Callimahos Course

7
7/28/2019 Callimahos Course http://slidepdf.com/reader/full/callimahos-course 1/7 UNCLASSIFIED luF< I.. .lFFlCI.AL USE OP4L\d Vincent Wilson, Jr. The Callimahos Course Theories and Techniques, Merriment and Marmalade Jars ( b) (3)-E'.L. 86-36 "Through these doors pass th e Agency's best crypt analysts" reads th e sign above th e door of th e class room used for th e Intensive Study Program in General Cryptanalysis, and this sign, like th e c ou rs e itself, bears th e unmistakable imprint of th e ma n responsible for both - Lambros Demetrios C al li ma ho s. For over twenty years he shaped and conducted this course, which became th e Agency's most advanced course in cryptanalysis. At th e time of his death in October 1977, Mr. Callimahos ha d taught thirty-two classes and o ve r 2 70 students. P er ha ps it was inevitable that th e ma n selected to revise a nd ex pa nd th e textbooks originally prepared by William Friedman would eventually find himself, like his mentor before him, teaching cryptanalysis as well as writing about it. Th e Intensive Study Program in General Cryptanalysis is th e lineal descendant of th e two-year course created and conducted by William Friedman in th e Army's Signal Intelligence Service during th e 19308. Th e e xa mp le s a nd p ro bl em s that Mr. Friedman used made up, in part, his Military Cryptanalysis I an d II , which were by fa r th e most complete U. S. cryptanalytic training manuals at that time. Later editions of Mr. Friedman's texts are th e ones Mr. Callimahos revised and expanded into Mili- tary Cryptanalytics I an d II . The Friedman course of th e 19308 spawned a number of specialized cryptanalytic courses which, at th e more elementary levels, were further developed and widely used during World Wa r II. But, until C al li ma ho s began his course in th e 19508, there was no compre hensive high-level course for middle and senior ana lysts. As an a na ly st observed, "Callimahos kept the flame alive through th e Agency's Dark Ages." In tracing the history of th e course, we find that it evolved with something less than a clear design from th e beginning. It all started in October 1956 when Dr. William Wray, chief of one of th e analytic offices, detailed an analyst to assist Mr. Callimahos in testing cryptanalytic problems he was devising for use in th e t ex tb oo ks he was p re pa ri ng . At that time Mr. Calli mahos was a ss ig ne d to the Office of Training. In arranging for th e analyst's detail, Mr. Callimahos later acknowledged that he quite arbitrarily chose four months, with no idea that he was setting a pattern for a formal course. The first detail proved of such value to both th e analyst - Mrs:1 1- an d to Mr . Callimahos that it immediately led to further details. As time passed, the tr ai ni ng value of th e details began to overshadow th e original purpose of th e first detail - to test problems intended for th e textbook, a nd th e word apparently spread sufficiently for th e chiefs of other analytic offices to seek this detail for some of their analysts. Thus th e number on detail - all for four months - was increased, first to two people, and in 1958 to four; shortly thereafter, th e detail was transformed into a class - of six - at which time it acquired its present title. T he p at te rn of th e course was beginning to form, bu t it s size was no t yet set. It was not until August 1963, after Mr. Frank Raven, C hi ef o f PI, ha d sent a general announcement about th e course throughout th e Production organization, that th e matter of size was settled. Mr. Raven's memorandum states, in part: Th e Intensive Study Program in General Cryptanalysis offers a u ni q ue o p po r tu n it y for advanced professional training in a stimulating environment. This concentrated. IS-week Program is d es ig ne d f or career cryptanalysts, e sp ec ia ll y t ho se i n m id dl e 12 UNCLASSIFIED t"-"j:;' AFFI'~I" L USE '-'f~L;3 __.- C.·,ie ... U i

Transcript of Callimahos Course

Page 1: Callimahos Course

7/28/2019 Callimahos Course

http://slidepdf.com/reader/full/callimahos-course 1/7

UNCLASSIFIED luF< I.. .lFFlCI.AL USE OP4L\d

Vincent Wilson, Jr.

The Callimahos CourseTheories and Techniques, Merriment and Marmalade Jars

(b) (3) -E ' .L .

