Geheimschreiber
   HOME

TheInfoList



OR:

The Siemens & Halske T52, also known as the Geheimschreiber ("secret teleprinter"), or ''Schlüsselfernschreibmaschine'' (SFM), was a
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
German
cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
machine and
teleprinter A teleprinter (teletypewriter, teletype or TTY) is an electromechanical device that can be used to send and receive typed messages through various communications channels, in both point-to-point (telecommunications), point-to-point and point- ...
produced by the electrical engineering firm
Siemens & Halske Siemens & Halske AG (or Siemens-Halske) was a German electrical engineering company that later became part of Siemens. It was founded on 12 October 1847 as ''Telegraphen-Bauanstalt von Siemens & Halske'' by Werner von Siemens and Johann Geor ...
. The instrument and its traffic were codenamed ''Sturgeon'' by
British British may refer to: Peoples, culture, and language * British people, nationals or natives of the United Kingdom, British Overseas Territories and Crown Dependencies. * British national identity, the characteristics of British people and culture ...
cryptanalyst Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
s. While the
Enigma machine The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the W ...
was generally used by field units, the T52 was an
online In computer technology and telecommunications, online indicates a state of connectivity, and offline indicates a disconnected state. In modern terminology, this usually refers to an Internet connection, but (especially when expressed as "on lin ...
machine used by
Luftwaffe The Luftwaffe () was the aerial warfare, aerial-warfare branch of the before and during World War II. German Empire, Germany's military air arms during World War I, the of the Imperial German Army, Imperial Army and the of the Imperial Ge ...
and
German Navy The German Navy (, ) is part of the unified (Federal Defense), the German Armed Forces. The German Navy was originally known as the ''Bundesmarine'' (Federal Navy) from 1956 to 1995, when ''Deutsche Marine'' (German Navy) became the official ...
units, which could support the heavy machine, teletypewriter and attendant fixed circuits. It fulfilled a similar role to the
Lorenz cipher The Lorenz SZ40, SZ42a and SZ42b were German Rotor machine, rotor stream cipher machines used by the German Army (Wehrmacht), German Army during World War II. They were developed by C. Lorenz AG in Berlin. The model name ''SZ'' is derived from ' ...
machines in the
German Army The German Army (, 'army') is the land component of the armed forces of Federal Republic of Germany, Germany. The present-day German Army was founded in 1955 as part of the newly formed West German together with the German Navy, ''Marine'' (G ...
. The British cryptanalysts of
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
codename A code name, codename, call sign, or cryptonym is a code word or name used, sometimes clandestinely, to refer to another name, word, project, or person. Code names are often used for military purposes, or in espionage. They may also be used in ...
d the German teleprinter ciphers
Fish A fish (: fish or fishes) is an aquatic animal, aquatic, Anamniotes, anamniotic, gill-bearing vertebrate animal with swimming fish fin, fins and craniate, a hard skull, but lacking limb (anatomy), limbs with digit (anatomy), digits. Fish can ...
, with individual cipher-systems being given further codenames: just as the T52 was called ''Sturgeon'', the Lorenz machine was codenamed ''Tunny''.


