Syko Cipher Device

Last updated

The SYKO cipher device was a compact British cipher apparatus in use during World War II. It was invented and patented by Morgan O'Brien before the war. O'Brien developed a sophisticated cipher typewriter, which was complex and delicate, but then came up with the relatively simple device adopted by the military that was known the SYKO. Although the German crypt analysts managed to break the SYKO code, it remained in use for much of the war as a quick method for low-level encoding of radio traffic, particularly from aircraft. Code breaking took considerable time plus a sufficient sample of messages, and for certain classes of radio traffic (such as an aircraft's position) decoded information that became available many hours later was of little value.

Contents

Description

The SYKO machine is a purely mechanical device. Details of its mechanical construction can be found in GB Patent 534615 (Morgan O'Brien and O'Brien Cipher Machines Ltd, London) [1] Robust, small, and lightweight, it fitted in a brown hardcover case, with an optional canvas outer bag. A few machines survive, and operating instructions issued by the Royal Australian Air Force in November 1940 have been made available on-line. [2]

When the grey top cover is opened up it reveals 32 vertical columns of letters. Each column has the characters reading downwards from A to Z then 9 to 0 followed by a pause character (37 characters in all). These columns are moveable on an endless band. The SYKO case contains a propelling pencil with a small brass pin at the other end, which is inserted in a notch at each letter allowing the columns to be moved as required. Use of the device requires the code card for that day. This is placed within the machine and is revealed as the columns are moved down.

The code card contains 32 columns of symbols, each column having the same 37 characters as in the moveable columns but in a random order. Code cards were different for each day, and usually aircraft only carried the card for the day. In the event that events dictated a flight unexpectedly went past midnight there was provision when sending code to indicate you were using an earlier days card. The characters on the code card were paired in each column (18 pairs) leaving a single character unpaired. The pairing means that, for example, if 'C' codes as 'R', then 'R' codes as 'C'. There is a 1 in 37 chance that a character will be the un-paired character and code as itself.

The bottom cover of the device can be slid in to reset all the columns to 'A' at the top. Encoding involves taking the special pencil and, for each column in turn, selecting the corresponding letter in the message using the pencil brass pin to draw down the moveable column so that letter is at the bottom bar thus revealing the code card underneath. The encoded message is then the lower-most symbol visible on the code card (i.e. above the 'A' in each moveable column). The original message is still visible along the bottom bar, so you can check the column placement hasn't moved. Due to the pairing of characters outlined above, the decoding of messages follows the same process, with it essential that both parties are using the same coding card. To avoid confusion between similar letters on the code card, the 'i' was in lower case, the zero had a line through it, and the 'e' was lower case.

The use of the reciprocal codes (e.g. A codes as Z, and Z codes as A) limited the variations possible, so in July 1942 non-reciprocal codes for SYKO and NYKO were introduced. This meant turning the code card over when changing from coding to decoding, but it did make the code significantly harder to break. [3]

History

Morgan O'Brien filed several patents while living in New Zealand related to burglar alarms and security on tills and shops. Around 1925 he came to England with his wife (via Vancouver and Montreal), and realised that while long-distance telegraph communication transformed the links between parts of the empire, the message information was not as private as letters and so there was a business opportunity for a technique for coding messages. Around 1927 the British military were also considering the problems of using unencrypted radio messages and in 1928 established the Wireless Messages Committee to look into the issues. [4]

It was in 1928 that Morgan O'Brien patented a cipher typewriter. [5] This machine has been described as Britain's Enigma machine in a detailed account of its evaluation by the UK and US military experts. [6]

Morgan O'Brien had continued to develop the cipher typewriter at least until 1935 when he issued a further patent, [7] but possibly as a reaction to the problems brought about by his complex machine he came up with the device that was to become known as SYKO, which he patented in 1939. [8] This was adopted, and was in use by September 1939 as evidenced by the Air Traffic Control log for Ronaldsway on 2 September 1939 which records the Air Ministry controller taking over and taking possession of the Syko cards. [9]

An Admiralty document from November 1945, formerly Top Secret, now declassified, reviews Naval codes and ciphers used during the war and also gives some insight on the usage of SYKO by the RAF. [10] This shows that the SYKO device was first distributed to the Navy in early 1939, with Navy Peacetime code cards. At the start of WW2 Naval War Cards and RAF War cards were brought into use, followed early in 1940 by Inter-Service cards.

