Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
TICOM Vol. 2 - Notes on German High Level Cryptography

TICOM Vol. 2 - Notes on German High Level Cryptography

Ratings: (0)|Views: 606|Likes:
Published by Robert Vale

More info:

Published by: Robert Vale on Sep 20, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/20/2011

pdf

text

original

 
"'i.;
WDGAS-14
CHIEli'
#
AR1JIY
SECURITY
AGENCY
1
May
1946
CRYPTOGRAPHY
Prepared'underthe
direction
of
~ ~ e
~
VOLUME
2 - ~ N O T E S
ON
GERMAN
HIGH
LEVEL
o
o
~ : t ,
.
~
c,m,
~
./II
" " : ' ; ' ~
r
~ . '
'"""'!!Ib_
OJ
~ , .
"".
"''-l
~
0<1<:1
~
(I)
~
~ l ~ ,
.
,.,:t;.
...
'.
EUHOPEAN
AXISSIGNALIN'l'ELL:rGENCEIN
WORLD
'of.i;ill·
Ii;;'
c:
AS
l1E1/EALED
BY
"TICOM"INVESTIGATIONS
§ ~ .
,;,1
, ~
6
"'""'i/
AND
BY
OTHER
IPRI80NER
OF
WAR
INTERROGATIONS
; ~ . i ,
' ~ · ·
.•
·"'Ii
:2
.
','.
"
PRINCIPALLY
q E R M A I ~ -
~
'-
..
ARMY
SECURITY
AGENCY
Washington,
D ~
c.
.
,
A N D ~ T A l i A L F ; Y , = , S I F : S : ; ' o " , - ' S - e d - - ~ 1 " " 2
~ 7
--M-IA-Y:"'1-94-1";'"
.
I ~ ~ I
---"----'-'---:-----1
EXEMPT
"
! p · ; ~ . : ; ' L ] : .
NC).
i
j 5 ' 4 ~ - t l f
C l a ~ s i f i e d / E x t e n d e d
by
DIRNSA/CHCSS
Reason:
NSA
Declassifi.cation
Guidelines
I
I
q
(ffl
e
i ~ ~ ~ e ! i e w
O ~
: - - l ~ ~ k L ~
l . . . q J ' _ ~ _ ~ _ ' ~ ; ) M . . ~ ~ ~ I N _ S
....,'P_S
_N_o_,
----,!_L'·.J.'/
~ I ' - L : : a : . . - ·
-f
'-,
~ a t e
I
/Indexed
~ ) e c l a s s i f i
edand
approv'ed
for'elease
b'i
[",jS,A.
on
06-01-2009)ursuant
to
E()
12958,
as
amendedDeclass58017
~ ' T ' ' l ' ' ~ ~ - ~ ' ' - ' ' ' ' ' ' C - C
ft:!,
,.
',,'
m ~ : · ~ i ' : i : : : ; : " " ' : : ·
~ O C I D
:3560816
."
,
 
DOClD:
3560816'
NOTES
ON
GERMAN
HIGH
LEVEL
CRYPTOGRAPHY
AND
CRYPTANALYSIS
Chapter
IThe
Paradox
·ofGerman
High-Level
Cryptogra.phy
-
Chapter
II
The
Enigma
Cipher
Machine
./
Chapter
.III
Telepr:l.nter
CryptogI'aph1c
ApparatusChapter
IV
Cipher
Device
41,
the
C1pherBox,
the
CipherDisk,
and
the
"Number
Printer.
I'
Chapter
V.German
Ciphony
Chapter
VI
German
uI
.:a.M."
and
Rapid'
Analytic
Machinery
Chapter·
VII.
Germa.n
Cryptanalytic
Methods
,
,'-
,-
..
..:
.......
.
....
, ~ . ~
-
·1
i
.
,------
- - - . - ~ ~ - -
. _ , , - - ' - - - - ~
__
:._
.
:_
'
•.
' \ : ~ , .
_
~ : . . i - , - " ~ ~ ¥ ~ . : - " / - _ , , , , _ ~ _ .
..
' . : _ ~ J .
 
DocrD:
3560816
_Volume2Chaptel'·
I
The
Paradox
of
Ge:ma.n
High-LevelCryptography
Paragraph
German
high-level
cryptographic
systems
were
insecuJ:,e,
801
though
brilliantly
concel
ved
•••.•
'..
....
1
German
military
cryptographers.hadsecure
cipher
device3under
development
•••..••••.•••..•.••..•••••
2
German
se,::urlty
studies
revealed
only
theoretical
weaknesses
of
tnetr
cryptography
..•.••........•.••.
3
Interrogation
of
A n g l o ~ A m e r i c a n p r i s o n e r s
failed
to
disclose
German
cryptographic
weaknesses
...•.••.•.•
4
1.
German
hi
-level
cr
pto
ra
hic
s
stems'were
insecure,
, ~ ,
although
brl
liantly
conce
ve
--
German
h
gh-
eve
crypto
graphy
"la,s
bril11antIy
conce!Ved
(as
will
be
shown
inthis
volume)
but
more
brilliantly
conceived
cryptanalytic
pro
cedures
a,nd
large
expendi
t u r e ~
i.n
manpo'Yrer
and
p·,r",chinery
by
the
United
States
and
Br1sish
G,overnments,
in
one
of
the,
~ o s t
dramatic
chapters
of
World
War
II,
accompliahed
daily
Af,v.
__
··SolutiOnf:L,.bf.
Gez:man
high.,.levelsystems
that
cost
Germany
, ~ ; .
heavUy,
.,ifthey
didnot,
as
some
believe,
bring
about
actual
-
defeat.
For
instance:
,
a.
TheGerman
AirForee
lost
the
Battle
of
'England
in
, 1 ~ 4 0 ,
pal:,tly
beea..use
it
entrusted
l
bomber-targetinformation
to
theinsecureAir
Force
Enigma.Unknown
to
and
evenun
suspected
by
the
Germans,
their
operations
from
this
date
~ _ o J L w e r e
constantly
embarrassed
by
thecryptographic
insecurity
of
this
lmachine.
b.
The,
German
Army
suffered
terrific
c a s u a ) ~ ~ ~ ~
and
losses,
of
materiel
in
Africa
and
on
thecontinent
because
.
---9f_bl'ind.,falth
in
two
of
its
high
level
mUit;ary
cryptographic
machines:
the
Army
Enigma,
and
the
teleprinter
·cipher
attach
ment
"sz·-42.
tI
Both
were
insecure.
2
IThe
great"
debt
England
owes
itr..crypta.naJ.ysts
is
to
be
re
corded
1n
a
history
of
the
GovernmentCodea.ndCypher
School,
London
l,
to
be
availa.ble
in
the
fall
of
1946.
The
statementhere
is
based
on
verbal
information
from
intelligenceofficers
and
eryptanalyatsof
the
School,
and
awaits
proper
documenta-
,tion.This
history
will
also
include
data
regarding
the
German
Army
and
~ a v y
Enigmas.
'2A
writt.en
report
by
Brigadier
E.
T.,
Williams,
chief
intelli
gence·
officer
toField
Marshall
Montgomery,
5
October
1945,
to
be
included
in
the
GovernmentCode
and
Cypher
School
his
tory,
gives
specific
examples
bearing
out
this
statement.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->