The Red machine: genuine messages


Home Page
The Red Home Page

Genuine Red cipher messages

When studying cipher machines, the ideal is to have access to an authentic machine and to encrypt a message and decrypt it using the algorithm that reproduces the machine's operation. This approach allows us to prove that we truly understand how the machine works.

Failing that, if we find authentic encrypted messages, we can verify whether the algorithm we have applies. There may be some differences that come from the machine and that we cannot necessarily deduce cryptographically, for example, the actual wiring of a rotor due to the twist effect.

In the case of the Red machine, we have the American analog machine and the Japanese Orange machine, which is very similar. But these machines are in museums and we don't have access to them.

Fortunately, the NSA (see reference) published a document containing two authentic messages encrypted using the Red machine dating from 1937. Finding the key was not difficult, because the plaintext is provided and part of the key is also provided. I was thus able to validate my simulator and ultimately I was able to decipher the two cryptograms.

First Message

The first pages of the NSA document are devoted to the first message. First, we have the English translation of the message, and then a document that clearly comes from American cryptanalysts. It contains the cryptogram and its decryption.

Here is an excerpt from the document and some accompanying comments:

========================================================================
              31, 34, 5, 11, 12, 20 
1/2  SOURCE: NAVY
(41) 4 JAN 1937 S  80 SCDE BLN 137 4 2005 TAT JG GAIMUDAIJIN TOKIO 57968

29  31 2 34 2                  2       3         2
 XTTX | YD | NMULINKENSONTJEOO | NOGMK | SUVFNOF | JYGKXN
 XYVE | LE | NITIDOKUKY--TEIKA | NKEIN | ISIYOOS | ERUKIK
      |    |                   |       |         | 
 NDZO | NI | PHRXVONIWAOOIOOAI | WJKNP | IUAOLHZ | BKCBPU
 AITO | KU | BETUYOOHOOWOSONOM | AMAKE | ISOKUSI | YOOSUR
...

 AAOD | TV | ORN
 AWAS | IT | ASI   - MUSHAKOJI AR HI SPEED 
========================================================================
Comments:

The message appears as a sequence of pairs of lines. For each pair, the top line corresponds to the cryptogram and the bottom line to its plaintext translation (but in Japanese :-(.

Each line is 41 characters long. 41 corresponds to the period. It is indicated in parentheses at the beginning of the second line. Each line is divided into several parts which correspond to the presence of the jumps which result from the breakwheel. It is consistent with the PINs that were removed and are indicated at the top of the document (31, 34, 5, 11, 12, 20). These values were written by hand.

In the line above the text, there are very poorly written numbers. We can guess 29, 31, 34, … Perhaps they correspond to the position of the breakwheel? My program finds slightly different values (see below).

In the text accompanying the message, two important words are present:

  • Gaimudaijin: The Minister for Foreign Affairs
  • Mushakoji: Japanese Ambassador to Germany
From the last two words, we can deduce that the message was sent by the Japanese Ambassador in Berlin (Mr. Mushakoji) to the Minister of Foreign Affairs in Tokyo. This information can also be found in the translation header.

Here is the beginning of the decryption of the first message (the first line) using my simulator in debug mode (-D option). The breakwheel advancements appear easily at the following positions: 31, 34, 5, 11, 12, 20.

