9Guv 9Kpf %Ngct

Total Page:16

File Type:pdf, Size:1020Kb

9Guv 9Kpf %Ngct 5GTKGU+8 8QNWOG 9GUV9KPF%NGCT West Wind Clear • Series IV • Volume 10 Volume • • Series IV Clear Wind West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nited States Cryptologic History Series IV: World War II Volume X West Wind Clear: Cryptology and the Winds Message Controversy - A Documentary History Robert J. Hanyok and David P. Mowry Center for Cryptologic History National Security Agency 2008 Table of Contents Preface and Acknowledgments . vii Foreword. .. xxi Chapter 1: Background: Interwar U.S. - Japan Relations and Cryptology. 1 United States-Japan Relations, 1919-1940 (Japanese Diplomatic and Naval Cryptology and American Codebreaking between the Wars) United States - Japan Relations Worsen, 1940-1941 Chapter 2: Intercepted Japanese Diplomatic Messages Reveal a Warning System, 19 November-28 November 1941. .15 The Cryptography of the J-19 System Japan Fields a New Diplomatic Manual Cryptographic System The Americans Solve the New Manual System November 19: Japanese Message #2353 – The First Winds Instruction Message November 19: Japanese Message #2354 – The Second Winds Instruction Message Chapter 3: The Hunt for the Winds Execute Message, 28 November – 7 December 1941 . .. 31 The Search Begins – 28 November 1941 Tokyo Sends More Instructions about Destroying Cryptographic Material The Hidden Word Message – A Complement to the Winds Messages Tokyo Sends Even More Instructions, 28 November-6 December 7 December 1941: The Hidden Word Message Is Sent 7 December 1941: The Winds Execute Message Is Sent Chapter 4: The Winds Controversy: Myth and Reality. .53 Captain Laurance Safford – In the Eye of the Controversy Safford Searches for the Missing Winds Execute Message Safford’s Detailed Claim about the Winds Execute Message – February 1946 Examining Safford's Version(s) of Events The Intercept of the Winds Execute Message Page iii Actions Taken in the Aftermath of the Winds Execute Message Who Saw the Winds Execute Intercept or Translation? The Matter of Missing or Destroyed Records Some Observations on Captain Laurance Safford The Case of Captain Alwin Kramer’s Changing Testimony What the Japanese Said about the Winds Execute Message What the British and Dutch Radio Monitors Heard The Winds Controversy Resurfaces – Ralph Briggs’ Claim The Winds Execute: The Final Casting Afterword: The Winds Message, American Cryptology and History . 95 The Impact and Intelligence Value of the Winds Messages What the Winds Messages Tell Us about Prewar American Cryptology The Winds Messages and the Historical Process Exhibits (Nos. 1 to 55). 103 1. Recovered Decode Chart of Text for J-19 Transposition System 2. Japanese J-19 Transposition Matrix or Stencil 3. Intercept copy of Japanese Diplomatic Message No. 2353 4. Intercept copy of Japanese Diplomatic Message No. 2354 5. K-10/J-19 Indicator Groups and Transposition Key for November 1941 6. Message No. 2353 translation worksheet 7. Kana texts of Japanese diplomatic messages Nos. 2353 and 2354 8. U.S. Navy translation of message No. 2353 (SIS #25432/JD-1: 6875) 9. Revision of translation of No. 2353 (26 September 1944) 10. True form or matrix (stencil) for message No. 2354 11. Translation worksheet of message No. 2354 12. U.S. Navy translation of message No. 2354 (SIS #25392/JD-1:6850) 13. Revision of translation of message No. 2354 (26 September 1944) 14. Transcription of Morse (Kana) Japanese news broadcast 8 December 1941 15. Message from Commander-in-Chief Asiatic Fleet to Washington re: British intercept of Winds instructions, 28 November 1941 16. Intercepted version of “Stop” message No. 2409 27 November 1941 Page iv 17. Stencils of decrypted version of message No. 2409 18. Translation worksheets for message No. 2409 19. Translation of Japanese diplomatic message No. 2409 20. Example of telegram from Japanese Consulate, Honolulu, encrypted in J-19 21. Translation of Japanese diplomatic message No. 118, 28 November 1941 22. FCC documents related to monitoring Japanese broadcasts, 18 August 1944 23.FCC translation worksheets for Japanese “weather” broadcasts