28/02/2020

Crypto-Movie: "The Red Machine" Reviewed by NSA

Among several movies depicting codebreaking, The Red Machine (2009) is unique in dealing with the Japanese RED machine. This movie focuses on a story (1935) of the US Navy's slipping into the Japanese naval attaché's luxurious apartment in Washington, DC, to obtain information on the cipher machine. My article in Japanese "映画紹介:The Red Machine(「レッド暗号機」) " introduced this movie to the potential audience in Japan. I was hoping that the public interest might lead to this indie movie's release in Japan, which, to my regret, has not come true.
While I exlained in the article the general historical background of this story, I recently found that David A. Hatch pointed out many historical inaccuracies in Cryptologic Quarterly 2015-01. I updated the article by taking notice of his comments.
Most importantly, he says one documented "black-bag-job" (called "second-story cryptanalysis" by one former NSA senior) against a Japanese consular residence was for an earlier Japanese Navy Codebook called "Red Code", not the Red Machine (p.60-61). Of course, photographing of the Red Codebook in the 1920s is known, separately from the 1935 episode depicted in the movie. (Budiansky (2000), Battle of Wits, p.83, describes both episodes separately, but, significantly, does not show a primary source for the latter episode.) If I remember correctly, Layton (1985), And I Was There described the episode as apocryphal. We need to check if the episode can be traced earlier than Ladislas Farago quoted in Deavours and Kruh (1985), Machine Cryptography and Modern Cryptanalysis p.218. Smith (2000), The Emperor's Codes describes US breaking of the Japanese naval attaché's ORANGE machine by quoting Stafford, L.F., History of Japanese Cipher Machines, NARA RG 457 HCC 2344. I wonder whether this source describes the episode.

Even if the episode is not supported by a primary source, it is mentioned in many crypto-books, and it is understandable that filmmakers took up the episode.
We should remember that Hatch belongs to NSA and he wrote the review in the hope that "filmmakers will avoid showing [the government's cryptanalysis] in ways that have a negative impact on the community" (p.63).

26/02/2020

Updated Links to International Telegraph Regulations

When my historical cryptography website is more than ten years old, it's inevitable that there are many dead links. The other day, I needed to consult the 1879 revision of the International Telegraph Regulation, and I followed a link in "Telegraph Regulations and Telegraph Codes", which no longer worked. I was at a loss, because somehow I could not find the relevant page by Googling. Now, I found the pages were not removed, but moved to different URLs. Now, I fixed the links, hoping that the URLs would not be changed so often.

12/02/2020

Listing Recurring Polygrams from Ciphertext

I uploaded a new article "Listing Recurring Polygrams from Ciphertext (with Perl)". It presents a script in Perl to list recurring polygrams from a ciphertext (or any text). Here, I define a polygram to be an n-gram where n>=LEN (e.g., 10).
Although tools for counting bigrams etc. are available, I couldn't find tools for listing recurring long n-grams. So, I wrote one myself. It has known limitations, but it serves for my immediate need.

09/02/2020

Scytale Was Not a Transposition Cipher

I uploaded a reorganized summary version of "Scytale Not as a Transposition Cipher" at Academia.edu.
Today, a scytale is explained as a tool for transposition cipher for letters, but such a definition of scytale was established only around 1900.
The original version was posted in 2014, which has grown with sources of historical description of scytale. As a result, it is now something like a motley collection of documents. So, I had to reorganize the whole to make a readable summary version. In the process, I made some updates, so I believe the summary version is more focused about the issue.