  1: (28, 5, 1) Crypto: X(23)-> Input:  5  Twent X => After HRCON: G ( 5)  Crypto: X (23)
  2: (29, 6, 2) Crypto: T(19)-> Input: 13  Twent T => After HRCON: R (14)  Crypto: Y (24)
  3: (30, 1, 3) Crypto: T(19)-> Input: 13  Twent T => After HRCON: S (15)  Crypto: V (21)
  4: (31, 2, 4) Crypto: X(23)-> Input:  5  Twent X => After HRCON: K ( 8)  Crypto: E ( 4)
  5: (33, 4, 6) Crypto: Y(24)-> Input: 14  Twent Y => After HRCON: X (19)  Crypto: L (11)
  6: (34, 5, 7) Crypto: D( 3)-> Input:  2  Twent D => After HRCON: K ( 8)  Crypto: E ( 4)
  7: (36, 1, 9) Crypto: N(13)-> Input:  5  Sixes N => After HRVOY: U ( 5)  Crypto: N (13)
  8: (37, 2,10) Crypto: M(12)-> Input:  1  Twent M => After HRCON: M (10)  Crypto: I ( 8)
  9: (38, 3,11) Crypto: U(20)-> Input:  3  Twent U => After HRCON: Q (13)  Crypto: T (19)
 10: (39, 4,12) Crypto: L(11)-> Input: 19  Twent L => After HRCON: M (10)  Crypto: I ( 8)
 11: (40, 5,13) Crypto: I( 8)-> Input: 10  Twent I => After HRCON: C ( 2)  Crypto: D ( 3)
 12: (41, 6,14) Crypto: N(13)-> Input:  5  Sixes N => After HRVOY: O ( 4)  Crypto: O (14)
 13: (42, 1,15) Crypto: K(10)-> Input:  1  Sixes K => After HRVOY: A ( 1)  Crypto: K (10)
 14: (43, 2,16) Crypto: E( 4)-> Input:  8  Twent E => After HRCON: D ( 3)  Crypto: U (20)
 15: (44, 3,17) Crypto: N(13)-> Input:  5  Sixes N => After HRVOY: A ( 1)  Crypto: K (10)
 16: (45, 4,18) Crypto: S(18)-> Input: 17  Twent S => After HRCON: R (14)  Crypto: Y (24)
 17: (46, 5,19) Crypto: O(14)-> Input:  4  Sixes O => After HRVOY: E ( 2)  Crypto: A ( 0)
 18: (47, 6,20) Crypto: N(13)-> Input:  5  Sixes N => After HRVOY: O ( 4)  Crypto: O (14)
 19: ( 1, 1, 1) Crypto: T(19)-> Input: 13  Twent T => After HRCON: Q (13)  Crypto: T (19)
 20: ( 2, 2, 2) Crypto: J( 9)-> Input:  7  Twent J => After HRCON: K ( 8)  Crypto: E ( 4)
 21: ( 3, 3, 3) Crypto: E( 4)-> Input:  8  Twent E => After HRCON: M (10)  Crypto: I ( 8)
 22: ( 4, 4, 4) Crypto: O(14)-> Input:  4  Sixes O => After HRVOY: A ( 1)  Crypto: K (10)
 23: ( 5, 5, 5) Crypto: O(14)-> Input:  4  Sixes O => After HRVOY: E ( 2)  Crypto: A ( 0)
 24: ( 7, 1, 7) Crypto: N(13)-> Input:  5  Sixes N => After HRVOY: U ( 5)  Crypto: N (13)
 25: ( 8, 2, 8) Crypto: C( 2)-> Input:  6  Sixes C => After HRVOY: A ( 1)  Crypto: K (10)
 26: ( 9, 3, 9) Crypto: G( 6)-> Input: 20  Twent G => After HRCON: K ( 8)  Crypto: E ( 4)
 27: (10, 4,10) Crypto: M(12)-> Input:  1  Twent M => After HRCON: M (10)  Crypto: I ( 8)
 28: (11, 5,11) Crypto: K(10)-> Input:  1  Sixes K => After HRVOY: U ( 5)  Crypto: N (13)
 29: (14, 2,14) Crypto: S(18)-> Input: 17  Twent S => After HRCON: M (10)  Crypto: I ( 8)
 30: (15, 3,15) Crypto: U(20)-> Input:  3  Twent U => After HRCON: V (17)  Crypto: S (18)
 31: (16, 4,16) Crypto: V(21)-> Input: 15  Twent V => After HRCON: M (10)  Crypto: I ( 8)
 32: (17, 5,17) Crypto: F( 5)-> Input: 18  Twent F => After HRCON: R (14)  Crypto: Y (24)
 33: (18, 6,18) Crypto: N(13)-> Input:  5  Sixes N => After HRVOY: O ( 4)  Crypto: O (14)
 34: (19, 1,19) Crypto: O(14)-> Input:  4  Sixes O => After HRVOY: O ( 4)  Crypto: O (14)
 35: (20, 2,20) Crypto: F( 5)-> Input: 18  Twent F => After HRCON: V (17)  Crypto: S (18)
 36: (22, 4, 2) Crypto: J( 9)-> Input:  7  Twent J => After HRCON: K ( 8)  Crypto: E ( 4)
 37: (23, 5, 3) Crypto: Y(24)-> Input: 14  Twent Y => After HRCON: T (16)  Crypto: R (17)
 38: (24, 6, 4) Crypto: G( 6)-> Input: 20  Twent G => After HRCON: D ( 3)  Crypto: U (20)
 39: (25, 1, 5) Crypto: K(10)-> Input:  1  Sixes K => After HRVOY: A ( 1)  Crypto: K (10)
 40: (26, 2, 6) Crypto: X(23)-> Input:  5  Twent X => After HRCON: M (10)  Crypto: I ( 8)
 41: (27, 3, 7) Crypto: N(13)-> Input:  5  Sixes N => After HRVOY: A ( 1)  Crypto: K (10)

