Wilhelm Tranow

Last updated

Wilhelm Tranow
Wilhelm Tranow.jpg
Born
Wilhelm Tranow

1891
NationalityGerman
OccupationEngineer
Engineering career
Discipline Cryptography
Institutions Cipher Department of the High Command of the Wehrmacht
Significant advance Cryptology

Wilhelm Tranow (born 1891) was a German cryptanalyst, who before and during World War II worked in the monitoring service of the German Navy and was responsible for breaking a number of encrypted radio communication systems, particularly the Naval Cypher, which was used by the British Admiralty for encrypting operational signals and the Naval Code for encrypting administrative signals. [1] [2] [3] Tranow was considered one of the most important cryptanalysts of B-service. He was described as being experienced and energetic. [4] Little was known about his personal life, when and where he was born, or where he died.

Contents

The American historian David Kahn underscored the war-historical significance of this cryptography and cryptanalysis success of Tranow, citing an anonymous source:

If one man in German intelligence ever held the keys to victory in World War II, it was Wilhelm Tranow. [5]

Life

Wilhelm Tranow initially worked as a radio technician aboard the battleship Pommern . In 1914, he received a coded message, while on watch, from the cruiser Breslau which he forwarded to fleet command, who reported they could not read it. Tranow, who was interested in codes and cryptology, broke the encipherment on the coded messages and forwarded the broken message back to fleet HQ. Showing a lack of urgency and understanding, Fleet HQ issued Tranow a stern warning to keep away from secret matters, instead of trying to improve the code. [1]

During the latter part of World War I, Tranow was placed in the naval (Imperial German Navy) intercept and code-breaking organization (German: Nachrichten-Abteilung) (German Naval Intelligence Service) at Neumünster. There he participated in solving (cryptography) the British Navy 3-letter code.

With the loss of the war and the Treaty of Versailles, the code-breaking unit at Neumünster was shut down. On 28 April 1919, a new agency was created in Berlin, with eight former cryptographers, Tranow being one of them. [6]

In late 1919, Tranow reconstructed Britain's enormous Government Telegraph Code which was used by the Admiralty to carry reports about warships. Later in the 1920s it used the broken code to enable the Germans to track British gunboat activity on the Yangtze. [6]

In 1927, Tranow started work on French naval codes, working on the Tous Bâtiments Militaires/Maritimes and the Bâtiments de Guerre. [7] From early 1932 he started work on Code Signaux Tactiques that provide insight into French tactics. [7]

In 1932, he followed the movements of a British convoy in the Atlantic, by breaking the current 4-letter naval code. These early successes led gradually to the growing strength of his unit, which was now called B-Dienst (German : Beobachtungsdienst). By the mid to late 1930s, up to 80% of French exercises could be read. [7]

In mid-1935, Adolf Hitler, who still considered Britain a potential ally, ordered the whole naval staff to redirect their operational readiness planning against France and ordered the main code breaking effort at B-Dienst to transfer to France. The Kriegsmarine, who considered their major potential opponent to be Britain, viewed the order with suspicion. Tranow, who laughed when he heard the order, stated: [8]

I don't want to delve into high policy, but I want to say one thing: You know the English report their worldwide ship movements through these codes. Suppose their Mediterranean Fleet pours through the Straits of Gibraltar, and moves in to the Atlantic, or the Channel or even into the North Sea. Don't you want to know this in advance?

The Kriegsmarine reconsidered their position and allowed Tranow to continue, in violation of Hitler's order.

In September 1935, Tranow and his assistants made a major advance in breaking the Royal Navy's most widely used code, the 5-digit Naval Code (German Code Name: München (Munich)), using the method of comparing the routes of a merchant vessel, which were published in Lloyds Weekly Shipping Reports (Lloyd's Register), with the coded reports. [2] [8] [9]

Tranow's growing influence and the increasing importance of his specialty ensured his rise within B-Dienst and eventually, sometime after 1936 he was charged with running the complete cryptanalyst section, even though he was not a Nazi. [10]

At the start of the war, Tranow knew the locations of all the major Fleet Forces. On 11 September 1939 this bore immediate fruit when the B-Dienst read a British message which indicated the assembly points of z convoy. This enabled the Kriegsmarine to dispatch a U-boat U-31 to torpedo the steamer Aviemore on 16 September 1939. [11]

During March 1940, Tranow and his team penetrated the British Merchant Navy Code. [12] A month later the Royal Naval Administrative Cipher was also broken. [12]

