Enigma Security Measures
Transcript of Enigma Security Measures
-
7/24/2019 Enigma Security Measures
1/14
Military and intelligence history mostly dealing with WorldWar II.
Christos military andintelligence corner
Sunday, August 5, 2012
Enigma security measures
The plugboard Enigmawas used by the German armed forces prior and during WWII. It
was a modification of the commercial version. Its plugboard gave it a huge security boost
compared to the standard version.
The Germans used the Enigma extensively and they were always worried about the
security of their main cipher system. Their cryptologic security departments, scattered
Awards
Support the site
Search
Search This Blog
Index
Top essays
TICOM folder- Google Docs
Scribd account
TICOM reports
Abwehr (25)AFV (22) Agents
codes (28) Allied codes(33)Axis codebreakers(37) B-Dienst (7) BletchleyPark vs Berlin(44) Bookreview (24) British codes (25)ciphony (6) disinformation (7)
Eastern front (41)Enigma (17) Forschungsamt(14) France 1940 (15) Germancodebreakers (14) Germancommunications (5) GRU (8)Hagelin (7) Italian codes (5)
Japan(12) KGB(11) Luftwaffe(10)
Labels
0 More Next Blog Create Blog Sign In
http://www.cryptomuseum.com/crypto/enigma/i/index.htmhttp://www.masterofhomelandsecurity.org/national-security.htmlhttp://1.bp.blogspot.com/-KSDvFii9vf8/UB9l606z0xI/AAAAAAAAAVI/gueQVrjtqXM/s1600/enigma-a2.jpghttp://chris-intel-corner.blogspot.com/search/label/Eastern%20fronthttp://chris-intel-corner.blogspot.com/search/label/disinformationhttp://1.bp.blogspot.com/-KSDvFii9vf8/UB9l606z0xI/AAAAAAAAAVI/gueQVrjtqXM/s1600/enigma-a2.jpghttp://chris-intel-corner.blogspot.com/search/label/Agents%20codeshttp://chris-intel-corner.blogspot.com/search/label/Allied%20codeshttps://www.blogger.com/https://www.blogger.com/home#createhttps://www.blogger.com/next-blog?navBar=true&blogID=3335175720102608134https://www.blogger.com/http://chris-intel-corner.blogspot.com/search/label/indexhttp://chris-intel-corner.blogspot.com/search/label/Luftwaffehttp://chris-intel-corner.blogspot.com/search/label/KGBhttp://chris-intel-corner.blogspot.com/search/label/Japanhttp://chris-intel-corner.blogspot.com/search/label/Italian%20codeshttp://chris-intel-corner.blogspot.com/search/label/Hagelinhttp://chris-intel-corner.blogspot.com/search/label/GRUhttp://chris-intel-corner.blogspot.com/search/label/German%20communicationshttp://chris-intel-corner.blogspot.com/search/label/German%20codebreakershttp://chris-intel-corner.blogspot.com/search/label/France%201940http://chris-intel-corner.blogspot.com/search/label/Forschungsamthttp://chris-intel-corner.blogspot.com/search/label/Enigmahttp://chris-intel-corner.blogspot.com/search/label/Eastern%20fronthttp://chris-intel-corner.blogspot.com/search/label/disinformationhttp://chris-intel-corner.blogspot.com/search/label/ciphonyhttp://chris-intel-corner.blogspot.com/search/label/British%20codeshttp://chris-intel-corner.blogspot.com/search/label/Book%20reviewhttp://chris-intel-corner.blogspot.com/search/label/Bletchley%20Park%20vs%20Berlinhttp://chris-intel-corner.blogspot.com/search/label/B-Diensthttp://chris-intel-corner.blogspot.com/search/label/Axis%20codebreakershttp://chris-intel-corner.blogspot.com/search/label/Allied%20codeshttp://chris-intel-corner.blogspot.com/search/label/Agents%20codeshttp://chris-intel-corner.blogspot.com/search/label/AFVhttp://chris-intel-corner.blogspot.com/search/label/Abwehrhttp://www.scribd.com/paspartoohttps://docs.google.com/open?id=0B_oIJbGCCNYeMGUxNzk0NWQtNzNhZi00YWVjLWI1NmItMzc2YWZiZGNjNjQ5http://chris-intel-corner.blogspot.gr/2014/06/index.htmlhttp://www.masterofhomelandsecurity.org/national-security.htmlhttp://1.bp.blogspot.com/-KSDvFii9vf8/UB9l606z0xI/AAAAAAAAAVI/gueQVrjtqXM/s1600/enigma-a2.jpghttp://4.bp.blogspot.com/-TKE6kAdT9OQ/UB9l2n5aKkI/AAAAAAAAAVA/U_fK2VUabG8/s1600/enigma-a1.jpghttp://www.cryptomuseum.com/crypto/enigma/k/index.htmhttp://www.cryptomuseum.com/crypto/enigma/i/index.htmhttp://chris-intel-corner.blogspot.com/ -
7/24/2019 Enigma Security Measures
2/14
across their cryptologic agencies, researched ways to break the Enigma and based on
their observations changes were made in operating procedures.
Here I will only look into the main security measures they took prior and during the war.
From changes in keying and indicator procedures to the mechanical modifications.
Almost all the information comes from The H istory of H ut 6 vol1 which is a British
postwar report declassified in 2006. Of course the best source would be a German report
detailing their security measures and the reasoning behind them but I dont know if such
a document existed or if it survived the war.
The plugboard Enigma and the German armed forces
In 1934 the Army and Navy agreed to use the plugboard Enigma as their main cipher
system. In 1935 the Airforce followed. At the start of WWII Germany was the only
country in the world to use a cipher machine for all its mid and high level traffic.
