Read Seizing the Enigma Online

Authors: David Kahn

Seizing the Enigma (37 page)

BOOK: Seizing the Enigma
11.43Mb size Format: txt, pdf, ePub
ads

On that Monday, the submarine report said “5 or 6 subs between latitude 55/57 N west of longitude 15 W moving west” and—probably referring to the line of four—“Subs in Northern Atlantic appear to be proceeding west.” It also located one U-boat at 55° north 42° west—right in the new projected path of the convoy. A message went out: “HX 155 to increase clearance from suspected U-boat area recommend change route from H to 56–00 north 42–30 west then to J.” This would move the line of march even farther west. On Tuesday the convoy swung due north, moving at 8.8 knots under a cloudy sky with a moderate gale pushing it along from the starboard quarter. Early on Wednesday, the U-boat situation report declared that “10 have concentrated in area between 54 to 56 N 26 to 37 W,” or west of the east central North Atlantic area where they had sunk so many ships of SC 48.

The convoy was scheduled to head east to aim once again for Britain after its diversion, and the U.S. Navy radioed Task Unit 4.1.7 to recommend that “convoy proceed at utmost speed during next 48 hours.” As the convoy turned northeast to pass north of the sub-infested area, it raised its speed to 10 knots. Over the next two uneventful days, it made a succession of turns to starboard until, on Friday, it was steaming due east. On Saturday, a few hours after a fog started to lift, the American escort met the British at the MOMP south of Iceland. The Americans departed for home. HX 155, having dodged the U-boats, continued on toward the British Isles. On November 3, the Admiralty messaged: “HX 155 met as arranged. All ships now arrived. No stragglers.” The grain in the
Margarita Chandris
, the sugar in the
Coulberg
, the fuel oil in the
British Chemist
, the steel and copper and gasoline and tobacco had reached the island kingdom—thanks in part to the back-room boys, the boffins, of Hut 8.

16
W
HEN
S
AILORS
L
OOK FOR
L
EAKS

C
OMMUNICATIONS WERE ESSENTIAL TO
D
ÖNITZ’S CONTROL OF
wolfpack warfare, and they ran smoothly. But those communications had to be secret, and this worried him.

From 1940 to 1943, his headquarters lay in three summer villas in Kerneval, a suburb of the port of Lorient on the southern coast of Brittany. Communications, under the effective Commander Hans Meckel, were centered in a bombproof bunker where the air always seemed bad.

Sending a message to a U-boat at sea began with Dönitz or a subordinate writing it out. A watch officer then took the message to a command transmissions officer, who time-stamped it and gave it to the radio watch officer for encipherment and transmission. The chief radio watch officer for much of the war was Lieutenant Helmut Kühne, who worked in the bunker, along with fifteen to twenty radiomen per shift.

Kühne handed the message to a radioman for enciphering on an Enigma. Radiomen handled both transmission and reception as well as ciphering, but Kühne, when he could, put those with better Morse touch and hearing on radios and those who typed better on Enigmas. Since only officers could prepare the machine’s inner settings, which remained in force for two days, the radio officer on watch set all but one of the several Enigma machines with the new inner key before every other midnight; later in the war, this was done before every
other noon. One Enigma was left set with the previous day’s key to decipher late-arriving messages.

After the officer was finished, an enlisted radioman plugged in the jacks of the plugboard. The machine was thus ready for the radioman handling the message to establish the message key. When he had completed that intricate process, he turned the rotors to the key. As he finally did the easy part—pressing the letters of the plaintext on the keyboard—a colleague wrote on the message form the ciphertext letters as they appeared on the illuminable panel. The message was divided into four-letter groups. The two four-letter indicator groups at the beginning were copied at the end. The message was given a date-time number, a number indicating how many four-letter groups it had (excluding the repeated pair at the end), and a serial number.

But before the ciphertext was transmitted, it was given to another radioman, who, using only the indicators that it carried, determined the message key and deciphered the cryptogram as the radioman on a U-boat at sea would do. If he could not decipher it, the error was sought and corrected. Only when the cryptogram was successfully deciphered was it ready to be sent.

