Military and intelligence history mostly dealing with World War II.
Thursday, May 29, 2014
Update
I’ve
rewritten State Department’s strip cipher – reuse of alphabet strips and key lists using
information from the report ‘JCS Ad
hoc committee report on cryptographic security of government communications'.
Tuesday, May 27, 2014
Saturday, May 24, 2014
Friday, May 23, 2014
In the news
1). Articles
from Anatoly Klepov on the compromise of Soviet communications in WWII:
"Historical truth" Beria and Suvorov about cryptography and radiolocation performance - Part 4
"Historical truth" Beria and Suvorov about cryptography and radiolocation performance - Part 4
2). War Nerd:
China,
Vietnam and Naval Nerf Wars
3). Frontline
documentary on the NSA and the Snowden affair
4). New
information on the Soviet M-105 (AGAT)
cipher machine from Cryptomuseum.
Wednesday, May 21, 2014
Naval Enigma compromise and the spy in the United States Department of the Navy
Signals
intelligence and codebreaking played an important role in WWII. British and
American codebreakers solved many important Axis crypto systems, such as the
German Enigma machine and the Japanese Navy’s code JN25.
According to google translate:
Additional: Source Swiss-American secretary in high position in the U.S. Navy Department.‘’
The solution
of the German military’s plugboard Enigma
was mostly carried out at Bletchley Park with Hut 6 attacking Army and Airforce
‘keys’, while Hut 8 worked on the naval traffic. During the Battle of the
Atlantic the German U-boats relied mostly on the Enigma for their
communications with U-boat Command, so the solution of these messages was a top
priority for the Allied codebreakers.
Unfortunately
the fact that the Navy used stricter procedures than the Army and Airforce plus
their introduction of a separate 4-rotor Enigma
machine in 1942 meant that in the period March 1941- September ‘43 the
successes of Bletchley Park were spasmodic and suffered from time lag. Things
changed in September since the new 4-rotor ‘Bombes’ built by the Americans were
introduced and they could solve the Enigma settings reliably and in a timely
manner (at least until the introduction of individual Enigma keys for U-boats
in late 1944).
According to
several books and articles the Germans never suspected that their codes were
being read and they thought that the Enigma was unbreakable. The reality was a
slightly more complex than that as can be seen from the numerous
security measures they implemented during the war. Would they have taken so
many precautions if they considered Enigma unbreakable?
Since the
Enigma was used in huge numbers it was accepted that during the war both cipher
machines and valid keylists had fallen into Allied hands. Thus current traffic
could be compromised but only until new settings were introduced.
Another
question is whether the Germans considered the Enigma to be vulnerable to
cryptanalysis. After all it wasn’t every day that Enigma machines and keylists
would fall into enemy hands. Here the story diverges since the different
codebreaking departments in the Army (Inspectorate 7/VI), Navy (B-Dienst),
Airforce (Chi Stelle) and Armed Forces High Command (OKW/Chi) had different
opinions on the matter. Unfortunately we don’t know the full story of their
security investigations as the relevant files have not been studied in detail
but it is clear that they constantly researched ways of solving the Enigma.
In this area
the Army codebreakers proved more suspicious than their counterparts in other
departments and they always worried about the possibility of solution of the
machine by the enemy. During the war they not only studied the Enigma but also
interrogated Polish personnel regarding their solution of the prewar Enigma,
known to the Germans as case ‘Wicher’.
The analysts of the naval
cipher security department on the other hand seems to have shown a lack of
imagination when it came to researching the Enigma. For some reason they
constantly downplayed the possibility of cryptanalytic solution and attributed
enemy successes to captured cipher material.
This can be
seen from one of their reports found in NARA-RG 457- Entry 9032- box 1279 – NR
3775 ‘German Navy U-boat logs’. In the summer of 1943 the military intelligence
service Abwehr learned from a
Swiss-American working in the US Department of the Navy that the operational
orders to U-boats were decoded by the Allies and all messages read.According to google translate:
At 10.8. received the following
message via KO Switzerland :
‘‘For several months, deciphering
German naval codes with regard to operating Uboat commands succeeded. All
commands are read.Additional: Source Swiss-American secretary in high position in the U.S. Navy Department.‘’
It is not
clear if this person was an Abwehr agent or someone who revealed this
information to Swiss diplomatic or intelligence authorities and they in turn
shared this information with the Germans.
