Home Page The Red Home Page
|
Genuine Red cipher messagesWhen studying cipher machines, the ideal is to have access to an authentic machine and to encrypt a message and decrypt it using the algorithm that reproduces the machine's operation. This approach allows us to prove that we truly understand how the machine works. Failing that, if we find authentic encrypted messages, we can verify whether the algorithm we have applies. There may be some differences that come from the machine and that we cannot necessarily deduce cryptographically, for example, the actual wiring of a rotor due to the twist effect. In the case of the Red machine, we have the American analog machine and the Japanese Orange machine, which is very similar. But these machines are in museums and we don't have access to them. Fortunately, the NSA (see reference) published a document containing two authentic messages encrypted using the Red machine dating from 1937. Finding the key was not difficult, because the plaintext is provided and part of the key is also provided. I was thus able to validate my simulator and ultimately I was able to decipher the two cryptograms. First MessageThe first pages of the NSA document are devoted to the first message. First, we have the English translation of the message, and then a document that clearly comes from American cryptanalysts. It contains the cryptogram and its decryption. Here is an excerpt from the document and some accompanying comments: ======================================================================== 31, 34, 5, 11, 12, 20 1/2 SOURCE: NAVY (41) 4 JAN 1937 S 80 SCDE BLN 137 4 2005 TAT JG GAIMUDAIJIN TOKIO 57968 29 31 2 34 2 2 3 2 XTTX | YD | NMULINKENSONTJEOO | NOGMK | SUVFNOF | JYGKXN XYVE | LE | NITIDOKUKY--TEIKA | NKEIN | ISIYOOS | ERUKIK | | | | | NDZO | NI | PHRXVONIWAOOIOOAI | WJKNP | IUAOLHZ | BKCBPU AITO | KU | BETUYOOHOOWOSONOM | AMAKE | ISOKUSI | YOOSUR ... AAOD | TV | ORN AWAS | IT | ASI - MUSHAKOJI AR HI SPEED ========================================================================Comments: The message appears as a sequence of pairs of lines. For each pair, the top line corresponds to the cryptogram and the bottom line to its plaintext translation (but in Japanese :-(. Each line is 41 characters long. 41 corresponds to the period. It is indicated in parentheses at the beginning of the second line. Each line is divided into several parts which correspond to the presence of the jumps which result from the breakwheel. It is consistent with the PINs that were removed and are indicated at the top of the document (31, 34, 5, 11, 12, 20). These values were written by hand. In the line above the text, there are very poorly written numbers. We can guess 29, 31, 34, … Perhaps they correspond to the position of the breakwheel? My program finds slightly different values (see below). In the text accompanying the message, two important words are present:
Here is the beginning of the decryption of the first message (the first line) using my simulator in debug mode (-D option). The breakwheel advancements appear easily at the following positions: 31, 34, 5, 11, 12, 20. 1: (28, 5, 1) Crypto: X(23)-> Input: 5 Twent X => After HRCON: G ( 5) Crypto: X (23) 2: (29, 6, 2) Crypto: T(19)-> Input: 13 Twent T => After HRCON: R (14) Crypto: Y (24) 3: (30, 1, 3) Crypto: T(19)-> Input: 13 Twent T => After HRCON: S (15) Crypto: V (21) 4: (31, 2, 4) Crypto: X(23)-> Input: 5 Twent X => After HRCON: K ( 8) Crypto: E ( 4) 5: (33, 4, 6) Crypto: Y(24)-> Input: 14 Twent Y => After HRCON: X (19) Crypto: L (11) 6: (34, 5, 7) Crypto: D( 3)-> Input: 2 Twent D => After HRCON: K ( 8) Crypto: E ( 4) 7: (36, 1, 9) Crypto: N(13)-> Input: 5 Sixes N => After HRVOY: U ( 5) Crypto: N (13) 8: (37, 2,10) Crypto: M(12)-> Input: 1 Twent M => After HRCON: M (10) Crypto: I ( 8) 9: (38, 3,11) Crypto: U(20)-> Input: 3 Twent U => After HRCON: Q (13) Crypto: T (19) 10: (39, 4,12) Crypto: L(11)-> Input: 19 Twent L => After HRCON: M (10) Crypto: I ( 8) 11: (40, 5,13) Crypto: I( 8)-> Input: 10 Twent I => After HRCON: C ( 2) Crypto: D ( 3) 12: (41, 6,14) Crypto: N(13)-> Input: 5 Sixes N => After HRVOY: O ( 4) Crypto: O (14) 13: (42, 1,15) Crypto: K(10)-> Input: 1 Sixes K => After HRVOY: A ( 1) Crypto: K (10) 14: (43, 2,16) Crypto: E( 4)-> Input: 8 Twent E => After HRCON: D ( 3) Crypto: U (20) 15: (44, 3,17) Crypto: N(13)-> Input: 5 Sixes N => After HRVOY: A ( 1) Crypto: K (10) 16: (45, 4,18) Crypto: S(18)-> Input: 17 Twent S => After HRCON: R (14) Crypto: Y (24) 17: (46, 5,19) Crypto: O(14)-> Input: 4 Sixes O => After HRVOY: E ( 2) Crypto: A ( 0) 18: (47, 6,20) Crypto: N(13)-> Input: 5 Sixes N => After HRVOY: O ( 4) Crypto: O (14) 19: ( 1, 1, 1) Crypto: T(19)-> Input: 13 Twent T => After HRCON: Q (13) Crypto: T (19) 20: ( 2, 2, 2) Crypto: J( 9)-> Input: 7 Twent J => After HRCON: K ( 8) Crypto: E ( 4) 21: ( 3, 3, 3) Crypto: E( 4)-> Input: 8 Twent E => After HRCON: M (10) Crypto: I ( 8) 22: ( 4, 4, 4) Crypto: O(14)-> Input: 4 Sixes O => After HRVOY: A ( 1) Crypto: K (10) 23: ( 5, 5, 5) Crypto: O(14)-> Input: 4 Sixes O => After HRVOY: E ( 2) Crypto: A ( 0) 24: ( 7, 1, 7) Crypto: N(13)-> Input: 5 Sixes N => After HRVOY: U ( 5) Crypto: N (13) 25: ( 8, 2, 8) Crypto: C( 2)-> Input: 6 Sixes C => After HRVOY: A ( 1) Crypto: K (10) 26: ( 9, 3, 9) Crypto: G( 6)-> Input: 20 Twent G => After HRCON: K ( 8) Crypto: E ( 4) 27: (10, 4,10) Crypto: M(12)-> Input: 1 Twent M => After HRCON: M (10) Crypto: I ( 8) 28: (11, 5,11) Crypto: K(10)-> Input: 1 Sixes K => After HRVOY: U ( 5) Crypto: N (13) 29: (14, 2,14) Crypto: S(18)-> Input: 17 Twent S => After HRCON: M (10) Crypto: I ( 8) 30: (15, 3,15) Crypto: U(20)-> Input: 3 Twent U => After HRCON: V (17) Crypto: S (18) 31: (16, 4,16) Crypto: V(21)-> Input: 15 Twent V => After HRCON: M (10) Crypto: I ( 8) 32: (17, 5,17) Crypto: F( 5)-> Input: 18 Twent F => After HRCON: R (14) Crypto: Y (24) 33: (18, 6,18) Crypto: N(13)-> Input: 5 Sixes N => After HRVOY: O ( 4) Crypto: O (14) 34: (19, 1,19) Crypto: O(14)-> Input: 4 Sixes O => After HRVOY: O ( 4) Crypto: O (14) 35: (20, 