For the first 2 years of the war the Navy used the Syko with Naval cards as the standard low-grade system for communication with vessels such as auxiliary minesweepers, anti-submarine craft, examination vessels, harbour defence vessels, MTBs, etc. - none of which carried a high grade code capability. This was replaced by a small ships code in August 1941 (S.P. 02383) known by its prefix LOXO.

List of RAF and Navy SYKO code card series [10]
Code Card SeriesStartEndDescription
Navy PeacetimeEarly 1939Sept 1939Discontinued when war broke out
S.P. 02255Sept 1939 ?Naval wartime SYKO cards
S.P. 02266Sept 19391 June 1943R.A.F. card series
S.P. 02342Early 19401 June 1942Inter-service code cards (replaced by Cysquare)
S.P. 02435March 1942 ?Middle-East cards for use by RAF and Navy in the Mediterranean
S.P. ?1 April 19421 July 1943North-Atlantic cards for UK and Gibraltar based aircraft
S.P. ?1 July 1942>1945Naval non-reciprocal code cards*
S.P. 023081 June 1943>1944R.A.F. world-wide card series - non-reciprocal code cards

* Implied change as Admiralty document states non-reciprocal code cards introduced on 1 July 1942, and states RAF was still on SP 02266 until 1 June 1943.

On 1 April 1942 another special series of cards was introduced for aircraft operating in the North Atlantic, solely for shore-based aircraft operating from the UK and Gibraltar (i.e. for the Coastal Command operations to protect convoys). 1 July 1942 marked the introduction of non-reciprocal cards to improve the security. On 1 July 1943 coastal command dropped usage of SYKO, instead using a new Aircraft Reporting Code (S.P. 2488).

Naval aircraft continued to use the SKYO code with Naval cards in 1944, [11] and at the time the Admiralty report was written (late 1945) the Naval version of SYKO (NYKO) was still in use for carrier-borne aircraft and some small craft.

With several sets of cards there were occasions when a vessel would need more than one, as was evident from the report on the loss of HMS Khartoum in June 1940, in which the accounts list a SYKO machine, instructions for use of SYKO machine, and both naval and RAF SYKO cards. [12]

This complex series of releases of different code cards appear to have all used the same SYKO device with little or no modification - however the Admiralty report does say that in March 1942 the SYKO devices were in short supply, and that "Rekoh" cases were issued to use with the SYKO cards in their place.

The SYKO device was used for RAF aircraft communications until at least June 1944 (from operations logs, e.g. 200 Squadron Record of Operations [13] ).

A small number of SYKO devices have survived in private collections or museums, in the UK the Solway Aviation Museum has a Syko Cipher Device on display.

Related Research Articles

<span class="mw-page-title-main">Enigma machine</span> German cipher machine

The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the German military. The Enigma machine was considered so secure that it was used to encipher the most top-secret messages.

<span class="mw-page-title-main">Punched card</span> Paper-based recording medium

A punched card is a piece of stiff paper that holds digital data represented by the presence or absence of holes in predefined positions. Punched cards were once common in data processing applications or to directly control automated machinery.

<span class="mw-page-title-main">Ultra</span> British designation for intelligence from decrypted enemy communications

Ultra was the designation adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the Government Code and Cypher School (GC&CS) at Bletchley Park. Ultra eventually became the standard designation among the western Allies for all such intelligence. The name arose because the intelligence obtained was considered more important than that designated by the highest British security classification then used and so was regarded as being Ultra Secret. Several other cryptonyms had been used for such intelligence.

<span class="mw-page-title-main">Type B Cipher Machine</span> Japanese diplomatic code named Purple by the US

In the history of cryptography, the "System 97 Typewriter for European Characters" (九七式欧文印字機) or "Type B Cipher Machine", codenamed Purple by the United States, was an encryption machine used by the Japanese Foreign Office from February 1939 to the end of World War II. The machine was an electromechanical device that used stepping-switches to encrypt the most sensitive diplomatic traffic. All messages were written in the 26-letter English alphabet, which was commonly used for telegraphy. Any Japanese text had to be transliterated or coded. The 26-letters were separated using a plug board into two groups, of six and twenty letters respectively. The letters in the sixes group were scrambled using a 6 × 25 substitution table, while letters in the twenties group were more thoroughly scrambled using three successive 20 × 25 substitution tables.

