World War I cryptography

Last updated

With the rise of easily-intercepted wireless telegraphy, codes and ciphers were used extensively in World War I. The decoding by British Naval intelligence of the Zimmermann telegram helped bring the United States into the war.

Contents

Trench codes were used by field armies of most of the combatants (Americans, British, French, German) in World War I. [1]

The most commonly used codes were simple substitution ciphers. More important messages generally used mathematical encryption for extra security. The use of these codes required the distribution of codebooks to military personnel, which proved to be a security liability since these books could be stolen by enemy forces. [2]

Britain

Zimmermann telegram as decoded by Room 40 Ztel2.jpg
Zimmermann telegram as decoded by Room 40

British decrypting was carried out in Room 40 by the Royal Navy and in MI1 by British Military (Army) Intelligence.

Russia

France

The French Army employed Georges Painvin, and Étienne Bazeries who came out of retirement, on German ciphers. Due to their prewar activities, the French were more prepared than any other nation involved in the war to decode German radiograms. At the beginning of the war, France had eight intercept stations: Maubeuge, Verdun, Toul, Epinal, Belfort, Lille, Rheims, and Besançon. During the war, they set up many more stations, including one in the Eiffel Tower. According to Colonel Cartier of the War Ministry, France intercepted over 100,000,000 words from German radiograms during the course of the war. [4]

Germany and Austria-Hungary

The Imperial German Army and the Austro-Hungarian Army intercepted Russian radio communications traffic, although German success at the Battle of Tannenberg (1914) was due to interception of messages between the Imperial Russian Army commanders in cleartext.

The German Abhorchdienst, a code-breaking bureau composed mainly of mathematicians, was established in 1916.

The Germans had specific regulations regarding which kinds of codes and ciphers could be used under given circumstances. Within three kilometers of the front lines, known as the danger zone, all communications were required to be in a code known as the three-number code. This was the only code or cipher permitted. Behind this danger zone, another code known as the three-letter code was allowed to be used. Communications between divisions, corps, and army headquarters were done with the ADFGVX cipher. [5]

The ADFGX and ADFGVX field ciphers were a modified polybius system with single order double columnar transposition and frequent key change, with letters optimized for Morse. It was later broken by the famous French cryptanalyst Georges Painvin. The breaking of the ADFGX cipher by Painvin was the second time during the war that cryptanalysis played a major role in shaping events (the first being the interception and cracking of the Zimmerman Telegram). By breaking the cipher, the French were able to decode an intercepted message about the forwarding of munitions for a German offensive, letting the French know where and when the offensive would occur, and thus allowing them to stop it. This message became known as "The Radiogram of Victory." [6]

United States

Herbert Yardley began as a code clerk in the State Department. After the outbreak of war he became the head of the cryptographic section of Military Intelligence Section (MI-8) [7] and was with the American Expeditionary Force in World War I as a Signals Corps cryptologic officer in France. He later headed the Cipher Bureau, a new cryptanalysis group started in 1919, immediately after World War I, and funded jointly by the State Department and the US Army.

Some American cryptography in World War I was done at the Riverbank Laboratories , Chicago, which was privately owned by Colonel George Fabyan. Elizebeth Friedman, William F. Friedman and Agnes Meyer Driscoll worked there.

The US Navy used the cryptographic code A-1. The US Navy cryptanalysis group, OP-20-G, was also started after World War I (in 1922).

The US also started employing Indian code talkers in World War I, initially with members of the Cherokee and Choctaw tribes.

See also

Related Research Articles

<span class="mw-page-title-main">Cryptanalysis</span> Study of analyzing information systems in order to discover their hidden aspects

Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classical cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.

In cryptography, the ADFGVX cipher was a manually applied field cipher used by the Imperial German Army during World War I. It was used to transmit messages secretly using wireless telegraphy. ADFGVX was in fact an extension of an earlier cipher called ADFGX which was first used on 1 March 1918 on the German Western Front. ADFGVX was applied from 1 June 1918 on both the Western Front and Eastern Front.

<span class="mw-page-title-main">John Tiltman</span> British military officer and cryptographer (1894–1982)

Brigadier John Hessell Tiltman, was a British Army officer who worked in intelligence, often at or with the Government Code and Cypher School (GC&CS) starting in the 1920s. His intelligence work was largely connected with cryptography, and he showed exceptional skill at cryptanalysis. His work in association with Bill Tutte on the cryptanalysis of the Lorenz cipher, the German teleprinter cipher, called "Tunny" at Bletchley Park, led to breakthroughs in attack methods on the code, without a computer. It was to exploit those methods, at extremely high speed with great reliability, that Colossus, the first digital programmable electronic computer, was designed and built.

The Cipher Bureau was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography and cryptanalysis.

<span class="mw-page-title-main">Room 40</span> Cryptanalysis section of the British Admiralty during World War I

Room 40, also known as 40 O.B., was the cryptanalysis section of the British Admiralty during the First World War.

Cryptography was used extensively during World War II because of the importance of radio communication and the ease of radio interception. The nations involved fielded a plethora of code and cipher systems, many of the latter using rotor machines. As a result, the theoretical and practical aspects of cryptanalysis, or codebreaking, were much advanced.

<span class="mw-page-title-main">Georges Painvin</span> French cryptographer (1886–1980)

Georges Jean Painvin was a French geologist and industrialist, best known as the cryptanalyst who broke the ADFGX/ADFGVX cipher used by the Germans during the First World War.

Giovanni Soro was an Italian professional code-cracker. He was the Renaissance's first outstanding cryptanalyst and the Western world's first great cryptanalyst. Soro is known as the father of modern cryptography.

