The SIGABA / ECM II Cipher Machine : “A Beautiful Idea”

Total Page:16

File Type:pdf, Size:1020Kb

The SIGABA / ECM II Cipher Machine : “A Beautiful Idea” Center for Cryptologic History The SIGABA / ECM II Cipher Machine : “A Beautiful Idea” This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other U.S. government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please e-mail [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Timothy Mucklow was a senior historian on the staff of the Center for Cryptologic History fol- lowing a long career in information assurance at NSA and with the Air Force. After a decade in aca- demia, he served as a military historian at the wing, division, and major command levels and produced a series of monographs and articles on such topics as information assurance, telecommunications and computers, and national defense issues, and has offered IA seminars at military facilities around the world. He received his Ph.D. in 1982. He retired from the CCH in 2013. Acknowledgments. The Center for Cryptologic History is grateful to Dr. Craig Bauer, professor of mathematics at York College of Pennsylvania and editor-in-chief of the journal Cryptologia, for his assistance with this project, and to LeeAnn Tallman for earlier research. The SIGABA / ECM II Cipher Machine: “A Beautiful Idea” Timothy J. Mucklow National Security Agency Center for Cryptologic History 2015 Contents Introduction ....................................................................................... 1 And Hebern Saw the Wheel .................................................................... 2 Deus ex Machine ................................................................................. 5 Rowlett’s Epiphany .............................................................................. 7 Iacta Alea Est. [The Die Is Cast.] ........................................................... 10 Enter the Navy ..................................................................................12 A Disagreeable but Rewarding Surprise ....................................................14 SIGABA Is Built ...................................................................................16 An Impenetrable Machine .....................................................................22 The Big Machine That Did .....................................................................25 Appendix A: Technical Analysis of SIGABA’s Key Space ..................................29 Appendix B: The Mechanics of SIGABA ......................................................32 Notes ..............................................................................................38 Selected Bibliography ..........................................................................42 SIGABA / ECM II Cipher Machine Introduction During World War I, both the Americans and the the “design of the system should not require secrecy, Europeans had used manual code and cipher systems and compromise of the system should not inconve- to secure their critical information. With the advent nience the correspondents.”1 His argument was that of the machine age, however, it was only a matter of neither the elements of an encryption algorithm nor time before cryptography became mechanized. Two the workings of an encryption machine should con- decades later, as the world embroiled itself in another stitute the basis of a cipher’s security. Instead, an eas- major conflict, the use of cipher machines became ily changeable key should be the critical component. commonplace, and the old craft of cryptology at long In the 1930s, the U.S. Army cryptologist Wil- last became mathematically based. With the dawn of liam Friedman and his assistant Frank Rowlett drew this new cryptologic age, a worldwide scramble for on this simple precept to conceive a cipher machine even stronger encryption began. that was easy to use, simple to rekey, and ostensibly Well before the First World War, much work had impossible to break. Then, in a fit of collaboration been done to formalize the cryptographic discipline. with the Navy, as unprecedented as it was peculiar, One of those who made a major contribution to the two services went on to perfect and jointly field this process was the 19th-century polyglot Auguste their device. To the Army it was known as SIGABA, Kerckhoffs, who, besides teaching languages, dabbled to the Navy, ECM (Electric Cipher Machine) II. in cryptography. In 1883 he penned a two-essay series, (The technical aspects of SIGABA’s operation can La Cryptographie Militaire, for the Journal des Sciences be found in Appendixes A and B.) Not only was Militaire, which earned him a niche in cryptographic SIGABA the most secure cipher machine of World history. Kerckhoffs in his writings had articulated six War II, but it went on to provide yeoman service for basic principles of cryptography, but he is most com- decades thereafter. The story of its development is monly remembered for his second, which states that improbable. Its impact was incalculable. 