Enigma Home Page
Steps to break a key: |
IntroductionIn the following example, we will describe how the breaking of Enigma keys is carried out from the interception of messages by the Y Stations to their exploitation by the generals on the battlefield. We will describe the techniques that were used throughout most of WWII and which involved the use of Turing / Welchman bombes. 1. Y-StationRadio links could be intercepted by the enemy. In England, interception stations were called Y-stations. These stations did not only intercept messages; they also produced intelligence. In particular, thanks to direction finding (D/F), they could locate German stations geographically. The most active unit would be the HQ (Head Quarter). For each intercepted message, the operator fills out a form: Ref. No: 1 Page: 1 Ship or Station (Y station): ZER Set (Radio Set): F1 Opr. (Operator): John Doe To (Call-sign): APY From (Call-sign): 6QG Frequency (Kcs) & System: 1475 Date: 02-14-41 Time ended (GMT): 12:30 Operator’s remark (quality of reception?): O.S.A: 4/5 All before the text (Header): 1200 31 =ROM= =LNS= Text (Cryptogram): QKNVT WCGLV EUTCF ZTQSA WJCSR FQOOZ ZThese forms are then sent to Bletchley Park (BP) by motorcycle and / or by teleprinter. In this case the most important information is transmitted: ZER/1. 6QG APY 1475 Kcs 1200 31 =ROM= =LNS= QKNVT WCGLV EUTCF ZTQSA WJCSR FQOOZ Z 2. Hut 6, Registration RoomAt BP, Hut 6 is responsible for breaking the Army and Air Force keys. It is made up of several sections called “Room”. It is the Registration Room (RR) which receives the messages from the Y Stations and the metadata related to these interceptions. One of the first tasks of the RR is to create the Blists (Bannister Lists) which reference the messages in relation to their membership in a particular Enigma network. To do this, the RR uses metadata: frequencies, call-signs, the geographical location of the stations. 1) Here are the messages sent by a Station Y and received by teleprinterZER/1. 6QG APY 1475 Kcs 1200 31 =ROM= =LNS= QKNVT WCGLV EUTCF ZTQSA WJCSR FQOOZ Z ZER/2. APY N7Y 1475 Kcs 1630 245 =BER= =VEU= FVNVT HWHVO VRWGM UBOPE PNOME PJNST CTAMT FGFGC ZDBGD XLUDH UADKC AWYXJ TGIXI ZAWRX DYCXR JKXAW EQPXN IVZXS YQMWK QSVPB UKMEP GKGHL BNZBC CVBQZ AWJFE ZQKWT HSDGZ LQDJD XYQCJ UTBTE EOJBT ZRLIU LTKXA AWTYT KVYHO SEKWU ZHYSO QOEFN TLISM VMAJS OYYXE CPGNJ QJGGJ YDBPP HTFZO ZTXML MCSEC ZSZPX NIKDQ ZER/3. SAD NT3 950 Kcs 1635 245 =BLU= =DAP= GRAVR KWTJX USVXU TLKXG EGWGG NIIVC TITJM IIQNM UEAFT HCXHK ZXRYW ZERLT IBTMT OHEND QIWWH XVOCV EUWNJ EVIZB VJOOC ETRCJ LRLYB JZLZE GPXTI YCOWK ABGZS FXGQV XWULR PHQYM ODVZX NDLBG OGNWQ QQMAX OWMZS PYSBJ KGGZW QIUEA CBXUD PMSCY IYWMT BBNQI EQZRO IADEG QERQW QTPWY BOVNZ SMWAF MWLFR AILXV QNZGK ZER/4. 9HD SAD 950 Kcs 1715 2TLE=1TL= 198 =TRI= =BBG= KJTBX ABXPX DRKHA UMTTU OFCMD VPUZK BKNKB DKVMI MQSMI DFHUA QXXOW VJQEV TNNWO TYRLV MDHPM JFWWG VPFZI EFCFO GIFQL PNVRA CPIDX JJROR EKPLX CHHVI BGYFY DGUFU YQKTG YHYNO LWQWX HPMBK JQIGT YDQQE PXKPP MHURX FJGCX VHQKM DLGOR CGGUX EBSDU ZES ZER/5. 