BATCO

Last updated
Facsimile of a BATCO cipher sheet. BATCO facsimile.agr.tiff
Facsimile of a BATCO cipher sheet.

BATCO, short for Battle Code, is a hand-held, paper-based encryption system used at a low, front line (platoon, troop and section) level in the British Army. It was introduced along with the Clansman combat net radio in the early 1980s and was largely obsolete by 2010 due to the wide deployment of the secure Bowman radios. BATCO consists of a code, contained on a set of vocabulary cards, and cipher sheets for superencryption of the numeric code words. The cipher sheets, which are typically changed daily, also include an authentication table and a radio call sign protection system.

Contents

BATCO is similar to older Slidex system. The use of BATCO is still taught to Royal Signals Communication Systems Operators as a back-up should secure equipment fail or be unavailable. It is also taught to Army Cadets and Combined Cadets as part of the Signal Classification qualification. [1]

Code

Vocabulary cards used in conjunction with British Army BATCO encryption system. BATO Vocab Cards.jpg
Vocabulary cards used in conjunction with British Army BATCO encryption system.

Messages in BATCO are first encoded into numbers using one of several vocabulary cards. The BATCO cipher is then used to encrypt the numbers into letters, which can be transmitted over unsecure channels. The process is reversed at the receiving end.

Each BATCO vocabulary card groups words needed for a particular function, so card changes are infrequent. Every vocabulary word on a card is assigned a two digit code. Some vocabulary card entries call for a fixed number of digits after the two digit code. For example, the code for ETA (estimated time of arrival) is followed by a four digit time of day. Each card in a set has a three digit number and there is always a code word on the card that means switch to card number xxx. [2]

Cipher

BATCO Wallet plastic insert with slider BATCO Plastic Insert.jpg
BATCO Wallet plastic insert with slider

Each BATCO cipher sheet is composed of a double-sided sheet of about A5 size that fits in a specially made BATCO wallet. Each single side is usually valid for 24 hours. The wallet has a slide that aids in reading the tables correctly.

The plaintext character set in BATCO consists of 12 symbols, the digits 0 to 9, the decimal point and a "change" character denoted as CH. The BATCO ciphertext character set is the letters A through Z. BATCO can also be used to transmit numeric information, such as grid coordinates. Switching to this mode is accomplished by sending the vocabulary code for an appropriate proword, such as FIGURES or GRID. The decimal point plaintext character is used as needed in numeric mode, having its normal meaning. The CH symbol is used to mark the end of a numeric string transmission, returning to the vocabulary card codes.

The main BATCO cipher table is a matrix of 19 columns and 26 rows. The columns are divided into two groups. The six left columns are numbered 2 through 7. The column under each digit contains a randomly scrambled alphabet. The right 13 columns are labeled 0, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, CH, ".", i.e. the plaintext symbols with 0 repeated. Each row in the right columns set contains a scrambled alphabet, with two letters in each cell. (There are 13 columns, so two letters per cell exhausts the alphabet.)

A traffic key consist of a digit (from 2 to 7) and a letter. The operator selects one of the first 6 columns using the key digit and then finds the row in which the key letter occurs. That row in the second set of columns is used to encipher and decipher BATCO messages. The scrambled alphabet in the selected row defines the correspondence between plaintext symbols in the column headings and ciphertext symbols in the individual cells. Note that there are two possible ciphertexts for each plaintext symbol, except for 0, which has four possible ciphertexts. BATCO users are instructed to choose different ciphertext symbols when the same plaintext symbol repeats in a message.

Security is maintained by frequent key changes. BATCO instructions require a new key for every message and that no more than 22 symbols should be encoded with a single key. Keys are rotated in alphabetical order, so key 5F would be followed by 5G. Key column 7 is kept in reserve for emergencies.

Other functions

British army 1980's paper based code system wallet. BATCO Wallet.jpg
British army 1980's paper based code system wallet.

In addition to the cipher, each BATCO sheet has a:

The spelling box converts letters into two digit numbers which can then be encoded using the procedure described above. It is used is special situations to spell out words that are sensitive and are not on any of the vocabulary cards. The spelling box is a 6 column by 5 row matrix labeled horizontally and vertically with single digits. The matrix contains a scrambled alphabet and four blank cells.

The authentication table converts a two digit challenge number into a two digit response. It is a 10 by 5 grid, also labeled horizontally and vertically with single digits. Each cell contains a random two digit number, with no repeated cells. A challenge is issued as a two digit number specifying the columns and row that selects a cell in the table. The response is the contents of the cell.

A final scrambled alphabet at the bottom of the cipher sheet is used for a call sign scrambling system.

See also

Related Research Articles

<span class="mw-page-title-main">One-time pad</span> Encryption technique

In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is larger than or equal to the size of the message being sent. In this technique, a plaintext is paired with a random secret key. Then, each bit or character of the plaintext is encrypted by combining it with the corresponding bit or character from the pad using modular addition.

In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters, pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution process to extract the original message.

<span class="mw-page-title-main">Transposition cipher</span> Method of encryption

In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (transposition) without changing the characters themselves. Transposition ciphers reorder units of plaintext according to a regular system to produce a ciphertext which is a permutation of the plaintext. They differ from substitution ciphers, which do not change the position of units of plaintext but instead change the units themselves. Despite the difference between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption methods like the modern Advanced Encryption Standard (AES).