2,20) Crypto: F( 5)-> Input: 18 Twent F => After HRCON: V (17) Crypto: S (18) 36: (22, 4, 2) Crypto: J( 9)-> Input: 7 Twent J => After HRCON: K ( 8) Crypto: E ( 4) 37: (23, 5, 3) Crypto: Y(24)-> Input: 14 Twent Y => After HRCON: T (16) Crypto: R (17) 38: (24, 6, 4) Crypto: G( 6)-> Input: 20 Twent G => After HRCON: D ( 3) Crypto: U (20) 39: (25, 1, 5) Crypto: K(10)-> Input: 1 Sixes K => After HRVOY: A ( 1) Crypto: K (10) 40: (26, 2, 6) Crypto: X(23)-> Input: 5 Twent X => After HRCON: M (10) Crypto: I ( 8) 41: (27, 3, 7) Crypto: N(13)-> Input: 5 Sixes N => After HRVOY: A ( 1) Crypto: K (10) Here is the cryptogram I reconstructed (there may be some errors). XTTXY DNMUL INKEN SONTJ EOONC GMKSU VFNOF JYGKXN NDZON IPHRX VCNIW ACCIO OAIWJ KNPIU AOLHZ BKCBPU QOCRW KOAOO YKTWN UFGRA ATZCA MOABA OOMCO WCRCNK DWKCP WJFWZ SJNSW KWRJK JIWQD EAXOC YVAAW BONKCI ZWAKN ZJOXU EOQKC OOICO TADQE WWHMC ALHDQ WBHPKU NGPUC WTLAZ BVCGO CCODC TVQCE ICNWN BHIKR FNOTAK INOAK XOCPA RJHOL TCREW TXJGU GDPLA KKNMD OBCZVG AUWMQ DPLPM JLJRX RMKZA DPOWN LRKOA AROBD DKKMOW RKCAK WWUZI ZKBHF SUDOT LTACA IKNYJ SXSJE LXOCHO YBOOE YVRZR FAJCC ZDSNK WOYNU HREOL XOIHB RWPKCQ TOAGE YNNHJ NCAKW UQYFD PAYKN UWKKQ NNUNL AKWAAO LXDAF XOFND ZOWNN KCYWN QRDSA ECAGO DIQDY WPMDWK CCAQY WFONK KTVQK NVXKC COVNW XSWBU PMNPX OZNEMJ HZINA ZPNQA COPSC DOFCA UYPWC KZNBW AOCNK CANWBK HUCNY EENBM OLWNN WMNHA AONZX KWAAA OWVSW PSQWJK KZSCO DSGNO CHAWN WWRKB WDQHW WLKDN HKETI OACVTX AACDT VCREHere is the plaintext deduced from the decryption of the cryptogram using my simulator and the following key. Key: - Plugboard Sixes: KAWONC - Plugboard Twenties: MDUZXBJEQIPHTYVRSFLG - Breakwheel : 01001010011 (5, 11, 12, 20, 31, 34) - Start position of the Breakwheel: 28 - ... of the Sixes half-rotor: 5 - ... of the Twenties half-rotor: 1 - Mode: decipher (to decifpher)The plain text: $ python3 red_tui.py -I 4JAN1937 -W 28,5,1 \ > -G KAWONCMDUZXBJEQIPHTYVRSFLG -P 01001010011 \ > -V -d < MSGS/4JAN1937a.cry | fold -w41 XYVELENITIDOKUKYAOTEIKANKEINISIYOOSERUKIK AITOKUBETUYOOHOOWOSONOMAMAKEIZOKUSIYOOSUR UKOTOWAKONGOMANYITIKAIDOKUNOTANCHOWOATOOK UNOOSOREARIMATAKORENIYORISARANIHONKENKOOS HOOOOFUKUDENPOOWOSAKUKYUUKAIDOKUSERARUUOS OREMOARUNITUKIKONOSAITEKITOONARUDAIYOOHOO HOOWOTOKUNIDENSHOSIOSITEHITUYOONOMUKINIDE NTATUSESIMEMIGIDENTATUKANRYOOWOMATIHONYOO HOOKANKEISHORUIISSAISHOOKYAKUSESIMURUKOTO SIKARUBESITOZONZULANAOMATUEMARUNITEGOSOOF UNOTUIKAHENKOOKISUETUKEWAMAKOTONIKEKKOONA RUMOGENZAITOOKANNIOKERUGOTOKIKYUUSIKIMUNO ONARUKINKONITEWASEKKAKUNOSIKUMIMOTEKIORIS URUNOMINIOWARUKIKENAREBACAZAIOOKOOKANWADA IDOOSHYOYICIKONOSAIKANKEIKOOKANNITAISIKIK AIZOOTIYOOKINKOWOGOHAIFUKATAGOHAIRYOWAZUR AWASITASI I was unable to break the plaintext produced by my simulator into words. So I asked S. Tomokiyo, the famous cryptographic code specialist (he's Japanese :-), to help me. Here's his website: Cryptiana: Articles on Historical Cryptography. Here is the result of his work and the remarks he made (Each line begins with my word breakdown, which is obviously incomplete): 1 XYVELE-NITIDOKU-KYAOTEIKANKEINI-SIYOO-SERU- [ NITIDOKU-KY[O]OTEI-KANKEI-NI SIYOO SERU] 日独 協定 関係に 使用せる 2 -KIKAI-TOKUBETU-YOOHOO-WOSONOMAMA-KEIZOKU-SIYOO-SUR [ KIKAI TOKUBETU YOOHOO-WO SONOMAMA KEIZOKU-SIYOO SUR=] 機械 特別 用法を そのまま 継続使用する 3 UKOTOWA-KONGO-MANYITI-KAIDOKU-NO-TANCHO-WOATOOK [U KOTO-WA KONGO MAN'ITI KAIDOKU-NO TANCHO-WO ATOOK=] ことは 今後 万一 解読の 端緒を あとおく(give)? 