1314:
193:
264:. In total, the Swedes intercepted 500,000 German messages and decrypted 350,000. However, poor security meant the Germans eventually became aware of this. An improvement in T52 security in 1942 was defeated by the Swedes. However, a second upgrade in mid-1943 was not, and the flow of decrypted messages came to an end.
28:
259:
manufactured a number of T52 analogue machines that could decode the messages once the key settings had been found by hand. The Swedes then read traffic in the system for three years, not only between Berlin and Oslo, but also between
Germany and the German forces in Finland, and of course the German
204:
Siemens produced several and mostly incompatible versions of the T52: the T52a and T52b, which differed only in their electrical noise suppression, and the T52c, T52d and T52e. While the T52a/b and T52c were cryptologically weak, the last two were more advanced devices; the movement of the wheels was
290:
The
British at Bletchley Park later also broke into Sturgeon, although they did not break it as regularly as they broke Enigma or Tunny. This was partly because the T52 was by far the most complex cipher of the three, but also because the Luftwaffe very often retransmitted Sturgeon messages using
1294:
1124:
1347:
162:
with the XOR sum of 3 taps from the pinwheels, and then cyclically adjacent pairs of plaintext bits were swapped or not, according to XOR sums of three (different) output
819:
536:
1357:
977:
283:, codenamed "Mackerel". Operators of both links were in the habit of enciphering several messages with the same machine settings, producing large numbers of
205:
intermittent, the decision on whether or not to advance them being controlled by logic circuits which took input data from the wheels themselves.
154:
way, based in later models on their positions from various relays in the past, but in such a way that they could never stall. Each of the five
184:
in
Bletchley jargon—this could be detected statistically but was not immediately and trivially solvable as it would be with the Lorenz.
529:
208:
In addition, a number of conceptual flaws, including very subtle ones, had been eliminated. One such flaw was the ability to reset the
252:
970:
396:
1352:
177:-and-XOR cipher. For example, if a cipher clerk erred and sent two different messages using exactly the same settings—a
1173:
522:
174:
963:
1342:
1289:
1244:
1057:
32:
1168:
229:
1284:
915:
834:
1274:
1264:
1119:
599:
824:
1269:
1259:
1062:
1022:
1015:
1005:
1000:
900:
624:
619:
559:
173:
This produced a much more complex cipher than the Lorenz machine, and also means that the T52 is not just a
147:
105:
1010:
499:
1317:
1163:
1109:
895:
890:
865:
670:
665:
482:
1279:
1203:
928:
614:
574:
343:
1042:
923:
809:
243:
cracked the two earliest models in two weeks, using just pen and paper (a feat later replicated by
197:
119:
63:
1148:
1132:
1079:
170:, and the triplets of bits that controlled each XOR or swap were selectable through a plugboard.
97:
1208:
1198:
1069:
392:
1143:
425:
360:
122:, with individual cipher-systems being given further codenames: just as the T52 was called
609:
267:
The
British first detected T52 traffic in the summer and autumn of 1942 on a link between
291:
easier-to-attack (or already broken) ciphers, making it unnecessary to attack
Sturgeon.
1218:
1138:
1099:
1047:
1032:
710:
695:
660:
604:
564:
248:
112:
81:
71:
494:
1336:
1299:
1254:
1213:
1193:
1089:
1052:
1027:
756:
551:
411:
284:
240:
237:
233:
179:
101:
1249:
1094:
1084:
1074:
1037:
986:
776:
437:
93:
74:
51:
96:
units, which could support the heavy machine, teletypewriter and attendant fixed
1228:
814:
680:
244:
143:
59:
17:
1188:
1158:
1153:
1114:
789:
346:
Codebreakers: Arne
Beurling and the Swedish crypto program during World War II
320:
276:
472:
212:
to a fixed point, which led to key reuse by undisciplined machine operators.
1178:
456:
New
Information on the History of the Siemens and Halske T52 Cipher Machines
261:
209:
155:
151:
89:
1223:
1183:
938:
933:
486:
256:
115:
477:
844:
829:
784:
736:
715:
221:
167:
412:
The SAVILLE cryptographic algorithm; see note concerning Crum's career
1104:
905:
885:
849:
839:
766:
639:
634:
629:
589:
569:
300:
280:
268:
228:, the Germans started to use a teleprinter circuit which ran through
225:
85:
55:
138:
The teleprinters of the day emitted each character as five parallel
27:
192:
880:
875:
870:
804:
799:
751:
746:
741:
731:
705:
690:
675:
644:
594:
579:
310:
272:
191:
26:
794:
700:
685:
584:
959:
518:
232:. The Swedes immediately tapped the line, in May 1940, and the
163:
159:
139:
445:
The Early Models of the
Siemens and Halske T52 Cipher Machine
460:
Selections from
Cryptologia: History, People, and Technology
348:. Providence, RI: American Mathematical Society; 2002 Jan.
