It would have been a hard and tedious work, if not some special circumstances would have occurred. One of these circumstances was the fact that when the United States changed a set of strips at one site it would reuse the same set at another site, instead of cancelling it.

A second fact that was favorable for deciphering was that, because of the U-boat blockade, it was not always possible to replace the strip sets in timely manner at all the field offices. In such cases, e.g. a broadcast message, for a site where the new broadcast strip set had still not arrived, was encrypted with the existing special strip set at that office and which had been in use for a long time.

If now this special procedure was solved - and this was usually the case - the plain text of the broadcast message was known, and there was a clear-cipher text compromise in the new broadcast, from which the strips of the new broadcast procedure were reconstructed.
In this way, a total of 22 different lines and all broadcast messages were read from 1942 to September 1944.

From this successful decipherment must be concluded:

1. It is prohibited to use a key already used in other places.

2. It is not permitted to employ encryption procedures that are vulnerable to clear text-cipher text compromises.

Monday, May 9, 2016

Use of the M-138-A cipher system by the US State Department in WWII

During WWII the US State Department used several cryptosystems in order to protect its radio communications from the Axis powers. The main systems used were the unenciphered Gray and Brown codebooks along with the enciphered codes A1, B1, C1, D1 and the new M-138 strip cipher. 

In the period 1940-1944 German, Japanese and Finnish codebreakers could solve State Department messages (both low and high level) from embassies around the world. The M-138-A strip cipher was the State Department’s high level system and it was used extensively during that period. Although we still don’t know the full story the information available points to a serious compromise both of the circular traffic (Washington to all embassies) and special traffic (Washington to specific embassy). In this area there was cooperation between Germany, Japan and Finland. The German success was made possible thanks to alphabet strips and key lists they received from the Japanese in 1941 and these were passed on by the Germans to their Finnish allies in 1942. The Finnish codebreakers solved several diplomatic links in that year and in 1943 started sharing their findings with the Japanese. German and Finnish codebreakers cooperated in the solution of the strips during the war, with visits of personnel to each country. The Axis codebreakers took advantage of mistakes in the use of the strip cipher by the State Department’s cipher unit.

After further (costly) research new information has come to light. Originally I thought that each US embassy had two sets of strips, the ‘specials’ for direct communications with Washington and the ‘circulars’ for messages sent to several embassies and for intercommunication between embassies.


However there’s more to this story:

1). The circular strips were the 0 dash series. 0-1 was used from 1940 till August 1942. 0-2 from August 1942 till March 1943. From March 1943 a new set was used for each month, 0-3 for March 1943, 0-5 for May, 0-9 for September etc. The circular strips used in 1944 were numbered 0-13 to 0-24 for January-December 1944.

However there were two problems with this system.

One was that the embassy in Bern, Switzerland did not have access to the new strips so it seems that they continued to use the 0-2 strips for some time.

Another problem was that distributing the new circular strips to embassies around the world was not always possible, so some posts were told to continue using the old strips till the new ones arrived. This was clearly a security problem and Erich Huettenhain, chief cryptanalyst of OKW/Chi, said in his manuscript Einzeldarstellungen aus dem Gebiet der Kryptologie’ that they relied on reencodements in their efforts to solve the strip system

Ein zweiter für die Entzifferung günstiger Umstand war, daß es wegen der U-Boot-Blockade nicht immer gelang, den auszuwechselnden Stabsatz rechtzeitig an alle Außenstellen zu bringen.  In solchen Fällen wurde z.B. ein cq-Spruch an die Stelle, bei der der neue cq-Stabsatz noch nicht eingetroffen war, mit dem bei der Stelle vorhandenen und seit längerer Zeit in Benutzung befindlichen Spezial-Stabsatz verschlüsselt. Wenn nun dieses Spezial-Verfahren gelöst war, - und das war in der Regel der Fall — so war der Klartext des cq-Spruches bekannt, und es lag ein Klar-Geheim-Kompromiß im neuen cq-Verfahren vor, aus dem die Stäbe des neuen cq-Verfahrens rekonstruiert wurden.

2). A set of strips titled 00-1 (and key table C) were introduced in late 1943 for enciphering the confidential traffic of other US government agencies. In January 1944 the set 00-2 and 00-3 were sent to the embassies in Algiers (Free French), Turkey, Egypt, UK, Calcutta, Portugal, Spain, India, Sweden, Iran, Iraq, Beirut.




The 00-4 strips replaced set 00-3 in October 1944.



3). In April 1944 the strip system FRIBP was sent to Lisbon, Madrid, Tangier, Algiers, London, Dakar for Cross messages (US-British supply program).




In November 1944 a circular telegram said that the 000-1 strips were used for CROSS and Joint Economic missions messages.



4). In June 1944 Sweden, Spain, Portugal, Egypt, Turkey, Algiers (Free French) received strips to be used for the communications of the WRB - War Refugee Board.




5). In June/July 1943 the strip set 60-3 was introduced for intercommunication between the embassies in Bern, London, Lisbon, Algiers and Washington. From January 1st 1944 the strips 60-5 were used for this purpose.







Madrid also received the strips 60-5 in June 1944.




In July ’44 the 60-5 strips were sent to the US diplomatic facilities in Caserta (for Robert Daniel Murphy) and Rome (for Alexander Comstock Kirk).



6). The embassy in Bern, Switzerland received 6 new code systems in June 1943. In August they received systems 45 and six sixty, with key tables.


In late September 1944 Bern finally received the current circular strips 0-21 to 0-24 and thus use of the 60-5 strips was discontinued.



In early October ’44 Bern stopped using the 00-3 strips for sending messages of other US agencies.



7). During the war the State Department received information pointing to the compromise of the strip cipher system from the embassies in Casablanca, Vichy France, Helsinki, Stockholm and Bern.

8). The embassies in Panama, Turkey, India, Spain reported problems with the strip system. Similar problems (warping of the panel, defects in the paper strips) are mentioned in the military report SRH-366 ‘History of Army Strip Cipher devices’.

9). In August 1943  a strip system was forwarded to Harold J. Tittmann (US Charge d'Affaires to the Vatican).

10). In September ’44 a set of strips were sent to the Special mission of Taylor.




11). In November 1944 the ICSSY cryptographic material was sent to several embassies.




12). Several alphabet strips that are mentioned in decoded Japanese messages were used by embassies around the world. For example:

Strips 22-1 were used in Egypt and Baghdad in 1941, by Vladivostok in 1942-44, by Algiers in 1943.

Strips 38-1 were used by the embassies in Moscow, Ankara, China, Portugal, Australia in 1942-43.

Overall this is very interesting information and sheds some light into the use of the M-138-A strip cipher by the State Department. 

Sources: NARA - RG 59 - Purport Lists for the Department of State Decimal File 1910-1944 – microfilms 444 and 611 – 119.25/Strip Cipher

Tuesday, May 3, 2016

Update on Case Wicher


The war diary of Inspectorate 7/VI, in the report of February 1942, says that an investigation of captured Polish files revealed deciphered German radio messages and this material was forwarded to Inspectorate 7/VI to clarify if the compromise was a result of treason or deciphering and if it was the latter to identify the compromised cipher system.