Fish (cryptography)
Fish (sometimes FISH) was the UK's GC&CS Bletchley Park codename for any of several German teleprinter stream ciphers used during World War II.[2][3][4] Enciphered teleprinter traffic was used between German High Command and Army Group commanders in the field, so its intelligence value (Ultra) was of the highest strategic value to the Allies.[5] This traffic normally passed over landlines, but as German forces extended their geographic reach beyond western Europe, they had to resort to wireless transmission.[6]
History
In June 1941, the British "Y" wireless intercept stations, as well as receiving Enigma-enciphered Morse code traffic, started to receive non-Morse traffic which was initially called NoMo.[7] NoMo1 was a German army link between Berlin and Athens, and NoMo2 a temporary air force link between Berlin and Königsberg. The parallel Enigma-enciphered link to NoMo2, which was being read by Government Code and Cypher School at Bletchley Park, revealed that the Germans called the wireless teleprinter transmission systems "Sägefisch" (sawfish), so the name "Fish" was adopted for this traffic.[8] The enciphering/deciphering equipment was called a Geheimschreiber (secret writer) which, like Enigma, used a symmetrical substitution alphabet. The teleprinter code used was the International Telegraph Alphabet No. 2 (ITA2)—Murray's modification of the 5-bit Baudot code.
When the Germans invaded Russia, during World War II, they began to use a new type of enciphered transmission between central headquarters and headquarters in the field. The transmissions were known as Fish at Bletchley Park. The German army used Fish for communications between the highest authorities in Berlin and the high-ranking officials of the German Army on the field. The Fish traffic which the personnel at Bletchley Park intercepted, contained discussions, orders, situation reports and many more details about the intentions of the German Army. However, these transmissions were so challenging to decrypt that even with the assistance of decryption machines, such as Colossus, the messages could not be read until several days later.[9] “Vital intelligence was obtained about Hitler’s intentions in the run up to D-Day 1944.”[10]
Traffic code names
Tunny
The NoMo1 link was initially named Tunny, a name which went on to be used both for the Lorenz SZ40/42 machines and for the Bletchley Park analogues of them. The NoMo1 link was subsequently renamed Codfish.[11] A large number of Tunny links were monitored by the Y-station at Knockholt and given names of fish. Most of these were between the Oberkommando der Wehrmacht (German High Command, OKW) in Berlin and German army commands throughout occupied Europe. Cryptanalysis of the Lorenz cipher at Bletchley Park, assisted initially by a machine called Heath Robinson and later by the Colossus computers yielded a great deal of valuable high-level intelligence.
Name | Between | |
---|---|---|
Bream | Berlin | Rome |
Herring | Rome | Tunis |
Jellyfish | Berlin | Paris |
Grilse | Berlin | La Roche |
Mullet | Berlin | Oslo |
Turbot | Berlin | Copenhagen |
Dace | Berlin | Königsberg |
Whiting | Königsberg | Riga |
Perch | Königsberg | Central Belarusse |
Squid | Königsberg | N Ukraine |
Octopus | Königsberg | E Ukraine |
Stickleback | Königsberg | S Ukraine |
Smelt | E Ukraine | S Ukraine |
Grayling | Königsberg | Belgrade |
Tarpon | Berlin | Bucharest |
Gurnard | Berlin | Belgrade |
Chubb | Belgrade | Salonica |
Flounder | Salonika | Rhodes |
Codfish | Berlin | Salonika |
Tunny decrypts provided high-grade intelligence in an unprecedented quality. Walter Jacobs, a US Army codebreaker who worked at Bletchley Park, wrote in an official report on the operation to break Tunny that in March 1945 alone 'upward of five million letters of current transmission, containing intelligence of the highest order, were deciphered'.[13]
Sturgeon
This was the name given to traffic encoded with the Siemens and Halske T52 Geheimschreiber.[14][15] In May 1940, after the German invasion of Norway, the Swedish mathematician and cryptographer Arne Beurling used traffic intercepted from telegraph lines that passed through Sweden to break this cipher.[16] Although Bletchley Park eventually diagnosed and broke Sturgeon, the relatively low value of the intelligence gained, compared to the effort involved, meant that they did not read much of its traffic.