9HD SAD 950 Kcs 1720 2TL= 133 =AFR= =RRG= NTVRA TQRLD YUCUB PWVCH GXKHX RXFUT SDHCW ABBJM TOQZN JUYYJ MQXQH QJPCW PSSJP OCTWJ OCCNK JSCGE QZQCY XTTSU TFOIM DTWAO FAOWJ RBMVK JWPDI QYDGY EMJAJ CGBYL NKL 2) Reconstruction of Enigma networksa - Red Key, Frequency: 1475 KcsBerlin (central station) APY Dunkirk 6QG Alle (broadcast) N7Y Kenngruppen: mek ayn udm nvt b - Light Blue key, Frequency: 950 KcsBerlin (central station) SAD Tripoli 9HD Alle (broadcast) TN3 Kenngruppen: tbx avr ewt qnw 3) Blist for each Enigma networka - Red KeyZER/1. 6QG APY 1475 Kcs 1200 31 =ROM= =LNS= QKNVT ZER/2. APY N7Y 1475 Kcs 1630 245 =BER= =VEU= FVNVT b - Light Blue KeyZER/3. SAD NT3 950 Kcs 1635 245 =BLU= =DAP= GRAVR ZER/4. 9HD SAD 950 Kcs 1715 2TLE=1TL= 198 =TRI= =BBG= KJTBX ZER/5. 9HD SAD 950 Kcs 1720 2TL= 133 =AFR= =RRG= NTVRA 3. The Crib Room1) Searching a Crib for the Red NetworkThe Crib room receives the Blist for the Red network. It notices that the first message (ZER/1) comes from Dunkirk, that it is 26 characters long (31 minus the 5 characters of the Kengruppe) and that it was sent at 1200. The Crib room log showed that in the previous days the Dunkirk station had issued the following message at the same time very frequently. “KEINE BESONDEREN VORKOMMISSE” (nothing to report) This message is 26 characters long. Furthermore, if we superimpose this message and the cryptogram we see that it has no clash (no opposite letters are identical). Indeed, the Enigma encryption prohibits a letter from being encrypted by itself. From all of this it can be deduced that he has a very strong presumption that we have found a Crib and that we have positioned it correctly. 2) Searching a Crib for the Light Blue NetworkAlready Station Y had reported that the ZER/2 and ZER/3 messages could perhaps be re-encoded. In fact, the two messages were the same size, they had been sent at almost the same time and came from the same station.After breaking the red key and the ZER/2 message was decrypted, it was demonstrated that if we superimposed the ZER/3 cryptogram with the decryption, there was no conflict (no letter was encrypted by it). We could deduce that we had to do with a re-encoding. Plain text supposed (Crib) of the ZER/3 message. NACHR ICHTE NFUEH RERVO RLEGE NXWEG ENVER RATDE RTAKT ISCHE MGLIE DERUN GENDU ERFEN AUFKE INEMF UNKNE TZBEI UNWIC HTIGE MVERK EHRAL LEFUN KSTEL LENGE RUFEN WERDE NXNUR BEIWI CHTIG ENFUN KSPRU ECHEN ISTQU ITTUN GZUVE RLANG ENXBE SATZU NGALL ERFUN KSTEL LENIS TZUBE LEHRE NXNAF UEYBE RLINX 4. The machine Room: making of the menu1) The menu for the Red NetworkThe crib room has found the crib, but the machine room must develop several menus from the crib to take into account the turnover position. In this case, three menus will be sufficient.Menu 1 zzzzz zzzzz zzzzz zzzzz Menu 2 zzzzz zzzzz zzzzz z Menu 3 zzzzz zzzzz aaaaa a abcde fghij klmno pqrst uvwxy z Crypto WCGLV EUTCF ZTQSA WJCSR FQOOZ Z Crib KEINE BESON DEREN VORKO MMISS E zh S-----T zs/ \ zl/ Menu 1 / zn\ / zb zi zq 3 loops K E-----C---O-----J 12 letters / /|\ \ | za/ ze/ | \ zr\ |zt / zp /zf|zg\ \| W-----V B U R J C / / zq/ zr/ zw / zt / zm zv zu Menu 2 I-----O-----R-----Q-----M-----F zx| zs | zn zl K-----S-----E-----T 