4 UNOOSOREARIMATAKORENIYORISARANI-HONKEN-KOOS [U-NO OSORE ARI. MATA KORE-NI-YORI SARANI HONKEN KOOS= の おそれ あり。また これにより さらに 本件交渉 5 HOO-OOFUKU-DENPOO-WOSAKUKYUU-KAIDOKU-SERARUUOS [HOO OOFUKU DENPOO-WO SAKUKYUU KAIDOKU-SERARU[R]U OS= 往復 電報を 早急 解読 せらるる おそれ 6 OREMOARUNITUKIKONOSAITEKITOONARUDAI-YOOHOO- [ ORE-MO ARU-NI TUKI, KONOSAI TEKITOO-NARU DAIYOO HOO=] も あるにつき、このさい 適当なる 代用 方法 7 -HOOWO-TOKUNI-DENSHOSIOSITE-HITUYOO-NOMUKINIDE [HOO-WO TOKUNI DENSHOSI,[?] OSITE[?] HITUYOO-NO MUKI-NI DE=] を 特に でんしょし(adopt)?おして?(of course) 必要の 向きに 伝達 8 NTATUSESIMEMIGIDENTATUKANRYOOWOMATIHON [NTATU-SESIME, MIGI DENTATU KANRYOO-WO MATI, HON] せしめ、右 伝達 完了を 待ち、本 9 YOOHOO-KANKEISHORUIISSAISHOOKYAKUSESIMURUKOTO [YOOHOO KANKEI SHORUI ISSAI SHOOKYAKU SESIMURU KOTO] 用法 関係 書類 一切 焼却 せしむる こと 10 SIKARUBESITOZONZULANAOMATUEMARUNITEGOSOOF [ SIKARUBESI-TO ZONZU. LA? NAO MATUEMARU-NITE GOSOOF=] しかるべしと 存ず。LA? なお、 松江丸にて ご送付 11 UNOTUIKAHENKOOKISUETUKEWAMAKOTONIKEKKOO- [U-NO TUIKA HENKOO-KI SUETUKE-WA MAKOTONI KEKKOO ] の 追加 変更機 据え付けは まことに 結構 12 -NARUMO-GENZAI-TOOKANNI-OKERU-GOTOKIKYUUSIKIMUNO [ NARUMO, GENZAI TOOKAN-NI OKERU GOTOKI KYUUSIKI MUNO=] なるも、現在 当館に おける ごとき 旧式 無能 13 ONARU-KINKO-NITEWASEKKAKUNOSIKUMIMOTEKIORIS [ ONARU KINKO-NITE-WA SEKKAKU-NO SIKUMI-MO TEKI-O RIS=] なる 金庫にては せっかくの 仕組みも 敵を 利する 14 URUNOMINIOWARU-KIKEN-AREBACA-ZAIOO-KOOKAN-WADA [ SURU-NOMI-NI OWARU KIKEN AREBA, CA? ZAIOO-KOOKAN-WA DA=] のみに 終わる 危険あれば、CA? 在欧 公館は 大 15 IDOOSHYOYICIKONOSAIKANKEI-KOOKAN-NITAISI- [ IDOOSHOI CI? KONOSAI KANKEI KOOKAN-NI TAISI] 同小異。 このさい 関係 公館に 対し 16 -KIKAI-ZOOTIYOOKINKOWOGOHAIFUKATAGOHAIRYOWAZUR [ KIKAI ZOOTI-YOO KINKO-WO GOHAIFU-KATA GOHAIRYO WAZUR=] 機械 蔵置用 金庫を ご配布方 ご配慮 わずら 17 AWASITASI [ AWASI-TASI] わしたし。Tomokiyo's remarks
I fear continuing to employ the special method of using the machine which we have been using in matters concerning the Japan-Germany agreement as it is might, by some chance, leave a clue to breaking in future. I also fear that thereby telegrams sent back and forth on this negotiation might be quickly deciphered. Thus, we should particularly adopt some appropriate substitute method and have it diligently conveyed to those who need it. I think it proper to, after waiting for its completion, have burnt up all related papers about the method. Further, regarding the additional modified apparatus which you kindly sent on the Matsue Maru, although its equipment is indeed fine, in such an old-style, inefficient safe as in this office now, there is a danger that an arrangement established with so much trouble might only end in advantage to the enemy. Thus, our consulates in Europe are much the same with only minor differences. Now, I should like to ask you to consider distributing safes for storing the machine to consulates concerned. Finally, here is the English translation that comes from the NSA document. From: Berlin (--Mushakoji) To: Foreign Minister, Tokyo. 