Here is the cryptogram I reconstructed (there may be some errors).

	XTTXY DNMUL INKEN SONTJ EOONC GMKSU VFNOF JYGKXN
	NDZON IPHRX VCNIW ACCIO OAIWJ KNPIU AOLHZ BKCBPU
	QOCRW KOAOO YKTWN UFGRA ATZCA MOABA OOMCO WCRCNK
	DWKCP WJFWZ SJNSW KWRJK JIWQD EAXOC YVAAW BONKCI
	ZWAKN ZJOXU EOQKC OOICO TADQE WWHMC ALHDQ WBHPKU
	NGPUC WTLAZ BVCGO CCODC TVQCE ICNWN BHIKR FNOTAK
	INOAK XOCPA RJHOL TCREW TXJGU GDPLA KKNMD OBCZVG
	AUWMQ DPLPM JLJRX RMKZA DPOWN LRKOA AROBD DKKMOW
	RKCAK WWUZI ZKBHF SUDOT LTACA IKNYJ SXSJE LXOCHO
	YBOOE YVRZR FAJCC ZDSNK WOYNU HREOL XOIHB RWPKCQ
	TOAGE YNNHJ NCAKW UQYFD PAYKN UWKKQ NNUNL AKWAAO
	LXDAF XOFND ZOWNN KCYWN QRDSA ECAGO DIQDY WPMDWK
	CCAQY WFONK KTVQK NVXKC COVNW XSWBU PMNPX OZNEMJ
	HZINA ZPNQA COPSC DOFCA UYPWC KZNBW AOCNK CANWBK
	HUCNY EENBM OLWNN WMNHA AONZX KWAAA OWVSW PSQWJK
	KZSCO DSGNO CHAWN WWRKB WDQHW WLKDN HKETI OACVTX
	AACDT VCRE
Here is the plaintext deduced from the decryption of the cryptogram using my simulator and the following key.
	Key: 
	- Plugboard Sixes:    KAWONC
	- Plugboard Twenties: MDUZXBJEQIPHTYVRSFLG
	- Breakwheel :  01001010011 (5, 11, 12, 20, 31, 34)
	- Start position of the Breakwheel: 28
	- ... of the Sixes half-rotor: 5
	- ... of the Twenties half-rotor: 1
	- Mode: decipher (to decifpher)
The plain text:
	$ python3 red_tui.py -I 4JAN1937 -W 28,5,1 \
	> -G KAWONCMDUZXBJEQIPHTYVRSFLG -P 01001010011 \
	> -V -d <  MSGS/4JAN1937a.cry  | fold -w41
	XYVELENITIDOKUKYAOTEIKANKEINISIYOOSERUKIK
	AITOKUBETUYOOHOOWOSONOMAMAKEIZOKUSIYOOSUR
	UKOTOWAKONGOMANYITIKAIDOKUNOTANCHOWOATOOK
	UNOOSOREARIMATAKORENIYORISARANIHONKENKOOS
	HOOOOFUKUDENPOOWOSAKUKYUUKAIDOKUSERARUUOS
	OREMOARUNITUKIKONOSAITEKITOONARUDAIYOOHOO
	HOOWOTOKUNIDENSHOSIOSITEHITUYOONOMUKINIDE
	NTATUSESIMEMIGIDENTATUKANRYOOWOMATIHONYOO
	HOOKANKEISHORUIISSAISHOOKYAKUSESIMURUKOTO
	SIKARUBESITOZONZULANAOMATUEMARUNITEGOSOOF
	UNOTUIKAHENKOOKISUETUKEWAMAKOTONIKEKKOONA
	RUMOGENZAITOOKANNIOKERUGOTOKIKYUUSIKIMUNO
	ONARUKINKONITEWASEKKAKUNOSIKUMIMOTEKIORIS
	URUNOMINIOWARUKIKENAREBACAZAIOOKOOKANWADA
	IDOOSHYOYICIKONOSAIKANKEIKOOKANNITAISIKIK
	AIZOOTIYOOKINKOWOGOHAIFUKATAGOHAIRYOWAZUR
	AWASITASI