1 loop zy\ / zz 14 letters \ / zk Z-----D B V U zd zj au av Menu 3 \ ze| / L----N----F----M----Q zf\ | /zg zb \ |/ az ay zh C-------E-------Z-------S-------T 1 loop \ /ax 1 aux.chain \ zi / aw zc 16 letters \-----------------O-------I-------G 2) The menu for the Light blue NetworkIn the case of the re-encoding crib, two menus are sufficient.Menu 1 Menu 2 ====== ====== abcd efgh ijkl mnop qrst uvwx yz ================================ NACH RICH TENF UEHR ERVO RLEG EN zz kwtj xusv xutl kxge gwgg niiv ct ** **** * XWEG ENVE RRAT DERT AKTI SCHE MG za itjm iiqn muea fthc xhkz xryw ze **** * ** LIED ERUN GEND UERF ENAU FKEI NE zb rlti btmt ohen dqiw whxv ocve uw * **** * MFUN KNET ZBEI UNWI CHTI GEMV ER zc njev izbv jooc etrc jlrl ybjz lz * * * KEHR ALLE FUNK STEL LENG ERUF EN zd egpx tiyc owka bgzs fxgq vxwu lr ** * **** * zca zza zce zaa zze 9 M-----N-----K-----I-----x=====R \ 5 1 | 6 / 8 zdd zad\ zda| /zae 10 \4 2| / \ 3 | /7 \ zdb |/ G-----E <<---- Input Letter | 11 Menu 1 zbc| 4 loops | zde 12 11 letters T------A 14\ /13 zab\ /zzb \/ W 1 zaq A========X 2 zbs | 3|zdr | zdu ` Input letter >>> E-----V /| 13 / 4/ |zzq/12 Menu 2 zbq / | / zgs 4 loops / 14| / 12 letters / |/zzt zbu W G-----O-----F 5| | 11 10 | zzr| 15|zds 9| zdq | zzu | zbr zcr | R-----N-----H-----L 6 7 8 5. Reduction of the number of jobs thanks to key rules1) The Red NetworkLuckily hut 6 broke all the keys for the month. It is possible to use the key rules to decrease the WOs to be tested.Walzenlage (WO) for the beginning of February 1941 1 251 2 534 3 152 4 531 5 354 6 532 7 154 8 231 9 524 10 451 11 124 12 512 13 234Deductions:
2) The Light Blue NetworkUnfortunately, the Light Blue network hasn't been broken all month. It is not possible to use key rules. Consequently it will be necessary to test the 60 WO.6. Using the Bombe (Hut 1)When the Machine Room has designed the menus and determined which WOs to test, it sends those menus to Hut 1, which from them plugged the bombes and makes them work. From time to time, a stop occurs. It is either the solution (the correct Enigma configuration) or a false positive.
Location of the bombesAt the beginning of using the Bombes, they were in BP at Hut 1. After they were homed in out stations. Some bombes stayed in BP at Hut 11.Out Stations in England:
1) The reception of the menus for the Red networkExample for the 3rd menu:HUT1 DDD 15/5/3 1 3 AGNUS RED 02/14 132/134/254/413/521 E + BECO SZVU LNFM QTIG BEZF CEZB COZI OSAX SZAY ZEAZ STZH OIAW IGZC VEZE UEZG LNZD NFZJ FMAU MQAV
2) The reception of the menus for the Light blue networkThe Hut 1 received similar forms for the two menus which it needs to plug. For example, the 2nd menu:HUT1 12/4/4 2 2 AGNUS LIGHT BLUE 02/14 WOS 60 E+ AEV WGOF RNHL (AXAQ AXBS XEDR PHANTOMS) EWBQ WRZR RNZU NHBR HLCR LFDQ OFBU GOZT CVGS EVDU EGZQ GNDSNotes: this menu need to test the 60 Wheel Orders. It contains phantoms links (see next paragraph). Phantom linksWhen the crib includes a letter and link which would make the menu too strong (give less than one stop per wheel order, and require the removal of more than one link to get a check stop) it is customary to include the letter and link in the menu but indicate it as a phantom. This is done by enclosing the link and the letter in parenthesis and marking it “phantom”. When a phantom is included in the menu it is disregarded by the bombe operator but is used in checking the stops. 