SIGSALY
   HOME

TheInfoList



OR:

SIGSALY (also known as the X System, Project X, Ciphony I, and the Green Hornet) was a secure speech system used in
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the World War II by country, vast majority of the world's countries—including all of the great power ...
for the highest-level Allied communications. It pioneered a number of
digital communications Data transmission and data reception or, more broadly, data communication or digital communications is the transfer and reception of data in the form of a digital bitstream or a digitized analog signal transmitted over a point-to-point or ...
concepts, including the first transmission of speech using
pulse-code modulation Pulse-code modulation (PCM) is a method used to digitally represent sampled analog signals. It is the standard form of digital audio in computers, compact discs, digital telephony and other digital audio applications. In a PCM stream, the ...
. The name SIGSALY was not an acronym, but a cover name that resembled an acronym—the SIG part was common in Army Signal Corps names (e.g.,
SIGABA In the history of cryptography, the ECM Mark II was a cipher machine used by the United States for message encryption from World War II until the 1950s. The machine was also known as the SIGABA or Converter M-134 by the Army, or CSP-888/889 by ...
). The prototype was called the "Green Hornet" after the radio show ''
The Green Hornet The Green Hornet is a superhero created in 1936 by George W. Trendle and Fran Striker, with input from radio director James Jewell. Since his 1930s radio debut, the character has appeared in numerous serialized dramas in a wide variety of med ...
'', because it sounded like a buzzing
hornet Hornets (insects in the genus ''Vespa'') are the largest of the eusocial wasps, and are similar in appearance to their close relatives yellowjackets. Some species can reach up to in length. They are distinguished from other vespine wasps by t ...
, resembling the show's theme tune, to anyone trying to eavesdrop on the conversation.


Development

At the time of its inception, long-distance telephone communications were broadcast using the "A-3" voice scrambler developed by
Western Electric The Western Electric Company was an American electrical engineering and manufacturing company officially founded in 1869. A wholly owned subsidiary of American Telephone & Telegraph for most of its lifespan, it served as the primary equipment ma ...
. The Germans had a listening station on the Dutch coast which could intercept and break A-3 traffic.The SIGSALY Story
by Patrick D. Weadon, National Security Agency/Central Security Service
Although telephone scramblers were used by both sides in World War II, they were known not to be very secure in general, and both sides often cracked the scrambled conversations of the other. Inspection of the audio spectrum using a
spectrum analyzer A spectrum analyzer measures the magnitude of an input signal versus frequency within the full frequency range of the instrument. The primary use is to measure the power of the spectrum of known and unknown signals. The input signal that most co ...
often provided significant clues to the scrambling technique. The insecurity of most telephone scrambler schemes led to the development of a more secure scrambler, based on the
one-time pad In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is not smaller than the message being sent. In this technique, a plaintext is paired with a ra ...
principle. A prototype was developed at
Bell Telephone Laboratories Nokia Bell Labs, originally named Bell Telephone Laboratories (1925–1984), then AT&T Bell Laboratories (1984–1996) and Bell Labs Innovations (1996–2007), is an American industrial research and scientific development company owned by mult ...
, under the direction of A. B. Clark, assisted by British mathematician
Alan Turing Alan Mathison Turing (; 23 June 1912 – 7 June 1954) was an English mathematician, computer scientist, logician, cryptanalyst, philosopher, and theoretical biologist. Turing was highly influential in the development of theoretical ...
, and demonstrated to the US Army. The Army was impressed and awarded Bell Labs a contract for two systems in 1942. SIGSALY went into service in 1943 and remained in service until 1946.