1 1 And Hebern Saw the Wheel Mr. Edward Hebern of Madera, California, is posed, but using a set of cipher wheels whose generally credited with inventing the first American wiring was to be unknown to Friedman … electromechanical rotor cipher machine.2 Accord- Friedman was successful in his attack on the ing to lore, he came up with the idea around 1912 system.4 while serving a term in the state penitentiary for With little effort, Friedman was able to decipher horse thievery. If there were any connection between every Hebern-enciphered message sent his way. To breaking rocks and his cryptographic epiphany, do this, Friedman, who had already married crypt- Hebern never offered one. By the end of 1915 he analysis and mathematics, used a statistical approach had built a working model, filed a patent, and was along with a “divide-and-conquer” strategy to break knocking on the doors of potential buyers.3 It was the Hebern machine. As Friedman saw it, there were not long before the U.S. Navy began showing inter- only two unknowns, the cipher wheel (with twenty- est in Hebern’s device, and in the years that followed six characters) and the rest of the machine. Since the the Navy would buy and test a number of his suc- cipher wheel stepped regularly and predictably, the cessive machines. As something of a historical twist, rest of the machine could be considered a constant. one of Hebern’s early employees, Agnes (Meyer) It was then a simple matter of sequentially analyzing Driscoll, went on to become a luminary of American the individual components. cryptology in her own right. Friedman realized from experience that the regu- Half a century after Hebern set out to peddle lar advancement of the Hebern cipher rotors, like all his original device, the Army cryptologist Frank machines of that era, posed an intrinsic cryptologic Rowlett acknowledged in his memoirs that the vulnerability that was mathematically exploitable. He Hebern cipher machine was an important inven- conjectured that to make a cryptographically sound tion in pre-World War II American cryptography. machine, one would need a countermeasure to address Rowlett, nevertheless, went on to add, predictable rotor movements. But just how such pseu- Navy cryptographers asked [William] dorandom movement could be achieved consumed Friedman for his assessment of the security Friedman’s thoughts for years. Friedman’s solution, it afforded … [T]he Navy [supplied] a set when it finally came to him around 1926, was concep- of messages prepared exactly in accordance tually simple and the technology proven.5 It occurred to with the procedures which they had pro- him that paper tape similar to that used by telegraphers 2 And Hebern Saw the Wheel Edward Hebern and his electromechanical rotor cipher machine (courtesy of Ralph Simpson, CipherMachines.com) could also be used to dictate the move- ments of the cipher wheels. Friedman reasoned that it would be relatively easy to generate long sequences of random five- unit keys and that the tape itself was eas- ily replaceable and relatively inexpensive. Holes punched in a tape would permit feeler contacts to turn an electrical cur- rent on or off, causing a cipher machine’s rotors to step. Thus, with each key stroke, randomly placed holes in a five-group tape would produce an apparent random step- ping for one or more of the cipher rotors. The cipher text is printed on a small tape. The decryption process simply works in reverse. Key tape could be manufactured in secure facilities, distributed to the appropriate recipients, and inserted into the machine according to rigidly imposed, William Friedman with AT&T printing telegraph, 1920 (courtesy 6 pre-established schedules. of the George C. Marshall Foundation, Lexington, Virginia) 3 SIGABA / ECM II Cipher Machine The crypto rotor wheels William Friedman envisioned for his device were flattened cylinders with an alphabet around the circumference. One face of the cylinder had twenty-six spring-loaded copper pins protruding from it; the other face had twenty-six flush copper contacts. Inside each cylinder was a wire maze connecting the electrical contacts on one side to the pins on the other. Thus, an electrical impulse beginning with, say, the letter A on one side might connect to H on the other side and so on around the wheel in random fashion. Several cylinders serially juxtaposed
Recommended publications
  • The Battle Over Pearl Harbor: the Controversy Surrounding the Japanese Attack, 1941-1994
