Biuro Szyfrów

The Biuro Szyfrów ([ˈbʲurɔ ˈʂɨfruf], Polish for "Cipher Bureau") was the interwar Polish General Staff's Second Department's organizational unit charged with SIGINT and both cryptography (the use of ciphers and codes) and cryptanalysis (the study of ciphers and codes, particularly for the purpose of "breaking" them).

The precursor of the agency that would become the Cipher Bureau was created in May 1919, during the Polish-Soviet War (1919–21), and played a vital role in securing Poland's survival and victory in that war.

In mid-1931, the Cipher Bureau was formed by the merger of pre-existing agencies. In December 1932, the Bureau began breaking Germany's Enigma ciphers. Over the next seven years, Polish cryptologists overcame the growing structural and operating complexities of the plugboard-equipped Enigma. The Bureau also broke Soviet cryptography.

Five weeks before the outbreak of World War II, on 25 July 1939, in Warsaw, the Polish Cipher Bureau revealed its Enigma-decryption techniques and equipment to representatives of French and British military intelligence, which had been unable to make any headway against Enigma. This Polish intelligence-and-technology transfer would give the Allies an unprecedented advantage (Ultra) in their ultimately victorious prosecution of World War II.

Precursor

General Staff building (Saxon Palace), destroyed in World War II. In the photo, the arcade shelters the Tomb of the Unknown Soldier, before which stands Thorvaldsen's equestrian statue of Prince Józef Poniatowski. In this building, from 1932, the Cipher Bureau broke the German plugboard military Enigma.
Main article: Polish-Soviet War

On 8 May 1919, a Polish Army "Cipher Section" (Sekcja Szyfrów), precursor to the "Cipher Bureau" (Biuro Szyfrów), was created by Lt. Józef Serafin Stanslicki.[1] The Cipher Section reported to the Polish General Staff and contributed substantially to Poland's defense by Józef Piłsudski's forces during the Polish-Soviet War of 1919–21, thereby helping preserve Poland's independence, recently regained in the wake of World War I.[2] The Cipher Section's purview included both ciphers and codes.[3] In loose Polish parlance, the term "cipher" ("szyfr") refers to both these two principal categories of cryptography.[3] (The opposite is the practice in English, which loosely refers to both codes and ciphers as "codes."[4])

During the Polish–Soviet War (1919–1921), some one hundred Russian ciphers were broken by a sizable cadre of Polish cryptologists who included army Lieutenant Jan Kowalewski and three world-famous professors of mathematics — Stefan Mazurkiewicz, Wacław Sierpiński and Stanisław Leśniewski.[5] Russian army staffs were still following the same disastrously ill-disciplined signals-security procedures as had Tsarist army staffs during World War I, to the decisive advantage of their German enemy.[3] As a result, during the Polish-Soviet War the Polish military were regularly kept informed by Russian signals stations about the movements of Russian armies and their intentions and operational orders.[3]

The Russian staffs, according to Polish Colonel Mieczysław Ścieżyński, "had not the slightest hesitation about sending any and all messages of an operational nature by means of radiotelegraphy; there were periods during the war when, for purposes of operational communications and for purposes of command by higher staffs, no other means of communication whatever were used, messages being transmitted either entirely ("in clear," or plaintext) or encrypted by means of such an incredibly uncomplicated system that for our trained specialists reading the messages was child's play. The same held for the chitchat of personnel at radiotelegraphic stations, where discipline was disastrously lax."[6]

In the crucial month of August 1920 alone, Polish cryptologists decrypted 410 signals: from Soviet General Mikhail Tukhachevsky, commander of the northern front; from Leon Trotsky, Soviet commissar of war; from commanders of armies, e.g. the commander of the IV Army, Sergieyev; the commander of the Horse Army, Semyon Budionny; the commander of the 3 Cavalry Corps, Gaya; from the staffs of the XII, XV and XVI Armies; from the staffs of the Mozyr Group (named after the Belarusian city); the Zolochiv Group (after the Ukrainian town); the Yakir Group [after General Iona Emmanuilovich Yakir]; from the 2, 4, 7, 10, 11, 12, 16, 17, 18, 24, 27, 41, 44, 45, 53, 54, 58 and 60 Infantry Divisions; from the 8 Cavalry Division, etc.[7]

The intercepts were as a rule decrypted the same day, or at latest the next day, and were immediately sent to the Polish General Staff's Section II (Intelligence) and operational section. The more important signals were read in their entirety by the Chief of the General Staff, and even by the Commander in Chief, Marshal Józef Piłsudski.[8] Interception and reading of the signals provided Polish intelligence with entire Russian operational orders. The Poles were able to follow the whole operation of Budionny's Horse Army in the second half of August 1920 with incredible precision, just by monitoring his radiotelegraphic correspondence with Tukhachevsky, including the famous and historic conflict between the two Russian commanders.[9]

The intercepts even included an order from Trotsky to the revolutionary council of war of the Western Front, confirming Tukhachevsky's operational orders, thus giving them the authority of the supreme chief of the Soviet armed forces.[10] An entire operational order from Tukhachevsky to Budionny was intercepted on 19 August and read on 20 August, stating the tasks of all of Tukhachevsky's armies, of which only the essence had previously been known.[11]

Ścieżyński surmises that the Soviets must likewise have intercepted Polish operational signals; but he doubts that this would have availed them much since Polish cryptography "stood abreast of modern cryptography" and since only a small number of Polish higher headquarters were equipped with radio stations, of which there was a great shortage; and finally, Polish headquarters were more cautious than the Russians and almost every Polish division had the use of a land line.[11]

