Fish (cryptography)

From Wikipedia, the free encyclopedia

German prisoners prepare the "Russian Fish" for loading and shipment to England.[1]

Fish (sometimes capitalised as FISH) was the UK's GC&CS Bletchley Park codename for any of several German teleprinter stream ciphers used during World War II.[2][3][4] Enciphered teleprinter traffic was used between German High Command and Army Group commanders in the field, so its intelligence value (Ultra) was of the highest strategic value to the Allies.[5] This traffic normally passed over landlines, but as German forces extended their geographic reach beyond western Europe, they had to resort to wireless transmission.[6]

Bletchley Park decrypts of messages enciphered with the Enigma machines revealed that the Germans called one of their wireless teleprinter transmission systems "Sägefisch" ('sawfish') which led British cryptographers to refer to encrypted German radiotelegraphic traffic as "Fish." The code "Tunny" ('tuna') was the name given to the first non-Morse link, and it was subsequently used for the Lorenz SZ machines and the traffic enciphered by them.

History[edit]

In June 1941, the British "Y" wireless intercept stations, as well as receiving Enigma-enciphered Morse code traffic, started to receive non-Morse traffic which was initially called NoMo.[7] NoMo1 was a German army link between Berlin and Athens, and NoMo2 a temporary air force link between Berlin and Königsberg. The parallel Enigma-enciphered link to NoMo2, which was being read by Government Code and Cypher School at Bletchley Park, revealed that the Germans called the wireless teleprinter transmission systems "Sägefisch" (sawfish). This led the British to use the code Fish dubbing the machine and its traffic Tunny.[8]

The enciphering/deciphering equipment was called a Geheimschreiber (secret writer) which, like Enigma, used a symmetrical substitution alphabet. The teleprinter code used was the International Telegraph Alphabet No. 2 (ITA2)—Murray's modification of the 5-bit Baudot code.

When the Germans invaded Russia, during World War II, the Germans began to use a new type of enciphered transmission between central headquarters and headquarters in the field. The transmissions were known as Fish at Bletchley Park. (See Lorenz cipher, Cryptanalysis of the Lorenz cipher.) The German army used Fish for communications between the highest authorities in Berlin and the high-ranking officials of the German Army in the field. The Fish traffic which the personnel at Bletchley Park intercepted, contained discussions, orders, situation reports and many more details about the intentions of the German Army. However, these transmissions were so challenging to decrypt that even with the assistance of the high speed Colossus computer, the messages could not be read until several days later.[9] “Vital intelligence was obtained about Hitler’s intentions in the run up to D-Day 1944.”[10]

Traffic code names[edit]

Tunny[edit]

The Lorenz SZ42 machine with its covers removed. Bletchley Park museum

The NoMo1 link was initially named Tunny (for tunafish), a name which went on to be used both for the Lorenz SZ40/42 machines and for the Bletchley Park analogues of them. The NoMo1 link was subsequently renamed Codfish.[11] A large number of Tunny links were monitored by the Y-station at Knockholt and given names of fish. Most of these were between the Oberkommando der Wehrmacht (German High Command, OKW) in Berlin and German army commands throughout occupied Europe.

The Tunny links were based on two central transmitting and receiving points in Strausberg near Berlin for Army generals in the West and one in Königsberg in Prussia for the Eastern Front. The number of radio links jumped from eight in mid-1943 to fourteen or fifteen. In 1941 the initial experimental Tunny link was between Berlin and Athens/Salonoka. By D-Day in 1944 there were twenty-six links, based on Konigsberg and Straussberg. Other links were usually mobile; in two trucks, one with radio equipment and one with a "send" Tunny machine and a receive "Tunny" machine. The links carried very high-grade intelligence: messages from Hitler and the High Command to various Army Group commanders in the field.[12][13]

Cryptanalysis of the Lorenz cipher at Bletchley Park was assisted initially by a machine called Heath Robinson and later by the Colossus computers yielded a great deal of valuable high-level intelligence.

Bletchley Park names of Tunny links[14]
Name Between
Bream Berlin Rome
Herring Rome Tunis
Jellyfish Berlin Paris
Grilse Berlin La Roche
Mullet Berlin Oslo
Turbot Berlin Copenhagen
Dace Berlin Königsberg
Whiting Königsberg Riga
Perch Königsberg Central Belarusse
Squid Königsberg N Ukraine
Octopus Königsberg E Ukraine
Stickleback Königsberg S Ukraine
Smelt E Ukraine S Ukraine
Grayling Königsberg Belgrade
Tarpon Berlin Bucharest
Gurnard Berlin Belgrade
Chubb Belgrade Salonica
Flounder Salonika Rhodes
Codfish Berlin Salonika

Tunny decrypts provided high-grade intelligence in an unprecedented quality. Walter Jacobs, a US Army codebreaker who worked at Bletchley Park, wrote in an official report on the operation to break Tunny that in March 1945 alone 'upward of five million letters of current transmission, containing intelligence of the highest order, were deciphered'.[15]

Sturgeon[edit]

This was the name given to traffic encoded with the Siemens and Halske T52 Geheimschreiber.[16][17] In May 1940, after the German invasion of Norway, the Swedish mathematician and cryptographer Arne Beurling used traffic intercepted from telegraph lines that passed through Sweden to break this cipher.[18] Although Bletchley Park eventually diagnosed and broke Sturgeon, the relatively low value of the intelligence gained, compared to the effort involved, meant that they did not read much of its traffic.