86-36

"Through these doors pass the Agency's best crypt

analysts" reads the sign above the door of th e class

room used for the Intensive Study Program in General

Cryptanalysis, and this s ign , like the course itself,

bears the unmistakable imprint of the man responsible

for both - Lambros Demetrios Callimahos. For over

twenty years he shaped and conducted this course,

which became the Agency's most advanced course in

cryptanalysis. At th e time of his death in October

1977, Mr. Callimahos had taught thirty-two classes

and over 270 students.

Perhaps i t was inevitable that the man selected to

revise and expand th e textbooks originally prepared

by William Friedman would eventually find himself,like his mentor before him, teaching cryptanalysis as

well as writing about it . The Intensive Study Program

in General Cryptanalysis is the lineal descendant of

th e two-year course created and conducted by William

Friedman in the Army's Signal Intelligence Service

during the 19308. The examples and problems that

Mr. Friedman used made up, in part, his Military

Cryptanalysis I an d II , which were by fa r the most

complete U. S. cryptanalytic training manuals at t hat

time. Later edi ti ons o f Mr . Friedman's te xt s a re the

ones Mr. Callimahos revised and expanded into Mili-

tary Cryptanalytics I and II .

The Friedman course of the 19308 spawned a numberof specialized cryptanalytic courses which, at th e more

elementary levels, were further developed and widely

used during World War II. But, until Callimahos

began his course in the 19508, there was no compre

hensive high-level course for middle and senior ana

lysts. As an ana lyst observed, "Callimahos kep t th e

flame alive through the Agency's Dark Ages."

In t racing the history of the course, we find that it

evolved with something less than a clear design from

th e beginning. I t all started in October 1956 when Dr.

William Wray, ch ief o f one of the analytic offices,

detailed an analyst to assist Mr. Callimahos in testing

cryptanalytic problems he was devising for use in the

textbooks he was preparing . At that time Mr. Calli

mahos was assigned to the Office of Training. In

arranging for the analyst 's detai l, Mr. Callimahos

later acknowledged that he quite arbitrarily chose four

months, with no idea that he was setting a pattern for

a formal course . The first detail proved of such value

to both the analyst - Mrs:1 1- and

to Mr. Callimahos that it immediately led t o fur therdetails. As time passed, the tr ai ni ng value of the

details began to overshadow the original purpose of

th e first detail - to test problems intended for the

textbook, and the word apparently spread sufficiently

for the chiefs of other analytic offices to seek this

detail for some of their analysts. Thus the number on

detail - all for four months - was increased, first to

two people, and in 1958 to four; shortly thereafter, the

detail was t ransformed into a class - of six - at

which time it acquired its present title.

The pat te rn of the course was beginning to form,

bu t it s size was not ye t s et . I t was not until August

1963, after Mr. Frank Raven, Chief o f PI, had senta general announcement about the course throughout

th e Production organization, that the matter of size

was settled. Mr. Raven's memorandum states, in part:

The Intensive Study Program in General Cryptanalysis offers

a unique opportunity for advanced professional training in a

stimulating environment. This concentrated. IS-week Program

is designed for career cryptanalysts, especially those in middle

12 UNCLASSIFIED t"-"j:;' A F F I ' ~ I " L USE ' - ' f ~ L ; 3Z·__.- C.·,ie ... U i

Page 2: Callimahos Course

7/28/2019 Callimahos Course

http://slidepdf.com/reader/full/callimahos-course 2/7

CONfiDENTIAL

The Guru strikes a ramiliar pose.

and senior grades, who wish to broaden their technical knowl

edge beyond the limits afforded by their operational assign

ments . I t will enable them t o gain a thorough understanding of

cryptanalytic t heory and app li ca ti ons in a wide variety of

cryptosystems and thereby equip them t o a pp ly appropriate

diagnostic and exploi ta tion techniques in the solut ion of oper-

ational problems.... I am impressed by the technical coverageand mode of inst ruc tion, which compresses an extraordinary

amount of subject maller within the 18 weeks, and I therefore

hear ti ly endorse the purpose, scope, and substance of this

Program.

Such a s trong recommendat ion had a predictable

result: applications poured in, and to accommodate

the demand, the class was expanded to twelve students

- th e size it has retained throughout th e years.