Operation

The teleprinters of the day emitted each character as five parallel
bit The bit is the most basic unit of information in computing and digital communication. The name is a portmanteau of binary digit. The bit represents a logical state with one of two possible values. These values are most commonly represented as ...
s on five lines, typically encoded in the
Baudot code The Baudot code () is an early character encoding for telegraphy invented by Émile Baudot in the 1870s. It was the predecessor to the International Telegraph Alphabet No. 2 (ITA2), the most common teleprinter code in use before ASCII. Each ch ...
or something similar. The T52 had ten pinwheels, which were stepped in a complex
nonlinear In mathematics and science, a nonlinear system (or a non-linear system) is a system in which the change of the output is not proportional to the change of the input. Nonlinear problems are of interest to engineers, biologists, physicists, mathe ...
way, based in later models on their positions from various relays in the past, but in such a way that they could never stall. Each of the five
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
bits was then
XOR Exclusive or, exclusive disjunction, exclusive alternation, logical non-equivalence, or logical inequality is a logical operator whose negation is the logical biconditional. With two inputs, XOR is true if and only if the inputs differ (one ...
ed with the XOR sum of 3 taps from the pinwheels, and then cyclically adjacent pairs of plaintext bits were swapped or not, according to XOR sums of three (different) output
bit The bit is the most basic unit of information in computing and digital communication. The name is a portmanteau of binary digit. The bit represents a logical state with one of two possible values. These values are most commonly represented as ...
s. The numbers of pins on all the wheels were
coprime In number theory, two integers and are coprime, relatively prime or mutually prime if the only positive integer that is a divisor of both of them is 1. Consequently, any prime number that divides does not divide , and vice versa. This is equiv ...
, and the triplets of bits that controlled each XOR or swap were selectable through a plugboard. This produced a much more complex cipher than the Lorenz machine, and also means that the T52 is not just a
pseudorandom number generator A pseudorandom number generator (PRNG), also known as a deterministic random bit generator (DRBG), is an algorithm for generating a sequence of numbers whose properties approximate the properties of sequences of random number generation, random n ...
-and-XOR cipher. For example, if a cipher clerk erred and sent two different messages using exactly the same settings—a '' depth of two'' in Bletchley jargon—this could be detected statistically but was not immediately and trivially solvable as it would be with the Lorenz.


Models

Siemens produced several and mostly incompatible versions of the T52: the T52a and T52b, which differed only in their electrical noise suppression, and the T52c, T52d and T52e. While the T52a/b and T52c were cryptologically weak, the last two were more advanced devices; the movement of the wheels was intermittent, the decision on whether or not to advance them being controlled by logic circuits which took input data from the wheels themselves. In addition, a number of conceptual flaws, including very subtle ones, had been eliminated. One such flaw was the ability to reset the
keystream In cryptography, a keystream is a stream of random or pseudorandom characters that are combined with a plaintext message to produce an encrypted message (the ciphertext). The "characters" in the keystream can be bit The bit is the most basic ...
to a fixed point, which led to key reuse by undisciplined machine operators.


