SIGSALY
   HOME

TheInfoList



OR:

SIGSALY (also known as the X System, Project X, Ciphony I, and the Green Hornet) was a secure speech system used in
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
for the highest-level Allied communications. It pioneered a number of
digital communications Data communication, including data transmission and data reception, is the transfer of data, signal transmission, transmitted and received over a Point-to-point (telecommunications), point-to-point or point-to-multipoint communication chann ...
concepts, including the first transmission of speech using
pulse-code modulation Pulse-code modulation (PCM) is a method used to digitally represent analog signals. It is the standard form of digital audio in computers, compact discs, digital telephony and other digital audio applications. In a PCM stream, the amplitud ...
. The name SIGSALY was not an acronym, but a cover name that resembled an acronym—the SIG part was common in Army Signal Corps names (e.g., SIGABA). The prototype was called the "Green Hornet" after the radio show ''
The Green Hornet The Green Hornet is a superhero created in 1936 by George W. Trendle and Fran Striker, with input from radio director James Jewell (director), James Jewell. Since his 1930s radio debut, the character has appeared in numerous serialized dramas i ...
'', because it sounded like a buzzing
hornet Hornets (insects in the genus ''Vespa'') are the largest of the Eusociality, eusocial wasps, and are similar in appearance to yellowjackets, their close relatives. Some species can reach up to in length. They are distinguished from other Vespi ...
, resembling the show's theme tune, to anyone trying to eavesdrop on the conversation.


Development

At the time of its inception, long-distance telephone communications used the "A-3" voice scrambler developed by
Western Electric Western Electric Co., Inc. was an American electrical engineering and manufacturing company that operated from 1869 to 1996. A subsidiary of the AT&T Corporation for most of its lifespan, Western Electric was the primary manufacturer, supplier, ...
. It worked on the
voice inversion Voice inversion scrambling is an analog method of obscuring the content of a transmission. It is sometimes used in public service radio, automobile racing, cordless telephones and the Family Radio Service. Without a descrambler, the transmission ...
principle. The Germans had a listening station on the Dutch coast which could intercept and break A-3 traffic.The SIGSALY Story
by Patrick D. Weadon, National Security Agency/Central Security Service
Although telephone scramblers were used by both sides in World War II, they were known not to be very secure in general, and both sides often cracked the scrambled conversations of the other. Inspection of the audio spectrum using a
spectrum analyzer A spectrum analyzer measures the magnitude of an input signal versus frequency within the full frequency range of the instrument. The primary use is to measure the power of the spectrum of known and unknown signals. The input signal that most co ...
often provided significant clues to the scrambling technique. The insecurity of most telephone scrambler schemes led to the development of a more secure scrambler, based on the
one-time pad The one-time pad (OTP) is an encryption technique that cannot be Cryptanalysis, cracked in cryptography. It requires the use of a single-use pre-shared key that is larger than or equal to the size of the message being sent. In this technique, ...
principle. A prototype was developed at
Bell Telephone Laboratories Nokia Bell Labs, commonly referred to as ''Bell Labs'', is an American industrial research and development company owned by Finnish technology company Nokia. With headquarters located in Murray Hill, New Jersey, Murray Hill, New Jersey, the compa ...
, under the direction of A. B. Clark, assisted by British mathematician
Alan Turing Alan Mathison Turing (; 23 June 1912 – 7 June 1954) was an English mathematician, computer scientist, logician, cryptanalyst, philosopher and theoretical biologist. He was highly influential in the development of theoretical computer ...
, and demonstrated to the US Army. The Army was impressed and awarded Bell Labs a contract for two systems in 1942. SIGSALY went into service in 1943 and remained in service until 1946.


