The Pacific War Online Encyclopedia
|Previous: Cochin||Table of Contents||Next: Coeur D'Alene|
secretcodebreaker.com. Fair use may apply.
Radio revolutionized naval warfare by allowing a measure of command and control at great distances. However, this came at a price in security. Because radio is a broadcast, receivable by anyone, it can broadcast information to enemy as well as friend.
There are two significant aspects to this. First, it is possible for an enemy to analyze the pattern of broadcasts and detect enemy preparations. This is known as traffic analysis and it was practiced successfully by both sides in the Pacific War.
The second aspect is cryptography and
Radio messages are encoded to prevent an enemy from discerning
(cryptography), but coded messages can be analyzed, the code
contents revealed (cryptanalysis). Both sides in the Pacific
able to break at least some of the other’s codes, but the Allies were
successful at cryptanalysis than the Japanese.
Whereas Japanese code breakthroughs were usually into less
such as weather ship codes,
Allies were able to break into every
naval code except the flag officer's
code (Ko). In particular, American
cryptanalysts broke successive
versions of the main Japanese naval operational code (D or
Ro), which they dubbed
JN-25. The Allies also broke successive versions of the Japanese diplomatic
machine code, dubbed PURPLE. Intelligence derived from enemy
communications was referred to as ULTRA, while that from enemy
diplomatic communications was referred to as MAGIC.
Allied code breaking was one of the decisive capabilities of the war. It contributed directly to victory at Midway and was helpful in almost every other major operation of the war (the Guadalcanal campaign being a prominent exception.) Allied success at reading the Japanese merchant shipping code often put American submarines in the right places at the right times, and Allied success at reading the Japanese submarine code greatly reduced the effectiveness of Japanese submarines.
The Allies took great pains to
conceal the source of their
superb intelligence. The
cryptanalysts at Corregidor
were given priority for evacuation by submarine to avoid having
them fall into the hands of the Japanese. No such escape was
possible for Captain John P.
Cromwell, who chose to remain aboard a sinking submarine, Sculpin,
rather than be captured by the Japanese and risk being tortured
revealing ULTRA intelligence. Cromwell was
posthumously awarded the Medal
of Honor. However,
the Japanese missed important
their codes had been broken. The most glaring was a report in the
that the Navy had known the Japanese battle plan before
glaring security breach was somehow missed by the Japanese.
responsible was not prosecuted because this would only have drawn
the incident. Accounts of how the reporter came across his
differ: One account has a sympathetic naval officer showing the
reporter an intelligence report, while another has the reporter
the report left open on the captain's desk.
MacArthur distributed ULTRA intelligence much more widely than any other Allied commander. This included distribution through radio channels, a practice that was supposed to be strictly forbidden. But the worst incident was a press release from MacArthur's headquarters on 27 April 1942 which mentioned a buildup of Japanese merchant shipping in the Marshalls. This intelligence had come from cryptanalysis, prompting a furious message from Marshall to MacArthur, but the general proved impossible to restrain. When a copy of the strict ULTRA regulations was sent to his headquarters, he had his staff water them down, then sent a signed copy back to Washington.
The Allied success in breaking Japanese codes was
possible in part because the far-flung Japanese garrisons in the
Pacific had no way to communicate except by radio. This produced a
huge volume of messages that could be intercepted and analyzed
using statistical methods. A bonus (from the Allied point of view)
of the strategic
bombing campaign was that it destroyed communications links
in the Japanese home islands, forcing the Japanese to continue
relying on radio messages that could be intercepted. This provided
crucial intelligence during the final weeks of the war.
A detailed discussion of the theory and practice of cryptography and cryptanalysis is beyond the scope of this Encyclopedia. However, a brief overview will help the reader understand the work of the code makers and breakers.
Many languages, including Western languages, are written using a phonetic alphabet in which a small set of letters is used to represent the sounds that make up a statement in the language. Other languages, including Japanese, use a large number of ideographs to represent entire syllables.In either case, the information in a message is contained in the patterns formed by the symbols used to write the message. Cryptography seeks to conceal these patterns in such a way that only a friendly recipient who knows how the patterns were concealed can remove the concealment and understand the message. However, information patterns can be surprisingly difficult to hide, requiring elaborate encryption schemes; and the more effective the encryption, the more expensive and difficult it is to use.
