Home Page C-36 Home Page |
4.1 Historical backgroundAfter Germany commenced the invasion of Poland, France and England (Poland allies) declared war on Germany on September 3, 1939. If we put aside the Norwegian campaign, however, each camp remains quietly behind its own defenses: France and England behind the Maginot Line and the Germans behind the Siegfried Line. During this "calm" period (the Phony War, the "drôle de guerre" in French), rearmament accelerates. The German offensive began on May 10, 1940. After a succession of retreats by the British, French, and Belgian armies, the Germans conquered the north of France. Pétain's government accepted defeat on June 22 and signed an armistice with the Germans. The British Army, which took refuge near Dunkirk, managed to escape to return to England thanks to an improvised armada (Operation Dynamo). 4.2 French encryption – The late entry into service of the C-364.2.1 The beginning of the war – The C-36 is absentAt the start of World War II, the French Army was equipped with a multitude of encryption methods (Ribardeau-Dumas 1976, Bouchaudy 2019). At the highest level (secretary of war, army and army corps), the B-211 machine reigned supreme. At the level of the army, the manual diagonal transposition system SD23 [1] (derived from a system that already existed during the 1st World War) served as a replacement and back-up system for the B-211. There was also the superenciphered five-digit RA code. At the level of the army corps and divisions, a superenciphered four-digit code was used. Version 69 was put into service on March 1, 1939 and replaced code 68. In the small echelons (battalions, regiments), the three-digit FC series code was used. The SHD archives from the start of the war (1939 until April 1940) never mention the C-36. Conversely, the B-211 or other means of encryption are mentioned several times. It is certain that the French Army at this time was equipped with the C-36. There was arguably not enough of them for operational use, and the existing ones were in reserve for later deployment.
Footnote: 4.2.2 The French campaign – The C-36 is used in theaters of warShortly before the Battle of France, the C-36 was put into service. A document from March 1940 specifies this upcoming entry into service (SHD-32N431 1940): IIIrd Army - Staff - 2e Bureau [1] - SECRET - QG [2], March 1940. Memorandum I - By DM n ° 8.15.802 - CH/EMA dated March 13, 1940, the ministry has decided to put into service: 1) The C-36 type cipher machine (temporarily in the EM of CA, DI, ID, and AD) [3]. 2) The JD series code for small unit use, which will replace the FC series code currently in service. II - The delivery of these machines and codes to the various large army units occupying a sector will be made directly to the headquarters of each army corps by the Bureau du Chiffre of the IIIrd Army. III - With regard to the large units in reserve of GQG [4] of army corps or army, the distribution will take place, because of their dispersion, at the Bureau du Chiffre of the IIIrd Army on Saturday March 30, 1940; the addressees of the present note will be good enough to take all necessary measures to send their cipher officer or his replacement on the day indicated to take delivery of the material in question. It is indicated that the weight of the material to be transported does not exceed 20 kg [5]. Army General CONDE, commanding the 3rd Army, PO [6] the Chief of Staff. Addressees: The General Cdt[7] the 21e CA, the General Cdt the 6e ID, the General Cdt the 42e ID, the General Cdt the 6e DIC [8], the General Cdt the 20e ID.Another document dated April 1 specifies that the units that have been equipped with the C36 and associated documents must wait for an order from GHQ, which will specify the day from which it must be put into service (cf. 4.3.1). From March, the units are equipped (SHD-GR28N51 1940): Translation of an encrypted telegram received by Army Group N°3 on March 8, 1940. Sender: ANTINEA [9] - For the cipher officer - Normal operation of the two machines received on March 7.The commissioning of the C-36 took a long time. For units that were not in direct contact with the enemy the commissioning occurred later, for example, in North Africa (SHD-32N329 1940): May 19, 1930 - 84th Infantry Division. Mr. Lieutenant General commanding the Tunisian Fronts - General Staff – 2e Bureau. I have the honor to acknowledge receipt ... of the instruction relating to the commissioning of the C-36 cipher machines …Note: Perhaps the consecutive C-36 deliveries and entry into service were interrupted by the armistice. Perhaps some