M-94

Last updated
The M-94 at the National Cryptologic Museum Ytm94 1b.jpg
The M-94 at the National Cryptologic Museum

The M-94 was a piece of cryptographic equipment used by the United States Army, consisting of several lettered discs arranged as a cylinder. It was also employed by the US Navy, under the name CSP 488.

Contents

The device was conceived by Colonel Parker Hitt and then developed by Major Joseph Mauborgne in 1917; based on a system invented by Thomas Jefferson and Etienne Bazeries. Officially adopted in 1922, it remained in use until circa 1942, when it was replaced by more complex and secure electromechanical rotor machines, particularly the M-209. [1]

Principle

The device consisted of 25 aluminium discs attached to a four-and-a-half inch long rod, each disc containing the 26 letters of the Roman alphabet in scrambled order around its circumference (with the exception of the 17th disc, which began with the letters "ARMY OF THE US"). Each wheel had a different arrangement of the alphabet, and was stamped with an identifying number and letter; wheels were identified according to the letter following "A" on that wheel, from "B 1" to "Z 25". The wheels could be assembled on the rod in any order; the ordering used during encoding comprised the key. There were 25! (25 factorial) = 15,511,210,043,330,985,984,000,000 (more than 15 septillion) possible keys, which can be expressed as about an 84-bit key size.

Messages were encrypted 25 letters at a time. Turning the discs individually, the operator aligned the letters in the message horizontally. Then, any one of the remaining lines around the circumference of the cylinder was sent as the ciphertext. To decrypt, the wheels were turned until one line matched a 25 letter block of ciphertext. The plaintext would then appear on one of the other lines, which could be visually located easily, as it would be the only one likely to "read."

A wheel cipher being used to encode the phrase "ATTACK AT DAWN." One possible ciphertext is "CMWD SMXX KEIL." Wheel cipher.png
A wheel cipher being used to encode the phrase "ATTACK AT DAWN." One possible ciphertext is "CMWD SMXX KEIL."

The principle upon which the M-94/CSP-488 is based was first invented by Thomas Jefferson in 1795 in his "wheel cypher" but did not become well known, and was independently invented by Etienne Bazeries a century later.

M-138-A

An M-138-A at the National Cryptologic Museum" M-138-A Strip Cipher - National Cryptologic Museum - DSC07930.JPG
An M-138-A at the National Cryptologic Museum"

In an extension of the same general principle, the M-138-A strip cipher machine, used by the US Army, Navy (as CSP-845), Coast Guard and State Department through World War II, featured hundreds of flat cardboard strips. Each strip contained a scrambled alphabet, repeated twice, that could be slid back and forth in a frame; with 30 being selected for each cipher session. The strip cipher could interoperate with the M-94 if suitable strips were provided.

The original design used an aluminum base. William F. Friedman describes the problem of getting them manufactured and how it was overcome:

"It soon became apparent to both Army and Navy cryptologists that a great increase in cryptosecurity would be obtained if the alphabets of the M-94 device could be made variant instead of invariant. There began efforts in both services to develop a practical instrument based upon this principle. I won't take time to show all these developments but only the final form of the one adopted by the Army, Strip Cipher Device Type, M-138-A. This form used an aluminum base into which channels with overhanging edges were cut to hold cardboard strips of alphabets which could be slid easily within the channels. It may be of interest to you to learn that after I had given up in my attempts to find a firm which would or could make such aluminum grooved devices in quantity, Mrs. Friedman, by womanly wiles and cajolery on behalf of her own group in the U.S. Coast Guard, succeeded in inducing or enticing one firm to make them for her. And it's how the first models of strip cipher devices made of aluminum by the extrusion process came about, and how the U.S. Army, by administrative cooperation on an inter-Service level and technical cooperation on a marital level, found it practical to develop and produce in quantity its Strip Cipher Device, Type M-138-A. This was used from 1935 to 1941 or 1942 by the Army, the Navy, the Marine Corps, the Coast Guard, et al, including the Treasury and State Departments. It was used as a back-up system even after the Armed Services as well as the Department of State began employing much better and more sophisticated cipher machines of high speed and security." [2] :p.148

Another problem was that aluminum was in short supply early in the war and attempts were made to make the strip cipher bases out of plastic or mahogany, with limited success. Fortunately, aluminum became available again for this use in the fall of 1943. [3]

Besides the military, Department of State and many other civilian agencies (like OSS) were using it for most important messages, and despite it being a powerful method in theory, made many mistakes so the system was compromised, letting multiple Axis countries decipher it.

Cryptanalysis

Like most classical ciphers, strip ciphers can be easily cracked if there is enough intercepted ciphertext. However, this takes time and specialized skills, so the M-94 was still good enough during the early years of World War II for its intended use as a "tactical cipher"; in a similar way to the more modern DRYAD and BATCO. The M-138-A was stronger because slips with new alphabets could be issued periodically, even by radio using more secure systems like SIGABA, however this was not practiced until the US found out that their strips were compromised in early 1943. Both were replaced by the M-209 mechanical rotor machine as these became available. [2] [1]

The main method of M-138-A cryptanalysis practiced by Axis, besides physically capturing the systems, was exploiting its vulnerability to the known-plaintext attack (e. g., when the same text was published in press releases), as well as the fact that the embassies used too little[ clarification needed ] keys and strips.

See also

Related Research Articles

<span class="mw-page-title-main">Cipher</span> Algorithm for encrypting and decrypting information

In cryptography, a cipher is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with "code", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography.

