Japanese naval codes
The vulnerability of Japanese naval codes and ciphers was crucial to the conduct of World War II, and had an important influence on foreign relations between Japan and the west in the years leading up to the war as well. Every Japanese code was eventually broken, and the intelligence gathered made possible such operations as the victorious American ambush of the Japanese Navy at Midway in 1942 (by breaking code JN-25b) and the shooting down of Japanese admiral Isoroku Yamamoto a year later in Operation Vengeance.
The
Red code
The Red Book code was an IJN
This code consisted of two books. The first contained the code itself; the second contained an additive cipher which was applied to the codes before transmission, with the starting point for the latter being embedded in the transmitted message. A copy of the code book was obtained in a
Knowledge of the Red Book code helped crack the similarly constructed Blue Book code.[1]
Coral
A cipher machine developed for Japanese naval attaché ciphers, similar to JADE. It was not used extensively,[5][6] but Vice Admiral Katsuo Abe, a Japanese representative to the Axis Tripartite Military Commission, passed considerable information about German deployments in CORAL, intelligence "essential for Allied military decision making in the European Theater."[7]
Jade
A cipher machine used by the Imperial Japanese Navy from late 1942 to 1944 and similar to CORAL; see
Dockyard codes
A succession of codes used to communicate between Japanese naval installations. These were comparatively easily broken by British codebreakers in Singapore and are believed to have been the source of early indications of imminent naval war preparations.[8]
JN-11
The Fleet Auxiliary System, derived from the JN-40 merchant-shipping code. Important for information on troop convoys and orders of battle.
JN-20
An inter-island cipher that provided valuable intelligence, especially when periodic changes to JN-25 temporarily blacked out U.S. decryption. JN-20 exploitation produced the "AF is short of water" message that established the main target of the Japanese Fleet, leading to a decisive U.S. victory at the Battle of Midway in 1942.[9]: p.155
JN-25
JN-25 is the name given by codebreakers to the main, and most secure, command and control communications scheme used by the IJN during World War II.[10] Named as the 25th Japanese Navy system identified, it was initially given the designation AN-1 as a "research project" rather than a "current decryption" job. The project required reconstructing the meaning of thirty thousand code groups and piecing together thirty thousand random additives.[11]
Introduced from 1 June 1939 to replace Blue (and the most recent descendant of the Red code),[12] it was an enciphered code, producing five-numeral groups for transmission. New code books and super-enciphering books were introduced from time to time, each new version requiring a more or less fresh cryptanalytic attack. John Tiltman with some help from Alan Turing (at GCSB) had "solved" JN25 by 1941, i.e. they knew that it was a five-digit code with a codebook to translate words into five digits and there was a second "additive" book that the sender used to add to the original numbers "But knowing all this didn’t help them read a single message".
By April 1942 JN25 was about 20 percent readable, so codebreakers could read "about one in five words" and traffic analysis was far more useful. [13] Tiltman had devised a (slow; neither easy nor quick) method of breaking it and had noted that all the numbers in the codebook were divisible by three.[14] "Breaking" rather than "solving" a code involves learning enough code words and indicators so that any given message can be read. [15]
In particular, JN-25 was significantly changed on 1 December 1940 (JN25a);[12] and again on 4 December 1941 (JN25b),[16] just before the attack on Pearl Harbor.
British, Australian, Dutch and American cryptanalysts co-operated on breaking JN-25 well before the Pearl Harbor attack, but because the Japanese Navy was not engaged in significant battle operations before then, there was little traffic available to use as raw material. Before then, IJN discussions and orders could generally travel by routes more secure than broadcast, such as courier or direct delivery by an IJN vessel. Publicly available accounts differ, but the most credible agree that the JN-25 version in use before December 1941 was not more than perhaps 10% broken at the time of the attack,[17] and that primarily in stripping away its super-encipherment. JN-25 traffic increased immensely with the outbreak of naval warfare at the end of 1941 and provided the cryptographic "depth" needed to succeed in substantially breaking the existing and subsequent versions of JN-25.