of the C-36s ordered by the French Army were neither manufactured nor delivered and therefore some of the units may not have been equipped with them. In the air force archives, no document identifies the C-36. Other systems are explicitly mentioned: machine B-211, superenciphered codes AM, J2, codes of condensation and encryption series F ... We can conclude that (until proven otherwise) only the army was provided with the C-36. The navy used (among other encryption systems) the C-37, which was relatively close to the C-36 but used encrypted bigrams. Unlike the American system, the Bureau du Chiffre is separate from the signal service. The following is the procedure for sending a message [10]:
Footnotes:
4.2.3. The use of encryption at the end of the campaignWorld War II has shown that the use of cipher machines represented real progress. Whenever a choice was possible, machines were always used. Accordingly, at Army Group 3 Headquarters, all (or most) of the messages were encrypted using the B-211. From the end of May, the French Army finds itself in great difficulty. The Bureau du Chiffre fears the compromise of its high-level encryption methods, that is, the RA code and the B-211 machines [1],[2]. The General Staff even fears that the enemy could send false encrypted messages. The emergency system, the SD23, is then used as a replacement (SHD-GR28N51). Translation of an encrypted telegram that arrived at Army Group No.3 on May 21, 1940. Sender: ANNIBAL [3] - For Bureau du Chiffre: ... Telegrams transmitted by radio to the GQG and presenting a particular secret will be encrypted in the diagonal 1923 system with the key "Commandant JOUBERT des OUCHES" and is 26 letters long, ID register 18 or 92 [4]. ... Make telegrams of a maximum of 40 groups. Acknowledge receipt of this telegram in the agreed system.As of May 16, Air HQ stops using the B-211. As of June 8, GHQ announces that the SD23 can be used if there is any doubt about the keys to the B-211. From June 9, the Seventh Army requested that they communicate only with the SD23. From June 15, Army Group 4 clarified that its machines were unusable (probably destroyed) and only accepted messages encrypted in SD23 [5]. From May 15, 1940, RA code was only used on wired links and from May 21 it was withdrawn from service; copies of this code were either cremated or returned to the EMA. It was not subsequently used. The B-211 will be profoundly modified (cf. 5.2). Footnotes:
4.3 Use of the machine4.3.1 Equipment – Equipment provided and number of machinesA document dated April 1 specifies the endowments in the ciphering machines for one of the divisions of the 3rd Army (SHD-32N431 1940). The utensils that comprise a C-36 are specified as well as the documents provided such as instructions for use and keying. We also learn that the C-36 is the normal means of encryption in the dialog between a division and its components (divisional units).IIIrd Army - 2e Bureau - EM ... - Bureau du Chiffre - N°xxx [1] - PC [2], April 1, 1940 General Chaulard provisionally commanding the 6th DIC to Mr. Colonel Commander IDC/6. SENDING SLIP - The cipher machine type C-36 N ° 5634 to 35 ... 2 (copies). Each machine includes two n ° 601-1 mechanically cut keys, an ink pads can, an oil can, a pair of tweezers and two spare paper rolls (in addition to the roller in place). - A carrying strap .... 2 (copies). - The instructions for the use of the machine [3] - N° 13311 CH/EMA of January 19, 1937 ... 2 (copies). - Secret notice N ° 5. 15169 CH/EMA of February 21, 1940 concerning the internal secret elements of the machine, the message key and message drafting, copy N° 159 ... 1 (copy). - Instruction N ° 15470 CH / EMA of February 21, 1940 relating to the commissioning of C-36 cipher machines. Copy N° 159 ... 1 (copy). The date of commissioning the type C-36 cipher machine will be indicated later, as well as the positions to be given to the internal secret elements of the machine. The C-36 machine will be the normal process of encryption for the IDC/6 with the DIC and ADC. Code 69 and the 1923 D transposition system should be considered back-up procedures. For its relations with the divisional engineering and infantry regiments and artillery, which so far have no cipher machine, the IDC will continue to use Code 69 as the normal encryption method. The attention of the officer in charge of the Bureau du Chiffre and his replacement will be particularly drawn to instruction n ° 15470 CH/ ... on Chapter III of this instruction (retention of secrecy).Note: we can see that, unlike the M-209, the C-36 does not have a carrying bag. One