You are on page 1of 49

Ashbrook Statesmanship Thesis

Recipient of the 2009 Charles E. Parton Award

BLETCHLEY’S SECRET WAR:


BRITISH CODE BREAKING IN THE
BATTLE OF THE ATLANTIC
Colleen Carper

The Battle of the Atlantic was the dominating factor all throughout the war. Never for one
moment could we forget that everything happened elsewhere, on land, at sea, or in the air,
depended on its outcome, and amid all our other cares, we viewed its changing fortunes day by
day with hope or apprehension . . . Amid the torrent of events one anxiety reigned supreme.
Battles might be won or lost, enterprises succeed or miscarry, territories might be gained or
quitted, but dominating all our power to carry on the war, or even keep ourselves alive, lay out
master of the ocean routes and free approach and entry to our ports. – Winston Churchill

The King hath note of all that they intend,


By interception which they dream of not. – Henry V, Act II, scene ii. Library, Bletchley Park

Introduction procuring the victory.” 1 To wage a success-


ful war against any enemy, Great Britain
The Battle of the Atlantic was the would need a steady flow of materials;
longest, largest, and most complex naval without vital supplies, Britain could not
battle in wartime history, beginning on the expect victory in the European theater. In
first day of the war, September, 3, 1939, and addition to supplies, troops from Canada and
continuing until the last on May 8, 1945. Australia would need to be transported to
The fighting on and under the waves was Europe in order to bolster British armed
crucial to both sides, and ultimately could forces.
determine the outcome of the war, as control A victory for Great Britain in the
of the Atlantic Ocean was vital for Great Battle of the Atlantic would mean the secure
Britain. In order to fuel the war effort and and regular passage of ships carrying vital
feed its population, Great Britain needed war supplies across the ocean, which would
supplies and raw materials that were further their war effort against the Axis
imported from around the world on powers. Furthermore, by securing the sea
vulnerable ships. Winston Churchill noted in lanes, many Britons hoped for a cross
early 1941: “It is the Battle of the Atlantic channel invasion which would threaten
which holds the first place in the thoughts of Germany with a two front war. If the
those upon whom rests the responsibility for Western Allies did not gain the upper hand
___________________________________ in the Battle of the Atlantic, Great Britain
might very well have been forced out of the
Colleen Carper, of Louisville, Ohio, is a
2009 graduate of the Ashbrook Scholar 1
Andrew Williams, The Battle of the Atlantic:
Program, having majored in Political Hitler's Gray Wolves of the Sea and the Allies'
Science and History. Desperate Struggle to Defeat Them (New York:
Basic Books, 2003), 115.

1
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

war because of a shortage of food, troops, British cryptanalysts did experience delays
and critical supplies. Without Great Britain in decryption. Depending on the information
as an active participant in the war, the end that cryptanalysts possessed, it could take
results might have proved disastrous for hours, days, or even weeks for ciphers to be
Allies forces. Therefore, the British Admi- decrypted. While British cryptanalysts were
ralty employed several methods of anti- able to build on the decryption methods
submarine warfare to combat enemy naval previously used by Polish intelligence, it
vessels. would require the capture of code books and
For decades after the war, Allied vital information regarding the Enigma
victory in the Battle of the Atlantic was machine’s daily settings that would result in
attributed to radar, sonar, long-range British breaks into the German cipher
aircraft, and improved convoy tactics. system.
However, the revelation of one form of Deciphering thousands of messages
British intelligence in 1974 would rewrite throughout the duration of the war, British
history. To the world’s astonishment, the intelligence worked to decrypt German
war at sea had not simply been won by transmissions quickly enough for them to be
military genius and tactics, or by the courage operationally useful. The information gained
of those individuals who fought for the from Ultra decryptions not only allowed the
Allies. It was vital information that was British admiralty to reroute convoys which
decrypted from encoded German radio were in the path of German U-Boats, but it
transmissions that gave the British the upper also aided in the destruction of various
hand over the Germans at various stages of German vessels. Without this important
the war. Noted by historians as one of the source of intelligence, the British would
most important sources of British intelli- have a suffered a greater loss of men and
gence that the Allies possessed, 2 the inform- material during the Battle of the Atlantic.
ation gained from German decryptions,
codenamed Ultra, provided the British Early Breaks into the Enigma
Admiralty with insight into high-level Cipher: 1932-1939
German intelligence and the location of U-
Boats well beyond the range of aerial The practice of cryptology, the
reconnaissance missions. method of changing text so that it is
While Ultra was not the deciding unreadable to others,3 was not a new idea in
factor in the Battle of the Atlantic, this work World War II. Early coding systems were
will attempt to understand Ultra’s role in developed by Julius Caesar to conceal
British intelligence and its influence on the messages, and various ciphering techniques
war at sea. Of all the coded messages that were used in the Franco-Prussian War, the
the German military enciphered on the Boer Wars, and World War I. In World War
Enigma machine, naval ciphers would prove I, methods of encrypting messages centered
to be some of the most difficult codes to on words, syllables, phrases, and code
break during the war. Because of the words. After the war, code breaking became
complexity of the naval Enigma ciphers, mechanized, employing mathematical know-
2 ledge and ciphers or the method of
Ralph Erksine, 2000, Afterword to Very Special
Intelligence: The Story of the Admiralty’s substituting individual letters in a message.
Operational Intelligence Centre 1939-1945; or
3
Codebreaking in the Battle of the Atlantic, by Rudolf Kippenhaun, Code Breaking: A History and
Patrick Beeley (Annapolis: Naval Institute Press, Exploration (New York: The Overlook Press, 1999),
1977), 263. 31.

2
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

The practice of ciphering converts a machines of the past was that the rotor or
message into symbols that have no meaning code wheel in Scherbius’s machine could
without the key that was used to encipher rotate. After a letter was typed on the
the message. Without knowledge of the keyboard, the rotors would turn so that
cipher key, messages would appear as a entered double letters would not produce the
jumble of meaningless letters to enemy same output letters. For example, a double
interceptors. The radio transmissions of the “b” might result in a “y” then a “d.” How-
German military and government in World ever, an early weakness of the Enigma
War II were enciphered on a machine named machine lay in the use of the twenty-six
the Enigma. Resembling a typewriter housed letters of the alphabet. If the same letter was
in a wooden box, the Enigma later became hit twenty-six times, the first output letter
one of the best known cipher machines of and the twenty-seventh output letter would
the time. Over the course of the war, be the same. Scherbius soon recognized this
Germany used over 80 variations of codes, weakness, and a second rotor was added to
all enciphered on the Enigma machine. the machine. This complex rotor was
The Enigma machine itself was different than the first in that it turned one
developed and patented by Arthur rotation after the first wheel had made
Scherbius, a German electrical engineer, in twenty-six complete turns. In this model, the
1918. Reportedly named for Enigma first output letter and the 677th output letter
Variations, a piece composed by Sir Edward were the same. With the addition of rotors,
Elgar, the first Enigma machines were used the number of times a letter must be hit
by German railway systems and banks to before the sequence of code letters repeated
keep the details of monetary transactions lengthened by a factor of twenty-six. There-
secure. These Enigma machines were fore, if four rotors were a part of the Enigma
unclassified and could even be purchased machine, the first and 456,977th output
commercially in the 1920s. Weighing only letters would be the same; with five rotors
about fifteen pounds, and with dimensions the first and 11,881,377th output letters
of 4.5 by 10 by 10.75 inches, the secret to aligned.
this enciphering machine was its interior. In the late 1920s, German engineers
The Enigma consisted of a Continental Paul Bernstein and Willi Korn made various
QWERTZU keyboard and another board improvements to the Enigma machine.
with lights that corresponded to each letter Bernstein created a removable ring with
of the alphabet. The machine was powered indicator letters on each rotor; this ring
by batteries, and pressing one letter such as could be locked into place in any of the
an “a” would light up another letter such as twenty-six positions around the rotor.
“p.” Inside the machine were three Thanks to this innovation, the indicator
removable rotors. Each rotor possessed a letters no longer had any relation to the
non-conductive wired code wheel with position of the rotors, so that a particular
twenty-six electrical contacts–one for each letter did not mean that a rotor was in any
letter of the alphabet–that were randomly particular position. This improvement made
connected to another twenty-six contacts on the position of the alphabet ring on the rotor
another rotor. The random internal wiring of now part of the cipher key. Bernstein also
rotors was secret, and thus determined the moved the notches, or contacts, on the rotor
final output code. Past enciphering machines to the ring that surrounded the rotor. This
would often use rotors; however, what set change eliminated the relationship between
the Enigma machine apart from the the rotor movement and the rotor encipher-

3
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

ing method, which created a larger obstacle The German army and navy realized
for code breakers to overcome. In an attempt the potential of the Enigma machine and
to make the machine’s ciphers even harder officially adopted it to encode classified
to break, Willi Korn designed rotors that messages by 1928.6 However, concerned
were removable. The leftmost rotor was now with both external and internal security
known as the reflector rotor and would not issues, the German military’s aim was to
turn. This rotor would send the electrical prevent its enemies from reading its mes-
current back through the rotors on a sages, while at the same time, preventing
different path from which it came, further other German units from reading messages
enciphering the original message. It also that were not intended for them. While all of
only had thirteen connectors instead of the the messages were encrypted on identical
twenty-six possessed by the other rotors. Enigma machines, the army could not read
This new method of enciphering the messages from Hitler’s private army, the
created both advantages and disadvantages. SS, or Schutzstaffel. Therefore, different
The idea of sending the electrical current keys were used for different types of
back through the rotors complicated the military radio traffic. However, messages
system–a letter could go through up to seven were transmitted on the same radio waves.
substitutions before the output letter was In order to alert Enigma operators if they
revealed, eliminating the possibility for a had the key to read a message intended for
simple cipher substitution. Furthermore, the their organization, three letters were used
change also eliminated the possibility of before the enciphered message in the
enciphering text when the machine was set unenciphered text. Operators would first
in deciphering mode. At the same time, this look at this group of letters to determine if
method allowed for the revealing of some the message was directed to them. Further-
plaintext when it was discovered because no more, after a series of improvements to
letter could represent itself. This disadvan- make the device more secure, the Germans
tage made it possible to find solutions by considered it an advantage that even if an
eliminating possibilities that were not Enigma machine was captured, it could not
probable. Scherbius in 1918 wrote to the be decrypted unless the other operator
navy: “They key variation is so great that, possessed a machine with identical settings.
without knowledge of the key, even with an In 1925, the German navy ordered
available plaintext and cipher text and with the production of the Enigma machine with
the possession of a machine, the key cannot not only regular letters but also umlauts.
be found, since it is impossible to run Originally, the army did not use umlauts in
through 6 billion keys [based on seven its Enigma machines and employed the
rotors].”4 If one did not possess the cipher QWERTY keyboard while only using three
key and wanted to figure out the code, with rotors. Only officers could set the key
an Enigma machine with seven rotors and positions, which guaranteed further security.
the ability to test a different key setting In order to avoid superimposition–that is,
every half minute on 100 machines, it would the method of having many messages
take 5.8 years to break just one sent code.5 encrypted in the same way–officers chose
starting key positions that were far apart in
distance on the keyboard. The lower the
4
David Kahn, Seizing the Enigma: The Race to
6
Break the German U-Boat Codes 1939-1943 (New Joseph E. Persico, Roosevelt's Secret War: FDR
York: Barnes & Nobel Books, 1991), 33. and World War II Espionage (New York: Random
5
Ibid, 33. House, 2001), 107.

4
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

rank of the officer, the fewer keys he the setting list for the machine, the position
possessed. The Germans also utilized a plug of rotors and indicators, the tables for
board, a board consisting of twenty-six enciphering indicators, and the ring position.
double jack plugs, which added extra While other branches of the German
substitution. Twelve letters were chosen by military during the early years of the war
commanders and these letters could be used Enigma machines with only three
substituted for another one of the twelve rotors, the naval Enigma operator had eight
which further enciphered the message. rotors to choose from, any three of which
The Enigma machines used by the could be used for the day’s setting.
German navy were more complex than those Therefore, the daily number of possible
of the other military branches. In August of rotor order settings for the naval Enigma
1934, the navy, instead of using three rotors machine was 336. This additional security
like the army, chose to use seven. In late measure made the ciphers of the German
1939, improvements were made to the sixth navy some of the most complex and
and seventh rotors. Notches were added in sophisticated codes of the war. German
the alphabet rings next to the letters H and naval cipher clerks were responsible for
W, which caused the rotor to move one sending out encrypted messages in Morse
space when it reached those letters in the code. Often, original messages from German
previous revolution. This important advance headquarters were encrypted to specific
reduced the possibility of a successful submarines or the entire fleet, or messages
superimposition. To further the complexity were sent from submarines to headquarters.
of the codes, different cipher keys were used Each submarine had an identical Enigma
for home waters and foreign waters. Further- machine in which the operator would enter
more, generals and officers often possessed the encrypted code into the machine. The
their own plug board settings, while staff daily keys that Enigma operators received
possessed different inner settings. To add to from the German High Command listed the
the security, the rotors and the boxes in three rotors that were to be used for the day
which the Enigma machines were held were and their order from left to right. The key
heavily guarded. Men who were in charge of also revealed the starting position of each
the rotor settings were ordered to keep the rotor with a single letter; the rotor’s alphabet
information secret and were threatened with ring would then be turned so the letter
charges of treason if the information was indicated would show through the hole in
leaked. The act of setting the inner workings the machine. Finally, the key gave the
of the machine was also closely monitored. operator the plug board settings, which
On top of all of these safety precautions, any further substituted letters.
naval cryptographic materials, such as the In order to set up the machine, the
log books, which contained the month’s Enigma operator had to follow a long,
Enigma settings, were printed in water complex procedure which involved the
soluble red ink on pink paper. If the book random selection of three letters as an
would be submerged, the text on the page indicator group and their encipherment with
would bleed out and be unreadable to enemy the aid of the bigram tables listed for the day
forces if recovered. With the improvements in order to establish the message key. Once
that were made to the Enigma machine, the operator possessed the key, the three
enemy forces now needed to possess five letters were pressed on the keyboard, one
key elements to successfully read ciphers: an after another, and the letters that lit up as a
Enigma machine, a code book which held result were recorded. The Enigma rotors

5
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

were then reset so the enciphered three situation, it would only then take 900
letters that showed though the top of the million years to break one message.8
machine were the recorded letters. Finally, By the beginning of the 1930s,
the machine was ready to encrypt messages. French and British intelligence had received
Enigma operators on the receiving end little information, mainly generalities, about
would have their Enigma machines set up in the Enigma machine. However, in 1931, the
the same way, using the same daily keys. Deuxieme Bureau, the French Secret
Then the process would be completed in Service, was approached by Hans-Thilo
reverse; as ciphered text was pressed on the Schmidt, who worked in the Cipher Office
machine, plaintext letters were illuminated, of the Defense Ministry in Berlin. Fond of
revealing the original message. Messages money, Schmidt was willing to sell secret
were often repeated every half hour or German documents to the French. Over the
hourly past the original transmission time to next few years, Schmidt would provide over
ensure that they were decrypted properly. 300 secret documents over the course of
However, without knowledge of the daily nineteen meetings, including the instructions
key, the intended message could not be read for the Enigma machine, photographs of the
by the receiver. The mere possession of an plug board and descriptions of how it
Enigma machine would not reveal the daily worked, and examples of enciphered and
key, and unless one possessed all of the deciphered text. 9 From this information the
required elements for decryption, coded French learned that the Enigma machine
messages could not be read. possessed at least three rotors with movable
To the Germans, the Enigma already alphabet rings. They had also deduced that
seemed like an impossible cipher tool to the reflecting rotor did not possess the
break. Because of the trillions of possi- capability to turn, and that the machine
bilities that the machine could produce, the utilized a plug board which was different
German military and high command were than the commercial Enigma machines.
confident that the ciphers produced by the However, the French did not possess an
Enigma could not be deciphered and read on Enigma machine itself, and without the
a regular basis. With many key possibilities machine, they could not discover where the
available, by the time messages would be electrical circuit traveled within the rotors.
solved, weeks or months would have already Furthermore, because the ciphered messages
passed, thus making them militarily worth- were different from the linguistically coded
less. There were no fewer than 10.5 quad- messages of the First World War, and
rillion possible keys for each message. French intelligence lacked mathematical
Ultimately, even with 1,000 cryptanalysts, cryptanalysts, they did not know how to
each of whom possessed four captured or further work on breaking the ciphers.
copied keys that they tested every minute of However, mathematicians in Poland, a
every day, it would still take 1.8 billion French ally, did have a background in
years to test them all.7 However, code mathematical ciphers, so the French passed
breakers normally would only test the along information about the Enigma to
plaintext until about halfway through the Polish intelligence in hopes that they could
message, when they would realize that the produce a solution.
jumble of letters was a product of the
incorrect key. If this fact was taken into 8
Ibid.
account with cryptanalysts in the same 9
Michael Smith, Station X: The Codebreakers of
7
Bletchley Park (London: Pan Books, 1998), 32.
Kahn, 68.

6
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

Marian Rejewski, a Polish mathe- equations that upon solving would reveal the
matician and cryptologist, was assigned to wiring on the fastest moving rotor, Rejewski
attempt to find a solution to the Enigma worked around the clock to discover a
machine. In 1932 along with Rejewski, solution. The twenty-six elements of the
fellow mathematicians and cryptologists equations–the values–were unknowns. How-
Henryk Zygalski and Jerzy Różycki also ever, these unknowns could be reduced to
worked to recover daily key codes. In groups: the numbers representing the wiring
addition, the Polish team was given replicas of the fastest rotor, the numbers representing
of early commercial AVA Enigma machines the combined wiring of the middle and left
which were produced by the Radio Manu- rotors and the reflector, and the connection
facturing Company. Though the Germans of the six pairs of the plug board.
had adapted their machines from the comer- The last unknown was the order of
cial Enigma, the commercial machines were the letters on the alphabet ring on the rotor.
a start to revealing the inner workings of the However, upon gaining from Schmidt
Enigma. Early on, the Poles deduced that the Enigma key settings and plug board settings
initial key was repeated over the air waves for both that September and October, the
in case the receiver on the other end missed equation was simplified. The Poles then
the initial key code or if the code was lost in discovered that the alphabet ring simply
static or transmission. The Poles also followed the alphabet–A, B, C, etc. While
understood that the Germans also managed the Germans could have arranged the letters
to change the rotor order every three in millions of ways, they chose to simply
months, while the key changed daily. To follow the alphabet. This important piece of
send a new key, the Enigma operator would information made the solution of the wiring
turn the rotors so that the past day’s key of the fastest or leftmost rotor possible.
would appear in the cover. The key usually Without the keys that the Poles had gained,
was a combination of three non-adjacent they would not have been able to solve the
letters such as “pdj” or “rsn.” Then the new wiring of the first rotor. Rejewski later
key was sent twice: “hwmhwm” which wrote: “To this day it is not known whether
would then be received as “pdnmzz.” The equation 3 [the order of the letters on the
operator would then enter “pdnmzz” into the rotor] is solvable… It required the posses-
Enigma to receive that day’s key: “hwm” sion of messages from two days of identical
and then change the letters that appeared in or very similar settings of the rotors; there-
the cover window accordingly. fore, finding the wiring of the rotors would
Eventually Rejewski discovered that depend on luck.”10 Later, Schmidt was able
strings of letters in the coded messages to provide the Poles with materials and
created chains in the first and fourth letters information that led to the construction of
of indicators because the plug board the wiring in the Enigma's rotors and
connections, rotor order, alphabet ring and reflector.
rotor start position were the same. The The order of the rotors was the next
chains would eventually close and appear if challenge for the Poles. In a normal day,
enough letters were used. Using high level code breakers needed 60-100 intercepts in
algebra and theorems in the theory of order to begin to break the day’s key code.11
groups, Rejewski was able to discover that If enough messages were intercepted,
the plug board, which the Germans thought
added to the security of the Enigma, could 10
Kahn, 66.
be ignored in his equations. Setting up six 11
Ibid., 70.

7
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

incorrect settings of the Enigma machine test 17,576 ring positions.12 Ultimately, if
could be eliminated, leaving the correct the code breakers could discover the rotor
setting for the day. In these intercepts, order, the rotor setting, and the ring setting,
chains of letters were created. The Poles they could decipher a message in a day
would convert these chains of letters into rather than years. The plug board, which
tables that would reveal the first two letters was another security measure added by the
of the three lettered key. This method, Germans, only used twelve letters. If
however, only revealed which letters cryptanalysts with possession of all key
appeared through the window of the Enigma components needed to break the codes of the
lid, not the numerical position of the rotors. Enigma machine, they could easily decipher
In order to solve the positions of the rotors, the plug board settings. For example, a non
cryptanalysts used a grille, which was a plug board deciphered text would read:
sheet of paper with six horizontal slits with “slarm larts dmpaqmd.” Cryptanalysts could
the first chain of letters written on it. These simply look at the quasi-plaintext and be
sheets were compared to the alphabet tables. able to solve the plug board wiring, which
At each position, the Polish cryptanalysts would reveal the message to read: “spare
would attempt to find pairs of letters. If they parts delayed.”
could find six pairs on one table, they could Furthermore, while many German
determine which rotor was the fastest, as officers and government officials believed
well as that rotor’s position. While this the Enigma was impossible to crack, their
seemed like a logical method for revealing overconfidence in the machine often led to
the quickest rotor and its setting, it was carelessness in practice and protocol when
tedious work. It would take up to ten using the Enigma machine. Fewer ideas for
minutes to test one setting of one rotor. key changes meant keys were often
Cryptologists had twenty-six more settings duplicated to cut down on new enciphering
on each of the three rotors to test. The entire methods. Furthermore, Enigma clerks often
process would then have to be repeated in made up simple keys such as “zzz” or
order to find the middle rotor and its starting “qqq”, in order to remember them more
position. easily. These keys, which could be solved
Another challenge for the Poles was by superimposition, were soon prohibited
to reveal where the alphabet rings were set when the German high command discovered
on the rotors. Each rotor possessed notches that simple keys were being used. Finally,
that turned the rotors to the left. Moreover, Enigma signal operators or clerks often sent
each letter possessed its own notch, so in messages that contained common or
order to break the codes, the cryptanalysts anticipated plaintext. For example, weather
needed to know which notch was reports or ship movement each started with
specifically set on each rotor. The ring the same phrases or messages could begin or
setting could be revealed in two ways. The end with “Heil Hitler!” German military
first consisted of the Poles guessing where procedures actually made it easier for
the message began by using the word “an” cryptologists to guess the content of
(the German word for “to”) followed by “x” messages. The carelessness of enemy
or the word separator. One out of five operators who neglected security procedures
messages began in this way, which left only to take shortcuts to deliver messages could
676 (26 x 26) positions of the other two enable enemy cryptanalysts to figure out
rings to test. If the Polish cryptanalysts did their coding system. However, in an attempt
not try to locate “an,” they would have to
12
Ibid., 71.

8
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

to add more security to the Enigma, on indicated a possible correct rotor sequence
February 1, 1936, Hitler demanded that the and ring setting. However, this possible
Enigma’s rotor order be changed monthly solution did not reveal the plug board
instead of quarterly. This change reduced settings and each sheet could have around
messages sent in the same settings by one- 1,000 holes punched in it. Furthermore, with
third. Furthermore, plug board variations twenty-six positions for each of the six
could now range from five letters to eight. possible rotors, 156 sheets were required.
Later that year, orders came to change rotor While the Zyglaski sheets were
settings daily. These changes put even more effective, the process was tedious and time
pressure on cryptanalysts as the race consuming, and when the Germans added
between the code makers and code breakers more rotor possibilities to the Enigma
escalated. In the past, solutions to current machine, the Poles could not keep up with
codes could take years. Now enciphered coded messages. In an attempt to decipher
messages would have to be broken in codes more quickly, the Poles used a
months and days in order to keep up with cyclometer, which consisted of two linked
the rate in which messages were sent. With sets of Enigma rotors to test possible
the new changes to the Enigma machine, the settings. This discovery accelerated the
number of codes successfully deciphered recovery of the order of the rotors and their
was reduced by forty percent.13 settings. The Poles understood that if the
Despite the changes, some ciphers, combination of two Enigma machines
such as “asd” or “qaz”, did not appear accelerated the rate at which codes were
random on a QWERTY keyboard. If these solved, adding more machines should
patterns were chosen for keys, cryptanalysts further accelerate the process. Therefore,
would only have to test thirty to forty efforts were made to create a machine that
settings in order to break the code.14 Also, would be able to test six sets of Enigma
Zygalski noticed that groups of letters in rotors at once. When the machine would
ciphered text had certain letters in common. produce a possible solution, code breakers
These common letters were nicknamed would use the key on the enciphered text. If
“females.” Because a “female” could not be plaintext was produced, then the machine
naturally produced by the Germans, each had discovered the correct key. It would take
one represented a setting that could not be these machines, called “bombs” because of
used for the Enigma setting. In order to the ticking noise it made during its
record the “females,” Zygalski created two operation, up to two hours to discover a
cardboard sheets, each 51 spaces by 51: possible solution. While this method seemed
enough for A-Z to be written on the top and like an effective method, two problems
A-Y down the side of each. Each sheet arose. First, cryptanalysts had not taken into
recorded possible positions of rotors and a account the fact that indicator letters could
hole was punched in to the sheets were be changed in the plug board. Second, when
where a “female” was expected to occur. five to eight bombs were used, the bombs
Once all possible settings were reviewed, would only work half of the time because of
the sheets were aligned on top of each other the primitive wirings of the combined
over a light source. The positions where machines in relation to the numerous codes
light shone through all of the sheets they were testing.
The Poles were able to make these
13
Ibid. steps toward solving the Enigma codes
14
Ibid., 72. based purely on analysis and managed to

9
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

keep up with minor tweaks in German them with more bombs in hopes of solving
security measures. Despite the German the codes at a faster rate. In the meeting, the
alterations, Polish code breaking methods Poles revealed the replicas of the Enigma
improved, allowing them to solve codes at a machines they had created, as well as the
much faster rate. However, this all changed bombs. Amazed at the feats of the Polish
on December 15, 1938, when the Germans cryptanalysts, the British agreed to aid the
added two more rotors. Enigma machines three cryptologists. When the Germans
still only could hold three rotors, but now invaded Poland just a few short months
the combinations could be chosen from a later, the Polish cryptanalysts evacuated
group of five separate rotors. The overall their work station, burnt any unnecessary
combination of rotor choices mathematically documents, packed up their Enigma models,
went from six to sixty. The worst news of all and began to travel east toward France. In
was that the wiring of the two new rotors October, the Poles resumed their enci-
was unknown. However, the Poles soon phering methods in France at Chateau de
discovered that the Sichnerheitsdienst (SD), Vignoles, twenty-five miles northeast of
the Nazi Party’s Intelligence Service, were Paris. This villa was named P.C. (Poste de
still using the old methods to assign the rotor Commandement) Bruno and consisted of the
order and settings, ring setting, and plug Polish “Z-team,” seven Spanish Republican
board settings. Because the wiring was the Cryptanalysts designated the “D-team” and
same as the other rotors, the Poles could French cryptanalysts and personnel. Any
reconstruct the writing of the first rotor and findings that were uncovered would also be
the two new rotors. This revealed yet reported to British intelligence via type-
another weakness of the Enigma machine. writer line by British liaison officer, Captain
The rotor wiring went simply from A to Z, Kenneth Macfarlane. P.C. Bruno would
instead of a random alphabetical order on closely work with Britain in the years to
each rotor. If the wiring on each rotor was come in deciphering German Enigma traffic.
truly random, the ciphers that the machine British intelligence at this time had
produced may have never been broken. Now its own code breaking agency, which in the
with two new rotors, Polish cryptanalysts late 1930s made significant breakthroughs in
would now need sixty bombs and 1,500 solving enemy codes. The British first
sheets or grilles to successfully decipher established the Government Code and
messages. To make matters worse, on the Cipher School, or G.C. & S.C., as a perma-
first of January 1939, the plug board nent code breaking agency in 1919 under the
connections rose to ten. direction of the director of naval
The Poles soon realized they would intelligence, Captain Hugh “Quex” Sinclair,
need the aid of much larger countries with who later would become the chief of the
the funds available to crack the German Secret Intelligence Service. Located at the
ciphers, and on April 27, when Germany Broadway Buildings complex, which was a
renounced its non-aggression agreement few blocks from Westminster Abbey, the
with Poland, the Polish cryptanalysts G.C. & S. C. employed anywhere from 39 to
realized that they now must share their 500 individuals with an annual budget of
deciphering methods with France and Great 100,000 pounds.15 Members of the G.C. &
Britain. The Poles invited both British and S.C. were regularly reading decoded
French intelligence to Warsaw on July 24. messages from the United States, France,
The cryptanalysts hoped that the larger Spain, Japan, Italy, and Hungary. However,
countries would have the funds to provide
15
Ibid., 80.

10
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

the one country’s messages that British Stations,” were operated by all branches of
intelligence failed to read was Germany. the British military.
Most of the men employed at the G.C. & Those individuals who were
S.C. did not see this failure as an issue. recruited to work at Bletchley Park pos-
Because Germany had been stripped of its sessed competency in clerical work,
armed forces after World War I, British managed electronic equipment, were skilled
intelligence saw the country as defeated with in enemy languages, and were able to
no need for interception. Furthermore, quickly solve word or math puzzles. Mathe-
German army radio traffic was difficult to maticians, linguists, novelists, chess cham-
intercept near the British Islands. Finally, pions, and academics were hand recruited
while Germany did possess a small navy, and employed to decipher various coded
opportunities for naval intercepts were slim. enemy messages. The Daily Telegraph,
These discouragements led British intelli- famous for its regular readers, held a contest
gence to focus its attention and efforts on the asking contestants to solve one of their
coded messages from France, Italy, Japan, crossword puzzles in less than twelve
the Soviet Union, and the United States. minutes. Those who did well were invited to
World events also drew attention away from an interview with the G.C & C.S. Gwen
German interceptions. In 1936, during the Davis, who was employed at Bletchley Park,
Spanish Civil War, British intelligence noted: “At least half of the people there
focused heavily on Italian traffic. Viewing [Bletchley Park] were absolutely mad. They
Italy as a threat to India and British territory, were geniuses, no doubt many of them were
British intelligence focused their efforts on extremely, extremely clever, but my good-
breaking the weakly coded Italian messages. ness they were strange in ordinary life.”16
In later years, the large amount of The mansion itself could not accommodate
messages to be deciphered, coupled with the the British intelligence staff, so workers
need for security and quiet, forced Sinclair assembled temporary one-story, narrow,
in July of 1939 to purchase Bletchley Park. wooden huts around the grounds in an
Built by businessman Sir Herbert Leon, attempt to give all of the employees their
Bletchley Park was located halfway between own workspace.17 Employees themselves
Cambridge and Oxford, which attracted the were housed in communities near the area
attention of Britain’s code breaking agency. and were not to inform friends or family of
Furthermore, though the MI6, Britain’s the workings of Bletchley Park. By the start
secret intelligence service, and the of the Second World War, many men and
Government Code and Cipher School had women who worked on ciphers at Bletchley
offices in London, Sinclair desired an Park would only see a piece of the puzzle,
alternate location safe from German not knowing what exactly they were
bombing and spies. Bletchley Park was decrypting.
given the cover name “Station X” because it
was the tenth site acquired by MI6 during its
wartime operations. It was also the center of
a web of intercept sites around the country
where wireless operators recorded German
16
radio messages before sending them to Michael Paterson, Voices of the Code Breakers:
cryptanalysts by teleprinter or motorcycle Personal Accounts of the Secret Heroes of World
War II (Cincinnati: David & Charles, 2007), 73.
courier. These intercept sites, known as “Y 17
By 1944, Bletchley Park would employ over 7,000
people.

11
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

The Battle of the Atlantic: 1939 Europe in order to bolster British armed
forces. Later in the war, troops would travel
The Battle of the Atlantic began on from America by convoy, a practice that
September 3, 1939, and lasted until the end involved assembling ships into organized
of the war on May 8, 1945. It was fought all formations with escort vessels.
across the 32 million square miles of the With a victory in the Battle of the
Atlantic Ocean, making it the longest, Atlantic, many Britons hoped for a cross
largest, and most complex naval battle in channel invasion which would threaten
history.18 Germany with a two front war. Winston
Control of the Atlantic Ocean was Churchill after the war wrote: “The Battle of
vital for Great Britain. In order to further the the Atlantic was the dominating factor all
country’s war efforts and feed its throughout the war. Never for one moment
population, Great Britain needed supplies could we forget that everything happening
and raw materials that were imported from elsewhere, on land, at sea, or in the air,
around the world on vulnerable ships. Oil, a depended ultimately on its outcome, and
critical supply, had to be carried over amid all other cares, we viewed its changing
thousands of miles from the Middle East, the fortunes day by day with hope or appre-
United States, and the Dutch East Indies. hension.”22 If the Western Allies did not
Without safe waters, the tankers bringing oil gain the upper hand in the Battle of the
to Britain would be lost amid the waves. Atlantic, Great Britain very well could have
Churchill told the country in early 1941: “It been forced out of the war due to a shortage
is the Battle of the Atlantic which holds the of food, troops, and critical supplies.
first place in the thoughts of those upon Without Great Britain as an active partici-
whom rests the responsibility for procuring pant in the war, Germany would have been
the victory.”19 To wage a successful war the supreme power in Western Europe.
against any enemy, Great Britain would Furthermore, if Germany controlled the
need a steady flow of materials; without Atlantic Ocean, it is a possibility that Great
vital supplies, Britain could not fight over- Britain and America would not have been
seas battles and expect victory in the able to send supplies to aid Russia. More-
European theater. In 1939, economists over, the 1944 invasion of France would
calculated that Great Britain needed to have been nearly impossible without safe
import 55 million tons of goods by sea in waters. A victory for Great Britain in the
order to support its population’s current way Battle of the Atlantic would mean the secure
of life.20 Furthermore, a fleet of 3,000 and regular passage of ships carrying vital
merchant ships was required in order to war supplies across the ocean which would
transport needed supplies for any given further their war efforts against Germany
week, and each day around 2,500 of these and the Axis powers.
required 3,000 ships were at sea.21 In The Germans were aware that
addition to supplies, troops from Canada and control of the Atlantic was crucial to Britain.
Australia would need to be transported to Lieutenant Commander DE Balme of the
British Royal Navy noted: “The Germans
recognized that the Atlantic was the vital
18
Williams, 6. artery for Britain to obtain supplies of food,
19
Ibid., 115. fuel, and raw materials for our factories. If
20
John Keegan, The Second World War (New York:
Penguin Books, 1989), 105. they could cut that line, they could win the
21
Barrie Pitt, The Battle of the Atlantic (Alexandria:
22
Life-Time Inc., 1977), 17. Kahn, vii.

