03.01.2015 Views

l4sfdrx

l4sfdrx

l4sfdrx

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

74 BLETCHLEY PARK AND BEYOND<br />

Venona revealed the security-minded nature of the Soviets.<br />

Much of their traffic was encrypted using a one-time pad system.<br />

This was time-consuming and slow, but they were willing to put<br />

in vast effort to protect their communications. This required huge<br />

volumes of tear-off pads with sheet after sheet of random<br />

numbers. The difficulty of generating thousands of sheets of truly<br />

random numbers should not be underestimated, and no one is<br />

clear how the Soviets made them. One individual has recalled<br />

a room full of women simply shouting out any number that<br />

came into their heads, but this seems improbable. Others have<br />

described devices not unlike lottery machines, with numbered<br />

balls. Whatever system was used, the logistical difficulties of<br />

generating many thousands of one-time pads and distributing<br />

them proved too much for wartime Russia. 7 Some time in early<br />

1942, with Moscow on the verge of evacuation and much of<br />

Soviet industry badly dislocated, operators began to run out of<br />

pads. The KGB department that printed them committed the<br />

fatal error of reprinting twenty-five thousand pages. This made<br />

a small proportion of the messages, which should have been<br />

unbreakable, vulnef3.ble to cryptanalysis. Far worse, they were<br />

sent to KGB units as well as to military and diplomatic users.8<br />

The Venona project that exploited this mistake began in<br />

Washington. The Americans had collected Soviet messages during<br />

the war, but they lacked time to work on them. On 1 February<br />

1943 the US Army's code-breaking service, called the Signals<br />

Intelligence Service, began a modest effort to see if it could<br />

exploit Soviet diplomatic communications. The telegrams had<br />

been collected at Arlington Hall, in Virginia, a former girls' school<br />

which was commandeered by the Army as its main code-breaking<br />

centre. Interest increased dramatically when it was discovered<br />

that some of the streams of traffic related to espionage. In October<br />

1943 a young code-breaker, Lieutenant Richard Hallock, a Signal<br />

Corps reserve officer who had been a peacetime archaeologist<br />

at the University of Chicago, was looking at Soviet commercial<br />

traffic when he realised that the Soviets had committed a terrible<br />

error and were reusing their pads. This was an astonishing

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!