7. Test the stops (Hut 1)For each Stop, the operator using a machine that emulated an Enigma, checks the consistency of the Stop against the menu. Basically, a stop was considered “good” or “bad”. The good stops were immediately transmitted by telephone to Hut 6. 1) The Red NetworkMenu: B V U zd zj au av Input 1\ze|10/11 L----N----F----M----Q letter: E zf\ | /zg 12 13 14 15 zb \|/ az ay zh C-------E-------Z-------S-------T 1 loop \ 2 6 5 /ax 7 1 aux.chain \ zi 4/ aw zc 16 letters \-----------------O-------I-------G 3 8 9 a - Checking the 1st Stop: 132, EEK, stecker EKMenu letters Key->Lamp Grund Stecker EK 1 B K->H (zf)(eek) BH 2 E K->R (zb)(eeg) CR 3 C R->O (zi)(een) OO Self-stecker 4 O O->K (ax)(efc) SK illegal contradiction 5 S K->P (ay)(efd) ZP 6 Z P->K (az)(efe) KE closure confirmation 7 T K->Y (zh)(eem) TY 8 I O->D (aw)(efb) ID 9 G D->R (zc)(eeh) GR illegal contradiction 10 V K->H (ze)(eej) VH illegal contradiction 11 U K->Y (zg)(eel) UY illegal contradiction Conclusion: Bad Stop b - Checking the 2nd Stop: 132, WQL, stecker EDMenu letters Key->Lamp Grund Stecker ED 1 B D->W (zf)(wql) BW 2 E D->K (zb)(wqh) CK 3 C K->H (zi)(wqo) OH 4 O H->Q (ax)(wrd) SQ 5 S Q->A (ay)(wre) ZA 6 Z A->D (az)(wrf) ED closure confirmation 7 T Q->P (zh)(wqn) TP 8 I H->P (aw)(wrc) IP illegal contradiction 9 G P->A (zc)(wqi) GA illegal contradiction 10 V D->A (ze)(wqk) VA illegal contradiction 11 U D->A (zg)(wqm) UA illegal contradiction Conclusion: Bad Stop c - Checking the 3rd Stop: 134, FXA, Stecker EEMenu letters Key->Lamp Grund Stecker EE self-stecker 1 B E->K (zf)(fxa) BK 2 E E->W (zb)(fxw) CW 3 C W->O (zi)(fxd) OO self-stecker 4 O O->J (ax)(fys) SJ 5 S J->Y (ay)(fyt) ZY 6 Z Y->E (az)(fyu) EE closure confirmation 7 T J->P (zh)(fxc) TP 8 I O->P (aw)(fyr) IP illegal contradiction 9 G P->A (zc)(fxx) GA 10 V E->V (ze)(fxz) VV self-stecker 11 U E->U (zg)(fxb) UU self-stecker Conclusion: Bad Stop d - Checking the 4th Stop: 413, ONO, Stecker EHMenu letters Key->Lamp Grund Stecker EH 1 B H->B (zf)(ono) BB Self-stecker 2 E H->A (zb)(onk) AC 3 C A->J (zi)(onr) OJ 4 O J->Z (ax)(oog) SZ 5 S Z->S (ay)(ooh) SZ Stecker confirmation 6 Z S->H (az)(ooi) EH closure confirmation 7 T Z->Y (zh)(onq) TY 8 I J->V (aw)(oof) IV 9 G V->G (zc)(onl) GG Self-stecker 10 V H->I (ze)(onn) IV Stecker confirmation 11 U H->X (zg)(onp) UX Conclusion: Good Stop 2) The Light Blue NetworkFor the first Menu, we have only one stop: 143 (I,IV,III), ODL, stecker EE. It is transmitted to the Machine Room.For the second menu, we have no stop.. 8. Obtaining the rest of the keyThe machine room (MR) verify each good stop received from Hut 1 and then tries to find the full key (all steckers and Ringstellung). 1) Finding the whole key for Red NetworkFor the Crib and the following menu:fx?/fy? vwxyz abcde fghij klmno pqrst u (1st Stop) on?/oo? jklmn opqrs tuvwx yzabc defgh i (2nd Stop) zz?