I was unable to break the plaintext produced by my simulator into words. So I asked S. Tomokiyo, the famous cryptographic code specialist (he's Japanese :-), to help me. Here's his website: Cryptiana: Articles on Historical Cryptography. Here is the result of his work and the remarks he made (Each line begins with my word breakdown, which is obviously incomplete):

	 1 XYVELE-NITIDOKU-KYAOTEIKANKEINI-SIYOO-SERU-
	[        NITIDOKU-KY[O]OTEI-KANKEI-NI SIYOO SERU]
	         日独   協定  関係に 使用せる
	2 -KIKAI-TOKUBETU-YOOHOO-WOSONOMAMA-KEIZOKU-SIYOO-SUR
	[  KIKAI TOKUBETU YOOHOO-WO SONOMAMA KEIZOKU-SIYOO SUR=]
	  機械 特別  用法を  そのまま 継続使用する
	3 UKOTOWA-KONGO-MANYITI-KAIDOKU-NO-TANCHO-WOATOOK
	[U KOTO-WA KONGO MAN'ITI KAIDOKU-NO TANCHO-WO ATOOK=]
	  ことは 今後 万一  解読の  端緒を あとおく(give)?
	4 UNOOSOREARIMATAKORENIYORISARANI-HONKEN-KOOS
	[U-NO OSORE ARI. MATA KORE-NI-YORI SARANI HONKEN KOOS=
	 の おそれ あり。また これにより さらに 本件交渉
	5 HOO-OOFUKU-DENPOO-WOSAKUKYUU-KAIDOKU-SERARUUOS
	[HOO OOFUKU DENPOO-WO SAKUKYUU KAIDOKU-SERARU[R]U OS=
	   往復 電報を 早急    解読 せらるる おそれ
	6 OREMOARUNITUKIKONOSAITEKITOONARUDAI-YOOHOO-
	[ ORE-MO ARU-NI TUKI, KONOSAI TEKITOO-NARU DAIYOO HOO=]
	   も あるにつき、このさい 適当なる 代用 方法
	7 -HOOWO-TOKUNI-DENSHOSIOSITE-HITUYOO-NOMUKINIDE
	[HOO-WO TOKUNI DENSHOSI,[?] OSITE[?] HITUYOO-NO MUKI-NI DE=]
	  を 特に でんしょし(adopt)?おして?(of course) 必要の 向きに 伝達
	8 NTATUSESIMEMIGIDENTATUKANRYOOWOMATIHON
	[NTATU-SESIME, MIGI DENTATU KANRYOO-WO MATI, HON]
	   せしめ、右 伝達 完了を    待ち、本
	9 YOOHOO-KANKEISHORUIISSAISHOOKYAKUSESIMURUKOTO
	[YOOHOO KANKEI SHORUI ISSAI SHOOKYAKU SESIMURU KOTO]
	用法  関係 書類  一切 焼却  せしむる こと
	10 SIKARUBESITOZONZULANAOMATUEMARUNITEGOSOOF
	[  SIKARUBESI-TO ZONZU. LA? NAO MATUEMARU-NITE GOSOOF=]
	しかるべしと 存ず。LA?  なお、 松江丸にて ご送付
	11 UNOTUIKAHENKOOKISUETUKEWAMAKOTONIKEKKOO-
	[U-NO TUIKA HENKOO-KI SUETUKE-WA MAKOTONI KEKKOO ]
	の 追加 変更機   据え付けは まことに 結構
	12 -NARUMO-GENZAI-TOOKANNI-OKERU-GOTOKIKYUUSIKIMUNO
	[ NARUMO, GENZAI TOOKAN-NI OKERU GOTOKI KYUUSIKI MUNO=]
	  なるも、現在 当館に おける ごとき 旧式 無能
	13 ONARU-KINKO-NITEWASEKKAKUNOSIKUMIMOTEKIORIS
	[  ONARU KINKO-NITE-WA SEKKAKU-NO SIKUMI-MO TEKI-O RIS=]
	 なる 金庫にては  せっかくの 仕組みも 敵を 利する
	14 URUNOMINIOWARU-KIKEN-AREBACA-ZAIOO-KOOKAN-WADA
	[  SURU-NOMI-NI OWARU KIKEN AREBA, CA? ZAIOO-KOOKAN-WA DA=]
	    のみに 終わる 危険あれば、CA? 在欧 公館は 大
	15 IDOOSHYOYICIKONOSAIKANKEI-KOOKAN-NITAISI-
	[  IDOOSHOI CI? KONOSAI KANKEI KOOKAN-NI TAISI]
	  同小異。  このさい 関係 公館に 対し
	16 -KIKAI-ZOOTIYOOKINKOWOGOHAIFUKATAGOHAIRYOWAZUR
	[  KIKAI ZOOTI-YOO KINKO-WO GOHAIFU-KATA GOHAIRYO WAZUR=]
	 機械 蔵置用 金庫を   ご配布方  ご配慮 わずら
	17 AWASITASI
	[  AWASI-TASI]
	わしたし。
Tomokiyo's remarks
  • The first word XYVELE is probably an indicator.
  • On line 3, I replaced Y with an apostrophe. On line 15, I omitted two Ys. These may not be errors but are less common.
  • On line 1 and line 5, I corrected what seem to be errors in the original ciphertext.
  • In Japanese, L is not used. So LA on line 10 may be punctuation.
  • In Japanese, C is not used other than in "CH." So CA on line 14 and CI on line 15 may be punctuation.
  • On Line 3, "ATOOKU" seems to mean "leave" but I don't know the word. (NSA says "give".)
  • On Line 7, "DENSHOSI" "OSITE" -- I'm not sure. (NSA says "adopt", "of course")
  • Below is my quick translation. (Some parts are not very clear and I ended up in copying a large part of the NSA translation.)