The response
of the security department was that the continuous reading of their
communications by the Allies was out of the question. There was however the
possibility of losing cipher material in one of the sunken U-boats. For that
reason they instituted a change of the Enigma settings using the keyword
‘Andromeda’.
The emergency
key-‘Stichwort’, worked on the following system according to the study ‘Cryptographic History of Work on
the German Naval Enigma’, p6:
"Stichwort".
19. The "Stichwort" was a
device used when the enemy suspected that the keys had been captured, or wished
to protect himself from the danger of this happening. An example will make its
nature and method of use clear.
20. All holders of the machine (at the
time of this example) held a sealed envelope labelled PERSEUS. An order was
sent out "STICHWORTHEFEHL PERSEUS". The holders opened their
envelopes and found the word DANZIG inside (the "Kennwort"). They
then "applied" DANZIG to the key as follows (1) D = 4 was added to
the number of each wheel in the W.O. (2) A, N, Z respectively were added to the
three letters of the Ringstellung. (3) I = 9 was added to each letter in the
Stecker. This change was applied to all keys until further notice.
21. Suppose for instance the key for
the day had been W.O. 275, Rings. BYL, Stecker A/F, B/J, D/X.... . The modified
key would then be W.O. 631, Ring. CML, Stecker J/O, K/S, M/G .... .
22. This is a security measure with
some "nuisance value" but is clearly not equivalent to a new key.
Given that a key has been captured (the assumption on which the Stichwort is
based) then - once we have discovered what is happening - there are 8 W.O.'s
and 26 sets of Stecker to try; this might certainly be tiresome but does not
compare with the 336 W.O.'s and 140 million million stecker on a completely
unknown key.
The naval
codebreakers would change their minds regarding the theoretical solution of
their 4-rotor Enigma in late 1944 when one of their analysts named Hans-Joachim
Frowein showed that it could be solved on a ‘crib’ of 25 letters (suspected
plaintext in the ciphertext).
This report
is TICOM I-38 and is available from Ticom
Archive.
Monday, May 19, 2014
Codes of the European Economic Community
Hmmm, maybe it’s time to have a look at the finding aid just
in case I see something interesting that I can copy.
Wednesday, May 14, 2014
The German intercept stations in Spain
In the course
of WWII the German signal intelligence agencies intercepted radio traffic from
several fixed and mobile stations established throughout Europe. Some of these
stations were located in neutral countries and they operated clandestinely, so
as not to attract attention from the Allies. Although
these stations operated in secrecy the local governments were informed of their
existence and had given their tacit approval.
The Spanish government under General Francisco
Franco had close ties to Germany, as would be expected considering the
support that the Nationalists had received from Germany and Italy during the Spanish Civil War of
1936-39. Without support from Hitler and Mussolini the Nationalists would
not have been able to defeat the Republican forces. Yet despite these close
ties the position of the Spanish government during WWII was to remain neutral
and avoid foreign entanglements.
Even though
Spain was neutral the police and the intelligence service cooperated to some
extent with the German intelligence services Abwehr and Sicherheitsdienst. In
the field of signals intelligence the authorities allowed the establishment of a
main radio-intercept station in Madrid and smaller outstations throughout the
country. These first of these stations were controlled by the German High
Command’s deciphering department – OKW/Chi.
OKW/Chi was
not the only German agency with radio stations in Spain. In the course of the
war a clandestine naval D/F station was added to the OKW/Chi Seville facility and
a Luftwaffe intercept station was established in Barcelona. Also in the latter
stages of the war the main station in Madrid added a separate section for the
Radio Security Service of the Armed Forces- Funkabwehr.
Update
I have
uploaded TICOM report DF-116-J ‘The German
intercept station in Madrid’ – 1948. Available from my Scribd and Google
Docs accounts.
Subscribe to:
Posts (Atom)