Polish cryptologists enjoyed generous support under the command of Col. Tadeusz Schaetzel, chief of the Polish General Staff's Section II (Intelligence). They worked at Warsaw's radio station WAR, one of two Polish long-range radio transmitters at the time. The Polish cryptologists' work led, among many other things, to discovery of a large gap on the Red Army's left flank, which enabled Poland's Marshal Józef Piłsudski to drive a war-winning wedge into that gap during the August 1920 Battle of Warsaw.[11]

The discovery of the Cipher Bureau's archives, decades after the Polish-Soviet War, has borne out Ścieżyński's assertion

that... radio intelligence... furnished [the Polish Commander-in-Chief, Józef Piłsudski], in the years 1919–1920... the most complete and... current intelligence on all aspects of the functioning of the Red Army, especially of units operating on the anti-Polish front, that it was radio intelligence that to a large degree determined the course of all... military operations conducted by Poland in 1920 — from the January fighting at Ovruch, through the March operation against Mozyr and Kiev, the April operation in Ukraine, the battles with Tukhachevsky's first and second offensives in Belarus, the battles with Budionny's Cavalry Army, the Battle of Brody, to the Battles of Warsaw, Lwów and the Niemen.[11]

Cipher Bureau

In mid-1931, at the Polish General Staff, a Cipher Bureau was formed by merging the Radio-Intelligence Office (Referat Radiowywiadu) and the Polish-Cryptography Office (Referat Szyfrów Własnych).[12] The Bureau was charged with both cryptography — the generation, and supervision of the use, of ciphers and codes — and cryptology, the study of ciphers and codes, particularly for the purpose of "breaking" them.[13]

Between 1932 and 1936, the Cipher Bureau took on additional responsibilities, including radio communications between military-intelligence posts in Poland and abroad, as well as radio counterintelligence — mobile direction-finding and intercept stations for the locating and traffic-analysis of spy and fifth-column transmitters operating in Poland.[12]

Stalking Enigma

The Enigma machine was an electro-mechanical rotor machine with a scrambler consisting of (from right to left) an entry drum, three rotors and a reflector. It was available commercially from the early 1920s and was modified for use by the German military who adopted it later in the decade.
Marian Rejewski ca. 1932, when he first broke Enigma

In late 1927 or early 1928, there arrived at the Warsaw Customs Office from Germany a package that, according to the accompanying declaration, was supposed to contain radio equipment. The German firm's representative strenuously demanded that the package be returned to Germany even before going through customs, as it had been shipped with other equipment by mistake. His insistent demands alerted the customs officials, who notified the Polish General Staff's Cipher Bureau, which took a keen interest in new developments in radio technology. And since it happened to be a Saturday afternoon, the Bureau's experts had ample time to look into the matter. They carefully opened the box and found that it did not, in fact, contain radio equipment but a cipher machine. They examined the machine minutely, then put it back into the box.[14]

The Bureau's leading Enigma cryptanalyst Marian Rejewski commented that the cipher machine may be surmised to have been a commercial-model Enigma, since at that time the military model had not yet been devised. "Hence this trivial episode was of no practical importance, though it does fix the date at which the Cipher Bureau's interest in the Enigma machine began"  manifested, initially, in the entirely legal acquisition of a single commercial-model Enigma.[14]

On 15 July 1928 the first German machine-enciphered messages were broadcast by German military radio stations. Polish monitoring stations began intercepting them, and cryptologists in the Polish Cipher Bureau's German section were instructed to try to read them. The effort was fruitless, however, and was eventually abandoned. There remained very slight evidence of the effort, in the form of a few densely written-over sheets of paper and the commercial-model Enigma machine.[14] On 15 January 1929 Major Gwido Langer, after a tour of duty as chief of staff of the 1st Legion Infantry Division, became chief of the Radio-Intelligence Office, and subsequently of the Cipher Bureau.[12] The Bureau's deputy chief, and the chief of its German section (BS-4), was Captain Maksymilian Ciężki.

In 1929, while the Cipher Bureau's predecessor agency was still headed by Major Franciszek Pokorny (a relative of the outstanding World War I Austro-Hungarian Army cryptologist, Captain Herman Pokorny[14]), Ciężki, Franciszek Pokorny, and a civilian Bureau associate, Antoni Palluth, taught a secret cryptology course at Poznań University for selected mathematics students. Over ten years later, during World War II while in France, one of the students, Marian Rejewski, would discover that the entire course had been taught from French General Marcel Givièrge's book, Cours de cryptographie (Course of Cryptography), published in 1925.[15]

In September 1932, Maksymilian Ciężki hired three young graduates of the Poznań course to be Bureau staff members: Marian Rejewski, Jerzy Różycki and Henryk Zygalski.[15]

Successes and setbacks

In 1926, the German Navy adopted, as its top cryptographic device, a modified civilian Enigma machine; in 1928 the German Army followed suit.[16] The complexity of the system was much increased in 1930 by the introduction of a plugboard (Steckerbrett), albeit with only six connecting leads in use.[17] In December 1932, Marian Rejewski made what historian David Kahn describes as one of the greatest advances in cryptologic history, by applying pure mathematics  the theory of permutations and groups  to breaking the German armed forces' Enigma machine ciphers.[18][19] Rejewski had worked out the precise interconnections of the Enigma rotors and reflector, after the Bureau had received, from French Military Intelligence Captain Gustave Bertrand, two German documents and two pages of Enigma daily keys (for September and October of that year).[20] These had been obtained by a French military intelligence agent, a German codenamed Rex,[21] from an agent who worked at Germany's Cipher Office in Berlin, Hans-Thilo Schmidt, whom the French codenamed Asché.[22][23]

Cyclometer, devised in the mid-1930s by Rejewski to catalog the cycle structure of Enigma permutations. 1: Rotor lid closed, 2: Rotor lid open, 3: Rheostat, 4: Glowlamps, 5: Switches, 6: Letters.

