21
DOCID: ,3565448 SECRET German Agent Systems of World War II BY FRANK W. LEWIS INTRODUCTION One of the more intriguing stories of U.S. cryptanalytic success during World War II concerns itself with the German cloak-and- dagger boys in South America. Leafing through the pages of news- weeklies of the period, one would hardly suppose that credit for rounding up the several gangs of conspirators belonged to other than the usual under-cover law enforcement groups; and although the story 88 told was highly exciting, only by knowledge of the behind- the-scenes activity of our own cryptanalytic group can one ap- preciate the true picture. Since few records are available from which to draw examples (or corroborate details) this present account represents the personalized understanding of the author as to what happened, as it happened, within the purview of the Signal Intelligence Section of the Office of the Chief Signal Officer (one of the phases the Army portion of the Agency's predecessors went through). A certain amount of charity should be shown toward the author if he seems particularly vague in matters of geography or calendar events-the story is basically true, even though examples are illUs- trative rather than actual. Long before Pearl Harbor, German agents were active in Spain and South America, carrying on their traditional role in the very thinly veiled disguise of commercial representatives. In particular, a respectable commercial aura was given to their communications, with banking addresses being used on supposedly straightforward en- coded, but presumably business-type, financial messages. An ad- dress such as SUDAMERIAT WEDEKIND appeared innocent enough but actually covered arrangements for contact,pick-up points, and general activities of a network of German agents. Since we were enough to break their systems and (because of our 24-hour watch) were reading messages before the recipient had even picked up his copy, the round-up of the entire gang was due in an appreciable measure to our cryptanalytic effort. 1 SteRE' A,pprov'ed for Release b'y' on J6-05-2009, FC)I.A, Case # 52224 Aooeal #3370

German Agent Systems of World War II

Embed Size (px)

Citation preview

Page 1: German Agent Systems of World War II

DOCID: ,3565448

SECRET

German Agent Systems ofWorld War II

BY FRANK W. LEWIS

~,et

INTRODUCTION

One of the more intriguing stories of U.S. cryptanalytic successduring World War II concerns itself with the German cloak-and­dagger boys in South America. Leafing through the pages of news­weeklies of the period, one would hardly suppose that credit forrounding up the several gangs of conspirators belonged to other thanthe usual under-cover law enforcement groups; and although thestory 88 told was highly exciting, only by knowledge of the behind­the-scenes activity of our own cryptanalytic group can one ap­preciate the true picture.

Since few records are available from which to draw examples (orcorroborate details) this present account represents the personalizedunderstanding of the author as to what happened, as it happened,within the purview of the Signal Intelligence Section of the Office ofthe Chief Signal Officer (one of the phases the Army portion of theAgency's predecessors went through).

A certain amount of charity should be shown toward the authorif he seems particularly vague in matters of geography or calendarevents-the story is basically true, even though examples are illUs­trative rather than actual.

Long before Pearl Harbor, German agents were active in Spainand South America, carrying on their traditional role in the verythinly veiled disguise of commercial representatives. In particular,a respectable commercial aura was given to their communications,with banking addresses being used on supposedly straightforward en­coded, but presumably business-type, financial messages. An ad­dress such as SUDAMERIAT WEDEKIND appeared innocent enough butactually covered arrangements for contact,pick-up points, andgeneral activities of a network of German agents. Since we werefortun~te enough to break their systems and (because of our 24-hourwatch) were reading messages before the recipient had even pickedup his copy, the round-up of the entire gang was due in an appreciablemeasure to our cryptanalytic effort.

1 SteRE'

A,pprov'ed for Release b'y' r\~S,A onJ6-05-2009, FC)I.A, Case # 52224Aooeal #3370

Page 2: German Agent Systems of World War II

DOClD:SECkEl

3565448GERMAN AGENT SYSTEMS F. W. LEWIS 5EERET

Three cryptographic systems come to mind (which have "SUCcellll

story" overtones) that bear setting down on paper, since a crypt­analytic moral can perhaps be drawn from an account of our trials--and errors. . . .

