Enigma

Encryption is about keeping information secret, about Privacy. Governments have no reservations about using it and abusing it. They spend millions on security and, quite possibly billions on abusing it. Spying on us is policy. Governments that regard us as enemy are, in the main telling us that they are enemies of us. Whence various attacks on us carried out from above. But that is not the point of this little essay. During the Second World War the Wehrmacht was using cypher machines, which were high technology at the time. Breaking their codes was even more high tech. It involved first class minds as well as first class technology. That is what it got at Bletchley. It worked against Enigma & Lorenz cyphers. Fairly recently there was a Cypher Challenge with the objective being to intercept and break Lorenz signals. It was won by a German programmer - see Cypher Challenge Winner

We used  Y-Stations to pick up enemy radio traffic. One important one was Knockholt Listening Station. The product was decrypted by The Titans Who Won The Key Battle using Colossus.

 

Y-Stations - ex Wiki
Y-stations were British signals intelligence collection sites initially established during World War I[1] and later used during World War II. These sites were operated by a range of agencies including the Army, Navy and RAF plus the Foreign Office (MI6 and MI5), General Post Office and Marconi Company receiving stations ashore and afloat.

The "Y" stations tended to be of two types, Interception and Direction Finding. Sometimes both functions were operated at the same site with the direction finding (D/F) hut being a few hundred metres away from the main interception building because of the need to minimise interference. These sites collected radio traffic which was then either analysed locally or if encrypted passed for processing initially to Admiralty Room 40 in London and during World War II to the Government Code and Cypher School established at Bletchley Park in Buckinghamshire.

In World War II a large house called "Arkley View" on the outskirts of Barnet (now part of the London Borough of Barnet) acted as a data collection centre at which traffic was collated and passed to Bletchley Park,[2] it also acted as a "Y" station. Many amateur radio ("ham") operators supported the work of the "Y" stations, being enrolled as "Voluntary Interceptors".[3] Much of the traffic intercepted by the "Y" stations was recorded by hand and sent to Bletchley on paper by motorcycle couriers or, later, by teleprinter over post office land lines.[4] The name derived from "Wireless Interception" or "WI".[5] The term was also used for similar stations attached to the Intelligence Corps' India outpost, the Wireless Experimental Centre (W.E.C.) outside Delhi.

 

The Titans Who Won The Key Battle
Ralph Erskine cracks open a tale of the men and their Heath Robinson machines that decrypted German ciphers

Colossus was the special-purpose electronic computer used by Bletchley Park code-breakers to solve messages enciphered on the German Lorenz SZ 40/42 teleprinter cipher machine, which was code-named Tunny.

Colossus entered service in February 1944, but Bletchley had attacked Tunny manually from 1941 onwards. A substantial part of this book explains how Tunny messages were broken, while about ten of its 48 chapters and appendices concern Colossus itself.

Cracking Tunny traffic was initially slow. Later, "depths" (messages transmitted with identical machine settings) and poor German procedures enabled Bletchley to read nearly every Tunny message from June until October 1942, when a weak indicating system was changed. Tommy Flowers, the inventor of Colossus, describes being astonished that "the Germans never realised that their secret code could be broken". However, wartime German records and a postwar US Target Intelligence Committee (Ticom) interrogation report show that they knew about Tunny's weaknesses, which is why they improved it constantly.

In a brilliant feat of cryptanalysis, Bill Tutte, a diffident Cambridge University chemistry research student, had deduced Tunny's structure from a stretch of Tunny key (characters used to encipher plain text) found by Colonel John Tiltman in August 1941. Bletchley's research section then joined in to solve the complete machine by January 1942. They discovered that Tunny incorporated two sets of five mechanical wheels, with one set stepping irregularly, controlled by two so-called motor wheels. The wheels had a total of 501 settable cams that produced the equivalents of teleprinter "marks" and "spaces" and endowed Tunny with an astronomical key-space. The output of both sets of wheels was combined to generate streams of key, which were added to Baudot-Murray teleprinter code to encipher it.

As Tunny became more complex, breaking messages manually became increasingly difficult. However, being electromechanical, Tunny could produce only pseudo-random key, which left various statistical and linguistic characteristics in messages open to exploitation. Tutte invented a statistical method for breaking single Tunny messages in November 1942, but it would have taken years to manually make the calculations for even one message. Max Newman, a Cambridge mathematician (and a "supreme facilitator") proposed fast machinery for the purpose. The device, nicknamed Heath Robinson after the cartoonist, entered service in June 1943. It had few valves and was not wholly successful, being slow and unable to fully synchronise the two paper tapes being compared. But it was vital to subsequent successes because it revealed problems that were later eliminated when designing Colossus.