<span class="mw-page-title-main">Polybius square</span> Type of code

The Polybius square, also known as the Polybius checkerboard, is a device invented by the ancient Greeks Cleoxenus and Democleitus, and made famous by the historian and scholar Polybius. The device is used for fractionating plaintext characters so that they can be represented by a smaller set of symbols, which is useful for telegraphy, steganography, and cryptography. The device was originally used for fire signalling, allowing for the coded transmission of any message, not just a finite amount of predetermined options as was the convention before.

<span class="mw-page-title-main">Bombe</span> Codebreaking device created at Bletchley Park (United Kingdom)

The bombe was an electro-mechanical device used by British cryptologists to help decipher German Enigma-machine-encrypted secret messages during World War II. The US Navy and US Army later produced their own machines to the same functional specification, albeit engineered differently both from each other and from Polish and British bombes.

<span class="mw-page-title-main">Room 40</span> Cryptanalysis section of the British Admiralty during World War I

Room 40, also known as 40 O.B., was the cryptanalysis section of the British Admiralty during the First World War.

<span class="mw-page-title-main">Friden Flexowriter</span> Teleprinter

The Friden Flexowriter produced by the Friden Calculating Machine Company, was a teleprinter, a heavy-duty electric typewriter capable of being driven not only by a human typing, but also automatically by several methods, including direct attachment to a computer and by use of paper tape.

<span class="mw-page-title-main">Keypunch</span>

A keypunch is a device for precisely punching holes into stiff paper cards at specific locations as determined by keys struck by a human operator. Other devices included here for that same function include the gang punch, the pantograph punch, and the stamp. The term was also used for similar machines used by humans to transcribe data onto punched tape media.

Cryptanalysis of the Enigma ciphering system enabled the western Allies in World War II to read substantial amounts of Morse-coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from other decrypted Axis radio and teleprinter transmissions, was given the codename Ultra.

Peter Frank George Twinn was a British mathematician, Second World War codebreaker and entomologist. The first professional mathematician to be recruited to GC&CS. Head of ISK from 1943, the unit responsible for decrypting over 100,000 Abwehr communications.

<span class="mw-page-title-main">Fialka</span> Soviet cipher machine

In cryptography, Fialka (M-125) is the name of a Cold War-era Soviet cipher machine. A rotor machine, the device uses 10 rotors, each with 30 contacts along with mechanical pins to control stepping. It also makes use of a punched card mechanism. Fialka means "violet" in Russian. Information regarding the machine was quite scarce until c. 2005 because the device had been kept secret.

The B-Dienst, also called xB-Dienst, X-B-Dienst and χB-Dienst, was a Department of the German Naval Intelligence Service of the OKM, that dealt with the interception and recording, decoding and analysis of the enemy, in particular British radio communications before and during World War II. B-Dienst worked on cryptanalysis and deciphering (decrypting) of enemy and neutral states' message traffic and security control of Kriegsmarine key processes and machinery.

German code breaking in World War II achieved some notable successes cracking British naval ciphers until well into the fourth year of the war, using the extensive German radio intelligence operations during World War II. Cryptanalysis also suffered from a problem typical of the German armed forces of the time: numerous branches and institutions maintained their own cryptographic departments, working on their own without collaboration or sharing results or methods. This led to duplicated effort, to a fragmentation of potential, and to lower efficiency than might have been achieved. There was no central German cryptography agency comparable to Britain’s Government Code and Cypher School (GC&CS), based at Bletchley Park.

<span class="mw-page-title-main">BATCO</span> British paper cryptographic system

BATCO, short for Battle Code, is a hand-held, paper-based encryption system used at a low, front line level in the British Army. It was introduced along with the Clansman combat net radio in the early 1980s and was largely obsolete by 2010 due to the wide deployment of the secure Bowman radios. BATCO consists of a code, contained on a set of vocabulary cards, and cipher sheets for superencryption of the numeric code words. The cipher sheets, which are typically changed daily, also include an authentication table and a radio call sign protection system.

