Siemens and Halske T52

Siemens and Halske T52

The Siemens and Halske T52, also known as the Geheimfernschreiber ("secret teleprinter"), or Schlüsselfernschreibmaschine (SFM), was a World War II German teleprinter cipher machine. The machine and its traffic were codenamed Sturgeon by British cryptanalysts.

While the Enigma machine was generally used by field units, the T52 was an online machine used by Luftwaffe and German Navy units, which could support the heavy machine, teletypewriter and attendant fixed circuits. It fulfilled a similar role to the Lorenz SZ 40/42 machine in the German Army.

The British cryptanalysts of Bletchley Park codenamed the German teleprinter ciphers Fish, with individual cipher-systems being given further codenames: just as the T52 was called "Sturgeon", the Lorenz machine was codenamed Tunny.

Operation

The teleprinters of the day emitted each character as five parallel bits on five lines, typically encoded in the Baudot code or something similar. The T52 had ten pinwheels, which were stepped in a complex nonlinear way, based in later models on their positions from various delays in the past, but in such a way that they could never stall. Each of the five plaintext bits was then XORed with the XOR sum of 3 taps from the pinwheels, and then cyclically adjacent pairs of plaintext bits were swapped or not, according to XOR sums of three (different) output bits. The numbers of pins on all the wheels were coprime, and the triplets of bits that controlled each XOR or swap were selectable through a plugboard.

This produced a much more complex cipher than the Lorenz machine, and also means that the T52 is not just a pseudorandom number generator-and-XOR cipher. For example, if a cipher clerk erred and sent two different messages using exactly the same settings — a "depth of two" in Bletchley jargon — this could be detected statistically but was not immediately and trivially solvable as it would be with the Lorenz.

Models

There were several (mostly incompatible) versions of the T52: the T52a and T52b (which differed only in their electrical noise suppression), T52c, T52d and T52e. While the T52a/b and T52c were cryptologically weak, the last two were more advanced devices; the movement of the wheels was intermittent, the decision on whether or not to advance them being controlled by logic circuits which took as input data from the wheels themselves.

In addition, a number of conceptual flaws (including very subtle ones) had been eliminated. One such flaw was the ability to reset the keystream to a fixed point, which led to key reuse by undisciplined machine operators.

Cryptanalysis

Following the occupation of Denmark and Norway the Germans started to use a teleprinter circuit which ran through Sweden. The Swedes immediately tapped the line, in May 1940, and the mathematician and cryptographer Arne Beurling cracked the two earliest models in two weeks, using just pen and paper. The Swedes then read traffic in the system for most of the war, not only between Berlin and Oslo, but also between Germany and the German forces in Finland, and of course the German embassy in Stockholm.

The British at Bletchley Park later also broke into Sturgeon, although they did not break it as regularly as they broke Enigma or Tunny. This was partly because the T52 was by far the most complex cipher of the three, but also because the Luftwaffe very often retransmitted Sturgeon messages using easier-to-attack (or already broken) ciphers; thus, attacking Sturgeon was not the most economical way to get the plaintext.

The British first detected T52 traffic in summer and autumn of 1942. One link was between Sicily and Libya, codenamed "Sturgeon", and another from the Aegean to Sicily, codenamed "Mackerel". Operators of both links were in the habit of enciphering several messages with the same machine settings, producing large numbers of depths. These depths were analysed by Michael Crum.

ee also

*Sigaba ("United States")
*Typex ("Britain")

References

* Donald W. Davies, "The Siemens and Halske T52e Cipher Machine" (reprinted in "Cryptology: Yesterday, Today and Tomorrow", Artech House, Norwood, 1987)
* Donald W. Davies, "The Early Models of the Siemens and Halske T52 Cipher Machine" (also reprinted in "Cryptology: Yesterday, Today and Tomorrow")
* Donald W. Davies, "New Information on the History of the Siemens and Halske T52 Cipher Machines" (reprinted in "Selections from Cryptologia: History, People, and Technology", Artech House, Norwood, 1998)

External links

* [http://www.quadibloc.com/crypto/te0302.htm John Savard's page on the Geheimfernschreiber]
* [http://www.jproc.ca/crypto/sturg.html Photographs of Sturgeon]
* [http://www.alanturing.net/turing_archive/archive/b/B06/BO6-085.html] Entry for "Sturgeon" in the GC&CS "Cryptographic Dictionary"
* [http://www.rutherfordjournal.org/article010106.html Bletchley Park's Sturgeon, the Fish that Laid No Eggs] at The Rutherford Journal.


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Siemens Geheimschreiber — T52 in Bletchley Park T52D des Imperial War Museum in London Die Siemens und Halske T52, auch „Geheimfernschreiber“, war im …   Deutsch Wikipedia

  • T52 — in Bletchley Park T52D des Imperial War Museum in London …   Deutsch Wikipedia

  • Rotor machine — In cryptography, a rotor machine is an electro mechanical device used for encrypting and decrypting secret messages. Rotor machines were the cryptographic state of the art for a brief but prominent period of history; they were in widespread use… …   Wikipedia

  • Sturgeon — Cette page d’homonymie répertorie les différents sujets et articles partageant un même nom. Sturgeon est le nom de famille de Daniel Sturgeon (1789 – 1878), physicien, banquier et homme politique américain (voir (en) Daniel Sturgeon Nicola… …   Wikipédia en Français

  • List of World War II topics (S) — # S 1 Uranium Committee # S 50 # S mine # S Phone # S. A. Ayer # S. J. Warmington # S.L.A. Marshall # S.S. Doomtrooper # S.S. Pink Star # S?awomir Maciej Bittner # S?kichi Takagi # S?saku Suzuki # Søren Kam # Søren Petersen # S1 Scout Car # SA… …   Wikipedia

  • Fish (cryptography) — For the (Fibonacci Shrinking) stream cipher published in 1993, see FISH (cipher). Fish (sometimes FISH) was the Allied codename for any of several German teleprinter stream ciphers used during World War II [Wolfgang W. Mache, Geheimschreiber (… …   Wikipedia

  • Cryptanalysis of the Lorenz cipher — The Lorenz SZ machines had 12 wheels each with a different number of cams (or pins). Wheel number 1 2 3 4 5 6 7 …   Wikipedia

  • Enigma machine — Military Enigma machine …   Wikipedia

  • Typex — In the history of cryptography, Typex (alternatively, Type X or TypeX) machines were British cipher machines used from 1937. It was an adaptation of the commercial German Enigma with a number of enhancements that greatly increased its security.… …   Wikipedia

  • SIGSALY — exhibit at the National Cryptologic Museum In cryptography, SIGSALY (also known as the X System, Project X, Ciphony I, and the Green Hornet) was a secure speech system used in World War II for the highest level Allied communications. It pioneered …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”