I fear continuing to employ the special method of using the machine which we have been using in matters concerning the Japan-Germany agreement as it is might, by some chance, leave a clue to breaking in future. I also fear that thereby telegrams sent back and forth on this negotiation might be quickly deciphered. Thus, we should particularly adopt some appropriate substitute method and have it diligently conveyed to those who need it. I think it proper to, after waiting for its completion, have burnt up all related papers about the method. Further, regarding the additional modified apparatus which you kindly sent on the Matsue Maru, although its equipment is indeed fine, in such an old-style, inefficient safe as in this office now, there is a danger that an arrangement established with so much trouble might only end in advantage to the enemy. Thus, our consulates in Europe are much the same with only minor differences. Now, I should like to ask you to consider distributing safes for storing the machine to consulates concerned.

Finally, here is the English translation that comes from the NSA document.

From: Berlin (--Mushakoji)
To: Foreign Minister, Tokyo.
4 Janauary 1937
(Red)
#4

I fear that if we continue to employ the special method of using the machine which we have been using in matters concerning the japonese German agreement, we would give a clue to the reading of our future messages. I fear very much that these messages which we are sending back and forth might be particularly susceptible to being read; therefore, I think that we had better adopt a replacement system for this particlar subject, and, of course, inform the proper people; and while awaiting the completion of the new setup, I think we should burn up every document which we possess in connection with the present method of use. Although the additional apparatus which you sent on the Matsu Maru for modifying the machine is indeed very fine, nevertheless, in such an old style, inefficient safe as we have in this office, there is a danger that an arrangement established with so much trouble would only end in advantage to the enemy. (Our high officials in Europe are much in same position as I with only minor differences.) Therefore, I should like to ask you to send to the high officials concerned safe repositories for storing the machine.