<span class="mw-page-title-main">Vigenère cipher</span> Simple type of polyalphabetic encryption system

The Vigenère cipher is a method of encrypting alphabetic text where each letter of the plaintext is encoded with a different Caesar cipher, whose increment is determined by the corresponding letter of another text, the key.

<span class="mw-page-title-main">Autokey cipher</span> Classic polyalphabet encryption system

An autokey cipher is a cipher that incorporates the message into the key. The key is generated from the message in some automated fashion, sometimes by selecting certain letters from the text or, more commonly, by adding a short primer key to the front of the message.

<span class="mw-page-title-main">Tabula recta</span> Fundamental tool in cryptography

In cryptography, the tabula recta is a square table of alphabets, each row of which is made by shifting the previous one to the left. The term was invented by the German author and monk Johannes Trithemius in 1508, and used in his Trithemius cipher.

In cryptography, coincidence counting is the technique of putting two texts side-by-side and counting the number of times that identical letters appear in the same position in both texts. This count, either as a ratio of the total or normalized by dividing by the expected count for a random source model, is known as the index of coincidence, or IC for short.

<span class="mw-page-title-main">Playfair cipher</span> Early block substitution cipher

The Playfair cipher or Playfair square or Wheatstone–Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution cipher. The scheme was invented in 1854 by Charles Wheatstone, but bears the name of Lord Playfair for promoting its use.

<span class="mw-page-title-main">VIC cipher</span> Complex Soviet pencil and paper cipher

The VIC cipher was a pencil and paper cipher used by the Soviet spy Reino Häyhänen, codenamed "VICTOR".

A straddling checkerboard is a device for converting an alphanumeric plaintext into digits whilst simultaneously achieving fractionation and data compression relative to other schemes using digits. It also is known as a monôme-binôme cipher.

In classical cryptography, the running key cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long keystream. The earliest description of such a cipher was given in 1892 by French mathematician Arthur Joseph Hermann. Usually, the book to be used would be agreed ahead of time, while the passage to be used would be chosen randomly for each message and secretly indicated somewhere in the message.

The affine cipher is a type of monoalphabetic substitution cipher, where each letter in an alphabet is mapped to its numeric equivalent, encrypted using a simple mathematical function, and converted back to a letter. The formula used means that each letter encrypts to one other letter, and back again, meaning the cipher is essentially a standard substitution cipher with a rule governing which letter goes to which. As such, it has the weaknesses of all substitution ciphers. Each letter is enciphered with the function (ax + b) mod 26, where b is the magnitude of the shift.

In cryptography, the ADFGVX cipher was a manually applied field cipher used by the Imperial German Army during World War I. It was used to transmit messages secretly using wireless telegraphy. ADFGVX was in fact an extension of an earlier cipher called ADFGX which was first used on 1 March 1918 on the German Western Front. ADFGVX was applied from 1 June 1918 on both the Western Front and Eastern Front.

<span class="mw-page-title-main">Polybius square</span> Type of code

The Polybius square, also known as the Polybius checkerboard, is a device invented by the ancient Greeks Cleoxenus and Democleitus, and made famous by the historian and scholar Polybius. The device is used for fractionating plaintext characters so that they can be represented by a smaller set of symbols, which is useful for telegraphy, steganography, and cryptography. The device was originally used for fire signalling, allowing for the coded transmission of any message, not just a finite number of predetermined options as was the convention before.

In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand. However, they are also usually very simple to break with modern technology. The term includes the simple systems used since Greek and Roman times, the elaborate Renaissance ciphers, World War II cryptography such as the Enigma machine and beyond.

<span class="mw-page-title-main">DRYAD</span> US paper cryptographic system

The DRYAD Numeral Cipher/Authentication System is a simple, paper cryptographic system employed by the U.S. military for authentication and for encryption of short, numerical messages. Each unit with a radio is given a set of matching DRYAD code sheets. A single sheet is valid for a limited time, called a cryptoperiod.

The four-square cipher is a manual symmetric encryption technique. It was invented by the French cryptographer Felix Delastelle.

In the history of cryptography, the Nihilist cipher is a manually operated symmetric encryption cipher, originally used by Russian Nihilists in the 1880s to organize terrorism against the tsarist regime. The term is sometimes extended to several improved algorithms used much later for communication by the First Chief Directorate with its spies.

Turingery or Turing's method was a manual codebreaking method devised in July 1942 by the mathematician and cryptanalyst Alan Turing at the British Government Code and Cypher School at Bletchley Park during World War II. It was for use in cryptanalysis of the Lorenz cipher produced by the SZ40 and SZ42 teleprinter rotor stream cipher machines, one of the Germans' Geheimschreiber machines. The British codenamed non-Morse traffic "Fish", and that from this machine "Tunny".

Rasterschlüssel 44 was a manual cipher system, used by the German Wehrmacht during the Second World War. The cipher was designed by the astronomer and sometime cryptographer Walter Fricke while working as a conscript in Section IIb, of Group 2 of OKW/Chi and introduced in March 1944 and the Allied forces codebreakers had considerable difficulties in breaking it. Cryptanalysis, if successful, generally required a 40 letter crib and some two weeks, making the tactical information outdated before it could be exploited. The combination of strength and ease of use made RS 44 an ideal hand cipher.

References

  1. Cannon, Mike (1994). Eavesdropping on the British Military. Dublin: Cara Press. pp. 91–92.
  2. http://www.campx.ca/crypto.html Site with photo of BATCO vocabulary card and slide rule