Break an Enigma Key with Bombes: a complete example

Enigma Home Page

Steps to break a key:

Introduction

In the following example, we will describe how the breaking of Enigma keys is carried out from the interception of messages by the Y Stations to their exploitation by the generals on the battlefield.

We will describe the techniques that were used throughout most of WWII and which involved the use of Turing / Welchman bombes.

1. Y-Station

Radio links could be intercepted by the enemy. In England, interception stations were called Y-stations. These stations did not only intercept messages; they also produced intelligence. In particular, thanks to direction finding (D/F), they could locate German stations geographically. The most active unit would be the HQ (Head Quarter).

For each intercepted message, the operator fills out a form:

Ref. No: 1
Page: 1
Ship or Station (Y station):	ZER
Set (Radio Set): F1
Opr.  (Operator):  John Doe
To (Call-sign): APY
From (Call-sign): 6QG
Frequency (Kcs) & System:  1475
Date: 02-14-41
Time ended (GMT): 12:30
Operator’s remark (quality of reception?):
	O.S.A:  4/5  
All before the text (Header): 1200 31 =ROM= =LNS=
Text (Cryptogram): 
	QKNVT	WCGLV	EUTCF	ZTQSA 

	WJCSR	FQOOZ	Z
These forms are then sent to Bletchley Park (BP) by motorcycle and / or by teleprinter. In this case the most important information is transmitted:
ZER/1. 6QG APY 1475 Kcs 1200 31 =ROM= =LNS= 
QKNVT WCGLV EUTCF ZTQSA WJCSR FQOOZ Z

2. Hut 6, Registration Room

At BP, Hut 6 is responsible for breaking the Army and Air Force keys. It is made up of several sections called “Room”. It is the Registration Room (RR) which receives the messages from the Y Stations and the metadata related to these interceptions.

One of the first tasks of the RR is to create the Blists (Bannister Lists) which reference the messages in relation to their membership in a particular Enigma network. To do this, the RR uses metadata: frequencies, call-signs, the geographical location of the stations.

1) Here are the messages sent by a Station Y and received by teleprinter

ZER/1. 6QG APY 1475 Kcs 1200 31 =ROM= =LNS= 
QKNVT WCGLV EUTCF ZTQSA WJCSR FQOOZ Z

ZER/2. APY N7Y 1475 Kcs 1630 245 =BER= =VEU=
FVNVT HWHVO VRWGM UBOPE PNOME PJNST CTAMT FGFGC ZDBGD XLUDH 
UADKC AWYXJ TGIXI ZAWRX DYCXR JKXAW EQPXN IVZXS YQMWK QSVPB 
UKMEP GKGHL BNZBC CVBQZ AWJFE ZQKWT HSDGZ LQDJD XYQCJ UTBTE 
EOJBT ZRLIU LTKXA AWTYT KVYHO SEKWU ZHYSO QOEFN TLISM VMAJS 
OYYXE CPGNJ QJGGJ YDBPP HTFZO ZTXML MCSEC ZSZPX NIKDQ

ZER/3. SAD NT3  950 Kcs 1635 245 =BLU= =DAP=
GRAVR KWTJX USVXU TLKXG EGWGG NIIVC TITJM IIQNM UEAFT HCXHK 
ZXRYW ZERLT IBTMT OHEND QIWWH XVOCV EUWNJ EVIZB VJOOC ETRCJ 
LRLYB JZLZE GPXTI YCOWK ABGZS FXGQV XWULR PHQYM ODVZX NDLBG 
OGNWQ QQMAX OWMZS PYSBJ KGGZW QIUEA CBXUD PMSCY IYWMT BBNQI 
EQZRO IADEG QERQW QTPWY BOVNZ SMWAF MWLFR AILXV QNZGK

ZER/4. 9HD SAD 950 Kcs 1715 2TLE=1TL= 198 =TRI= =BBG=
KJTBX ABXPX DRKHA UMTTU OFCMD VPUZK BKNKB DKVMI MQSMI DFHUA 
QXXOW VJQEV TNNWO TYRLV MDHPM JFWWG VPFZI EFCFO GIFQL PNVRA 
CPIDX JJROR EKPLX CHHVI BGYFY DGUFU YQKTG YHYNO LWQWX HPMBK 
JQIGT YDQQE PXKPP MHURX FJGCX VHQKM DLGOR CGGUX EBSDU ZES