on 4, 5, and 8 December 1941 24. FCC, Radio Intelligence Division logs, 28 November - 8 December 1941 25. Translation of Japanese diplomatic message No. 2444, 1 December 1941 26. Translations of Japanese diplomatic message Nos. 2445 and 2447, 2 December 1941 27. Translation of Japanese diplomatic message No. 867, 2 December 1941 28. Translation of Japanese diplomatic message No. 2461, 3 December 1941 29. Listing of HARUNA messages from Japanese diplomatic facilities 30. WDGS G-2 message to Hawaii Department regarding contact with Commander Joseph Rochefort, 5 December 1941 31. Translation of 8 December 1941 Broadcast with Winds message - “West Wind Clear” 32. Intercepted “hidden word” or “Stop” message No. 2494, 7 December 1941 33. Corrected translation of 7 December 1941 “hidden- word” message 34. War Department message to monitoring stations requesting copies of all Japanese clear messages with “Stop” 35. U.S. Navy Technical Mission to Japan interrogation No. 11 – Mr. Shinroku Tanomogi, 30 November 1945 36. U.S. State Department message to London, United Kingdom, Canberra, Australia, and The Hague, Netherlands, requesting information on monitoring for Japanese Winds message, 6 November 1945 37. Message from American legation, Canberra, Australia, 16 November 1945 38. Messages from American embassy, The Hague, Netherlands, 5, 6 December 1945 and 26 January 1946 39. Messages from American embassy, London, United Kingdom, Page v 4, 15 December 1945 and 31 January 1946 40. Captain Laurance Safford’s statement before the Joint Congressional Committee, 25 January 1946 41. Letter from Captain Safford to Commander Alwin Kramer, 22 December 1943 42. Letter in response, Kramer to Safford, 28 December 1943 43. Safford’s coded letter to Kramer, 22 January 1944 (with code listing) 44. Letter, Admiral Husband Kimmel to Admiral William Halsey, 18 March 1944 45. Memorandum, Subject: “JD-7001, Special Studies Covering.” 8 November 1945 46. Morio Tateno interview, 30 June 1961 47. Memorandum to Carter W. Clarke from William F. Friedman, plus handwritten notes, 19 September 194. 48. Operator log for Station “M,” 2 December 1941, with notation by Ralph Briggs 49. Message describing destruction of Cheltenham facility records, 3 November 1945 50. Operator log for Station “M” without notation by Ralph Briggs 51. Message from COIS, Singapore, received in London 8 December 1941 52. Cable from S.I.S. representative in Manila to S.I.S. representative in Honolulu, 3 December 1941 53. British response (GC&CS #11279), 31 August 1945 to Colonel Clausen inquiry 54. Multinational Diplomatic Translation #25783 55. Telegram from Walter Foote, U.S. Consulate General 56. True form or matrix (stencil) for message No. 2353 Glossary of Terms and Abbreviations. 317 Sources and Selected Bibliography. .319 Index. .323 Page vi Preface and Acknowledgments “There is nothing makes a man suspect much, Short, both claimed in later statements during their More than to know a little.” – Francis Bacon testimony before the Joint Congressional Committee reviewing the attack that if they had had In the seemingly never-ending debate over the 7 knowledge of the Winds message they could have December 1941 Japanese attack on Pearl Harbor, prepared for an attack.1 To some adherents of this one of the significant topics of contention pressed claim, the Winds message had acquired a near by some revisionist and conspiracy writers, histori- mythic status within the larger controversy over ans, and critics of the conventional view of the Pearl Harbor.2 attack and the Roosevelt administration’s role in it has been the phenomenon of the so-called “Winds During and after the war, the Japanese surprise Message” (hereafter referred to as Winds message). attack on Pearl Harbor was subjected to a number In the years after World War II, several writers and of investigations by the United States government. scholars and a few politicians espoused the position In fact, the attack was the subject of eight separate that this message was a clear warning that the investigations from late 1941 through mid-1946. Japanese were going to attack the U.S. fleet