Tranow started working on Naval Cypher No. 1 in 1938 and by spring 1940, Tranow's work on British Naval Cypher No. 1 had progressed sufficiently well, that B-Dienst was able to read everything of importance in the lead up to Operation Stratford and with messages revealing plans for the Anglo-French expedition against Norway under the cover name Operation Stratford. [13] Germany seized the initiative and invaded Norway on 9 April 1940. The code was read concurrently during the campaign. Exact data on British counter-measures such as landing fields, and the arrival of transports at Harstad were known in advance, enabling German Armed Forces to take appropriate action. The breaking of the cypher enabled Tranow to read the bulk of British naval traffic until 20 August 1940, when British Naval Cipher No. 2 (German Code Name: Köln (Cologne)) (Naval Cypher) was introduced. From September 1941, Tranow reconstructed the codebook of Naval Cipher No. 2. [12]

In February 1942, the B-Dienst cryptanalyst team broke the 4-digit US-British-Canadian Convoy Cipher, Naval Cipher No. 3 (German Code Name: Frankfurt). Around the same time, the Kriegsmarine introduced the 4-wheel version of the Enigma which immediately rendered the Naval Enigma unreadable to Government Code and Cypher School (GC&CS) Bletchley Park staff of Hut 8. [12] Later in 1942, Tranow compromised the British and Allied Merchants Ships code (BAMS). In March 1942, the capture of a Naval Cipher No. 4 codebook from a merchant vessel in northern waters [14] enabled Tranow to make limited penetrations of British Naval Cipher No. 4 [12] by October 1942. The introduction of Naval Cipher No. 5 in June 1943, and later the introduction of the unbreakable Typex cipher machines in November 1943, ensured Tranow and his B-Dienst team could no longer penetrate Allied ciphers. [15]

After the war, Wilhelm Tranow was such a high value individual that he was picked up by the Allied TICOM organization and interrogated at Flensburg by TICOM Team 6 on 24–25 May 1945.

During 1950, Wilhelm Tranow was working at the Deutsche Presse-Agentur (English: German Press Agency). [16]

Notes

  1. 1 2 David Kahn, Page 200
  2. 1 2 Rezabek, Randy (30 April 2011). "B service (Navy)". TICOM Archive. Open Publishing. Retrieved 25 May 2016.
  3. Richard Woodman (6 July 2011). The Real Cruel Sea: The Merchant Navy in the Battle of the Atlantic 1939-1943. Pen and Sword. p. 387. ISBN   978-1-84468-975-0.
  4. Bauer, Friedrich L. (2007). Decrypted Secrets: Methods and Maxims of Cryptology (4th, revised and extended ed.). Berlin: Springer. p. 472. ISBN   978-3-540-24502-5.
  5. David Kahn (2001). Seizing the Enigma: The Race to Break the German U-boat Codes, 1939-1943. Barnes & Noble Books. p. 246. ISBN   978-0-7607-0863-7.
  6. 1 2 David Kahn, Page 201
  7. 1 2 3 Faulkner, Marcus (1 August 2010). "The Kriegsmarine, Signals Intelligence and the Development of the B-Dienst Before the Second World War". Intelligence and National Security. 25 (4): 521–546. doi:10.1080/02684527.2010.537030. S2CID   154666062.
  8. 1 2 David Kahn, Page 202
  9. Bauer, Friedrich L. (2007). Decrypted Secrets Method and Maxims of Cryptology 4th Edition. Springer. p. 202. ISBN   978-3-540-24502-5.
  10. Kahn, David (1978). Hitler's Spies - The extraordinary story of German Military Intelligence. Reading, Great Britain: Arrow Books Ltd, Hutchinson Publishing Group. p. 203. ISBN   978-0099217206.
  11. David Kahn, Page 204
  12. 1 2 3 4 5 Donal J. Sexton (1996). Signals Intelligence in World War II: A Research Guide. Greenwood Publishing Group. pp. 19–. ISBN   978-0-313-28304-8.
  13. "Review of security of naval codes and cypher's September 1939 to May 1945". The National Archives, Kew. ADM 1/27186. Signal Division, Admiralty. November 1945. p. 63. Retrieved 24 September 2016.PD-icon.svg This article incorporates text from this source, which is in the public domain .
  14. Lance E. Davis; Stanley L. Engerman (4 December 2006). Naval Blockades in Peace and War: An Economic History since 1750. Cambridge University Press. pp. 280–. ISBN   978-1-139-45848-1.
  15. Nigel West (2010). Historical Dictionary of Naval Intelligence. Rowman & Littlefield. p. 27. ISBN   978-0-8108-6760-4.
  16. Tolsdorff, Tim (26 November 2010). "Neue Karriere für die Codeknacker" (in German). Spiegel-Verlag. Der Spiegel. Retrieved 22 December 2020.