After Rejewski had worked out the military Enigma's logical structure, the Polish Cipher Bureau commissioned the AVA Radio Company, co-owned by Antoni Palluth, to build replicas ("doubles") of the Enigma to Rejewski's specifications.[24] His method of decrypting Enigma messages exploited two weaknesses of the German operating procedures.[25] It used what Rejewski called "characteristics" that were independent of the plugboard connections.[26] This involved compiling a card catalog of certain features of the set of indicator settings.[27]

The Germans increased the difficulty of decrypting Enigma messages by decreasing the interval between changes in the order of the rotors from quarterly, initially, to monthly in February 1936, then daily in October of that year, when they also increased the number of plugboard leads from six to a number that varied between five and eight. This made the Biuro's grill method much less easy,[28] as it relied on unsteckered letter pairs.[29] The German navy was more security-conscious than the army and air force, and in May 1937 it introduced a new, much more secure, indicator procedure that remained unbroken for several years.[30]

The next setback occurred in November 1937, when the scrambler's reflector was changed to one with different interconnections (known as Umkehrwalze-B). Rejewski worked out the wiring in the new reflector, but the catalog of characteristics had to be compiled anew, again using Rejewski's "cyclometer", which had been built to his specifications by the AVA Radio Company.[31]

In January 1938, Colonel Stefan Mayer directed that statistics be compiled for a two-week period, comparing the numbers of Enigma messages solved, to Enigma intercepts. The ratio came to 75 percent. "Nor," Marian Rejewski has commented, "were those 75 percent ... the limit of our possibilities. With slightly augmented personnel, we might have attained about 90 percent ... read. But a certain amount of cipher material ... due to faulty transmission or ... reception, or to various other causes, always remains unread ..."[32] Information obtained from Enigma decryption seems to have been directed from B.S.-4 principally to the German Office of the General Staff's Section II (Intelligence). There, from fall 1935 to mid-April 1939, it was worked up by Major Jan Leśniak, who in April 1939 would turn the German Office over to another officer and himself form a Situation Office intended for wartime service. He would head the Situation Office to and through the September 1939 Campaign.[33]

The system of pre-defining the indicator setting for the day for all Enigma operators on a given network, on which the method of characteristics depended, was changed on 15 September 1938. The one exception to this was the network used by the Sicherheitsdienst (SD)—the intelligence agency of the SS and the Nazi Party—who did not make the change until 1 July 1939. Operators now chose their own indicator setting. However, the insecure procedure of sending the enciphered message key twice, remained in use, and it was quickly exploited. Henryk Zygalski devised a manual method that used 26 perforated sheets, and Marian Rejewski commissioned the AVA company to produce the bomba kryptologiczna (cryptologic bomb).[34]

Both the Zygalski-sheet method and each bomba worked for only a single scrambler rotor order, so six sets of Zygalski sheets and six bomby were produced.[35] However, the Germans introduced two new rotors on 15 December 1938, giving a choice of three out of five to assemble in the machines on a given day.[36] This increased the number of possible rotor orders from 6 to 60. The Biuro could then only read the small minority of messages that used neither of the two new rotors. They did not have the resources to produce 54 more bomby or 54 sets of Zygalski sheets. Fortunately, however, the fact that the SD network was still using the old method of the same indicator setting for all messages, allowed Rejewski to re-use his previous method of working out the wiring within these rotors.[37] This information was essential for the production of a full set Zygalski sheets which allowed resumption of large-scale decryption in January 1940. On 1 January 1939, the Germans made military Enigma even more difficult to break by increasing the number of plugboard connections from between five and eight, to between seven and ten.[29]

When World War II broke out on 1 September 1939, Leśniak and his colleagues had been working intensively for two or three years to establish the German order of battle and had succeeded in working out nearly 95 percent of it. The German attack on Poland came as no surprise to the Polish General Staff. The results that had been obtained by Polish intelligence, according to Leśniak, "absolutely exceeded what would normally have been possible."[38]

Kabaty Woods

Until 1937 the Cipher Bureau's German section, BS-4, had been housed in the Polish General Staff building — the stately 18th-century "Saxon Palace" — in Warsaw. That year BS-4 moved into specially constructed new facilities in the Kabaty Woods near Pyry, south of Warsaw. There, working conditions were incomparably better than in the cramped quarters at the General Staff building.[39]

The move was dictated as well by requirements of security. Germany's Abwehr was always looking for potential traitors among the military and civilian workers at the General Staff building. Strolling agents, even if lacking access to the Staff building, could observe personnel entering and leaving, and photograph them with concealed miniature cameras. Annual Abwehr intelligence assignments for German agents in Warsaw placed a priority on securing informants at the Polish General Staff.[39]