at Pearl Among them, three were conducted by the Navy Harbor. They have also argued that, beyond the Department, three by the War Department, and simple fact of the occurrence of the Winds message, one was chaired by Associate Supreme Court the contents and importance of this message had Justice Owen Roberts that began within weeks of been revealed to senior American civilian and mili- the attack. The final and most comprehensive was tary leaders. They have contended further that the the postwar hearings by the Joint Congressional failure by Washington to warn the army and naval Committee under the chairmanship of Senator commands at Pearl Harbor, even though the for- Alben Barkley (D-KY), which, among other things, mer had intercepted the warning, made the ensuing incorporated all of the evidence, testimony, calamitous attack inevitable. After the attack,
Recommended publications
  • Georgetown University in Partial Fulfillment of the Requirements for the Degree of Master of Arts in Security Studies
    THE BATTLE FOR INTELLIGENCE: HOW A NEW UNDERSTANDING OF INTELLIGENCE ILLUMINATES VICTORY AND DEFEAT IN WORLD WAR II A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Master of Arts in Security Studies By Edward J. Piotrowicz III, B.A. Washington, DC April 15, 2011 Copyright 2011 by Edward J. Piotrowicz III All Rights Reserved ii THE BATTLE FOR INTELLIGENCE: HOW A NEW UNDERSTANDING OF INTELLIGENCE ILLUMINATES VICTORY AND DEFEAT IN WORLD WAR II Edward J. Piotrowicz III, B.A. Thesis Advisor: Jennifer E. Sims, PhD. ABSTRACT Does intelligence make a difference in war? Two World War II battles provide testing grounds for answering this question. Allied intelligence predicted enemy attacks at both Midway and Crete with uncanny accuracy, but the first battle ended in an Allied victory, while the second finished with crushing defeat. A new theory of intelligence called “Decision Advantage,”a illuminates how the success of intelligence helped facilitate victory at Midway and how its dysfunction contributed to the defeat at Crete. This view stands in contrast to that of some military and intelligence scholars who argue that intelligence has little impact on battle. This paper uses the battles of Midway and Crete to test the power of Sims‟s theory of intelligence. By the theory‟s standards, intelligence in the case of victory outperformed intelligence in the case of defeat, suggesting these cases uphold the explanatory power of the theory. Further research, however, could enhance the theory‟s prescriptive power.
    [Show full text]
  • Pioneers in U.S. Cryptology Ii
    PIONEERS IN U.S. CRYPTOLOGY II This brochure was produced by the Center for Cryptologic History Herbert 0. Yardley 2 Herbert 0. Yardley Herbert 0 . Yardley was born in 1889 in Worthington, Indiana. After working as a railroad telegrapher and spending a year taking an English course at the University of Chicago, he became a code clerk for the Department of State. In June 1917, Yardley received a commission in the Signal Officers Reserve Corps; in July Colonel Ralph Van Deman appointed him chief of the new cryptanalytic unit, MI-8, in the Military Intelligence division. MI-8, or the Cipher Bureau, consisted of Yardley and two clerks. At MI-8's peak in November 1918, Yardley had 18 officers, 24 civilians, and 109 typists. The section had expanded to include secret inks, code and cipher compilation, communications, and shorthand. This was the first formally organized cryptanalytic unit in the history of the U.S. government. When World War I ended, the Army was considering disbanding MI-8. Yardley presented a persuasive argument for retaining it for peacetime use. His plan called for the permanent retention of a code and cipher organization funded jointly by the State and War Departments. He demonstrated that in the past eighteen months MI-8 had read almost 11,000 messages in 579 cryptographic systems. This was in addition to everything that had been examined in connection with postal censorship. On 17 May Acting Secretary of State Frank L. Polk approved the plan, and two days later the Army Chief of Staff, General Peyton C.