During WWII tens of thousands of Enigma machines were used by the Germans. It
seems that no one knows for sure how many Enigma machines were built. A good
estimate seems to be that more than 40.000 were constructed.
Enigma rotors and key settings
Initially only three rotors were used (I,II,III ). In December 1938 rotors IV and V were
introduced. These were used by all three services throughout the war. All the standard
rotors had one notch.
The Navy introduced three more rotors for its own networks in the period 1938-39. These
had two notches.
Up to the end of 1935 the key (wheel order and stecker) changed every three months.
From January 1936 every month and from October 1936 every day.
Kenngruppen
In order for the receiving party to identify the specific key used it was necessary to send
a five letter group called Buchstabenkenngruppe (letter identification group) together with
the message. The letter identification group was composed of one of the available 3-letter
kenngruppen plus two random letters in order to create a 5-letter group (Enigma traffic
was sent in 5-letter groups).
The navy used a different system. The kenngruppen was taken from a book(Kenngruppenbuch) and then enciphered with a bigram substitution table, before being
sent with the message.
Indicator procedures
The Enigma was used in the following way. First the machine was set up according to
the daily key which specified the wheelorder, ring settings and plugboard settings. Then
the cipher clerk chose a different starting position of the wheels for each message.
In order to communicate this position to the receiving party he had to first encipher it. The
starting position was initially enciphered at a standard setting called Grundstellung. Up to
1940 the practice was to encipher the indicator twice (called throw-on by BP).
For example if the Grund setting is AAK and we enciphered our message with the wheels
at OFW then we encode OFW at position AAK and get VNZ, then press OFW one moretime and get BLD . The indicator at the beginning of the message will be VNZ BLD. The
receiving party will set their machine at AAK and enter VNZBLD which will give them
OFWOFW. They will then set the rotors at OFW and proceed to decipher the message.
From September 1938 the Grund setting was dropped and the cipher clerk chose a
random starting position for enciphering the message and enciphered it at another random
position. In our example it would mean that instead of AAK the cipher clerk chooses
three random letters say TGM and enciphers OFW at that setting thus giving XYU and
again HLS. The indicator with the new system will be TGM XYU HLS.
In May 1940 the double encipherment of the indicator was dropped.
The Navy initially followed the Army-Airforce procedure of random indicator selection.
However this changed in May 1937 when they started to use an indicator book
(kennbuch) to select the indicator which was then enciphered on the Grundstellung and
the output was used as the message key. This was then communicated to the other
party after first enciphering it with a substitution table . Both Kennbuch and substitution
tables were changed several times during the war.
This procedure avoided operator mistakes and non random indicators. However Naval
M-138 strip (39) M-209(19) MI6 (6)
N.Africacampaign (17) Neutrals codes(13) Normandy 1944 (27)
NSA (35) OKH/GdNA(50) OKL Chi Stelle (18)OKW/Chi (49) OSS (16)
partisan codes (8) PersZ (20) Polish codes (16) Purplemachine (7) RAF (11) Referat 12(13) Rote Kapelle (6) RussianFISH (21) SD (12) SOE (10)
Soviet Codes (39) Sovietweapons(6) Spies (41) T-34(17) TICOM(11) Typex (10) USAcodes (50) Wa Pruef 7 (8)What If (10) ww2 stats (42)WWII Myths(49)
US Army Center of Military History
U.S. Strategic Bombing Survey -
European WarTop Level Telecommunications
Ticom archive
The War Nerd
The Nuremberg Trials Collection
The Luftwaffe, 1933-45
The Crusader Project
State Department FOIA
SAS und Chiffrierdienst
Operation Barbarossa
Numbered USAF HistoricalStudies
Nizkor project
Matthew M. Aid's siteMark J. Blair's M-209 Group
Kurfurst - Bf109 data
Katkryptolog
Jean-Franois Bouchaudy cryptosite
Japan Center for Asian HistoricalRecords
Intelnews
German Radio Intelligence
Frode Weierud's CryptoCellar
European Axis Signal Intelligencein World War II
Ellsbury.com
Dirk's WeblogCryptome
CryptoCrack
CryptoCellar Tales
Crypto Museum
CIA FOIA
C.G.McKays Intelligence Past
Axis History Forum
Anatoly Klepov's mk.ru blog
Great sites
Followers
http://www.mk.ru/blogs/blog-anatoliya-klepova.htmlhttp://forum.axishistory.com/index.phphttp://intelligencepast.com/http://www.foia.cia.gov/http://www.cryptomuseum.com/index.htmhttp://cryptocellartales.blogspot.no/https://sites.google.com/site/cryptocrackprogram/homehttp://cryptome.org/http://rijmenants.blogspot.com/http://www.ellsbury.com/enigmabombe.htmhttp://www.nsa.gov/public_info/declass/european_axis_sigint.shtmlhttp://cryptocellar.org/http://allworldwars.com/German-Radio-Intelligence-by-Albert-Praun.htmlhttp://intelnews.org/http://www.jacar.go.jp/english/index.htmlhttp://www.jfbouch.fr/crypto/http://katkryptolog.blogspot.gr/http://kurfurst.org/http://www.nf6x.net/groups/m209group/http://www.matthewaid.com/http://www.nizkor.org/hweb/imt/tgmwc/http://www.afhra.af.mil/studies/index.asphttp://www.operationbarbarossa.net/http://scz.bplaced.net/http://foia.state.gov/Default.aspxhttp://crusaderproject.wordpress.com/http://www.ww2.dk/http://avalon.law.yale.edu/subject_menus/imt.asphttps://www.nsfwcorp.com/author/gary-brecherhttp://sites.google.com/site/ticomarchive/http://electrospaces.blogspot.com/http://wwiiarchives.net/servlet/documents/usa/103/0http://www.history.army.mil/catalog/browse/title.htmlhttp://chris-intel-corner.blogspot.com/search/label/Pantherhttp://chris-intel-corner.blogspot.com/search/label/mystery%20machinehttp://chris-intel-corner.blogspot.com/search/label/movie%20reviewhttp://chris-intel-corner.blogspot.com/search/label/MI5http://chris-intel-corner.blogspot.com/search/label/WWII%20Mythshttp://chris-intel-corner.blogspot.com/search/label/ww2%20statshttp://chris-intel-corner.blogspot.com/search/label/What%20Ifhttp://chris-intel-corner.blogspot.com/search/label/Wa%20Pruef%207http://chris-intel-corner.blogspot.com/search/label/USA%20codeshttp://chris-intel-corner.blogspot.com/search/label/Typexhttp://chris-intel-corner.blogspot.com/search/label/TICOMhttp://chris-intel-corner.blogspot.com/search/label/T-34http://chris-intel-corner.blogspot.com/search/label/Spieshttp://chris-intel-corner.blogspot.com/search/label/Soviet%20weaponshttp://chris-intel-corner.blogspot.com/search/label/Soviet%20Codeshttp://chris-intel-corner.blogspot.com/search/label/SOEhttp://chris-intel-corner.blogspot.com/search/label/SDhttp://chris-intel-corner.blogspot.com/search/label/Russian%20FISHhttp://chris-intel-corner.blogspot.com/search/label/Rote%20Kapellehttp://chris-intel-corner.blogspot.com/search/label/Referat%2012http://chris-intel-corner.blogspot.com/search/label/RAFhttp://chris-intel-corner.blogspot.com/search/label/Purple%20machinehttp://chris-intel-corner.blogspot.com/search/label/Polish%20codeshttp://chris-intel-corner.blogspot.com/search/label/Pers%20Zhttp://chris-intel-corner.blogspot.com/search/label/partisan%20codeshttp://chris-intel-corner.blogspot.com/search/label/OSShttp://chris-intel-corner.blogspot.com/search/label/OKW%2FChihttp://chris-intel-corner.blogspot.com/search/label/OKL%20Chi%20Stellehttp://chris-intel-corner.blogspot.com/search/label/OKH%2FGdNAhttp://chris-intel-corner.blogspot.com/search/label/NSAhttp://chris-intel-corner.blogspot.com/search/label/Normandy%201944http://chris-intel-corner.blogspot.com/search/label/Neutrals%20codeshttp://chris-intel-corner.blogspot.com/search/label/N.Africa%20campaignhttp://chris-intel-corner.blogspot.com/search/label/MI6http://chris-intel-corner.blogspot.com/search/label/M-209http://chris-intel-corner.blogspot.com/search/label/M-138%20strip -
7/24/2019 Enigma Security Measures
3/14
keys continued to use a Grund setting throughout the war. For some reason some Naval
keys continued to use repeating indicators after 1940.
In April 1945 the Navy introduced a change in their procedure by having 228 Grund
settings valid for one month instead of a different one for each day.
Plugboard connections
Initially 6-8 stecker connections were used. From January 1940 10 were used and this
remained standard procedure till the end of the war. A few keys, for whatever reason,
continued to use fewer steckers.
General, Officers and Staff keys
Naval keys had three settings: General, Officers, Staff. The General key (wheelorder,
ring settings, stecker) was not changed every day but was paired for two consecutive
days. That meant that the second day had the same wheelorder and ring settings but
differed in the stecker.
The Officers messages were enciphered first on the Officers key that had identical
settings with the General key but differed in the stecker. Then it was enciphered once
more on the General. Officers settings were changed every 10 days. The Officers key
was much harder to break than the General key.
Staff keys had their own settings (wheelorder, ring settings, stecker) and were
enciphered once more on the General key. With the technology of that time they were
more or less unbreakable.
Army keys changed every day. C ertain types of Army keys (Armee, Heeres, Wehrmacht)
had several versions. The General M/S (Maschinenschlssel) key for Geheim (secret)
traffic, the Stab M/S key for Geheimkommandosache (top secret) and OKH or Officers
for the highest level messages.
Airforce keys also changed every day. There was a general administrative key Red that
was used by all units on all fronts, a high level key Pink plus of course different keys for
different geographic areas and different levels of command.
Overview of security measures
Proliferation of keys
In 1942 all three services introduced more keys to cover different geographic areas
(Eastern front, Med, West etc) and operational commands (Fliegerkorps, Luftflotte, etc)
The army broke its Eastern key into several. The Luftwaffe introduced separate keys for
higher levels of command and the Navy introduced a separate key for the Atlantic U-
boats.
From then on the number of keys continued to increase.
Effects on breaking:
More keys meant more work for BP or more realistically that many keys were not
attacked at all. On the other hand traffic between different networks often led to
reencodements as the same message passed through different keys. This allowed BP touse reencodements from easy keys (like Red) in order to break into harder ones.
Also it seems that the need to construct more keys led the German cipher offic ers in
charge of constructing Enigma keys to take a shortcut
Parts of older keys were reused in order to create new ones. For example the wheel order
from 22 May 1941 would be coupled with the stecker settings for Ferbruary 2nd1939 in
order to produce a new key.
