ADFGVX cipher
   HOME

TheInfoList



OR:

In
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adv ...
, the ADFGVX cipher was a manually applied field
cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode ...
used by the
Imperial German Army The Imperial German Army (1871–1919), officially referred to as the German Army (german: Deutsches Heer), was the unified ground and air force of the German Empire. It was established in 1871 with the political unification of Germany under the l ...
during
World War I World War I (28 July 1914 11 November 1918), often abbreviated as WWI, was List of wars and anthropogenic disasters by death toll, one of the deadliest global conflicts in history. Belligerents included much of Europe, the Russian Empire, ...
. It was used to transmit messages secretly using
wireless telegraphy Wireless telegraphy or radiotelegraphy is transmission of text messages by radio waves, analogous to electrical telegraphy using cables. Before about 1910, the term ''wireless telegraphy'' was also used for other experimental technologies for ...
. ADFGVX was in fact an extension of an earlier cipher called ADFGX which was first used on 1 March 1918 on the German
Western Front Western Front or West Front may refer to: Military frontiers * Western Front (World War I), a military frontier to the west of Germany *Western Front (World War II), a military frontier to the west of Germany *Western Front (Russian Empire), a maj ...
. ADFGVX was applied from 1 June 1918 on both the Western Front and Eastern Front. Invented by the Germans signal corps officers Lieutenant (1891–1977) and introduced in March 1918 with the designation "Secret Cipher of the Radio Operators 1918" (''Geheimschrift der Funker 1918'', in short ''GedeFu 18''), the cipher was a fractionating
transposition cipher In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (''transposition'') without changing the characters themselves. Transposition ciphers reorder units of plaintext (typically characters or ...
which combined a modified Polybius square with a single columnar transposition. The cipher is named after the six possible letters used in the ciphertext: , , , , and . The letters were chosen deliberately because they are very different from one another in the
Morse code Morse code is a method used in telecommunication to encode text characters as standardized sequences of two different signal durations, called ''dots'' and ''dashes'', or ''dits'' and ''dahs''. Morse code is named after Samuel Morse, one ...
. That reduced the possibility of operator error. Nebel designed the cipher to provide an army on the move with encryption that was more convenient than trench codes but was still secure. In fact, the Germans believed the ADFGVX cipher was unbreakable.


Operation

For the
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
message, "Attack at once", a secret mixed alphabet is first filled into a 5 × 5 Polybius square: and have been combined to make the alphabet fit into a 5 × 5 grid. By using the square, the message is converted to fractionated form: : The first letter of each ciphertext pair is the row, and the second ciphertext letter is the column, of the plaintext letter in the grid (''e.g.'', "AF" means "row A, column F, in the grid"). Next, the fractionated message is subject to a columnar transposition. The message is written in rows under a transposition key (here "CARGO"): C A R G O _________ A F A D A D A F G F D X A F A D D F F X G F X F Next, the letters are sorted alphabetically in the transposition key (changing CARGO to ACGOR) by rearranging the columns beneath the letters along with the letters themselves: A C G O R _________ F A D A A A D G F F X D F A A D D F X F F G F X Then, it is read off in columns, in keyword order, which yields the
ciphertext In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintex ...
: FAXDF ADDDG DGFFF AFAX AFAFX In practice, the transposition keys were about two dozen characters long. Long messages sent in the ADFGX cipher were broken into sets of messages of different and irregular lengths to make it invulnerable to multiple anagramming. Both the transposition keys and the fractionation keys were changed daily.


ADFGVX

In June 1918, an additional letter, , was added to the cipher. That expanded the grid to 6 × 6, allowing 36 characters to be used. That allowed the full alphabet (instead of combining and ) and the digits from to . That mainly had the effect of considerably shortening messages containing many numbers. The cipher is based on the 6 letters ADFGVX. In the following example the alphabet is coded with the Dutch codeword ''. This results in the alphabet: NACHTBOMEWRPDFGIJKLQSUVXYZ. Digits are inserted after the first occurrences of the letters A (1), B (2) to J (0). This creates the table below with the letters ADFGVX as column headings and row identifiers: The text 'attack at 1200am' translates to this: Then, a new table is created with a key as a heading. Let's use 'PRIVACY' as a key. Usually much longer keys or even phrases were used. The columns are sorted alphabetically, based on the keyword, and the table changes to this: Then, appending the columns to each other results in this ciphertext:
DGDD DAGD DGAF ADDF DADV DVFA ADVX With the keyword, the columns can be reconstructed and placed in the correct order. When using the original table containing the secret alphabet, the text can be deciphered. This cipher might be modified by transposing the rows as well as the columns, creating a harder but improved cipher.