Bibliography

Related Research Articles

<span class="mw-page-title-main">Enigma machine</span> German cipher machine

The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the German military. The Enigma machine was considered so secure that it was used to encipher the most top-secret messages.

<span class="mw-page-title-main">Ultra</span> British designation for intelligence from decrypted enemy communications

Ultra was the designation adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the Government Code and Cypher School (GC&CS) at Bletchley Park. Ultra eventually became the standard designation among the western Allies for all such intelligence. The name arose because the intelligence obtained was considered more important than that designated by the highest British security classification then used and so was regarded as being Ultra Secret. Several other cryptonyms had been used for such intelligence.

TICOM was a secret Allied project formed in World War II to find and seize German intelligence assets, particularly in the field of cryptology and signals intelligence.

The Cipher Bureau, in Polish: Biuro Szyfrów ([ˈbʲurɔ ˈʂɨfruf], was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography and cryptanalysis.

Cryptanalysis of the Enigma ciphering system enabled the western Allies in World War II to read substantial amounts of Morse-coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from other decrypted Axis radio and teleprinter transmissions, was given the codename Ultra.

<span class="mw-page-title-main">Hut 8</span>

Hut 8 was a section in the Government Code and Cypher School (GC&CS) at Bletchley Park tasked with solving German naval (Kriegsmarine) Enigma messages. The section was led initially by Alan Turing. He was succeeded in November 1942 by his deputy, Hugh Alexander. Patrick Mahon succeeded Alexander in September 1944.

The B-Dienst, also called xB-Dienst, X-B-Dienst and χB-Dienst, was a Department of the German Naval Intelligence Service of the OKM, that dealt with the interception and recording, decoding and analysis of the enemy, in particular British radio communications before and during World War II. B-Dienst worked on cryptanalysis and deciphering (decrypting) of enemy and neutral states' message traffic and security control of Kriegsmarine key processes and machinery.

German code breaking in World War II achieved some notable successes cracking British naval ciphers until well into the fourth year of the war, using the extensive German radio intelligence operations during World War II. Cryptanalysis also suffered from a problem typical of the German armed forces of the time: numerous branches and institutions maintained their own cryptographic departments, working on their own without collaboration or sharing results or methods. This led to duplicated effort, to a fragmentation of potential, and to lower efficiency than might have been achieved. There was no central German cryptography agency comparable to Britain’s Government Code and Cypher School (GC&CS), based at Bletchley Park.

The Cipher Department of the High Command of the Wehrmacht was the Signal Intelligence Agency of the Supreme Command of the Armed Forces of the German Armed Forces before and during World War II. OKW/Chi, within the formal order of battle hierarchy OKW/WFsT/Ag WNV/Chi, dealt with the cryptanalysis and deciphering of enemy and neutral states' message traffic and security control of its own key processes and machinery, such as the rotor cipher machine ENIGMA machine. It was the successor to the former Chi bureau of the Reichswehr Ministry.

The Short Signal Code, also known as the Short Signal Book, was a short code system used by the Kriegsmarine during World War II to minimize the transmission duration of messages.

The German Naval Intelligence Service was the naval intelligence department of the Germany Navy and had a long history, going back to the naval aspirations of German emperor Wilhelm II in 1899.

The Short Weather Cipher, also known as the weather short signal book, was a cipher, presented as a codebook, that was used by the radio telegraphists aboard U-boats of the German Navy (Kriegsmarine) during World War II. It was used to condense weather reports into a short 7-letter message, which was enciphered by using the naval Enigma and transmitted by radiomen to intercept stations on shore, where it was deciphered by Enigma and the 7-letter weather report was reconstructed.

The Pers Z S was the Signal Intelligence Agency of the German Foreign Office before and during World War II. It consisted of two cryptologic sections. Pers Z S was the cryptanalytic section which was called Special Service of Z Branch of the Foreign Office Personnel Department. Its mission was the solution of foreign diplomatic codes and ciphers. The other section, which was the Cryptography Section was called Personal Z Cipher Service of the Federal Foreign Office. The latter section was responsible for compilation, distribution and security of Foreign Office codes and ciphers. Both were colloquially known as Pers Z S. Though similar in nature and operation to the OKW/Chi cipher bureau, it was a civilian operation as opposed to the military operation at OKW/Chi and focused primarily on diplomatic communications. According to TICOM interrogators it evinced an extraordinary degree of competence, primarily driven by a consistency of development not found in any other German signals bureau of the period. Pers Z S/Chi was the symbol and the code name of the Chiffrierdienst, i.e. the Cryptanalysis Department of Pers Z S. Although little is known about the organization, in the final analysis, Pers Z S labored at diplomatic cryptanalysis for a regime for which there were no diplomatic solutions.