/za? abcde fghij klmno pqrst uvwxy z (The starting position) Crypto WCGLV EUTCF ZTQSA WJCSR FQOOZ Z Crib KEINE BESON DEREN VORKO MMISS E **** ***** (turnover) ***** * (letters of the menu) Menu: B V U zd zj au av Input 1\ze|10/11 L----N----F----M----Q letter: E zf\ | /zg 12 13 14 15 zb \|/ az ay zh C-------E-------Z-------S-------T 1 loop \ 2 6 5 /ax 7 1 aux.chain \ zi 4/ aw zc 16 letters \-----------------O-------I-------G 3 8 9 a - Test the good Stop: 413, ONO, Stecker EHMenu letters Key->Lamp Grund Stecker EH 1 B H->B (zf)(ono) BB Self-stecker 2 E H->A (zb)(onk) AC 3 C A->J (zi)(onr) OJ 4 O J->Z (ax)(oog) SZ 5 S Z->S (ay)(ooh) SZ Stecker confirmation 6 Z S->H (az)(ooi) EH closure confirmation 7 T Z->Y (zh)(onq) TY 8 I J->V (aw)(oof) IV 9 G V->G (zc)(onl) GG Self-stecker 10 V H->I (ze)(onn) IV Stecker confirmation 11 U H->X (zg)(onp) UXWe have obtained the following steckers: BB, GG, EH, AC, OJ, SZ, TY, IV, UX. At the position "at"(ooc), the letter O is steckered to J. The encryption of J gives M, then we have the stecker MR. At the position "as"(oob), the letter S is steckered to Z. The encryption of Z gives K, then K is self-steckered. At the position "ar"(ooa), the letter C is steckered to A. The encryption of A gives M, then we have again the stecker MR. This is a confirmation. Let’s go: At the position "aq"(ooz), the letter O is steckered to J. The encryption of J gives O, then we have the stecker OJ. It is again a confirmation. Let’s go: At the position "ap"(ooy), the letter V is steckered to I. The encryption of I gives N, then we have the stecker NW. It is possible. At the position "ao"(oox), the letter A is steckered to C. The encryption of C gives W, we have again the stecker NW: another confirmation. At the position "an"(oow), the letter E is steckered to H. The encryption of H gives Z, then we have again the stecker SZ. At the position "am"(oov), the letter R is steckered to M. The encryption of M gives Q, then Q is self-steckered. At the position "al"(oou), the letter E is steckered to H. The encryption of H gives Y, then we have again the stecker TY. At the position "ak" (oot), the letter Z is steckered to S. The encryption of S gives I, then we have the stecker ID. This is impossible. Perhaps we have a turnover? If the position is ONK, the encryption of S gives D, then D is self-steckered. We can now explore the letters that belong to the outer string. At the position "zd"(onm), the letter N is steckered to W. The encryption of W gives F, then we have the stecker FL, the last stecker. Now, we have the key almost entirely:
Then we try to decipher the cryptogram with the following partial key: (Walz: IV,I,III; Stecjers: EH, AC, OJ, SZ, TY, IV, UX, NW, MR, FL; Ring: AAC and grund: ONK): Cryptogram and plain: WCGLV EUTCF ZTQSA WJCSR FQOOZ Z KEINE BESON DEREN VORKO MMISS E Marvelous! It is correct. We need to know the beginning of the Ringstellung. Then, we try all combination of ringstellung (26x26). For each combination, we try to decipher the message key (grund: ROM, indicator: LNS) and then we try to decipher the beginning of the message with the message key found.