Operation

SIGSALY used a
random In common usage, randomness is the apparent or actual lack of definite pattern or predictability in information. A random sequence of events, symbols or steps often has no order and does not follow an intelligible pattern or combination. ...
noise Noise is sound, chiefly unwanted, unintentional, or harmful sound considered unpleasant, loud, or disruptive to mental or hearing faculties. From a physics standpoint, there is no distinction between noise and desired sound, as both are vibrat ...
mask to
encrypt In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plai ...
voice conversations which had been encoded by a
vocoder A vocoder (, a portmanteau of ''vo''ice and en''coder'') is a category of speech coding that analyzes and synthesizes the human voice signal for audio data compression, multiplexing, voice encryption or voice transformation. The vocoder wa ...
. The latter was used to minimize the amount of redundancy (which is high in voice traffic), in order to reduce the amount of information to be encrypted. The voice encoding used the fact that speech varies fairly slowly as the components of the throat move. The system extracts information about the voice signal 50 times a second (every 20 milliseconds). Jon D. Paul
"Rebuilding a Piece of the First Digital Voice Scrambler"
IEEE Spectrum. 2019.
* ten channels covering the telephone passband (250 Hz – 2,950 Hz); are rectified and filtered to extract how much energy is in each of these channels. * another signal indicating whether the sound is
voiced Voice or voicing is a term used in phonetics and phonology to characterize speech sounds (usually consonants). Speech sounds can be described as either voiceless (otherwise known as ''unvoiced'') or voiced. The term, however, is used to refe ...
or unvoiced; * if voiced, a signal indicating the pitch; this also varied at less than 25 Hz. Next, each signal was sampled for its amplitude once every 20 milliseconds. For the band amplitude signals, the amplitude converted into one of six amplitude levels, with values from 0 through 5. The amplitude levels were on a nonlinear scale, with the steps between levels wide at high amplitudes and narrower at low amplitudes. This scheme, known as "
companding In telecommunications and signal processing, companding (occasionally called compansion) is a method of mitigating the detrimental effects of a channel with limited dynamic range. The name is a portmanteau of the words compressing and expandi ...
" or "compressing-expanding", exploits the fact that the fidelity of voice signals is more sensitive to low amplitudes than to high amplitudes. The pitch signal, which required greater sensitivity, was encoded by a pair of six-level values (one coarse, and one fine), giving thirty-six levels in all. A
cryptographic key A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm In mathematics and computer science, an algorithm () is a finite sequenc ...
, consisting of a series of random values from the same set of six levels, was subtracted from each sampled voice amplitude value to encrypt them before transmission. The subtraction was performed using
modular arithmetic In mathematics, modular arithmetic is a system of arithmetic operations for integers, other than the usual ones from elementary arithmetic, where numbers "wrap around" when reaching a certain value, called the modulus. The modern approach to mo ...
: a "wraparound" fashion, meaning that if there was a negative result, it was added to six to give a positive result. For example, if the voice amplitude value was 3 and the random value was 5, then the subtraction would work as follows: :3 - 5 \equiv -2,\ -2 + 6 \equiv 4\pmod 6 \, — giving a value of 4. The sampled value was then transmitted, with each sample level transmitted on one of six corresponding frequencies in a frequency band, a scheme known as "
frequency-shift keying Frequency-shift keying (FSK) is a frequency modulation scheme in which digital information is encoded on a carrier signal by periodically shifting the frequency of the carrier between several discrete frequencies. The technology is used fo ...
(FSK)". The receiving SIGSALY read the frequency values, converted them into samples, and added the key values back to them to decrypt them. The addition was also performed in a "modulo" fashion, with six subtracted from any value over five. To match the example above, if the receiving SIGSALY got a sample value of 4 with a matching random value of 5, then the addition would be as follows: :4 + 5 \equiv 9,\ 9 - 6 \equiv 3\pmod 6 \, — which gives the correct value of 3. To convert the samples back into a voice waveform, they were first turned back into the dozen low-frequency vocoded signals. An inversion of the vocoder process was employed, which included: * a
white noise In signal processing, white noise is a random signal having equal intensity at different frequencies, giving it a constant power spectral density. The term is used with this or similar meanings in many scientific and technical disciplines, i ...
source (used for unvoiced sounds); * a signal generator (used for voiced sounds) generating a set of
harmonic In physics, acoustics, and telecommunications, a harmonic is a sinusoidal wave with a frequency that is a positive integer multiple of the ''fundamental frequency'' of a periodic signal. The fundamental frequency is also called the ''1st har ...
s, with the base frequency controlled by the pitch signal; * a switch, controlled by the voiced/unvoiced signal, to select one of these two as a source; * a set of filters (one for each band), all taking as input the same source (the source selected by the switch), along with amplifiers whose gain was controlled by the band amplitude signals. The noise values used for the encryption key were originally produced by large mercury-vapor rectifying
vacuum tube A vacuum tube, electron tube, thermionic valve (British usage), or tube (North America) is a device that controls electric current flow in a high vacuum between electrodes to which an electric voltage, potential difference has been applied. It ...
s and stored on a
phonograph A phonograph, later called a gramophone, and since the 1940s a record player, or more recently a turntable, is a device for the mechanical and analogue reproduction of sound. The sound vibration Waveform, waveforms are recorded as correspond ...
record. The record was then duplicated, with the records being distributed to SIGSALY systems on both ends of a conversation. The records served as the SIGSALY ''one-time pad'', and distribution was very strictly controlled (although if one had been seized, it would have been of little importance, since only one pair of each was ever produced). For testing and setup purposes, a pseudo-random number generating system made out of relays, known as the "threshing machine", was used. The records were played on
turntable A phonograph, later called a gramophone, and since the 1940s a record player, or more recently a turntable, is a device for the mechanical and analogue reproduction of sound. The sound vibration waveforms are recorded as corresponding phys ...
s, but since the timing – the
clock synchronization Clock synchronization is a topic in computer science and engineering that aims to coordinate otherwise independent clocks. Even when initially set accurately, real clocks will differ after some amount of time due to clock drift, caused by clocks ...
– between the two SIGSALY terminals had to be precise, the turntables were by no means just ordinary record-players. The rotation rate of the turntables was carefully controlled, and the records were started at highly specific times, based on precision time-of-day clock standards. Since each record only provided 12 minutes of key, each SIGSALY had two turntables, with a second record "queued up" while the first was "playing".