255:
used by the German High
Command). The telephone company
1125:
Cryptographically secure pseudorandom number generator
495:
Bletchley Park's Sturgeon, the Fish that Laid No Eggs
506:
1237:
993:
914:
858:
775:
724:
653:
550:
84:was generally used by field units, the T52 was an
66:. The instrument and its traffic were codenamed
287:. These depths were analysed by Michael Crum.
971:
530:
473:John Savard's page on the Geheimfernschreiber
166:. The numbers of pins on all the wheels were
8:
62:produced by the electrical engineering firm
1348:World War II military equipment of Germany
978:
964:
956:
537:
523:
515:
511:
507:
430:The Siemens and Halske T52e Cipher Machine
389:Colossus: Bletchley Park's Greatest Secret
449:Cryptology: Yesterday, Today and Tomorrow
434:Cryptology: Yesterday, Today and Tomorrow
275:, codenamed "Sturgeon", and another from
382:
380:
378:
142:on five lines, typically encoded in the
336:
146:or something similar. The T52 had ten
100:. It fulfilled a similar role to the
7:
1358:Signals intelligence of World War II
391:. Atlantic Books. pp. 157–158.
126:, the Lorenz machine was codenamed
150:, which were stepped in a complex
25:
1313:
1312:
362:Focus: Siemens & Halske T-52
118:the German teleprinter ciphers
1174:Information-theoretic security
462:, Artech House, Norwood, 1998)
1:
175:pseudorandom number generator
111:The British cryptanalysts of
31:"Sturgeon" exhibit at the US
220:Following the occupation of
48:SchlĂĽsselfernschreibmaschine
1290:Message authentication code
1245:Cryptographic hash function
1058:Cryptographic hash function
46:("secret teleprinter"), or
33:National Cryptologic Museum
1374:
1169:Harvest now, decrypt later
1308:
1285:Post-quantum cryptography
955:
514:
510:
359:Rijmenants, Dirk (2008),
253:Lorenz teleprinter device
196:A T52d on display at the
1275:Quantum key distribution
1265:Authenticated encryption
1120:Random number generation
490:Cryptographic Dictionary
40:Siemens & Halske T52
1270:Public-key cryptography
1260:Symmetric-key algorithm
1063:Key derivation function
1023:Cryptographic primitive
1016:Authentication protocol
1006:Outline of cryptography
1001:History of cryptography
478:Photographs of Sturgeon
1353:Cryptographic hardware
1011:Cryptographic protocol
762:Siemens and Halske T52
500:The Rutherford Journal
201:
35:
1164:End-to-end encryption
1110:Cryptojacking malware
825:Sectéra Secure Module
387:Gannon, Paul (2006).
195:
30:
1280:Quantum cryptography
1204:Trusted timestamping
929:Intel SHA extensions
483:Entry for "Sturgeon"
64:Siemens & Halske
42:, also known as the
1043:Cryptographic nonce
924:AES instruction set
447:(also reprinted in
198:Imperial War Museum
1343:Encryption devices
1149:Subliminal channel
1133:Pseudorandom noise
1080:Key (cryptography)
454:Donald W. Davies,
443:Donald W. Davies,
202:
36:
1330:
1329:
1326:
1325:
1209:Key-based routing
1199:Trapdoor function
1070:Digital signature
951:
950:
947:
946:
916:Computer hardware
661:Bazeries cylinder
16:(Redirected from
1365:
1316:
1315:
1144:Insecure channel
980:
973:
966:
957:
539:
532:
525:
516:
512:
508:
440:, Norwood, 1987)
426:Donald W. Davies
414:
409:
403:
402:
384:
373:
372:
371:
369:
356:
350:
341:
104:machines in the
88:machine used by
21:
1373:
1372:
1368:
1367:
1366:
1364:
1363:
1362:
1333:
1332:
1331:
1322:
1304:
1233:
989:
984:
943:
910:
854:
771:
757:Lorenz SZ 40/42
720:
649:
546:
545:Cipher machines
543:
469:
422:
417:
410:
406:
399:
386:
385:
376:
367:
365:
358:
357:
353:
342:
338:
334:
329:
297:
218:
190:
136:
44:Geheimschreiber
23:
22:
18:Geheimschreiber
15:
12:
11:
5:
1371:
1369:
1361:
1360:
1355:
1350:
1345:
1335:
1334:
1328:
1327:
1324:
1323:
1321:
1320:
1309:
1306:
1305:
1303:
1302:
1297:
1295:Random numbers
1292:
1287:
1282:
1277:
1272:
1267:
1262:
1257:
1252:
1247:
1241:
1239:
1235:
1234:
1232:
1231:
1226:
1221:
1219:Garlic routing
1216:
1211:
1206:
1201:
1196:
1191:
1186:
1181:
1176:
1171:
1166:
1161:
1156:
1151:
1146:
1141:
1139:Secure channel
1136:
1130:
1129:
1128:
1117:
1112:
1107:
1102:
1100:Key stretching
1097:
1092:
1087:
1082:
1077:
1072:
1067:
1066:
1065:
1060:
1050:
1048:Cryptovirology
1045:
1040:
1035:
1033:Cryptocurrency
1030:
1025:
1020:
1019:
1018:
1008:
1003:
997:
995:
991:
990:
985:
983:
982:
975:
968:
960:
953:
952:
949:
948:
945:
944:
942:
941:
936:
931:
926:
920:
918:
912:
911:
909:
908:
903:
898:
893:
888:
883:
878:
873:
868:
862:
860:
856:
855:
853:
852:
847:
842:
837:
832:
827:
822:
817:
812:
807:
802:
797:
792:
787:
781:
779:
773:
772:
770:
769:
764:
759:
754:
749:
744:
739:
734:
728:
726:
722:
721:
719:
718:
713:
711:Reihenschieber
708:
703:
698:
696:Jefferson disk
693:
688:
683:
678:
673:
668:
663:
657:
655:
651:
650:
648:
647:
642:
637:
632:
627:
622:
617:
612:
607:
602:
597:
592:
587:
582:
577:
572:
567:
562:
556:
554:
552:Rotor machines
548:
547:
544:
542:
541:
534:
527:
519:
505:
504:
492:
480:
475:
468:
467:External links
465:
464:
463:
458:(reprinted in
452:
441:
432:(reprinted in
421:
418:
416:
415:
404:
397:
374:
351:
335:
333:
330:
328:
325:
324:
323:
318:
308:
296:
293:
249:Bletchley Park
217:
214:
189:
186:
158:bits was then
135:
132:
113:Bletchley Park
82:Enigma machine
24:
14:
13:
10:
9:
6:
4:
3:
2:
1370:
1359:
1356:
1354:
1351:
1349:
1346:
1344:
1341:
1340:
1338:
1319:
1311:
1310:
1307:
1301:
1300:Steganography
1298:
1296:
1293:
1291:
1288:
1286:
1283:
1281:
1278:
1276:
1273:
1271:
1268:
1266:
1263:
1261:
1258:
1256:
1255:Stream cipher
1253:
1251:
1248:
1246:
1243:
1242:
1240:
1236:
1230:
1227:
1225:
1222:
1220:
1217:
1215:
1214:Onion routing
1212:
1210:
1207:
1205:
1202:
1200:
1197:
1195:
1194:Shared secret
1192:
1190:
1187:
1185:
1182:
1180:
1177:
1175:
1172:
1170:
1167:
1165:
1162:
1160:
1157:
1155:
1152:
1150:
1147:
1145:
1142:
1140:
1137:
1134:
1131:
1126:
1123:
1122:
1121:
1118:
1116:
1113:
1111:
1108:
1106:
1103:
1101:
1098:
1096:
1093:
1091:
1090:Key generator
1088:
1086:
1083:
1081:
1078:
1076:
1073:
1071:
1068:
1064:
1061:
1059:
1056:
1055:
1054:
1053:Hash function
1051:
1049:
1046:
1044:
1041:
1039:
1036:
1034:
1031:
1029:
1028:Cryptanalysis
1026:
1024:
1021:
1017:
1014:
1013:
1012:
1009:
1007:
1004:
1002:
999:
998:
996:
992:
988:
981:
976:
974:
969:
967:
962:
961:
958:
954:
940:
937:
935:
932:
930:
927:
925:
922:
921:
919:
917:
913:
907:
904:
902:
899:
897:
894:
892:
889:
887:
884:
882:
879:
877:
874:
872:
869:
867:
864:
863:
861:
857:
851:
848:
846:
843:
841:
838:
836:
833:
831:
828:
826:
823:
821:
818:
816:
813:
811:
808:
806:
803:
801:
798:
796:
793:
791:
788:
786:
783:
782:
780:
778:
774:
768:
765:
763:
760:
758:
755:
753:
750:
748:
745:
743:
740:
738:
735:
733:
730:
729:
727:
723:
717:
714:
712:
709:
707:
704:
702:
699:
697:
694:
692:
689:
687:
684:
682:
679:
677:
674:
672:
669:
667:
664:
662:
659:
658:
656:
652:
646:
643:
641:
638:
636:
633:
631:
628:
626:
623:
621:
618:
616:
613:
611:
608:
606:
603:
601:
598:
596:
593:
591:
588:
586:
583:
581:
578:
576:
573:
571:
568:
566:
563:
561:
558:
557:
555:
553:
549:
540:
535:
533:
528:
526:
521:
520:
517:
513:
509:
502:
501:
496:
493:
491:
488:
484:
481:
479:
476:
474:
471:
470:
466:
461:
457:
453:
450:
446:
442:
439:
435:
431:
427:
424:
423:
419:
413:
408:
405:
400:
398:1-84354-330-3
394:
390:
383:
381:
379:
375:
364:
363:
355:
352:
349:
347:
340:
337:
331:
326:
322:
319:
316:
312:
309:
306:
305:United States
302:
299:
298:
294:
292:
288:
286:
282:
278:
274:
270:
265:
263:
258:
254:
250:
246:
242:
241:Arne Beurling
239:
238:cryptographer
235:
234:mathematician
231:
227:
223:
216:Cryptanalysis
215:
213:
211:
206:
199:
194:
187:
185:
183:
181:
176:
171:
169:
165:
161:
157:
153:
149:
145:
141:
133:
131:
129:
125:
121:
117:
114:
109:
107:
103:
102:Lorenz cipher
99:
95:
91:
87:
83:
78:
76:
75:cryptanalysts
73:
69:
65:
61:
57:
53:
50:(SFM), was a
49:
45:
41:
34:
29:
19:
1250:Block cipher
1095:Key schedule
1085:Key exchange
1075:Kleptography
1038:Cryptosystem
987:Cryptography
777:Secure voice
761:
570:M-125 Fialka
498:
489:
459:
455:
448:
444:
438:Artech House
433:
429:
407:
388:
366:, retrieved
361:
354:
345:
339:
314:
304:
289:
266:
219:
207:
203:
178:
172:
137:
127:
123:
110:
79:
67:
58:machine and
52:World War II
47:
43:
39:
37:
1238:Mathematics
1229:Mix network
725:Teleprinter
681:Cipher disk
368:18 November
344:Beckman B.
260:embassy in
144:Baudot code
106:German Army
94:German Navy
60:teleprinter
1337:Categories
1189:Ciphertext
1159:Decryption
1154:Encryption
1115:Ransomware
790:FASCINATOR
654:Mechanical
327:References
321:Siemens AG
277:the Aegean
245:Bill Tutte
80:While the
1179:Plaintext
487:GC&CS
332:Citations
262:Stockholm
251:with the
210:keystream
200:, London.
156:plaintext
152:nonlinear
148:pinwheels
134:Operation
116:codenamed
90:Luftwaffe
1318:Category
1224:Kademlia
1184:Codetext
1127:(CSPRNG)
939:IBM 4764
934:IBM 4758
901:Pinwheel
295:See also
257:Ericsson
124:Sturgeon
98:circuits
68:Sturgeon
994:General
845:STU-III
830:SIGSALY
785:BID 150
737:BID 770
716:Scytale
640:Singlet
600:Mercury
485:in the
420:Sources
315:Britain
222:Denmark
168:coprime
72:British
54:German
1105:Keygen
906:Rockex
896:Purple
886:Noreen
850:VINSON
840:STU-II
810:NESTOR
767:SIGTOT
635:SIGCUM
630:SIGABA
590:Lacida
575:Hebern
565:Enigma
395:
301:SIGABA
285:depths
281:Sicily
269:Sicily
230:Sweden
226:Norway
188:Models
182:of two
86:online
56:cipher
1135:(PRN)
881:KL-51
876:KL-43
871:KG-84
859:Other
805:KY-68
800:KY-58
752:KW-37
747:KW-26
742:DUDEK
732:5-UCO
706:M-209
691:Kryha
676:CD-57
645:Typex
625:SG-41
620:SG-39
595:M-325
580:HX-63
311:Typex
273:Libya
180:depth
160:XORed
128:Tunny
866:JADE
820:SCIP
815:OMNI
795:KY-3
701:M-94
686:HC-9
671:C-52
666:C-36
605:NEMA
585:KL-7
393:ISBN
370:2014
271:and
236:and
224:and
164:bits
140:bits
120:Fish
92:and
38:The
891:Red
835:STE
615:RED
610:OMI
560:CCM
497:at
279:to
247:at
70:by
1339::
436:,
428:,
377:^
130:.
108:.
77:.
979:e
972:t
965:v
538:e
531:t
524:v
503:.
451:)
401:.
317:)
313:(
307:)
303:(
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.