Operation

SIGSALY used a
random In common usage, randomness is the apparent or actual lack of pattern or predictability in events. A random sequence of events, symbols or steps often has no order and does not follow an intelligible pattern or combination. Individual ran ...
noise Noise is unwanted sound considered unpleasant, loud or disruptive to hearing. From a physics standpoint, there is no distinction between noise and desired sound, as both are vibrations through a medium, such as air or water. The difference aris ...
mask to
encrypt In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can deci ...
voice conversations which had been encoded by a
vocoder A vocoder (, a portmanteau of ''voice'' and ''encoder'') is a category of speech coding that analyzes and synthesizes the human voice signal for audio data compression, multiplexing, voice encryption or voice transformation. The vocoder ...
. The latter was used to minimize the amount of redundancy (which is high in voice traffic), in order to reduce the amount of information to be encrypted. The voice encoding used the fact that speech varies fairly slowly as the components of the throat move. The system extracts information about the voice signal 50 times a second (every 20 milliseconds). Jon D. Paul
"Rebuilding a Piece of the First Digital Voice Scrambler"
IEEE Spectrum. 2019.
* ten channels covering the telephone passband (250 Hz – 2,950 Hz); are rectified and filtered to extract how much energy is in each of these channels. * another signal indicating whether the sound is
voiced Voice or voicing is a term used in phonetics and phonology to characterize speech sounds (usually consonants). Speech sounds can be described as either voiceless (otherwise known as ''unvoiced'') or voiced. The term, however, is used to refer ...
or unvoiced; * if voiced, a signal indicating the pitch; this also varied at less than 25 Hz. Next, each signal was
sample Sample or samples may refer to: Base meaning * Sample (statistics), a subset of a population – complete data set * Sample (signal), a digital discrete sample of a continuous analog signal * Sample (material), a specimen or small quantity of ...
d for its amplitude once every 20 milliseconds. For the band amplitude signals, the amplitude converted into one of six amplitude levels, with values from 0 through 5. The amplitude levels were on a nonlinear scale, with the steps between levels wide at high amplitudes and narrower at low amplitudes. This scheme, known as "
companding In telecommunication and signal processing, companding (occasionally called compansion) is a method of mitigating the detrimental effects of a channel with limited dynamic range. The name is a portmanteau of the words compressing and expandi ...
" or "compressing-expanding", exploits the fact that the fidelity of voice signals is more sensitive to low amplitudes than to high amplitudes. The pitch signal, which required greater sensitivity, was encoded by a pair of six-level values (one coarse, and one fine), giving thirty-six levels in all. A
cryptographic key A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key ...
, consisting of a series of random values from the same set of six levels, was subtracted from each sampled voice amplitude value to encrypt them before transmission. The subtraction was performed using
modular arithmetic In mathematics, modular arithmetic is a system of arithmetic for integers, where numbers "wrap around" when reaching a certain value, called the modulus. The modern approach to modular arithmetic was developed by Carl Friedrich Gauss in his boo ...
: a "wraparound" fashion, meaning that if there was a negative result, it was added to six to give a positive result. For example, if the voice amplitude value was 3 and the random value was 5, then the subtraction would work as follows: :3 - 5 \equiv -2,\ -2 + 6 \equiv 4\pmod 6 \, — giving a value of 4. The sampled value was then transmitted, with each sample level transmitted on one of six corresponding frequencies in a frequency band, a scheme known as "
frequency-shift keying Frequency-shift keying (FSK) is a frequency modulation scheme in which digital information is transmitted through discrete frequency changes of a carrier signal. The technology is used for communication systems such as telemetry, weather bal ...
(FSK)". The receiving SIGSALY read the frequency values, converted them into samples, and added the key values back to them to decrypt them. The addition was also performed in a "modulo" fashion, with six subtracted from any value over five. To match the example above, if the receiving SIGSALY got a sample value of 4 with a matching random value of 5, then the addition would be as follows: :4 + 5 \equiv 9,\ 9 - 6 \equiv 3\pmod 6 \, — which gives the correct value of 3. To convert the samples back into a voice waveform, they were first turned back into the dozen low-frequency vocoded signals. An inversion of the vocoder process was employed, which included: * a
white noise In signal processing, white noise is a random signal having equal intensity at different frequencies, giving it a constant power spectral density. The term is used, with this or similar meanings, in many scientific and technical disciplines ...
source (used for unvoiced sounds); * a signal generator (used for voiced sounds) generating a set of
harmonic A harmonic is a wave with a frequency that is a positive integer multiple of the ''fundamental frequency'', the frequency of the original periodic signal, such as a sinusoidal wave. The original signal is also called the ''1st harmonic'', t ...
s, with the base frequency controlled by the pitch signal; * a switch, controlled by the voiced/unvoiced signal, to select one of these two as a source; * a set of filters (one for each band), all taking as input the same source (the source selected by the switch), along with amplifiers whose
gain Gain or GAIN may refer to: Science and technology * Gain (electronics), an electronics and signal processing term * Antenna gain * Gain (laser), the amplification involved in laser emission * Gain (projection screens) * Information gain in de ...
was controlled by the band amplitude signals. The noise values used for the encryption key were originally produced by large mercury-vapor rectifying
vacuum tube A vacuum tube, electron tube, valve (British usage), or tube (North America), is a device that controls electric current flow in a high vacuum between electrodes to which an electric potential difference has been applied. The type known as ...
s and stored on a
phonograph A phonograph, in its later forms also called a gramophone (as a trademark since 1887, as a generic name in the UK since 1910) or since the 1940s called a record player, or more recently a turntable, is a device for the mechanical and analogu ...
record. The record was then duplicated, with the records being distributed to SIGSALY systems on both ends of a conversation. The records served as the SIGSALY ''one-time pad'', and distribution was very strictly controlled (although if one had been seized, it would have been of little importance, since only one pair of each was ever produced). For testing and setup purposes, a pseudo-random number generating system made out of relays, known as the "threshing machine", was used. The records were played on
turntable A phonograph, in its later forms also called a gramophone (as a trademark since 1887, as a generic name in the UK since 1910) or since the 1940s called a record player, or more recently a turntable, is a device for the mechanical and analogu ...
s, but since the timing – the
clock synchronization Clock synchronization is a topic in computer science and engineering that aims to coordinate otherwise independent clocks. Even when initially set accurately, real clocks will differ after some amount of time due to clock drift, caused by clocks ...
– between the two SIGSALY terminals had to be precise, the turntables were by no means just ordinary record-players. The rotation rate of the turntables was carefully controlled, and the records were started at highly specific times, based on precision time-of-day clock standards. Since each record only provided 12 minutes of key, each SIGSALY had two turntables, with a second record "queued up" while the first was "playing".


