HOME

TheInfoList



OR:

In the
history of cryptography Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classical cryptography — that is, of methods of encryption that use pen and paper, ...
, or , codenamed Red by the United States, was a diplomatic cryptographic machine used by the
Japanese Foreign Office The is an executive department of the Government of Japan, and is responsible for the country's foreign policy and international relations. The ministry was established by the second term of the third article of the National Government Orga ...
before and during
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the vast majority of the world's countries—including all of the great powers—forming two opposin ...
. A relatively simple device, it was quickly broken by western cryptographers. The Red cipher was succeeded by the which used some of the same principles. Parallel usage of the two systems assisted in the breaking of the Purple system. The Red cipher should not be confused with the Red naval code, which was used by the
Imperial Japanese Navy The Imperial Japanese Navy (IJN; Kyūjitai: Shinjitai: ' 'Navy of the Greater Japanese Empire', or ''Nippon Kaigun'', 'Japanese Navy') was the navy of the Empire of Japan from 1868 to 1945, when it was dissolved following Japan's surrender ...
between the wars. The latter was a
codebook A codebook is a type of document used for gathering and storing cryptography codes. Originally codebooks were often literally , but today codebook is a byword for the complete record of a series of codes, regardless of physical format. Cryptog ...
system, not a cipher.


Operation

The Red machine encrypted and decrypted texts written in
Latin character The Latin script, also known as Roman script, is an alphabetic writing system based on the letters of the classical Latin alphabet, derived from a form of the Greek alphabet which was in use in the ancient Greek city of Cumae, in southern Italy ...
s (alphabetic only) for transmission through the cable services. These services charged a lower rate for texts that could be pronounced than for random strings of characters; therefore the machine produced
telegraph code A telegraph code is one of the character encodings used to transmit information by telegraphy. Morse code is the best-known such code. ''Telegraphy'' usually refers to the electrical telegraph, but telegraph systems using the optical telegraph w ...
by enciphering the
vowel A vowel is a syllabic speech sound pronounced without any stricture in the vocal tract. Vowels are one of the two principal classes of speech sounds, the other being the consonant. Vowels vary in quality, in loudness and also in quantity (leng ...
s separately from the
consonant In articulatory phonetics, a consonant is a speech sound that is articulated with complete or partial closure of the vocal tract. Examples are and pronounced with the lips; and pronounced with the front of the tongue; and pronounced wit ...
s, so that the text remained a series of syllables. (The letter "Y" was treated as a vowel.) Per
International Telegraph Union The International Telecommunication Union is a specialized agency of the United Nations responsible for many matters related to information and communication technologies. It was established on 17 May 1865 as the International Telegraph Union ...
regulations at the time, pronounceable words in telegrams were charged a lower rate than unpronounceable code groups. The "sixes and twenties" effect (as American analysts referred to it) was a major weakness which the Japanese continued in the Purple system. Encryption itself was provided through a single half-rotor; input contacts were through
slip ring A slip ring is an electromechanical device that allows the transmission of power and electrical signals from a stationary to a rotating structure. A slip ring can be used in any electromechanical system that requires rotation while transmitting p ...
s, each of which connected to a single output contact on the rotor. Since both the vowels and consonants were passed through the same rotor, it had sixty contacts (the
least common multiple In arithmetic and number theory, the least common multiple, lowest common multiple, or smallest common multiple of two integers ''a'' and ''b'', usually denoted by lcm(''a'', ''b''), is the smallest positive integer that is divisible by bot ...
of six and twenty); wiring ensured that the two groups were kept separate. The slip rings were connected to the input
keyboard Keyboard may refer to: Text input * Keyboard, part of a typewriter * Computer keyboard ** Keyboard layout, the software control of computer keyboards and their mapping ** Keyboard technology, computer keyboard hardware and firmware Music * Musi ...
through a
plugboard A plugboard or control panel (the term used depends on the application area) is an array of jacks or sockets (often called hubs) into which patch cords can be inserted to complete an electrical circuit. Control panels are sometimes used to di ...
; again this was organized to keep the vowels and consonants separate. The rotor turned at least one step after each letter. The amount of rotation was controlled by the break wheel, which was connected to the rotor, and which had up to forty-seven pins in it. Up to eleven of these pins (in a predetermined set of positions) were removable; in practice, from four to six pins were removed. Rotation of the wheel stopped when the next pin was reached; therefore, if the next pin were removed, the rotor would advance two places instead of one. The irregular pattern of rotation produced an
Alberti cipher The Alberti Cipher, created in 1467 by Italian architect Leon Battista Alberti, was one of the first polyalphabetic ciphers. In the opening pages of his treatise ' he explained how his conversation with the papal secretary Leonardo Dati about a re ...
.