ZER/5. 9HD SAD 950 Kcs 1720 2TL= 133 =AFR= =RRG= 
NTVRA TQRLD YUCUB PWVCH GXKHX RXFUT SDHCW ABBJM TOQZN JUYYJ 
MQXQH QJPCW PSSJP OCTWJ OCCNK JSCGE QZQCY XTTSU TFOIM DTWAO 
FAOWJ RBMVK JWPDI QYDGY EMJAJ CGBYL NKL

2) Reconstruction of Enigma networks

a - Red Key, Frequency: 1475 Kcs

Berlin (central station)   APY 
Dunkirk                    6QG
Alle (broadcast)           N7Y
Kenngruppen: mek ayn udm nvt

b - Light Blue key, Frequency: 950 Kcs

Berlin (central station)   SAD	
Tripoli                    9HD
Alle (broadcast)           TN3
Kenngruppen: tbx avr ewt qnw

3) Blist for each Enigma network

a - Red Key

ZER/1. 6QG APY 1475 Kcs 1200 31 =ROM= =LNS= QKNVT 
ZER/2. APY N7Y 1475 Kcs 1630 245 =BER= =VEU= FVNVT

b - Light Blue Key

ZER/3. SAD NT3 950 Kcs 1635 245 =BLU= =DAP= GRAVR
ZER/4. 9HD SAD 950 Kcs 1715 2TLE=1TL= 198 =TRI= =BBG= KJTBX
ZER/5. 9HD SAD 950 Kcs 1720 2TL= 133 =AFR= =RRG= NTVRA 

3. The Crib Room

1) Searching a Crib for the Red Network

The Crib room receives the Blist for the Red network. It notices that the first message (ZER/1) comes from Dunkirk, that it is 26 characters long (31 minus the 5 characters of the Kengruppe) and that it was sent at 1200. The Crib room log showed that in the previous days the Dunkirk station had issued the following message at the same time very frequently.

“KEINE BESONDEREN VORKOMMISSE” (nothing to report)

This message is 26 characters long. Furthermore, if we superimpose this message and the cryptogram we see that it has no clash (no opposite letters are identical). Indeed, the Enigma encryption prohibits a letter from being encrypted by itself. From all of this it can be deduced that he has a very strong presumption that we have found a Crib and that we have positioned it correctly.

2) Searching a Crib for the Light Blue Network

Already Station Y had reported that the ZER/2 and ZER/3 messages could perhaps be re-encoded. In fact, the two messages were the same size, they had been sent at almost the same time and came from the same station.

After breaking the red key and the ZER/2 message was decrypted, it was demonstrated that if we superimposed the ZER/3 cryptogram with the decryption, there was no conflict (no letter was encrypted by it). We could deduce that we had to do with a re-encoding.

Plain text supposed (Crib) of the ZER/3 message.

NACHR ICHTE NFUEH RERVO RLEGE NXWEG ENVER RATDE RTAKT ISCHE
MGLIE DERUN GENDU ERFEN AUFKE INEMF UNKNE TZBEI UNWIC HTIGE
MVERK EHRAL LEFUN KSTEL LENGE RUFEN WERDE NXNUR BEIWI CHTIG
ENFUN KSPRU ECHEN ISTQU ITTUN GZUVE RLANG ENXBE SATZU NGALL
ERFUN KSTEL LENIS TZUBE LEHRE NXNAF UEYBE RLINX

4. The machine Room: making of the menu

1) The menu for the Red Network

The crib room has found the crib, but the machine room must develop several menus from the crib to take into account the turnover position. In this case, three menus will be sufficient.
Menu 1  zzzzz zzzzz zzzzz zzzzz        
Menu 2              zzzzz zzzzz zzzzz z
Menu 3  zzzzz zzzzz             aaaaa a
        abcde fghij klmno pqrst uvwxy z
Crypto  WCGLV EUTCF ZTQSA WJCSR FQOOZ Z
Crib    KEINE BESON DEREN VORKO MMISS E

                   zh
                S-----T
             zs/ \ zl/
Menu 1        / zn\ /  zb  zi   zq        3 loops
             K     E-----C---O-----J     12 letters
            /     /|\     \  |
         za/   ze/ | \   zr\ |zt
          / zp  /zf|zg\     \|
         W-----V   B   U     R

                     J    C
                    /    /
                 zq/  zr/
             zw   / zt /  zm   zv     zu
Menu 2     I-----O-----R-----Q-----M-----F
               zx|
            zs   |  zn    zl
           K-----S-----E-----T             1 loop
                zy\   / zz               14 letters
                   \ /  zk
                    Z-----D