    [Show full text]
  • Rochefort Vinse a Midway, Fu Sconfitto a Washington
    StO ROCHEFORT VINSE A MIDWAY, FU SCONFITTO A WASHINGTON ALAIN CHARBONNIER «Si può raggiungere qualsiasi risultato, purché nessuno badi a chi va il merito», era scritto alle spalle del capitano di vascello Joseph J. Rochefort nel Dungeon, il seminterrato di Pearl Harbour, dove i decrittatori della stazione ‘Hypo’ che lavoravano sui codici della Marina giapponese misero l’ammiraglio Nimitz in grado di vincere a Midway. Ma c’era chi al merito badava, e come, e voleva appropriarsene. Rochefort era approdato alla crittoanalisi quando negli Stati Uniti era considerata quasi una stregoneria. Sedici anni dopo, nonostante i brillanti risultati, ne fu estromesso dai burocrati di Washington. «Un ex studente di giapponese non può comandare un centro dell’intelligence navale», dissero. La vittoria di Midway fu ascritta a suo merito soltanto nel 1985, nove anni dopo la morte. Impianto desalinizzazione in avaria. Riserva acqua potabile prevista in 14 giorni con razionamento. Provvedere rifornimento». Il 20 maggio 1942 il Comando della Marina americana a Pearl Harbour, nelle isole Hawaii, ricevette il messaggio ‘flash’ tramesso dalla guarnigione di Midway, un atollo distante quasi 2000 chilometri, da poco tempo rinforzata dal Comando del Pacifico. I centri d’ascolto giapponesi intercettarono la comunicazione e avvertirono il Co - mando Generale della Nihon Kaigun , la flotta imperiale, che ‘l’unità aerea AF’ aveva chiesto un immediato rifornimento idrico. Il messaggio giapponese, criptato nel codice JN-25, fu captato e decodificato anche dalla stazione ‘Hypo’, di Honolulu, alle Hawaii, dove il capitano di vascello Joseph J. Rochefort lo stava aspettando. Per lui era la conferma che la sigla ‘AF’ indicava Midway, come aveva intuito nelle settimane precedenti, quando si era delineata l’ipotesi che i Giapponesi stessero preparando una nuova offensiva.
    [Show full text]
  • The Battle Over Pearl Harbor: the Controversy Surrounding the Japanese Attack, 1941-1994
    W&M ScholarWorks Dissertations, Theses, and Masters Projects Theses, Dissertations, & Master Projects 1995 The Battle Over Pearl Harbor: The Controversy Surrounding the Japanese Attack, 1941-1994 Robert Seifert Hamblet College of William & Mary - Arts & Sciences Follow this and additional works at: https://scholarworks.wm.edu/etd Part of the United States History Commons Recommended Citation Hamblet, Robert Seifert, "The Battle Over Pearl Harbor: The Controversy Surrounding the Japanese Attack, 1941-1994" (1995). Dissertations, Theses, and Masters Projects. Paper 1539625993. https://dx.doi.org/doi:10.21220/s2-5zq1-1y76 This Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Dissertations, Theses, and Masters Projects by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. THE BATTLE OVER PEARL HARBOR The Controversy Surrounding the Japanese Attack, 1941-1994 A Thesis Presented to The Faculty of the Department of History The College of William and Mary in Virginia In Partial Fulfillment Of the Requirements for the Degree of Master of Arts by Robert S. Hamblet 1995 APPROVAL SHEET This thesis is submitted in partial fulfillment of the requirements for the degree of Master of Arts '-{H JxijsJr 1. Author Approved, November 1995 d(P — -> Edward P. CrapoII Edward E. Pratt TABLE OF CONTENTS Page ACKNOWLEDGEMENTS......................................................................iv ABSTRACT..............................................................................................v
    [Show full text]
  • Agnes Meyer Driscoll Vs. the Enigma and the Bombe Colin Burke
    Colin Burke 1-2001 © Agnes Meyer Driscoll vs. the Enigma and the Bombe Colin Burke ABSTRACT: Documents in Britain‘s National Archives/ Public Record Office and in the U.S. National Archive‘s Record Groups RG457 and RG38 indicate that in mid-1941 the United States Navy‘s codebreaking organization, OP-20-G ignored an opportunity to gain full knowledge of Britain‘s anti-Enigma methods and machines. Spending a year and one-half working on what it felt was a unique and much more effective method– but one that failed--OP-20-G‘s, staff, at a critical time in U.S.- British relations ,did not inform America‘s decision makers of Britain‘s willingness to share its crypto-secrets . As a result, American leaders believed that England‘s GC&CS had deliberately withheld vital information that would have allowed the development of an independent American attack on Naval Enigma. That belief lasted Colin Burke 1-2001 © throughout the war and caused friction between the two nations. Other consequences of OP-20-G‘s mid-1941 decision were to delay the adoption of the British Bombe and its allied methods and to waste perhaps six months of the vital time of the new team of cryptanalysts and engineers assigned, in early 1942, to develop an American Bombe. KEYWORDS: OP-20-G, Enigma, Driscoll, Denniston, GC&CS, Bombe, Safford, Wenger, Weeks, Currier, Engstrom, catalog, Banburismus, hot-point, cold-point, Tiltman. Introduction: A Fragile British-American Crypto-Alliance By the end of World War II Great Britain and the United States had forged uniquely close relationships--even among their intelligence agencies.1 Much had to be overcome to achieve the long-lasting 1 Robert Louis Benson, A History of U.S.