History

The vulnerability of Japanese code systems was made public in 1931 when
Herbert Yardley Herbert Osborn Yardley (April 13, 1889 – August 7, 1958) was an American cryptologist. He founded and led the cryptographic organization the Black Chamber. Under Yardley, the cryptanalysts of The American Black Chamber broke Japanese diplomatic ...
published ''
The American Black Chamber ''The American Black Chamber'' is a 1931 book by Herbert O. Yardley. The book describes the inner workings of the interwar American governmental cryptography organization called the Black Chamber. The cryptography historian David Kahn called the b ...
'', a popular account of his code breaking activities for the US government in which he discussed the breaking of Japanese codes and their use during the
Washington Naval Conference The Washington Naval Conference was a disarmament conference called by the United States and held in Washington, DC from November 12, 1921 to February 6, 1922. It was conducted outside the auspices of the League of Nations. It was attended by nine ...
. These revelations prompted Japanese to look into machine ciphers. The system was introduced in 1930-1931 (the 91 in the designation refers to the
Japanese imperial year The , colloquially known as the or "national calendar year" is a unique calendar system in Japan. It is based on the legendary foundation of Japan by Emperor Jimmu in 660 BC. ''Kōki'' emphasizes the long history of Japan and the Imperial dynas ...
2591), using a
reverse-engineered Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accompli ...
version of a machine supplied by the firm of
Boris Hagelin Boris Caesar Wilhelm Hagelin (2 July 1892 – 7 September 1983) was a Swedish businessman and inventor of encryption machines. Biography Born of Swedish parents in Adshikent, Russian Empire, Hagelin attended Lundsberg boarding school and late ...
. Hagelin's most sophisticated systems were
rotor machine In cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting messages. Rotor machines were the cryptographic state-of-the-art for much of the 20th century; they were in widespread use in the 19 ...
s similar to those used in
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the vast majority of the world's countries—including all of the great powers—forming two opposin ...
, but as he did not trust the Japanese to honor his
patent A patent is a type of intellectual property that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an enabling disclosure of the invention."A p ...
s, he sent a more primitive device designed by Arvid Damm instead. It was this machine which the Japanese used as the basis for their design; the separate encryption of the vowels, however, was strictly a Japanese contribution. The code was broken successfully by three independently working groups. The British solution came first, with
Hugh Foss Hugh Rose Foss (13 May 1902 – 23 December 1971) was a British cryptanalyst. At Bletchley Park during World War II he made significant contributions both to the breaking of the German Enigma code and headed the section tasked with breaking Japan ...
and
Oliver Strachey Oliver Strachey CBE (3 November 1874 – 14 May 1960), a British civil servant in the Foreign Office, was a cryptographer from World War I to World War II. Life and work Strachey was a son of Sir Richard Strachey, colonial administrator and Ja ...
working out the code in 1934, and
Harold Kenworthy Harold may refer to: People * Harold (given name), including a list of persons and fictional characters with the name * Harold (surname), surname in the English language * András Arató, known in meme culture as "Hide the Pain Harold" Art ...
's shop producing a replica, the "J machine", a year later. American attempts to break the system waited until 1935. In the Army SIS group, the system was broken by
Frank Rowlett Frank Byron Rowlett (May 2, 1908 – June 29, 1998) was an American cryptologist. Life and career Rowlett was born in Rose Hill, Lee County, Virginia and attended Emory & Henry College in Emory, Virginia. In 1929 he received a bachelor's deg ...