Usage

The SIGSALY terminal was massive, consisting of 40 racks of equipment. It weighed over 50 tons, and used about 30 kW of power, necessitating an air-conditioned room to hold it. Too big and cumbersome for general use, it was only used for the highest level of voice communications. A dozen SIGSALY terminal installations were eventually set up all over the world. The first was installed in the Pentagon building rather than the White House, which had an extension line, as the US
President Franklin Roosevelt Franklin Delano Roosevelt (; ; January 30, 1882April 12, 1945), often referred to by his initials FDR, was an American politician and attorney who served as the 32nd president of the United States from 1933 until his death in 1945. As the ...
knew of the British Prime Minister
Winston Churchill Sir Winston Leonard Spencer Churchill (30 November 187424 January 1965) was a British statesman, soldier, and writer who served as Prime Minister of the United Kingdom twice, from 1940 to 1945 during the Second World War, and again from ...
's insistence that he be able to call at any time of the day or night. The second was installed below street level in the basement of Selfridges department store on
Oxford Street Oxford Street is a major road in the City of Westminster in the West End of London, running from Tottenham Court Road to Marble Arch via Oxford Circus. It is Europe's busiest shopping street, with around half a million daily visitors, and ...
,
London London is the capital and List of urban areas in the United Kingdom, largest city of England and the United Kingdom, with a population of just under 9 million. It stands on the River Thames in south-east England at the head of a estuary dow ...
, close to the
US Embassy The United States has the second most diplomatic missions of any country in the world after Mainland China, including 166 of the 193 member countries of the United Nations, as well as observer state Vatican City and non-member countries Kosovo a ...
on
Grosvenor Square Grosvenor Square is a large garden square in the Mayfair district of London. It is the centrepiece of the Mayfair property of the Duke of Westminster, and takes its name from the duke's surname "Grosvenor". It was developed for fashionable ...
. The first conference took place on 15 July 1943, and it was used by both General Dwight D. Eisenhower as the commander of
SHAEF Supreme Headquarters Allied Expeditionary Force (SHAEF; ) was the headquarters of the Commander of Allied forces in north west Europe, from late 1943 until the end of World War II. U.S. General Dwight D. Eisenhower was the commander in SHAEF ...
, and Churchill, before extensions were installed to the Embassy,
10 Downing Street 10 Downing Street in London, also known colloquially in the United Kingdom as Number 10, is the official residence and executive office of the first lord of the treasury, usually, by convention, the prime minister of the United Kingdom. Along w ...
and the
Cabinet War Rooms The Churchill War Rooms is a museum in London and one of the five branches of the Imperial War Museum. The museum comprises the ''Cabinet War Rooms'', a historic underground complex that housed a British government command centre throughout the ...
. One was installed in a ship and followed General
Douglas MacArthur Douglas MacArthur (26 January 18805 April 1964) was an American military leader who served as General of the Army for the United States, as well as a field marshal to the Philippine Army. He had served with distinction in World War I, was ...
during his
South Pacific The Pacific Ocean is the largest and deepest of Earth's five oceanic divisions. It extends from the Arctic Ocean in the north to the Southern Ocean (or, depending on definition, to Antarctica) in the south, and is bounded by the continen ...
campaigns. In total during WW2, the system supported about 3,000 high-level telephone conferences. The installation and maintenance of all SIGSALY machines was undertaken by the specially formed and vetted members of the 805th Signal Service Company of the
US Army Signal Corps ) , colors = Orange and white , colors_label = Corps colors , march = , mascot = , equipment = , equipment_label = ...
. The system was cumbersome, but it worked very effectively. When the Allies invaded Germany, an investigative team discovered that the Germans had recorded significant amounts of traffic from the system, but had erroneously concluded that it was a complex telegraphic encoding system.