The Cipher Department of the High Command of the Wehrmacht was the Signal Intelligence Agency of the Supreme Command of the Armed Forces of the German Armed Forces before and during World War II. OKW/Chi, within the formal order of battle hierarchy OKW/WFsT/Ag WNV/Chi, dealt with the cryptanalysis and deciphering of enemy and neutral states' message traffic and security control of its own key processes and machinery, such as the rotor cipher machine ENIGMA machine. It was the successor to the former Chi bureau of the Reichswehr Ministry.

<span class="mw-page-title-main">Wilhelm Tranow</span>

Wilhelm Tranow was a German cryptanalyst, who before and during World War II worked in the monitoring service of the German Navy and was responsible for breaking a number of encrypted radio communication systems, particularly the Naval Cypher, which was used by the British Admiralty for encrypting operational signals and the Naval Code for encrypting administrative signals. Tranow was considered one of the most important cryptanalysts of B-service. He was described as being experienced and energetic. Little was known about his personal life, when and where he was born, or where he died.

Otto Buggisch was a German mathematician who, during World War II, was a cryptanalyst working in the cipher bureau, the Cipher Department of the High Command of the Wehrmacht (OKW/Chi) responsible for deciphering of the opposing forces Communications. He also dealt with the security control of own key procedures. Through research and revelations exposed by two Polish officers, late in the war, he recognized the true cryptographic weaknesses of the Enigma rotor cipher, key machine used by the German armed forces to encrypt their secret communications, in World War II.

Ferdinand Voegele was a German philologist and linguistic cryptanalyst, before and during the time of World War II and who would eventually lead the cipher bureau of the Luftwaffe Signal Intelligence Service.

Morgan Cyprian McMahon O'Brien (1886–1968) was born in New Zealand to Irish parents, and was an engineer and inventor with numerous patents particularly in the area of high-street and bank security, alarm systems, and ciphers. He moved to England in 1925, and patented an advanced cipher typewriter in 1928 which has been referred to as "Britain's Enigma", and just before WW2 he patented the coding device known as the SYKO cipher device used throughout the war by the allied air forces, and to some extent by the allied navies too.

References

  1. Improvements in or related to Enciphering and Deciphering Machines, GB534625, Applied for 3 July 1939
  2. "A.O.U.100 R.A.A.F. Manual of Instructions for SYKO Machines" (PDF). Jerry Proc Webpage. Melbourne. November 1940. Retrieved 6 February 2021.
  3. The Battle of the Atlantic and Signals Intelligence: U–Boat Situations and Trends, 1941–1945, David Syrett, Routledge, April 2019, ISBN   9781911423683
  4. John Ferris (7 May 2007). Intelligence and Strategy: Selected Essays. Routledge. p. 143. ISBN   978-1-134-23335-9 . Retrieved 6 February 2021.
  5. Improvements in and relating to Means or Apparatus for Coding and De-coding Messages. GP Patent 320315, Application Date 4 April 1928
  6. Intelligence and Strategy: Selected Essays, John Robert Ferris, Routledge, 2005, ISBN   0415361958, 9780415361958
  7. Improvements in or relating to Machines for Enciphering and Deciphering Messages, GB Patent 453660. Applied for 3 April 1935
  8. Cipher Apparatus, US Patent 2270137, Applied for 11 May 1939
  9. ATC Log Extracts, Ronaldsway, Sep-Dec 1939, http://www.island-images.co.uk/ATC/zRon1930s/390902.html
  10. 1 2 Review of the Security of Naval Codes and Cyphers - September 1939 to May 1945. Admiralty report 195/45. November 1945 https://archive.org/details/ticom/ADM%201-27186%20Review%20of%20the%20Security%20of%20Naval%20Codes%20and%20Cyphers%2C%20Sept%201939-May%201945/page/n1/mode/2up
  11. Admiralty Fleet Order - Flying Regulations for the Royal Navy. A.F.O. 917/44, 24th Feb 1944, p16
  12. BRITISH ADMIRALTY REPORTS of WORLD WAR 2 - HMS KHARTOUM - LOSS DUE TO DEFECTIVE TORPEDO AIR VESSEL, 23rd JUNE 1940, https://www.naval-history.net/xDKWDa-KhartoumLoss.htm
  13. 200 Squadron RAF, Record of Operations in SEAC Marc 1944 to April 1945, http://www.rquirk.com/200oper/200sqnseacrev2a.pdf