We will briefly discuss the breaking of a grille tranapoeition; aKryha enciphennent (of both plain language and code); and a dic­tionary code, with one or two mildly embarassing gaffes recounted toillustrate the rocky road of the cryptanalyst in his pursuit of plaintext. (By tempering success stories with confessions of less-than·brilliant eXCUrllions, perhaps one can get away with what otherwisewould appear chest-thumping!) It should also be understood thatthe original analysis of mOllt of the agent systems was very compe·tently perfonned by agencies other than our own; the dictionary codeand Kryha happen to be two examples wherein we independentlyplayed a critical role.

Lest the retlder react with a "so whs.t's the Big Deal?" to thispronouncement of success on what might now be.considered relativelyineecure systems, the stage should be set according to the times ofthis period piece. Of the 40 or 50 "agencY personnel," only a handfulwere available for the entire German problem-diplomatic, militaryand agent. (The stories of GEC, the double additive system, andGEE, the one-time.pad system have already been recounted inthe Journal.) Very little machine help (in the fonn of relativelyprimitive IBM equipment) could be expected, and neither the levelof sophistication. of cryptographic techniques nor the accumulatedskill of wartime effort on increasingly complex problems had reachedmaturity. In those days. we learned by doing, with no body ofaccumulated knowledge to fall back on.

GRILLI: TRANSPOSITION

Some hesitancy is felt in giving any detailed account of the Berlin·Rio grille transposition with which the SIS section was mOllt familiar.The reason is that the Coast Guard Unit (with which we maintainedexcellent liaison) did the origirial solution of this, along with scores ofsimilar transposition and transposition/substitution systems, and thetechnical aspects are very well covered in. the document "History ofCoast Guard Unit No. 387, 1940-1945."

Our role was one of operational eolution of current messages.Since we had a couple of people on the "graveyard shift", we were inthe position of being able to have copy relayed to us within a short

time after transmission, to solve the messages, and to get word ofiinportant actions to the proper law enforcement authorities before theagent for whom the message was intended could pick up his copy.

The system. which started in September 1941, involved the use. of a 13:r. 19 grille, with 126 active positions (including 16 nulls).

Traffic was sent in blocks of 50 5·letter groups (except for the firstblock, which contained an indicator, to make the total 61 groups).The indicator (using a. 1"'{), A-J substitution) showed the page fromwhich a transposition key was obtained. and in which of the 8 pouiblepositions the grille was to be used, designating the comers A-D onoue face and E-H on the other. Thua, an indicator group of AGIMFshowed page 179 as the key source, with the last letter, F, designatingthat corner of the grille as the upper left setting. The transposedcipher version was effected by copylng the lettsra down the columndesignated No.1, up column 2, down 3, up 4, etc.

(b).( 1)

2

(b) (1)(b) (3)-50 USC 403(bl (3)-18 USC 798(b) (3) -P. L. 86-36

3

Page 3: German Agent Systems of World War II

DOClD: 3565448U.t;HMAN AGENT SYSTEMS

\l~i l(i1)(3)-50 lSC 4033)-18 lSC 798

) -P.L. 86-36

I

: t

F. W. LEWIS

USAGE 0", THE KRYHA CIPIIER MACHINE

S!CKE'F

.)

I had considered including a much-abbreviated story of the prin­ciples and solution of the Kryha (particularly as it applies to Germanagent usage). However, the absence of a generally usable treatiseon this machine prompted my good friend Lambros D. Callimahosto suggest an altemative-extensive cribbing from a rather long andcomplete treatment written by me 20 years ago. (This is in keepingwith advice from my mentor, Dr. Kullback, who feels the reprinting inits entirety of such technical reports as that covering GEE providesan interesting and informative means of tying together the old andthe new approaches. In reading such articles as appeared in theJournal of July 1959 on the KEYWORD system, more recent arrivalson the cryptanalytic scene may be stimulated by the vicarious exper­ience of such "You Are There" reporting.) Therefore, no furtherapology may be necessary to those who may recognize the followingportion as a 1942 report.