12
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

war.”23 Without the material and men to knots. It took these submarines about a
defeat Hitler’s armies, Great Britain would minute to reach 250 feet below the surface.26
starve. Grand Admiral of the German Navy The deeper a U-Boat sank under the waves,
Erich Raeder noted: “Great Britain’s ability the longer it would take for a depth charge, a
to maintain her supply lines is definitely the bomb detonated by certain water pressure, to
decisive factor for the outcome of the war” reach the submarine, and this offered a
and was convinced that German Untersee- better chance for its survival. Only one small
boots or U-Boats “are the decisive weapons break in the submarine’s pressure hull could
against Great Britain” because they gave the spell doom for the vessel and her crew.
Germans the element of surprise in battle; The British used a number of
they would later become one of the main methods of defense against the U-Boat.
enemies of the convoy.24 ASDIC, which was named for the organi-
Karl Dönitz, who commanded of the zation that developed it, the Anti Submarine
German Submarine Fleet, and who would Detection Investigation Committee, was
later become Grand Admiral and Com- used to detect a submarine that had
mander in Chief of the German Navy, submerged. Pulses of sound were sent out
believed that the best way to blockade Great from a dome located under the ship, and if
Britain was through the use of these the sound pulses came in contact with an
submarines. Taking only nine months to object, they reflected back to the ship. The
build and costing about a half million dollars sound beams could be reflected off objects
each, U-Boats were inexpensive weapons. other than submarines such as rocks or
These submarines were ordered to a desig- shipwrecks, but it was up to the operator and
nated area in the ocean, and then patrolled the range recorder to determine if the object
that area waiting for passing ships or for was moving. ASDIC’s ping would become a
orders to assemble for a larger attack. They sound familiar to submarine operators.27
would only return to port when fuel or With the developments associated
ammunition was low. Only twenty-five to with ASDIC, the submarine’s advantage of
thirty men would live in the small quarters “invisibility” underwater had ended. How-
of the submarines for up to three months.25 ever, this early version of sonar had serious
Throughout the course of the Second technical problems. The farther away a
World War, Germany produced thirty-four submarine was from the hunter ship, the
types of U-Boats ranging from minelayers more likely it would be spotted, because the
and supply submarines to open ocean sound beam that was sent out from ASDIC
vessels. On average, these underwater widened with distance. As the two vessels
vessels could reach a speed of eighteen moved closer to one another, the contact
knots on the surface and a range of 11,000 with the enemy submarine was more likely
miles while running on diesel engines. They to be lost. Moreover, ASDIC could only be
could spend up to about twenty hours used underwater; it could not locate sub-
underwater running on electric batteries but marines which had surfaced. Therefore,
only could reach speeds of two to three Dönitz ordered his U-Boats to attack Allied
ships in surface night raids. U-Boats were
23
Paterson, 101. not only less visible and not audible to
24
David Westwood, The U-Boat War: The German
Submarine Service and the Battle of the Atlantic,
26
1935-1945 (Philadelphia: Casemate, 2005), 114. Ibid.
25 27
PBS, “NOVA,” November 14, 2000, “Hitler’s Lost The Americans also developed their own version of
Sub,” Roy Scheider. ASDIC, which they called sonar.

13
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

ASDIC, but could travel at a faster speed direction finding proved to be an ineffective
than when they were submerged.28 method of defense against U-Boats because
With the faith that the British placed although the technique detected the approx-
in ASDIC, the use of aircraft in anti- imate fixed location of a submarine, it could
submarine warfare initially seemed unneces- not inform British intelligence of the
sary, so crews of the Royal Air Force direction in which the U-Boat was traveling.
Coastal Command received little training in The final method that British forces
anti-submarine operations. In addition, most possessed for defense against U-Boats was
of the aircraft at the start of the war were to break the ciphered messages that the U-
unable to travel long distances–a vital aspect Boats sent out via radio, which could reveal
in ocean patrol. Also, the bombs that the their location or mission. However, during
planes carried proved to be a greater threat the late 1930s, British intelligence was not
to the pilot of the plane than the U-Boat. In capable of deciphering ciphers quickly
order to cause major damage, the bomb enough to make this method effective. The
needed to fall six to eight feet from the U- lower-level ciphers which were broken by
Boat, which required pilots to fly at low the G.C & C.S. included reports on the
altitudes. However, when dropped, the bomb weather, damage to German merchant ships,
would often bounce off of the water and troop transportation, and the departure times
back up towards the plane and explode. A of U-Boats and fleets, but neither the
replacement bomb would not be made until position nor the movement of German
1940.29 vessels. However, this method, with
British commanders also employed improvements, would eventually prove of
radio intelligence in a method called direc- invaluable use in the Battle of the Atlantic.
tion finding. Local antennas on the coast and At the dawn of the Second World
on British ships would be rotated until War, the Royal Navy realized it would need
enemy radio signals were heard. British to employ any anti-submarine warfare
intelligence then identified the location of methods it could in order to gain the upper
submarines by using a “line of bearing.” In hand in the Atlantic and surrounding waters.
order to determine the location of a U-Boat, Only about ten hours after Great Britain’s
two or more antennas needed to sense the declaration of war, U-30 torpedoed the
same U-Boat radio signal. Lines were drawn British liner Athenia on its way to its port,
out from both antennas to the perceived mistaking it for a troopship. In months that
location of the U-Boat. The area in which followed, U-Boats began targeting merchant
the lines met revealed the approximate ships that were vital for the survival of Great
location of the enemy craft. But while this Britain. However, merchant ships were not
method seemed effective in theory, direction the only targets for German submarines. In
finding often had a twenty-five-mile or more mid September, U-29 sank the aircraft
margin of error. Furthermore, most ships carrier HMS Courageous while on patrol,
were not stationed at fixed locations; they and a month later the battleship Royal Oak
moved across the open waters, which made went down at the hands of U-47 while
U-Boats more difficult to track. Most British anchored at Scapa Flow. These successful
sea vessels were located 60-1000 miles attacks were a warning to the Royal Navy
offshore or in the open ocean.30 Finally, that no ship was safe.31

28 31
Pitt, 21. Robert C. Stern, Battle Beneath the Waves: The U-
29
Williams, 61. Boat War (London: Arms and Armour, 1999), 82,
30
Kahn, 4. 91-93.

14
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

In 1939, Germany possessed the up to five escorts per convoy. Convoys of


ability to sink British warships, but such this size would cover an area around four
sinkings did not add to the amount of miles across by two miles wide.34 However,
tonnage that needed to be destroyed to most of the available escort vessels were
strangle British supply lines. At the outbreak patrolling the open ocean, so many ships in
of war, U-Boats were still abiding by the the early weeks of the war traveled without
terms of the Hague Convention, which escorts. During the first month of the war, an
prevented any attacks without warning on average of only two Royal Navy escorts was
merchant and passenger ships. However, on destroyed each day, roughly 1.3 Allied ships
September 23, Hitler declared that all per convoy.35
merchant ships, which could use radios to Although World War I revealed that
report the location of U-Boats should be the use of convoys lowered the success rates
taken captive or sunk. of U-Boats, Dönitz had devised a method
At the outset of the war, the German that he thought would overcome the convoy.
navy only possessed fifty-seven U-Boats; of A single submerged U-Boat traveled at a
these, thirty were short ranged submarines slower speed than that of merchant ships in a
fit only for coastal missions, leaving only convoy. Therefore, if a U-Boat captain could
twenty-seven that could venture out into not reach a convoy due to an inaccurate
deeper ocean waters.32 Therefore, only a position, the crew might have to wait days
small number of U-Boats patrolled the before another convoy appeared. Also, even
Atlantic during the first months of the war. when a second convoy arrived, there was no
Dönitz pressured his superiors for faster certainty that it would travel in the same
production of U-Boats. His plan was to path as the first. Therefore, U-Boats would
wage a “tonnage war” against Great Britain need to travel in concentrations that Dönitz
with the goal of sinking as many tons as called “wolf packs” to inflict the maximum
possible per submarine per day without amount of damage on the ships of a convoy.
regard to route or cargo. Ultimately, Dönitz With the improvement of radio communi-
hoped his sinkings would exceed British cations, U-Boats on the surface could
replacement rates. communicate with headquarters, as well as
Dönitz also understood that in the with other submarines located hundreds of
North Atlantic a single U-boat would not be miles away. In order for a wolf pack to
able to inflict much damage on convoys of complete a successful attack, efficient radio
merchant ships guarded by escorts. The First communication and coordination were
World War had proven that when merchant required. Dönitz ordered that every convoy
ships were organized and escorted by which was sighted be reported to head-
warships, shipping losses were cut by eighty quarters, and once a convoy was located,
percent.33 Convoys would travel in a wide headquarters could radio the location to
rectangle of eight to twelve short columns other U-Boats in preparation for an attack.
about 1,000 yards apart, with about 400 to As soon as other submarines reached
600 yards between each ship. Most convoys the identified convoy, they could attack
would consist of roughly forty ships, of when an opportunity presented itself. It
which thirty to thirty-five would be often took many hours for other U-Boats to
merchant vessels; the navy could only spare reach a central area, as they were often over

32 34
Keegan, 105. Ibid., 96.
33 35
Pitt, 21. Ibid., 21.

15
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

300 miles apart.36 Therefore, the U-Boat that surface vessels, particularly battleships.
first signaled headquarters to a convoy Despite the fleet’s second-class status,
would shadow the formation of ships, often Dönitz made several attempts at a successful
reporting its position for the U-Boats that wolf pack attack, but British convoys would
were heading toward it. Dönitz understood often change direction with short notice. It
that British intelligence could intercept the was not until September 1940 that wolf
large amount of German radio traffic that packs began successfully locating and
was generated, but this was a risk that he attacking convoys.
was willing to take because of his faith in
the complexity of the naval codes. No attack Early Code Breaking Efforts at
was made until all of the U-Boats which Bletchley Park: 1940
were ordered to arrive were present. Most of
the attacks were then staged at night so the
In the early months of 1940, at
men aboard the ships in the convoy would
Bletchley Park, the work of two men–Alan
not be able to detect the submarines. U-
Turing and Gordon Welchman–would pro-
Boats also chose to attack on the surface to
duce two significant breakthroughs in
avoid sonar detection. Therefore, U-Boat
British code breaking methods. The head of
captains were relying on the eyes of convoy
the Government Code and Cipher School, or
lookouts, hoping they would not be detected
G.C & S.C., in the late 1930s, Alastair
or that they would be too small to see. The
Denniston, had realized that the messages
more U-Boats that could attack at the same
that British intelligence was attempting to
time led to confusion and lowered the
decipher were coded based on mathematics,
chances of ships in the convoy escaping.
not linguistics like the messages of the past.
Dönitz observed: “The greater number of U-
Therefore, he concluded that British
Boats that could be brought simultaneously
cryptanalysts should not specialize in
into the attack, the more favorable would
linguistics but math. In 1938, Denniston
become the opportunities to each individual
held a series of courses in cryptology for
attacker.”37 Often the wolf pack would
mathematicians. King’s College mathe-
attack the same convoy on consecutive
matician Alan Turing, who was in his late
nights.
twenties at the time, attended these classes.
In order to locate convoys in large
On September 4, Turing would join Alfred
open waters and attack with effectiveness,
Dillwyn Knox, an experienced linguist and
Germany would need to produce large
British code breaker, Peter Twin, an Oxford
numbers of U-Boats. Dönitz believed that
Graduate in mathematics, and John R. F.
100 U-Boats could do more damage than all
Jeffreys, a Cambridge mathematician at
of Germany’s surface ships, and that 300 U-
Bletchley Park, to work on deciphering the
Boats could cut Britain’s supply lines
Enigma codes. Turing’s breakthrough in the
altogether.38 However, at the outbreak of
Enigma decoding method came late in 1939
the war, the navy was third to the Army and
as he ran the bombs that tested possible
Air Force in terms of material and funds.
Enigma keys. Turing invented electrical
Furthermore, Hitler only gave top priority to
multipliers for the cipher system that would
eliminate the results from the bombs that led
36
Williams, 83. to contradictions. The keys that the bombs
37
David Fairbank White, Bitter Ocean: The Battle of ran tested whether the enciphered messages
the Atlantic, 1939-1945 (New York: Simon & of the cryptogram were consistent with the
Schuster Paperbacks, 2006), 19. unknown basic key setting that was trying to
38
Pitt, 22.

16
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

be discovered. The bombs would then reject would equal a non-contradiction between
any keys that produced inconsistencies. the assumed plaintext and the position of the
Bombs could eliminate thousands of key rotor, which ultimately would equal a
possibilities based only on inconsistencies. possible key solution. Once this non-contra-
However, this would leave a few keys that diction was discovered, the key was used on
were contractions that would have to be the ciphertext to see if the result was Ger-
tested to see if the ciphertext produced man plaintext. If plaintext was not produced,
plaintext when the key in question was used the bombs would be restarted and the
on the ciphertext.39 process continued.40
Turing’s method was based on a The idea for a probable word came
technique that cryptanalysts used to break from the cryptanalysts imagining a possible
coded messages. Cryptanalysts assumed that plaintext phrase or word that code breakers
within a coded message existed a probable called a “crib.” These words came from
word in the form of a plain word or phrase knowledge of German communication
such as “attack” or “enemy.” Probable which was gained through direction finding,
words included ways of reporting, greetings, radio messages, past Enigma solutions, and
referral to units, or signing on or off. This captured documents. Cryptanalysts might
probable word could then be employed as a use the crib nichts zu melden, “nothing to
stepping stone to recovering the full text or report,” or the message’s recipient–dem
key of the cryptogram. This same method general. The crib would then be written
had been used by the Poles before their use letter by letter above the ciphered text. Then
of bombs when Polish cryptanalysts would the cryptanalyst would look for a loop of
assume that messages from the German letters or connected letters that in assumed
Enigma would begin with “an”–“to” in plaintext and ciphertext could be chained
German. This method was used to reduce together, linking the first letter with the last.
the number of trials that the Poles would
attempt in trying to find probable positions Crib: n i c h t s z u m e
on the alphabet rings. Turing used this Ciphertext: k r t b e l w s u c
method of matching a word or phrase to part
of the intercept and testing whether the rotor For example, the first c in the crib is linked
position would allow for the word or phrase. to the t in the ciphertext, then to the t in the
Now code breaking methods would change above crib, to the e below, to the e above,
from finding non-contradictive links and to the c below, which would create the
between known and assumed unknowns to loop “ctec.” Once a loop was discovered, the
recover keys to non-contradictive links bomb would be set up in the basic position
between plaintext and assumed keys. In using the rotors, I, II, and III, in that order,
order to achieve goal, Turing added a test and set to AAA. The rotor order and their
register, a set of twenty-six electrical relay position, ring setting, and plug board set-
points, to each rotor position on the bombs. tings were all unknowns. During this time,
The test register looked at the voltage of the ring positions could be ignored, because
each of the twenty-six points which were cryptanalysts hoped that the middle rotor
equivalent to the output lights on the would not be a part of the crib. Voltage
Enigma machine. If voltage would run on all would then be applied to one of the bomb’s
of the twenty-six points or all but one, this positions that represented a plug board

39 40
Kahn, 94-5. Ibid., 95.

17
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

substitution in the first letter of the crib. The to figure out the correct rotor order. If the
electricity would then pass through the rotors were in the correct order but the plug
bomb’s rotor arrangement, through the board substitutions were not guessed
reflecting rotor, back through the rotors, and correctly, the voltage would spread out in
on to the second pair of letters in the loop. the same method as an incorrect rotor
The voltage would then pass through the arrangement, with the difference being that
third letters of the loop, and then back to the the voltage would not be able to enter the
first pair of letters. The number of spaces one correct test point. With all of the points
separating the looped letters also played a lit but one, this produced the other condition
key role. It was assumed that if the number that would cause the bomb to stop. More
of spaces between the first and second often cryptanalysts would find the machine
looped pair was two, the number of clicks stopped at this scenario. Turing’s method
the second rotor would have to be from the freed cryptanalysts from finding any special
first or faster rotor would then be two. While settings in the message keys such as
voltage passed through the loop of letters, it repeated letters in certain positions in the
also passed through Turing’s test register. If text which the Polish cryptanalysts called
the rotor arrangement and the plug board females. The test register also reduced the
substitutions were guessed correctly, the time that was previously required to solve a
voltage would appear as a single circuit or as coded message, thus making the chances for
one test point. This was one of the two a solution higher.42
conditions needed for a correct match void The second British breakthrough was
of contradictions. If a bomb displayed this discovered by 34-year-old Gordon Welch-
condition, the machine would automatically man, a Cambridge mathematician. Welch-
stop to allow cryptanalysts to use the current man spent most of his time at Bletchley Park
rotor position to test the coded message. intercepting German army messages. In the
Because of the number of plug board frequencies of the radio messages, call signs,
solutions, many substitutions would have to message indicators, addresses, and signa-
be made to plaintext, but the message itself tures of the messages, Welchman discovered
should resemble enough German that the patterns within the structure of the German
validity of the message could be tested.41 army. Welchman observed that different
Upon the solution of all of the plug command structures used different keys
board settings, the code would be broken. If using a technique that would later be called
cryptanalysts had the rotor order wrong in traffic analysis. This method made the case
the bomb, the voltage would pass through that common phrases or words that were
the first rotor and exit the letter as if it was located at the beginning of the text could be
on to the next letter in the loop. However, used as cribs. Furthermore, if a message was
the incorrect rotor order would prevent the transmitted on a lower level system of the
voltage from completing the loop and German military that had already been
channel it instead in a non-looped point. broken, it was most likely repeated on a
When the voltage would enter the end rotor radio using the Enigma machine. If the text
at a non-looped point, the point in which it of the same message from the lower level
emerged would again be another non-looped system and the Enigma machine could be
point. This process would continue until all matched up in what was known as a “kiss,”
twenty-six points were lit. Then the machine it provided a crib for the message and led to
would stop, and cryptanalysts would attempt the eventual solution of the Enigma’s key
41 42
Ibid., 96-7. Ibid., 97.

18
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

settings for that day. Another method used machines plus Welchman’s diagonal board.
by Welchman was nicknamed gardening. With the use of five bombs, all sixty rotor
Cryptanalysts at Bletchley Park would possibilities could be tested. The first
choose a certain location at sea and request machine of this size was introduced in
that mines be dropped into the area. If the Bletchley Park in Hut 11 in on August 8,
German High Command discovered the 1940. Soon four bombs were installed and
location of the mines, they alerted U-Boat ran keys from fifty-nine radio networks,
fleets via radio to avoid the area. After these some of which changed keys every twenty-
messages were intercepted, cryptanalysts four hours, while others changed every
could use the mines’ location as a crib to twelve hours.45
help them decipher the message keys.43 Enigma messages that were
Using perforated sheets, Welchman intercepted and decrypted at Bletchley Park
devised another method, almost identical to were by this time known by their codeword,
the idea of the Polish Zygaliski sheets, to Ultra. Most of the work towards decoding
narrow the number of possibilities for the these messages was performed by Wrens
rotor order and settings. Welchman called (Women’s Royal Navy Service). Over 1,000
his sheets the “Jeffreys sheets” for John Wrens worked with the bombs around the
Jeffreys, the staff member who prepared the clock in eight-hour shifts to decode
sheets for him. The Jeffreys sheets messages.46 British Prime Minister Winston
accelerated the number of Enigma solutions Churchill took special interest in reading
that were discovered. The method also decrypts from Bletchley Park. He would
revealed that Enigma solutions were often have several deliveries of decoded
reciprocal. For example, if the plaintext b messages send to his home daily. Churchill
produced the ciphertext K at a certain rotor had called earlier German intercepted codes
order and position and a certain plug board “Boniface,” a name designed to make the
setting, then a plaintext k should produce a enemy believe that source was an agent, not
ciphertext B at the same settings. a deciphering system, an early attempt to
Welchman’s discovery was used to take keep Ultra and its decrypts a secret.47
advantage of the letters in a crib that were Churchill often referred to Ultra messages
not part of the loop in the bomb machine. by this name long after the term Ultra had
Welchman used a wooden board with 676 become standard.
contact points for the A-Z letters across the As the G.C. & S.C. expanded, the
top and the A-Z letters down the side. Wires military and naval sections of code breaking
would then connect points such as row G, were split into two sections: cryptanalysts
column K and row K, column G. This con- who would crack cryptograms and intelli-
nection would automatically send voltage gence analysts who would pull out important
through the pairs that were connected and information from the deciphered codes.
would ultimately reduce the number of Teams at Bletchley Park were then known
faulty stops in the bombs.44 by their hut number. The Naval intelligence
Welchman’s method was then analysts were located in Hut 4. Turing, who
incorporated into the bombs themselves. The headed the naval cryptanalysis, was located
machines soon grew to over four feet wide,
45
as each bomb could hold twelve Enigma Stephen Harper, Capturing Enigma: How HMS
Petard Seized the German Naval Codes (Phoenix
Mill: Sutton Publishing, 1999), 16.
43 46
Kahn, 98. Perisco, 102.
44 47
Ibid. Ibid., 159.