If the ring is AAC, then the message key is PED, then the beginning of message is GVZ... Yeh! We have found the whole key (Red Network, February 14th, 1941:
2) The whole key for the Light Blue networkWe have only one stop for the 60 WOs:143 (I,IV,III), ODL, stecker EE. Using the same techniques as before, we get the following key:
9. Message decryptionWhen the machine room has broken a key, the decoding room (DR) uses transformed Type-X cipher machines to emulate the Enigma to decrypt the messages and then forwards the result to Hut 3. 1) Decryption of Red traffica - The cryptograms:ZER/1. 6QG APY 1475 Kcs 1200 31 =ROM= =LNS= QKNVT WCGLV EUTCF ZTQSA WJCSR FQOOZ Z ZER/2. APY N7Y 1475 Kcs 1630 245 =BER= =VEU= FVNVT HWHVO VRWGM UBOPE PNOME PJNST CTAMT FGFGC ZDBGD XLUDH UADKC AWYXJ TGIXI ZAWRX DYCXR JKXAW EQPXN IVZXS YQMWK QSVPB UKMEP GKGHL BNZBC CVBQZ AWJFE ZQKWT HSDGZ LQDJD XYQCJ UTBTE EOJBT ZRLIU LTKXA AWTYT KVYHO SEKWU ZHYSO QOEFN TLISM VMAJS OYYXE CPGNJ QJGGJ YDBPP HTFZO ZTXML MCSEC ZSZPX NIKDQ b - The key (February 14th, 1941):
c - The plain textsZER/1. 6QG APY 1475 Kcs 1200 31 =ROM= =LNS= Message key: DAK Kengruppe: QKNVT Plain text: KEINE BESON DEREN VORKO MMISS E ZER/2. APY N7Y 1475 Kcs 1630 245 =BER= =VEU= Message Key: LIN Kengruppe: FVNVT Plain text: NACHR ICHTE NFUEH RERVO RLEGE NXWEG ENVER RATDE RTAKT ISCHE MGLIE DERUN GENDU ERFEN AUFKE INEMF UNKNE TZBEI UNWIC HTIGE MVERK EHRAL LEFUN KSTEL LENGE RUFEN WERDE NXNUR BEIWI CHTIG ENFUN KSPRU ECHEN ISTQU ITTUN GZUVE RLANG ENXBE SATZU NGALL ERFUN KSTEL LENIS TZUBE LEHRE NXNAF UEYBE RLINX 1) Decryption of LIght Blue traffica - The cryptograms:ZER/3. SAD NT3 950 Kcs 1635 245 =BLU= =DAP= GRAVR KWTJX USVXU TLKXG EGWGG NIIVC TITJM IIQNM UEAFT HCXHK ZXRYW ZERLT IBTMT OHEND QIWWH XVOCV EUWNJ EVIZB VJOOC ETRCJ LRLYB JZLZE GPXTI YCOWK ABGZS FXGQV XWULR PHQYM ODVZX NDLBG OGNWQ QQMAX OWMZS PYSBJ KGGZW QIUEA CBXUD PMSCY IYWMT BBNQI EQZRO IADEG QERQW QTPWY BOVNZ SMWAF MWLFR AILXV QNZGK ZER/4. 9HD SAD 950 Kcs 1715 2TLE=1TL= 198 =TRI= =BBG= KJTBX ABXPX DRKHA UMTTU OFCMD VPUZK BKNKB DKVMI MQSMI DFHUA QXXOW VJQEV TNNWO TYRLV MDHPM JFWWG VPFZI EFCFO GIFQL PNVRA CPIDX JJROR EKPLX CHHVI BGYFY DGUFU YQKTG YHYNO LWQWX HPMBK JQIGT YDQQE PXKPP MHURX FJGCX VHQKM DLGOR CGGUX EBSDU ZES ZER/5. 9HD SAD 950 Kcs 1720 2TL= 133 =AFR= =RRG= NTVRA TQRLD YUCUB PWVCH GXKHX RXFUT SDHCW ABBJM TOQZN JUYYJ MQXQH QJPCW PSSJP OCTWJ OCCNK JSCGE QZQCY XTTSU TFOIM DTWAO FAOWJ RBMVK JWPDI QYDGY EMJAJ CGBYL NKL b - The key (February 14th, 1941):
c - The plain textsZER/3. SAD NT3 950 Kcs 1635 245 =BLU= =DAP= Message key: RED Kenngruppe: GRAVR Plain text: NACHR ICHTE NFUEH RERVO RLEGE NXWEG ENVER RATDE RTAKT ISCHE MGLIE DERUN GENDU ERFEN AUFKE INEMF UNKNE TZBEI UNWIC HTIGE MVERK EHRAL LEFUN KSTEL LENGE RUFEN WERDE NXNUR BEIWI CHTIG ENFUN KSPRU ECHEN ISTQU ITTUN GZUVE RLANG ENXBE SATZU NGALL ERFUN KSTEL LENIS TZUBE LEHRE NXNAF UEYBE RLINX ZER/4. 9HD SAD 950 Kcs 1715 2TLE=1TL= 198 =TRI= =BBG= Message Key: POL Kenngruppe: KJTBX Plain text: UNTER NEHME NSONN ENBLU MEXDI EERST ENEIN HEITE NDERN EUENA FRIKA KORPS KKANT ONDOR AKAUF MANNK KSIND INAFR IKAAN GEKOM MENXD IEFOR TGESC HRITT ENENE INHEI TENDE RROEM VYLEI CHTEN AFRIK ADIVI SIONY AUFKL AERUN GSBAT AILLO NROEM III ZER/5. 