<span class="mw-page-title-main">Wilhelm Fenner</span>

Wilhelm Fenner was a German cryptanalyst, before and during the time of World War II in the OKW/Chi, the Cipher Department of the High Command of the Wehrmacht, working within the main cryptanalysis group, and entrusted with deciphering enemy message traffic (Cryptography). Wilhelm Fenner was considered an excellent organizer, an anti-Nazi, an anti-Bolshevik and a confirmed Protestant and was known by colleagues as someone who was keen to continue working in cryptology after World War II. To quote military historian David Alvarez:

Erich Hüttenhain was a German academic mathematician and cryptographer (Cryptography) and considered a leading cryptanalyst in the Third Reich. He was Head of the cryptanalysis unit at OKW/Chi, the Cipher Department of the High Command of the Wehrmacht.

<span class="mw-page-title-main">Discriminant Book</span>

The Discriminant Book shortened to K-Book (K. Buch), and also known as the indicator group book or identification group book was a secret distribution list in booklet form, which listed trigraphs in random order. The Kenngruppenbuch was introduced in May 1937, and used by the Kriegsmarine during World War II as part of the Naval Enigma message encipherment procedure, to ensure secret and confidential communication between Karl Dönitz, Commander of Submarines (BdU) in the Atlantic and in the Mediterranean operating German submarines. The Kenngruppenbuch was used in the generation of the Enigma message Key that was transmitted within the message Indicator. The Kenngruppenbuch was used from 5 October 1941, for the Enigma Model M3, and from 1 February 1942 exclusively for the Enigma M4. It must not be confused with the Kenngruppenheft which was used with the Short Signal Book.

Otto Buggisch was a German mathematician who, during World War II, was a cryptanalyst working in the cipher bureau of the Supreme Command of the Armed Forces, the Cipher Department of the High Command of the Wehrmacht (OKW/Chi) responsible for deciphering of the opposing forces Communications. He also dealt with the security control of own key procedures. Through research and revelations exposed by two Polish officers, late in the war, he recognized the true cryptographic weaknesses of the Enigma rotor cipher, key machine used by the German armed forces to encrypt their secret communications, in World War II.

<span class="mw-page-title-main">Erhard Maertens</span>

Erhard Maertens or Eberhard Maertens was a German Vizeadmiral of the Kriegsmarine during World War II. From 16 June 1941 to 5 May 1943, he was Chief of Office of Naval Intelligence, Naval War Command in the Oberkommando der Marine. Maertens was known for underestimating British intelligence, and specifically, overrating the security of the Naval Enigma cipher machine. In 1941, he held a naval enquiry into the strength of Naval Enigma security after the capture of U-boat U-570, and attributed all the suspicious losses in U-boats at the time to the British Huff-Duff. In the second enquiry, ordered by the Commander-in-Chief of the Navy Karl Dönitz, in May 1943, he investigated a number of areas, which exculpated Enigma security in the end, for the second time, incorrectly blaming British 9.7 centimetre centimetric radar for the massive losses in U-boats by mid 1943.

<span class="mw-page-title-main">Ludwig Stummel</span>

Ludwig Stummel was a German career signals officer with the rank of Konteradmiral, who had a glass eye and a limp and who was in effect, the Chief of Staff of the Naval Warfare department, Naval Communications (4/SKL) of the Kriegsmarine. Stummel was most notable for being the person responsible for the cryptographical security of the Enigma cipher machine and Key M infrastructure security, during World War II. Stummel was replaced at the Kriegsmarine Naval War Command on the 16–17 August 1944 by Fritz Krauss, after becoming ill. Stummel was a fervent Catholic. His faith gave him a moral compass during the latter years of the war. Initially a supporter of Nazis. He became doubtful as the war progressed. He was released from the Kriegsmarine in February 1945.

Hans Karl Georg Heinrich Pietsch was a German mathematician who was most notable for being a director of the Mathematical Referat of the Wehrmacht signals intelligence agency, the General der Nachrichtenaufklärung during World War II.