Gift to allies

It was at Pyry, on 25 and 26[40] July 1939 with war looming that, on instructions from the Polish General Staff, the Cipher Bureau's chiefs, Lt. Col. Gwido Langer and Major Maksymilian Ciężki, the three civilian mathematician-cryptologists, and Col. Stefan Mayer, chief of intelligence, revealed Poland's achievements to cryptanalytical representatives of France and Britain, explaining how they had broken Enigma. They undertook to give each country a Polish-reconstructed Enigma, along with details of their equipment, including Zygalski sheets and Rejewski's cryptologic bomb.[41] In return, the British pledged to prepare two full sets of Zygalski sheets for all 60 possible wheel orders.[42] The French contingent consisted of Major Gustave Bertrand, the French radio-intelligence and cryptology chief, and Capt. Henri Braquenié of the French Air Force staff. The British sent Commander Alastair Denniston, head of Britain's Government Code and Cypher School, Dilly Knox, chief British cryptanalyst[43] and Commander Humphrey Sandwith, head of the Royal Navy's intercept and direction-finding stations.[44]

When Rejewski had been working on reconstructing the German military Enigma machine in late 1932, he had ultimately solved a crucial element, the wiring of the letters of the alphabet into the entry drum, with the inspired guess that they might be wired in simple alphabetical order. Now, at the trilateral meeting  Rejewski was later to recount  "the first question that ... Dillwyn Knox asked was: 'What are the connections in the entry drum?'" Knox was mortified to learn how simple the answer was.[45]

The Poles' gift, to their western Allies, of Enigma decryption, five weeks before the outbreak of World War II, came not a moment too soon. Former Bletchley Park mathematician-cryptologist Gordon Welchman has written: "Ultra would never have gotten off the ground if we had not learned from the Poles, in the nick of time, the details both of the German military ... Enigma machine, and of the operating procedures that were in use."[46] Allied Supreme Commander Dwight D. Eisenhower, at war's end, described intelligence from Bletchley Park as having been "of priceless value to me. It has simplified my task as a commander enormously." Eisenhower expressed his thanks for this "decisive contribution to the Allied war effort."[47]

Churchill's greatest wartime fear, even after Hitler had suspended Operation Sea Lion and invaded the Soviet Union, was that the German submarine wolfpacks would succeed in strangling sea-locked Britain.[48] A major factor that averted Britain's defeat in the Battle of the Atlantic was her regained mastery of Naval Enigma decryption; and while the latter benefited crucially from British seizure of German Enigma-equipped naval vessels, the breaking of German naval signals ultimately relied on techniques that had been pioneered by the Polish Cipher Bureau.[49] Had Britain capitulated to Hitler, the United States would have been deprived of an essential forward base for its subsequent involvement in the European and North African theaters.[50]

A week after the Pyry meeting, Dillwyn Knox, in a letter dated 1 August 1939, thanked the Poles, in Polish, "for your cooperation and patience." He enclosed little paper batons and a scarf picturing a Derby horse race  evidently emblematic of the cryptological race that Knox had hoped to win using the batons, and whose loss he was gallantly acknowledging.[51]

On 5 September 1939, as it became clear that Poland was unlikely to halt the ongoing German invasion, BS-4 received orders to destroy part of its files and evacuate essential personnel.[52]

Bureau abroad

German horse artillery parading before the Saxon Palace, autumn 1939. Hitler also, in his Mercedes, took part in a parade before the Saxon Palace.
German sentries before the Saxon Palace (Polish General Staff building) where the German military Enigma had been broken and read by the Poles for several years before the war. Photo taken before 30 August 1940, when the Germans concealed Thorvaldsen's statue of Prince Józef Poniatowski.

During the German Invasion of Poland in September 1939, key Cipher Bureau personnel were evacuated southeast and—after the Soviets invaded eastern Poland on 17 September—into Romania, on the way destroying their cryptological equipment and documentation. Eventually, crossing Yugoslavia and still-neutral Italy, they reached France. Some personnel of the Cipher Bureau's German section who had worked with Enigma, and most of the workers at the AVA Radio Company that had built Enigma doubles and cryptologic equipment for the German section, remained in Poland. Some were interrogated by the Gestapo, but no one gave away the secret of Polish mastery of Enigma decryption.[53] At PC Bruno, outside Paris, on 20 October 1939 the Poles resumed work on German Enigma ciphers in close collaboration with Britain's Government Code and Cypher School at Bletchley Park.[54]

In the interest of security, the allied cryptological services, before sending their messages over a teleprinter line, encrypted them using Enigma doubles. Henri Braquenié often closed messages with an ironic "Heil Hitler!"[55]

As late as December 1939, when Lt. Col. Gwido Langer, accompanied by Captain Braquenié, visited London and Bletchley Park, the British asked that the Polish cryptologists be turned over to them. Langer, however, took the position that the Polish team must remain where the Polish Armed Forces were being formed  on French soil.[56] The mathematicians might actually have reached Britain much earlier  and much more comfortably  than they eventually did; but in September 1939, when they went to the British embassy in Bucharest, Romania, they were brushed off by a preoccupied British diplomat.[57]

In January 1940, the British cryptanalyst Alan Turing spent several days at PC Bruno conferring with his Polish colleagues. He had brought the Poles a full set of Zygalski sheets that had been produced at Bletchley Park by John Jeffreys using Polish-supplied information. On 17 January 1940, the Poles made the first break into wartime Enigma traffic—that from 28 October 1939.[58]

During this period, until the collapse of France in June 1940, ultimately 83 percent of the Enigma keys that were found, were solved at Bletchley Park, the remaining 17 percent at PC Bruno. Rejewski commented:

How could it be otherwise, when there were three of us [Polish cryptologists] and [there were] at least several hundred British cryptologists, since about 10,000 people worked in Bletchley... Besides, recovery of keys also depended on the amount of intercepted cipher material, and that amount was far greater on the British side than on the French side. Finally, in France (by contrast with the work in Poland) we ourselves not only sought for the daily keys, but after finding the key also read the messages.... One can only be surprised that the Poles had as many as 17 percent of the keys to their credit.[59][60][61]

The inter-Allied cryptologic collaboration prevented duplication of effort and facilitated discoveries. Before fighting had started in Norway in April 1940, the Polish-French team solved an uncommonly hard three-letter code used by the Germans to communicate with fighter and bomber squadrons and for exchange of meteorological data between aircraft and land.[62] The code had first appeared in December 1939, but the Polish cryptologists had been too preoccupied with Enigma to give the code much attention.[62] With the German assault on the west impending, however, the breaking of the Luftwaffe code took on mounting urgency. The trail of the elusive code (whose system of letters changed every 24 hours) led back to Enigma. The first clue came from the British, who had noticed that the code's letters did not change randomly. If A changed to P, then elsewhere P was replaced by A. The British made no further headway, but the Poles realized that what was manifesting was Enigma's exclusivity principle that they had discovered in 1932. The Germans' carelessness meant that now the Poles, having after midnight solved Enigma's daily setting, could with no further effort also read the Luftwaffe signals.[63][64]

The Germans, just before opening their 10 May 1940 offensive in the west that would trample Belgium, Luxembourg and the Netherlands in order to reach the borders of France, once again changed their procedure for enciphering message keys, rendering the Zygalski sheets "completely useless"[65][66] and temporarily defeating the joint British-Polish cryptologic attacks on Enigma. According to Gustave Bertrand, "It took superhuman day-and-night effort to overcome this new difficulty: on May 20, decryption resumed."[67][68]

Following the capitulation of France in June 1940, the Poles were evacuated to Algeria. On October 1, 1940, they resumed work at "Cadix", near Uzès in unoccupied southern, Vichy France, under the sponsorship of Gustave Bertrand.[69]

A little over two years later, on 8 November 1942, Bertrand learned from the BBC that the Allies had landed in French North Africa ("Operation Torch"). Knowing that in such an eventuality the Germans planned to occupy Vichy France, on 9 November he evacuated Cadix. Two days later, on 11 November, the Germans indeed marched into southern France. On the morning of 12 November they occupied Cadix.[70]

Over the two years since its establishment in October 1940, Cadix had decrypted thousands of Wehrmacht, SS and Gestapo messages, originating not only from French territory but from across Europe, which provided invaluable intelligence to Allied commands and resistance movements.[71][72] Cadix had also decrypted thousands of Soviet messages.[73]

Having departed Cadix, the Polish personnel evaded the occupying Italian security police and German Gestapo and sought to escape France via Spain.[74] Jerzy Różycki, Jan Graliński and Piotr Smoleński had died in the January 1942 sinking, in the Mediterranean Sea, of a French passenger ship, the Lamoricière, in which they had been returning to southern France from a tour of duty in Algeria.[75][76]

Marian Rejewski and Henryk Zygalski hiked over the Pyrenees with a guide (who robbed them at gunpoint) to the Spanish border, where they were arrested on January 30, 1943.[77] They were incarcerated by the Spaniards for three months before being released, upon Red Cross intervention, on 4 May 1943.[78] They then managed, by a circuitous land–sea–air route, to join the Polish Armed Forces in Britain,[79] Rejewski and Zygalski were inducted into the Polish Army as privates (they would eventually be promoted to lieutenant) and put to work breaking German SS and SD hand ciphers at a Polish signals facility in Boxmoor. Because of their having been in occupied France, the British considered it too risky to invite them to work at Bletchley Park.[80]

Finally, with the end of the two mathematicians' cryptologic work at the close of World War II, the Cipher Bureau ceased to exist. From nearly its inception in 1931 until war's end in 1945, the Bureau, sometimes incorporated into aggregates under cryptonyms (PC Bruno and Cadix), had been essentially the same agency, with most of the same core personnel, carrying out much the same tasks; now it was extinguished. Neither Rejewski nor Zygalski would work again as cryptologists.[81] In late 1946 Rejewski returned to his family in a devastated and politically altered Poland, to live there another 33 years until his death in February 1980.[82] Zygalski would remain in England until his death in August 1978.[81]

Secret preserved

Despite their travails, Rejewski and Zygalski had fared better than some of their colleagues. Cadix's Polish military chiefs, Langer and Ciężki, had also been captured by the Germans, as they tried to escape from France into Spain on the night of March 10–11, 1943 along with three other Poles: Antoni Palluth, Edward Fokczyński and Kazimierz Gaca.[83] The first two became prisoners of war; the other three were sent as slave labourers to Germany, where Palluth and Fokczyński perished.[84] Despite the varyingly dire circumstances in which they were held, none of them Stefan Mayer emphasizes betrayed the secret of Enigma's decryption, thus making it possible for the Allies to continue exploiting this vital intelligence resource.[85]

Before the war, Palluth, a lecturer in the 1929 secret Poznań University cryptology course, had been co-owner of AVA, which produced equipment for the Cipher Bureau, and knew many details of the decryption technology.[86] In Warsaw, under German occupation, other Cipher Bureau workers were interrogated by German intelligence commissions, and some AVA workers were approached by German agents, but all kept silent about compromises to Enigma.[87]