The radioman determined the operating area of the U-boat and whether it was attacking a convoy, which told him the traffic network, or circuit, to transmit on. Eventually U-boat Command had several geographical nets—Amerika A (northern area), Amerika B (southern area), Afrika 1 and 2, Ireland, and others—and two nets for submarines attacking convoys. One, named for the goddess of the hunt, was called
DIANA
; the other, named for the patron saint of hunters, was called
HUBERTUS
. Each geographical net had three radio frequencies, chosen to give the best reception in its area in the daytime, at night, and at twilight.
HUBERTUS
had six frequencies, among them 4601 kilocycles from midnight to 7
A.M.
, 7645 from 9 to 11, and 12950 from 1
P.M.
to 8
P.M.
Sometimes a wolfpack was given its own frequency.

The radioman in Kerneval chose the proper frequency, tuned his radio to it, and tapped out his dots and dashes. From the bunker, the pulses coursed by wire to radio towers in Lorient, whence they were pumped into the ether. They were received not only by U-boats but by the station of the then-defunct French Colonial Office in Sainte Assise, a few miles southeast of Paris. This station repeated the cryptogram immediately with greater power to give the U-boats a second and better chance at hearing it. It also repeated the message two, six, twelve, and twenty-four hours later and, if very important, forty-eight hours later. On an average day, U-Boat Command sent some twenty to thirty messages this way. Each one took some fifteen to thirty minutes to transmit from the time the command transmissions officer got it.

Aboard each U-boat, one radioman was always standing watch, listening through his earphones for the ethereal chirping that linked him with home. Radio transmissions were received when the vessel was on the surface, nearly always when she was at periscope depth, and sometimes even when she was 40 feet down. The radioman wrote down all messages, whether or not they were addressed to his boat. The serial numbers told him whether he had missed any. Some radiomen missed no messages; some missed sixty on a cruise. The skipper determined whether missed messages meant that the radioman was negligent, in which case he would be arrested, or whether the messages were lost because the boat was frequently submerged.

When the radioman heard the peeps, he stored the first few letters in his memory as he put down his book or turned down the phonograph, then wrote them on a message form and began taking the rest of the text as it was transmitted. He replicated the complicated procedure that yielded the message key, turned his rotors to it, and deciphered the message. He then gave it to the skipper. If the message was addressed to his boat, the captain followed its orders; if it was not, he read it to know what was going on.

The captain drafted messages; his radiomen enciphered them and transmitted them to headquarters. U-boats used five main kinds of messages:

1. Convoy contact reports. These were usually encoded first in the Short Signal Book and then enciphered in Enigma. They were preceded by
dot dot dash dot dot
to clear the wavelength of less urgent signals; because that Morse symbol stood for the Greek letter alpha in German signals and a French accented
e
in the British, these messages were called alpha signals by the Germans and E-bar by the British.

2. Short transmissions of one to six groups, likewise encoded first in the Short Signal Book and then enciphered in Enigma. These reported, for example, a U-boat’s position and fuel situation in answer to a query from headquarters. They were preceded by
dash dot dot dot dash
, beta in German Morse, called B-bar by the British because it added to the Morse symbol for
b
the dash for
t.

3. Weather reports, encoded first in the Short Weather Cipher and then enciphered in Enigma.

4. Other messages, such as those dealing with rendezvous with refueler submarines, enciphered in Enigma.

5. The radio cipher conversation, in which headquarters and a U-boat established a key and used it for an exchange of messages, each picking up the encipherment from where the other left off. It was faster than setting up a new key for each party’s successive messages.

Kerneval rebroadcast the U-boat messages it received both to acknowledge their receipt and to make sure that other boats heard them. Kühne’s group deciphered the messages. But since the radiomen aboard ship did not always have the time or the desire to check their work by deciphering it before sending a message, and because their messages were harder to hear, unreadable cryptograms were more common in messages from U-boats than in those to them. To
unscramble them, Kühne had a “puzzle group” whose members, he thought, were all but codebreakers.