Significance

SIGSALY has been credited with a number of "firsts"; this list is taken from (Bennett, 1983): # The first realization of enciphered telephony # The first quantized speech transmission # The first transmission of speech by
pulse-code modulation Pulse-code modulation (PCM) is a method used to digitally represent sampled analog signals. It is the standard form of digital audio in computers, compact discs, digital telephony and other digital audio applications. In a PCM stream, the ...
(PCM) # The first use of companded PCM # The first examples of multilevel
frequency-shift keying Frequency-shift keying (FSK) is a frequency modulation scheme in which digital information is transmitted through discrete frequency changes of a carrier signal. The technology is used for communication systems such as telemetry, weather bal ...
(FSK) # The first useful realization of speech bandwidth compression # The first use of FSK-FDM (Frequency Shift Keying-Frequency Division Multiplex) as a viable transmission method over a fading medium # The first use of a multilevel "eye pattern" to adjust the sampling intervals (a new, and important, instrumentation technique)


See also

*
Spread spectrum In telecommunication and radio communication, spread-spectrum techniques are methods by which a signal (e.g., an electrical, electromagnetic, or acoustic signal) generated with a particular bandwidth is deliberately spread in the frequency d ...
*
STU-III STU-III (Secure Telephone Unit - third generation) is a family of secure telephones introduced in 1987 by the NSA for use by the United States government, its contractors, and its allies. STU-III desk units look much like typical office telephone ...
— a more recent voice encryption system. *
Speech coding Speech coding is an application of data compression of digital audio signals containing speech. Speech coding uses speech-specific parameter estimation using audio signal processing techniques to model the speech signal, combined with generic d ...


References

;Notes * William R. Bennett, Fellow, IEEE, "Secret Telephony as a Historical Example of Spread-Spectrum Communications," ''IEEE Transactions on Communications'', Vol. COM-31, No. 1, January 1983, 99. * Weadon, P., "Sigsaly Story", National Security Agency Central Security Service, January 2009


Further reading

* ''Top Secret Communications of WWII,'' by Donald Mehl, U.S. Army Signal Corps. The full story of SIGSALY and SIGTOT. Book available from the U.S. Army Signal Corps Association, a non profit organization. * M. D. Fagen (editor), ''National Service in War and Peace (1925–1975)'', Volume II of ''A History of Engineering and Science in the Bell System'' (Bell Telephone Laboratories, 1978) pp. 296–317


External links


"The SIGSALY story"

"The start of the digital revolution"

"1941 'Secret telephony' US patent 3967067 on the system."
*
Ralph Miller
is credited with a number of the related patents documented in Volume II of ''A History of Engineering and Science in the Bell System''. {{DEFAULTSORT:Sigsaly Encryption devices Telecommunications in World War II Transatlantic telecommunications