              B    V   U      zd   zj   au   av
Menu 3         \ ze|  /     L----N----F----M----Q
              zf\  | /zg
            zb   \ |/   az      ay     zh
           C-------E-------Z-------S-------T
1 loop      \                     /ax              
1 aux.chain  \      zi           /  aw     zc
16 letters    \-----------------O-------I-------G

2) The menu for the Light blue Network

In the case of the re-encoding crib, two menus are sufficient.
Menu 1              Menu 2
======              ======
abcd efgh ijkl mnop qrst uvwx yz
================================
NACH RICH TENF UEHR ERVO RLEG EN   zz
kwtj xusv xutl kxge gwgg niiv ct
**                  **** *

XWEG ENVE RRAT DERT AKTI SCHE MG   za
itjm iiqn muea fthc xhkz xryw ze
**** *              **

LIED ERUN GEND UERF ENAU FKEI NE   zb
rlti btmt ohen dqiw whxv ocve uw
  *                 **** *

MFUN KNET ZBEI UNWI CHTI GEMV ER   zc
njev izbv jooc etrc jlrl ybjz lz
*    *               *

KEHR ALLE FUNK STEL LENG ERUF EN   zd 
egpx tiyc owka bgzs fxgq vxwu lr 
**   *              **** *



       zca   zza   zce   zaa   zze 9
     M-----N-----K-----I-----x=====R
      \  5    1  |  6 /   8    zdd
    zad\      zda|   /zae       10
        \4      2|  /
         \    3  | /7
          \  zdb |/
           G-----E   <<---- Input Letter
                 | 11
  Menu 1      zbc|
 4 loops         | zde 12
11 letters       T------A
                14\    /13
                zab\  /zzb
                    \/
                    W

               1 zaq
            A========X
               2 zbs |
                    3|zdr
                     | zdu
`   Input letter >>> E-----V
                    /| 13 /
                  4/ |zzq/12
   Menu 2     zbq /  |  / zgs
  4 loops        / 14| /
  12 letters    /    |/zzt   zbu
               W     G-----O-----F
              5|     |  11   10  |
            zzr|   15|zds       9| zdq
               | zzu | zbr   zcr |
               R-----N-----H-----L
                  6     7     8

5. Reduction of the number of jobs thanks to key rules

1) The Red Network

Luckily hut 6 broke all the keys for the month. It is possible to use the key rules to decrease the WOs to be tested.
Walzenlage (WO) for the beginning of February 1941
1	251			
2	534
3	152
4	531
5	354
6	532
7	154
8	231
9	524
10	451
11	124
12	512
13	234
Deductions:
  • As on February 13, the Walzenlage had a value of 234 (II, III, IV), on February 14, according to the non-clashing rule, the first rotor cannot be rotor II, the second rotor could not rotor III and the third rotor (the one on the right) could not be rotor IV.
  • Due to the non-repeating rule, the following WOs are not possible:
    251, 534, 152, 531, 354, 532, 154, ...
  • The clarkian rule narrows the possibilities even further. Thus the following WOs are not possible: 315, 541, ...
Conclusion: If all these rules apply, there are only the following WOs left to test: 132, 134, 254, 413, 521.

2) The Light Blue Network

Unfortunately, the Light Blue network hasn't been broken all month. It is not possible to use key rules. Consequently it will be necessary to test the 60 WO.

6. Using the Bombe (Hut 1)

When the Machine Room has designed the menus and determined which WOs to test, it sends those menus to Hut 1, which from them plugged the bombes and makes them work. From time to time, a stop occurs. It is either the solution (the correct Enigma configuration) or a false positive.

Location of the bombes

At the beginning of using the Bombes, they were in BP at Hut 1. After they were homed in out stations. Some bombes stayed in BP at Hut 11.

Out Stations in England:

  • Adstock
  • Gayhurst
  • Eastcote (home the US 6812th signal detachment)
  • Stanmore
The US 6812th signal detachment has ten bombes named has follows: Atlanta, Boston, Chicago, Houston, Minneapollis, New York, Omaha, Philadephia, Rochester and San Francisco.