Cryptanalysis

Following the occupation of
Denmark Denmark is a Nordic countries, Nordic country in Northern Europe. It is the metropole and most populous constituent of the Kingdom of Denmark,, . also known as the Danish Realm, a constitutionally unitary state that includes the Autonomous a ...
and
Norway Norway, officially the Kingdom of Norway, is a Nordic countries, Nordic country located on the Scandinavian Peninsula in Northern Europe. The remote Arctic island of Jan Mayen and the archipelago of Svalbard also form part of the Kingdom of ...
, the Germans started to use a teleprinter circuit which ran through
Sweden Sweden, formally the Kingdom of Sweden, is a Nordic countries, Nordic country located on the Scandinavian Peninsula in Northern Europe. It borders Norway to the west and north, and Finland to the east. At , Sweden is the largest Nordic count ...
. The Swedes immediately tapped the line, in May 1940, and the
mathematician A mathematician is someone who uses an extensive knowledge of mathematics in their work, typically to solve mathematical problems. Mathematicians are concerned with numbers, data, quantity, mathematical structure, structure, space, Mathematica ...
and
cryptographer Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
Arne Beurling Arne Carl-August Beurling (3 February 1905 – 20 November 1986) was a Sweden, Swedish mathematician and professor of mathematics at Uppsala University (1937–1954) and later at the Institute for Advanced Study in Princeton, New Jersey. Beurling ...
cracked the two earliest models in two weeks, using just pen and paper (a feat later replicated by
Bill Tutte William Thomas Tutte (; 14 May 1917 – 2 May 2002) was an English and Canadian code breaker and mathematician. During the Second World War, he made a fundamental advance in cryptanalysis of the Lorenz cipher, a major Nazi German cipher system ...
at
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
with the Lorenz teleprinter device used by the German High Command). The telephone company
Ericsson (), commonly known as Ericsson (), is a Swedish multinational networking and telecommunications company headquartered in Stockholm, Sweden. Ericsson has been a major contributor to the development of the telecommunications industry and is one ...
manufactured a number of T52 analogue machines that could decode the messages once the key settings had been found by hand. The Swedes then read traffic in the system for three years, not only between Berlin and Oslo, but also between Germany and the German forces in Finland, and of course the German embassy in
Stockholm Stockholm (; ) is the Capital city, capital and List of urban areas in Sweden by population, most populous city of Sweden, as well as the List of urban areas in the Nordic countries, largest urban area in the Nordic countries. Approximately ...
. In total, the Swedes intercepted 500,000 German messages and decrypted 350,000. However, poor security meant the Germans eventually became aware of this. An improvement in T52 security in 1942 was defeated by the Swedes. However, a second upgrade in mid-1943 was not, and the flow of decrypted messages came to an end. The British first detected T52 traffic in the summer and autumn of 1942 on a link between
Sicily Sicily (Italian language, Italian and ), officially the Sicilian Region (), is an island in the central Mediterranean Sea, south of the Italian Peninsula in continental Europe and is one of the 20 regions of Italy, regions of Italy. With 4. ...
and
Libya Libya, officially the State of Libya, is a country in the Maghreb region of North Africa. It borders the Mediterranean Sea to the north, Egypt to Egypt–Libya border, the east, Sudan to Libya–Sudan border, the southeast, Chad to Chad–L ...
, codenamed "Sturgeon", and another from the Aegean to
Sicily Sicily (Italian language, Italian and ), officially the Sicilian Region (), is an island in the central Mediterranean Sea, south of the Italian Peninsula in continental Europe and is one of the 20 regions of Italy, regions of Italy. With 4. ...
, codenamed "Mackerel". Operators of both links were in the habit of enciphering several messages with the same machine settings, producing large numbers of depths. These depths were analysed by Michael Crum.The SAVILLE cryptographic algorithm; see note concerning Crum's career
/ref> The British at Bletchley Park later also broke into Sturgeon, although they did not break it as regularly as they broke Enigma or Tunny. This was partly because the T52 was by far the most complex cipher of the three, but also because the Luftwaffe very often retransmitted Sturgeon messages using easier-to-attack (or already broken) ciphers, making it unnecessary to attack Sturgeon.


See also

*
SIGABA In the history of cryptography, the ECM Mark II was a cipher machine used by the United States for message encryption from World War II until the 1950s. The machine was also known as the SIGABA or Converter M-134 by the Army, or CSP-888/889 by th ...
(''United States'') * Typex (''Britain'') *
Siemens AG Siemens AG ( ) is a German multinational technology conglomerate. It is focused on industrial automation, building automation, rail transport and health technology. Siemens is the largest engineering company in Europe, and holds the posit ...


References


Citations


Sources

* Donald W. Davies, ''The Siemens and Halske T52e Cipher Machine'' (reprinted in ''Cryptology: Yesterday, Today and Tomorrow'',
Artech House Artech House (a.k.a. Artech House Publishers) is a publisher of professional scientific and engineering books. It is located in London, United Kingdom and Norwood, Massachusetts, United States. Artech House is a subsidiary of Horizon House Publi ...
, Norwood, 1987) * Donald W. Davies, ''The Early Models of the Siemens and Halske T52 Cipher Machine'' (also reprinted in ''Cryptology: Yesterday, Today and Tomorrow'') * Donald W. Davies, ''New Information on the History of the Siemens and Halske T52 Cipher Machines'' (reprinted in ''Selections from Cryptologia: History, People, and Technology'', Artech House, Norwood, 1998)


External links


John Savard's page on the Geheimfernschreiber
in the
Government Code and Cypher School The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
''Cryptographic Dictionary''
Bletchley Park's Sturgeon, the Fish that Laid No Eggs
at ''
The Rutherford Journal Brian Jack Copeland (born 1950) is Professor of Philosophy at the University of Canterbury, Christchurch, New Zealand, and author of books on the computing pioneer Alan Turing. Education Copeland was educated at the University of Oxford, obta ...
''. {{DEFAULTSORT:Siemens And Halske T52 Encryption devices World War II military equipment of Germany Cryptographic hardware Signals intelligence of World War II