The American effort was directed from Washington, D.C. by the U.S. Navy's signals intelligence command,
Later versions of JN-25 were introduced: JN-25c from 28 May 1942, deferred from 1 April then 1 May; providing details of the attacks on Midway and Port Moresby. JN-25d was introduced from 1 April 1943, and while the additive had been changed, large portions had been recovered two weeks later, which provided details of Yamamoto's plans that were used in Operation Vengeance, the shooting-down of his plane.[21]
JN-39
This was a naval code used by merchant ships (commonly known as the "
JN-40
JN-40 was originally believed to be a code super-enciphered with a numerical additive, in the same way as JN-25. However, in September 1942, an error by the Japanese gave clues to John MacInnes and Brian Townend, codebreakers at the British
JN-147
The "minor operations code" often contained useful information on minor troop movements.[26]
JN-152
A simple transposition and substitution cipher used for broadcasting navigation warnings. In 1942 after breaking JN-40 the FECB at Kilindini broke JN-152 and the previously impenetrable JN-167, another merchant shipping cypher.[27][28]
JN-167
A merchant-shipping cipher (see JN-152).
Chicago Tribune incident
In June 1942 the
The government at first wanted to prosecute the Tribune under the
In early August, a RAN intercept unit in Melbourne heard Japanese messages, using a superseded lower-grade code. Changes were made to codebooks and the call-sign system, starting with the new JN-25 codebook (issued two months before). However the changes indicated the Japanese believed the Allies had worked out the fleet details from traffic analysis or had obtained a codebook and additive tables, being reluctant to believe that anyone could have broken their codes (least of all a Westerner).[30]
References
- ^ a b Greg Goebel. "US Codebreakers In The Shadow Of War". 2018.
- ISBN 978-1-85109-732-6. Retrieved 1 May 2009.
- ^ "Red Code". Archived from the original on 8 May 2009. Retrieved 1 May 2009.
- ^ Budiansky 2000, p. 5.
- ^ "Bletchley Park Jewels Japanese Cryptographic Machines". mkheritage.co.uk.
- ^ Smith 2000, p. 125.
- ^ "Early Japanese Systems". NSA Center for Cryptologic History.
- ^ Smith 2000, p. 93.
- ISBN 978-0-316-35253-6.
- ^ ISBN 978-0-307-42518-8.
- ^ Budiansky 2000, p. 7–12.
- ^ a b Wilford 2002, p. 18.
- ^ Dufty 2017, p. 122,123.
- ^ Dufty 2017, p. 14,64.
- ^ Dufty 2017, p. 96.
- ^ Wilford 2002, p. 20: citing Kahn, The Codebreakers.
- ISBN 978-1-4767-7646-0.
- ^ Wilford 2002, p. 19.
- ^ Kahn 1996, p. 566.
- ^ Wilford 2002, pp. 19 & 29.
- ^ Kahn 1996, pp. 99, 564, 567.
- ^ Blair, Silent Victory, passim
- ^ Farago, Ladislas. The Broken Seal (New York: Bantam, 1968), pp.393–395.
- ^ a b "Obituary: Brian Townend". The Times. London. 2 March 2005. Retrieved 1 May 2009.
- ^ Smith 2000, p. 150.
- ^ Smith 2000, pp. 191.
- ^ Smith 2000, p. 153.
- ^ Smith 2001, pp. 140–143.
- ^ Gabriel Schoenfeld (March 2006). "Has the 'New York Times' Violated the Espionage Act?". Commentary Magazine. Archived from the original on 18 January 2012. Retrieved 4 October 2017.
- ^ Smith 2000, pp. 142, 143.
Sources
- Budiansky, Stephen (2000). Battle of Wits: The complete story of Codebreaking in World War II. New York: Free Press. ISBN 0-684-85932-7.
- Dufty, David (2017). The Secret Code-Breakers of Central Bureau. Melbourne, London: Scribe. ISBN 9781925322187.
- Kahn, David (1996) [1967]. The Codebreakers. Macmillan.
- ISBN 0593-046412.
- Smith, Michael (2001). "Chapter 8: An Undervalued Effort: how the British broke Japan's Codes". In Smith, Michael; Erskine, Ralph (eds.). Action this Day. Bantam London. pp. 127–151. ISBN 0-593-04910-1.
- Wilford, Timothy (January 2002). "Decoding Pearl Harbor: USN Cryptanalysis and the Challenge of JN-25B in 1941". The Northern Mariner. Vol. XII, no. 1.
- "Bletchley Park In Mombasa". Coastweek Newspapers Ltd. Archived from the original on 15 May 2013. Retrieved 19 October 2006.
- Michael J. O'Neal. "World War II, United States Breaking of Japanese Naval Codes". Archived from the original on 13 November 2006. Retrieved 19 October 2006.