    [Show full text]
  • Communication Intelligence and Security, William F Friedman
    UNCLASSIFIED DATE: 26 April 1960 NAME: Friedman, William F. PLACE: Breckinridge Hall, Marine Corp School TITLE: Communications Intelligence and Security Presentation Given to Staff and Students; Introduction by probably General MILLER (NFI) Miller: ((TR NOTE: Introductory remarks are probably made by General Miller (NFI).)) Gentleman, I…as we’ve grown up, there have been many times, I suppose, when we’ve been inquisitive about means of communication, means of finding out what’s going on. Some of us who grew up out in the country used to tap in on a country telephone line and we could find out what was going on that way—at least in the neighborhood. And then, of course, there were always a few that you’d read about in the newspaper who would carry this a little bit further and read some of your neighbor’s mail by getting at it at the right time, and reading it and putting it back. Of course, a good many of those people ended up at a place called Fort Leavenworth. This problem of security of information is with us in the military on a [sic] hour-to-hour basis because it’s our bread and butter. It’s what we focus on in the development of our combat plans in an attempt to project these plans onto an enemy and defeat him. And so, we use a good many devices. We spend a tremendous amount of effort and money in attempting to keep our secrets in fact secret—at least at the echelon where we feel this is necessary.
    [Show full text]
  • SIS and Cipher Machines: 1930 – 1940
    SIS and Cipher Machines: 1930 – 1940 John F Dooley Knox College Presented at the 14th Biennial NSA CCH History Symposium, October 2013 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 United States License. 1 Thursday, November 7, 2013 1 The Results of Friedman’s Training • The initial training regimen as it related to cipher machines was cryptanalytic • But this detailed analysis of the different machine types informed the team’s cryptographic imaginations when it came to creating their own machines 2 Thursday, November 7, 2013 2 The Machines • Wheatstone/Plett Machine • M-94 • AT&T machine • M-138 and M-138-A • Hebern cipher machine • M-209 • Kryha • Red • IT&T (Parker Hitt) • Purple • Engima • SIGABA (M-134 and M-134-C) • B-211(and B-21) 3 Thursday, November 7, 2013 3 The Wheatstone/Plett Machine • polyalphabetic cipher disk with gearing mechanism rotates the inner alphabet. • Plett’s improvement is to add a second key and mixed alphabet to the inner ring. • Friedman broke this in 1918 Principles: (a) The inner workings of a mechanical cryptographic device can be worked out using a paper and pencil analog of the device. (b) if there is a cycle in the mechanical device (say for particular cipher alphabets), then that cycle can be discovered by analysis of the paper and pencil analog. 4 Thursday, November 7, 2013 4 The Army M-94 • Traces its roots back to Jefferson and Bazieres • Used by US Army from 1922 to circa 1942 • 25 mixed alphabets. Disk order is the key.
    [Show full text]
  • Code Breaking in the Pacific
    Code Breaking in the Pacific Peter Donovan • John Mack Code Breaking in the Pacific 123 Peter Donovan John Mack School of Mathematics and Statistics School of Mathematics and Statistics University of New South Wales University of Sydney Sydney, NSW, Australia Sydney, NSW, Australia Additional material to this book can be downloaded from http://extras.springer.com ISBN 978-3-319-08277-6 ISBN 978-3-319-08278-3 (eBook) DOI 10.1007/978-3-319-08278-3 Springer Cham Heidelberg New York Dordrecht London Library of Congress Control Number: 2014945227 © Springer International Publishing Switzerland 2014 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc.