Thrasher
This was the name used for traffic enciphered on a Geheimschreiber that was probably the Siemens T43 one-time tape machine. This was used only on a few circuits, in the later stages of the war and was diagnosed at Bletchley Park, but considered to be unbreakable.
List of senior involved staff at Bletchley Park
Including both executives and cryptographers on FISH (Tunny) in the Testery.
- Ralph Tester — linguist and head of Testery
- Max Newman — mathematician and codebreaker who later set up the Newmanry
- Jerry Roberts — shift-leader, linguist and senior codebreaker
- Peter Ericsson — shift-leader, linguist and senior codebreaker
- Victor Masters — shift-leader
- Denis Oswald — linguist and senior codebreaker
- Peter Hilton — codebreaker and mathematician
- Peter Benenson — codebreaker
- Peter Edgerley — codebreaker
- John Christie — codebreaker
- John Thompson — codebreaker
- Roy Jenkins — codebreaker
- Tom Colvill — general manager
See also
Notes
- ↑ "The Ultra Americans: The U.S. Role in Breaking the Nazi Codes: Thomas Parrish: 9780812830729: Amazon.com: Books".
- ↑ Mache 1986, pp. 230–242
- ↑ Deavours & & Kruh, pp. 243–247
- ↑ Mache 1989, pp. 97–117
- ↑ Copeland 2006, p. 47
- ↑ Lewin 2001, p. 130
- ↑ Copeland 2006, p. 338
- ↑ Gannon 2006, p. 102
- ↑ F.H. Hinsley and Alan Stripp (eds.) Code Breakers: The Inside Story of Bletchley Park, Oxford University Press, 1993.
- ↑ "Professor Bill Tutte: Mathematician who, as a Bletchley Park codebreaker, gained access to the ciphers of the German Army High Command". The Times.
- ↑ Gannon 2006, p. 170
- ↑ Copeland 2006, p. 41
- ↑ S. Wylie, Breaking Tunny and the birth of Colossus, Action This Day (eds. M. Smith and R. Erskine), Bantam Press, London, 2001, pp. 317-341.
- ↑ Weierud 2006, pp. 307–327
- ↑ Smith 2006, p. 35
- ↑ McKay 2006, pp. 328–333
References
- Bauer, Friedrich L. (2006), Origins of the Fish Cypher Machines in Copeland 2006, pp. 411–417
- Copeland, B. Jack, ed. (2006), Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, ISBN 978-0-19-284055-4
- Deavours, Cipher A.; Kruh, Louis (October 1986), "Appendix Mechanics of the German Telecipher Machine", Cryptologia, 10 (4): 230–242, doi:10.1080/0161-118691861074 (reprinted in Cryptology: Yesterday, Today and Tomorrow, Artech House, Norwood, 1987)
- Gannon, Paul (2006), Colossus: Bletchley Park's Greatest Secret, London: Atlantic Books, ISBN 978-1-84354-331-2
- Lewin, Ronald (1978), Ultra Goes to War: The Secret Story, Classic Military History, Harmondsworth, England: Penguin Books (published 2001)
- Mache, Wolfgang W. (October 1986), "Geheimschreiber", Cryptologia, 10 (4): 230–242, doi:10.1080/0161-118691861065 (Reprinted in: Cryptology: Yesterday, Today and Tomorrow, Artech House, Norwood, 1987)
- Mache, Wolfgang W. (April 1989), "The Siemens Cipher Teletype in the History of Telecommunications", Cryptologia, 13 (2): 97–117, doi:10.1080/0161-118991863817 (reprinted in Selections from Cryptologia: History, People, and Technology, Artech House, Norwood, 1998)
- McKay, Craig (2006), "German Teleprinter Traffic and Swedish Wartime Intelligence", in Copeland, B Jack, Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, ISBN 978-0-19-284055-4
- Smith, Michael (2006), "How it began: Bletchley Park Goes to War", in Copeland, B Jack, Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, ISBN 978-0-19-284055-4
- Weierud, Frode (2006), "Bletchley Park's Sturgeon—The Fish That Laid No Eggs", in Copeland, B Jack, Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, ISBN 978-0-19-284055-4