Usage

The SIGSALY terminal was massive, consisting of 40 racks of equipment. It weighed over 50 tons, and used about 30 kW of power, necessitating an air-conditioned room to hold it. Too big and cumbersome for general use, it was only used for the highest level of voice communications. A dozen SIGSALY terminal installations were eventually set up all over the world. The first was installed in the Pentagon building rather than the White House, which had an extension line, as the US President Franklin Roosevelt knew of the British Prime Minister
Winston Churchill Sir Winston Leonard Spencer Churchill (30 November 1874 – 24 January 1965) was a British statesman, military officer, and writer who was Prime Minister of the United Kingdom from 1940 to 1945 (Winston Churchill in the Second World War, ...
's insistence that he be able to call at any time of the day or night. The second was installed below street level in the basement of Selfridges department store on
Oxford Street Oxford Street is a major road in the City of Westminster in the West End of London, running between Marble Arch and Tottenham Court Road via Oxford Circus. It marks the notional boundary between the areas of Fitzrovia and Marylebone to t ...
,
London London is the Capital city, capital and List of urban areas in the United Kingdom, largest city of both England and the United Kingdom, with a population of in . London metropolitan area, Its wider metropolitan area is the largest in Wester ...
, close to the US Embassy on
Grosvenor Square Grosvenor Square ( ) is a large garden square in the Mayfair district of Westminster, Greater London. It is the centrepiece of the Mayfair property of the Duke of Westminster, and takes its name from the duke's surname "Grosvenor". It was deve ...
. The first conference took place on 15 July 1943, and it was used by both General
Dwight D. Eisenhower Dwight David "Ike" Eisenhower (born David Dwight Eisenhower; October 14, 1890 – March 28, 1969) was the 34th president of the United States, serving from 1953 to 1961. During World War II, he was Supreme Commander of the Allied Expeditionar ...
as the commander of
SHAEF Supreme Headquarters Allied Expeditionary Force (SHAEF; ) was the headquarters of the Commander of Allies of World War II, Allied forces in northwest Europe, from late 1943 until the end of World War II. US General Dwight D. Eisenhower was the ...
, and Churchill, before extensions were installed to the Embassy,
10 Downing Street 10 Downing Street in London is the official residence and office of the Prime Minister of the United Kingdom, prime minister of the United Kingdom. Colloquially known as Number 10, the building is located in Downing Street, off Whitehall in th ...
and the Cabinet War Rooms. One was installed in a ship and followed General
Douglas MacArthur Douglas MacArthur (26 January 18805 April 1964) was an American general who served as a top commander during World War II and the Korean War, achieving the rank of General of the Army (United States), General of the Army. He served with dis ...
during his South Pacific campaigns. In total during WW2, the system supported about 3,000 high-level telephone conferences. The installation and maintenance of all SIGSALY machines was undertaken by the specially formed and vetted members of the 805th Signal Service Company of the US Army Signal Corps. The system was cumbersome, but it worked very effectively. When the Allies invaded Germany, an investigative team discovered that the Germans had recorded significant amounts of traffic from the system, but had erroneously concluded that it was a complex telegraphic encoding system.


