- Siemens and Halske T52
The Siemens and Halske T52, also known as the Geheimfernschreiber ("secret teleprinter"), or Schlüsselfernschreibmaschine (SFM), was a
World War II Germanteleprinter cipher machine. The machine and its traffic were codenamed Sturgeon by Britishcryptanalyst s.While the
Enigma machine was generally used by field units, the T52 was anonline machine used byLuftwaffe and German Navy units, which could support the heavy machine, teletypewriter and attendant fixed circuits. It fulfilled a similar role to theLorenz SZ 40/42 machine in the German Army.The British cryptanalysts of
Bletchley Park codename d the German teleprinter ciphers Fish, with individual cipher-systems being given further codenames: just as the T52 was called "Sturgeon", the Lorenz machine was codenamed Tunny.Operation
The teleprinters of the day emitted each character as five parallel
bit s on five lines, typically encoded in theBaudot code or something similar. The T52 had ten pinwheels, which were stepped in a complexnonlinear way, based in later models on their positions from various delays in the past, but in such a way that they could never stall. Each of the fiveplaintext bits was thenXOR ed with the XOR sum of 3 taps from the pinwheels, and then cyclically adjacent pairs of plaintext bits were swapped or not, according to XOR sums of three (different) outputbit s. The numbers of pins on all the wheels werecoprime , and the triplets of bits that controlled each XOR or swap were selectable through a plugboard.This produced a much more complex cipher than the Lorenz machine, and also means that the T52 is not just a
pseudorandom number generator -and-XOR cipher. For example, if a cipher clerk erred and sent two different messages using exactly the same settings — a "depth of two" in Bletchley jargon — this could be detected statistically but was not immediately and trivially solvable as it would be with the Lorenz.Models
There were several (mostly incompatible) versions of the T52: the T52a and T52b (which differed only in their electrical noise suppression), T52c, T52d and T52e. While the T52a/b and T52c were cryptologically weak, the last two were more advanced devices; the movement of the wheels was intermittent, the decision on whether or not to advance them being controlled by logic circuits which took as input data from the wheels themselves.
In addition, a number of conceptual flaws (including very subtle ones) had been eliminated. One such flaw was the ability to reset the
keystream to a fixed point, which led to key reuse by undisciplined machine operators.Cryptanalysis
Following the occupation of
Denmark andNorway the Germans started to use a teleprinter circuit which ran throughSweden . The Swedes immediately tapped the line, in May1940 , and themathematician andcryptographer Arne Beurling cracked the two earliest models in two weeks, using just pen and paper. The Swedes then read traffic in the system for most of the war, not only between Berlin and Oslo, but also between Germany and the German forces in Finland, and of course the German embassy inStockholm .The British at Bletchley Park later also broke into Sturgeon, although they did not break it as regularly as they broke Enigma or Tunny. This was partly because the T52 was by far the most complex cipher of the three, but also because the Luftwaffe very often retransmitted Sturgeon messages using easier-to-attack (or already broken) ciphers; thus, attacking Sturgeon was not the most economical way to get the plaintext.
The British first detected T52 traffic in summer and autumn of 1942. One link was between
Sicily andLibya , codenamed "Sturgeon ", and another from the Aegean toSicily , codenamed "Mackerel ". Operators of both links were in the habit of enciphering several messages with the same machine settings, producing large numbers of depths. These depths were analysed by Michael Crum.ee also
*
Sigaba ("United States")
*Typex ("Britain")References
*
Donald W. Davies , "The Siemens and Halske T52e Cipher Machine" (reprinted in "Cryptology: Yesterday, Today and Tomorrow", Artech House, Norwood, 1987)
* Donald W. Davies, "The Early Models of the Siemens and Halske T52 Cipher Machine" (also reprinted in "Cryptology: Yesterday, Today and Tomorrow")
* Donald W. Davies, "New Information on the History of the Siemens and Halske T52 Cipher Machines" (reprinted in "Selections from Cryptologia: History, People, and Technology", Artech House, Norwood, 1998)External links
* [http://www.quadibloc.com/crypto/te0302.htm John Savard's page on the Geheimfernschreiber]
* [http://www.jproc.ca/crypto/sturg.html Photographs of Sturgeon]
* [http://www.alanturing.net/turing_archive/archive/b/B06/BO6-085.html] Entry for "Sturgeon" in theGC&CS "Cryptographic Dictionary"
* [http://www.rutherfordjournal.org/article010106.html Bletchley Park's Sturgeon, the Fish that Laid No Eggs] at The Rutherford Journal.
Wikimedia Foundation. 2010.