Fish (cryptography)

For the stream cipher published in 1993, see FISH (cipher).
German prisoners prepare the "Russian Fish" for loading and shipment to England.[1]

Fish (sometimes FISH) was the UK's GC&CS Bletchley Park codename for any of several German teleprinter stream ciphers used during World War II.[2][3][4] Enciphered teleprinter traffic was used between German High Command and Army Group commanders in the field, so its intelligence value (Ultra) was of the highest strategic value to the Allies.[5] This traffic normally passed over landlines, but as German forces extended their geographic reach beyond western Europe, they had to resort to wireless transmission.[6]

History

In June 1941, the British "Y" wireless intercept stations, as well as receiving Enigma-enciphered Morse code traffic, started to receive non-Morse traffic which was initially called NoMo.[7] NoMo1 was a German army link between Berlin and Athens, and NoMo2 a temporary air force link between Berlin and Königsberg. The parallel Enigma-enciphered link to NoMo2, which was being read by Government Code and Cypher School at Bletchley Park, revealed that the Germans called the wireless teleprinter transmission systems "Sägefisch" (sawfish), so the name "Fish" was adopted for this traffic.[8] The enciphering/deciphering equipment was called a Geheimschreiber (secret writer) which, like Enigma, used a symmetrical substitution alphabet. The teleprinter code used was the International Telegraph Alphabet No. 2 (ITA2)—Murray's modification of the 5-bit Baudot code.

When the Germans invaded Russia, during World War II, they began to use a new type of enciphered transmission between central headquarters and headquarters in the field. The transmissions were known as Fish at Bletchley Park. The German army used Fish for communications between the highest authorities in Berlin and the high-ranking officials of the German Army on the field. The Fish traffic which the personnel at Bletchley Park intercepted, contained discussions, orders, situation reports and many more details about the intentions of the German Army. However, these transmissions were so challenging to decrypt that even with the assistance of decryption machines, such as Colossus, the messages could not be read until several days later.[9] “Vital intelligence was obtained about Hitler’s intentions in the run up to D-Day 1944.”[10]

Traffic code names

Tunny

The NoMo1 link was initially named Tunny, a name which went on to be used both for the Lorenz SZ40/42 machines and for the Bletchley Park analogues of them. The NoMo1 link was subsequently renamed Codfish.[11] A large number of Tunny links were monitored by the Y-station at Knockholt and given names of fish. Most of these were between the Oberkommando der Wehrmacht (German High Command, OKW) in Berlin and German army commands throughout occupied Europe. Cryptanalysis of the Lorenz cipher at Bletchley Park, assisted initially by a machine called Heath Robinson and later by the Colossus computers yielded a great deal of valuable high-level intelligence.

Bletchley Park names of Tunny links[12]
Name Between
Bream Berlin Rome
Herring Rome Tunis
Jellyfish Berlin Paris
Grilse Berlin La Roche
Mullet Berlin Oslo
Turbot Berlin Copenhagen
Dace Berlin Königsberg
Whiting Königsberg Riga
Perch Königsberg Central Belarusse
Squid Königsberg N Ukraine
Octopus Königsberg E Ukraine
Stickleback Königsberg S Ukraine
Smelt E Ukraine S Ukraine
Grayling Königsberg Belgrade
Tarpon Berlin Bucharest
Gurnard Berlin Belgrade
Chubb Belgrade Salonica
Flounder Salonika Rhodes
Codfish Berlin Salonika

Tunny decrypts provided high-grade intelligence in an unprecedented quality. Walter Jacobs, a US Army codebreaker who worked at Bletchley Park, wrote in an official report on the operation to break Tunny that in March 1945 alone 'upward of five million letters of current transmission, containing intelligence of the highest order, were deciphered'.[13]

Sturgeon

This was the name given to traffic encoded with the Siemens and Halske T52 Geheimschreiber.[14][15] In May 1940, after the German invasion of Norway, the Swedish mathematician and cryptographer Arne Beurling used traffic intercepted from telegraph lines that passed through Sweden to break this cipher.[16] Although Bletchley Park eventually diagnosed and broke Sturgeon, the relatively low value of the intelligence gained, compared to the effort involved, meant that they did not read much of its traffic.

Thrasher

This was the name used for traffic enciphered on a Geheimschreiber that was probably the Siemens T43 one-time tape machine. This was used only on a few circuits, in the later stages of the war and was diagnosed at Bletchley Park, but considered to be unbreakable.

List of senior involved staff at Bletchley Park

Including both executives and cryptographers on FISH (Tunny) in the Testery.

See also

Notes

  1. "The Ultra Americans: The U.S. Role in Breaking the Nazi Codes: Thomas Parrish: 9780812830729: Amazon.com: Books".
  2. Mache 1986, pp. 230–242
  3. Deavours & Kruh, pp. 243–247
  4. Mache 1989, pp. 97–117
  5. Copeland 2006, p. 47
  6. Lewin 2001, p. 130
  7. Copeland 2006, p. 338
  8. Gannon 2006, p. 102
  9. F.H. Hinsley and Alan Stripp (eds.) Code Breakers: The Inside Story of Bletchley Park, Oxford University Press, 1993.
  10. "Professor Bill Tutte: Mathematician who, as a Bletchley Park codebreaker, gained access to the ciphers of the German Army High Command". The Times.
  11. Gannon 2006, p. 170
  12. Copeland 2006, p. 41
  13. S. Wylie, Breaking Tunny and the birth of Colossus, Action This Day (eds. M. Smith and R. Erskine), Bantam Press, London, 2001, pp. 317-341.
  14. Weierud 2006, pp. 307–327
  15. Smith 2006, p. 35
  16. McKay 2006, pp. 328–333

References

This article is issued from Wikipedia - version of the Thursday, April 14, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.