Thrasher[edit]

This was the name used for traffic enciphered on a Geheimschreiber that was probably the Siemens T43 one-time tape machine. This was used only on a few circuits, in the later stages of the war and was diagnosed at Bletchley Park, but considered to be unbreakable.

List of senior staff involved at Bletchley Park[edit]

Including both executives and cryptographers on FISH (Tunny) in the Testery.

Ralph Tester — linguist and head of the Testery
  • Peter Benenson — codebreaker
  • John Christie — codebreaker
  • Tom Colvill — general manager
  • Peter Edgerley — codebreaker
  • Peter Ericsson — shift-leader, linguist and senior codebreaker
  • Peter Hilton — codebreaker and mathematician
  • Roy Jenkins — codebreaker and later cabinet minister
  • Victor Masters — shift-leader
  • Max Newman — mathematician and codebreaker who later set up the Newmanry
  • Denis Oswald — linguist and senior codebreaker
  • Jerry Roberts — shift-leader, linguist and senior codebreaker
  • John Thompson — codebreaker
  • John Tiltman — senior codebreaker and intelligence officer
  • Alan Turing - mathematician, mainly on Enigma traffic
  • W.T. Tutte — codebreaker and mathematician

See also[edit]

Notes[edit]

  1. ^ Parrish, Thomas D. (1986). The Ultra Americans: The U.S. Role in Breaking the Nazi Codes: Thomas Parrish: 9780812830729: Amazon.com: Books. ISBN 978-0812830729.
  2. ^ Mache 1986, pp. 230–242
  3. ^ Deavours & Kruh 1986, pp. 243–247
  4. ^ Mache 1989, pp. 97–117
  5. ^ Copeland 2006, p. 47
  6. ^ Lewin 2001, p. 130
  7. ^ Copeland 2006, p. 338
  8. ^ Hinsley, Francis Harry; Stripp, Alan (2001). Codebreakers: The Inside Story of Bletchley Park. Oxford University Press. pp. 141–148. ISBN 978-0-19-280132-6.
  9. ^ F.H. Hinsley and Alan Stripp (eds.) Code Breakers: The Inside Story of Bletchley Park, Oxford University Press, 1993.
  10. ^ "Professor Bill Tutte: Mathematician who, as a Bletchley Park codebreaker, gained access to the ciphers of the German Army High Command". The Times. Archived from the original on 4 March 2016. Retrieved 21 May 2013.
  11. ^ Gannon 2006, p. 170
  12. ^ Erskine & Smith 2001, p. 353.
  13. ^ Price 2021, p. 136.
  14. ^ Copeland 2006, p. 41
  15. ^ S. Wylie, Breaking Tunny and the birth of Colossus, Action This Day (eds. M. Smith and R. Erskine), Bantam Press, London, 2001, pp. 317-341.
  16. ^ Weierud 2006, pp. 307–327
  17. ^ Smith 2006, p. 35
  18. ^ McKay 2006, pp. 328–333

References[edit]

  • Bauer, Friedrich L. (2006), Origins of the Fish Cypher Machines in Copeland 2006, pp. 411–417
  • Copeland, B. Jack, ed. (2006), Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, ISBN 978-0-19-284055-4
  • Deavours, Cipher A.; Kruh, Louis (October 1986), "Appendix Mechanics of the German Telecipher Machine", Cryptologia, 10 (4): 230–242, doi:10.1080/0161-118691861074 (reprinted in Cryptology: Yesterday, Today and Tomorrow, Artech House, Norwood, 1987)
  • Erskine, Ralph; Smith, Michael (2001). Action this Day. London: Bantam Press. ISBN 0593-049101.
  • Erskine, Ralph; Smith, Michael, eds. (2011), The Bletchley Park Codebreakers, Biteback Publishing Ltd, ISBN 978-1-84954-078-0 Updated and extended version of "Action This Day"
  • Gannon, Paul (2006), Colossus: Bletchley Park's Greatest Secret, London: Atlantic Books, ISBN 978-1-84354-331-2
  • Lewin, Ronald (2001) [1978], Ultra Goes to War: The Secret Story, Classic Military History, Harmondsworth, England: Penguin Books, ISBN 9780141390420
  • Mache, Wolfgang W. (October 1986), "Geheimschreiber", Cryptologia, 10 (4): 230–242, doi:10.1080/0161-118691861065 (Reprinted in: Cryptology: Yesterday, Today and Tomorrow, Artech House, Norwood, 1987)
  • Mache, Wolfgang W. (April 1989), "The Siemens Cipher Teletype in the History of Telecommunications", Cryptologia, 13 (2): 97–117, doi:10.1080/0161-118991863817 (reprinted in Selections from Cryptologia: History, People, and Technology, Artech House, Norwood, 1998)
  • McKay, Craig (2006), "German Teleprinter Traffic and Swedish Wartime Intelligence", in Copeland, B Jack (ed.), Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, ISBN 978-0-19-284055-4
  • Price, David A. (2021). Geniuses War: Bletchley Park, Colossus, and the Dawn of the Digital Age. New York: Alfred A Knopf. ISBN 978-0525521549.
  • Smith, Michael (2006), "How it began: Bletchley Park Goes to War", in Copeland, B Jack (ed.), Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, ISBN 978-0-19-284055-4
  • Weierud, Frode (2006), "Bletchley Park's Sturgeon—The Fish That Laid No Eggs", in Copeland, B Jack (ed.), Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, ISBN 978-0-19-284055-4