Trench Code
   HOME

TheInfoList



OR:

Trench codes (a form of
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
) were
code In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into another form, sometimes shortened or secret, for communication through a communication ...
s used for secrecy by field armies in
World War I World War I (28 July 1914 11 November 1918), often abbreviated as WWI, was one of the deadliest global conflicts in history. Belligerents included much of Europe, the Russian Empire, the United States, and the Ottoman Empire, with fightin ...
. American Army Field Codes In the American Expeditionary Forces During The First World War
William Friedman, U.S. War Department, June 1942. Contains many examples in its appendix, including a "Baseball code" (p. 254)
Messages by field telephone, radio and carrier pigeons could be intercepted, hence the need for tactical
World War I cryptography With the rise of easily-intercepted wireless telegraphy, codes and ciphers were used extensively in World War I. The decoding by British Naval intelligence of the Zimmermann telegram helped bring the United States into the war. Trench codes wer ...
. Originally, the most commonly used codes were simple substitution codes, but due to the relative vulnerability of the
classical cipher In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand. ...
, trench codes came into existence. (Important messages generally used alternative encryption techniques for greater security.) The use of these codes required the distribution of
codebook A codebook is a type of document used for gathering and storing cryptography codes. Originally codebooks were often literally , but today codebook is a byword for the complete record of a series of codes, regardless of physical format. Crypto ...
s to military personnel, which proved to be a security liability since these books could be stolen by enemy forces. By the middle of
World War I World War I (28 July 1914 11 November 1918), often abbreviated as WWI, was one of the deadliest global conflicts in history. Belligerents included much of Europe, the Russian Empire, the United States, and the Ottoman Empire, with fightin ...
the conflict had settled down into a static battle of attrition, with the two sides sitting in huge lines of fixed earthwork fortifications. With armies generally immobile, distributing codebooks and protecting them was easier than it would have been for armies on the move. However, armies were still in danger of trench-raiding parties who would sneak into enemy lines and try to snatch codebooks. When this happened, an alarm could be raised and a code quickly changed. Trench codes were changed on a regular basis in an attempt to prevent code breakers from deciphering messages.


French Army

The French began to develop trench codes in early 1916. They started out as
telephone A telephone is a telecommunications device that permits two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most efficiently the human voice, into e ...
codes, implemented at the request of a
general A general officer is an Officer (armed forces), officer of highest military ranks, high rank in the army, armies, and in some nations' air forces, space forces, and marines or naval infantry. In some usages the term "general officer" refers t ...
whose forces had suffered devastating
artillery Artillery is a class of heavy military ranged weapons that launch munitions far beyond the range and power of infantry firearms. Early artillery development focused on the ability to breach defensive walls and fortifications during siege ...
bombardments due to indiscretions in telephone conversations between his men. The original telephone code featured a small set of two-letter codewords that were spelled out in voice communications. This grew into a three-letter code scheme, which was then adopted for wireless, with early one-part code implementations evolving into more secure two-part code implementations. The British began to adopt trench codes as well.


German Army

The
Germans , native_name_lang = de , region1 = , pop1 = 72,650,269 , region2 = , pop2 = 534,000 , region3 = , pop3 = 157,000 3,322,405 , region4 = , pop4 = ...
started using trench codes in the spring of 1917, evolving into a book of 4,000 codewords that were changed twice a month, with different codebooks used on different sectors of the front. The French codebreakers were extremely competent at cracking
ciphers In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
but were somewhat inexperienced at cracking codes, which require a slightly different mindset. It took them time to get to the point where they were able to crack the German codes in a timely fashion.