of the documents specifies that the C-36 number encryption technique is described in a separate manual: Note 32344 CH/FP dated April 29 (SHD-32N431 1940). One would have thought that the encryption of numbers would simply be included in the instructions for use. The following document corresponds to an inventory of C-36s in a division in June 1940 (SHD-32N431 1940): IInd Army - 2e Bureau - ... SECRET - PC, June 1, 1940 ... INVENTORY OF CIPHER MACHINES (Type C-36) Number Holders N° 5-632 EM - DIC N° 5-633 d° N° 5-634 IDC/6 (EM) N° 5-635 d° N° 5-636 ADC/6 (EM) N° 5-637 d° All machines including 2 n ° 601 mechanically cut keys, 1 ink pad can, 1 oil can, 1 pair of tweezers, and 2 spare paper tapes are in perfect working order. Major General CARLES commanding the 6° DIC PO the Chief of Staff.Assuming that this inventory, composed of six machines, is representative of the equipment of a division, we can estimate the number of C-36s in service in June 1940 when the French Army had 100 divisions {4]: 6 x 100 = 600 machines. We must also add several tens or hundreds of machines that were equipping the higher units (army corps and armies). It is also necessary to add several tens or hundreds of machines to constitute reserves. Hence, we arrive at a number close to 1,000 machines. Footnotes:
4.3.2 Preparation of messages – DraftingBefore encrypting a message, the operator mainly modifies it to shorten it. This operation is called drafting (in French, “démarquage”). The drafting of a C-36 message is described in a document of which the following is an excerpt (SHD-1P136 1942): Note on the use of abbreviations for establishing encryption using the C.36 cipher machine - N ° S 2120 CH / FT - April 15, 1940 - GQG – 2e Bureau – Bureau du Chiffre ... Some abbreviations should be known by heart: BTN Bataillon (Battalion) PRA Praticable (Practicable) CAV Cavalerie (Cavalry) RAS Rien à signaler (Nothing to signal) DIR Direction (Direction) RCN Reconnaître (Recognize) ENI Ennemi (Enemy) REN Renseigner sur (Inquire about) ESC Escadron (Squadron) RGT Régiment (Regiment) GAU Gauche (Left) RIV Rivière (River) HEU Heure (Hour) ROU Route (Route) KLM Kilomètre (Kilometer) SIG Signaler (Report) MET Mètre (Meter) SOR Sortie (Output) MIT Mitrailleuse STA Station (Station) (Machine gun) TEN Tenir (Resist) NID Nid de résistance TRL Transversale (Transversal) (Resistance nest) ULT Ultérieurement (Subsequently) OFI Officier (Officer) VIL Village (Village) PAT Patrouille (Patrol) PEL Peloton (Platoon) ... It is also advisable to use the usual abbreviations, such as CIE Compagnie (Company) OCT Octobre (October) ST Saint (Saint) ... Example: For the day of December 12, the cavalry corps requests a credit for 10 hours movement on the AMIENS SAINT-JUST-LE-GRAND route. CORPS CAV DEMANDE POUR 12 DEC CREDIT MOV DIX HEU SUR ITI AMIENS ST JUST LE GD CAUTION: "The desire to summarize must not, however lead to a waste of time nor to composing incomprehensible texts" ... VII - A good working method will entail the instructions from the beginning indicating the words and expressions used with the machine C-36 in red pencil on the condensation notebook ...The last paragraph refers to the condensation notebook. This document of approximately one or two pages includes the abbreviations most frequently used in transmissions (Tant). Regardless of this drafting, those who wrote messages used code names to hide the names of units and/or senior officers, among other things. Code names beginning with the letter "A" corresponded to higher units up to army level. Code names beginning with "B" corresponded to the army corps. Code names beginning with "C" corresponded to divisions, and so on. Here are the unit names of the Northeast Front (SHD-10P386 1945) for the period May 5, 1940: AURORE GQG, Commander-in-Chief (General Gamelin) ARLESIENNE GQG reserves: Xth Army (General Altmayer) ANNIBAL Commander-in-Chief of the North-Eastern Front (General Georges) ALOUETTE Army Group n ° 1 (General Billotte) ANGELUS Ist Army (General Blanchard) ANGORA IInd Army (General Huntziger) AMPERE Army Group n ° 2 (General Pretelate) AQUILON IIIrd Army (General Condé) ARCHINARD IVth Army (General Requin) ARCHIDUC Vth Army (General Bourret) ANDROCLES Army Group n ° 3 (General Besson) AMILCAR VIth Army (General Touchon) ARGONAUTE VIIth Army (General Giraud) ATLAS VIIIth Army (General Garchery) ARISTOTE IXth Army (General Corap) 4.3.3 Key distributionThe SHD archives contain several key delivery slips. Here is an example (SHD-32N431 1940): IIIrd Army - General Staff – 2e Bureau - N° 96/2/CH - SECRET - QG, April 20, 1940. The General of the Army CONDE, Commander of the IIIrd Army to the General Commandant the 6° DIC (Staff 2 ° Office – Bureau du chiffre). SENDING SLIP 1° / Table "A" N ° 97/2 CH dated April 18, 1940, relating to the internal secret elements of the C-36 cipher machine valid in the area of the IIIrd Army from April 22, 1940 at midnight …... 