19
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

in Hut 8. There, he spent most of his day important. Often Enigma machines them-
attempting to discover new cribs, searching selves were unable to be salvaged because
for loops in plaintext and ciphertext and they were bolted to tables, but any loose
running tests on bombs. In Hut 8 mathe- parts and paperwork was gathered. These
maticians Shaun Wylie and Leslie Yoxall, captured documents and Enigma parts
statistician Irving John “Jack” Good, Inter- would prove priceless to cryptanalysts at
national Chess Champion, Harry Golombek Bletchley Park.
and cryptographer Rolf Noskwith worked An early break or “pinch” had
alongside Turing around the clock in an already occurred by February 1940. The
attempt to break the German naval ciphers. crew of U-33 had been ordered to lay mines
However, despite their efforts, these men off of the coast of western Scotland. This
were unable to decrypt the messages at a was a dangerous mission, not only because
regular and frequent pace. It would take the the U-Boat was entering enemy waters miles
capture of Enigma key settings and other from shore, but if the U-Boat were spotted
vital documents to finally break the ciphers in such shallow water, it could not dive to
at a pace which would make their content escape. Therefore, the possibility of capture
effective to the Royal Navy. was on the mind of the captain and crew.
In the same month that Turing read This was a risk that Dönitz had taken
the first cipher in April of 1940, before. Earlier in the war U-26 was sent on a
cryptanalysts at Bletchley Park received similar mission in the waters south of
their first captured materials from U-Boats.48 England. After the mission, the U-Boat had
It is arguable that these captures, known as failed to make contact with headquarters for
“pinches” by the staff at Bletchley Park, several days. The submarine eventually
made a greater contribution to the opera- made contact, but afterwards Dönitz ordered
tional use of decrypted messages in the mine-laying U-Boats to leave their Enigma
Battle of the Atlantic than the sluggish machines behind. Mine-laying U-Boats now
mathematical work of cryptanalysts. Both were ordered to travel directly to the
time and cryptanalytic efforts could be saved location of their missions, and upon
if the enemy code books could be captured. completion, return to their bases. During the
Therefore, boarding parties entering ships or duration of the operation, the U-Boat would
U-Boats were often sent to the communi- not be able to send or receive messages from
cation room to seize any documents they other U-Boats or the base. Dönitz later wrote
could find. Most of the men who risked their in his war diary: “The consequent disadvan-
lives in the race against time in a sinking tages and difficulties which will be
ship or U-Boat had never heard of an experienced when working together with
Enigma machine; they simply carried out other boats have to be accepted, as the risk
orders to bring back anything that looked of confidential books and cipher material
falling into the enemy’s hands, if the boat is
48 lost in shallow water, is too great.”49 How-
The practice of capturing enemy codebooks and
secret documents had been used before by British ever, this strict protocol was not enforced
cryptologists in World War I. In November of with U-33. It is arguable that the rule was
1914, the German cruiser Magdeburg ran aground not enforced with this submarine because U-
in Baltic waters patrolled by Russia. The Russians 33 was not merely a mine-laying submarine,
boarded the ship and retrieved code books, which
they promptly relayed to the British Admiralty.
49
These captured documents enabled Room 40, the Hugh Sebag-Montefiore, Enigma: The Battle for
British center for naval intelligence, to break the Code (New York: John Wiley & Sons, Inc.,
German naval ciphers. 2000), 61.

20
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

but also was capable of traveling in vast naval Enigma. Without knowledge of cribs,
ocean waters and possessed torpedoes. the cryptologists could not break any
Regardless of Dönitz’s reasoning, the U-33 Enigma messages, and without breaking
departed with an Enigma machine aboard. Enigma messages, they could not identify
In the early hours of February 12, any cribs.50
lookouts on the U-33 spotted what Stuck amid a catch-22, Turing and
resembled a British destroyer heading his team soon realized that they would need
directly for the U-Boat. However, the HMS to capture Enigma documents so the work
Gleaner was not a destroyer; it was a survey done at Bletchley Park could be completed
ship fitted with the best anti-submarine in a timely fashion. However, in order to
technology the British possessed at the time. successfully capture documents from a U-
Hours later, the U-33, badly damaged by Boat, the submarine had to be brought to the
depth charges, was brought to the surface surface by depth charges. If the vessel sank
and the crew ordered to abandon ship. too quickly, no documents could be
Before the crew abandoned the submarine, recovered. Furthermore, in the midst of the
the captain ordered that the rotors of the chaos, British intelligence had to hope that
Enigma machine, plus the extras that were key documents or codebooks were left
not being used for the day, be given to crew behind. It was German protocol that all
members. These men were instructed to Enigma documents were to be destroyed or
drop them into the sea as they jumped off of thrown overboard in the event of a capture.
the submarine. Two of the men were able to The men and women of Bletchley Park only
do so. However, British sailors recovered hoped that the stress of the situation would
three rotors from Friedrich Kumpf, who in prevent U-Boat crews from making this
the stress of the situation, forgot to throw his important task a priority.
rotors into the sea. After the Gleaner picked On April 26, 1940, British destroyers
up Kumpf, he told Heinz Rottmann, one of spotted Polares, a trawler flying the Dutch
his surviving officers, that he had forgotten flag. Days before, another British destroyer
to throw the wheels away. When the two reported being fired upon by the same
men checked Kumpf’s pants, the pockets vessel. Suspecting this ship was a German
were empty and the Enigma rotors were vessel in disguise, the HMS Griffin sailed
gone. After Kumpf had removed his close enough to send a boarding party. The
waterlogged clothes, British officers men of the Griffin not only found concealed
searched his pants before returning them to gun decks on the ship, but also an unusually
him. The officers, after discovering the large crew for a regular fishing ship.
rotors in his pockets, were unsure of their Furthermore, a crewman was seen throwing
use, but made arrangements for the captured canvas bags overboard. While one of the
items to be sent back to Britain. Little did bags sank, the other was recovered by
these German sailors know the precious find British sailors. It was later discovered that
was soon on its way to the huts at Bletchley the captured bag contained cipher forms.
Park. After analysis, it was discovered that Other cipher forms were found during a
these rotors revealed the wiring of sixth and search of the ship, later identified as the
seventh wheels, which until then was German Schiff 26. These cipher forms
unknown to those individuals working at contained not only ciphertext but also its
Bletchley Park. While these rotors helped matching plaintext. The documents were
Hut 8 understand the Enigma machine, they
did not lead to a complete solution to the 50
Kahn, 111.

21
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

immediately sent to Bletchley Park, allow- noted: “You can either find out the wiring of
ing the cryptanalysts to break into the naval a brand new wheel or you can work out with
ciphers from April 22 to 27. The first of the a reasonable degree of accuracy what the
messages to be broken was dated April 23; it messages might be saying.”54 After the
was successfully broken, translated and read process was completed, British cryptanalysts
on May 11, making the first official break could ignore as many as 336 possible rotor
into the naval Enigma with the aid of a orders that might be used that day.55 The
“pinch.”51 It was later determined that the positions that were left were then tested on a
delay in reading the message stemmed from bomb, which eventually revealed the correct
the absence of plug board connections.52 settings for the day.
The settings for April 26 and 27 were
broken after two weeks using the bomb and The Battle of the Atlantic: 1940
cribs discovered in previous decoded
messages.53 With the fall of France in May 1940,
While these messages held little German forces seized ports on the English
military value because of the rate of their Channel, the coast of the Bay of Biscay, and
decryption, the documents that were cap- Atlantic ports such as Lorient and St.
tured from the Polares helped Turing to Nazaire, which were soon put into service as
better understand the naval Enigma machine U-Boat bases. From these ports, U-Boats
and the ciphers that it produced. Turing could operate in Atlantic waters for longer
produced a new method, which he called periods of time, reaching as far as New-
Banburismus, since the sheets that were foundland and America’s east coast;
used in the process were manufactured in German production of U-Boats would in
Banbury. Banburismus took advantage of a turn increase with the ownership of these
weakness of the German naval Enigma: new ports. France’s exit from the war also
messages indicating new settings were sent eliminated the French Navy from the Battle
using old rotor settings from the day of the of the Atlantic. Finally, U-Boats would no
transmission. In the process, long printed longer have to make the seven-day voyage
sheets with vertically printed alphabets with across the North Sea and around Great
the letters divided by horizontal lines were Britain to reach the war zone in the Atlantic.
used to make calculations. Like the Zygalski The time that U-Boats saved could be used
Sheets, holes punched in the sheets to attack shipping in the area.
corresponded with the enciphered text; one From the start of the war in 1939 to
letter per column of text until the message the fall of France in 1940, Germany’s U-
was complete. After punching a certain boat fleet had been unable to venture far into
number of sheets, they were placed over one the Atlantic due to geographical constraints
another and examined to see where holes and Hitler’s unwillingness to violate the
existed, which indicated where letters were territorial waters of still-neutral Belgium and
repeated. This allowed for the message’s the Netherlands. Furthermore, the fleet
sequence to be studied and eventually the could not enter the Channel due to mine
day’s settings to be determined. Peter Twinn fields in the Dover Straits. Therefore, the
only way to reach the Atlantic was to travel
51 north around Scotland, and few U-Boats
Sebag-Montefiore, 76
52
The settings for the plug board were recovered, but possessed the range to successfully complete
cryptanalysts overlooked these settings which were
54
scribbled on a small sheet of scrap paper. Paterson, 105.
53 55
Sebag-Montefiore, 76. Sebag-Montefiore, 77.

22
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

the journey. Of Dönitz’s fleet, only eight was sunk by only five U-Boat com-
submarines could travel over 12,000 miles; manders.61 Dönitz later wrote: “Out there in
no more than eighteen boats could reach the the Atlantic a handful of U-Boats was being
Strait of Gibraltar, while thirty could not called upon to fight a battle that would
even leave the North Sea.56 Despite these decide the issue of the war.”62 The losses of
limitations, by the end of 1939, U-Boats, Allied shipping boosted the morale of the
mines, and surface raiders had destroyed men aboard the submarines and led Hitler to
over 215 merchant ships equaling more than invest more in the production of new boats.
748,000 tons.57 Without knowledge of U- However, a larger and more formidable U-
Boat positions or courses from decrypted Boat fleet would not be ready until late 1941
enemy messages, British shipping blindly due to Hitler’s plans to invade the Soviet
sailed into the paths of German submarines. Union, and his decision to assist Italy in
In June of 1940, U-Boats sank sixty- North Africa and Greece.
two ships totaling 284,000 tons – the highest During the fall of 1940, cryptanalysts
monthly total to date. U-Boat crews called at Bletchley Park determined that key
the period that followed the “happy time” documents had to be captured in order to
due to their successes against British make frequent breaks into the naval Enigma.
shipping. Operating from French bases, U- Therefore, British intelligence began to
Boat commanders began to run high tallies brainstorm other ways of capturing key
of tonnage. Between July and October only Enigma settings. Ian Fleming, who worked
two U-Boats were sunk, and young U-Boat at the Admiralty as an officer in Naval
commanders such as Jürgen Oesten alone Intelligence, spent his time planning
sank 20,000 tons by August.58 Dönitz later operations to steal code books. One of his
wrote: “I was anxious that not one single more famous plans was Operation Ruthless,
day should pass without the sinking which involved obtaining a German bomber
somewhere or other of a ship by one of the with a crew, including a telegraph operator
boats at sea.”59 The staff at Dönitz’s U-Boat and word-perfect German speaker. The crew
Command would keep the day’s log of would be dressed in damaged German Air
British shipping activity, and if more than Force uniforms complete with bandages and
two days passed in an area without a convoy liquid that resembled blood. The plane
sighting, Dönitz ordered the U-Boats to would then be crashed into the English
move to another area of sea. By October, the Channel after sending out an S.O.S.
average tonnage sunk per U-Boat per day message. When a German rescue boat found
was 920.60 the plane, the British crew would shoot the
On average there were only six U- crew of the vessels, commandeer the boat,
Boats operating against British shipping and seize key documents.63 As the plan
routes at any given time. However, from developed, more realistic details were added
May to December, eighteen separate U-Boat such as a mock attack on the bomber by
commanders were responsible for the British Spitfires. Although Churchill himself
sinking of nearly 300 ships totaling more approved the operation, the circumstances
than 1.6 million tons; a third of that total for the plot never presented themselves, and
56
Keegan, 110.
57
Pitt, 8.
58 61
Williams, 79. Ibid.
59 62
Ibid., 103. Ibid.
60 63
Ibid. Kahn, 124.

23
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

Operation Ruthless was eventually can- the number would drop to 30.5.68 The
celled.64 successful U-Boat campaign coupled with
Despite the abandonment of Opera- German air raids on British cities, were
tional Ruthless, Turing’s Banburismus taking a toll on the morale of British
would prove extremely useful to crypt- citizens. Food imports dropped from prewar
analysts in the upcoming months. However, levels of 22 million tons to under 12 million,
the key to the Banburismus was the naval which was regarded as the minimum
bigram tables. Though the Polares capture requirement for British survival.69
did not give Turing a copy of the tables, he By the end of the year, Britain had
was able to mathematically reconstruct begun to look to the United States for their
them. After messages were decrypted, the long term shipping needs. In December,
gaps in the bigram table could be deter- Winston Churchill wrote to Franklin
mined. In November of 1940, the Roosevelt, informing the President that “the
Banburismus procedure broke into the naval gift, loan or supply of a large number of
settings for the first time by breaking the American vessels of war, above all
ciphers for April 14, May 8, and June 26.65 destroyers already in the Atlantic, is indis-
However, to the dismay of the cryptanalysts, pensable to the maintenance of the Atlantic
the messages on June 26 revealed that new route.”70 On December 29, Roosevelt told
bigram tables would be issued on July 1. the nation that “If Great Britain goes down,
Therefore, Banburismus could not be used the Axis powers will control the Continents
on future messages until the new bigram of Europe, Asia, Africa, Australia, and the
tables were captured. Future messages could high seas. And they will be in a position to
only be broken with the capture of new bring enormous military and naval resources
codebooks or the discovery of a regular against this hemisphere. It is no exag-
source of cribs. Even though Bletchley geration to say that all of us in all the
Park’s cryptanalysts were in the same Americas would be living at the point of a
position as they had been before the captures gun.”71 In February of 1941, the U.S.
from the Polares, Turing and his team now Congress enacted Franklin D. Roosevelt’s
knew that the naval Enigma could be program of Lend-Lease, which allowed
broken. Britain to borrow materials for war with the
In 1940 alone, U-Boats, which now promise of repayment after their victory.
had the capability to travel farther and With a neutral country now openly assisting
longer, sank 375 ships totaling 1,804,494 the British cause, U-Boats now had to
tons.66 Winston Churchill confessed that he contend with American ships clearly loaded
had feared in the winter of 1940-41 that “the with goods on their way to Great Britain.
U-Boat peril” might “reach the point where For the American and British ships
our life could be destroyed.”67 Before the traveling in the Atlantic, convoys only
war, Great Britain imported 60 million tons offered partial protection from wolf packs.
of food and raw materials each year. By the
end of 1940, the country was only importing 68
Ibid., 106.
45.5 million tons, and in the following year 69
White, 72.
70
Franklin D. Roosevelt Presidential Library and
64
Despite the cancellation of Operation Ruthless, Museum, “FDR Letter Regarding British and
Flemming did manage to earn fame by later pen- American Efforts for the War 12/7/40,”
ning the James Bond novels. http://www.fdrlibrary.marist.edu/website_online_v
65
Sebag-Montefiore, 77. ersion/psf/box34/a311s02.html (accessed February
66
White, 22. 6, 2009).
67 71
Williams, 105. Williams, 108-09.