*     *     *

The Enigma was, the navy said, “the main cipher method of the
Kriegsmarine.
” All secret communications were to be enciphered with it, “except when the use of other cipher methods and systems is prescribed.” It was considered superior to them, in speed as well as in strength. As a 1941 field report said, “Equipping with the Enigma all vessels that must send reports about the enemy quickly is viewed as absolutely necessary, since all other systems are too cumbersome.” Moreover, many subordinate systems depended upon the Enigma for security, among them the Short Signal Book and the Short Weather Cipher.

Because Enigma protected the central element—control—of the central part—the U-boat offensive—of the naval war, the navy sought in a variety of ways to ensure its security. Deciphering ciphertexts to make sure they were correct before transmitting them, for example, reduced the number of wrongly enciphered messages that had to be redone correctly, thus cutting the number of different cryptograms with identical plaintexts—a chink in a cipher’s armor.

The navy monitored its own communications. When one of the monitoring posts spotted an error that could jeopardize cryptosecurity, even though it did not know whether the enemy had actually exploited it, the post notified the commands involved. In the spring of 1941, boat NS 25 off the Norwegian coast requested a weather report with the standard service abbreviation QOB. Because the enemy would know that the reply was a weather report and thus would have a crib, the monitoring post reported that this “made an answer impossible” and was “a serious violation.” The culprit, Radioman Fourth Class Wilhelm Lemcke, was to be told of his error, restricted to quarters for three days, and sent to Stavanger in occupied Norway for additional instruction. The commands themselves sometimes blundered. At 8:29
P.M.
on April 26, the headquarters at Stavanger
radioed an Enigma message to the Admiral West Coast and to the ship
Seefalke.
The Admiral West Coast knew that the
Seefalke
had only the Dockyard Cipher, so, after deciphering the Enigma message, his headquarters reenciphered the text in the simpler Dockyard and at 8:56 transmitted it. This violated cryptographic security since solving the easier system would provide a kiss, as Bletchley called it, to the more difficult one.

The navy also minimized Enigma’s physical exposure. In many cases, vessels undertaking operations that made them particularly susceptible to capture by the enemy, such as operating in shallow waters off the enemy coast, carried as few documents as possible. Thus when, on October 14, 1939, Lieutenant Gunther Prien’s U-47 slipped between concrete-laden blockships into Scapa Flow to sink the battleship
Royal Oak
in one of the most daring escapades of the war, his sub carried no Enigma or Enigma keying documents, but only a hand cipher. And when, in December 1939, the pocket battleship
Admiral Graf Spee
sailed from Montevideo, Uruguay, to scuttle herself in shallow water before she could be sunk by three British cruisers awaiting her at the 3-mile limit, she left her Enigma with German diplomats on shore.

When a ship was lost where the British might be able to recover cryptographic material, either by salvage or by picking up flotsam, the German navy demanded a report. For example, when Submarine Hunter 173 was sunk by bombs on May 8, 1941, off the Norwegian west coast in 150 feet of water, her command detailed the destruction of the cryptographic material. At the time of the attack the regulations for use of the Enigma, the Dockyard Cipher, and cipher message sheets were in use. Also aboard were an Enigma, the general- and officer-grade keys for April and May, and the instructions for cue word
PERSEUS
for emergency change of Enigma settings. But, the report said, a bomb detonated under the radio shack, collapsing it, setting it on fire, and destroying the documents lying out. Radioman Koch smashed the Enigma machine. No papers would float. The
report clearly implied that there was no danger of compromise, and reports of other events suggested the same thing.

BOOK: Seizing the Enigma
11.43Mb size Format: txt, pdf, ePub
ads

Other books

Marriage Under Siege by Anne O'Brien
Whistle Pass by KevaD
Deadly In Stilettos by Chanel, Keke
My Father's Fortune by Michael Frayn
Only in the Night by Roberta Latow
Finally Home Taming of a White Wolf by Jana Leigh, Rose Colton
Leopold's Way by Edward D. Hoch