    W&M ScholarWorks Dissertations, Theses, and Masters Projects Theses, Dissertations, & Master Projects 1995 The Battle Over Pearl Harbor: The Controversy Surrounding the Japanese Attack, 1941-1994 Robert Seifert Hamblet College of William & Mary - Arts & Sciences Follow this and additional works at: https://scholarworks.wm.edu/etd Part of the United States History Commons Recommended Citation Hamblet, Robert Seifert, "The Battle Over Pearl Harbor: The Controversy Surrounding the Japanese Attack, 1941-1994" (1995). Dissertations, Theses, and Masters Projects. Paper 1539625993. https://dx.doi.org/doi:10.21220/s2-5zq1-1y76 This Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Dissertations, Theses, and Masters Projects by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. THE BATTLE OVER PEARL HARBOR The Controversy Surrounding the Japanese Attack, 1941-1994 A Thesis Presented to The Faculty of the Department of History The College of William and Mary in Virginia In Partial Fulfillment Of the Requirements for the Degree of Master of Arts by Robert S. Hamblet 1995 APPROVAL SHEET This thesis is submitted in partial fulfillment of the requirements for the degree of Master of Arts '-{H JxijsJr 1. Author Approved, November 1995 d(P — -> Edward P. CrapoII Edward E. Pratt TABLE OF CONTENTS Page ACKNOWLEDGEMENTS......................................................................iv ABSTRACT..............................................................................................v
    [Show full text]
  • Agnes Meyer Driscoll Vs. the Enigma and the Bombe Colin Burke
    Colin Burke 1-2001 © Agnes Meyer Driscoll vs. the Enigma and the Bombe Colin Burke ABSTRACT: Documents in Britain‘s National Archives/ Public Record Office and in the U.S. National Archive‘s Record Groups RG457 and RG38 indicate that in mid-1941 the United States Navy‘s codebreaking organization, OP-20-G ignored an opportunity to gain full knowledge of Britain‘s anti-Enigma methods and machines. Spending a year and one-half working on what it felt was a unique and much more effective method– but one that failed--OP-20-G‘s, staff, at a critical time in U.S.- British relations ,did not inform America‘s decision makers of Britain‘s willingness to share its crypto-secrets . As a result, American leaders believed that England‘s GC&CS had deliberately withheld vital information that would have allowed the development of an independent American attack on Naval Enigma. That belief lasted Colin Burke 1-2001 © throughout the war and caused friction between the two nations. Other consequences of OP-20-G‘s mid-1941 decision were to delay the adoption of the British Bombe and its allied methods and to waste perhaps six months of the vital time of the new team of cryptanalysts and engineers assigned, in early 1942, to develop an American Bombe. KEYWORDS: OP-20-G, Enigma, Driscoll, Denniston, GC&CS, Bombe, Safford, Wenger, Weeks, Currier, Engstrom, catalog, Banburismus, hot-point, cold-point, Tiltman. Introduction: A Fragile British-American Crypto-Alliance By the end of World War II Great Britain and the United States had forged uniquely close relationships--even among their intelligence agencies.1 Much had to be overcome to achieve the long-lasting 1 Robert Louis Benson, A History of U.S.
    [Show full text]
  • Code Breaking in the Pacific
    Code Breaking in the Pacific Peter Donovan • John Mack Code Breaking in the Pacific 123 Peter Donovan John Mack School of Mathematics and Statistics School of Mathematics and Statistics University of New South Wales University of Sydney Sydney, NSW, Australia Sydney, NSW, Australia Additional material to this book can be downloaded from http://extras.springer.com ISBN 978-3-319-08277-6 ISBN 978-3-319-08278-3 (eBook) DOI 10.1007/978-3-319-08278-3 Springer Cham Heidelberg New York Dordrecht London Library of Congress Control Number: 2014945227 © Springer International Publishing Switzerland 2014 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc.
    [Show full text]
  • Warning at Pearl Harbour: Leslie Grogan and the Tracking of The
    Warning at Pearl Harbor: Leslie Grogan and the Tracking of the Kido Butai Brian Villa and Timothy Wilford' While some aspects of the Japanese attack on Pearl Harbor have been studied exhaustively, it remains surprisingly true that a few elements have almost completely escaped scholarly attention. It is often obvious why these topics have been bypassed: in most cases the barest exploration reveals that they lead nowhere. Yet not all undigested bits fall in this category. A select few are both important and relatively unstudied. It was once thought that the pre- Pearl Harbor reports of Leslie Grogan, 2nd Radio Officer aboard the Matson Steamship and Navigation Company's SS Lurline (see figure 1), were unworthy of notice. Several days before Japan's Strike Force, or Kido Butai, attacked Pearl Harbor, Grogan reported that he had copied Japanese coded signals emanating from the North Pacific. It may be noted that while the United States Navy (USN) made a formal investigation of the much less credible reports of Robert Ogg, known as Seaman Z in John Toland's Infamy, there was apparently no naval investigation of Grogan's considerably more detailed reports. Nor did his account capture the attention of any of the documented Pearl Harbor inquiries, if one may judge by its omission in the thirty-nine volumes of published Pearl Harbor investigations. Moreover, Grogan's reports have not drawn any attention from the renowned expositor of the main current of Pearl Harbor historiography. Gordon Prange never mentioned Grogan's reports in any of his Pearl Harbor studies because, his principal collaborators have told us, he could attach no credence to Grogan's reports.