24
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

Only two or three destroyers could be spared Boat arm could be. Winston Churchill on
to escort each convoy, and these vessels March 6 announced at a weekly meeting of
would be overwhelmed when attacked by the Battle of the Atlantic Committee: “We
multiple U-Boats. Furthermore, early forms must take the offensive against the U-Boat
as ASDIC were ineffective beyond 1,000 and the Focke-Wulf [German long range
yards and revealed range, but not depth, bomber] … the U-Boat at sea must be
which was key when releasing depth hunted, the U-Boat in the dock must be
charges. With the French ports of Brest, bombed.”73 Churchill understood the danger
Saint-Nazaire, La Rochelle and Lorient in of U-Boats and ordered the submarine’s
German hands after June, the fleet could destruction. It was now a race against time
operate in the Eastern Atlantic near western to stop the thousands of tons of British
Africa, and occasionally venture into the shipping that were being destroyed each
Mediterranean. With the capture of the Bay day.
of Biscay, U-Boats could attack shipping In the early months of 1941, Britain
routes from South America, South Africa, was losing ships three times faster than
and the United States. These ports allowed shipyards could produce them.74 The odds
U-Boats to directly attack British shipping were clearly swinging towards Germany.
routes. Even though cryptanalysts at Out in the Atlantic, U-Boat aces such as
Bletchley Park were beginning to read few Günther Prien, the commander of U-47, had
German transmissions in late 1940, the men sunk over 245,000 tons by March 1941.75
of Huts 4 and 8 were not able to break the Furthermore, U-Boat production had been
codes quickly enough to make their raised from an average of three a month to
information operational. Therefore, U-Boats fifteen and was scheduled to rise to twenty
succeeded in sinking thousands of tons of in the coming months.76 While only about a
British shipping that year. Cryptanalysts at third of the U-Boat fleet was available for
Bletchley Park needed to acquire new Dönitz’s current operations in the Atlantic,
documents in order to gain the upper hand in another third was involved in training
the battle. programs which produced skilled officers
and men for the anticipated fleet. The final
British “Pinches” in 1941 third of the fleet drilled future operations
and practiced mine laying techniques in the
While the winter of 1940-41 brought Baltic. Therefore, the total number of U-
powerful storms in the Atlantic, it provided Boats in the Atlantic at any given time rarely
British shipping with some relief from exceeded thirty. Of those thirty, several were
German submarines. However, soon after on their way to operations or returning back
the start of the New Year, the assault on to port; others were on patrol in the South
British shipping resumed with a new vigor. Atlantic and off the coast of Africa, causing
Out of a total of forty-six operational boats British merchant ships and convoys to use
in a commissioned fleet of eighty-nine, only the North Atlantic. Despite these figures,
seven U-Boats were sunk between submarines were sinking an incredible
December 1940 and March 1941.72 U-Boat amount of British shipping.
production was now finally higher than U-
Boat losses. Great Britain was slowly 73
Williams, 114.
beginning to realize how deadly Dönitz’s U- 74
White, 26.
75
Brown, 76.
72 76
Westwood, 117. Padfield, 149.

25
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

However, in March of 1941, from Iceland. While they did not report their
cryptanalysts at Bletchley Park gained the readings on Enigma machines, they did use
break they had been searching for. On the machines to receive messages from base,
March 4, British destroyers off the coast of and, therefore, had the current code books
Norway identified the German trawler aboard their ships. While the navy had
Krebs. After opening fire on the ship, the already sunk two of these weather trawlers,
engine room was soon hit, and the ship was Bletchley Park’s Harry Hinsley suggested
abandoned. A group of men from the HMS that these ships might carry naval Enigma
Somali boarded the ship to find that the few keys because they stayed at sea for months
crew members left aboard had surrendered. at a time. In a formal report to the
When searching the ship, Lieutenant Sir Admiralty, Hinsley stated: “The seizure of
Marshall Warmington entered the captain’s one of these ships, if practicable would …
quarters and ordered the boarding party to offer an opportunity for obtaining ciphers.”77
collect the documents strewn around. Before Cryptanalysts knew that if those weather
leaving, Warmington noticed a locked ships could be boarded, vital code books
drawer. After shooting off the lock, he could be captured that might help crypt-
pocketed the discs he found inside; without analysts break the naval codes. Therefore,
knowing anything about an Enigma plans were soon made to intercept vul-
machine, Warmington and his men had nerable German weather ships in hopes of
managed to capture key documents such as capturing more documents. The target that
German naval grids, a set of spare rotors, British intelligence chose was the München,
and Enigma key tables for February. which was to be at sea through May and
Although the Enigma machine itself June. If an armed naval party could board
had been thrown overboard, the Enigma key the ship quickly, it was unlikely that the
tables and naval grids were a key find for Germans would be able to destroy all of the
cryptanalysts at Bletchley Park. The German secret Enigma materials. Even if the code
navy employed a special grid map to encode books were thrown overboard, the codes
positions of their U-Boats. A section of were changed every month, so it was
ocean was grouped into zones, and each expected that only the codes for May would
zone was divided into squares that were be thrown overboard. Then the boarding
assigned a two digit number. Then those party could search for the hidden book of
squares were further broken down and given June codes. On May 7, the Edinburgh
a number one through nine. Finally each located the trawler and fired on it, causing
square in the one through nine grid was the crew to board the lifeboats, while the
broken down and numbered one through crew of the destroyer Somali boarded the
nine. Therefore, a U-Boat could be located ship. The Edinburgh later sent its own
in zone AK in square 8226. With the boarding party. Colin Kitching of the HSM
captured naval grids, the British were able to Edinbugh recalled the capture: “The
accurately locate U-Boats. Within five München’s captain had thrown the Enigma
weeks, cryptanalysts at Bletchley Park were machine and the May coding tables over the
using the captured documents to read past side as Somali approached, but the settings
naval traffic from February and later some for June were in his desk; these were
of the traffic from April and most of May. collected by Captain Haines [of Naval
The men in Huts 4 and 8 knew that Intelligence], who knew exactly what he
the Germans were monitoring the weather in
the North Atlantic using trawlers that sailed
77
Sebag-Montefiore, 128.

26
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

was looking for.”78 Haines was later flown jackpot exists.”81 The lax attitude toward
to London with the captured documents and security would soon prove fatal for the
reached Bletchley Park by May 10. These submarine.
captured documents allowed Bletchley After U-110 fired on the convoy, it
Park’s cryptanalysts to read German signals was detected by underwater direction
with little delay for about six weeks until the finding radar. Depth charges from the
keys were routinely changed. In order to corvette Aubretia and two destroyers,
keep the capture secret, the British reported: Broadway and Bulldog, eventually brought
“One of our patrols operating in northern U-110 to the surface. Upon reaching the
waters encountered the München, a German surface, the U-Boat commander, Fritz-Julius
armed trawler. Fire was opened and the crew Lemp, noting that he was surrounded by
of the München then abandoned and scuttled British warships, gave the order to abandon
the ship. They were subsequently rescued ship. It was Lemp’s responsibility that his
and made prisoner.”79 German intelligence, vessel and its important documents such as
which at the time was reading British com- cipher material would not be captured by the
munications, knew nothing of the captured enemy. Cipher material was to either go
documents. down with the submarine or be tossed over
Yet another “pinch” came just two the side in a weighted bag. Radioman Georg
days after documents were captured from Högel recalled the scene: “Lemp was
the München, and resulted from Dönitz’s standing over the hatch, looking down into
westward deployment of U-Boats. On May the control room. My comrade, who was the
9, 1941, British destroyers Aubretia, radio officer, and I were shouting upwards:
Broadway and Bulldog were escorting the ‘What’s to be done with the secret items?’
outward bound convoy OB318 south of He shouted to us: ‘Leave everything. Leave
Iceland. The U-110, which was also everything. Get out, get out, get out.’”82
patrolling the area, had sunk seven merchant Lemp also told Wilde to leave the Enigma
ships totaling over 39,000 tons in the last and documents for the ship was sinking.
four days.80 Aboard the U-Boat, Second However, instead of sinking, U-110
Lieutenant Ulrich Wehrhöfer was in charge continued to float.
of changing the Enigma settings every night Instead of finishing the job and
at midnight. Though Wehrhöfer would destroying the vessel, the captain of the
retrieve the documents from the safe, he HMS Bulldog, Joe Baker-Cresswell, decided
often left the task to the crew telegraphists to send a boarding party to the U-110.
on duty. Ignoring protocol, Wehrhöfer did Lieutenant Balme, a gunnery control officer,
not supervise the change of the important led the party, and spent around six hours
codes. The radio operator for U-110, Heinz aboard the U-Boat. Balme noted: “The U-
Wilde, recalled: “We were told that the Boat had obviously been abandoned in great
chances of breaking in [to the Enigma haste as books and gear were strewn about
codes] were one to one trillion. Today you the place… Meanwhile the telegraphist went
would say that breaking in was as likely as to the W/T office… This was in perfect
winning the jackpot in the lottery. But the condition, apparently no attempt having
been made to destroy books or apparatus…
78
Paterson, 116. The coding machine was found here,
79
Harper, 23.
80
David Brown, Atlantic Escorts: Ships, Weapons,
81
and Tactics in World War II. (Annapolis: Naval Williams, 130.
82
Institute Press, 2007), 68-69. Ibid., 133.

27
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

plugged in as though it was in actual use the settings for June became operational,
when abandoned.”83 The documents cryptanalysts were reading messages six
retrieved from U-110 were some of the best hours after they were received.87 More
kept secrets of the war. The German importantly, changes to the naval Enigma
prisoners had no idea that their U-Boat had were communicated through the “Offizier”
been boarded and were confident that it had codes among other messages of the highest
sunk before anyone could reach it. Further- security. British cryptanalysts now had the
more, Dönitz and German code experts ability to read the same messages as the
never knew the British had managed to German High Command. Furthermore,
capture a working Enigma machine with all Balme and his boarding party also manage
of its parts. CJ Fairrie of the HMS Bulldog to collect radio logbooks, charts indicating
noted: “Charts, codes, names of spies, U- the positions of German minefields (which
Boat bases, knowledge of movements of our would prove valuable for coastal raids), and
convoy–an enormous coup–turning point in charts detailing the fixed positions of U-
the Battle of the Atlantic! Materials seized Boats in the Atlantic and those U-Boats that
from the U-Boat [were] passed up from were designated to refuel them. Fifteen of
hand to hand. Among them was a wooden these refueling subs would be sunk in the
box that looked like a typewriter. At no time following weeks. With the capture of the
were we aware that a German Enigma documents aboard the U-110, British code
machine had been captured.”84 Along with breakers were reading messages in June
the Enigma machine, a stack of code books almost as fast as the Germans, even when
was retrieved that detailed the keys to the monthly tables changed. From these
reading the U-Boat’s short signals and messages, the men in Huts 4 and 8 gained
weather reports for April and June. The knowledge of U-Boat tactics, patrol routes,
tables for May were most likely destroyed operational routines, supply arrangements,
accidently in transport to the Bulldog upon and plans for attacks. The information
the water soluble ink’s contact with water.85 deciphered from Bletchley Park was sent to
Also, a set of bigram tables was recovered the Admiralty’s Submarine Tracking Room
and, most importantly, the “Offizier” short and could be used to reroute convoys away
signal code settings for June. Sensitive from wolf packs. Soon convoy routes would
material was encoded with the “Offizier” be checked with the intelligence gained from
settings and then enciphered again with the Ultra decrypts.
regular settings. While Ultra decrypts offered insight
Extremely beneficial to British in to the enemy’s operations and plans, the
intelligence, the finds would prove priceless. Submarine Tracking Room could also gain
Hut 8 received the captured documents by information from Intercept Stations located
May 13. Combined with the documents along the shore line. The enemy signals
from the München, the material gained from gained from these stations were sent directly
U-110 allowed code breakers at Bletchley to Bletchley Park. Analysis from signal
Park to read U-Boat messages eleven days intelligence gained from direction finding –
after they were sent.86 Furthermore, when strength of the signal, length, time and
number–also provided the British Navy with
83
Peter Padfield, War Beneath the Sea: Submarine a part of the overall puzzle. By June, crypt-
Conflict During World War II (New York: John analysts were reading German messages in
Wiley & Sons, Inc., 1995), 128.
84
Paterson, 118. “real time.” A message intercepted at 12:18
85
Padfield, 129.
86 87
Harper, 25. Sebag-Montefiore, 144.

28
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

a.m. on June 1 was deciphered in Hut 8, positions of the submarines, the machinery
translated in Hut 4, and dispatched to the that was needed to carry out direction
Operational Intelligence Centre by 4:58 finding was too large to be fitted onto a ship.
a.m.88 Furthermore, HYDRA, the code used Furthermore, the distance of the ocean
for German ships in the North Sea and would create inaccurate readings. However,
Baltic, minesweepers patrolling the Nor- with the use of high frequency direction
wegian coast, and all U-Boats was being finder, an operator could fix the bearing of a
read at a similar pace. signal sent out by a U-Boat. If two operators
These breakthroughs came at a could pick up the signal, an intersecting
desperate time for Great Britain, for in point could be determined.
Spring of 1941, the total number of shipping The revealed location of U-Boats
losses from all causes, including U-Boats, and their refueling vessels in an area often
aircrafts, mines, and surface raiders led to their destruction. In June of 1941, U-
averaged over half a million tons a month. 557 was running low on fuel and ordered to
In May alone, U-Boats alone managed to meet the Belchen, a German tanker, near the
sink 324,550 tons British shipping.89 Extra- southern tip of Greenland to refuel. U-557
polating those numbers, the British Admi- did refuel and continued on with U-109 and
ralty expected further losses of 4 to 5 million U-93 southward. Later, the U-Boats were to
tons in the fall. To make matters worse, learn that the Belchen was sunk by British
British shipyards did not have the capacity ships. Unbeknownst to the U-Boat com-
to produce more than a million tons a year. manders, the destruction of the Belchen and
And although the United States was offering her supply network was the result of the
some assistance, it would take the Ameri- finds from U-110. Surface vessels were also
cans around eighteen months to create a intercepted by British ships with the aid of
mass production program that would be deciphered Enigma messages; the Lützow,
effective against the Germans. Planners for example, suffered damage that would
estimated that by the end of the year, Great keep her in port for months.
Britain would face deficits of 7 million tons During the weeks that followed,
of raw materials, including 2 million tons of Dönitz ordered the area that the Lützow
food and over 300,000 tons of oil. 90 Unless patrolled to be searched for convoys, but
the number of sinkings could be reduced, the nothing was reported. Earlier in April, a
Germans might win the war. possible leak in security occurred to the U-
By the summer, however, the Boat command when the British began to
situation was far from hopeless. With the change the course of convoys. However,
use of early high frequency direction finding Dönitz was certain that convoys were
and timely Ultra intercepts, the location and successfully passing by U-Boat wolf packs
movements of German wolf-packs could be with the aid of superior long range radar. He
pinpointed. In order to monitor the activity still believed the Enigma was impossible to
of wolf packs, the German control system break. While the captures from the
depended on the use of a high frequency München and U-110 proved useful, they
radio. While the Germans were aware that were not a permanent solution to the naval
simple direction finding could reveal the Enigma. In late June 1941 the German navy
began to use a new set of bigram tables.
88 Therefore, Bletchley Park’s cryptanalysts
Harper, 25.
89
White, 289. would need another two to three months of
90
Padfield, 150. naval Enigma settings in order to continue

29
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

breaking the enciphered messages after raiders, and long distance U-Boats on patrol
June. In light of the success from “pinches,” in the South Atlantic.92 The information
Hinsley urged British destroyers to board the about the U-Boats themselves gained from
Lauenburg, another German weather ship. captured documents helped the British
Sailing from Trondheim, a Norwegian port, navy’s chances of destroying them. Upon
three British destroyers finally spotted the the capture of U-570 in August, the vessel
ship on June 28. However, radio operators in was towed to Iceland, where it was
the Lauenburg heard the British radio discovered that this new model of U-Boat
messages and the crew was ordered to could reach depths of over 600 feet. Depth
evacuate. The radio operator and cipher charge settings were then adjusted
clerk managed to throw the Enigma machine accordingly.
overboard and the cipher documents into a Once Bletchley Park’s cryptanalysts
furnace. When the ship was boarded, it broke the naval code, the impact on the
appeared that nothing could be recovered. tonnage sunk by the Germans was
However, the order was given to collect noticeable. With a 320,000 tons loss in June,
every document, charred or not. After filling the number quickly dwindled to 98,000 tons
thirteen mail sacks, it was determined that in July, and 84,000 tons in August.93
the Enigma keys for July were still readable, Sinkings of Allied merchant ships also
as well as plug board settings for the month dropped abruptly. In June, sixty-eight ships
and internal settings. When the documents had been sunk, but only twenty-five ships
reached Bletchley Park on July 2, Huts 4 were sunk in August and only ten in
and 8 were able to be successfully read November.94 Unbeknownst to Dönitz, the
German naval messages within three hours British were successfully breaking the naval
of their transmission for the rest of the Enigma codes. By reading the messages
month.91 Often after the capture of between headquarters and the submarines,
documents, the Admiralty would wait to see the Admiralty in London could determine
if the German High Command would be the position of every U-Boat and their patrol
alerted to the capture and question whether lines and could reroute convoys around wolf
the British had indeed captured enemy code packs. At the same time, Ultra decrypts
books. However, every time, the Germans alerted the Admiralty to the position of
remained silent. While talk of a security German surface raiders. For example, in
breach was whispered throughout the lower November of 1941, the German raider
command, Dönitz refused to alter the Atlantis, while on her way back to Europe,
security of either his naval Enigma or the was ordered to refuel U-Boats in the South
procedures for encipherment. Atlantic. Through Ultra intercepts, British
The speed of decryption slowed in intelligence was alerted to the ship’s change
August because of failed attempts at in course and could identify her new
capturing more “pinches” in the English location. On November 22, a seaplane
Channel, but the documents Balme and his accompanying the British cruiser Devon-
men retrieved allowed cryptanalysts to shire identified the Atlantis, which was
decipher most of the messages for the rest of disguised as a Dutch ship. While the U-Boat
the year. Ultimately, U-110 has been dived, the Devonshire opened fire on the
regarded as one of the most valuable German raider, eventually sinking her. The
captures of the war. “Pinches” led to the
sinking of tankers, supply ships, surface 92
Padfield, 129.
93
White, 128.
91 94
Harper, 28. Ibid., 121.