and
Solomon Kullback Solomon Kullback (April 3, 1907August 5, 1994) was an American cryptanalyst and mathematician, who was one of the first three employees hired by William F. Friedman at the US Army's Signal Intelligence Service (SIS) in the 1930s, along with Frank ...
; for the navy,
Agnes Driscoll Agnes Meyer Driscoll (July 24, 1889 – September 16, 1971), known as "Miss Aggie" or "Madame X'", was an American cryptanalyst during both World War I and World War II and was known as “the first lady of naval cryptology." Early years Born in ...
is generally credited. (She actually solved the
Orange Orange most often refers to: *Orange (fruit), the fruit of the tree species '' Citrus'' × ''sinensis'' ** Orange blossom, its fragrant flower *Orange (colour), from the color of an orange, occurs between red and yellow in the visible spectrum * ...
(or M-1) cipher used by naval attaches, but as it turned out the two systems were essentially the same.) The Americans also constructed a replica machine to expedite solutions; this machine had two half-rotors to solve the vowels and consonants separately. The SIS group originally referred to it simply as the "Japanese code machine", but decided that so descriptive a term was a security risk; as it was the first Japanese machine cipher solved, they decided to start at the beginning of the spectrum, and named it "RED". The PURPLE machine began to replace the RED system in 1938, but initial installations were at major posts; less important embassies and consulates continued to use the old system. This was one of many deficiencies in Japanese use of encryption that helped make the PURPLE system vulnerable to cracking, for now there was some identical traffic on both systems, which allowed
cribbing Crib may refer to: *Bach (New Zealand), a type of modest beach house, called a crib in the southern half of the South Island e.g. Otago and Southland *Box crib, a wooden frame used to stabilise a heavy object during a rescue, jacking, construction ...
.Budiansky, p. 164. A far more serious deficiency was that the PURPLE machine maintained the "sixes/twenties" division, even though the RED machines had since been modified to allow any six letters to be used for the vowel encryption. After eighteen months of work, the PURPLE device was cracked, and produced important intelligence up to the end of the war. Intelligence results of RED intercepts were not as dramatic, but important intelligence was obtained. For instance, American cryptanalysts were able to provide details of the
Tripartite Pact The Tripartite Pact, also known as the Berlin Pact, was an agreement between Germany, Italy, and Japan signed in Berlin on 27 September 1940 by, respectively, Joachim von Ribbentrop, Galeazzo Ciano and Saburō Kurusu. It was a defensive military ...
between the Axis powers. Reports of the
sea trial A sea trial is the testing phase of a watercraft (including boats, ships, and submarines). It is also referred to as a " shakedown cruise" by many naval personnel. It is usually the last phase of construction and takes place on open water, and ...
s of the
battleship A battleship is a large armored warship with a main battery consisting of large caliber guns. It dominated naval warfare in the late 19th and early 20th centuries. The term ''battleship'' came into use in the late 1880s to describe a type of ...
'' Nagato'' were also decoded, leading to important changes to the ''
USS North Carolina (BB-55) USS ''North Carolina'' (BB-55) is the lead ship of the of fast battleships, the first vessel of the type built for the United States Navy. Built under the Washington Treaty system, ''North Carolina''s design was limited in displacement and ...
'', then being designed, in order to match the performance of the Japanese ship.


Further reading

*Chapter 7 of ''Computer Security and Cryptography'' (Konheim, Alan G., Wiley-Interscience, 2007, pp. 191–211) has an extensive analysis of the RED cipher.


References

{{Cryptography navbox , machines Encryption devices Rotor machines Japan–United States relations World War II Japanese cryptography