Second message

Introduction

The second message corresponds to the response made by the Japanese Ministry of Foreign Affairs to the Japanese ambassador in Berlin to the first message.

The second message is divided into several parts. This division has no relation to security because only one key is used. In fact, the division allows for greater transmission reliability.

The english version of the second cryptogram

Here is the English translation of the second message:

From: Tokyo. (Arita).
To: Japanese Ambassador, Berlin
9 January 1937.
Red
#6. Re. your 4.

1. What you say is doubtless true, but if any cipher machine is considered, the possibility of the messages being deciphered continues theoretically, even after the key has been replaced since the messages are extant. So, I cannot see how you can raise the question of changing the keys of the messages concerning the .Japanese-German agreement. The real question that we are concerned with is keeping the key secret. So long as the key does not leak out, the Department of Foreign Affairs thinks that these negotiations between us and Germany offer no clue, and even though the machine itself may be known, there is no danger of_solution. Since we have so many permutations or the basic keying elements, no entering wedge is afforded to outsiders so far as this special system is concerned. So long as the system does not leak out, considering its great variability and its great number of permutations, I dare say that its security in the future will still be very high. Therefore, I think that the danger which you say you feel in continuing the use of the special key is fanciful indeed.

2. Concerning the matter of a safe for storing the machine, considering its large size and shape, it is extremely hard to provide the same very soon. The machines have not been kept in safes for the last five years. We are considering handling them in the way that the Navy handles its similar machines, but right now, force of circumstances does not permit us to realize this. So I think if you will advise the different high officials in Europe to conform to instructions for the use of the machine, there will not be as much danger as you think.· I do not wish to minimize the importance or preserving secrecy, but without mincing words, while I would like to act on this matter, I cannot do anything now, and I ask you to reconsider your message.

The plain text (in japonese)

#6: KIDEN #7 NIKANSI. 1 : GORAIJI NO SIDAI GOMOTTOMO NAGARA IKANARU ANGOOKI TOIEDOMO SONO ANGOO NO KAIDOKU SERARURU KANOOSE! \lA RIRONJOO MIGI KIKAI NOSIKOO WO TEISIERU GO TOIEDOMO lll'lf SONSURU GINISITE KASU NI JIJITU WOMOTTE SEBA NITIDOKU KYOOTEI OOFUKU DENPOO MO TOKOBETU YOOHOO NO HAISI TO !NATO NI KANKEINAKU KAIDOKUSIUBEKI WA KENARISIKAREDOMO JISSAI MONDAITOSITE KORE WO MIRU TOKI WA SIYOO HOOHOO WO ROOEI SEZARU KAGIRI GAIBU YORIMITE SOOGO NI KYOOTUU NO KATDOKU TANCHO NAKI ANGOO WO MOTIURU NIOITE WA TATOE KIKA! WO KITISERARU TOMO JUUBUN KAIDOKU NO KIKEN WO FUSEGIURU MONO NISITE.HONKEN TOKUBETU YOOHOO MO BUGAISHA NI KAIDOKUJOO NO KENKYUU SIRYOO -- DOOITU SOOSEN NI YORU TASUU NO ANBUN -- WO ATOORU KOTO NAKI WOMOTTE SONO HOOHOO WO KITISERAREZARU KAGIRI SIYOO BANI NARABINI SONO DOSUU NIKANGAMI KONGO TOMO ANZEN RITU TAKAKI MONO TO SIKOOSERARU SIKARUNI KIKAN NIOITEWA MIGI KEIZOKU SIYOO JOO TOKUNI KIKEN WO KANZERARURU FUSI ARU SIDAI NARIYA