3 (copies) 2° / Table "B" N ° 98/2 CH dated April 18, 1940, relating to the starting key of the C-36 cipher machine valid in the area of the IIIrd Army from April 22, 1940 at zero hour ...... 3 (copies) 3° / Exercise telegram N ° 99/2 CH dated April 18, 1940 intended to verify the keying of the cipher machine C-36 ...... 3 (copies) A duplicate of this slip is to be returned as a matter of urgency to the Bureau du Chiffre of the IIIrd Army as an acknowledgment of receipt. Observations: Documents to be distributed to the owners of the C-36 cipher machine. It remains understood that these Tables A and B must be used exclusively in the area of the IIIrd Army. The unit that holds them must incinerate them when it passes into the zone of another army or in the zone dependent on the GQG; in this case, new tables will be given to it by the large unit to which it will report ...As we can see, the keys consisted of at least two parts:
Some slips also mention a Table C, which corresponded to an exercise telegram intended to verify the setting of the key. Other slips do not mention Table C. We can imagine that in this case, it was integrated into Table A. Some slips simply indicate the endowment of an exercise telegram. By inspecting several key delivery slips, the following was deduced: Before the war, the various units received a circular describing the use of a special key, the "ZERO" key, which was intended to be used in the event of the mobilization of troops or when receiving a telegram indicating the setting of the key. It seems that several of these circulars had been updated according to the means available. Indeed, the document (SHD-7N4235 1940) "Introduction to the Zero Key" of January 27, 1938 specifies that it replaces the copy of November 13, 1937, and the latter is to be cremated. The document of January 1938 includes in particular the key setting for large model (B-211) and small model (C.36) machines. The circular specifies that the allocation of small machines (C-36) will begin during 1938 and will continue in the following years. Note: as noted elsewhere, no document (other than this one) refers to the C-36 before it entered service in April 1940. In early 1940 (April to June), a C-36 key was valid inside an army and allowed dialog between its staff and the different army corps and divisions of which it was comprised. It was stipulated that if a division was absorbed by another army, it was to destroy its keys and wait for more keys from its new assignment [1]. The keys were valid from one to several weeks; for example,
The slips encountered in the archives normally only concerned the keys for the C-36 (Tables A and B) intended for a division. Figure 1 (SHD-32N431 1940) shows another type of slip that corresponds to the set of keys used to communicate between the army's EM and its divisions: the C-36 keys but also the superencipherment keys of code 69, the 1923 D transposition keys, and even the substitution tables for the radio service codes. It can be deduced that there were at least three C-36s for each army EM. At the end of the campaign in France, the army crumbled and the security breaches resulting, in particular, from the supposed capture of machines and documents from the Bureau du Chiffre concerned the authorities, and the security measures were consequently reinforced (SHD-GR28N51): Translation of an encrypted telegram that arrived at Army Group No.3 on May 23, 1940. Sender: ANNIBAL - For the Bureau du Chiffre: 1) Needed to strengthen the security of the encryption in C.36. 2) Arrange for daily change of the “calage” letter [2],[3]. 3) Send the list of “calage” letters under the same conditions as the sending of keys ... Telegram forwarded to ARGONAUTE AND AMILCAR [4] … Footnotes:
4.3.4 Indicator methodIn one of the ARCSI bulletins (ARCSI 1978), an extremely interesting document dated May 7, 1940 was uncovered. It was a letter from a cipher officer (his name does not appear) criticizing the indicator method used in 1940 for cipher machines. To conclude, the officer proposed a new method. However, in his review, he almost completely described the current method. Let us give the floor to this officer: ... You have received my suggestions in such a welcoming manner that I take the liberty of submitting another to you. It concerns substitution alphabets for machines. Currently, the columns are the same for the alphabets of the B 211 and C 36. Only the column headings change. Therefore, the key groups for the two machines correspond, that is, they give a key possible for use with both machines (these two keys are also different from each other). Now, in fact, it happens that the armies, sending a telegram circular to the CA and DI who are dependent on them, use the C 36 machine for this purpose. The CA cipher clerk receiving this telegram is therefore obliged to 1°/ take out the large machine documents 2°/ take out its key 3°/ put it on the machine 4°/ try a few groups Then, faced with a failure, repeat the same process with the small machine, thus, representing a waste of time, which seems unnecessary and can easily be avoided. What were we looking for by endowing the two systems with similar characteristics? To furnish the telegrams deriving from the two machines with an identical appearance. But there is a danger. Due to the multiplicity of telegrams and commissioning the small machine FOR ALL armies, in the key groups, a letter from the first key group will have three possible letters corresponding to the second group, which will always be the same. Hence, if an enemy cryptanalyst is unable to comprehend the letters chosen by the operator, he can, at least, - Recognize the location of the two key groups, - Reconstitute the replacement alphabets for all armies ... From this letter, we can deduce a number of things. First, a B-211 or C-36 key is valid for a single army. Second, that only the CAs are equipped with B-211s but not the divisions. Third, that the C-36 equip the EM of armies, CAs, and divisions. We can also deduce that the indicator is made up of two groups (10 letters). The message key derives from a base group, which is a group of five letters that is encrypted the first time with a first substitution alphabet, which gives the first indicator group. The second group is only used for checking; it is the same group encrypted with a second substitution alphabet. As the base group is composed of only five letters, it corresponds directly to a C-36 message key but not to a B-211 key, whose key must indicate the position of the four wheels and the two half-rotors, that is, six letters unless one identical letter configures several wheels or half-rotor. The officer's description tells us that the situation is actually worse: Each letter of the group from which we deduce the key is associated with three letters in the substitution alphabet. Consequently, there are only 10 possible letters (26 ~ 3 x 10) for each letter of the key group. This greatly reduces the key space. For example, for the C-36 we can imagine that for a key table we have ABCDEKLMNO as the column head (i.e., the letters of the key group). A message key should only use these letters, for example, NDKLE. Fortunately, in the archives of the SHD, an unexpected discovery occurred: A complete set of keys for the B-211 dated October 25, 1941, which included an example of packaging (SHD-1P136 1942). This example of a key made it possible to confirm the preceding deductions: There was indeed a basic group of five letters, which was encrypted twice by using a first substitution alphabet for the first indicator group and a second substitution alphabet for the second indicator group. The letters of the substitution alphabets were distributed in 10 columns of two or three letters. The letters ABCDEFGHIK (for the B-211) acted as column heads. The first and last letters of the base group corresponded to the (inverted) position of the two half-rotors. Finally, the last four letters of the basic group corresponded to the position of the four key wheels. Thus, the first letter has two uses: to position a key wheel and the second half-rotor. Remember that the position of the key wheels, which have between 17 and 23 sectors, is marked with a letter between A and Y (J and W being omitted) [1]. In conclusion, not all the possible message keys can be chosen. We also learned that the two indicator groups were the first two groups of the cryptogram. These documents make it possible to completely reconstitute the indicator method used until June 1940, however, they did not state whether this method still applied to the C-36 after this period. Table 3 presents an example reconstructed from the authentic key table from October 1941. For a message encrypted in B-211, suppose the message key is HDBACH (position of the half-rotors: HD; position of the four key wheels: BACH), the base group becomes