    [Show full text]
  • (U) Cryptologic Almanac Soth Anniversary Series (U)Madame X
    DOCID: 3575740 ~ l".AEQ/IL - --..... , • • u~t: l\J.11 V , • H UNCLASSlrl 1rOH urr1i...11u. 1.1 ..... ...... _. • (U) Cryptologic Almanac soth Anniversary Series (U)Madame X: Agnes Meyer Driscoll and U.S. Naval Cryptology, 1919 - 1940 (U) Of all the pioneer American cryptologists that we remember - William and Elizebeth Friedman, Herbert 0. Yardley (founder of the American Black Chamber), and Joseph Rochefort, whose codebreaking exploits contributed to the Midway victory - one, Agnes Meyer Driscoll, remains something of a mystery. The mystery is all the more ironic when we consider the range and number of her accomplishments as a pioneer cryptologist, and that she was a woman working in the mostly male domain of naval cryptology. (U) She was born on 24 July 1889 in Genesco, Illinois, to Dr. Gustav F. and Lucy Andrews Meyer. Jn 1911, she received an A.B. from Ohio State University, having majored in mathematics, music, physics, and foreign languages. Her curriculum was atypical of women's education in the post-Victorian era. After college, she moved to Amarillo, Texas, where she taught in various high schools. By 1918, she was the head of the mathematics department at Amarillo High School. However, events were soon to change her career completely. (U) In April 1917, as a result of the unlimited U-boat campaign and the revelations of the Zimmermann Telegram, the United States declared war on Germany. By early 1918, the U.S. Navy found that it had a serious personnel shortage as the war soaked up the pool of available manpower. To fix this problem, the secretary of the navy, Josephus Daniels, made the far-reaching decision to allow women to enlist.
    [Show full text]
  • Priceless Advantage 2017-March3.Indd
    United States Cryptologic History A Priceless Advantage U.S. Navy Communications Intelligence and the Battles of Coral Sea, Midway, and the Aleutians series IV: World War II | Volume 5 | 2017 Center for Cryptologic History Frederick D. Parker retired from NSA in 1984 after thirty-two years of service. Following his retirement, he worked as a reemployed annuitant and volunteer in the Center for Cryptologic History. Mr. Parker served in the U.S. Marine Corps from 1943 to 1945 and from 1950 to 1952. He holds a B.S. from the Georgetown University School of Foreign Service. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other U.S. govern- ment entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (l to r) Admiral Isoroku Yamamoto, Commander in Chief, Japanese Combined Fleet, 1942; aircraft preparing for launch on the USS Enterprise during the Battle of Midway on 4 June 1942 with the USS Pensacola and a destroyer in distance; and Admiral Chester W. Nimitz, Commander in Chief, Pacific Fleet, ca. 1942-1944 A Priceless Advantage: U.S. Navy Communications Intelligence and the Battles of Coral Sea, Midway, and the Aleutians Frederick D. Parker Center for Cryptologic History National Security Agency Reissued 2017 with a new introduction First edition published 1993.
    [Show full text]
  • Raising the Intelligence Bar Far, Far Too High: the Bombes and the U-Boat War
    Colin Burke © 2011 Raising the Intelligence Bar Far, Far Too High: The Bombes and the U-Boat War INTRODUCTION Once upon a time not too long ago historians wrote about America‟s code breaking past with awe and, in some cases, near reverence.1 However, historians have recently become sharply critical of America‟s codebreakers and the nation‟s communications eavesdroppers. They, as well as contemporary commentators, have faulted the National Security Agency and its predecessors for a long string of failures. Not predicting the onset of the Korean War, not providing convincing warnings of the attempted seizure of the Suez Canal, failing to read high- level Soviet code systems during critical years of the Cold War, not identifying Soviet missile shipments to Cuba, and „illegally‟ eavesdropping on innocent Americans are a few of the items on the expanding lists. The critics direct their most intense criticisms at the alleged recent crypto failures of what they picture as the overly bureaucratic and internally insecure post-1990 National Security Agency that emerged from its Dark Ages of the 1950s and 1960s to become a giant with thousands of employees and budgets in the billions of dollars. NSA‟s new judges have expected the agency to able to warn of the 9/11 attack, to provide the information necessary for the capture of terrorists such Osama Bin Laden, and, to do it all without endangering civil liberties.2 Behind the criticisms lie historical benchmarks used as standards to evaluate the National Security Agency of the 1950s to the present. The most frequently applied standard is a Golden Age of achievements by America‟s codebreakers during World War II.