This German trick mostly occurred in 1942 and in Luftwaffe networks. The Brits called it
Parkerismus after the person who had discovered it.
Enigma Uhr
In 1944 the Luftwaffe introduced, on some nets, the Uhr device which changed the
stecker combinations automatically by turning a knob.
Join this site
with Google Friend Connect
Members (40) More
Already a member? Sign in
2016 (9)
2015 (59)
2014 (96)
2013 (132)
2012 (143)
December (8)
November (12)
October (8) September (11)
August (13)
Italian codebreakers of WWII
Book review - Brute Force
German disinformationoperations - The 1930scris...
Soviet cipher teleprinters ofWWII
Memoirs of Germanintelligence o fficers
German fuel reserve -Normandy 1944
Update
Interview with NSAwhistleblowers
WWII Myths German lack ofstandardization
Specialized cryptanalyticmachines of WWII
Enigma security measures
Details on the Sovietdiplomatic code
The Abwehr never sleeps.Except on Sundays.
July (10)
June (12)
May (13)
April (13)
March (15)
February (12)
January (16)
2011 (59)
Blog Archive
Christos T.
A simple economi st with a nunhealthy interest in military andintelligence history.
View my complete profile
About Me
https://www.blogger.com/profile/04246906263926130737https://www.blogger.com/profile/04246906263926130737http://chris-intel-corner.blogspot.com/search?updated-min=2011-01-01T00:00:00-08:00&updated-max=2012-01-01T00:00:00-08:00&max-results=50http://void%280%29/http://chris-intel-corner.blogspot.com/2012_01_01_archive.htmlhttp://void%280%29/http://chris-intel-corner.blogspot.com/2012_02_01_archive.htmlhttp://void%280%29/http://chris-intel-corner.blogspot.com/2012_03_01_archive.htmlhttp://void%280%29/http://chris-intel-corner.blogspot.com/2012_04_01_archive.htmlhttp://void%280%29/http://chris-intel-corner.blogspot.com/2012_05_01_archive.htmlhttp://void%280%29/http://chris-intel-corner.blogspot.com/2012_06_01_archive.htmlhttp://void%280%29/http://chris-intel-corner.blogspot.com/2012_07_01_archive.htmlhttp://void%280%29/http://chris-intel-corner.blogspot.com/2012/08/the-abwehr-never-sleeps-except-on.htmlhttp://chris-intel-corner.blogspot.com/2012/08/details-on-soviet-diplomatic-code.htmlhttp://chris-intel-corner.blogspot.com/2012/08/enigma-security-measures.htmlhttp://chris-intel-corner.blogspot.com/2012/08/specialized-cryptanalytic-machines-of.htmlhttp://chris-intel-corner.blogspot.com/2012/08/wwii-myths-german-lack-of.htmlhttp://chris-intel-corner.blogspot.com/2012/08/interview-with-nsa-whistleblowers.htmlhttp://chris-intel-corner.blogspot.com/2012/08/update.htmlhttp://chris-intel-corner.blogspot.com/2012/08/german-fuel-reserve-normandy-1944.htmlhttp://chris-intel-corner.blogspot.com/2012/08/memoirs-of-german-intelligence-officers.htmlhttp://chris-intel-corner.blogspot.com/2012/08/soviet-cipher-teleprinters-of-wwii.htmlhttp://chris-intel-corner.blogspot.com/2012/08/german-disinformation-operations-1930s.htmlhttp://chris-intel-corner.blogspot.com/2012/08/book-review-brute-force_27.htmlhttp://chris-intel-corner.blogspot.com/2012/08/italian-codebreakers-of-wwii.htmlhttp://chris-intel-corner.blogspot.com/2012_08_01_archive.htmlhttp://void%280%29/http://chris-intel-corner.blogspot.com/2012_09_01_archive.htmlhttp://void%280%29/http://chris-intel-corner.blogspot.com/2012_10_01_archive.htmlhttp://void%280%29/http://chris-intel-corner.blogspot.com/2012_11_01_archive.htmlhttp://void%280%29/http://chris-intel-corner.blogspot.com/2012_12_01_archive.htmlhttp://void%280%29/http://chris-intel-corner.blogspot.com/search?updated-min=2012-01-01T00:00:00-08:00&updated-max=2013-01-01T00:00:00-08:00&max-results=50http://void%280%29/http://chris-intel-corner.blogspot.com/search?updated-min=2013-01-01T00:00:00-08:00&updated-max=2014-01-01T00:00:00-08:00&max-results=50http://void%280%29/http://chris-intel-corner.blogspot.com/search?updated-min=2014-01-01T00:00:00-08:00&updated-max=2015-01-01T00:00:00-08:00&max-results=50http://void%280%29/http://chris-intel-corner.blogspot.com/search?updated-min=2015-01-01T00:00:00-08:00&updated-max=2016-01-01T00:00:00-08:00&max-results=50http://void%280%29/http://chris-intel-corner.blogspot.com/search?updated-min=2016-01-01T00:00:00-08:00&updated-max=2017-01-01T00:00:00-08:00&max-results=9http://void%280%29/http://www.cryptomuseum.com/crypto/enigma/uhr/index.htm -
7/24/2019 Enigma Security Measures
4/14
One major effect of the device was that it got rid of the reciprocal encipherment of the
plugboard (although the reciprocity of the Enigma as a whole was not affected).
A description of the Uhr device is given in TICOM report I -20Interrogation ofSonderfuehrer Dr. Fricke of the Signal Intelligence agency of the Supreme command
Armed, Forces (OKW/Chi), p3
(a) Stecker Uhr. This was a small device to change the plugging. It gave 40 variations.They knew that the strength of the machine lay in the stecker and therefore wished to
divide the traffic load per stecker by 40. The machine was used only by the Luftwaffe,
which had only 1.000 or so machines for higher echelons.