In popular culture

In 1967 the Polish military historian Władysław Kozaczuk, in his book Bitwa o tajemnice (The Battle for Secrets), first revealed that the German Enigma had been broken by Polish cryptologists before World War II. Kozaczuk's disclosure came seven years before F.W. Winterbotham's The Ultra Secret (1974) changed conventional views of the history of the war.[88]

The 1979 Polish film Sekret Enigmy (The Enigma Secret)[89] is a generally fair, if superficial, account of the Cipher Bureau's story. Twenty-two years later, the 2001 Hollywood film Enigma was criticized for its many historical inaccuracies, including omission of Poland's fundamental work in Enigma decryption.[90]

See also

Notes

  1. Bury 2004
  2. Woytak 1988, pp. 497–500
  3. 1 2 3 4 Ścieżyński 1928
  4. Kahn 1996
  5. Nowik 2004, pp. 25–26
  6. Ścieżyński 1928, pp. 16–17
  7. Ścieżyński 1928, p. 19
  8. Ścieżyński 1928, pp. 19–20
  9. Ścieżyński 1928, p. 25
  10. Ścieżyński 1928, pp. 25–26
  11. 1 2 3 4 Ścieżyński 1928, p. 26
  12. 1 2 3 Kozaczuk 1984, p. 23, note 6
  13. Kozaczuk 1984, p. 212
  14. 1 2 3 4 Rejewski 1984d, pp. 246–7
  15. 1 2 Rejewski & Woytak 1984b, pp. 230–231
  16. Kozaczuk 1984, p. xiii
  17. Sale, Tony, Anoraks Corner: a quick revision of the Enigma machine, its physical and operational characteristics, retrieved 5 June 2011
  18. Kahn 1996, p. 974
  19. Rejewski & Woytak 1984, pp. 234–236
  20. Rejewski & Woytak 1984b, p. 256
  21. Rex had been born Rudolf Stallmann in Berlin in 1871 and had changed his surname to his French wife's, becoming "Rodolphe Lemoine" Kahn 1991, p. 57
  22. The documents were entitled Gebrauchsanweisung für die Chiffriermaschine Enigma (Instructions for Using the Enigma Cipher Machine) and Schlüsselanleitung für die Chiffriermaschine Enigma (Keying Instructions for the Enigma Cipher Machine).
  23. Kozaczuk 1984, pp. 258–259
  24. Kozaczuk 1984, p. 25
  25. These were that the indicator setting was defined for the day on the key-setting sheets and that the 3-letter indicator was sent twice as six letters of ciphertext.
  26. Hodges 1992, p. 170
  27. There were 26 × 26 × 26 = 17,576 possible rotor positions for each of the six rotor orders, giving a total of 105,456 possible indicators.
  28. Calvocoressi 2001, p. 38 citing Rejewski 1984d, p. 263
  29. 1 2 Rejewski 1984c, p. 242
  30. Supreme Command of the Navy (1940), "The Enigma General Procedure (Der Schluessel M Verfahren M Allgemein)" (PDF), The Bletchley Park translated Enigma Instruction Manual, transcribed and formatted by Tony Sale, Berlin: Supreme Command of the German Navy, retrieved 26 November 2009
  31. Rejewski 1984d, p. 264
  32. Rejewski 1984d, p. 265
  33. Kozaczuk 1984, pp. 58, 64–66
  34. Kozaczuk 1984, pp. 53, 212
  35. Bomby is the plural of bomba.
  36. Herivel 2001, p. 39, citing Rejwski 1984d, p. 269
  37. Herivel 2001, pp. 39–40
  38. Kozaczuk 1984, p. 66
  39. 1 2 Kozaczuk 1984, p. 43
  40. 25–26 July are the dates given in John Herivel's Herivelismus and the German Military Enigma (2008, the chapter,"Touch and Go: The Warsaw Conference, July 1939," pp. 48-64), which details the Warsaw pre-meeting on 24 July and the Pyry (aka Kabaty Woods) meeting. He cites Alistair Denniston, "The Government Code and Cipher School between the Wars," Intelligence and National Security, vol. 1, issue 1, 1986, p. 4. However, Władysław Kozaczuk, Enigma (1984), pp. 59–60 — relying on Gustave Bertrand, Enigma (1973), pp. 59–60 — while indeed giving the pre-meeting date as 24 July 1939, says that the Pyry (aka Kabaty Woods) meeting took place on only one day, 25 July.
  41. Erskine 2006, p. 59
  42. Herivel 2008, p. 55
  43. Rejewski & Woytak 1984b, p. 236
  44. Ralph Erskine, "The Poles Reveal Their Secrets: Alastair Denniston's Account of the July 1939 Meeting at Pyry," Cryptologia, vol. 30, no. 4 (2006), pp. 294–305.