9HD SAD 950 Kcs 1720 2TL= 133 =AFR= =RRG= Message key: ICA Kenngruppe: NTVRA Plain text: UNDPA NZERJ AEGER ABTEI LUNGR OEMXX IXYSI NDINT RIPOL ISEIN GETRO FFENU NDWER DENSO FORTA NDIEF RONTI NSIRT EGESC HICKT XGENE RALLE UTNAN TERWI NROMM ELX 10. Translation and interpretation of messages (Hut 3)Hut 3 receives, from the DR of Hut 6, the deciphered texts in the form of a series of groups of 5 letters. Then Hut 3 translates the messages and interprets them. For example it replaces the abbreviations. Then Hut 3 carries messages to Whiteall and also (for the most important ones) to theaters of operation through Colonel Winterbottom’s SLUs. 1) Translation of Red TrafficRed Traffic, February 14th, 1941. 1. 6QG APY (Dunkirk to Berlin) 1475 Kcs 1200 31 =ROM= =LNS= KEINE BESONDEREN VORKOMMISSE Nothing to report 2. APY N7Y (Berlin to All) 1475 Kcs 1630 245 =BER= =VEU= Nachrichtenfuehrer vorlegen. Wegen Verrat der taktischem Gliederungen duerfen auf keinem Funknetz bei unwichtigem Verkehr alle Funkstellen gerufen werden. Nur bei wichtigen Funkspruechen ist Quittung zu verlangen X Besatzung aller Funkstellen ist zu belehren. Nafue, Berlin. Submit news guide! - Because of the betrayal of the tactical structures, all radio stations must not be called on any radio network with unimportant traffic. Only for important Acknowledgment message must be requested for radio communications. The crew of all radio stations must be instructed. Nafue, Berlin. 2) Translation of Light Blue TrafficLight Blue traffic, February 14th, 1941. 1. SAD NT3 (Berlin to All) 950 Kcs 1635 245 =BLU= =DAP= Nachrichtenfuehrer vorlegen. Wegen Verrat der taktischem Gliederungen duerfen auf keinem Funknetz bei unwichtigem Verkehr alle Funkstellen gerufen werden. Nur bei wichtigen Funkspruechen ist Quittung zu verlangen X Besatzung aller Funkstellen ist zu belehren. Nafue, Berlin. Submit news guide! - Because of the betrayal of the tactical structures, all radio stations must not be called on any radio network with unimportant traffic. Only for important Acknowledgment message must be requested for radio communications. The crew of all radio stations must be instructed. Nafue, Berlin. 2. 9HD SAD (Tripoli to Berlin) 950 Kcs 1715 2TLE Unternehmen Sonnenblume. Die ersten Einheiten der neuen Afrikakorps (DAK) sind in Afrika angekommen. Die fortgeschrittenen Einheiten der 5. leichten AfrikaDivision, Aufklaerungsbataillon 3. und Panzerjaegerabteilung 39., sind in Tripolis eingetroffen und werden sofort an die Front in Sirte geschickt. Generalleutnant Erwin Rommel. Sunflower operation. The first units of the new Africa Corps (DAK) have arrived in Africa. The advanced units of the 5th Africa Light Division, 3rd Reconnaissance Battalion and 39th Panzerjaeger Division have arrived in Tripoli and are immediately sent to the front at Sirte. Lieutenant General Erwin Rommel. 11. Use (Whitewall or war theater)Hut 3 sends all translated messages to Whitewall by mail. The most important messages are sent by teleprinter to Whitewall and/or directly to generals in theaters of operation. ExampleFrom SIS to General O’Connor’s HQ in Cairo. Message from Tripoli to Berlin, February 14. Sunflower operation. The first units of the new Africa Corps (DAK) have arrived in Africa. The advanced units of the 5th Africa Light Division, 3rd Reconnaissance Battalion and 39th Panzerjaeger Division have arrived in Tripoli and are immediately sent to the front at Sirte. Lieutenant General Erwin Rommel. Comments: - Sunflower Operation: German support for Italian forces in North Africa. - DAK: Deutsches AfrikaKorps: German forces sent to Africa. It will includes at least one armored division. - General Rommel: German General who distinguished himself during the campaign in France. He commanded the 7th Panzerdivision on Hitler’s direct recommandation. |