    [Show full text]
  • On the Treadmill to Pearl Harbor: the Memoirs of Admiral James O
    Review Article On the Treadmill to Pearl Harbor: The Memoirs of Admiral James O. Richardson (USN Retired), As Told to Vice Admiral George C. Dyer (USN Retired). Washington DC: Naval Historical Division, Department of the Navy, 1973, 471 pages. Martin Merson On the Treadmill to Pearl Harbor: The Memoirs of Admiral James O. Richardson (USN Retired), As Told to Vice Admiral George C. Dyer (USN Retired), with an introduction by Vice Admiral Edwin B. Hooper, (USN Retired), Director of Naval History, is a fundamental book for anyone in- terested in ascertaining the truth concerning the Japanese attack at Pearl Harbor, including the role of Franklin D. Roosevelt (FDR) and the Navy’s state of readiness. A review of the Richardson book appeared in Officer Review (The Military Order of the World Wars), Vol. 27, No. 6, January 1988, page 5.1 Although this book was completed in 1958, the publication date appearing in the book is 1973. To this reviewer’s knowledge there is no satisfactory explanation for the fifteen-year delay in making the book avail- able to the public. We have unofficial information that the delay may have been due to the fact that Harold Stark, Chief of Naval operations during the crucial early war years, did not die until 1972; the book is indeed highly critical of Admiral Stark. This writer has also been told that Admiral Arthur 1Martin Merson, “On the Treadmill to Pearl Harbor” Officer Review (The Military Order of the World Wars, 6 January 1988). 1 Radford, then serving as Chief of Naval Operations, insisted that Chapter XXII, entitled “Retrospect,” be included as a condition for publication.
    [Show full text]
  • A Complete Bibliography of Publications in Cryptologia
    A Complete Bibliography of Publications in Cryptologia Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 04 September 2021 Version 3.64 Title word cross-reference 10016-8810 [?, ?]. 1221 [?]. 125 [?]. 15.00/$23.60.0 [?]. 15th [?, ?]. 16th [?]. 17-18 [?]. 18 [?]. 180-4 [?]. 1812 [?]. 18th (t; m)[?]. (t; n)[?, ?]. $10.00 [?]. $12.00 [?, ?, ?, ?, ?]. 18th-Century [?]. 1930s [?]. [?]. 128 [?]. $139.99 [?]. $15.00 [?]. $16.95 1939 [?]. 1940 [?, ?]. 1940s [?]. 1941 [?]. [?]. $16.96 [?]. $18.95 [?]. $24.00 [?]. 1942 [?]. 1943 [?]. 1945 [?, ?, ?, ?, ?]. $24.00/$34 [?]. $24.95 [?, ?]. $26.95 [?]. 1946 [?, ?]. 1950s [?]. 1970s [?]. 1980s [?]. $29.95 [?]. $30.95 [?]. $39 [?]. $43.39 [?]. 1989 [?]. 19th [?, ?]. $45.00 [?]. $5.95 [?]. $54.00 [?]. $54.95 [?]. $54.99 [?]. $6.50 [?]. $6.95 [?]. $69.00 2 [?, ?]. 200/220 [?]. 2000 [?]. 2004 [?, ?]. [?]. $69.95 [?]. $75.00 [?]. $89.95 [?]. th 2008 [?]. 2009 [?]. 2011 [?]. 2013 [?, ?]. [?]. A [?]. A3 [?, ?]. χ [?]. H [?]. k [?, ?]. M 2014 [?]. 2017 [?]. 2019 [?]. 20755-6886 [?, ?]. M 3 [?]. n [?, ?, ?]. [?]. 209 [?, ?, ?, ?, ?, ?]. 20th [?]. 21 [?]. 22 [?]. 220 [?]. 24-Hour [?, ?, ?]. 25 [?, ?]. -Bit [?]. -out-of- [?, ?]. -tests [?]. 25.00/$39.30 [?]. 25.00/839.30 [?]. 25A1 [?]. 25B [?]. 26 [?, ?]. 28147 [?]. 28147-89 000 [?]. 01Q [?, ?]. [?]. 285 [?]. 294 [?]. 2in [?, ?]. 2nd [?, ?, ?, ?]. 1 [?, ?, ?, ?]. 1-4398-1763-4 [?]. 1/2in [?, ?]. 10 [?]. 100 [?]. 10011-4211 [?]. 3 [?, ?, ?, ?]. 3/4in [?, ?]. 30 [?]. 310 1 2 [?, ?, ?, ?, ?, ?, ?]. 312 [?]. 325 [?]. 3336 [?, ?, ?, ?, ?, ?]. affine [?]. [?]. 35 [?]. 36 [?]. 3rd [?]. Afluisterstation [?, ?]. After [?]. Aftermath [?]. Again [?, ?]. Against 4 [?]. 40 [?]. 44 [?]. 45 [?]. 45th [?]. 47 [?]. [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?]. Age 4in [?, ?]. [?, ?]. Agencies [?]. Agency [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?].