Operational use:
It was first used in July 1944. Originally it was used on two keys, later it was extended to
cover 15 Luftwaffe keys.
Some keys used Uhr and UKW-D.
Effects on breaking:
The History of Hut 6 says Uhr alone had on the whole little influence on our breaking of
keys though it did mean that there was sometimes a lot of technical work to be done
after the basic key was broken. Serious complications arose only when it was necessary
to break a key on an Uhr message or when Uhr was combined with D .
Umkehrwalze D
UKW-Dwas a new rewirable reflector used on the military Enigma. The people of
Bletchley Park called it Uncle D.
http://2.bp.blogspot.com/-JKseAAFbVeg/UB9mTkgbOTI/AAAAAAAAAVY/fal0YexB-Qk/s1600/UKW-D-a1.jpghttp://www.cryptomuseum.com/crypto/enigma/ukwd/index.htmhttp://2.bp.blogspot.com/-r40LwxIGupI/UB9mL1DfjsI/AAAAAAAAAVQ/47J7PTiDhx4/s1600/uhr-a1.jpg -
7/24/2019 Enigma Security Measures
5/14
A w eek before it was introduced BP intercepted messages mentioning it. As the offic ial
history puts it the stoutest hearts might have quailed in those last days of 1943 had it
been possible for us to realize the hydraheadead nature of our veiled antagonist.
The reflector D was used principally by the Luftwaffe and in 2 or 3 army keys. A navalversion was built but not used.
Operational use:
From January 1944 the Red key started to use reflector D for some of the traffic. The
wiring was changed every 10 days. From August 44 UKW-D was greatly expanded and
some keys used it exclusively.
Western Europe
August 1st1944 marked the first use of reflector D on Luftwaffe keys used by units in
Germany. According to the History of Hut 6 this radically affected their exploitation.
During the second half of 44 the German air keys went over to reflector D.
The German armys Home Administration (Wehrkreis) network Greenshank used reflector
D since 1943 (date of introduction not known but according to the BP history probably in
January 1943). This key used a different UKW-D wiring each day. Greenshank proved to
be BPs nemesis as it resisted attack for years. The final score shows only 13 days read
during the war. There were two more Wehrkreis keys identified by BP that used reflector
D and thus proved secure.
Italian front
In November 1944 Puma (army-airforce liaison key Italy) changed over to UKW-D and
the period of regular sustained breaking was at an end. Puma also used the Uhr device.
Leopard (Luftwaffe-Italy) used UKW-D in 1945.
Eastern front
From September 1944 reflector D was used in some Luftwaffe networks. By January
1945 UKW-D use was extensive.
Effects on breaking:
Several D keys were solved because the Luftwaffe often used reflectors B and D on the
same key (called nearly D by BP). New cryptanalytic equipment had to be developed
and produced. These were the American Duenna and Autoscritcher and the British Giant.
These devices were introduced in late 1944.
Even this effort did not prevent a drop in the success rate. For example the Puma keywent from 100% to 35% read.
Uncle D proved to be Bletchley Parks toughest opponent.
Lckenfllerwalze
http://3.bp.blogspot.com/-zQA8-nFi3qs/UB9mWVax0cI/AAAAAAAAAVg/vsGzQtPxP18/s1600/UKW-D-a5.jpg -
7/24/2019 Enigma Security Measures
6/14
The Germans understood that one of the greatest weaknesses of the Enigma was the
uniform movement of the rotors. In order to counter this they built a new rotor that had 26
notches that could be set in active or inactive position.
Details about the Lckenfllerwalzeare given in TICOM I-20 Interrogation of
Sonderfuehrer Dr. Fricke of the Signal Intelligence agency of the Supreme command
Armed, Forces (OKW/Chi), p4
(b) Because of the uniform motion of the enigma, they considered that if messages of
600 or 700 letters were sent, they could be broken. If the instructions on maximum
message length were followed, they knew everything would be all right, but they felt sure
that their instructions were not followed. So they developed a new wheel with 26 notches
which could be filled in as desired. These were called Lckenfllerwalze. They wished to
avoid certain numbers of notches per wheel, and particularly consecutive notches, for
with the latter it was difficult to predict the cycle except in special cases. Consequently
they ordered that wheels should be used with one, five, seven, or nine notches only andnever with consecutive notches. Some of those wheels were actually built in Berlin by
HEIMSOETH & RINCKE, who built the enigma. They were to be produced in numbers
by this firm and by Siemens Halske, and were expected to be ready on 1 May 1945.
They were not ready, however.
Operational use:
It was not introduced during the war. It would have probably defeated BP as it attacked
the greatest weakness of the Enigma, the uniform movement of the rotors.
Enigma M4
The 4-rotor M4 machinewas known to have been distributed in the Home Waters area in
1941. The Atlantic U-boats got the M4 in February 1942. Other commands took longer tointroduce it .
http://www.cryptomuseum.com/crypto/enigma/m4/index.htmhttp://www.cryptomuseum.com/crypto/enigma/lf/index.htmhttp://1.bp.blogspot.com/-SS9QfwW6-Xw/UB9mmnp4X7I/AAAAAAAAAVw/WgIbGPaoIGw/s1600/Lf-a6.jpghttp://2.bp.blogspot.com/-_RfeqQRUMZ0/UB9meCjCQwI/AAAAAAAAAVo/3Rb3441eI2s/s1600/lf-a1.jpg -
7/24/2019 Enigma Security Measures
7/14
Effects on breaking:
The M4 was an order of magnitude more secure than the 3-rotor version.