4 Janauary 1937 (Red) #4 I fear that if we continue to employ the special method of using the machine which we have been using in matters concerning the japonese German agreement, we would give a clue to the reading of our future messages. I fear very much that these messages which we are sending back and forth might be particularly susceptible to being read; therefore, I think that we had better adopt a replacement system for this particlar subject, and, of course, inform the proper people; and while awaiting the completion of the new setup, I think we should burn up every document which we possess in connection with the present method of use. Although the additional apparatus which you sent on the Matsu Maru for modifying the machine is indeed very fine, nevertheless, in such an old style, inefficient safe as we have in this office, there is a danger that an arrangement established with so much trouble would only end in advantage to the enemy. (Our high officials in Europe are much in same position as I with only minor differences.) Therefore, I should like to ask you to send to the high officials concerned safe repositories for storing the machine. Second messageIntroductionThe second message corresponds to the response made by the Japanese Ministry of Foreign Affairs to the Japanese ambassador in Berlin to the first message. The second message is divided into several parts. This division has no relation to security because only one key is used. In fact, the division allows for greater transmission reliability. The english version of the second cryptogramHere is the English translation of the second message: From: Tokyo. (Arita). To: Japanese Ambassador, Berlin 9 January 1937. Red #6. Re. your 4. 1. What you say is doubtless true, but if any cipher machine is considered, the possibility of the messages being deciphered continues theoretically, even after the key has been replaced since the messages are extant. So, I cannot see how you can raise the question of changing the keys of the messages concerning the .Japanese-German agreement. The real question that we are concerned with is keeping the key secret. So long as the key does not leak out, the Department of Foreign Affairs thinks that these negotiations between us and Germany offer no clue, and even though the machine itself may be known, there is no danger of_solution. Since we have so many permutations or the basic keying elements, no entering wedge is afforded to outsiders so far as this special system is concerned. So long as the system does not leak out, considering its great variability and its great number of permutations, I dare say that its security in the future will still be very high. Therefore, I think that the danger which you say you feel in continuing the use of the special key is fanciful indeed. 