Th e flow of applications cont inued, and, during th e

period from April 1958 to October 1964, th e first 19

classes followed on the heels of one another, one class

graduating on a Friday and a new class starting th efollowing Monday. This schedule kept Mr. Callimahos

tied to the classroom with no time to prepare new

material for th e textbooks, so, beginning with Class

No. 20 in 1965, classes were scheduled only once a

year, from February to June.

A Th e method of teac hing th e course changed

considerably over th e years. In th e beg inning Mr.

CONFIOENTIAL 13lI!rP'lDU; ¥lA GElMlP'lT GII!rP'l?fELS O?JLY

Page 3: Callimahos Course

7/28/2019 Callimahos Course

http://slidepdf.com/reader/full/callimahos-course 3/7

CONJi'IDENTlltL

ahos served principally as a monitor, letting the

work as much as possible on their own. Class

1 had few lectures and no handouts or study aids.

s t ud e nt s covered Military Cryptanalytics II in

n weeks, spending the remaining weeks on the

on ofsome transposition ciphers, some codes and

enciphered codes, Hagelin key analysis, a wired-wheel

p ro bl em , a na ly ti c a sp ec ts o f t ra ff ic a na ly si s, and

elements of cryptodiagnosis. In subsequent classes Mr.

Callimahos introduced handouts to reduce t he t im e

spent preparing worksheet s, e tc . By Class No. 29 the

time necessary for Military C-.!!pti!/'lalytics II had

been reduced to 15 days. O ther subjects were a lso

gradually compressed, as teaching aids were devised

and improved, to make room for new material. By the

mid-1970s, the course covered in four m o nt h s w h at

would have taken approximately 12 months - w it ho ut

the aids a n d p a rt i al analyses.

Th e aids accomplished more than simply shortening

the course: they reduced the clerical labor of the

student, permitted each student to progress at his own

rate, and recapitulated the steps of a solut ion. Stu-

dents i n th is course soon learned to b e war y, f or M r.

Cal limahos often in troduced handout s wi th log ical

CONFIDBN'FlkbIIz\14BLH'ItA eOMm'f' CII*U14HLS OULY

€ONFIDHN'FIAL 15

Page 4: Callimahos Course

7/28/2019 Callimahos Course

http://slidepdf.com/reader/full/callimahos-course 4/7

UNCLASSIFIED

Intensive Stlloy Program in General Cryptar,alysis

Invitation to Learning

February 19_

WELCCME,

You are now /I member of Class No. _ _ of the Intensive St1ldy Program inGeneral Cryptanalysis, th e most comprehensive and advanced course in the subject offered in the Cryptologic Community. In this course you will gain athorough understanding of cryptanalytic theory and applications in e widevariety of cryptosystems, thereby equipping you to apply eppropriete diagnost ic and exploitation techniques in th e f:lolution of your operational problems.

The threefold purpose of t he Int en sive Study Program is (a ) to augmentt he t echn ic al background, (b ) to stiffiulate th e imagination, and (c ) to inst i l l

a prcfesl;1.onal atti tude. These aspects . , i l l permeate a l l 720 hours of thecourse, and will be frequently underlined in th e lectures.

Although in th e beginning of th e course you will struggle independently,

you may work as a team of 12 , or any part i t ions of 12 . Youl ~ ~ Y

confer freelywith e ach other, consult any Agency elements, and have access to any ~ a c h i n eaids in addition to those normally f u ~ i s h e d in th e course. For group discussions, you are encouraged to use th e blackboard to i l lustrate a p oin t toth e o th er c la ss members. You w ill fe el considerable time pressu re, e spec ia l lya t the beginning of th e course; bu t you will soon relax and be able to assimi la te th e instruction at th e speed a t which i t i s conducted. The method ofinstruction, aided by hundreds of classroom handouts and part ial analyses,maximizes -l;he training time and makes possible th e compression into only ISweeks of what would otherwise have been a full-t ime l2-month course.

Understanding th e text assignments is th e most important consideration:problem solving is only a means o f insur ing understanding, or of discoveringwhat has no t been absorbed. Read over th e text assignment, not too slowly;work the problems, and reread po rtio ns o f th e t ~ x t as necessary.

Error s ( bu t nonduplicat ive:) are encouraged, as they are part icularly

ins truct ive to th e entire class; without errors , there is no assurance ofcomplete understanding. In otper werds, i f you oreeze through problems, youare on th e w r o ~ . g problems, or in th e wrong course.