In order to solve the M4 keys a new 4-rotor bombe was needed.
Due to constant delays in the production of a British 4-rotor bombe the Americans
decided to build their own version and this was operational in September 1943. By late
1943 95 bombes were used and in 1944 160.
Thanks to the new bombe the U-boat key was broken usually within 24-48 hours.
However during the period February 1942 to September 1943 solving the U-boat key with
existing methods was a huge problem.
Keys of naval commands that used the M4 with repeating indicators were broken
without the need for a 4-rotor bombe.
Important M4 keys like those used by surface ships (Aegir, Neptun) resisted BP attack.
Sonderschlssel
In the summer of 1944 U-boats started carrying individual Enigma keys.
Operational use:
They were first used in November 1944 and by February 1945 they carried practically all
the operational traffic of U-boat Command.
Effects on breaking:
They were practically unbreakable. As the Cryptographic history of work on the German
Naval Enigma puts it: The "Sonders" are about the only type of key which make one
feel the need for a statistical attack on Enigma instead of the normal method of cribbing.
Notschluessel
Notschluessel were emergency keys used when there was no way to issue new keys to
a specific unit or when compromise was suspected. A new Enigma key was generated
from a keyword (schlsselwort) and a discriminant (kenngruppe) from another word
(kennwort).
Operational use:
The Luftwaffe first used NOT keys in August 1944.
Effects on breaking:
NOTs were broken through knowledge of the cipher instructions, through reencodements
and cryptanalytically.
The History of Hut 6 says Those systems were only intended by the Germans for use
http://chris-intel-corner.blogspot.gr/2012/05/b-dienst-vs-bletchley-park-invasion-of.htmlhttp://4.bp.blogspot.com/-8JpQgg9CbtI/UB9mrCh0XvI/AAAAAAAAAV4/C9UGLGKemEg/s1600/enigma-a3.jpg -
7/24/2019 Enigma Security Measures
8/14
in emergency. However, NOT-keys have actually certain advantages over keys made up
in the normal way owing to their freedom from rules of keys which may help the enemy
cryptographer. They would have however, the fatal objection for regular use that if the
key is generated from one word the number of possible keys is limited so drastically that
some kind of key index becomes possible - for instance, on the second system the
number of keys is determined by the number of German words at least 12 letters long -
which must surely be much less than 100,000.
Random indicators
After abolishing the Grundstellung system the Army and Airforce allowed the Enigma
operator to choose both a random message key and a random setting with which toencipher it.
However the keys chosen by operators were not always random. This effect (called
cillies) was used by BP on its attack on the Enigma traffic.
The Germans introduced a new procedure to counter this. This procedure was as follows:
1). The cipher clerk had to choose a random text either from a book, a poem, a song etc
2). Set his Enigma at wheel order I, II, III, ring settings 01, 01, 01 and connect 10
steckers at random.
3). Choose a random Grund setting.
4). Enter the text in the Enigma and write down the output, then divide it into 6 letter
groups
Each 6 letter group comprises a Grund setting and message key. The operator then used
the new keys by setting the Enigma at the first three letters and enciphering (on the daily
key) the last three letters. The output would be used as a message key.
Operational use:
Hard to establish by Bletchley Park as there was no external indication of this new
procedure (apart from a fall in cillies). It may have been used extensively by Army and
SS keys.
According to t he report nderungen beim Schlsseln mit Maschinenschlssel the new
indicator procedure was to become effective in August 44.
http://4.bp.blogspot.com/-Q2GaF_-YOeY/Vch2nLDT1VI/AAAAAAAACwA/V3Ihvriea48/s1600/Random%2Bind%2B1.pnghttp://www.wwiiarchives.net/servlet/action/document/page/704/23/0 -
7/24/2019 Enigma Security Measures
9/14
Effects on breaking:
As the offic ial history puts it : It is impossible to interpret "Random Indicators" as
anything but an anti-cilli device - a far more radical one than CY. It does indeed kill cillies
and it is clear that the Germans had at last become conscious of this possible danger.The answer they now found to the danger of cillies was as effective as anything that
could have been devised - short of a complete change of the indicating system - and it
did lose us Orange. The only possible criticism we can make of the German action is that
(as so often) it was too late: cillies were dying when they were killed. The history of Hut
6 would have been different had the Germans in the full flush of their 1940 triumphs been
able to spare a thought for the suppression of cillies.
Wahlworts (nonsense words)
Instead of stereotyped beginnings random words were inserted at the beginning and end
of the message as an anti-crib device. Wahlworts were from 4-14 letters long.
Operational use:
This was ordered in the N.Africa army keys in December 1942. Nonsense words were
used extensively by N.African, Balkan and Eastern keys but not to such a degree in the
West.
Luftwaffe units inside Germany also used wahlworts.
http://4.bp.blogspot.com/-8jbgGUMmvqU/Vch2kYx5ruI/AAAAAAAACv8/v5Rz_eH4QAQ/s1600/Random%2Bind%2B3.jpghttp://2.bp.blogspot.com/-ZlB2qVp0xv8/Vch2nQfwFoI/AAAAAAAACwM/ZMES_SDVcKE/s1600/Random%2Bind%2B2.png -
7/24/2019 Enigma Security Measures
10/14
Effects on breaking:
Cribing on addresses was no longer possible as the official history admits breaking on
straight addresses was now out of the question. The general effect on N.African keys
was limited since at that time the Brits relied on reencodements.