Usage by the German agents involved two models of the Kryha.The earlier model had as the basic mechanism a selector wheel with17 fixed gear-teeth to control the stops. The later model permitteda variable number of stops by means of the adjustment of any or allof 52 screws which acted as stop controls. As it is more practical todescribe the old Kryha in terms of the new model than it would be to

4 5 SECkEl

Page 4: German Agent Systems of World War II

D - Selector WheelE - StopaF - Selector Arm which engages the

stopa

F. W. LEWIS

NEW TYPE "KRYHA" CIPHER MACHINE

A - Plain-text ComponentB - Cipher-text ComponentC - Hand Lever which disengages F

Fig. 1-

first plaintext letter is now located on the. plain component, ~d·written down in terms of the cipher equivalent. The controllmglever is then depressed, moving the ciphertext wheel to its newposition ready for enciphering the second plaintext letter.

b) (1)b) (3)-50 usc 403

) (3)-18 USc 798) (3)-P.L. 86-36

6

GERMAN AGENT SYSTEMS

3565448

Description

The new type Kryha may be visualized as a machine so devised asto convert a plaintext message into a very long polyalphabet by(viewed in tenns of a Vigenere square) selecting one of the 26 poBBiblepositions of the cipher component to encipher the first plaintextJetter, selecting an entirely different position for the second, etc.

A revolving disc (on which the cipher component is placed) slidesagainst a stationary plain component, the selection of alphabet beingcontrolled by a geared wheel with 52 possible stopping points. Thedistance between successive stopping points is not necessarily thesame, some intervals having three gear teeth, some four, and somefive.

A further variable in regard to the shift of alphabets from letterto letter can be created by using only certain stops of the 52 poBBible.This is done by raising or lowering any combination of the 52 screwswhich act as stop controls, causing the machine to stop at each pointwhere a screw is turned in, and to pass over those screws set Bushwith the surface of the wheel. Strictly speaking, the complete cycleof the polyalphabet thus formed may be considered as being composedof 26 subcycles, each subcycle comprising a complete revolution· ofthe selector wheel. At the conclusion of each revolution (or sub­cycle), the cipher component will have moved exactly three letters tothe left, which phenomenon forms the basis of recovery of the ciphercomponent and will be explained in detail in further on.

The complete cycle is dependent on the number of stops employed,being the product of the number of stops selected and 26 (the numberof alphabets poBBible at each stop). The cycle must, therefore,necessarily fall between 26 (when only one screw is depressed) and1352 (when all 52 openings are used).

The following diagram will illustrate the general action of thevarious controlling mechanisms, and the terminology used thereonwill be adhered to as much as poBBible in this paper.

The actual mechanics of the enciphering are fairly simple. Thosescrews (E) which have been selected to control the stopping pointslire turned down, and the plain and cipher components (A and B)set up. (The individual letters are on metal tabs which can beinterchanged at will on the components.) The lever (C) is depresseduntil the arm (F) engages the predetermined opening to be used asthe starting point, and the inner (ciphertext) wheel revolved by handto set it at the predetermined setting (X, = Xp (or example). The

explain the new machine on the basis of the old, this paper wilLdealwith the later, improved model first.

DOGID

Page 5: German Agent Systems of World War II

DOCID: 3565448!!l':R!T GERMAN AGENT SYSTEMS

8 ... ulc(b) (1)(b) (3)-50 U C 403(b) (3)-18 usc 798(b) (3)-P.L. 86-36

F. W. LEWIS

9

Page 6: German Agent Systems of World War II

DOCID: 3565448~ GERMAN AGENT SYSTEMS F. W. LEWIS

10 (b) (1)(b) (3)-50 SC 403(b) (3)-18 usc 798(b) (3)-P.L. 86-36

11

Page 7: German Agent Systems of World War II

DOCID: 3565448GERMAN AGENT SYSTEMS F. W. LEWIS

SEERET 12/

(b) (1)(b) (3)-50 US 403(b) (3) - 18 USc 7 9 8(b) (3)-P.L. 86-36

13 ""!E{REI

Page 8: German Agent Systems of World War II

DOCID: 3565448SEeR!T GERMAN AGENT SYSTEMS I F. W. LEWIS SECRET

iiERET 14

(b) (1)(b) (3)-50 USC 403(b) (3)-18 USC 798(b) (3)-P.L-:" 86-36

15

Page 9: German Agent Systems of World War II

DOCID: 3565448GERMAN AGENT SYSTEMS

16(b) (1)