Aids will be furnished from timp. to time to reduce clerical labor andc o m p r ~ s s th e instruction; bu t don't s i t on your gluteal muscles eagerlyawaiting th e next gif t from heaven. Do eschew pygidial lethargy.

Solution of a problem entails th e recovery of a l l alphabets, disgrams,keys, and conventions, together with some extrapolated plain tex t . Do no t

waste time in mechanical decryption of th e entire plain texts of messages.

You can nOli look forward to f8 weeks of sheer d e l 1 g h t ~

t b - ( ~ 1JT..JP---:-...l. r- >

Guru and Caudillo

Figure 1.

16 UNCLASSIFIED

Page 5: Callimahos Course

7/28/2019 Callimahos Course

http://slidepdf.com/reader/full/callimahos-course 5/7

mistakes or erroneous hypotheses that had been made

by students in th e past.

These aids, like every other e lement of th e course,

reflect Callimahos's passion for accuracy and det ai l,

one of th e marks o f the premier c ryptanalys t - as

well as t he p remier musician. I Some of these aids

(such as the" Invitation to Learning" in Figure 1) also

ref lect h is whimsy and wit. As intense as he was about

cryptanalys is and th e effective application of th e

principles and techn iques he taught, he yet had a

quick and unerring sense of th e humorous and th e

ludicrous - which often provided a class refreshing

relief.

Not that a Callimahos class was likely to be boring:

students were not only exposed to his wit and some

times sardonic humor - their horizons were inevitably

widened by th e vast amount of information about

languages, cryptanalytic inventors, musicians, exotic

food and drink, extraterrestrial communications,

snuff, etc. that salted Callimahos's lectures.

UNCLASSIFIEDEDR ( " ~ F I C I ! \ L U:=;E

in th e early 1970s. These monographs represented

unique expository treatments of th e subjects. In th e

foreword t o Monograph 18, "Ars Conjectandi: The

Fundamentals of Cryptodiagnosis," Deputy Direc to r

Louis W. Tordella wrote:

This monograph represent.s a milestone in cryptologic litera

ture: t he first detailed and comprehensive expos it ion o f th e

fundamentals of cryptodiagnosis....Any cryptanalyst, whether

he has two yea rs ' o r 20 yea rs ' backg round, will profit. from th e

study of this pioneering work. For th e experienced cryptanalyst,

it is an indispensable vade mecum.

The monographs have been used as additional texts in

th e cou rse, a s well as by graduates and other profes

sional analysts.

The materia ls used in th e course increased over the

years. By the mid-seventies each student was given

over sixty books and documents comprising represent

ative literature in th e field. With the help of these

aids, class lectures, and demonstrations by both th e

instructors and fellow students, th e student worked

(b) ( 3 ) -P . L .

86-36

Mr. Callimahos lecturing t he las t class he taught.

After Mr. Callimahos established th e schedule of

one class a year, he had more time to devote to

developing th e examples, problems, and other mate

rials for Military Cryptanalytics I ll , which was com

ple ted ear ly in 1977. When t he mater ia l destined to

become a chapter in th e book was completed, it waspublished as a monograph in the Technical Literature

Series. "An Introduction to Teleprinter Key Analysis"

was published in 1968, and a half dozen more appeared

, Mr. Cal l imahos Was recognized as one o f the world's leading

tJutists in the 19305. A short biography will appear in a future issue

of th e CryptoJo{;ic Spectrum.

hi s way through some 400 cryptanalytic problems in

a variety of manual and machine cryptosys tems.

Approximately twelve weeks were devoted to manual,

six to machine sys tems . At th e end of th e course, th e

student a ttacked the Zendian Problem, which consists

of a volume of traffic simulating a large-scale com

munications-intelligence operation.

Of all th e course materia ls, the Zendian Problem is

perhaps th e best example of Callimahos's almost

overwhelming thoroughness, as well as his creativity.

His Zendia is no Lilliput or Brobdingnag, but a country

of third or fourth world r ank complete with a culture

UNCLASSIFIED 17l;oR OFFICIAL USE l..JI\lLyl

Page 6: Callimahos Course

7/28/2019 Callimahos Course

http://slidepdf.com/reader/full/callimahos-course 6/7

UNCLASSIFIED

and a history - and a ruler, Salvo Salasio , whose

portrait bears more than a passing resemblance to

pictures of th e young Callimahos. This small island

nation was placed in th e Paci fika Ocean by U. S.