    [Show full text]
  • Simulation and Computer-Aided Cryptanalysis of Angooki Taipu B
    PURPLE Revealed: Simulation and Computer-aided Cryptanalysis of Angooki Taipu B Wes Freeman,1 Geoff Sullivan 2 and Frode Weierud 3 ADDRESSES: (1) 2527 Mardell Way, Mt View CA 94043 USA. Email: [email protected]; (2) 64 Tennyson Road, Headless Cross, Redditch, Worcs., B97 5BJ UNITED KINGDOM. Email: [email protected]; (3) Le Pre Vert, 1041 Rte de Mategnin, F-01280 Prevessin-Moens FRANCE. Email: [email protected] ABSTRACT: PURPLE was the designation given by U.S. cryptanalysts to the cipher machine used by the Japanese Foreign Office for secure communications before and during WW 2. We present the structure and internal wiring of the machine, as well as details of the keying procedures and a system of abbreviations, which was used in the messages. We have also written a computer simulation of the PURPLE machine. Operation of the simulator is demonstrated by deciphering portions of the 14-part message delivered to the United States on Dec. 7, 1941. Finally, an automated cryptanalysis method for the PURPLE system is presented. KEYWORDS: Pearl Harbor, PURPLE, RED, Rowlett, Stepping Switch, Computer Simulations, Hill Climbing, Roma-ji, Romazi. Introduction On December 6, 1941, the Japanese Government sent a message, which was divided for transmission into 14 parts (the 14-part message), to its embassy in Washington. An accompanying message directed that the 14-part message be delivered to the United States Government on December 7 at 1:00 p.m., which corresponded to 7:30 a.m. at Pearl Harbor, Hawaii. The 14-part message, which broke off negotiations between Japan and the United States, was enciphered on the PURPLE machine.
    [Show full text]
  • Warning at Pearl Harbour: Leslie Grogan and the Tracking of The
    Warning at Pearl Harbor: Leslie Grogan and the Tracking of the Kido Butai Brian Villa and Timothy Wilford' While some aspects of the Japanese attack on Pearl Harbor have been studied exhaustively, it remains surprisingly true that a few elements have almost completely escaped scholarly attention. It is often obvious why these topics have been bypassed: in most cases the barest exploration reveals that they lead nowhere. Yet not all undigested bits fall in this category. A select few are both important and relatively unstudied. It was once thought that the pre- Pearl Harbor reports of Leslie Grogan, 2nd Radio Officer aboard the Matson Steamship and Navigation Company's SS Lurline (see figure 1), were unworthy of notice. Several days before Japan's Strike Force, or Kido Butai, attacked Pearl Harbor, Grogan reported that he had copied Japanese coded signals emanating from the North Pacific. It may be noted that while the United States Navy (USN) made a formal investigation of the much less credible reports of Robert Ogg, known as Seaman Z in John Toland's Infamy, there was apparently no naval investigation of Grogan's considerably more detailed reports. Nor did his account capture the attention of any of the documented Pearl Harbor inquiries, if one may judge by its omission in the thirty-nine volumes of published Pearl Harbor investigations. Moreover, Grogan's reports have not drawn any attention from the renowned expositor of the main current of Pearl Harbor historiography. Gordon Prange never mentioned Grogan's reports in any of his Pearl Harbor studies because, his principal collaborators have told us, he could attach no credence to Grogan's reports.
    [Show full text]