  45. Rejewski 1984d, p. 257
  46. Welchman 1982, p. 289
  47. Winterbotham 1975, pp. 16–17
  48. Winston Churchill, Their Finest Hour, pp. 598–600.
  49. Kahn 1991
  50. Christopher Kasparek, review of Michael Alfred Peszke, The Polish Underground Army, the Western Allies, and the Failure of Strategic Unity in World War II, 2005, in The Polish Review, vol. L, no. 2, 2005, p. 240.
  51. Kozaczuk 1984, p. 60
  52. Kozaczuk 1984, p. 70
  53. Kozaczuk 1984, pp. 211–16
  54. Kozaczuk 1984, pp. 69–94, 104–11
  55. Kozaczuk 1984, pp. 70–87
  56. Kozaczuk 1984, pp. 99, 102
  57. Kozaczuk 1984, p. 79
  58. Kozaczuk 1984, pp. 84; 94, note 8
  59. Rejewski (1982) pp. 81–82
  60. Also quoted in Kozaczuk 1984, p. 102
  61. Actually, at this early stage of the war there were nowhere near 10,000 people working at Bletchley Park. Still, there doubtless were a good many more working there than at PC Bruno, outside Paris.
  62. 1 2 Kozaczuk 1984, p. 87
  63. Kozaczuk 1984, pp. 87–88
  64. Hugh Sebag-Montefiore, in reliance on Rejewski's unpublished 1967 Memoirs, gives a slightly different interpretation, apparently of the same episode: "The German Air Force was using an uncomplicated code for the weather forecasts it was relaying back to base. The substitutions involved in this code changed every day and the British codebreakers had spotted that they were always the same as the connections for the plugboard sockets on the Air Force Enigma system. So, as soon as the code was broken, the codebreakers knew the plugboard connections for the Air Force Enigma." Sebag-Montefiore (2004) pp. 87, 368
  65. Rejewski 1984c, p. 243
  66. Rejewski 1984d, pp. 269–70
  67. Bertrand (1973) pp. 88–89
  68. According to Gwido Langer, the interruption in decryption was shorter, 13–19 May 1940. Kozaczuk 1984, p. 115, note 2
  69. Kozaczuk 1984, pp. 112–18
  70. Kozaczuk 1984, p. 139
  71. Kozaczuk 1984, pp. 139–40
  72. It is not clear, however, whether, after the June 1940 fall of France, the Cipher Bureau had broken Enigma. Rejewski, the principal Polish source, wrote in a posthumously published 1980 paper that at Cadix "We worked on other ciphers, no longer on Enigma." (Kozaczuk 1984, p. 270) Colonel Stefan Mayer of Polish Intelligence, however, mentioned the Poles breaking "interesting [machine-enciphered messages] from [Germany's 1941] Balkan campaign coming [in over] the 'Luftwaffe' network..." (Kozaczuk 1984, p. 116) And French intelligence Gen. Gustave Bertrand wrote of Enigma having been read at Cadix. (Kozaczuk 1984, p. 117) Tadeusz Lisicki, Rejewski's and Zygalski's immediate chief in wartime England but sometimes a dubious source, wrote in 1982 that "Rejewski in [a letter] conceded that Bertrand was doubtless right that at Cadix they had read Enigma, and that the number given by Bertrand, of 673 [Wehrmacht] telegrams, was correct.... The British did not send keys to Cadix; these were found using various tricks such as the sillies [and] Herivel tip described by Welchman, Knox's method, as well as others that Rejewski no longer remembered." (Kozaczuk 1984, p. 117)
  73. Kozaczuk 1984, p. 116
  74. Kozaczuk 1984, pp. 148–51
  75. The ship had, appropriately, been christened after a 19th-century French general, Christophe Léon Louis Juchault de Lamoricière, who had been involved in France's conquest of Algeria.
  76. Kozaczuk 1984, p. 128
  77. Kozaczuk 1984, pp. 150–51
  78. Kozaczuk 1984, p. 154
  79. Kozaczuk 1984, pp. 205–7
  80. Kozaczuk 1984, pp. 148–55, 205–9
  81. 1 2 Kozaczuk 1984, p. 224
  82. Kozaczuk 1984, pp. 224–26
  83. Kozaczuk 1984, pp. 156, 220, note 4
  84. Kozaczuk 1984, p. 156
  85. Kozaczuk 1984, p. 220
  86. Kozaczuk 1984, pp. 26, 212
  87. Kozaczuk 1984, pp. 212–16
  88. Kozaczuk 1984, p. xi
  89. How Poles cracked Nazi Enigma secret, Laurence Peter, BBC News, 20 July 2009