1) The reception of the menus for the Red network

Example for the 3rd menu:
HUT1 DDD 

15/5/3  1 3  AGNUS  RED 02/14 132/134/254/413/521 E +

BECO
SZVU
LNFM
QTIG

BEZF CEZB COZI OSAX SZAY
ZEAZ STZH OIAW IGZC VEZE
UEZG LNZD NFZJ FMAU MQAV

  • First line: Station which homes bombes. DDD indicates urgency.
  • Second line: 15 links, menu 5 letters width, 3 letters high. 1st job of the day, 3rd menu for this job. Use "Agnus" bombe to homes this menu. This menu permits to break the RED key for the February 14. Then the WOs to set: 132, 134, 254, 413 and 521. The input letter is "E".
  • The following lines: the letters of the menu.
  • Then the links. For each one, the two letters (plain letter and the ciphered letter), for example, for the first link: B-E and the relative position of this couples of letter: ZF (ZZF).
After the reception of the menu, the operators draw the menu and plugged the bombes. Each Stop was tested (see next chapter).

2) The reception of the menus for the Light blue network

The Hut 1 received similar forms for the two menus which it needs to plug. For example, the 2nd menu:
HUT1

12/4/4  2  2  AGNUS LIGHT BLUE 02/14 WOS 60  E+

AEV
WGOF
RNHL

(AXAQ AXBS XEDR PHANTOMS)
EWBQ WRZR RNZU NHBR
HLCR LFDQ OFBU GOZT
CVGS EVDU EGZQ GNDS

Notes: this menu need to test the 60 Wheel Orders. It contains phantoms links (see next paragraph).

Phantom links

When the crib includes a letter and link which would make the menu too strong (give less than one stop per wheel order, and require the removal of more than one link to get a check stop) it is customary to include the letter and link in the menu but indicate it as a phantom. This is done by enclosing the link and the letter in parenthesis and marking it “phantom”. When a phantom is included in the menu it is disregarded by the bombe operator but is used in checking the stops.

7. Test the stops (Hut 1)

For each Stop, the operator using a machine that emulated an Enigma, checks the consistency of the Stop against the menu. Basically, a stop was considered “good” or “bad”. The good stops were immediately transmitted by telephone to Hut 6.

1) The Red Network

Menu:
               B   V   U      zd   zj   au   av
Input          1\ze|10/11   L----N----F----M----Q
letter: E      zf\ | /zg      12   13   14   15
             zb   \|/   az     ay     zh
           C-------E-------Z-------S-------T
1 loop      \   2      6      5   /ax  7            
1 aux.chain  \      zi          4/  aw     zc
16 letters    \-----------------O-------I-------G
                      3             8       9

a - Checking the 1st Stop: 132, EEK, stecker EK

Menu letters          Key->Lamp   Grund      Stecker
			                      EK
1  B    		K->H       (zf)(eek)  BH 
2  E			K->R	   (zb)(eeg)  CR
3  C			R->O	   (zi)(een)  OO Self-stecker
4  O			O->K       (ax)(efc)  SK illegal contradiction
5  S			K->P       (ay)(efd)  ZP 
6  Z			P->K       (az)(efe)  KE closure confirmation 
7  T			K->Y       (zh)(eem)  TY
8  I			O->D       (aw)(efb)  ID 
9  G			D->R       (zc)(eeh)  GR illegal contradiction
10 V			K->H       (ze)(eej)  VH illegal contradiction 
11 U			K->Y       (zg)(eel)  UY illegal contradiction

Conclusion: Bad Stop

b - Checking the 2nd Stop: 132, WQL, stecker ED

Menu letters          Key->Lamp   Grund      Stecker
			                      ED
1  B    		D->W       (zf)(wql)  BW 
2  E			D->K       (zb)(wqh)  CK
3  C			K->H       (zi)(wqo)  OH 
4  O			H->Q       (ax)(wrd)  SQ
5  S			Q->A       (ay)(wre)  ZA 
6  Z			A->D       (az)(wrf)  ED closure confirmation 
7  T			Q->P       (zh)(wqn)  TP
8  I			H->P       (aw)(wrc)  IP illegal contradiction
9  G			P->A       (zc)(wqi)  GA illegal contradiction
10 V			D->A       (ze)(wqk)  VA illegal contradiction 
11 U			D->A       (zg)(wqm)  UA illegal contradiction