In a parallel development, and in spite of Bletchley's scepticism, Flowers and a gifted Post Office team had slaved on Colossus for almost a year without any official requisition. Colossus I ran a looped tape containing cipher text at 30mph, while about 1,500 valves, an unprecedented number, performed tests and emulated Tunny functions. Colossus I counted the number of times certain events occurred and recorded scores - with the highest revealing some wheel settings. Like later Colossi, it lacked stored programming. Fortunately for Flowers, both his boss, Gordon Radley, and Sir Stanley Angwin, the Post Office chief engineer, had backed him by making considerable design and production facilities available. Otherwise, Colossus II with its 2,500 valves, would not have been in service before D-Day to provide crucial intelligence about Hitler's reactions to Allied deception plans. Colossus II used parallel processing to handle data at 25,000 characters a second - a speed that postwar computers did not reach for some years.

Flowers felt that he did not receive the recognition he was due, and he was embittered. He was overlooked in a 1947 Post Office reorganisation, and he thought that his proposals for postwar electronic telephone exchanges were ignored. But one wonders: electronic telephone exchanges proved very difficult to develop, and the 1963 Highgate Wood trial exchange was "a magnificent failure".

Tunny, which was used mainly between the German High Command and army groups, provided more strategic intelligence than Enigma. Not many Tunny decrypts survive; so little Tunny intelligence appears in this book.

However, although not mentioned here, Tunny decrypts between June and October 1942 revealed that Kriegsmarine B-Dienst code-breakers were solving the principal Allied convoy code. In a massive blunder, that code was not replaced until June 1943, resulting in huge losses of ships and human life, especially during the deadly convoy battles of March 1943. The delay was largely organisational, but senior managers at Bletchley cannot have pressed hard enough to get it changed.

Breaking Tunny traffic was the greatest code-breaking feat of the war. The US Army's reconstruction of Japan's Purple diplomatic cipher machine was comparable to Bletchley's solution of Tunny, but ascertaining Purple's daily settings was relatively simple; whereas finding Tunny's wheel patterns and settings required the highest cryptanalytical skills and involved advanced statistical techniques and some of the most complex electronic equipment of the war. Even intercepting Tunny signals posed immense problems; it eventually required more than 800 staff at Knockholt listening station near Sevenoaks. From November 1942 onwards, Knockholt intercepted almost 168,000 transmissions, which yielded 13,500 decrypts, with 63 million characters; more than 70 per cent of the decrypts were made after June 1944, when three or more Colossi were in service.

Colossus includes contributions by the machine's designers and the cryptanalysts (such as Tutte and Donald Michie) and operators who used it, as well as intelligence historians. It should put paid to myths that are still so prevalent that they appear on a national museum's website: that Alan Turing "helped to invent" Colossus (he did not, although he made major contributions to methods for solving Tunny messages), and that it "cracked the Enigma codes".

Colossus is inevitably quite complex at times (for examples of breaking Tunny, visit www.codesandciphers.org.uk/anoraks/pods ); but with application, non-mathematicians should be able to follow most of it. Even in the technical appendices, Jack Copeland and Frank Carter explain with admirable clarity the complexities of "Turingery" and "rectangling". Some chapters are versions of papers that have appeared previously, sometimes in obscure places. Most achieve a high standard, although a few should have been omitted, and others appear to have been cut too heavily. This book will appeal to anyone interested in Colossus, code-breaking or Bletchley Park. Copeland and the other contributors have rightly done Flowers and the Tunny code-breakers proud.

Ralph Erskine is a retired barrister who has written extensively on signals intelligence.

 

THE Y STATIONS
were British Signals Intelligence collection sites initially established during World War I and later used during World War II. These sites were operated by a range of agencies including the Army, Navy and RAF plus the Foreign Office (MI6 and MI5), General Post Office and Marconi Company receiving stations ashore and afloat.
The "Y" stations tended to be of two types, Interception and Direction Finding. Sometimes both functions were operated at the same site with the direction finding (D/F) hut being a few hundred metres away from the main interception building because of the need to minimise interference. These sites collected traffic which was then either analysed locally or if encrypted passed for processing initially to Admiralty Room 40 in London and during World War II to the Government Code and Cypher School established at Bletchley Park in Buckinghamshire.
In World War II a large house called "Arkley View" on the outskirts of Barnet acted as a data collection centre at which traffic was collated and passed to Bletchley Park, it also acted as a "Y" station. Many amateur ("ham") radio operators supported the work of the "Y" stations, being enrolled as "Voluntary Interceptors". Much of the traffic intercepted by the "Y" stations was recorded by hand and sent to Bletchley on paper by motorcycle couriers or, later, by teleprinter over post office land lines.
The term was also used for similar stations attached to the Intelligence Corps' India outpost, the Wireless Experimental Centre(W.E.C.) outside Delhi.
In addition to wireless interception, specially constructed Y stations also undertook direction finding on enemy wireless transmissions. This became particularly important in the Battle of the Atlantic (1939–1945) where locating U-boats became a critical issue. Admiral Dönitz told his commanders that they could not be located if they limited their wireless transmissions to under 30 seconds, but skilled D/F operators were able to locate the origin of their signals in as little as 6 seconds. The design of land based D/F stations preferred by the allies in World War II was the U-Adcock system, which consisted of a small, central operator's hut surrounded by four 10 m high vertical aerial poles usually placed at the four compass points. Aerial feeders ran underground and came up in the centre of the hut and were connected to a direction finding goniometer and a wireless receiver that allowed the bearing of the signal source to be measured. In the UK some operators were located in an underground metal tank. These stations were usually located in remote places, often in the middle of farmers' fields. Traces of World War II D/F stations can be seen as circles in the fields surrounding the village of Goonhavern in Cornwall