Significance

SIGSALY has been credited with a number of "firsts"; this list is taken from (Bennett, 1983): # The first realization of enciphered telephony # The first quantized speech transmission # The first transmission of speech by
pulse-code modulation Pulse-code modulation (PCM) is a method used to digitally represent analog signals. It is the standard form of digital audio in computers, compact discs, digital telephony and other digital audio applications. In a PCM stream, the amplitud ...
(PCM) # The first use of companded PCM # The first examples of multilevel
frequency-shift keying Frequency-shift keying (FSK) is a frequency modulation scheme in which digital information is encoded on a carrier signal by periodically shifting the frequency of the carrier between several discrete frequencies. The technology is used fo ...
(FSK) # The first useful realization of speech bandwidth compression # The first use of FSK-FDM (Frequency Shift Keying-Frequency Division Multiplex) as a viable transmission method over a fading medium # The first use of a multilevel "
eye pattern In telecommunications, an eye pattern, also known as an eye diagram, is an oscilloscope display in which a digital signal from a receiver is repetitively sampled and applied to the vertical input (''y-axis''), while the data rate is used to tri ...
" to adjust the sampling intervals (a new, and important, instrumentation technique)


See also

*
Spread spectrum In telecommunications, especially radio communication, spread spectrum are techniques by which a signal (electrical engineering), signal (e.g., an electrical, electromagnetic, or acoustic) generated with a particular Bandwidth (signal processi ...
*
STU-III STU-III (Secure Telephone Unit - third generation) is a family of secure telephones introduced in 1987 by the NSA for use by the United States government, its contractors, and its allies. STU-III desk units look much like typical office telephon ...
— a more recent voice encryption system. *
Speech coding Speech coding is an application of data compression to digital audio signals containing speech. Speech coding uses speech-specific parameter estimation using audio signal processing techniques to model the speech signal, combined with generic da ...


References

;Notes * William R. Bennett, Fellow, IEEE, "Secret Telephony as a Historical Example of Spread-Spectrum Communications," ''IEEE Transactions on Communications'', Vol. COM-31, No. 1, January 1983, 99. * Weadon, P., "Sigsaly Story", National Security Agency Central Security Service, January 2009


Further reading

* ''Top Secret Communications of WWII,'' by Donald Mehl, U.S. Army Signal Corps. The full story of SIGSALY and SIGTOT. Book available from the U.S. Army Signal Corps Association, a non profit organization. * M. D. Fagen (editor), ''National Service in War and Peace (1925–1975)'', Volume II of ''A History of Engineering and Science in the Bell System'' (Bell Telephone Laboratories, 1978) pp. 296–317


External links


"The SIGSALY story"

"The start of the digital revolution"

"1941 'Secret telephony' US patent 3967067 on the system."
*
Ralph Miller
is credited with a number of the related patents documented in Volume II of ''A History of Engineering and Science in the Bell System''. * Sample of the KO-6
vocoder A vocoder (, a portmanteau of ''vo''ice and en''coder'') is a category of speech coding that analyzes and synthesizes the human voice signal for audio data compression, multiplexing, voice encryption or voice transformation. The vocoder wa ...
encoded voice, a later system similar to SIGSALY in performance
The Secret History of the Vocoder
{{DEFAULTSORT:Sigsaly Encryption devices Telecommunications in World War II Transatlantic telecommunications