(b) (3)-50 U C 403(b) (3)-18 usc 798(b) (3)-P.L. 86-36

F. W. LEWIS

17

SECkEl

Page 10: German Agent Systems of World War II

DOCID:~t""~L.1

3565448UJ;HMAN AGENT SYSTEMS

18 (b) (1)(b) (3)-5 USC 403(b) (3)-18 USC 798(b) (3)-P.L. 86-36

19 5EERET

Page 11: German Agent Systems of World War II

DOCID: 3565448

SEeREf

GERMAN AGENT SYSTEMS

20(b) (1) I(b) (3)-50 USC 403(b) (3)-18 USC 798(b) (3)-P.L. 86-36

F. W. LEWIS

21

Page 12: German Agent Systems of World War II

DOCID: 3565448GERMAN AGENT SYS'l'EMS

22 /' J(b) (1)

(b) (3)-50 SC 403(b) (3)-18 usc 798(b) (3)-P.L. 86-36

F. W. LEWIS

23

Page 13: German Agent Systems of World War II

DOCID: 3565448GERMAN AGENT SYSTEMS

24 (b) (1) I(b) (3)-~ USC 403(b) (3)-18 USC 798(b) (3)-P.L. 86-36

F. W. LEWIS

25 SEERET

Page 14: German Agent Systems of World War II

DOCID:SE€ItEf

3565448GERMAN AGENT SYSTEMS

, .

(b) (1)

(b) (3)-50 USC 403(b) (3)-18 USC 798(b) (3)-P.L. 86-36

27

Page 15: German Agent Systems of World War II

:" ... ; .... '.' ~,.' ", -'

DOCID: 3565448

SECRET GERMAN AGENT SYSTEMS

1\\\ (bl (11

(b) (3)-50 USC 403.(b) (3)-18 USC 798

(b) (3)-P.L. 86-36

SEEK!T 28

Page 16: German Agent Systems of World War II

DOCID: 3565448

(b) (1)(b) (3)-50 USC 403(b) (3)-18 USC 798(b) (3)-P.L. 86-36

Page 17: German Agent Systems of World War II

DOCID: 3565448GERMAN AGENT SYSTEMS

30

(b) (1)

(b) (3)-50 USC 403(b) (3)-18 USC 798(b) (3)-P.L. 86-36

F. W.LEWIS

31

Page 18: German Agent Systems of World War II

DOClD: 3565448

,'" .,

S!CRf:T GERMAN AGENT SYSTEMSF. W. LEWIS

32/

I33

(b) (1)(b) (3)-50 USC 403(b) (3)-18 USC 798(b) (3)-P.L. 86-36

Page 19: German Agent Systems of World War II

(b) (3)-18 iJsc 798(b) (3)-P.L. 86-36

3565448..SECRET GERMAN AGENT SYSTEMS F. W. LEWIS -seelEr

DICTIONAR yenOR

The third type of agent system under present discussion involvedthe use of a German-8panish dictionary as a code book, designatingthe page and the ordered position on the page, for each word, withenciph.erment of th.e resultant digits to a final literal cipher. This pre-

, ,sents no formidable problem, given a reasonable amount of traffic, butthe early diagnosis, preliminary code reconstruction, and eventualacqUisition of the actual dictionary being used. all contribute to asomewhat Black-Chamber-like story.

1///

.. ':

/GEEREi 34 (b) (1 ) 35 ~

(b) (3)-50 US-E 403"

DOCIO

Page 20: German Agent Systems of World War II

DOCID: 3565448GERMAN AGENT SYSTEMS F. W. LEWIS

':>0

/ I 37

(b) (1)(b) (3)-50 USC 403(b) (3)-18 USC 798(b) (3)-P.L. 86-36

Page 21: German Agent Systems of World War II

DOClD: 3565448SECkEl GERMAN AGENT SYSTEMS

(b) (1)(b) (3)-50 USC 403(b) (3)-18 USC 798(b) (3)-P.L. 86-36

SECRET 38