( 2) ANGOOKI KAKUNOO KINKO NO KENWA OOKISA : KEIHI TOO NO KANKEIJOO SOOKYUU JITUGEN KONNANNARU NOMINARAZU KAKO GONEN NIWATARI KANARAZUSIMO KAKUNOOSERU KOTO NAKU RUIJI NO KIKA! WOYUUSURU KAIGUN GAWA NO TORIATUKAI:BURI WO MO KOORYOSURU NI IMANIOITE MIGI SETUBI WO HITUYOO TOSURU RI WO KAISURU KOTO KONNAN NISITE KIKAI SIYOO NIKANSURU RUIJI NO KUNREI NI JUNKYOSURU MUNE 0 ZAIOO KOOKAN NI OKERU ANGOOKI SIYOO BURI GA SIKAKU KIKEN 800- TAINI ARI TO MIRARURU SIDAINARIYA. KIMITU HOJI JOOBUTTEKI SISETU NO YORUGASE NARAZARU WA TAGE~ WO YOOSEZU SITE ZENJI KAIKEN WO KUWAETAKI SIDAI NARUMO JOOKIN KO NIKANSURU GOKAITOO WO MATITE HONKEN SAIKOO SURUKOTO TO ITASITASI OWARI.

The cryptograms

Here are the different cryptograms (with the headers).
SECRET		 8 JANUARY 1937
STATION 5
DGO DE JNF {15720 KC)
GB96 SCDE TOKIO 278 9 37S ETAT JG 1/50
NIHONKOSHI BERLIN

02143 JKTRY VLBZW DVJDO LVQDZ
XXCNZ FKUQY BRRIX PRPJJ NSFCR
SMXIH DBFHP WOIRN YFFUM UJJUD
GYRMA FZQWQ HQSAM TTAFB QNEXB
QWVDH YRJGJ BTZQQ NAAKN NFOTM
OATRG URWGV BYDAG QQWYX MQDSY
RUGAE HMOHA PWLFR FGXYZ PNCMW
DOFDI AQMSP ZYPUP OUGAB CJBWX
DRQPE BLQXX UBAOQ LUEED GSLRN
AQOVM SEFHO XDRQG
   (CONTINUED ON NEXT SHEET)
          	9.10PM
		 X

SECRET		8 JANUARY 1937
STATION 5
DGO DE JNF (15720 KC)
GB96 NIH P2/50 (SECOND SHEET)
EIIYR SVTIC QPUOQ CPRXO NGOMF
WDJYU UZLQC WLIES GICVM WJGGL
EQQWV ZHPCG AUKFO ZRORM WSDGQ
RJAOH DANQQ WTLER BYOBJ GWOFW
YJJUS HKDGM BUGAJ FTQIH LTPYE
TBTKQ TDTFQ RNRGY SRHDP QYFUA
HCMNY YQPCU NJRZI SCNZS GRRBC
QBNKH TTAFB MNCJG NROFU IXQHE
SHOPM AYZUY FCCSE HIPRL NQJPD
CIWFD GGBAZ WOABZ QSJKU ZLGJP
   (CONTINUED ON NEXT SHEET)
		9.13PM
		 X

SECRET		8 JANUARY 1937
STATION 5
DGO DE JNF (15620 KC)
GB96 NIH 3/50 (THIRD SHEET)
GUXVN OWAHJ AOCMN WCJLH XJLKW
SULSS VBRLQ FIOXD RJTJQ DNBMM
NVFCM SZNTD GIBEV SLLXR ITMVX
MIWNF BRMPA CTTKF BWYXG JQIGI
HPJMM XRGNT TOCHG FAHYA DCMDY
JJPXI WHKDF HUGAJ UTWNH EWTHX
LBINY YOIXY GXCXW SHVRD XHHRS
XIRXA GCQSN XFRDW IQDZX XPDPC
YOABR QGUBP PKVXH NUGJN ZJEPF
GIBXN NBVWI IYXNR NMSEQ JQSFE
   (CONTINUED ON NEXT SHEET)
		9.16PM
		 X


SECRET		8 JANUARY 1937
DGO DE JNF (15720 KC)
GB96 NIH 4/50 (FOURTH SHEET)
UKGGF TSIWK PIUMT DEVBV WVDHW
LXMWD GSBEP OUEAK YBTOY CCELN
QJQWO SMWJB XBSHF TSIQJ DVXLR
YAWEA ABRDL XVPYP OCTEA GZSNX
KYTSH BULGA RJYZL TIIWM DWBZL
SYEUG IHHPS ZZAJH XOHWE OGTRD
FFBAD ACDBX HPCXK MLFVP DOAKC
TOOQX STBLD DFOUV UOQGD LQEQS
JCCZP DZSWM CWVWA HDXFX TKAZB
WWXLJ CDWAH VOFQM DXBCN NXIRU
   (CONTINUED ON NEXT SHEET)
		9.19PM
		 X