DBACH, which is encrypted with the two substitute alphabets, and we obtain, for example, the following indicator: GAUOK JZAGR (or NFVBJ HUNCL … ). These two groups are added at the beginning of the cryptogram. The letter from the young officer of May 1940 specifies that the column heads are different in the case of the C-36. Suppose the heads are ABCDEKLMNO for the C-36 for a specific key table. The NDKLE message key becomes (with the same alphabets) SGZLQ MHTEX (or XNHIM ZJDKP … ). As in the case of the B-211, this method of masking the message key does not allow the use of any key for the C-36 because there are only 10 column heads. In the preceding example, the key FPQGQ cannot be used. Table 3: Example of two substitution alphabets used with the 1940 indicator system ------------------------------- : A: B: C: D: E: F: G: H: I: K: column heads B-211 : -: -: -: -: -: -: -: -: -: -: : A: B: C: D: E: K: L: M: N: O: column heads C-36 : -: -: -: -: -: -: -: -: -: - : U: A: O: G: Q: C: L: K: R: W: : V: F: B: N: D: H: I: J: S: T: 1st substitution alphabet : : P: : E: M: Z: : Y: X: : : -: -: -: -: -: -: -: -: -: -: : A: Z: G: J: X: T: E: R: P: Q: : N: U: C: H: P: D: K: L: M: O: 2nd substitution alphabet : Y: V: I: : F: S: : W: Z: : -------------------------------
Footnote: 4.3.5 Other proceduresFrequently, there are memos about security. For example, the note of May 15, 1940 from the Bureau du Chiffre of the 6th DIC (SHD-32N431 1940): May 15, 1940 - Security note - ... In particular with regard to C36 machines, information concerning the packaging, and a fortiori, relating to the making of the keys, should never be placed in the cover of the devices. Another document (SHD-GR28N51 1940) reminds the cipher clerk never to part with their C.36: Army Group N ° 3 - General Staff – 2e Bureau – Bureau du Chiffre - Translation of a ciphered telegram received at GR/3 on May 28, 1940 at 4:40 p.m. - Sender: ARCOLE ... For the cipher officer: Subject: Security. It was reported that in some large units C.36 machines had been lost as a result of devices being left during transport in baggage vans. This way of doing things is absolutely to be avoided. C.36 machines are fitted with straps allowing users to carry them on the shoulder strap. In any case, their owners must not part with them. Telegram sent to interested Army and Army Groups.A document dating from May 1940 informs us how the repair of the machines was planned (SHD-32N329 1940) [1]: C.36 Cryptographs will be repaired: - In the first degree through the care of their holders. - In the second degree by the care of General Cdt of the Tunisian Fronts. Subsequent instructions will fix the authorized first degree repairs. In order to constitute a repair workshop in the first degree, the commanders of large units as owners of the C.36 machines to whom this note is addressed will each designate a qualified non-commissioned officer or master corporal, radio precision mechanic, or watchmaker preferably. The officers in question will be instructed during an internship at the secondary level workshop …
Footnote: 4.3.6 A sample message (one plain text)A typed message (SHD-GR28N51 1940) dated late May 1940 certainly contained a message encrypted in C-36. Indeed, the decryption tape was glued to the back of the message and contained numbers coded in letters. Message N° 238/I. Sender: ARLESIENNE. Addressee: Army group n° 3, 1st Bureau. May 31, 1940, 3.35 p.m. Repetition of telegram no.30-21. Losses of May 29: Officers: 3, Men: 146. Information concerning only CANADIANS, DAPHNIS, DAVOUST, and FALCONNET.Tape coming from the machine glued on the back: REPEAT k DU k WQH k JO k PER k WFW k MAI k OFI k WE kk HOM k WGRN k REN k CONCERNING k ONLY k CANADIAN k DAPHNISLDAVOUT k FALCONET k NO k WPQZ k SUR WO k Remarks:
4.3.7 The point of view of a member of the French Cipher OfficeThis article describes the C-36 and its history and therefore obviously cannot be particularly emotional. But we must not forget that this machine was used in a time of war by men who lived through dramatic moments, some of whom died while undertaking their service. Here are some extracts from the diary of Captain Raoul A. Lemennicier, which recount his memories of war in particular the German breakthrough of May 1940. At that time, he was the head of the Bureau du Chiffre of the 9th Army under the orders of General Corap who endured the full force of the German attack in the Ardennes (Link): (October 1939) … Life is monotonous, work is no less. This period of war is little different from the time of peace. Office hours do not change. Fortunately, my duties