2. Concerning the matter of a safe for storing the machine, considering its large size and shape, it is extremely hard to provide the same very soon. The machines have not been kept in safes for the last five years. We are considering handling them in the way that the Navy handles its similar machines, but right now, force of circumstances does not permit us to realize this. So I think if you will advise the different high officials in Europe to conform to instructions for the use of the machine, there will not be as much danger as you think.· I do not wish to minimize the importance or preserving secrecy, but without mincing words, while I would like to act on this matter, I cannot do anything now, and I ask you to reconsider your message. The plain text (in japonese)#6: KIDEN #7 NIKANSI. 1 : GORAIJI NO SIDAI GOMOTTOMO NAGARA IKANARU ANGOOKI TOIEDOMO SONO ANGOO NO KAIDOKU SERARURU KANOOSE! \lA RIRONJOO MIGI KIKAI NOSIKOO WO TEISIERU GO TOIEDOMO lll'lf SONSURU GINISITE KASU NI JIJITU WOMOTTE SEBA NITIDOKU KYOOTEI OOFUKU DENPOO MO TOKOBETU YOOHOO NO HAISI TO !NATO NI KANKEINAKU KAIDOKUSIUBEKI WA KENARISIKAREDOMO JISSAI MONDAITOSITE KORE WO MIRU TOKI WA SIYOO HOOHOO WO ROOEI SEZARU KAGIRI GAIBU YORIMITE SOOGO NI KYOOTUU NO KATDOKU TANCHO NAKI ANGOO WO MOTIURU NIOITE WA TATOE KIKA! WO KITISERARU TOMO JUUBUN KAIDOKU NO KIKEN WO FUSEGIURU MONO NISITE.HONKEN TOKUBETU YOOHOO MO BUGAISHA NI KAIDOKUJOO NO KENKYUU SIRYOO -- DOOITU SOOSEN NI YORU TASUU NO ANBUN -- WO ATOORU KOTO NAKI WOMOTTE SONO HOOHOO WO KITISERAREZARU KAGIRI SIYOO BANI NARABINI SONO DOSUU NIKANGAMI KONGO TOMO ANZEN RITU TAKAKI MONO TO SIKOOSERARU SIKARUNI KIKAN NIOITEWA MIGI KEIZOKU SIYOO JOO TOKUNI KIKEN WO KANZERARURU FUSI ARU SIDAI NARIYA ( 2) ANGOOKI KAKUNOO KINKO NO KENWA OOKISA : KEIHI TOO NO KANKEIJOO SOOKYUU JITUGEN KONNANNARU NOMINARAZU KAKO GONEN NIWATARI KANARAZUSIMO KAKUNOOSERU KOTO NAKU RUIJI NO KIKA! WOYUUSURU KAIGUN GAWA NO TORIATUKAI:BURI WO MO KOORYOSURU NI IMANIOITE MIGI SETUBI WO HITUYOO TOSURU RI WO KAISURU KOTO KONNAN NISITE KIKAI SIYOO NIKANSURU RUIJI NO KUNREI NI JUNKYOSURU MUNE 0 ZAIOO KOOKAN NI OKERU ANGOOKI SIYOO BURI GA SIKAKU KIKEN 800- TAINI ARI TO MIRARURU SIDAINARIYA. KIMITU HOJI JOOBUTTEKI SISETU NO YORUGASE NARAZARU WA TAGE~ WO YOOSEZU SITE ZENJI KAIKEN WO KUWAETAKI SIDAI NARUMO JOOKIN KO NIKANSURU GOKAITOO WO MATITE HONKEN SAIKOO SURUKOTO TO ITASITASI OWARI. The cryptogramsHere are the different cryptograms (with the headers).SECRET 8 JANUARY 1937 STATION 5 DGO DE JNF {15720 KC) GB96 SCDE TOKIO 278 9 37S ETAT JG 1/50 NIHONKOSHI BERLIN 02143 JKTRY VLBZW DVJDO LVQDZ XXCNZ FKUQY BRRIX PRPJJ NSFCR SMXIH DBFHP WOIRN YFFUM UJJUD GYRMA FZQWQ HQSAM TTAFB QNEXB QWVDH YRJGJ BTZQQ NAAKN NFOTM OATRG URWGV BYDAG QQWYX MQDSY RUGAE HMOHA PWLFR FGXYZ PNCMW DOFDI AQMSP ZYPUP OUGAB CJBWX DRQPE BLQXX UBAOQ LUEED GSLRN AQOVM SEFHO XDRQG (CONTINUED ON NEXT SHEET) 9.10PM X SECRET 8 JANUARY 1937 STATION 5 DGO DE JNF (15720 KC) GB96 NIH P2/50 (SECOND SHEET) EIIYR SVTIC QPUOQ CPRXO NGOMF WDJYU UZLQC WLIES GICVM WJGGL EQQWV ZHPCG