Conclusion: Bad Stop

c - Checking the 3rd Stop: 134, FXA, Stecker EE

Menu letters          Key->Lamp   Grund      Stecker
			                      EE self-stecker
1  B    		E->K       (zf)(fxa)  BK 
2  E			E->W       (zb)(fxw)  CW
3  C			W->O       (zi)(fxd)  OO self-stecker
4  O			O->J       (ax)(fys)  SJ
5  S			J->Y       (ay)(fyt)  ZY 
6  Z			Y->E       (az)(fyu)  EE closure confirmation 
7  T			J->P       (zh)(fxc)  TP
8  I			O->P       (aw)(fyr)  IP illegal contradiction 
9  G			P->A       (zc)(fxx)  GA 
10 V			E->V       (ze)(fxz)  VV self-stecker 
11 U			E->U       (zg)(fxb)  UU self-stecker

Conclusion: Bad Stop

d - Checking the 4th Stop: 413, ONO, Stecker EH

Menu letters          Key->Lamp   Grund      Stecker
			                      EH
1  B    		H->B       (zf)(ono)  BB Self-stecker
2  E			H->A       (zb)(onk)  AC
3  C			A->J       (zi)(onr)  OJ
4  O			J->Z       (ax)(oog)  SZ
5  S			Z->S       (ay)(ooh)  SZ Stecker confirmation
6  Z			S->H       (az)(ooi)  EH closure confirmation
7  T			Z->Y       (zh)(onq)  TY
8  I			J->V       (aw)(oof)  IV 
9  G			V->G       (zc)(onl)  GG Self-stecker
10 V			H->I       (ze)(onn)  IV Stecker confirmation
11 U			H->X       (zg)(onp)  UX

Conclusion: Good Stop

2) The Light Blue Network

For the first Menu, we have only one stop: 143 (I,IV,III), ODL, stecker EE. It is transmitted to the Machine Room.

For the second menu, we have no stop..

8. Obtaining the rest of the key

The machine room (MR) verify each good stop received from Hut 1 and then tries to find the full key (all steckers and Ringstellung).

1) Finding the whole key for Red Network

For the Crib and the following menu:
fx?/fy? vwxyz abcde fghij klmno pqrst u   (1st Stop)
on?/oo? jklmn opqrs tuvwx yzabc defgh i   (2nd Stop)
zz?/za? abcde fghij klmno pqrst uvwxy z (The starting position)
Crypto  WCGLV EUTCF ZTQSA WJCSR FQOOZ Z
Crib    KEINE BESON DEREN VORKO MMISS E
         **** ***** (turnover)  ***** *  (letters of the menu)
Menu:
               B   V   U      zd   zj   au   av
Input          1\ze|10/11   L----N----F----M----Q
letter: E      zf\ | /zg      12   13   14   15
             zb   \|/   az     ay     zh
           C-------E-------Z-------S-------T
1 loop      \   2      6      5   /ax  7            
1 aux.chain  \      zi          4/  aw     zc
16 letters    \-----------------O-------I-------G
                      3             8       9

a - Test the good Stop: 413, ONO, Stecker EH

Menu letters          Key->Lamp   Grund      Stecker
			                      EH
1  B    		H->B       (zf)(ono)  BB Self-stecker
2  E			H->A       (zb)(onk)  AC
3  C			A->J       (zi)(onr)  OJ
4  O			J->Z       (ax)(oog)  SZ
5  S			Z->S       (ay)(ooh)  SZ Stecker confirmation
6  Z			S->H       (az)(ooi)  EH closure confirmation
7  T			Z->Y       (zh)(onq)  TY
8  I			J->V       (aw)(oof)  IV 
9  G			V->G       (zc)(onl)  GG Self-stecker
10 V			H->I       (ze)(onn)  IV Stecker confirmation
11 U			H->X       (zg)(onp)  UX
We have obtained the following steckers: BB, GG, EH, AC, OJ, SZ, TY, IV, UX.

At the position "at"(ooc), the letter O is steckered to J. The encryption of J gives M, then we have the stecker MR. At the position "as"(oob), the letter S is steckered to Z. The encryption of Z gives K, then K is self-steckered. At the position "ar"(ooa), the letter C is steckered to A. The encryption of A gives M, then we have again the stecker MR. This is a confirmation.