require me to carry out inspections in the large units of the army. The repair of the cipher machines obliges me to undertake a few trips to La Ferté sous Jouarre where my boss is located, the Commander Joubert des Ouches (GQG). (May 10, 1940) The quiet period ended on May 10 on the first morning. Nothing foreshadowed the German attack … (May 15) There is no longer any question of transporting the EM of the 9th Army in Chimay in Belgium as the order of operations had planned. In the Bureau du Chiffre the work became overwhelming. Two officers are on duty day and night. It is hardly possible to sleep. Meals are eaten quickly … (May 16) The Germans are in Marles, 15 km west of our PC. In the corridors there is talk of resisting on the spot. The 9th Army has passed since the day before under the orders of General Giraud. All the office managers have destroyed the secret archives. I decided to do the same. All the papers are burned, including documents in reserve. We are fortunate to have a central heating boiler nearby, which allows us to incinerate 200 kg of paper in a short time. The cipher machines are prepared for destruction as soon as the defense of the exits of Vervins kicks in ... Without even having time to prepare luggage, we are ordered to leave immediately, charged with strictly essential equipment (B-211 and C-36 cipher machines, codes, and suitcases) ... At around 4 p.m., we learned that the headquarters of our army was going to move to Bohain ... We had barely identified our room (the girls' school) when the messages to be encrypted and decrypted arrived ... Later I learned that the Germans were already in Guise. So we had crossed their ranks without knowing it. What luck. (May 17) The officers are summoned by the head of the First Bureau, Cdt Rousselet (killed in action that same day). He takes a dozen of them with him, including Velut and Lauzanne. Under his orders, they must ensure the defense of the Wassigny agglomeration where General Giraud and his advanced echelon have withdrawn. The Colonel makes a short speech from which it appears that the situation is hopeless ... Before joining my post, I take care to destroy all the cipher material. With a hammer and a rifle butt, I demolished the B-211s and the C-36 [1]… In the evening, I received a report from Captain Velut in Wassigny. Everything is fine, he told me. With Lauzanne, he continues to encrypt and decrypt messages. They only have one system left without a code, which is also satisfactory [2]. We exchange keys, which will allow us an encrypted correspondence. The night is calm. In the shelter near my PC I can take a few hours of rest. (May 18) At daylight, I received word from Captain Houssay. I have to join the headquarters at 7 am and go to the GQG at La Ferté sous Jouarre to collect new documents from the Bureau du Chiffre. But long before, I was summoned by the Deputy Chief of Staff to decipher messages (machine) received during the night. Decryption is impossible as the material is destroyed ... As soon as I got back to QG, an encrypted message was handed to me. I deciphered it easily. The QG of the 9th Army must immediately move to Catelet 20 km west of Bohain ... A quick glance at the door to the street and I see one of our machine gun cars on fire. The one closest to us continues to fire, but its firing is less intense. A wounded man who dies immediately is transported to the porch of the cafe ... Around 6 p.m. the firing suddenly ceased and heavy footsteps were heard nearby. What's going on? We will soon know. As I walked to the exit with Lt Pochtovick onto the street, I found myself face to face with a German soldier, armed to the teeth, presenting me with the barrel of a machine gun ... I went out into the street where I joined a group of officers who, like me, had just been "taken prisoner." Footnotes:
4.4 German cryptanalysisSeveral TICOM documents point to the failure of the German cryptanalysts. A priori no message encrypted by the C-36 was decrypted by them during this period. Several elements explain this failure. First, the late entry of the machine into service. Then, the almost exclusive use of wire telegraphy in the period preceding the German breakthrough. Finally, the brevity of the campaign starting in May 1940: German cryptanalysts did not have time to develop methods for attacks following the capture of machines or secret documents. The TICOM documents tell us that the Germans discovered the functioning of the C-36 and the B-211 following captures made during the campaign of May 1940 (TICOM I-78 1945, TICOM I-128 1945).
Footnote: References
Web Links
|