Home Page The Red Home Page
|
Introduction – Five-Digit TrafficThe RED machine was used by Japan to transmit encrypted diplomatic messages between the two world wars. Transmissions were made by radio, but also by telegraphy on public networks. RED messages were identified by the first group, which consisted of five digits. This identification was used by both official correspondents (Japanese agencies) and foreign cryptanalysts (US, etc.) to distinguish this traffic from other types of traffic. Two Encryption NetworksThere were two RED networks:
Keys UsedThe encryption keys had to be shared between the correspondents. A RED key is divided into two parts: Structure of a RED key
The 5-digits indicatorThe key used was primarily specified by the value of the numeric indicator, except for the plugboard configuration. Thus, in the case of the message of January 8, 1937, exchanged between Tokyo and Berlin (see page …), the indicator 02143 corresponded to the following key:
The keying depends on the digital indicator. In fact, the document DOCID 4001123 (see References) shows us a more complex view. Using values dependent on the date, subtracted from the digital indicator, provides the different elements of the key. An indicator was chosen from a list of 240 values. This list was never changed. Plugboard settingThe Plugboard value was identical for all messages sent during a 10-day period. A month was divided into three periods:
The message's timestamp specified the time period and therefore the plugboard to be used. Note: At the end of the RED machine's use, the period of use for a plugboard configuration was reduced to a single day. At first glance, one might think that the plugboard configuration came from a key table. In fact, Rowlett (see SIS's Cryptanalysis) discovered that this configuration followed an algorithm. Thus, the Japanese code-room clerks could predict this configuration in advance. Note: If you don't need a key table, this simplifies the procedures. Indeed, embassies were spread all over the world. Distributing key tables to them is not easy. Conversely, security is reduced: if the enemy discovers the algorithm for generating the plugboard configurations (which was the case), they no longer need to discover them through cryptanalysis! Message Length, TrafficThe message of January 8, 1937, was found to be approximately 1,300 characters long (see Genuine messages). This message was divided into five parts but used a single key. I believe this division into several parts was intended to reduce the risk of having to retransmit the entire message in the event of errors. We also know that Rowlett & Kullback analyzed an extremely long message. It dated December 21, 1933, and was over 2,000 characters long. During the Manchurian events of 1936, traffic increased, between 10 and 15 messages per day (Far East network). DraftingThe RED machine only allowed the transmission of the 26 letters of the alphabet. Thus, the highlighted Roma-ji vowels were doubled. For example, Yōkoso is written YOOKOSO. Here are some transformations:
The drafting observed in 1941 for the Purple machine does not apply here in 1937 (see F. Weierund). Thus, the bigrams AI and EI are not transformed. Over the years, the drafting rules and standard phrases evolved. In 1939 and later, these rules remained the same for both the RED and PURPLE systems. This was a great help in the cryptanalysis of the PURPLE machine. ReferencesBooks and articles
Internet
|