Let’s go: At the position "aq"(ooz), the letter O is steckered to J. The encryption of J gives O, then we have the stecker OJ. It is again a confirmation. Let’s go: At the position "ap"(ooy), the letter V is steckered to I. The encryption of I gives N, then we have the stecker NW. It is possible. At the position "ao"(oox), the letter A is steckered to C. The encryption of C gives W, we have again the stecker NW: another confirmation. At the position "an"(oow), the letter E is steckered to H. The encryption of H gives Z, then we have again the stecker SZ. At the position "am"(oov), the letter R is steckered to M. The encryption of M gives Q, then Q is self-steckered. At the position "al"(oou), the letter E is steckered to H. The encryption of H gives Y, then we have again the stecker TY. At the position "ak" (oot), the letter Z is steckered to S. The encryption of S gives I, then we have the stecker ID. This is impossible. Perhaps we have a turnover? If the position is ONK, the encryption of S gives D, then D is self-steckered.

We can now explore the letters that belong to the outer string. At the position "zd"(onm), the letter N is steckered to W. The encryption of W gives F, then we have the stecker FL, the last stecker.

Now, we have the key almost entirely:

  • The Walzenlage: IV, I, III
  • The steckers: EH, AC, OJ, SZ, TY, IV, UX, NW, MR, FL.
  • The turnover is at the position "zj"(ons). The turnover of rotor III is at the V position. Then the 3rd letter of the Ringstellung is C ([on]S + C = V). The Ringstellung for now: AAC and the start position is ONJ+C = ONL. In fact ONK because the Enigma step before ciphering.

Then we try to decipher the cryptogram with the following partial key: (Walz: IV,I,III; Stecjers: EH, AC, OJ, SZ, TY, IV, UX, NW, MR, FL; Ring: AAC and grund: ONK):

Cryptogram and plain:
WCGLV EUTCF ZTQSA WJCSR FQOOZ Z
KEINE BESON DEREN VORKO MMISS E

Marvelous! It is correct. We need to know the beginning of the Ringstellung.

Then, we try all combination of ringstellung (26x26). For each combination, we try to decipher the message key (grund: ROM, indicator: LNS) and then we try to decipher the beginning of the message with the message key found.

If the ring is AAC, then the message key is PED, then the beginning of message is GVZ...
If the ring is ABC, then the message key is CEM, then the beginning of message is RDP...
...
If the ring is PNC, then the message key is DAK, then the beginning of message is KEI...

Yeh! We have found the whole key (Red Network, February 14th, 1941:

  • Walzenlage: IV-I-III
  • Ringstellung: PNC
  • Steckers: EH, AC, OJ, SZ, TY, IV, UX, NW, MR, FL
  • Kenngruppen: mek ayn udm nvt
We can give this key to the Deciphering Room. It will be able to decipher all messages of the Red key.

2) The whole key for the Light Blue network

We have only one stop for the 60 WOs:
143 (I,IV,III), ODL, stecker EE.

Using the same techniques as before, we get the following key:

  • Walzenlage: I IV III
  • Ringstellung: D B T
  • Steckerverbindungen: BL OQ VZ IX JM SW AN HU DT FG
  • Kenngruppen: tbx avr ewt qnw

9. Message decryption

When the machine room has broken a key, the decoding room (DR) uses transformed Type-X cipher machines to emulate the Enigma to decrypt the messages and then forwards the result to Hut 3.

1) Decryption of Red traffic

a - The cryptograms:

ZER/1. 6QG APY 1475 Kcs 1200 31 =ROM= =LNS= 
QKNVT WCGLV EUTCF ZTQSA WJCSR FQOOZ Z

ZER/2. APY N7Y 1475 Kcs 1630 245 =BER= =VEU=
FVNVT HWHVO VRWGM UBOPE PNOME PJNST CTAMT FGFGC ZDBGD XLUDH 
UADKC AWYXJ TGIXI ZAWRX DYCXR JKXAW EQPXN IVZXS YQMWK QSVPB 
UKMEP GKGHL BNZBC CVBQZ AWJFE ZQKWT HSDGZ LQDJD XYQCJ UTBTE 
EOJBT ZRLIU LTKXA AWTYT KVYHO SEKWU ZHYSO QOEFN TLISM VMAJS 
OYYXE CPGNJ QJGGJ YDBPP HTFZO ZTXML MCSEC ZSZPX NIKDQ

b - The key (February 14th, 1941):

  • Walzenlage: IV-I-III
  • Ringstellung: PNC
  • Steckers: EH, AC, OJ, SZ, TY, IV, UX, NW, MR, FL
  • Kenngruppen: mek ayn udm nvt

c - The plain texts

ZER/1. 6QG APY 1475 Kcs 1200 31 =ROM= =LNS= 
Message key: DAK
Kengruppe: QKNVT 
Plain text:

KEINE BESON DEREN VORKO MMISS E


ZER/2. APY N7Y 1475 Kcs 1630 245 =BER= =VEU=
Message Key: LIN
Kengruppe: FVNVT
Plain text:

NACHR ICHTE NFUEH RERVO RLEGE NXWEG ENVER RATDE RTAKT ISCHE

MGLIE DERUN GENDU ERFEN AUFKE INEMF UNKNE TZBEI UNWIC HTIGE

MVERK EHRAL LEFUN KSTEL LENGE RUFEN WERDE NXNUR BEIWI CHTIG

ENFUN KSPRU ECHEN ISTQU ITTUN GZUVE RLANG ENXBE SATZU NGALL

ERFUN KSTEL LENIS TZUBE LEHRE NXNAF UEYBE RLINX

1) Decryption of LIght Blue traffic

a - The cryptograms:

ZER/3. SAD NT3  950 Kcs 1635 245 =BLU= =DAP=
GRAVR KWTJX USVXU TLKXG EGWGG NIIVC TITJM IIQNM UEAFT HCXHK 
ZXRYW ZERLT IBTMT OHEND QIWWH XVOCV EUWNJ EVIZB VJOOC ETRCJ 
LRLYB JZLZE GPXTI YCOWK ABGZS FXGQV XWULR PHQYM ODVZX NDLBG 
OGNWQ QQMAX OWMZS PYSBJ KGGZW QIUEA CBXUD PMSCY IYWMT BBNQI 
EQZRO IADEG QERQW QTPWY BOVNZ SMWAF MWLFR AILXV QNZGK

ZER/4. 9HD SAD 950 Kcs 1715 2TLE=1TL= 198 =TRI= =BBG=
KJTBX ABXPX DRKHA UMTTU OFCMD VPUZK BKNKB DKVMI MQSMI DFHUA 
QXXOW VJQEV TNNWO TYRLV MDHPM JFWWG VPFZI EFCFO GIFQL PNVRA 
CPIDX JJROR EKPLX CHHVI BGYFY DGUFU YQKTG YHYNO LWQWX HPMBK 
JQIGT YDQQE PXKPP MHURX FJGCX VHQKM DLGOR CGGUX EBSDU ZES

ZER/5. 9HD SAD 950 Kcs 1720 2TL= 133 =AFR= =RRG= 
NTVRA TQRLD YUCUB PWVCH GXKHX RXFUT SDHCW ABBJM TOQZN JUYYJ 
MQXQH QJPCW PSSJP OCTWJ OCCNK JSCGE QZQCY XTTSU TFOIM DTWAO 
FAOWJ RBMVK JWPDI QYDGY EMJAJ CGBYL NKL

b - The key (February 14th, 1941):

  • Walzenlage: I IV III
  • Ringstellung: D B T
  • Steckerverbindungen: BL OQ VZ IX JM SW AN HU DT FG
  • Kenngruppen: tbx avr ewt qnw

c - The plain texts

ZER/3. SAD NT3  950 Kcs 1635 245 =BLU= =DAP=
Message key: RED
Kenngruppe: GRAVR
Plain text:

NACHR ICHTE NFUEH RERVO RLEGE NXWEG ENVER RATDE RTAKT ISCHE

MGLIE DERUN GENDU ERFEN AUFKE INEMF UNKNE TZBEI UNWIC HTIGE

MVERK EHRAL LEFUN KSTEL LENGE RUFEN WERDE NXNUR BEIWI CHTIG

ENFUN KSPRU ECHEN ISTQU ITTUN GZUVE RLANG ENXBE SATZU NGALL

ERFUN KSTEL LENIS TZUBE LEHRE NXNAF UEYBE RLINX


ZER/4. 9HD SAD 950 Kcs 1715 2TLE=1TL= 198 =TRI= =BBG=
Message Key: POL
Kenngruppe: KJTBX 
Plain text: 

UNTER NEHME NSONN ENBLU MEXDI EERST ENEIN HEITE NDERN EUENA

FRIKA KORPS KKANT ONDOR AKAUF MANNK KSIND INAFR IKAAN GEKOM

MENXD IEFOR TGESC HRITT ENENE INHEI TENDE RROEM VYLEI CHTEN

AFRIK ADIVI SIONY AUFKL AERUN GSBAT AILLO NROEM III


ZER/5. 9HD SAD 950 Kcs 1720 2TL= 133 =AFR= =RRG= 
Message key: ICA
Kenngruppe: NTVRA 
Plain text:

UNDPA NZERJ AEGER ABTEI LUNGR OEMXX IXYSI NDINT RIPOL ISEIN

GETRO FFENU NDWER DENSO FORTA NDIEF RONTI NSIRT EGESC HICKT

XGENE RALLE UTNAN TERWI NROMM ELX

10. Translation and interpretation of messages (Hut 3)

Hut 3 receives, from the DR of Hut 6, the deciphered texts in the form of a series of groups of 5 letters. Then Hut 3 translates the messages and interprets them. For example it replaces the abbreviations.