 

South East England ex Wiki
Much of the Battle of Britain was carried out from this region, especially in Kent. RAF Bomber Command was based at High Wycombe. RAF Medmenham at Danesfield House, west of Marlow in Buckinghamshire, was important for aerial reconnaissance. Operation Corona based at RAF Kingsdown (at West Kingsdown next to Brands Hatch in Kent, between the A20 and M20) was implemented to confuse German night fighters with native German-speakers, and coordinated by the RAF Y Service.

 

http://electrospaces.blogspot.co.uk/p/sigint.html

http://archive.today/GqGnu

http://hausmieten.potiori.com/Y-stations.html

http://www.countrylife.co.uk/news/property-news/country-houses-for-sale-and-property-news/bletchley-outpost-farm-house

During the Second World War, Ivy Farm House in Kent was an outpost to Station X, the Bletchley Park decoding centre made famous by the film Enigma. The house has just been launched on the market.

Nissen huts were erected within the grounds of the farm, in which a handful of female workers worked day and night. Their duties included typing jumbled letters on to coded tapes and deciphering radio signals from the wireless operators who sat listening to German radios from within the farmhouse.

Read more at http://www.countrylife.co.uk/news/property-news/country-houses-for-sale-and-property-news/bletchley-outpost-farm-house#FoZpmsjrSVkCPVAj.99

Lorenz Cipher ex Wiki
The Lorenz SZ40, SZ42A and SZ42B were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz AG in Berlin and the model name SZ was derived from Schlüsselzusatz, meaning cipher attachment. The instruments implemented a Vernam stream cipher.

British cryptographers, who referred to encrypted German teleprinter traffic as Fish, dubbed the machine and its traffic Tunny.[1]

The SZ machines were in-line attachments to standard Lorenz teleprinters. An experimental link using SZ40 machines was started in June 1941. The enhanced SZ42 machines were brought into substantial use from mid-1942 onwards for high-level communications between the German High Command in Berlin, and Army Commands throughout occupied Europe.[2] The more advanced SZ42A came into routine use in February 1943 and the SZ42B in June 1944.[3]

Wireless telegraphy (WT) rather than land-line circuits was used for this traffic.[4] These non-Morse (NoMo) messages were picked up by Britain's Y-stations at Knockholt and Denmark Hill and sent to Government Code and Cypher School at Bletchley Park (BP). Some were deciphered using hand methods before the process was partially automated, first with Robinson machines and then with the Colossus computers.[5] The deciphered messages made an important contribution to Ultra military intelligence.

 

http://www.juliansanchez.com/2012/07/06/a-friday-puzzler-un-xoring-two-plaintexts/
I’ve been reading Cryptography Engineering by Bruce Schneier, Niels Ferguson, and Tadayoshi Kohno, on the theory that someone who writes about privacy and surveillance as much as I do ought to have somewhat more detailed understanding of how modern cryptosystems work, even if I’m never going to be competent to work with the actual code. At one point, the authors mention a potential problem with certain kinds of ciphers. Stream ciphers work by combining a secret cryptographic key with a (supposedly) unique number—a random shared string or a “nonce“—to generate a “keystream.” The keystream is then XORed with the plaintext message to produce the encrypted ciphertext.

For the non-computer-geeks: that just means that for every bit in the sequence of ones and zeroes that makes up the plaintext, if the keystream has the same value in that position, then the corresponding bit of the ciphertext will get written as a 0, and if they have different values in that position, the corresponding bit of the ciphertext gets written as a 1. (This corresponds to the logical operation “exclusive or”: It outputs a 1, meaning “true,” just in case one or the other but not both of the inputs is true.) So, for instance, the capital letter “A” is normally encoded as the binary string: 01000001. A lowercase “z” is represented as 01111010. If you XOR them together, you get: 00111011. If you XOR in the “z” again, you get “A” back out… but that assumes you know at least one of the two original pieces of the puzzle: There’s a vast number of different ways to XOR two bytes together to produce 00111011.

In theory, there should be no way to reverse the process

http://military.wikia.com/wiki/Y-stations

http://www.secret-bases.co.uk/secret5.htm

interesting

https://www.google.com/culturalinstitute/exhibit/the-women-of-bletchley-park/QQZ2YSRa?hl=en

 

http://www.doc88.com/p-746870777079.html

 

Knockholt Makes The News     [ 1 November 2019 ]
It is GCHQ's centenary today so the Mail tells us about Ivy Farm, the Knockholt Listening Station where they picked up Enigma signals from the Wehrmacht  for Bletchley Park and decryption - see The Titans Who Won The Key Battle. Ivy Farm did not do decrypts or work for GCHQ but the Mail does try.