References

  • Bauer, F.L. (2007), "British and US cryptanalysis of the Wehrmacht Enigma", in de Leeuw, Karl; Bergstra, J. A., The history of information security: a comprehensive handbook, Elsevier, ISBN 978-0-444-51608-4 
  • Bloch, Gilbert (1987), "Enigma before Ultra: Polish Work and the French Contribution - Translated by C.A. Deavours", Cryptologia (published July 1987) 
  • Brzezinski, Zbigniew (2005), "The Unknown Victors", in Ciechanowski, Stanisław, Marian Rejewski, 1905-1980: living with the Enigma secret, Bydgoszcz, Poland: Bydgoszcz City Council, pp. 15–18, ISBN 83-7208-117-4 
  • Bury, Jan (July 2004), "Polish Codebreaking during the Russo-Polish War of 1919–1920", Cryptologia, 28 (3): 193–203, doi:10.1080/0161-110491892872, ISSN 0161-1194 
  • Calvocoressi, Peter (2001) [1980], Top Secret Ultra, Cleobury Mortimer, Shropshire: M & M Baldwin, ISBN 0-947712-41-0 
  • Churchill, Winston (1949), Their Finest Hour, Boston: Houghton Mifflin 
  • Ćwięk, Henryk, Przeciw Abwehrze (Against the Abwehr), Warsaw: Bellona, ISBN 978-83-11-09187-0 
  • Erskine, Ralph (December 2006), "The Poles Reveal their Secrets: Alastair Denniston's Account of the July 1939 Meeting at Pyry", Cryptologia, 30 (4), pp. 294–305, doi:10.1080/01611190600920944 
  • Gaj, Kris; Orłowski, Arkadiusz, Facts and myths of Enigma: breaking stereotypes (PDF), George Mason University, Fairfax, VA 22030, U.S.A.; Institute of Physics, Polish Academy of Sciences Warszawa, Poland, retrieved 1 February 2009 
  • Good, I.J., and Cipher A. Deavours, afterword to Marian Rejewski, "How Polish Mathematicians Deciphered the Enigma", Annals of the History of Computing, July 1981.
  • Herivel, John (2008), Herivelismus and the German Military Enigma, Cleobury Mortimer, Shropshire: M & M Baldwin, ISBN 978-0-947712-46-4 
  • Hodges, Andrew (1992), Alan Turing: The Enigma, London: Vintage, ISBN 978-0099116417 
  • Kahn, David (1991), Seizing the Enigma: The Race to Break the German U-boat Codes, 1939-1943, New York: Houghton Mifflin Co., ISBN 978-0-395-42739-2 
  • Kahn, David (1996), The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet (2nd ed.), New York: Scribner, ISBN 068-483130-9 
  • Kozaczuk, Władysław (1999) [1967], Bitwa o Tajemnice: Służby wywiadowcze Polski i Niemiec 1918–1939 [The Struggle for Secrets: the Intelligence Services of Poland and Germany, 1918–1939] (in Polish), Warsaw: Książka i Wiedza 
  • Kozaczuk, Władysław (1984), Enigma: How the German Machine Cipher was Broken, and How it was Read by the Allies in World War Two, edited and translated by Christopher Kasparek, Frederick, Maryland: University Publications of America, ISBN 978-0-89093-547-7  A revised and augmented translation of W kręgu enigmy, Warsaw, Książka i Wiedza, 1979, supplemented with appendices by Marian Rejewski
  • Kozaczuk, Władysław; Straszak, Jerzy (2004), Enigma: How the Poles Broke the Nazi Code, New York: Hippocrene Books, ISBN 978-0-7818-0941-2  Largely an abridgment of Kozaczuk 1984, minus Rejewski's appendices, which have been replaced with appendices of varying quality by other authors
  • Misiuk, Andrzej (1998), Służby Specjalne II Rzeczypospolitej [Special Services in the Second [Polish] Republic] (in Polish), Warsaw: Bellona 
  • Nowik, Grzegorz (2004), Zanim złamano Enigmę: Polski radiowywiad podczas wojny z bolszewicką Rosją, 1918–1920 [Before Enigma Was Broken: Polish Radio Intelligence during the War with Bolshevik Russia, 1918–1920] (in Polish), Warsaw: Oficyna Wydawnicza Rytm, ISBN 83-7399-099-2 
  • Pepłoński, Andrzej (2002), Kontrwywiad II Rzeczypospolitej [Counterintelligence in the Second [Polish] Republic] (in Polish), Warsaw: Bellona 
  • Polmar, Norman; Allen, Thomas B. (2000), Księga Szpiegów [The Spy Book] (in Polish), Warsaw: Wydawnictwo Magnum 
  • Rejewski, Marian (1980), "An Application of the Theory of Permutations in Breaking the Enigma Cipher", Applicationes mathematicae, 16 (4), ISSN 1730-6280 
  • Rejewski, Marian; Woytak, Richard (1984b), A Conversation with Marian Rejewski:  Appendix B to Kozaczuk 1984, pp. 229–40
  • Rejewski, Marian (1984c), Summary of Our Methods for Reconstructing ENIGMA and Reconstructing Daily Keys, and of German Efforts to Frustrate Those Methods:  Appendix C to Kozaczuk 1984, pp. 241–245
  • Rejewski, Marian (1984d), How the Polish Mathematicians Broke Enigma:  Appendix D to Kozaczuk 1984, pp. 246–271
  • Rejewski, Marian (1984e), The Mathematical Solution of the Enigma Cipher:  Appendix E to Kozaczuk 1984, pp. 272–291
  • Ścieżyński, Mieczysław, Colonel of the [Polish] General Staff (May 1928), Radjotelegrafja jako źródło wiadomości o nieprzyjacielu [Radiotelegraphy as a Source of Intelligence on the Enemy: Issued by permission of the General and Commander, Corps District No. X in Przemyśl, Register no. 2889/Train[ing]] (in Polish), Przemyśl: Printing and Binding Establishment of [Military] Corps District No. X HQ 
  • Welchman, Gordon (1982), The Hut Six Story: Breaking the Enigma Codes, New York: McGraw-Hill 
  • Welchman, Gordon (2008) [1986], "From Polish Bomba to British Bombe: the Birth of Ultra", in Andrew, Christopher M., Codebreaking and signals intelligence: Volume 1 of Intelligence and national security, The University of Virginia: F. Cass, ISBN 978-0-7146-3299-5 
  • Winterbotham, F.W. (1975) [1974], The Ultra Secret, New York: Dell 
  • Woytak, Richard (January 1988), "Colonel Kowalewski and the Origins of Polish Code Breaking and Communication Interception", East European Quarterly, Boulder: University of Colorado, XXI (4): 497–500, ISSN 0012-8449 

External links

Wikimedia Commons has media related to Biuro Szyfrów.

This article is issued from Wikipedia - version of the 11/3/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.