<span class="mw-page-title-main">Cryptanalysis</span> Study of analyzing information systems in order to discover their hidden aspects

Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

<span class="mw-page-title-main">Enigma machine</span> German cipher machine

The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the German military. The Enigma machine was considered so secure that it was used to encipher the most top-secret messages.

In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters, pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution process to extract the original message.

<span class="mw-page-title-main">Transposition cipher</span> Method of encryption

In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (transposition) without changing the characters themselves. Transposition ciphers reorder units of plaintext according to a regular system to produce a ciphertext which is a permutation of the plaintext. They differ from substitution ciphers, which do not change the position of units of plaintext but instead change the units themselves. Despite the difference between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption methods like the modern Advanced Encryption Standard (AES).

<span class="mw-page-title-main">Caesar cipher</span> Simple and widely known encryption technique

In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.

<span class="mw-page-title-main">Vigenère cipher</span> Simple type of polyalphabetic encryption system

The Vigenère cipher is a method of encrypting alphabetic text where each letter of the plaintext is encoded with a different Caesar cipher, whose increment is determined by the corresponding letter of another text, the key.

<span class="mw-page-title-main">SIGABA</span> American cipher machine

In the history of cryptography, the ECM Mark II was a cipher machine used by the United States for message encryption from World War II until the 1950s. The machine was also known as the SIGABA or Converter M-134 by the Army, or CSP-888/889 by the Navy, and a modified Navy version was termed the CSP-2900.

<span class="mw-page-title-main">Tabula recta</span> Fundamental tool in cryptography

In cryptography, the tabula recta is a square table of alphabets, each row of which is made by shifting the previous one to the left. The term was invented by the German author and monk Johannes Trithemius in 1508, and used in his Trithemius cipher.

<span class="mw-page-title-main">Frequency analysis</span> Study of the frequency of letters or groups of letters in a ciphertext

In cryptanalysis, frequency analysis is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers.

<span class="mw-page-title-main">Playfair cipher</span> Early block substitution cipher

The Playfair cipher or Playfair square or Wheatstone–Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution cipher. The scheme was invented in 1854 by Charles Wheatstone, but bears the name of Lord Playfair for promoting its use.

<span class="mw-page-title-main">Ciphertext</span> Encrypted information

In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. This process prevents the loss of sensitive information via hacking. Decryption, the inverse of encryption, is the process of turning ciphertext into readable plaintext. Ciphertext is not to be confused with codetext because the latter is a result of a code, not a cipher.

<span class="mw-page-title-main">Rotor machine</span>

In cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting messages. Rotor machines were the cryptographic state-of-the-art for much of the 20th century; they were in widespread use in the 1920s–1970s. The most famous example is the German Enigma machine, the output of which was deciphered by the Allies during World War II, producing intelligence code-named Ultra.

In classical cryptography, the running key cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long keystream. The earliest description of such a cipher was given in 1892 by French mathematician Arthur Joseph Hermann. Usually, the book to be used would be agreed ahead of time, while the passage to be used would be chosen randomly for each message and secretly indicated somewhere in the message.

In cryptography, the ADFGVX cipher was a manually applied field cipher used by the Imperial German Army during World War I. It was used to transmit messages secretly using wireless telegraphy. ADFGVX was in fact an extension of an earlier cipher called ADFGX which was first used on 1 March 1918 on the German Western Front. ADFGVX was applied from 1 June 1918 on both the Western Front and Eastern Front.

In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand. However, they are also usually very simple to break with modern technology. The term includes the simple systems used since Greek and Roman times, the elaborate Renaissance ciphers, World War II cryptography such as the Enigma machine and beyond.

<span class="mw-page-title-main">M-209</span> Mechanical cipher machine

In cryptography, the M-209, designated CSP-1500 by the United States Navy is a portable, mechanical cipher machine used by the US military primarily in World War II, though it remained in active use through the Korean War. The M-209 was designed by Swedish cryptographer Boris Hagelin in response to a request for such a portable cipher machine, and was an improvement of an earlier machine, the C-36.

<span class="mw-page-title-main">Jefferson disk</span> Cipher system invented by Thomas Jefferson

The Jefferson disk, also called the Bazeries cylinder or wheel cypher, was a cipher system commonly attributed to Thomas Jefferson that uses a set of wheels or disks, each with letters of the alphabet arranged around their edge in an order, which is different for each disk and is usually ordered randomly.

The Two-square cipher, also called double Playfair, is a manual symmetric encryption technique. It was developed to ease the cumbersome nature of the large encryption/decryption matrix used in the four-square cipher while still being slightly stronger than the single-square Playfair cipher.

<span class="mw-page-title-main">Alberti cipher</span> Polyalphabetic substitution encryption and decryption system

The Alberti Cipher, created in 1467 by Italian architect Leon Battista Alberti, was one of the first polyalphabetic ciphers. In the opening pages of his treatise De componendis cifris he explained how his conversation with the papal secretary Leonardo Dati about a recently developed movable type printing press led to the development of his cipher wheel.

References

  1. 1 2 "M-94 Cipher Device". International Spy Museum. Retrieved 2023-02-14.
  2. 1 2 Friedman, William F. (1965). "Six Lectures on Cryptology" (PDF). National Cryptology School, U.S. National Security Agency, declassified 1977, 1984.
  3. Display text at National Cryptologic Museum