Against Luftwaffe keys the problem was more serious but again reencodements w ere
used.
As the offic ial history puts it It cannot be denied that in wahlworts the Germans hit on a
simple and effective method of making cribbing more difficult. It would have been still
more effective but for the eternal German blunder of "too little and too late", introduced in
1940 on a wholesale scale, wahlworts might have knocked out the infant Crib Room
before it had got properly on its feet: but in fact the Germans did not use the system at all
till halfway through the war and not until the last few months used it on anything
approaching a universal scale.
Mosse code
The Mosse code was a commercial code (5-letter) adopted with modifications by the
Luftwaffe.
Operational use:
Used by the Luftwaffe since early 1944.
Effects on breaking:
It became a problem as an anti-crib device in 1945. When long addresses were changed
into a 5-letter code this stopped cribbing. However in cases were several regularly
occurring phrases were replaced by a codeword this provided a useful crib.
Overall the Brits rated it as a sound security measure.
Double encoding
On the Raven and Gadfly keys some messages were enciphered twice. First with the
standard procedure and then once again by using the settings of the Enigma at the end of
the message without resetting the rotors.
Effects on breaking:
As the BP history says Double Encoding was used on too small a scale to haw any
effect worth mentioning on Hut 6 breaking. On the scale on which it was used it must
have been no less a nuisance to the German cipher clerks than it was to Hut 6.
Burying
Stereotyped beginnings were a security risk. In order to counter this burying was used.
Burying meant that the cipher clerk inserted the beginning and end of the message in the
middle of the text before encoding it.
Operational use:
This precaution was introduced in the Army in December 1942.
Effects on breaking:
It was an effective anti-crib method.
CY procedure
The movement of the standard Enigma rotors was predictable due to their having only
one notch. The fast rotor moved with every character, the middle rotor moved once every
26 key depressions and the slow rotor (the left one) moved only once every 676 key
strokes (26x26). Since messages were limited to 250 characters this meant that the slow
rotor was stationary during encodement. In order to counter this effect the Germans hadthe cipher clerk move the rotor by hand in the middle of the message. After 70 to 130
letters the clerk chose a random letter and moved the slow rotor by hand to that position
(the new position must be at least 5 stages removed from the original one). Then he
wrote in the message CY followed by the letter that represented the new slow rotor
position and the letter following it in the alphabet. For example if he chose J then he
would type CYJK and continue the rest of the message with the slow rotor in the new
-
7/24/2019 Enigma Security Measures
11/14
position J.
Operational use:
Introduced in September 1944 in some Luftwaffe keys. By October used on all Army
keys and the SS ones.
The report nderungen beim Schlsseln mit Maschinenschlssel says that the new
procedure for resetting wheels within messages would become effective on 15
September 44.
Effects on breaking:
CY stopped cillying and affected cribs and reencodements. On the other hand it
occasionally provided a shortcut to the ring setting.
It did not stop BP success but it was a serious effort to counter the predictability of the
Enigma rotor movement.
Zusatz stecker
In May 1944 the Luftwaffe introduced a change in the plugboard connections every 8
hours. The Germans did not introduce three different stecker keys. Only a few of the
connections were changed each time.
This procedure created many problems and it was discontinued in mid June.
http://3.bp.blogspot.com/-4vKrWX2n7Uo/Vch3aSDkogI/AAAAAAAACwY/GDyFifRrV7M/s1600/Random%2Bind%2B5.pnghttp://4.bp.blogspot.com/-NFcVMyCY1q0/Vch3ZOUGpzI/AAAAAAAACwQ/a7RB9f5r1sY/s1600/Random%2Bind%2B4.pnghttp://www.wwiiarchives.net/servlet/action/document/page/704/27/0 -
7/24/2019 Enigma Security Measures
12/14
Effects on breaking:
Practically none. The official history calls it the most silly and trivial of their security
devices
Wheel-order permutations
From October 1941 Luftwaffe keys reversed their wheel-order at 12 noon.
The Army used a similar method from July 1942. Every 8 hours the rotors were moved
forward one step. For example if the daily key specified rotors I,IV and III in that order
then after 8 hours it would be III,I,IV and finally IV,III,I.
From September 1942 the Luftwaffe adopted the three wheel-order system.
Some Army keys (like Greenshank) used 6 permutations.
Effects on breaking:
This was an effective anti-depth measure but the Brits did not use depths in any large
degree so they were not affected on this front. However the unintended consequence
was that Banburismus was no longer practical.
Conclusion
Despite all the talk about the Germans having complete faith in the security of the
Enigma the reality is that they introduced many new procedures in order to improve its
security.
New rotors were introduced prewar.
The indicator procedure was changed by dropping the Grundstellung and stopping the
double encipherment of the message key.
Wheel permutations were used to counter depths.
Random indicators were used as an anti-cilli device.
Nonsense words and burying were used against cribbing.
The uniform movement of the wheels was countered with the CY procedure.
Traffic was split into many different keys.
Even mechanical modifications were employed to upgrade the Enigma like the Uhr
device, the UKW-D reflector and the 4-rotor M4.
These measures show that the Germans understood the main problems of the Enigma.
Had they been taken together and on all networks they could have defeated Bletchley
Park.
There were two main reasons why the Germans did not defeat BP through their security
measures.
The first one was that due to the huge number of Enigma machines in use it was not
logistically possible to take simple measures such as rewire the rotors or introduce new
ones.
The other problem was the fragmentation of their cryptologic security departments. The
Germans had 6 main cryptologic agencies.