SECRET		8 JANUARY 1937
STATION 5
DGO DE JNF (15720 KC)
GB96 NIH 5/50 (FIFTH SHEET)
XPMPL MUXRS CCSMX KRDNE UUPWO
MNAPB BWXQH ZBXCR UZGXM JJPII
WAEGD SBBQT SHNNH LUWSN GJZGS
ULAOX RRDJH WTKVS YHMBD VJCMN
VFFQU DAFCO QMQNK SXHVJ FTAUA
KKDGI CPTOM DIEBT SOLMR EIHQD
AYEHM GGMPS ZQMSK FBIQT FPDIC
ZNENK PZLIP UNRXB RAFOT CORQF
WUWAQ NFHRN DFOTL JKWLX NRMPB
CDNFH QGBWI YZOGM BYRSX TYDOG
   (CONTINUED ON NEXT SHEET)
		9.22PM
		 X

SECRET		8 JANUARY 1937
STATION 5
DGO DE JNF (15720 KC)
GB96 NIH 6/28 (SIXTH SHEET)
DAOKC WUQEO WOBDU FMEUW XVRDD
KKQNF GLKVG UTVAH VKWOB KQDXZ
BGVTP IGCPT INIAN XJCLA GXCJYN
AQYWW GIJPH CVDAN QPTXD WPXOE
GAOEV RWFCE SOXJB TKBXN RJBFD
WCJNS HMQWU
		ARITA
		9.25PM
		 X

The key and the automatic decryption of the first two parts

Here is the key:

	Key: 
	- Plugboard Sixes:    LZVEYK
	- Plugboard Twenties: WIHQPSOXMRDGFBUNAJCT
	- Breakwheel :  01111010011 (5, 20, 31, 34)
	  (then, the period is 43)
	- Start position of the Breakwheel: 39
	- ... of the Sixes half-rotor: 1
	- ... of the Twenties half-rotor: 11
	- Mode: ciphering (to decipher)
Here is the decryption of the fist two parts:

Note: Each part starts at the position where the previous part ends. Therefore, only one key is used.

	$  python3 red_tui.py \
	>	-P 01111010011 \
	>	-G LZVEYKWIHQPSOXMRDGFBUNAJCT  \
	>	-W 39,1,11 -c -V \
	>	< MSGS/8JAN37a.cry | fold -w43
	XYXALELAKIDENXIVENIKANSILAVAQEGOSAIJINOSIDA
	IGOMOTTOMONAGARAIKANARUANGOOKITOIEDOMOSONOA
	NGOONOKAIDOKUSERARURUKANOOSEIWARIRONJOOMIGI
	KIKAINOSIYOOWOTEISISERUGOTOIEDOMOIZENSONSUR
	UGINISITEKASUNIJIJITUWOMOTTESEBANITIDOKUKYO
	OTEIOOFUKUDENPOOMOTO

	$  python3 red_tui.py \
	>	-P 01111010011 \
	>	-G LZVEYKWIHQPSOXMRDGFBUNAJCT  \
	>	-W 13,5,7 -c -V \
	>	< MSGS/8JAN37b.cry |fold -w43
	KUBETUYOOHOONOHAISITOINATONIKANKEINAKUKAIDO
	KUSIUBEKIWAKENARISIKAREDOMOJISSAIMONDAITOSI
	TEKOREWOMIRUTOKIWASIYOOHOOHOOWOROOEISEZARUK
	AGIRIGAIBUYORIMITESOOGONIKYOOTUUNOKATDOKUTA
	NCHONAKIANGOOWOMOTIURUNIOITEWATATOEKIKAIWOK
	ITISERARUTOMOJUUBUNKAIDOKUNOKIKENWO

Reference

  • NSA – Document Ref ID : A71152. It contains two messages encrypted by the RED machine dating from 1937 ( link).