U.S. troops

The Americans were relative newcomers to cryptography when they entered the war, but they did have their star players. One was
Parker Hitt Parker may refer to: Persons * Parker (given name) * Parker (surname) Places Place names in the United States *Parker, Arizona *Parker, Colorado *Parker, Florida *Parker, Idaho *Parker, Kansas *Parker, Missouri *Parker, North Carolina *Parker, Pe ...
, b. 1878, who before the war had been an
Army Signal Corps The United States Army Signal Corps (USASC) is a branch of the United States Army that creates and manages communications and information systems for the command and control of combined arms forces. It was established in 1860, the brainchild of Ma ...
instructor. He was one of the first to try to bring
US Army The United States Army (USA) is the land service branch of the United States Armed Forces. It is one of the eight U.S. uniformed services, and is designated as the Army of the United States in the U.S. Constitution.Article II, section 2, cla ...
cryptology into the 20th century, publishing an influential short work on the subject in 1915 called the ''Manual for the solution of military ciphers'', Publication date 1916, available at https://archive.org/details/manualforsolutio00hittrich. He was assigned to France in an administrative role, but his advice was eagerly sought by colleagues working in operational cryptology. Another Signal Corps officer who would make his mark on cryptology was
Joseph Mauborgne Joseph Oswald Mauborgne (February 26, 1881 – June 7, 1971) co-invented the one-time pad with Gilbert Vernam of Bell Labs. In 1914 he published the first recorded solution of the Playfair cipher. Mauborgne became a Major General in the U ...
, who in 1914, as a
first lieutenant First lieutenant is a commissioned officer military rank in many armed forces; in some forces, it is an appointment. The rank of lieutenant has different meanings in different military formations, but in most forces it is sub-divided into a s ...
, had been the first to publish a solution to the
Playfair cipher The Playfair cipher or Playfair square or Wheatstone–Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution cipher. The scheme was invented in 1854 by Charles Wheatstone, but bears the name of ...
. When the Americans began moving up to the front in numbers in early 1918, they adopted trench codes and became very competent at their construction, with a
Captain Captain is a title, an appellative for the commanding officer of a military unit; the supreme leader of a navy ship, merchant ship, aeroplane, spacecraft, or other vessel; or the commander of a port, fire or police department, election precinct, e ...
Howard R. Barnes eventually learning to produce them at a rate that surprised British colleagues. The Americans adopted a series of codes named after rivers, beginning with "Potomac". They learned to print the codebooks on paper that burned easily and degraded quickly after a few weeks, when the codes would presumably be obsolete, while using a font that was easy to read under trench conditions.


Communications discipline

American code makers were often frustrated by the inability or refusal of combat units to use the codes—or worse, to use them properly. A soldier engaged in combat doesn't always feel the need to do things "by the book" even when there are very good reasons to do so, and generals on the front line felt that they had other things to worry about. Lt. Col. Frank Moorman, reviewing U.S wireless intelligence in 1920. wrote:
That will be the real problem for the future, to make the men at the front realize the importance of handling codes carefully and observing "foolish" little details that the code man insists on. They cannot see the need of it and they do not want to do it. They will do anything they can to get out of it. My idea would be to hang a few of the offenders. This would not only get rid of some but would discourage the development of others. It would be a saving of lives to do it. It is a sacrifice of American lives to unnecessarily assist the enemy in the solution of our code.
The
British British may refer to: Peoples, culture, and language * British people, nationals or natives of the United Kingdom, British Overseas Territories, and Crown Dependencies. ** Britishness, the British identity and common culture * British English, ...
and French were already familiar with such problems in "communications discipline". They hadn't completely solved the problems either, but they had at least managed to get it through the heads of most of their signalmen that if they didn't have time to properly encrypt a message, they shouldn't bother trying; send the message unencrypted, or "in the clear". A partially or badly encrypted message could undermine a cipher or code system, sometimes completely, which made an unencrypted message far preferable.


Example

Below are pages from a U.S. Army World War I trench code, an edition designated as "Seneca:" File:Seneca code cover.agr.jpg File:Seneca code instructions.agr.jpg File:Seneca code encoding.agr.jpg File:Seneca code decoding sample.agr.jpg


References

{{DEFAULTSORT:Trench Code History of cryptography Signals intelligence of World War I