Fish (cryptography)

From Wikipedia, the free encyclopedia

German prisoners prepare the "Russian Fish" for loading and shipment to England.[1]

Fish (sometimes FISH) was the UK's GC&CS Bletchley Park codename for any of several German teleprinter stream ciphers used during World War II.[2][3][4] Enciphered teleprinter traffic was used between German High Command and Army Group commanders in the field, so its intelligence value (Ultra) was of the highest strategic value to the Allies.[5] This traffic normally passed over landlines, but as German forces extended their geographic reach beyond western Europe, they had to resort to wireless transmission.[6]

Bletchley Park decrypts of messages enciphered with the Enigma machines revealed that the Germans called one of their wireless teleprinter transmission systems "Sägefisch" (sawfish) which led British cryptographers to refer to encrypted German radiotelegraphic traffic as Fish. The code Tunny (tunafish) was the name given to the first non-Morse link, and it was subsequently used for the Lorenz SZ machines and the traffic enciphered by them.

History[]

In June 1941, the British "Y" wireless intercept stations, as well as receiving Enigma-enciphered Morse code traffic, started to receive non-Morse traffic which was initially called NoMo.[7] NoMo1 was a German army link between Berlin and Athens, and NoMo2 a temporary air force link between Berlin and Königsberg. The parallel Enigma-enciphered link to NoMo2, which was being read by Government Code and Cypher School at Bletchley Park, revealed that the Germans called the wireless teleprinter transmission systems "Sägefisch" (sawfish). This led the British to use the code Fish dubbing the machine and its traffic Tunny.[8]

The enciphering/deciphering equipment was called a Geheimschreiber (secret writer) which, like Enigma, used a symmetrical substitution alphabet. The teleprinter code used was the International Telegraph Alphabet No. 2 (ITA2)—Murray's modification of the 5-bit Baudot code.

When the Germans invaded Russia, during World War II, the Germans began to use a new type of enciphered transmission between central headquarters and headquarters in the field. The transmissions were known as Fish at Bletchley Park. (See Lorenz cipher, Cryptanalysis of the Lorenz cipher.) The German army used Fish for communications between the highest authorities in Berlin and the high-ranking officials of the German Army in the field. The Fish traffic which the personnel at Bletchley Park intercepted, contained discussions, orders, situation reports and many more details about the intentions of the German Army. However, these transmissions were so challenging to decrypt that even with the assistance of the high speed Colossus computer, the messages could not be read until several days later.[9] “Vital intelligence was obtained about Hitler’s intentions in the run up to D-Day 1944.”[10]

Traffic code names[]

Tunny[]

The Lorenz SZ42 machine with its covers removed. Bletchley Park museum

The NoMo1 link was initially named Tunny (for tunafish), a name which went on to be used both for the Lorenz SZ40/42 machines and for the Bletchley Park analogues of them. The NoMo1 link was subsequently renamed Codfish.[11] A large number of Tunny links were monitored by the Y-station at Knockholt and given names of fish. Most of these were between the Oberkommando der Wehrmacht (German High Command, OKW) in Berlin and German army commands throughout occupied Europe. Cryptanalysis of the Lorenz cipher at Bletchley Park, assisted initially by a machine called Heath Robinson and later by the Colossus computers yielded a great deal of valuable high-level intelligence.

Bletchley Park names of Tunny links[12]
Name Between
Bream Berlin Rome
Herring Rome Tunis
Jellyfish Berlin Paris
Grilse Berlin La Roche
Mullet Berlin Oslo
Turbot Berlin Copenhagen
Dace Berlin Königsberg
Whiting Königsberg Riga
Perch Königsberg Central Belarusse
Squid Königsberg N Ukraine
Octopus Königsberg E Ukraine
Stickleback Königsberg S Ukraine
Smelt E Ukraine S Ukraine
Grayling Königsberg Belgrade
Tarpon Berlin Bucharest
Gurnard Berlin Belgrade
Chubb Belgrade Salonica
Flounder Salonika Rhodes
Codfish Berlin Salonika

Tunny decrypts provided high-grade intelligence in an unprecedented quality. Walter Jacobs, a US Army codebreaker who worked at Bletchley Park, wrote in an official report on the operation to break Tunny that in March 1945 alone 'upward of five million letters of current transmission, containing intelligence of the highest order, were deciphered'.[13]

Sturgeon[]

This was the name given to traffic encoded with the Siemens and Halske T52 Geheimschreiber.[14][15] In May 1940, after the German invasion of Norway, the Swedish mathematician and cryptographer Arne Beurling used traffic intercepted from telegraph lines that passed through Sweden to break this cipher.[16] Although Bletchley Park eventually diagnosed and broke Sturgeon, the relatively low value of the intelligence gained, compared to the effort involved, meant that they did not read much of its traffic.