Army cartographers right where God forgot to pu t it .

There are topographical maps and maps showing the

distribution of indus try and agriculture. There is a lso

a more detailed map of th e Loreno province, where

mos t of th e action takes place in this post-World War

II war game.

The problem includes a collection of 375 Zendian

military messages (one day's intercept) enciphered in

a variety of manua l and mach ine systems. Students

have th e opportunity to reconstruct, from message

preambles and th e day's chatter, the Zendian Order

of Battle. They then attack th e cipher messages, and

within two weeks they diagnose and solve all the

exploitable messages. This is an ideal opportunity for

s tudent s to practice what they have learned in the

course, and to organize and manage their own team's

attack against th e Zendian communications.

The hundreds of graduates of the course can be

found today in many areas in operations - in analyt-

ical and managerial positions - and in research and

development. A number of them have reached posi

tions of considerable responsibility.

honow .11 y.. mt'n 1I,. I h t ' ~ I ' r t ' l j , f " n l ~ thai

h8\'ing drmOn,.'ralfd un('ommon llt;l ..nb in o o ~ n i ' i v C " U m v h 8 1 . , ~ I u - V t " i ~ .t · ~ h r w i n ~ t'V,'" t r a n l l i l o ~ l ' rrf'hraf t 1 t f " 8 I o p r ~ Y . has C'llmp(drd th..

inh'nl-iH' t ' \ t l l d ~ I ' r u ~ r l l m in

undo h u \ i n ~ IIlTn " ' p n ~ " d III th,· u!limBlc' orr.Dum un'unurum uf

h..uri!Olir h U - ' : ' J : I · r m u j . : ~ t · ~ in Ihl' (int· . ' Irauti'inn . nf Ih.· proJ;:l·nilur..

(If uu r I1\v ..ti., IU'1. tlurl in n'('n::nili41n rUr1h"rmlln' uf .. u l ' ( " t ' ~ " r u lpllr1i,·il •• l iun in Ih,' Z,'mlian t:umpui,e:n. j", hl·noh., a ' k ~ H l t l ' l lmt·mhrn.hil' in

THE DllNDEE SOCIETY'n lnlU"n '" h.·,..-,.r. ' \! ' hS\f' h,'f('llnhl uff;)"c'd our hand and !wa'

I h i ~ dH'o' n( . 14 . al Furt ( ; t ' l ) r ~ t ' (;urdun

"1,.811.,. ' h . · ~ Iltnll.

l..nmbrH." ", f:a/limahul'

t;uru f l l ld t:nudill"

Figure 2.

18 UNCLASSIFIED

Salvo Salasio. ruler of Zendia.

All graduates of the course automatically become

members of th e Dundee Society, next to the U. S.

Senate perhaps the most exclusive club in th e world.

This cryptic organization owes it s name to the mar-

malade jars that serve as pencil holders in the CA-400

classroom. The name was born ou t of necessity; it

served as a harmless cover for the bewildering and

lengthy course title when Mr. Callimahos made areservation for a gathering of course graduates at a

local restaurant.

The gathering of graduates soon became an annua l

event. By the late 1960s it had become a formal

banquet with, each year, a mystery guest celebri ty

who, with much fanfare , was made an honory member

of the Dundee Society. Somehow Lambros D. Calli

mahos became the Guru and Caudillo of the Society

and, at the banquets , he played th e role with mock

solemnity, wearing a Nehru jacket, beads and turban.

The first honorary member was Dr. Louis W. Tordella

(1968); since then, the honorary members have been

Lieutenant General Marshall S. Carter, USA (1969),

Vice Admiral Noel Gayler, USN (1970), the Hon.

Robert F. Froehlke (1971), the Hon. Albert C. Hall

(1972), Lieutenant General Samuel G. Phillips, USAF

(1973), Lieutenant General Lew Allen, Jr., USAF

(1974), Mr. William Colby (1975), Mr. Benson K.Buflham (1976), Admiral Stansfield Turner, USN

Page 7: Callimahos Course

7/28/2019 Callimahos Course

http://slidepdf.com/reader/full/callimahos-course 7/7