30
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

crew of the Atlantis radioed for help, and the convoy unless there had been a previous
radio signals were intercepted and sighting by a U-Boat. “Chance alone it
deciphered to reveal the location of the cannot be–chance does not always fall on
rescue and U-Boat supply ship. Days later one side, and experience extends over
the ship, Python, would also be sunk by the almost ¾ of the year. A likely explanation
Devonshire’s sister ship, HMS Dorsetshire, would be that the English, from some source
while attempting to refuel U-Boats on her or other, obtain knowledge of our concen-
way to the wreck of the Atlantis. trated dispositions and avoid them, thereby
By this time, convoys were also running into boats proceeding singly.”97
beginning to employ additional escort ships. Dönitz had already eliminated the possibility
More escort ships were being produced and of treason because of its heavy penalty and
their crews were better trained in anti- continued to ignore the idea that the British
submarine warfare. Furthermore, with more had broken the Enigma; to Dönitz the task
protection, the minimum speed for a convoy was mathematically impossible. Dönitz
rose from thirteen to fifteen knots because believed that the British were using high
the Admiralty realized that slower ships level radar or locating U-Boats by aircraft.
were at much greater risk to U-Boats than Even if the British had managed to capture
faster traveling vessels.95 Enigma documents, so many safeguards
In addition to Ultra decryptions and were built into the process that decryption
the improved speeds and protection of would be impossible. For example, even if
convoys, Dönitz did not possess proper the British had the rotor settings that were
aircraft to locate Allied convoys; he relied changed each month, they would also need
only on his U-Boats on distant patrols to indicator lists and bigram tables, which also
identify convoys. The lack of aerial were changed often. Dönitz believed it was
reconnaissance for the German navy was at impossible for the British to gain all items,
a serious level; it was vital to search the sea. along with an Enigma machine with its eight
After stating his case for aircraft, Dönitz working rotors, let alone continue to capture
only received one group of the Luftwaffe, the key documents every month as the
and of the pilots he was given, many could settings were altered. Ultimately, Dönitz and
not navigate well over the sea. Furthermore, the Naval Staff failed to realize the lengths
the pilots often gave Dönitz incorrect that the British were going to and the scale
coordinates for convoys. Therefore, the and speed of the operation to break the naval
attacks by German airplanes on Allied Enigma. The German system was infallible
convoys were few. in the eyes of the high command.
By November 1941, Dönitz was It is questionable whether the U-Boat
becoming frustrated with the continuing and Luftwaffe attacks on British shipping
failure of his U-Boats. In his war diary, and ports could have eliminated her from the
Dönitz later wrote: “coincidence always war without the regular decryption of Ultra.
seems to favor the enemy.”96 Moreover, he The statistical projection of losses and the
noted in his diary on November 19 that increase of operational U-Boats suggested
individual U-boats were finding convoys, that this might be the case. British wartime
but the carefully formed U-Boat patrol lines intelligence noted: “It was only by the
were finding it impossible to locate a narrowest of margins that … the U-Boat
campaign failed to be decisive during
95
Brown, 68.
96 97
Williams, 157. Padfield, 166.

31
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

1941.”98 However, this idea does not take Shark Blackout of 1942
into account the improved methods of
defense such as improved anti-submarine By the start of 1942, new U-Boats
warfare methods, particularly the use of were being produced at a rate of twenty a
long-range aircraft. With Hitler moving month.102 At the same time, the number U-
towards Russia, the majority of the Boat veterans was dwindling as many died
Luftwaffe operations moved east; therefore, in battle at sea, were captured and sent to
the number of shipping losses from aerial POW camps, promoted to positions on
attack dropped. Furthermore, the number of Dönitz’s staff, or given flotilla commands.
U-Boat losses dropped due to the rerouting The majority of the newer U-Boat crews
of convoys from information gained from consisted of young, ambitious men eager for
Ultra, higher speeds of vessels, and the great battle at sea. Often service on a U-Boat
number of U-Boats that were transported to would lead to the promise of early command
the Baltic and Arctic to aid in the campaign elsewhere in the navy. Now, with the entry
in the east. of the United States into the war, more U-
U-Boat historian Dr. Jürgen Rohwer Boats were needed to attack American
considers this time to be a turning point and shipping. U-Boat High Command saw
gives credit to Ultra as one of the factors American involvement as a short term
that determined the outcome of the battle of advantage, but a long term danger. The
the Atlantic. Clay Blair, an American United States would have to assemble
historian, estimated that of the 3700 mer- convoys for its east coast shipping, which
chant ships that traveled in the Atlantic in could provide prime targets for the newly
1941, only fifty-four were lost to U-Boats. produced U-Boats and their young crews.
Harry Hinsley estimated that during the However, it was only a matter of time before
second half of 1941 deciphered Enigma American industry reached its peak and the
codes saved 1.5 to 2 million tons of number of new merchant ships and escorts
shipping,99 and about 350 vessels were would outnumber those sunk.
saved from U-Boat torpedoes.100 While At the same time, the success of
Dönitz further blamed his losses on the cryptanalysts at Bletchley Park from the
transfer of submarines to the Mediterranean gains of “pinches” would be short lived. On
and Arctic, the real decline in numbers was February 1, 1942, all U-Boat cipher
thanks to the British use of Ultra and operators were instructed to abandon
advances in anti-submarine warfare. How- HYRDA in order to tighten security. The
ever, despite these statistics, by the end of Germans introduced a new model of the
the first two years and four months of the Enigma, the Triton M4, which had the
war German U-Boats had managed to sink capability to hold four rotors at one time
1124 ships – 5.3 million tons of British and instead of three. The codes produced by the
neutral shipping.101 With the entrance of a new machine, code named SHARK, were
new ally into the war, Great Britain could unreadable when subjected to past methods
only hope that the coming months would of deciphering. Turing calculated that in
bring better news. order to break the new codes at the same
rate as the old ones, cryptanalysts would
need bombs that were twenty-six times as
98
Ibid., 153. fast as the ones they were currently using.103
99
Brown, 75.
102
100
Paterson, 127. Stern, 116.
101 103
Williams, 160. Ibid.

32
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

While the men and women at Bletchley Park Operation Drumbeat, or Paukenschlag. That
were in the dark thanks to the new naval month 154 ships were destroyed by U-Boats
Enigma codes, high frequency direction and German surface raiders–a total of
finding could still track some U-Boats so 680,000 tons.105 Most of the tonnage was
that their future positions could be assumed lost in the western Atlantic; however, those
by their movements. However, with Dönitz ships on their way to Great Britain from the
launching more U-Boats than ever before United States were often sunk off of the
from a fleet of over 270, cryptanalysts American coast, not as they convoyed across
needed once again to read German intercepts the Atlantic. 106 June of 1942 saw an all time
in order to keep submarines from sinking high for the U-Boats in terms of tonnage.
thousands of tons of shipping.104 At this German submarines had managed to sink
time, the four-rotor Enigma machine was 124 ships totaling 623,545 tons in the
used for U-Boats operating in the Atlantic Atlantic, Mediterranean, and Arctic.107 A
and Mediterranean. Therefore, it was large proportion of the ships sunk were
possible that a U-Boat operator who tankers that contained needed oil for the
enciphered a message in the four-rotor Allies. With an end-of-the-year shortfall of 2
Enigma transmitted the message to another million tons, compared to the amount of oil
U-Boat which only possessed a three-rotor needed to continue the war in European and
machine before realizing the error. Pacific theaters, domestic oil was rationed
Therefore, the message had to be transmitted until tankers could successfully reach their
again with the key for the three rotor destination.
Enigma. Using these two intercepts, With the cryptologists still in dark at
cryptanalysts were able to determine that a Bletchley Park for the majority of the year,
fourth rotor was added to the naval Enigma losses and the number of operational U-
machine. However, the wiring of this fourth Boats would only continue to rise. U-Boat
rotor had been unknown. Moreover, with the situation reports from the week of February
addition of the fourth rotor, the number of 23 noted: “In the absence of Special
possible solutions increased by a factor of Intelligence [Ultra decrypts] an accurate
twenty-six and successful “cribs” were slim estimate of the number or disposition of U-
to none. Now bombs would take twenty-six Boats operating in the Atlantic is not
times longer to run the possible keys for a possible.”108 However, it can be argued that
machine that used four rotors through a the British were fortunate that Dönitz
three-rotor bomb. This use of the bombs tightened security on the Enigma by adding
took valuable time away from the efforts to a fourth rotor at the same time during what
break the codes of the Army and Luftwaffe. is known as the U-Boat’s second “Happy
However, new bombs were quickly made Time.” Dönitz would still concentrate his U-
that were able to perform twenty-six times Boat forces against Atlantic convoys, and if
as many tests on keys in only twice the time. Allied convoys were unable to avoid wolf
The first four-rotor bomb was installed in
June 1943. 105
Williams, 174.
As early as February 1942, Dönitz 106
Ibid.
began moving his U-Boats into the Gulf of 107
Samuel Eliot Morison, The Atlantic Battle Won:
Mexico and the Caribbean Sea. U-Boats May 1943-May 1945 (Boston: Little, Brown and
crept close to America’s east coast in Company, 1956), 8.
108
David Syrett, ed. The Battle of the Atlantic and
Signals Intelligence: U-Boat Situations and
104
White, 298. Trends, 1941,1945 (Aldershot:Ashgate,1998),13.

33
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

packs as before, Dönitz could have come to time period. 111 Convoy losses continued at
the conclusion that the British had been a rate of 26 ships of 155,000 tons each
intercepting and successfully reading the month until the end of the year.112 Losses for
earlier radio signals. The secret of Ultra was the entire year included 1,006 ships totaling
still safe because independent ships were 5,471,222 tons; the worst figures for the
still being sunk by single U-Boats. Thus, the Allies to date. In addition, Britain had over
success of the “Happy Time” that occurred 2.5 million tons of work in repairing
near US waters may have preserved the damaged ships.113 Yet, the staggering losses
secrecy surrounding Ultra. were not enough. Dönitz had calculated that
With only three U-Boats sunk from his U-Boats needed to sink 700,000 tons per
January to May 1942,109 Allied naval month to cripple the convoy chain; the
commanders realized that normal navy British Admiralty had predicted 600,000
training was not enough to destroy the tons per month. Throughout 1942, the
submarines. Seamen needed to be proficient Germans averaged sinkings of 456,000 a
in not only naval tactics but also sonar, month, with five months exceeding 500,000
radar, depth-charging, and air bombing. tons.114
New recruits and the best navy men were In late October, a “pinch” would
given refresher training in hopes of tipping once again aid the men of Huts 4 and 8. On
the scales in the U-Boat war. However, operation in the eastern Mediterranean, the
despite this new training, the Germans were British destroyer HMS Petard on October
still producing U-Boats faster than Allied 30, 1942, detected a submarine in the
forces could sink them. By July, Dönitz vicinity. Depth charges soon forced U-559
finally possessed more than his target to the surface off of the coast of Port Said.
number of 300 U-Boats and deployed most With her crew already abandoning ship,
of them in the central Atlantic, where the three men from the Petard decided to board
Allied escort force was the weakest because the submarine. Lieutenant Anthony Fasson,
most British ships in the area had been AB Colin Grazier, and NAAFI assistant
transferred to Eastern Sea Convoys. Tommy Brown managed to recover books
In August, U-Boat production rose to and documents from the abandoned U-Boat.
twenty-one a month; the fleet itself had a However, Fasson and Grazier lost their lives
strength of 342 submarines. However, fifty- when a rush of water entered the sinking
nine were being used for training, while 131 submarine. Brown still managed to recover
were on mission in the Baltic or on test a short signal codebook and the 1942 short
trials. Of the 152 remaining operational U- weather cipher from the U-Boat. The short
Boats, Hitler had ordered that twenty-three weather signals were still transmitted with
be placed in the waters around Norway in the three-rotor Enigma machine, but
case of an invasion and sixteen were ordered cryptologists cracked the ciphers within six
to the Mediterranean for the Italians to aid in weeks of receiving the material from U-559,
the interdiction of Allied supplies to North making it easier to figure out the setting for
Africa.110 While, Allied forces managed to the fourth rotor. After ten months in the dark
sink thirty-two submarines in the last six on naval traffic, by December 13, six weeks
months of 1942, the Germans managed to after the capture of the material from U-559,
complete 121 new U-Boats in that same
111
White, 291-92.
112
Morison, 9.
109 113
White, 291. White, 177.
110 114
Padfield, 274. Ibid., 177-78.

34
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

cryptanalysts at Bletchley Park were once British messages, which allowed Dönitz to
again reading the naval Enigma. And by find and destroy many more ships in
January, cryptologists were deciphering convoys. On the other hand, America was
messages quickly enough to be used opera- by now sending Liberty Ships across the
tionally. ocean at staggering rates. In 1941, 794,000
This capture of key Enigma tons of shipping was built in American
documents ended the lack of intelligence shipyards.117 Great Britain could only hope
about U-Boat movement and operations that that these Liberty Ships could be produced
had spanned more than 10 months. During faster than Germany could sink them, thus
that period, U-Boats had been sinking Allied tipping the scales in favor of the Allies.
merchant ships twice as quickly as new After December 1942, cryptanalysts
ships were being built. These sinkings at Bletchley Park read U-Boat messages
threatened to reduce British rations to even every day except for the occasional failure
lower numbers than the year’s current to find the day’s entry code. British
figures and disrupt the flow of materials, cryptanalysts were often able to read
weapons, and troops for an invasion of enciphered German codes within hours of
German occupied territory.115 Once again, their transmission, which gave naval com-
British intelligence, which was aware of the manders vital information as to the location
communication between U-Boats and Karl of German submarines. With renewed
Dönitz, could reroute convoys away from access to the U-Boats’ radio messages, the
dangerous U-Boat packs. Furthermore, with British Admiralty could once again reroute
the location of U-Boats revealed, so many convoys around U-Boat wolf packs. From
submarines were successfully sunk that U- July 1942 to May 1943, Allied forces
Boats were ordered to leave the North rerouted 105 of the 174 North Atlantic
Atlantic for safer areas. Ralph Erskine, a convoys, placing them completely out of
naval signal intelligence authority noted: danger. Furthermore, attacks on fifty-three
“From December 1942 to June 1942, these convoys were minimized, leaving only six-
[captured code books] were the only means teen that sailed directly into German wolf
by which Bletchley Park could find ‘cribs’ packs and, therefore, endured multiple
with which to break SHARK.... This helped sinkings.118 Ultimately the success of Allied
turn the course of the war, and played a rerouting depended on the accomplishments
major part in winning the war. Few acts of and skills of cryptanalysts at Bletchley Park.
courage by three individuals can ever had
such far reaching consequences.”116
By winter, German production of U-
Boats had reached an all time high. Twenty-
four new U-boats were now being launched
each month, and with a fleet of 416 – 110 at
sea at any time and fifty permanently in the
Atlantic–Dönitz believed he had finally met
the quota he desired. During this time
Funkbeobachtungsdienst, or B-Dienst, Ger- 117
Twenty-one million tons of American shipping
many’s code breaking agency, was breaking would be assembled over the course of the next
three years. Richard Overy, Why the Allies Won
(New York: W.W. Norton & Company, 1995),
115
Harper, 8. 62.
116 118
Ibid., 8-9. Keegan, 111.

35
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

Allied Victory in the be impossible for the enemy to


Battle of the Atlantic: 1943-1945 decipher them. And to this day, so
far as I know, we are not certain
In early 1943, after Dönitz replaced Grand whether or not the enemy did
Admiral Raeder as the Commander-in-Chief succeed in breaking our ciphers
of the German navy, it was clear that Britain during the war.120
could not be forced to surrender by means of
starvation, so the chief objective of the U- Despite his beliefs that the Enigma ciphers
Boats became to prevent the United States were unbreakable, Dönitz pushed for tighter
from deploying its full strength in Europe. security surrounding the codes. Because of
American troop buildup could be restricted the heightened security for Enigma ciphers,
by targeting convoys in the North Atlantic. the German High Command would spend
Dönitz’s fleet rose to 409, with 178 U-Boats less time entertaining the possibility that the
patrolling the Atlantic. From January to enemy was breaking their codes. Cipher
March, Allied ship sinkings rose from clerks were ordered to pay more attention to
203,000 tons to 627,000 tons, while convoy their transmissions to avoid mistakes.
losses averaged forty-nine ships per month. Furthermore, security measures surrounding
Meanwhile, B-Dienst had broken the Admi- the transportation and distribution of daily
ralty’s newest convoy codes, allowing the cipher keys were also examined.
Germans to read convoy rerouting orders For ten days in January, naval
and daily U-Boat reports. By this time, B- Enigma settings could not be read. U-boats
Dienst was reading eighty percent of British sank at this time two American cargo
signals traffic.119 vessels heading for Britain, amounting to the
At the start of 1943, B-Dienst began loss of forty-two tanks, 428 tons of tank
sending Dönitz reports from British parts and supplies, 236 pieces of artillery,
intelligence on the positions of German U- twenty-four armored cars, 5,210 tons of
boats that was unusually accurate. Dönitz ammunition, 600 rifles, 2,000 tons of stores,
quickly ordered an evaluation of the security and 1,000 tankloads of gasoline. In order for
of the naval Enigma. This evaluation, a convoy to experience similar destruction
performed by Admiral Kurt Fricke, the by bombing, it is estimated that the enemy
Chief of the Naval War Command, would have to conduct 3,000 sorties.121
reassured Dönitz that the Enigma ciphers Moreover, cryptanalysts at Bletchley Park
were unbreakable. He was convinced that were unable to break the naval Enigma
the accuracy of British intelligence was due settings on February 8 and would not break
to reports from spies and observations from them successfully until February 17. As a
fishing vessels. Dönitz later wrote in his result, three Atlantic convoys were
memoirs in 1958: intercepted by U-Boats and suffered
significant losses. One of these, SC118, lost
Our ciphers were checked and twenty-two percent of its original ships.122
rechecked to make sure they were During this blackout, seven tankers were
unbreakable, and on each occasion sunk totaling 55,000 tons and carrying over
the Head of the Naval Intelligence 100,000 tons of fuel–a seventy-seven per-
Service at Naval High Command cent loss over three days. This was the
adhered to the opinion that it would
120
Ibid., 84.
121
Persico, 160.
119 122
Harper, 85. Padfield, 318.