Out of these 4 were military (Army, Navy, Airforce and OKW/Chi). Each had a crypto
security department. It was the job of that department to prepare codes and ciphers for
the service and make sure that these were secure. There were good cryptanalysts in
these departments and thanks to their efforts the security of the Enigma was upgraded
during the war. However they did not have close contact with their counterparts in other
agencies and so could not share on their research and findings.
This led to each service having a different standard of security. For example the Navy
continued to use the Grund setting even after the Army and Airforce had abandoned itand the same thing happened with repeating indicators. The Uhr device was used only by
the Luftwaffe, the UKW-D on the same keys as the reflector B and so on and so forth
It should also be mentioned that the security departments were hampered by the
resistance of the services to changes in operational procedures. Their reasoning was that
the fighting troops should not be overloaded with new codes and procedures that were of
http://en.wikipedia.org/wiki/Banburismus -
7/24/2019 Enigma Security Measures
13/14
questionable value.
A unified cryptologic security department would have ensured that all three services
followed the same procedures and instituted security changes at the same time.
Still that does not necessarily mean that a centralized department would have defeated
BP. After all BPs centralization did not save British high level codes in the period 1939-
43.
Timelines
Year
Month Measure
1936 January wheel order and stecker changed every month
October wheel order and stecker changed every day
1937 May N avy int roduces Kennbuch-bigram system
1938 Naval rotors VI and VII introduced
September New army -airforce indicator procedure
December Rotors IV and V introduced for Army-Airforce
1939 Naval rotor VIII introduced
1940 May Double encipherment of the indicator stopped
1941 October wheel order reversed by midday on Luftwaffe keys
1942 New keys for all three services
February Enigma M4 used by Atlantic U-boats
July 3 daily wheel order changes
December nonsense words and burying introduced
1943 UKW-D on Greenshank
September Army drops use of Kenngruppen
November Luftwaffe drops use of Kenngruppen
1944 Random indicators used by army and SS
Mosse code used by the Luftwaffe
January UKW-D introduced on RED key
May 3 dai ly stecker changes
July Uhr device
August Notschluessel
September CY procedure
November Sonderschlssel used by U-boats
1945 April new indicator procedure by N avy
-
7/24/2019 Enigma Security Measures
14/14
Newer Post Older PostHome
Subscribe to: Post Comments (Atom)
Posted by Christos T. at 11:46 PM
Labels: Bletchley Park vs Berlin, Enigma, German codebreakers
Sources: HW 43/70 The History of Hut 6, Volume I, British intelligence in the Second
World War vol2 and vol3 part2, Decrypted secrets: methods and maxims of cryptology,
HW 25/1 Cryptographic history of work on German Naval ENIGMA by C H O'D
Alexander, HW 25/2 The History of Hut 8 by A P MahonCryptologia article: Enigma
Message Procedures Used by the Heer, Luftwaffe and Kriegsmarine, Cryptologia article:
ENIGMA-UHR, cryptomuseum(for the pics), Wikipedia, European Axis Signal
Intelligence in World War II vol2, TICOM I-20 Interrogation of Sonderfuehrer Dr. Fricke of
the Signal Intelligence agency of the Supreme command Armed, Forces (OKW/Chi)
Acknowledgments: I have to thank Frode Weierud and Ralph Erskine for answering my
questions on aspects of the Enigma history.
For those of you who want to actually use the Enigma check this simulator
Recommend this on Google
Enter your comment...
Comment as: Google Accou
Publish
Preview
1 comment:
Anonymous 8/24/13, 9:15 AM
Brilliant!
Reply
Copyright Christos Triantafyllopoulos 2011. Simple template. Powered by Blogger.
https://www.blogger.com/http://chris-intel-corner.blogspot.com/2012/08/enigma-security-measures.html?showComment=1377360922114#c6835480033615094316https://www.blogger.com/share-post.g?blogID=3335175720102608134&postID=421859847697307983&target=pinteresthttps://www.blogger.com/share-post.g?blogID=3335175720102608134&postID=421859847697307983&target=facebookhttps://www.blogger.com/share-post.g?blogID=3335175720102608134&postID=421859847697307983&target=twitterhttps://www.blogger.com/share-post.g?blogID=3335175720102608134&postID=421859847697307983&target=bloghttps://www.blogger.com/share-post.g?blogID=3335175720102608134&postID=421859847697307983&target=emailhttp://users.telenet.be/d.rijmenants/en/enigmasim.htmhttp://www.cryptomuseum.com/http://www.tandfonline.com/doi/abs/10.1080/0161-119991887838http://www.tandfonline.com/doi/abs/10.1080/01611194.2010.486257http://www.ellsbury.com/hut8/hut8-000.htmhttp://www.ellsbury.com/gne/gne-000.htmhttp://www.scribd.com/doc/86865889/HW-43-70-Vol1http://chris-intel-corner.blogspot.com/search/label/German%20codebreakershttp://chris-intel-corner.blogspot.com/search/label/Enigmahttp://chris-intel-corner.blogspot.com/search/label/Bletchley%20Park%20vs%20Berlinhttps://www.blogger.com/email-post.g?blogID=3335175720102608134&postID=421859847697307983http://chris-intel-corner.blogspot.com/2012/08/enigma-security-measures.htmlhttps://www.blogger.com/profile/04246906263926130737http://chris-intel-corner.blogspot.com/feeds/421859847697307983/comments/defaulthttp://chris-intel-corner.blogspot.com/http://chris-intel-corner.blogspot.com/2012/08/details-on-soviet-diplomatic-code.htmlhttp://chris-intel-corner.blogspot.com/2012/08/specialized-cryptanalytic-machines-of.html