    [Show full text]
  • Amelia Earhart from Wikipedia, the Free Encyclopedia
    Amelia Earhart From Wikipedia, the free encyclopedia Amelia Mary Earhart (/ˈɛərhɑːrt/; July 24, 1897 – disappeared July 2, 1937) was Amelia Earhart an American aviation pioneer and author.[1][N 1] Earhart was the first female aviator to fly solo across the Atlantic Ocean.[3][N 2] She received the U.S. Distinguished Flying Cross for this accomplishment.[5] She set many other records,[2] wrote best-selling books about her flying experiences and was instrumental in the formation of The Earhart beneath the nose of her Ninety-Nines, an organization for female Lockheed Model 10 Electra, pilots.[6] In 1935, Earhart became a March 1937, Oakland, California visiting faculty member at Purdue University as an advisor to aeronautical Born Amelia Mary Earhart engineering and a career counselor to July 24, 1897 women students. She was also a member Atchison, Kansas, U.S. of the National Woman's Party and an Disappeared July 2, 1937 (aged 39) early supporter of the Equal Rights Pacific Ocean, en route to Howland [7][8] Amendment. Island from Lae, Papua New Guinea During an attempt to make a Status Declared dead in absentia circumnavigational flight of the globe in January 5, 1939 (aged 41) 1937 in a Purdue-funded Lockheed Nationality American Model 10-E Electra, Earhart disappeared Known for Many early aviation records, over the central Pacific Ocean near including first woman to fly solo Howland Island. Fascination with her across the Atlantic Ocean. life, career and disappearance continues Spouse(s) George P. Putnam to this day.[N 3] Website ameliaearhart.com
    [Show full text]
  • The Center for Cryptologic History Calendar
    CCH 2021 THE CENTER FOR CRYPTOLOGIC HISTORY CALENDAR The Autoscritcher was an attempt by the army during World War II to develop an electronic machine to replace the electromechanical bombe in analyzing communications enciphered on the German ENIGMA machine. The Autoscritcher, while a good concept and despite the use of electronic components, was still slower than the bombe. Winter wonderland along Rockenbach Road, 2016. The road leads from the NSA buildings through Fort Meade. Normally, the road is lined with overflow parking spaces for Agency employees. However, in wintertime, it is one of the few convenient dumping sites for snow from the regular parking lots after heavy storms. JANUARY 2021 Sunday Monday Tuesday Wednesday Thursday Friday Saturday 1 2 Lt. Gen. Gordon Blake, USAF, NSA Office of Policy first became DIRNSA, 1962 mandated use of term “Service Cryptologic Element,” 1980 U.S. Army Intelligence and Security Command (INSCOM) established, 1977 New Year’s Day 3 4 5 6 7 8 9 NARA assigned Record Group Major General Gordon Blake Lieutenant (later Captain) Jerzy Rozycki, a Polish Cipher 457 (now “Records of the named Commander, Air Force Laurance Safford named OIC, Bureau mathematician who National Security Agency”) to Security Service, 1957 Navy Cryptographic Branch, helped break ENIGMA, died in a declassified NSA records, 1977 1924 ship sunk off France, 1942 Louis Tordella, longest serving D/DIR (1958-1974), died, 1996 10 11 12 13 14 15 16 First History Today article on NSA BRUSA Agreement–U.S.-UK General Order No. 9 authorized Daily Page, 2003 COMINT relationships during publication of a new War World War II, 1944 Department Telegraphic Code, 1898 Brigadier General Bernard Ardisana, USAF, NSA’s first Operation DESERT STORM Assistant Deputy Director of began, 1991 Operations, died on active duty, 1978 17 18 19 20 21 22 23 Alfred Vail, co-inventor of the Encoded Zimmermann Telegram National Security Decision Intelligence chiefs of U.S.