36
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

highest proportion of any convoy lost during improvements in sonar. Later in the war,
the war.123 Cryptologists experienced other depth sonar and Doppler sonar helped
isolated unsuccessful days from March 10 operators determine the depth and the speed
onwards. Two convoys in mid March, of their target. Overall, improved convoy
SC122 and HX229, sailed directly into U- defenses made it more difficult for U-Boats
Boat wolf packs. Had cryptanalysts been to get close enough to attack.
successfully reading intercepts, these two By late spring of 1943, the amount of
convoys could have been rerouted. As a tonnage produced per month by Allied
result, twenty-two ships were sent to the forces surpassed that of the tonnage lost to
bottom. That month 108 ships totaling U-Boats. In April, U-Boat losses were still
476,000 were sunk in the North Atlantic.124 considered sustainable; however, the
The success of wolf pack tactics and the effectiveness of these U-Boats, in terms of
accomplishments of B-Dienst put the the amount of tonnage sunk per day,
Germans back on top. dropped by half in comparison to previous
By April, air defenses over the North months.126 Americans produced more than
Atlantic had improved because the Allies one million tons of merchant shipping,
began using for convoy duties a large which was four times the nation’s output in
number of escorts and aircraft that 1939.127 Naval vessels at this time were
previously had been held in reserve. The “air designed for better defense against U-Boats.
gap,” that is, the part of the Atlantic that With more ships being produced that were
previously could not be covered by aircraft, capable of reaching faster speeds, escort
disappeared with the improved production vessels now traveled in front of and behind
and numbers of long range aircraft flying the convoy, and offered further protection
from Iceland, the Azores, Ireland, and against U-Boats.
Newfoundland.125 Furthermore, escort ships Slowly Allied forces were making
and patrol aircraft were being equipped with progress. Germany lost fifty-five submarines
improved radar that could detect a U-Boat at in April and had only managed to produce
a greater range depending on the antenna eighty-three during that same month.128 At
height. The introduction of higher frequency the same time, U-Boats were only sinking
radar doubled its effective range, to the point on average 127 tons per U-Boat per day.
where a periscope could be detected in a Even if U-Boats could maintain this
calm sea. Also “Huff Duff,” a high average, it would take 325 U-Boats to sink
frequency direction finder that could be the 1.3 million tons a month that were
found on most ships of the Royal Navy, needed to keep up with new Allied ships.129
allowed Allied forces to target and destroy Dönitz in April only had 207 U-Boats in the
U-boats at a faster rate. Because of these Atlantic, and with only twenty-seven new
developments and improvements, U-Boats boats being produced every month, it would
lost their ability to surface near convoys, take over ten months before the total in the
which weakened their offensive capability. Atlantic would reach 325. Bletchley’s
Moreover, when a U-Boat was detected and monthly report stated: “Historians of the war
forced to dive beneath the waves, it could are likely to single out the months of April
now be tracked more easily due to
126
Ibid.
123 127
Harper, 81. Pitt, 182.
124 128
Ibid. Morison, 10.
125 129
Stern, 131. Padfield, 329-30.

37
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

and May 1943 as the critical period during 30, German radio reported: “This year the
which the strength began to ebb away from British and Americans managed after three
the German U-Boat offensive, not because years of preparation to gain a success
of the low figure of shipping sunk … but against the U-Boat. In the second half of the
because for the first time the U-Boats failed year, as far as U-Boat exploits were
to press home their attacks on convoys when concerned, sinkings have considerably fallen
favourably situated to do so.”130 Dönitz’s off.”132 The broadcast went on to state that
tonnage war was quickly becoming total sinkings were only twenty percent less
unwinnable. than 1942. The real number was fifty-six.133
In the following month, U-Boats Dönitz later wrote, “We had lost the battle
were being sunk faster than they could be of the Atlantic. Events in May 1943 had
built, and Allied shipping losses had reached shown beyond dispute that the antisub-
their lowest point since 1941 in what the U- marine organization of the two great sea
Boat command called “Black May.” U-Boat powers was more than a match for our U-
losses nearly tripled during the month. Boats.”134
Losing thirty-eight U-Boats, Dönitz decided By June the tonnage of merchant
to withdraw his submarines from the North ships sunk was below 100,000, and of the
Atlantic and place them to the south and 429 U-Boats in the fleet, only half were
west of the Azores to be used against available for operations, with the remainder
American shipping routes. With a third of of the submarines in repair, on training
his fleet destroyed in the spring of 1943, missions, or testing new technology or
Dönitz decided to fight on. “The U-Boat arm upgrades.135 By the end of the year, the
could not along stand aside and watch the Allies had only lost 3.2 million tons of
onslaught, of which it had hitherto borne the shipping, but had built 43.59 million.136
brunt, now fall in all of its fury as an However, Dönitz still hoped an
additional burden on the other fighting improvement would save his U-Boats: the
services and the civilian population,” Dönitz snorkel. Created by a Dutch naval officer,
later wrote in his memories, Ten Years and the snorkel and enabled the submarine’s
Twenty Days.131 Allied forces were now diesels engine to receive air and carry away
gaining the upper hand over the German exhaust fumes. The snorkel was later
submarines. refined, which enabled it to be lowered
By the end of 1943, U-Boats had when it was not in use. The invention made
failed to interrupt or cut off supplies from it more difficult to detect U-Boats and
the Western Allies to Russia, to prevent allowed them to travel for longer periods of
America’s attacks on Africa and Italy, or to time. While the Germans saw the snorkel as
prevent American troop build-up in Great the best weapon against Allied air power,
Britain. Moreover, they had become less the mechanism took time to be
aggressive in their attacks on Allied manufactured and installed in U-Boats.
shipping. By the end of the year, Allied Regardless of the improvements that the
forces also had adequate numbers of escort Germans were making to their submarines,
carriers and destroyer escorts with better U-Boats were becoming less and less
trained crews and improved anti-submarine
equipment. With the addition of naval air- 132
craft, convoys acted as a unit. On December Morison, 247.
133
Ibid.
134
White, 232.
130 135
Ibid. Brown, 108.
131 136
White, 233. Paterson, 126.

38
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

effective at sinking Allied merchant ships. forces, claimed that “the obvious decline in
As they were forced underwater, the snorkel U-Boat successes has been due to only one
allowed them to continue to operate, but did invention of our enemy.”140 Hitler was
not improve their effectiveness in sinking referring to the invention of ASV radar
enemy ships. (Aircraft to Surface Vessel), but this was
In 1943, the tide turned completely only one small part of the defeat of the U-
against Dönitz as cryptanalysts at Bletchley Boat. Intelligence, research, advanced
Park had once again broken the naval training, and higher level of production all
enigma ciphers, allowing convoys to be played their own part in winning the Battle
successfully rerouted. From August 1943 of the Atlantic. In the first three months of
until the end of the war, the naval Enigma the year, U-Boats only sank three of 3,360
was deciphered without significant inter- merchant ships in Atlantic convoys. In
ruption.137 Furthermore, escorts, anti-sub- comparison, thirty-six U-Boats were sunk.141
marine aircraft and long-range patrol aircraft Until May of 1944, only forty-three U-boats
became more plentiful, and improved were at sea, out of a fleet of around 450.142
ASDIC, radar, and depth charges all contri- When the Allied invasion occurred in June
buted to the shifting of the battle to the side 1944, the Allied constant air and sea patrol,
of the Allies. coupled with the small number of
By 1944, the amount of intelligence submarines in the area, led to a minimal
from enigma ciphers decreased because U- effect on the large shipping presence in the
Boats were able to maintain radio silence for Channel and surrounding areas. The average
longer periods of time. However, by this of tonnage sunk per day also dropped
time the Allies had already gained the upper between twenty and thirty tons per U-
hand in the Battle of the Atlantic and were Boat.143 Furthermore, the life expectancy of
preparing for a successful invasion of a U-Boat fell to only two to two and a half
Europe with the help of cryptanalysts at months from June until the end of the year,
Bletchley Park. In the last two years of the as Allied forces manage to sink 112 U-
war, codes were being broken within hours, Boats. By the end of the year, 241 U-Boats
with a record time (thanks to the use of over had failed to return to their home bases.144
200 bombs) of 14 minutes.138 Though Dönitz continued to send his
In early 1944, Dönitz was more U-Boats into battle, the Battle of the Atlantic
concerned about producing U-Boats that itself would downshift during the last battles
would simply survive the journey to and of the war. Many U-Boats remained in
from battles than he was about waging an action until the end of the war, but from
effective campaign against Allied ship- January 1945 until Germany’s unconditional
ping.139 Admitting defeat in his pack tactics, surrender, the victories achieved by German
Dönitz sent U-Boats out in smaller amounts submarines were not substantial. “Their
instead of packs, still believing that convoys achievements were not large, but they
were being rerouted due to the Allies’ carried the undying hope of stalemate at sea
superior radar systems, not the work of … Nevertheless, when Dönitz ordered the
cryptologists. On January 1, Hitler in his U-Boats to surrender, no fewer than forty-
Order of the Day to the German armed
140
Morison, 247.
141
Harper, 93.
137 142
Harper, 89. Brown, 109.
138 143
Ibid., 16. Ibid.
139 144
Stern, 164. Harper, 93.

39
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

nine were still at sea … Such was the persis- Conclusion


tence of Germany’s effort and the fortitude
of the U-Boat Service,” wrote Winston Thirty years after Second World War
Churchill during the last days of the war.145 ended, the British government revealed one
On May 7, the last U-Boat of the war, U- of the greatest secrets of World War II:
3503, was sunk. The last merchant ship to be Ultra. In previous years, the successes of the
sunk, the Canadian ship, Avondale Park, Battle of the Atlantic were attributed to
went down on May 8, the last day of the radar and high frequency direction
war. finding.149 However, in 1974, F.W. Winte-
Overall, Allied forces lost 2,452 rbotham published The Ultra Secret, which
merchant ships in the Atlantic totaling 12.8 revealed that British intelligence was able to
million tons.146 Of the 1,171 U-Boats that read German radio communications.
went to war between 1939 and 1945, 666– According to Winterbotham, Ultra intelli-
about 57 percent–were lost.147 Overall, gence lay at “the hub of the whole Atlantic
36,000 merchant ship sailors were lost, but Battle,” because it gave the Allies know-
the casualty rate for German U-Boat ledge of the positions of U-Boats at sea.150
serviceman was the highest of any military Shortly after Winterbotham’s publication,
unit since the time of the Romans. Of the the British government lifted the secrecy
40,000 German officers that went to sea in restriction on Ultra. To the world’s astonish-
U-Boats, only 7,000 survived.148 While ment, the war at sea had not simply been
Germany did manage to keep Britain to won by military genius and tactics, or by the
almost minimum subsistence levels, the courage of those individuals who fought for
British prevailed in the Battle of the the Allies. It was vital information that was
Atlantic. But they did not do so alone. The gained from the enemies’ coded messages
United States by the end of the war had that turned the tide at various stages of the
transported million tons of shipping to Great war. The result of the release of the secret
Britain, providing ships faster than the work performed at Bletchley Park was the
Germans could sink them. Moreover, rewriting of history and a reevaluation of
American advances in technology, which those men and women who had worked
included radar, communication methods, around the clock in a race to reveal the inner
and aircraft, also aided in the defeat of the workings of the German military. Thanks to
U-Boat. While improvements in technology these men and women, who had never
and military strategy played a role in the before received public recognition for their
Allied victory in the Battle of the Atlantic, war efforts, most historians regard the inter-
Ultra decryptions also were critical to the ception and analysis of German radio com-
British. The information gained from munication as one of the keys to victory
German intercepts would prove to be vital to over Hitler’s U-Boats.151
the Allies in their battle against the U-Boat.
  149
Jürgen Rohwer, “Signal Intelligence and World
War II: The Unfolding Story,” The Journal of
  Military History 63, no. 4 (1999): 941,
  150
http://www.jstor.org/stable/120557.
David Syrett, The Battle of the Atlantic and
Signals Intelligence: U-Boat Situations and
145
White, 271. Trends, 1941-1945 (Aldershot:Ashgate, 1998), x.
146 151
Harper, 99. David, Syrett, The Battle of the Atlantic and
147
White, 2. Signals Intelligence: U-Boat Tracking Papers,
148
Ibid. 1941-1947 (Aldershot:Ashgate, 2002), 1.

40
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

Throughout the war, no effort was H. F. Hinsley notes, some 1.5 million tons of
more urgent or given higher priority than the shipping was saved thanks to Ultra de-
race to break the Enigma codes.152 crypts.158 In addition, U-Boats only sighted
Decryptions from Ultra revealed the one of every ten convoys during this time.159
positions of U-Boat fleets and information With the rerouting of convoys in the latter
about future German naval operations. half of 1941, Ultra decryptions clearly
Historian Patrick Beesly noted that the helped to tip the scales in favor of the
steady stream of decrypts “made it possible, British.
for the first time … to build up a compre- Another critical time for Ultra in the
hensive and accurate picture of the whole Battle of the Atlantic occurred in 1943 after
operational U-Boat fleet.”153 In 1939, the cryptanalysts broke the SHARK ciphers.
men and women of Bletchley Park received Many German historians agree that this
around 192 messages a day; in 1942, the turning point in the battle would not have
daily message count averaged around 1,200; occurred without the aid of Ultra.160
by 1943 the number of intercepted messages Between December 1942 and January 1943,
was soon on its way to doubling again.154 At it is estimated that deciphered SHARK
the height of its operations in late 1943, messages saved between 500,000 and
Bletchley Park was decrypting over 84,000 750,000 tons of shipping.161 Professor
messages a month.155 Jürgen Rohwer noted that with the help of
Before Enigma decryptions were Ultra, “105 convoys or about sixty percent,
being read at a regular pace, “the rate at out of the total number of 174 scheduled
which ships were being sunk … far North Atlantic convoys running between the
exceeded the rate at which they could be middle of May 1942 and the end of May
built” and it was feared that Britain would 1943 were clear of German U-Boat patrols
be starved into submission.156 First Sea so that they were not intercepted.”162 More-
Lord, Dudley Pound, stressed “if our Z over, not every convoy that traveled in the
[Enigma] information failed us at the present path of U-Boats suffered heavy losses. Of
time it would, I am sure, result in our the sixty-nine convoys that were intercepted,
shipping losses going up by anything from twenty-three escaped without loss and forty
50 to 100%.”157 With Ultra decryptions, more suffered minor damage. Only sixteen
however, the British Admiralty was able to convoys lost more than four ships during
successfully reroute many Atlantic convoys this time.163 In June 1943, Winston
during the war. In the second half of 1941, Churchill would later write, “The shipping
losses fell to the lowest figure since the
152
White, 197. United States had entered the war. The
153
Hervie Haufler, Codebreaker’s Victory: How the convoys came through intact, and the
Allied Cryptographers Won World War II (New
158
York: New American Library, 2003), 82. W.J.R. Gardner, Decoding History: The Battle of
154
Kahn, 209. the Atlantic and Ultra (Annapolis: Naval Institute
155
Persico, 108. Press, 1999), 172.
156 159
Stephen Howarth, “Germany and the Atlantic Sea- Kahn, 216.
160
War: 1939-1943” chap. 5 in The Hitler Options: Hinsley, 307.
161
Alternate Decisions of World War II, edited by Harper, 80-81.
162
Kenneth Macksey (Mechanicsburg: Stackpole Patrick Beesly, Very Special Intelligence: The
Books, 1995), 120. Story of the Admiralty’s Operational Intelligence
157
F.H. Hinsley, British Intelligence in the Second Centre 1939-1945 (Annapolis: Naval Institute
World War (New York: Syndicate of Cambridge Press, 1977), 185.
163
University Press, 1993), 307. Ibid.

41
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

Atlantic supply line was safe.”164 Without gave British intelligence specifics on the
the aid of Ultra, the battle would have been performance levels of new types of U-Boats,
far costlier for Great Britain. The Intelli- the experiences of certain commanders, and
gence and National Security Report in 1988 where they often patrolled.
noted: “Without special intelligence from Of course, Ultra was not perfect.
Triton [SHARK] the U-Boats would still Cryptanalysts did experience delays.
have been defeated in the long run, but the Depending on the information that crypt-
cost in human life in the global conflict at analysts possessed, it could take hours, days,
large would have been even more terrible or even weeks for ciphers to be decrypted.
than it was.” In addition, the diversion of a convoy
The decryptions from Ultra not only sometimes was not possible due to the
allowed the British Admiralty to reroute timing of the order. At best a convoy in
convoys, but they also aided in the 1943 could cover 240 miles in twenty-four
destruction of various German vessels such hours; U-Boats at full speed could cover
as the tankers and suppliers for the Bismark, between 320 to 370 miles.168 Also, the
as well as warships such as Tirpitz, Scharn- Admiralty could experience up to three days
horst, and Atlantis.165 Furthermore, Ultra of delays after learning that U-Boats had
also played a large role in major convoy altered course. Rerouting a convoy to avoid
battles in 1943, which would ultimately turn the new path could then be impossible. With
the tables in the Battle of the Atlantic more U-Boats in operational use, the
against the Germans. By August of 1943, a Admiralty often chose to reinforce convoys
U-Boat, whose location was revealed that traveled into the path of U-Boats. While
through Ultra in five days or less, was three a convoy itself might not be able to be
times more likely to be sunk. In addition, the rerouted in time, escorts could be transferred
rate at which merchant ships were being from unthreatened convoys to reinforce
sunk was one-sixth what it had been during those in the path of a large wolf pack of U-
black-out periods.166 Boats.169 Therefore, Ultra should not be
Even during periods of time when judged on the failures to eliminate the
cryptanalysts experienced black-outs in destruction of convoys, but the extent to
deciphering, Ultra decrypts would still prove which it reduced the frequency and scale of
useful. Though not all decryptions would the disasters.170
prove useful operationally, information from In addition, not all of the information
these messages provided details about the U- gained from Ultra could be used opera-
Boat fleet in terms of its size, state of tionally. Not every U-Boat position which
training, and operational methods.167 During was revealed in Ultra could be compro-
times of black-outs, the Admiralty still mised, because a sharp rise in British
gained information from U-Boat sightings, sinkings would certainly alert the Germans
attacks, and the few direction-finding trans- that their communication system was not
missions that were available. In 1942, infor-
mation from POWs and captured documents
164 168
Haufler, 85 Hinsley, 309.
165 169
Ralph Erskine, “Breaking the Naval Enigma J. David Brown, “The Battle of the Atlantic, 1941-
(Dolphin and Shark),” 1943: Peaks and Troughs” chap. 9 in To Die
http://cryptocellar.web.cern.ch/cryptocellar/bgac/ Gallantly: The Battle of the Atlantic, edited by
HMTR-2066-2.pdf (Accessed, February 7, 2009). Timothy J. Runyan and Jan M. Copes (Boudler:
166
Kahn, 227. Westview Press, 1994), 139.
167 170
Gardner, 202. Hinsley, 311.