Cryptanalysis

ADFGVX was cryptanalysed by
French French (french: français(e), link=no) may refer to: * Something of, from, or related to France ** French language, which originated in France, and its various dialects and accents ** French people, a nation and ethnic group identified with Franc ...
Army
Lieutenant A lieutenant ( , ; abbreviated Lt., Lt, LT, Lieut and similar) is a commissioned officer rank in the armed forces of many nations. The meaning of lieutenant differs in different militaries (see comparative military ranks), but it is often ...
Georges Painvin Georges Jean Painvin (; 28 January 1886 – 21 January 1980) was a French geologist and industrialist, best known as the cryptanalyst who broke the ADFGX/ADFGVX cipher used by the Germans during the First World War. Early life Painvin was born ...
, and the cipher was broken in early June 1918. The work was exceptionally difficult by the standards of classical cryptography, and Painvin became physically ill during it. His method of solution relied on finding messages with stereotyped beginnings, which would fractionate them and then form similar patterns in the positions in the ciphertext that had corresponded to column headings in the transposition table. (Considerable statistical analysis was required after that step had been reached, all done by hand.) It was thus effective only during times of very high traffic, but that was also when the most important messages were sent. However, that was not the only trick that Painvin used to crack the ADFGX cipher. He also used repeating sections of ciphertext to derive information about the likely length of the key that was being used. Where the key was an even number of letters in length he knew, by the way the message was enciphered, that each column consisted entirely of letter coordinates taken from the top of the Polybius Square or from the left of the Square, not a mixture of the two. Also, after substitution but before transposition, the columns would alternately consist entirely of "top" and "side" letters. One of the characteristics of frequency analysis of letters is that while the distributions of individual letters may vary widely from the norm, the law of averages dictates that groups of letters vary less. With the ADFGX cipher, each "side" letter or "top" letter is associated with five plaintext letters. In the example above, the "side" letter "D" is associated with the plaintext letters "d h o z k", and the "top" letter "D" is associated with the plaintext letters "t h f j r". Since the two groups of five letters have different cumulative frequency distributions, a frequency analysis of the "D" letter in columns consisting of "side" letters has a distinctively different result from those of the "D" letter in columns consisting of "top" letters. That trick allowed Painvin to guess which columns consisted of "side" letters and which columns consisted of "top" letters. He could then pair them up and perform a frequency analysis on the pairings to see if the pairings were only noise or corresponding to plaintext letters. Once he had the proper pairings, he could then use frequency analysis to figure out the actual plaintext letters. The result was still transposed, but to unscramble a simple transposition was all that he still had to do. Once he determined the transposition scheme for one message, he would then be able to crack any other message that was enciphered with the same transposition key. Painvin broke the ADFGX cipher in April 1918, a few weeks after the Germans launched their Spring Offensive. As a direct result, the French army discovered where
Erich Ludendorff Erich Friedrich Wilhelm Ludendorff (9 April 1865 – 20 December 1937) was a German general, politician and military theorist. He achieved fame during World War I for his central role in the German victories at Liège and Tannenberg in 1914. ...
intended to attack. The French concentrated their forces at that point, which has been claimed to have stopped the Spring Offensive. However, the claim that Painvin's breaking of the ADFGX cipher stopped the German spring offensive of 1918, while frequently made,"Painvin's manna had saved the French", wrote David Kahn, in ''The Codebreakers - The Story of Secret Writing'', 1967, , Chapter 9. Kahn also details the role that Painvin's decryption of German messages played in the French response to Operation Gneisenau. is disputed by some. In his 2002 review of
Sophie de Lastours Sophie is a version of the female given name Sophia, meaning "wise". People with the name Born in the Middle Ages * Sophie, Countess of Bar (c. 1004 or 1018–1093), sovereign Countess of Bar and lady of Mousson * Sophie of Thuringia, Duchess o ...
' book on the subject, ''La France gagne la guerre des codes secrets 1914-1918'', in the
Journal of Intelligence History The ''Journal of Intelligence History'' is a biannual peer-reviewed academic journal covering the history of espionage. It was established in 2001 and is the official journal of the International Intelligence History Association. The journal is p ...
,
''Journal of Intelligence History'': volume 2, Number 2, Winter 2002)
Hilmar-Detlef Brückner stated:
Regrettably, Sophie de Lastours subscribes to the traditional French view that the solving of a German ADFGVX-telegram by Painvin at the beginning of June 1918 was decisive for the Allied victory in the First World War because it gave timely warning of a forthcoming German offensive meant to reach Paris and to inflict a critical defeat on the Allies. However, it has been known for many years, that the German ''Gneisenau'' attack of 11 June was staged to induce the French High Command to rush in reserves from the area up north, where the Germans intended to attack later on. Its aim had to be grossly exaggerated, which the German High Command did by spreading rumors that the attack was heading for Paris and beyond; the disinformation was effective and apparently still is. However, the German offensive was not successful because the French had enough reserves at hand to stop the assault and so did not need to bring in additional reinforcements. Moreover, it is usually overlooked that the basic version of the ADFGVX cipher had been created especially for the German Spring Offensive in 1918, meant to deal the Allies a devastating blow. It was hoped that the cipher ADFGX would protect German communications against Allied cryptographers during the assault, which happened. Telegrams in ADFGX appeared for the first time on 5 March, and the German attack started on 21 March. When Painvin presented his first solution of the code on 5 April, the German offensive had already petered out.
The ADFGX and ADFGVX ciphers are now regarded as insecure.


References


Sources

* Childs, J. Rives, ''General Solution of the ADFGVX Cipher System'', Aegean Park Press, . * Friedman, William F. ''Military Cryptanalysis, Part IV: Transposition and Fractionating Systems''. Laguna Hills, California: Aegean Park Press, 1992.


External links


A JavaScript implementation of the ADFGVX cipherA C implementation of the ADFGVX cipher
{{Cryptography navbox, classical Classical ciphers