AUKFO ZRORM WSDGQ RJAOH DANQQ WTLER BYOBJ GWOFW YJJUS HKDGM BUGAJ FTQIH LTPYE TBTKQ TDTFQ RNRGY SRHDP QYFUA HCMNY YQPCU NJRZI SCNZS GRRBC QBNKH TTAFB MNCJG NROFU IXQHE SHOPM AYZUY FCCSE HIPRL NQJPD CIWFD GGBAZ WOABZ QSJKU ZLGJP (CONTINUED ON NEXT SHEET) 9.13PM X SECRET 8 JANUARY 1937 STATION 5 DGO DE JNF (15620 KC) GB96 NIH 3/50 (THIRD SHEET) GUXVN OWAHJ AOCMN WCJLH XJLKW SULSS VBRLQ FIOXD RJTJQ DNBMM NVFCM SZNTD GIBEV SLLXR ITMVX MIWNF BRMPA CTTKF BWYXG JQIGI HPJMM XRGNT TOCHG FAHYA DCMDY JJPXI WHKDF HUGAJ UTWNH EWTHX LBINY YOIXY GXCXW SHVRD XHHRS XIRXA GCQSN XFRDW IQDZX XPDPC YOABR QGUBP PKVXH NUGJN ZJEPF GIBXN NBVWI IYXNR NMSEQ JQSFE (CONTINUED ON NEXT SHEET) 9.16PM X SECRET 8 JANUARY 1937 DGO DE JNF (15720 KC) GB96 NIH 4/50 (FOURTH SHEET) UKGGF TSIWK PIUMT DEVBV WVDHW LXMWD GSBEP OUEAK YBTOY CCELN QJQWO SMWJB XBSHF TSIQJ DVXLR YAWEA ABRDL XVPYP OCTEA GZSNX KYTSH BULGA RJYZL TIIWM DWBZL SYEUG IHHPS ZZAJH XOHWE OGTRD FFBAD ACDBX HPCXK MLFVP DOAKC TOOQX STBLD DFOUV UOQGD LQEQS JCCZP DZSWM CWVWA HDXFX TKAZB WWXLJ CDWAH VOFQM DXBCN NXIRU (CONTINUED ON NEXT SHEET) 9.19PM X SECRET 8 JANUARY 1937 STATION 5 DGO DE JNF (15720 KC) GB96 NIH 5/50 (FIFTH SHEET) XPMPL MUXRS CCSMX KRDNE UUPWO MNAPB BWXQH ZBXCR UZGXM JJPII WAEGD SBBQT SHNNH LUWSN GJZGS ULAOX RRDJH WTKVS YHMBD VJCMN VFFQU DAFCO QMQNK SXHVJ FTAUA KKDGI CPTOM DIEBT SOLMR EIHQD AYEHM GGMPS ZQMSK FBIQT FPDIC ZNENK PZLIP UNRXB RAFOT CORQF WUWAQ NFHRN DFOTL JKWLX NRMPB CDNFH QGBWI YZOGM BYRSX TYDOG (CONTINUED ON NEXT SHEET) 9.22PM X SECRET 8 JANUARY 1937 STATION 5 DGO DE JNF (15720 KC) GB96 NIH 6/28 (SIXTH SHEET) DAOKC WUQEO WOBDU FMEUW XVRDD KKQNF GLKVG UTVAH VKWOB KQDXZ BGVTP IGCPT INIAN XJCLA GXCJYN AQYWW GIJPH CVDAN QPTXD WPXOE GAOEV RWFCE SOXJB TKBXN RJBFD WCJNS HMQWU ARITA 9.25PM X The key and the automatic decryption of the first two partsHere is the key: Key: - Plugboard Sixes: LZVEYK - Plugboard Twenties: WIHQPSOXMRDGFBUNAJCT - Breakwheel : 01111010011 (5, 20, 31, 34) (then, the period is 43) - Start position of the Breakwheel: 39 - ... of the Sixes half-rotor: 1 - ... of the Twenties half-rotor: 11 - Mode: ciphering (to decipher)Here is the decryption of the fist two parts: Note: Each part starts at the position where the previous part ends. Therefore, only one key is used. $ python3 red_tui.py \ > -P 01111010011 \ > -G LZVEYKWIHQPSOXMRDGFBUNAJCT \ > -W 39,1,11 -c -V \ > < MSGS/8JAN37a.cry | fold -w43 XYXALELAKIDENXIVENIKANSILAVAQEGOSAIJINOSIDA IGOMOTTOMONAGARAIKANARUANGOOKITOIEDOMOSONOA NGOONOKAIDOKUSERARURUKANOOSEIWARIRONJOOMIGI KIKAINOSIYOOWOTEISISERUGOTOIEDOMOIZENSONSUR UGINISITEKASUNIJIJITUWOMOTTESEBANITIDOKUKYO OTEIOOFUKUDENPOOMOTO $ python3 red_tui.py \ > -P 01111010011 \ > -G LZVEYKWIHQPSOXMRDGFBUNAJCT \ > -W 13,5,7 -c -V \ > < MSGS/8JAN37b.cry |fold -w43 KUBETUYOOHOONOHAISITOINATONIKANKEINAKUKAIDO KUSIUBEKIWAKENARISIKAREDOMOJISSAIMONDAITOSI TEKOREWOMIRUTOKIWASIYOOHOOHOOWOROOEISEZARUK AGIRIGAIBUYORIMITESOOGONIKYOOTUUNOKATDOKUTA NCHONAKIANGOOWOMOTIURUNIOITEWATATOEKIKAIWOK ITISERARUTOMOJUUBUNKAIDOKUNOKIKENWO Reference
|