42
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

safe.171 Therefore, the British would allow The U-Boats would not have done us
some U-Boats to escape as they strategically in, but they would have got us into
chose their targets. Often, spotter planes or serious shortages and put another
search boats would first enter the area, year on the war. Operation Overlord
which would then justify the destroyer would certainly not have been
which would appear hours later. Many cover launched in June 1944 without Ultra.
stories, reconnaissance missions, and false Or at least, if it had been launched, it
messages were created to keep Ultra a would probably not have been
secret. Furthermore, the black-out periods successful. My own belief is that the
that men and women of Bletchley Park war, instead of finishing in 1945,
experienced in 1942 most likely concealed would have ended in 1948 had G.C.
the fact that the Enigma codes were being & S. C. not been able to read the
broken. From February to December of that Enigma ciphers and produce Ultra
year, when cryptanalysts were in the dark to intelligence.174
the operations and locations of U-Boats, the
German Navy was enjoying considerable Others agree that without the shipping that
success along the east coast of America. If was spared by Ultra, vessels would have to
U-Boats at this time had continued to focus be pulled from the Pacific and other waters
on the Northern Atlantic instead of the to avoid a delay in the invasions of Italy and
American coast, the Germans would have Normandy.175 With a prolonged battle in the
noticed the continued improvement against European theater, other historians question
British convoys and linked it to the change whether the first atom bomb might have
from the three to the four-wheeled been dropped on a German city such as
Enigma.172 Berlin instead of Hiroshima.176
Historians over the years have The work done at Bletchley Park was
debated whether Ultra decryptions during also crucial in saving Britain from starvation
the Battle of the Atlantic helped to shorten and early defeat at the hands of the
the war at sea. Many historians note that if Germans. Without the defeat of the German
cryptanalysts had not broken SHARK, U-Boat, American troops and material,
Allied forces most likely would not have along with aid from the rest of the British
established naval supremacy in the Atlantic Empire and Canada might never have
until the second half of 1943 at the earliest, reached the European theater. Furthermore,
which might as well have delayed the U-Boats in the Atlantic would have been
invasion of Europe at least until 1945.173 able to harass the supply lines to Russia
English cryptanalyst Harry Hinsley wrote: costing more men and material, which might
have had disastrous consequences for the
Eastern Front. The British Joint Intelligence
Staff at the end of the war concluded:
171 “without Special Intelligence the war would
Simon Singh, The Code Book: The Evolution of
Secrecy from Mary Queen of Scots to Quantum have been much longer, and more costly,
Cryptography (New York: Doubleday, 1999), and indeed might never have been won.”177
184.
172
John Winton, Ultra at Sea: How Breaking the
174
Nazi Code Affected Allied Naval Strategy During Kahn, 278.
175
World War II (New York: William Morrow and Ibid.
176
Company, Inc., 1988), 109. Gardner, 217.
173 177
Harper, 9. Winton, 196.

43
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

It is also important to note that there of invulnerability from the German High
was no single capture of Enigma documents Command also led many to believe that the
that caused cryptanalysts to break the naval enemy would never be able to read the
ciphers once and for all. Each “pinch” or secret messages communicated on the Enig-
capture gave the British cryptanalysts ma machine. In addition, very few of the U-
another piece to the puzzle and the capacity Boat Command staff knew the exact details
to break ciphers until the next change in of the Enigma communication system. The
procedure. Therefore, many captures were fact that vital codebooks, printed on soluble
necessary for Great Britain in order to paper, were kept in separate locations was
continue to successfully read German another security measure that added to the
transmissions.178 confidence of the U-Boat Command.
Moreover, it is undeniable that there The U-Boat command was also
was a connection between the careful certain that if the British were indeed
rerouting of Allied convoys and the contents breaking into their codes, Germany’s own
of Enigma ciphers. Though the British code breaking efforts would have revealed
Admiralty used the highest level of secrecy this fact. In addition, they believed that there
surrounding Ultra and continuously relayed was no way that British intelligence could
false cover stories over the airwaves, if Ultra be reading their superior codes when their
had been used over a long period of time, own codes were being broken. The
the Germans would have certainly caught on Funkbeobachtungsdienst, or B-Dienst, the
to the Admiralty’s secret. However, they did German naval code breaking center, had
not for various reasons. broken the Royal Navy’s Number 3 cipher
Throughout the war, Dönitz periodically from the outset of war until
demanded constant radio communication to early 1943, which gave the details of the
keep tactical control of his boats, despite the location of convoy routes, launch sites and
high risk of interception and decryption by times. This break in the British ciphers gave
the Allies. U-Boats would transmit radio German U-Boats a considerable advantage.
signals detailing their positions, enemy air, However, the Admiralty later changed its
naval, and merchant traffic, weather, and codes in June 1943, leaving the B-Dienst in
harbor defenses. This radio traffic effect- the dark. Moreover, during the last third of
tively denied the U-Boats their chief tactical the war, British intelligence improved the
advantage–the element of surprise. Yet security of its coding methods, so that by
while constant ship to shore communication 1944, B-Dienst was unable to decipher the
lowered security, it also made Dönitz’s wolf two main British code systems. Soon
pack tactics possible. afterward, the Germans were unable to
Furthermore, the confidence that decode lower-echelon messages, and
Dönitz and the German High Command had eventually stopped trying to intercept top
in the Enigma was staggering. Many level messages.180 Because no mention of
historians believe that psychological blocks Ultra was made in British transmissions that
played a role in the lack of suspicion were decoded, German intelligence assumed
concerning the Enigma.179 The Enigma and that their codes were not being broken.
its codes were secure because the German
High Command and Enigma operators 180
believed that it was secure. The assurances David Kahn, “Codebreaking in World Wars I and
II: The Major Successes and Failures, Their
Causes, and Their Effects,” The Historical
178
Sebag-Montefiore, 2. Journal 23, no. 3 (1980), 625,
179
Winton, 104. http://www.jstor.org/stable/2638994.

44
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

The security of the Enigma also U-Boat alive. In addition, many U-Boat
played a large role in German complacency. commanders were not trained properly on
In order for an enemy to decipher a how to dispose of codebooks when the order
message, the enemy not only needed the was given to abandon ship, and the German
Enigma machine itself, but also daily keys Naval Command, which dictated Enigma
and wheel orders, rings and plug board protocol, did not always stress the impor-
settings. The Germans believed that it was tance of following protocol. Many German
impossible for an enemy to collect all of commanders believed that an attempt to sink
these items month after month, let alone the vessel should be tried first before any
from cryptanalytic means from the cipher secret code material be destroyed or thrown
text itself.181 After the month’s codes overboard.185 However, in many circum-
expired, the code breakers would be back to stances, the U-Boat could be boarded before
square one.182 it sank. This error allowed for the capture of
However, most of the leads into the vital code books. If the German Naval
decryption of the Enigma stemmed from Command had further adapted the Enigma
procedural errors. Various weaknesses in the machine so that captured code books could
security of the machine’s operating pro- not produce a quick solution, the failure of
cedures, message handling, and monitoring the ciphers may not have been as imminent.
of message transmission each brought crypt- Overall, few German investigations
analysts one step closer to decryption.183 were made into the security of the Enigma
Because of routine reports and orders, many machine. However, the results of each were
Enigma operators became sloppy in their the same: the ciphers had not been broken.
operating procedures and message handling. Furthermore, even if weaker ciphers had
Therefore, stereotypical addresses, signa- been broken, this would have no more than
tures, and content appeared in daily temporary effects. In addition, these
messages. The staggering number of temporary breaks were attributed to care-
ciphering possibilities kept the operators lessness in the German ranks, which was to
complacent and allowed for errors to be investigated.186 While the German high
occur.184 command understood that Enigma operators
However, while the Germans did try could be lazy, and the capture of documents
to tighten the security for the Enigma in wartime was a reality, they still viewed
machine, future codebooks detailing code the Enigma and its complexity as the “most
making instructions could be captured. Upon resistant of all known methods for secrecy in
attack, many sailors forgot about protocol military communications.”187 Years after the
concerning the Enigma machine and war, Dönitz himself denied any possibility
codebooks as they struggled to escape the that the codes had been broken. In his post-
war memoirs, he wrote: “our ciphers were
181
checked and re-checked, to make sure that
Stephen Budiansky, Battle of Wits: The Complete they were unbreakable: and on each
Story of Codebreaking in World War II (New
York: Simon & Schuster, 2000), 249. occasion the Head of the Naval Intelligence
182
Beesly, 67. Service at Naval High Command adhered to
183
Gordon Welchman, The Hut Six Story: Breaking
the Enigma Codes (New York: McGraw-Hill
185
Book Company, 1982), 163. Sebag-Montefiore, 3.
184 186
Jim DeBrosse and Colin Burke, The Secret in Ronald Lewin, Ultra Goes to War (New York:
Building 26 (New York: Random House Trade McGraw-Hill Book Company, 1978), 212.
187
Paperbacks, 2005), 13. Kahn, 206.

45
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

his opinion that it would be impossible for Chief of the German General Staff notes
the enemy to decipher them.”188 Instead of Ultra was “the most copious and the best
believing that their cipher system was source of intelligence.” Dwight D.
compromised, High Command continued to Eisenhower informed the men and women
believe that the contents of their secret of Bletchley Park that the intelligence from
messages were being delivered to the Allies the operation was of priceless value. Finally,
by German spies or an advanced radar American General George Marshall believed
system.189 Over the years, this ignorance that the decryptions from the Enigma
toward the breaking of the Enigma ciphers machine “contribute[d] greatly to the victory
would lead the British to perfect their [of the Allies] and tremendously to the
strategies in decryption and the tactical use saving of American lives.”192
of information from German transmissions; The work performed at Bletchley
therefore, making Ultra one of the keys to Park during the Second World War was
the defeat of Hitler’s U-Boats in the Battle unparalleled to any other code breaking
of the Atlantic. effort the world had seen. The men and
Though Ultra was one of the more women of Bletchley Park beat staggering
critical methods of anti-submarine warfare mathematical odds in a race against time
employed by the British, it was not the only between the code maker and the code
factor that led to the defeat of the U-Boat. breaker. Winston Churchill after the war
Furthermore, signals intelligence, high wrote: “If we had not mastered its [Ultra’s]
frequency direction finding, radar, sonar, profound meaning and used its mysteries
long-range aircraft, Huff-Duff, improved even when we saw them only in the glimpse,
convoy tactics, and American liberty ships all the efforts, all the prowess of the fighting
all lead to German defeat at sea. Superior airmen, all the bravery and sacrifice of the
Allied strategy, tactics, technology, and people, would have been in vain.”193
intelligence played their own role in Allied
victory. The information gained from Ultra
shaped military strategy and operations and
removed guesswork from Allied
commanders’ decisions.190 Ultra decrypts
also gave the British Admiralty insight into
high-level German intelligence, the location
of U-Boats well beyond the range of aerial
reconnaissance missions, and was trusted
more than spies.191 The battle could have
been won without intelligence such as Ultra,
but at a greater cost of men and material.
Not only have historians commented
on the importance of Ultra, but many
commanders also praise Ultra intelligence.
Decades after the war, Franz Halder, the
188
Lewin, 213.
189
Winton, 195. Syrett, 261.
190
Haufler, 308.
191
David Kahn, “Codebreaking in World Wars I and
192
II: The Major Successes and Failures, Their Ibid.
193
Causes, and Their Effects,” 639. Haufler, 6.

46
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

Bibliography
Beesly, Patrick. Very Special Intelligence: The Story of the Admiralty’s Operational Intelligence
Centre 1939-1945. Annapolis: Naval Institute Press, 1977.

Brown, David. Atlantic Escorts: Ships, Weapons, and Tactics in World War II. Annapolis: Naval
Institute Press, 2007

Brown, J. David. “The Battle of the Atlantic, 1941-1943:Peaks and Troughs.” Chap. 9 in To Die
Gallantly: The Battle of the Atlantic, edited by Timothy J. Runyan and Jan M.Copes, 137-57.
Boudler: Westview Press, 1994.

Budiansky, Stephen. Battle of Wits: The Complete Story of Codebreaking in World War II. New
York: Simon & Schuster, 2000.

DeBrosse, Jim and Colin Burke. The Secret in Building 26. New York: Random House Trade
Paperbacks, 2005.

Erksine, Ralph. 2000. Afterword to Very Special Intelligence: The Story of the Admiralty’s
Operational Intelligence Centre 1939-1945; or Codebreaking in the Battle of the Atlantic,by
Patrick Beeley, 261-284. Annapolis: Naval Institute Press, 1977.

Erskine, Ralph. “Breaking the Naval Enigma (Dolphin and Shark).”


http://cryptocellar.web.cern.ch/cryptocellar/bgac/HMTR-2066-2.pdf (Accessed, February 7,
2009).

Erksine, Ralph. “Captured Kriegsmarine Enigma Documents at Bletchley Park.”Cryptologia 32


(2008): 199-219.

Franklin D. Roosevelt Presidential Library and Museum. “FDR Letter Regarding British and
American Efforts for the War 12/7/40.”
http://www.fdrlibrary.marist.edu/website_online_version/psf/box34/a311s02.html (accessed
February 6, 2009).

Gardner, W.J.R. Decoding History: The Battle of the Atlantic and Ultra. Annapolis: Naval
Institute Press, 1999.

Harper, Stephen. Capturing Enigma: How HMS Petard Seized the German Naval Codes.
Phoenix Mill: Sutton Publishing, 1999.

Haufler, Hervie. Codebreaker’s Victory: How the Allied Cryptographers Won World War II.
New York: New American Library, 2003.

Hinsley, F.H. British Intelligence in the Second World War. New York: Syndicate of Cambridge
University Press, 1993.

47
Bletchley’s Secret War: British Code Breaking in the Battle of the Atlantic

Howarth, Stephen. “Germany and the Atlantic Sea-War: 1939-1943.” Chap. 5 in The Hitler
Options: Alternate Decisions of World War II, edited by Kenneth Macksey, 105-124.
Mechanicsburg: Stackpole Books, 1995.

Kahn, David. “Codebreaking in World Wars I and II: The Major Successes and Failures, Their
Causes, and Their Effects.” The Historical Journal 23, no. 3 (1980): 617-639.
http://www.jstor.org/stable/2638994

Kahn, David. Seizing the Enigma: The Race to Break the German U-Boat Codes 1939-1943.
New York: Barnes & Nobel Books, 1991.

Keegan, John. The Second World War. New York: Penguin Books, 1989.
Kippenhaun, Rudolf. Code Breaking: A History and Exploration. New York: The Overlook
Press, 1999.

Lewin, Ronald. Ultra Goes to War. New York: McGraw-Hill Book Company, 1978.
Miller, A. Ray. The Cryptographic Mathematics of Enigma. Fort George G. Meade: Center for
Cryptologic History – National Security Agency, 2006.

Morison, Samuel Eliot. The Atlantic Battle Won: May 1943-May 1945. Boston: Little, Brown
and Company, 1956.

National Security Agency. “How Mathematicians Helped Win WWII.” National Security
Agency.
http://www.nsa.gov/about/cryptologic_heritage/center_crypt_history/publications/how_math_hel
ped_win.shtml. (Accessed February 23, 2009).

Overy, Richard. Why the Allies Won. New York: W.W. Norton & Company, 1995.

Padfield, Peter. War Beneath the Sea: Submarine Conflict During World War II. New York:
John Wiley & Sons, Inc., 1995.

Paterson, Michael. Voices of the Code Breakers: Personal Accounts of the Secret Heroes of
World War II. Cincinnati: David & Charles, 2007.

PBS, “NOVA,” November 14, 2000, “Hitler’s Lost Sub,” Roy Scheider.

PBS, “NOVA,” November 9, 1999, “Decoding Nazi Secrets,” Live Schreiber.

Persico, Joseph E. Roosevelt's Secret War: FDR and World War II Espionage. New York:
Random House, 2001.

Pitt, Barrie. The Battle of the Atlantic. Alexandria: Life-Time Inc., 1977.

48
Ashbrook Statesmanship Thesis
Recipient of the 2009 Charles E. Parton Award

Roberts, Chuck. “Battle of the Atlantic: Allied Communication Intelligence December 1942 -
May 1945.” HyperWar Foundation. http://ibiblio.org/hyperwar/ETO/Ultra/SRH-009/index.html
(accessed July 2, 2008).

Rohwer, Jürgen. “Signal Intelligence and World War II: The Unfolding Story.” The Journal of
Military History 63, no. 4 (1999): 939-951. http://www.jstor.org/stable/120557.
Sebag-Montefiore, Hugh. Enigma: The Battle for the Code. New York: John Wiley & Sons, Inc.,
2000.

Schofield, B.B. “The Defeat of the U-Boats during World War II.” Journal of Contemporary
History 16, no. 1 (1981): 119-129. http://www.jstor.org/stable/260619.

Singh, Simon. The Code Book: The Evolution of Secrecy from Mary Queen of Scots to Quantum
Cryptography. New York: Doubleday, 1999.

Smith, Michael. Station X: The Codebreakers of Bletchley Park. London: Pan Books, 1998.
Stafford, David. Churchill and Secret Service. New York: The Overlook Press, 1997.

Stern, Robert C. Battle Beneath the Waves: The U-Boat War. London: Arms and Armour, 1999.
Syrett, David. The Defeat of the German U-Boats: The Battle of the Atlantic. Columbia:
University of South Carolina Press, 1994.

Syrett, David, ed. The Battle of the Atlantic and Signals Intelligence: U-Boat Situations and
Trends, 1941-1945. Aldershot:Ashgate, 1998.

Syrett, David, ed. The Battle of the Atlantic and Signals Intelligence: U-Boat Tracking Papers,
1941-1947. Aldershot:Ashgate, 2002.

Welchman, Gordon. The Hut Six Story: Breaking the Enigma Codes. New York: McGraw-Hill
Book Company, 1982.

Westwood, David. The U-Boat War: The German Submarine Service and the Battle of the
Atlantic, 1935-1945. Philadelphia: Casemate, 2005.
White, David Fairbank. Bitter Ocean: The Battle of the Atlantic, 1939-1945. New York: Simon
& Schuster Paperbacks, 2006.
Williams, Andrew. The Battle of the Atlantic: Hitler's Gray Wolves of the Sea and the Allies'
Desperate Struggle to Defeat Them. New York: Basic Books, 2003.
Winton, John. Ultra at Sea: How Breaking the Nazi Code Affected Allied Naval Strategy During
World War II. New York: William Morrow and Company, Inc., 1988.

49

You might also like