Before the development of radar and other electronics techniques, signals intelligence (SIGINT) and communications intelligence (COMINT) were essentially synonymous. Sir Francis Walsingham ran a postal interception bureau with some cryptanalytic capability during the reign of Elizabeth I, but the technology was only slightly less advanced than men with shotguns, during World War I, who jammed pigeon post communications and intercepted the messages carried.

The cipher system that the Uesugi are said to have used is a simple substitution usually known as a Polybius square or "checkerboard." The i-ro-ha alphabet contains forty-eight letters, so a seven-by-seven square is used, with one of the cells left blank. The rows and columns are labeled with a number or a letter. In the table below, the numbers start in the top left, as does the i-ro-ha alphabet. In practice these could start in any corner.

The Cipher Department of the High Command of the Wehrmacht was the Signal Intelligence Agency of the Supreme Command of the Armed Forces of the German Armed Forces before and during World War II. OKW/Chi, within the formal order of battle hierarchy OKW/WFsT/Ag WNV/Chi, dealt with the cryptanalysis and deciphering of enemy and neutral states' message traffic and security control of its own key processes and machinery, such as the rotor cipher ENIGMA machine. It was the successor to the former Chi bureau of the Reichswehr Ministry.

The German Naval Intelligence Service was the naval intelligence department of the Germany Navy and had a long history, going back to the naval aspirations of German emperor Wilhelm II in 1899.

The Pers Z S was the signals intelligence agency of the German Foreign Office before and during World War II. It consisted of two cryptologic sections. Pers Z S was the cryptanalytic section which was called Special Service of Z Branch of the Foreign Office Personnel Department. Its mission was the solution of foreign diplomatic codes and ciphers. The other section, which was the Cryptography Section was called Personal Z Cipher Service of the Federal Foreign Office. The latter section was responsible for compilation, distribution and security of Foreign Office codes and ciphers. Both were colloquially known as Pers Z S. Though similar in nature and operation to the OKW/Chi cipher bureau, it was a civilian operation as opposed to the military operation at OKW/Chi and focused primarily on diplomatic communications. According to TICOM interrogators it evinced an extraordinary degree of competence, primarily driven by a consistency of development not found in any other German signals bureau of the period. Pers Z S/Chi was the symbol and the code name of the Chiffrierdienst, i.e. the Cryptanalysis Department of Pers Z S. Although little is known about the organization, in the final analysis, Pers Z S labored at diplomatic cryptanalysis for a regime for which there were no diplomatic solutions.

<span class="mw-page-title-main">Wilhelm Fenner</span>

Wilhelm Fenner was a German cryptanalyst, before and during the time of World War II in the OKW/Chi, the Cipher Department of the High Command of the Wehrmacht, working within the main cryptanalysis group, and entrusted with deciphering enemy message traffic (Cryptography). Wilhelm Fenner was considered an excellent organizer, an anti-Nazi, an anti-Bolshevik and a confirmed Protestant and was known by colleagues as someone who was keen to continue working in cryptology after World War II. To quote military historian David Alvarez:

General der Nachrichtenaufklärung was the signals intelligence agency of the Heer, before and during World War II. It was the successor to the former cipher bureau known as Inspectorate 7/VI in operation between 1940 and 1942, when it was further reorganised into the Headquarters for Signal Intelligence between 1942 and 1944, until it was finally reorganised in October 1944 into the GdNA. The agency was also known at the OKH/Gend Na, GendNa or Inspectorate 7 or more commonly OKH/GdNA. Inspectorate 7/VI was also known as In 7 or In/7 or In 7/VI and also OKH/Chi.

Otto Buggisch was a German mathematician who, during World War II, was a cryptanalyst working in the cipher bureau, the Cipher Department of the High Command of the Wehrmacht (OKW/Chi) responsible for deciphering of the opposing forces Communications. He also dealt with the security control of own key procedures. Through research and revelations exposed by two Polish officers, late in the war, he recognized the true cryptographic weaknesses of the Enigma rotor cipher, key machine used by the German armed forces to encrypt their secret communications, in World War II.

Ferdinand Voegele was a German philologist and linguistic cryptanalyst, before and during the time of World War II and who would eventually lead the cipher bureau of the Luftwaffe Signal Intelligence Service.

General der Nachrichtenaufklärung Training Referat was the training organization within the General der Nachrichtenaufklärung (GDNA), the military signals intelligence agency of the Wehrmacht during World War II. Initially established from May 1941, it continued teaching until September 1944. Until 1942, the work of the Training Referat was not fully exploited and only a small beginners course was taught.

References

  1. Walker, Julian (2014-07-23). "Trench talk: a guide to first world war slang". The Guardian. ISSN   0261-3077 . Retrieved 2019-04-17.
  2. Lerner, Adrienne. "World War I". Espionage Information: Encyclopedia of Espionage, Intelligence, and Security. Advameg, Inc. Retrieved 27 March 2015.
  3. Flicke, Wilhelm. "The Beginnings of Radio Intercept in World War I" (PDF). National Security Agency.
  4. Kahn, David (1967). The Codebreakers. Scribner.
  5. Friedman, William (1977). Solving German Codes in World War I. Aegean Park Press.
  6. Kahn, David (1982). "In Memoriam: Georges-Jean Painvain". Cryptologia. 6 (2): 120–127. doi:10.1080/0161-118291856939.
  7. Kahn, David (1996). The Codebreakers: the Story of Secret Writing. New York: Scribner. p. 352. ISBN   0-684-83130-9.