Then Hut 3 carries messages to Whiteall and also (for the most important ones) to theaters of operation through Colonel Winterbottom’s SLUs.

1) Translation of Red Traffic

Red Traffic, February 14th, 1941.


1. 6QG APY (Dunkirk to Berlin) 1475 Kcs 1200 31 =ROM= =LNS= 
KEINE BESONDEREN VORKOMMISSE 

Nothing to report


2. APY N7Y (Berlin to All) 1475 Kcs 1630 245 =BER= =VEU=
Nachrichtenfuehrer vorlegen. Wegen Verrat der 
taktischem Gliederungen duerfen auf keinem Funknetz
bei unwichtigem Verkehr alle Funkstellen gerufen 
werden. Nur bei wichtigen Funkspruechen ist Quittung
zu verlangen X Besatzung aller Funkstellen ist zu 
belehren. Nafue, Berlin.

Submit news guide! - Because of the betrayal of 
the tactical structures, all radio stations must not
be called on any radio network with unimportant 
traffic. Only for important Acknowledgment message 
must be requested for radio communications. The crew 
of all radio stations must be instructed. Nafue, Berlin. 

2) Translation of Light Blue Traffic

Light Blue traffic, February 14th, 1941.

1. SAD NT3 (Berlin to All) 950 Kcs 1635 245 =BLU= =DAP=
Nachrichtenfuehrer vorlegen. Wegen Verrat der taktischem 
Gliederungen duerfen auf keinem Funknetz bei unwichtigem 
Verkehr alle Funkstellen gerufen werden. Nur bei 
wichtigen Funkspruechen ist Quittung  zu verlangen X 
Besatzung aller Funkstellen ist zu belehren. Nafue, Berlin.

Submit news guide! - Because of the betrayal of the 
tactical structures, all radio stations must not be called 
on any radio network with unimportant traffic. Only for 
important Acknowledgment message must be requested for 
radio communications. The crew of all radio stations must 
be instructed. Nafue, Berlin. 

2. 9HD SAD (Tripoli to Berlin) 950 Kcs 1715 2TLE
Unternehmen Sonnenblume. Die ersten Einheiten der neuen 
Afrikakorps (DAK) sind in Afrika angekommen. Die 
fortgeschrittenen Einheiten der 5. leichten AfrikaDivision, 
Aufklaerungsbataillon  3. und Panzerjaegerabteilung 39., 
sind in Tripolis eingetroffen und werden sofort an die 
Front in Sirte geschickt. Generalleutnant Erwin Rommel.

Sunflower operation. The first units of the new Africa 
Corps (DAK) have arrived in Africa. The advanced units of 
the 5th Africa Light Division, 3rd Reconnaissance Battalion 
and 39th Panzerjaeger Division have arrived in Tripoli and 
are immediately sent to the front at Sirte. Lieutenant 
General Erwin Rommel.

11. Use (Whitewall or war theater)

Hut 3 sends all translated messages to Whitewall by mail. The most important messages are sent by teleprinter to Whitewall and/or directly to generals in theaters of operation.

Example

From SIS to General O’Connor’s HQ in Cairo.

Message from Tripoli to Berlin, February 14.

Sunflower operation. The first units of the new Africa 
Corps (DAK) have arrived in Africa. The advanced units of 
the 5th Africa Light Division, 3rd Reconnaissance Battalion 
and 39th Panzerjaeger Division have arrived in Tripoli and 
are immediately sent to the front at Sirte. Lieutenant 
General Erwin Rommel.

Comments:
- Sunflower Operation: German support for Italian forces 
  in North Africa.
- DAK: Deutsches AfrikaKorps: German forces sent to Africa. 
  It will includes at least one armored division.
- General Rommel: German General who distinguished himself 
  during the campaign in France. He commanded the 7th 
  Panzerdivision on Hitler’s direct recommandation.