Thrasher[]

This was the name used for traffic enciphered on a Geheimschreiber that was probably the Siemens T43 one-time tape machine. This was used only on a few circuits, in the later stages of the war and was diagnosed at Bletchley Park, but considered to be unbreakable.

List of senior involved staff at Bletchley Park[]

Including both executives and cryptographers on FISH (Tunny) in the Testery.

  • Ralph Tester — linguist and head of Testery
  • W.T. Tutte — codebreaker and mathematician
  • John Tiltman — codebreaker and intelligence officer
  • Max Newman — mathematician and codebreaker who later set up the Newmanry
  • Jerry Roberts — shift-leader, linguist and senior codebreaker
  • Peter Ericsson — shift-leader, linguist and senior codebreaker
  • Victor Masters — shift-leader
  • Denis Oswald — linguist and senior codebreaker
  • Peter Hilton — codebreaker and mathematician
  • Peter Benenson — codebreaker
  • Peter Edgerley — codebreaker
  • John Christie — codebreaker
  • John Thompson — codebreaker
  • Roy Jenkins — codebreaker
  • Tom Colvill — general manager

See also[]

Notes[]

  1. ^ Parrish, Thomas D. (1986). The Ultra Americans: The U.S. Role in Breaking the Nazi Codes: Thomas Parrish: 9780812830729: Amazon.com: Books. ISBN 978-0812830729.
  2. ^ Mache 1986, pp. 230–242
  3. ^ Deavours & Kruh 1986, pp. 243–247
  4. ^ Mache 1989, pp. 97–117
  5. ^ Copeland 2006, p. 47
  6. ^ Lewin 2001, p. 130
  7. ^ Copeland 2006, p. 338
  8. ^ Codebreakers : the inside story of Bletchley Park, F.H. Hinsley, Alan Stripp, 1994, https://books.google.com/books?id=j1MC2d2LPAcC&printsec=frontcover&dq=Codebreakers+:+the+inside+story+of+Bletchley+Park,&hl=en&sa=X&redir_esc=y#v=onepage&q=Introduction%20to%20fish&f=false, An Introduction to Fish, Hinsley, pp. 141-148
  9. ^ F.H. Hinsley and Alan Stripp (eds.) Code Breakers: The Inside Story of Bletchley Park, Oxford University Press, 1993.
  10. ^ "Professor Bill Tutte: Mathematician who, as a Bletchley Park codebreaker, gained access to the ciphers of the German Army High Command". The Times. Archived from the original on 4 March 2016. Retrieved 21 May 2013.
  11. ^ Gannon 2006, p. 170
  12. ^ Copeland 2006, p. 41
  13. ^ S. Wylie, Breaking Tunny and the birth of Colossus, Action This Day (eds. M. Smith and R. Erskine), Bantam Press, London, 2001, pp. 317-341.
  14. ^ Weierud 2006, pp. 307–327
  15. ^ Smith 2006, p. 35
  16. ^ McKay 2006, pp. 328–333

References[]

  • Bauer, Friedrich L. (2006), Origins of the Fish Cypher Machines in Copeland 2006, pp. 411–417
  • Copeland, B. Jack, ed. (2006), Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, ISBN 978-0-19-284055-4
  • Deavours, Cipher A.; Kruh, Louis (October 1986), "Appendix Mechanics of the German Telecipher Machine", Cryptologia, 10 (4): 230–242, doi:10.1080/0161-118691861074 (reprinted in Cryptology: Yesterday, Today and Tomorrow, Artech House, Norwood, 1987)
  • Gannon, Paul (2006), Colossus: Bletchley Park's Greatest Secret, London: Atlantic Books, ISBN 978-1-84354-331-2
  • Lewin, Ronald (1978), Ultra Goes to War: The Secret Story, Classic Military History, Harmondsworth, England: Penguin Books (published 2001)
  • Mache, Wolfgang W. (October 1986), "Geheimschreiber", Cryptologia, 10 (4): 230–242, doi:10.1080/0161-118691861065 (Reprinted in: Cryptology: Yesterday, Today and Tomorrow, Artech House, Norwood, 1987)
  • Mache, Wolfgang W. (April 1989), "The Siemens Cipher Teletype in the History of Telecommunications", Cryptologia, 13 (2): 97–117, doi:10.1080/0161-118991863817 (reprinted in Selections from Cryptologia: History, People, and Technology, Artech House, Norwood, 1998)
  • McKay, Craig (2006), "German Teleprinter Traffic and Swedish Wartime Intelligence", in Copeland, B Jack (ed.), Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, ISBN 978-0-19-284055-4
  • Smith, Michael (2006), "How it began: Bletchley Park Goes to War", in Copeland, B Jack (ed.), Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, ISBN 978-0-19-284055-4
  • Weierud, Frode (2006), "Bletchley Park's Sturgeon—The Fish That Laid No Eggs", in Copeland, B Jack (ed.), Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, ISBN 978-0-19-284055-4
Retrieved from ""