23.12.2012 Views

Piercing the Fog - Air Force Historical Studies Office

Piercing the Fog - Air Force Historical Studies Office

Piercing the Fog - Air Force Historical Studies Office

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Piercing</strong> <strong>the</strong> <strong>Fog</strong><br />

to assess <strong>the</strong>ir potential intelligence value and pass this information to<br />

appropriate government sections and commanders.<br />

By far <strong>the</strong> most difficult of <strong>the</strong>se tasks was <strong>the</strong> first. Given <strong>the</strong> complexity<br />

of <strong>the</strong> ciphering device <strong>the</strong> German military used for most high-grade<br />

messages-<strong>the</strong> Enigma machine-deciphering was a daunting job. Each of <strong>the</strong><br />

German services used Enigma machines, but with differing keys. The British<br />

and later <strong>the</strong> Allied teams at BP worked on all of <strong>the</strong> varied keys, only some of<br />

which <strong>the</strong>y succeeded in breaking. Not all keys that were read could be read<br />

consistently. The German Army’s signals were most difficult for <strong>the</strong> Allied<br />

code breakers, and those of <strong>the</strong> Lufrwuffe, <strong>the</strong> most lucrative. Ironically, it was<br />

<strong>the</strong> seeming impossibility of breaking into <strong>the</strong> Enigma that made it such a<br />

unique and unprecedented source of intelligence. Convinced that <strong>the</strong> system was<br />

impenetrable, <strong>the</strong> Germans made extensive use of Enigmamachines throughout<br />

<strong>the</strong> war, relying almost exclusively on <strong>the</strong>m for <strong>the</strong> overwhelming majority of<br />

<strong>the</strong>ir high-grade enciphering. Even had <strong>the</strong> Germans wanted to do so, replacing<br />

Enigma with new machines would have been very difficult, given <strong>the</strong> large<br />

number in use.4<br />

The Enigma was indeed a formidable machine. Originally adapted by <strong>the</strong><br />

German armed forces from a commercial machine in <strong>the</strong> late 1920s and<br />

modified several times <strong>the</strong>reafter, it operated somewhat along <strong>the</strong> lines of a<br />

typewriter. The keys were attached to a complex system of wires, rotary wheels<br />

(initially numbering three, with more added later), electric lights, and plugboard<br />

connectors. As each letter was typed on <strong>the</strong> keyboard, it sent an impulse through<br />

<strong>the</strong> machine which set rotary wheels into motion and, based on apredetermined<br />

setting, caused a different letter to light up. To decipher <strong>the</strong> message, <strong>the</strong><br />

recipient had to have an identical machine, set to <strong>the</strong> proper master setting, on<br />

which an operator would type <strong>the</strong> enciphered message in groups of five letters.<br />

The machine would reverse <strong>the</strong> process and light up, letter by letter, with <strong>the</strong><br />

original message.<br />

Although Polish cryptanalysts had begun to read Enigma messages as early<br />

as 1933, subsequent German modifications and <strong>the</strong> variety of possible settings<br />

meant that, as one American historian has summarized, “The breaking of <strong>the</strong><br />

Enigma was not a one-time feat, but an extraordinary, continuous proces~.”~<br />

Because of <strong>the</strong> number of interchangeable wheels, <strong>the</strong> potential settings for each<br />

one, <strong>the</strong> possible plug connections, and <strong>the</strong> variety of master settings, it has<br />

been estimated <strong>the</strong> number of possible settings on an Enigma could have been<br />

as high as 2.69 X loz3 for each key.6 During <strong>the</strong> war, different elements of <strong>the</strong><br />

German military used more than 50 separate master keys or ciphers (e.g., Red<br />

was <strong>the</strong> general-purpose GAF code, while Garlic was <strong>the</strong> GAF wea<strong>the</strong>r key).’<br />

The first decipherments were carried out painstakingly by hand with <strong>the</strong><br />

assistance of cribs-clues that might be revealed by <strong>the</strong> repetitious use of<br />

certain words or phrases, or even by <strong>the</strong> style of specific operators. This<br />

approach meant extensive delays between transmission of <strong>the</strong> original German<br />

60

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!