Lorenz SZ 40
Lorenz SZ 40
Lorenz SZ 40
The Lorenz machine was used to encrypt high-level German military communications
during World War II. British cryptographers at Bletchley Park were able to break the
cipher.
The Lorenz SZ 40 and SZ 42 (Schlsselzusatz, meaning "cipher attachment") were
German cipher machines used during World War II for teleprinter circuits. British
codebreakers, who referred to encrypted German teleprinter traffic as "Fish", termed the
machine and its traffic "Tunny". While the well-known Enigma machine was generally
used by field units, the Lorenz machine was used for high-level communications which
could support the heavy machine, teletypewriter and attendant fixed circuits. The
machine itself measured 20in 18in 18in (51cm 46cm 46cm), and served as an
attachment to a standard Lorenz teleprinter. The machines implemented a stream cipher.
Contents
[hide]
1 Operation
2 Cryptanalysis
3 See also
4 Further reading
5 References
6 External links
[edit]
Operation
Cryptanalysis
British cryptographers at Bletchley Park had deduced the operation of the machine by
January 1942 without ever having seen a Lorenz machine. This was made possible
because of a mistake made by a German operator. On 30 August 1941, a 4,000 character
message was transmitted; however, the message was not received correctly at the other
end, so the message was retransmitted with the same key settings a practice
forbidden by procedure. Moreover, the second time the operator made a number of
small alterations to the message, such as using abbreviations. From these two related
ciphertexts, John Tiltman was able to recover both the plaintext and the keystream.
From the keystream, the entire structure of the machine was reconstructed by W. T.
Tutte.
Tunny traffic was intercepted at Knockholt in Kent, before being sent to Bletchley Park.
Several complex machines were built by the British to attack Tunny. The first was a
family of machines known as "Heath Robinsons", which used several high-speed paper
tapes, along with electronic logic circuitry, to help break into Tunny.
The next was the Colossus, the world's first electronic digital computer (although, like
ENIAC, it did not have a stored program, and was programmed through plugboards and
jumper cables). It was both faster and more reliable than the Heath Robinsons; using it,
the British were able to read a large proportion of Tunny traffic.
The Swedish cryptanalytic service, the FRA (Frsvarets Radioanstalt), also broke into
the Lorenz system; their breakin occurred in April, 1943.
[edit]
See also
STURGEON
Sigaba (United States)
Typex (Britain)
[edit]
Further reading
Stephen Budiansky, Battle of Wits (Free Press, New York, 2000) Contains a short
but informative section (pages 312-315) describing the operation of Tunny, and
how it was attacked.
F. H. Hinsley, Alan Stripp, Codebreakers: The Inside Story of Bletchley Park
(Oxford University, 1993) Contains a length section (pages 139-192) about
Tunny, the British attack on it, and the British replicas of the Lorenz machine.
Michael Smith, Station X: Decoding Nazi Secrets (TV Books, New York, 2001)
Contains a lengthy section (pages 183-202) about Tunny and the British attack
on it.
[edit]
References
Jack Good, Donald Michie, and Geoffrey Timms, General Report on Tunny,
1945, HW 25/4 and HW 25/5
W. T. Tutte, FISH and I Transcript of a lecture by Prof. Tutte explaining how he
broke into Tunny.
Donald W. Davies, The Lorenz Cipher Machine SZ42, (reprinted in Selections
from Cryptologia: History, People, and Technology, Artech House, Norwood,
1998)
Entry for "Tunny" in the GC&CS Cryptographic Dictionary
[edit]
External links