    [Show full text]
  • USN Cryptanalysis and the Challenge of JN-25B in 1941 Timothy Wilford1
    Decoding Pearl Harbor: USN Cryptanalysis and the Challenge of JN-25B in 1941 Timothy Wilford1 En 1941, les « Forces navales des États-Unis » ont tenté de dévoiler les plans de la marine japonaise en décryptant le principal code la marine japonaise, soit le JN-25B. Les auteurs traditionalistes estiment que les « Forces navales des États-Unis » ne pouvaient pas lire de JN-25B en 1941, alors que les auteurs révisionnistes estiment que le JN-25B était entièrement lisible. Cependant, un examen de la correspondance et des rapports de l'époque démontre que les « Forces navales des États-Unis » pouvaient partiellement décoder le JN-25B sur une base régulière depuis novembre 1941, mais on ne sait pas exactement dans quelle proportion on pouvait décoder le texte des messages. En outre, vers la fin des années 1941, les « Forces navales des États-Unis » interceptèrent plusieurs messages faisant allusion à une attaque japonaise trans-Pacifique contre les principaux navires ancrés au port. Les historiens qui étudient la controverse concernant Pearl Harbor doivent maintenant déterminer dans quelle proportion on pouvait décoder le texte des messages JN25B en 1941 au lieu de questionner la possibilité réelle d'un décryptage continue. "We are reading enough current traffic to keep two translators very busy," explained Lt. John Lietwiler to the Navy Department in a letter dated 16 November 1941, in which he discussed The author expresses his gratitude to Brian Villa, Professor of History at the University of Ottawa, who directed the graduate research from which this article is drawn. The Northern Mariner/Le marin du nord, XII, No.
    [Show full text]
  • 9Guv 9Kpf %Ngct
    5GTKGU+8 8QNWOG 9GUV9KPF%NGCT West Wind Clear • Series IV • Volume 10 Volume • • Series IV Clear Wind West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nited States Cryptologic History Series IV: World War II Volume X West Wind Clear: Cryptology and the Winds Message Controversy - A Documentary History Robert J. Hanyok and David P. Mowry Center for Cryptologic History National Security Agency 2008 Table of Contents Preface and Acknowledgments . vii Foreword. .. xxi Chapter 1: Background: Interwar U.S. - Japan Relations and Cryptology. 1 United States-Japan Relations, 1919-1940 (Japanese Diplomatic and Naval Cryptology and American Codebreaking between the Wars) United States - Japan Relations Worsen, 1940-1941 Chapter 2: Intercepted Japanese Diplomatic Messages Reveal a Warning System, 19 November-28 November 1941. .15 The Cryptography of the J-19 System Japan Fields a New Diplomatic Manual Cryptographic System The Americans Solve the New Manual System November 19: Japanese Message #2353 – The First Winds Instruction Message November 19: Japanese Message #2354 – The Second Winds Instruction Message Chapter 3: The Hunt for the Winds Execute Message, 28 November – 7 December 1941 . .. 31 The Search Begins – 28 November 1941 Tokyo Sends More Instructions about Destroying Cryptographic Material The Hidden Word Message – A Complement to the Winds Messages Tokyo Sends Even More Instructions, 28 November-6 December 7 December 1941: The Hidden Word Message Is Sent 7 December 1941: The Winds Execute Message Is Sent Chapter 4: The Winds Controversy: Myth and Reality.
    [Show full text]
  • The SIGABA / ECM II Cipher Machine : “A Beautiful Idea”
    Center for Cryptologic History The SIGABA / ECM II Cipher Machine : “A Beautiful Idea” This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other U.S. government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please e-mail [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Timothy Mucklow was a senior historian on the staff of the Center for Cryptologic History fol- lowing a long career in information assurance at NSA and with the Air Force. After a decade in aca- demia, he served as a military historian at the wing, division, and major command levels and produced a series of monographs and articles on such topics as information assurance, telecommunications and computers, and national defense issues, and has offered IA seminars at military facilities around the world. He received his Ph.D. in 1982. He retired from the CCH in 2013. Acknowledgments. The Center for Cryptologic History is grateful to Dr. Craig Bauer, professor of mathematics at York College of Pennsylvania and editor-in-chief of the journal Cryptologia, for his assistance with this project, and to LeeAnn Tallman for earlier research. The SIGABA / ECM II Cipher Machine: “A Beautiful Idea” Timothy J. Mucklow National Security Agency Center for Cryptologic History 2015 Contents Introduction ....................................................................................... 1 And Hebern Saw the Wheel .................................................................... 2 Deus ex Machine ................................................................................. 5 Rowlett’s Epiphany .............................................................................
    [Show full text]