Combined Cipher Machine

Last updated
CSP 1600, the replacement stepping unit to adapt the ECM Mark II to CCM CCM-rotor-unit.jpg
CSP 1600, the replacement stepping unit to adapt the ECM Mark II to CCM

The Combined Cipher Machine (CCM) (or Combined Cypher Machine) was a common cipher machine system for securing Allied communications during World War II and, for a few years after, by NATO. The British Typex machine and the US ECM Mark II were both modified so that they were interoperable.

Contents

Stepping mechanism in the CSP 1600 CCM-stepping-mechanism.jpg
Stepping mechanism in the CSP 1600

History

The British had shown their main cipher machine Typex to the US on their entry into the war, but the Americans were reluctant to share their machine, the ECM Mark II. There was a need for secure inter-Allied communications, and so a joint cipher machine adapted from both countries' systems was developed by the US Navy.

Use

The "Combined Cipher Machine" was approved in October 1942, and production began two months later. The requisite adapters, designed by Don Seiler, were all manufactured in the US, as Britain did not have sufficient manufacturing resources at the time. The CCM was initially used on a small scale for naval use from 1 November 1943, becoming operational on all US and UK armed services in April 1944.

The adapter to convert the ECM into the CCM was denoted the ASAM 5 by the US Army (in 1949) and CSP 1600 by the US Navy (the Navy referred to the entire ECM machine with CCM adapter as the CSP 1700). The adapter was a replacement rotor basket, so the ECM could be easily converted for CCM use in the field. A specially converted ECM, termed the CCM Mark II, was also made available to Britain and Canada.

Typex Mark 23, pictured, was similar to the Mark 22, but modified for use with the Combined Cypher Machine (CCM). Typex nocase.jpg
Typex Mark 23, pictured, was similar to the Mark 22, but modified for use with the Combined Cypher Machine (CCM).

The CCM programme cost US$6 million.

SIGROD was an implementation of the CCM which, at one point, was proposed as a replacement for the ECM Mark II (Savard and Pekelney, 1999).

TypeX Mark 23 was a later model of the Typex cipher machine family that was adapted for use with the Combined Cipher Machine.

Security

While Allied codebreakers had much success reading the equivalent German machine, the Lorenz cipher, their German counterparts, although performing some initial analysis, had no success with the CCM.

However, there were security problems with the CCM. It was discovered that certain rotor combinations produced a dangerously short period of 338;[ citation needed ] a three-rotor Enigma machine had a period of 16,900. [1] In addition, the rotor wiring could be recovered from a 1,000-group message that had been sent using the machine.[ citation needed ]

In 1952, a later version of CCM, "Ajax", was also found to have security problems.[ citation needed ]

See also

Related Research Articles

Enigma machine German cipher machine

The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the German military. The Enigma machine was considered so secure that it was used to encipher the most top-secret messages.

Typex British cipher machine

In the history of cryptography, Typex machines were British cipher machines used from 1937. It was an adaptation of the commercial German Enigma with a number of enhancements that greatly increased its security. The cipher machine was used until the mid-1950s when other more modern military encryption systems came into use.

SIGABA American cipher machine

In the history of cryptography, the ECM Mark II was a cipher machine used by the United States for message encryption from World War II until the 1950s. The machine was also known as the SIGABA or Converter M-134 by the Army, or CSP-888/889 by the Navy, and a modified Navy version was termed the CSP-2900.

Rotor machine

In cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting messages. Rotor machines were the cryptographic state-of-the-art for a prominent period of history; they were in widespread use in the 1920s–1970s. The most famous example is the German Enigma machine, the output of which was deciphered by the Allies during World War II, producing intelligence code-named Ultra.

Siemens and Halske T52

The Siemens & Halske T52, also known as the Geheimschreiber, or Schlüsselfernschreibmaschine (SFM), was a World War II German cipher machine and teleprinter produced by the electrical engineering firm Siemens & Halske. The instrument and its traffic were codenamed Sturgeon by British cryptanalysts.

Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classical cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.

Bombe Codebreaking device created at Bletchley Park (United Kingdom)

The bombe was an electro-mechanical device used by British cryptologists to help decipher German Enigma-machine-encrypted secret messages during World War II. The US Navy and US Army later produced their own machines to the same functional specification, albeit engineered differently both from each other and from Polish and British bombes.

Cryptanalysis of the Enigma ciphering system enabled the western Allies in World War II to read substantial amounts of Morse-coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from other decrypted Axis radio and teleprinter transmissions, was given the codename Ultra.

Cryptography was used extensively during World War II because of the importance of radio communication and the ease of radio interception. The nations involved fielded a plethora of code and cipher systems, many of the latter using rotor machines. As a result, the theoretical and practical aspects of cryptanalysis, or codebreaking, were much advanced.

Zygalski sheets

The method of Zygalski sheets was a cryptologic technique used by the Polish Cipher Bureau before and during World War II, and during the war also by British cryptologists at Bletchley Park, to decrypt messages enciphered on German Enigma machines.

KL-7 Rotor encryption machine

The TSEC/KL-7, also known as Adonis was an off-line non-reciprocal rotor encryption machine. The KL-7 had rotors to encrypt the text, most of which moved in a complex pattern, controlled by notched rings. The non-moving rotor was fourth from the left of the stack. The KL-7 also encrypted the message indicator.

In the history of cryptography, the NEMA , also designated the T-D (Tasten-Druecker-Maschine), was a 10-wheel rotor machine designed by the Swiss Army during the World War II as a replacement for their Enigma machines.

C-36 (cipher machine)

The C-35 and C-36 were cipher machines designed by Swedish cryptographer Boris Hagelin in the 1930s. These were the first of Hagelin's cipher machines to feature the pin-and-lug mechanism. A later machine in the same series, the C-38, was designated CSP-1500 by the United States Navy and M-209 by the United States military, who used it extensively.

Rockex Cipher machine

Rockex, or Telekrypton, was an offline one-time tape Vernam cipher machine known to have been used by Britain and Canada from 1943. It was developed by Canadian electrical engineer Benjamin deForest Bayly, working during the war for British Security Coordination.

Mercury was a British cipher machine used by the Air Ministry from 1950 until at least the early 1960s. Mercury was an online rotor machine descended from Typex, but modified to achieve a longer cycle length using a so-called double-drum basket system.

Marian Rejewski Polish mathematician and cryptologist (1905–1980)

Marian Adam Rejewski was a Polish mathematician and cryptologist who in late 1932 reconstructed the sight-unseen German military Enigma cipher machine, aided by limited documents obtained by French military intelligence. Over the next nearly seven years, Rejewski and fellow mathematician-cryptologists Jerzy Różycki and Henryk Zygalski developed and used techniques and equipment to decrypt the German machine ciphers, even as the Germans introduced modifications to their equipment and encryption procedures. Five weeks before the outbreak of World War II the Poles, at a conference in Warsaw, shared their achievements with the French and British, thus enabling Britain to begin reading German Enigma-encrypted messages, seven years after Rejewski's original reconstruction of the machine. The intelligence that was gained by the British from Enigma decrypts formed part of what was code-named Ultra and contributed—perhaps decisively—to the defeat of Germany.

A Polish Enigma "double" was a machine produced by the Polish Cipher Bureau that replicated the German Enigma rotor cipher machine. The Enigma double was one result of Marian Rejewski's remarkable achievement of determining the wiring of the Enigma's rotors and reflectors.

German code breaking in World War II achieved some notable successes cracking British naval ciphers until well into the fourth year of the war, using the extensive German radio intelligence operations during World War II. Cryptanalysis also suffered from a problem typical of the German armed forces of the time: numerous branches and institutions maintained their own cryptographic departments, working on their own without collaboration or sharing results or methods. This led to duplicated effort, to a fragmentation of potential, and to lower efficiency than might have been achieved. There was no central German cryptography agency comparable to Britain’s Government Code and Cypher School (GC&CS), based at Bletchley Park.

The Short Weather Cipher, also known as the weather short signal book, was a cipher, presented as a codebook, that was used by the radio telegraphists aboard U-boats of the German Navy (Kriegsmarine) during World War II. It was used to condense weather reports into a short 7-letter message, which was enciphered by using the naval Enigma and transmitted by radiomen to intercept stations on shore, where it was deciphered by Enigma and the 7-letter weather report was reconstructed.

Thomas Ralph Erskine CB was a senior Northern Ireland government lawyer and historian of wartime codebreaking.

References

  1. Hamer, David (January 1997). "Enigma: Actions Involved in the 'Double-Stepping' of the Middle Rotor". Cryptologia. 21 (1): 47–50. doi:10.1080/0161-119791885779. Archived from the original (zip) on 19 July 2011.