Generally speaking, a code is any scheme for
representing information. Security is only occasionally one of the
purposes of a code, and such famous codes as Morse code or
code were invented for their suitability for representing
in a new medium rather than with any intent of concealment.
the cryptanalyst, a code is a set of numbers or short sequences of
characters used to represent letters, words, or entire phrases
frequently appeared in messages. These codes usually reduce the
messages, a useful feature, but they also help conceal the message
contents. A cipher
is a scheme for transforming one
set of symbols to another set of symbols specifically for reasons
security. The transformation may involved both replacing symbols
different symbols and scrambling the order of the symbols. All of
encryption systems used in the Pacific War were ciphers, but in
cases the message was encoded before being enciphered. Thus
cryptanalysis had to both strip the cipher and penetrate
the underlying code.
The very simplest encryption scheme is monoalphabetic substitution. One simply replaces each of the conventional letters of the alphabet with some other symbol, often a different letter from the same alphabet. The encrypter looks up the symbol for each letter from a table and transmits the resulting string of symbols, and the decrypter looks up the letter for each symbol from a reverse table to reveal the message. This form of encryption provides virtually no real security, because the patterns in the language of the message are unchanged except for being represented with unconventional symbols. For example, in written English, one expects the letters E, T, and A to appear most frequently. One also expects the digraphs (letter pairs) EE and TT to be common, but not AA. Thus if a symbol appears frequently in a message, but is almost never doubled, there is a good chance it is the symbol for A. By looking for common letters, digraphs, and trigraphs (sequences of three letters) the cryptanalyst can easily break the cipher. This kind of statistical analysis does require enough encrypted text (enough depth) to build up the necessary statistics on likely patterns. However, for a simple monoalphabetic substitution, a single message a hundred characters long may be adequate to provide the necessary depth, as is demonstrated by the many readers worldwide who solve the daily cryptogram puzzle in their newspapers.
The next most sophisticated cipher is polyalphabetic
in which a set of different monoalphabetic substitutions is
cyclically to the message. For example, one can make up a set of
then apply the first to the first letter of the message, the
second to the
second letter, and so on, starting over with the first cipher on
eleventh character. If the number of monoalphabetic substitutions
large and they are well chosen, straightforward statistical
will be baffled. However, if the cryptanalyst deduces that a
polyalphabetic cipher is being used, and if he has sufficient
enciphered material to analyze, he can try calculating letter
frequencies for every second letter, every third letter, and so on
until he finds a value at which the letter frequencies show the
distribution for the underlying language. This reveals the number
monoalphabetic ciphers in the polyalphabetic cipher, and it is
straightforward to crack each monoalphabetic cipher.
Of course, the encryption system may call for different messages to start at different places in the cycle of monoalphabetic substitutions. The cryptographer must then not only determine the length of the cycle, but the starting place in the cycle used for each message. Solomon Kullback discovered in 1935 that this can be done calculating the index of coincidences between two messages, which is done by lining up two messages, with a varying offset between the two, and calculating what percentage of letters match. If the index of coincidence is around 3.8 percent or so, the matches are probably random chance, and the two messages were likely encrypted at different points in the polyalphabetic cycle. The cryptanalyst then shifts the second message one place to the right and computes the index of coincidence again. When he has shifted a number of places equal to the difference in the starting point in the polyalphabetic cycle between the two messages, the index of coincidence will jump to around 6.7 percent. The cryptanalyst can repeat the process for a large number of messages, thus putting them all in depth so that the individual monoalphabetic ciphers can be analyzed and broken.
The polyalphabetic substitution cipher illustrates another
concept. The encrypter must somehow
tell the decrypter where in the cycle the encryption of the
begins. In practice, this information must be embedded in the
message itself. Such embedded information is known as an indicator
and it is a
common feature of almost all cipher systems of any complexity.
a lock can become a point of weakness if it is picked, so the
can be an important weakness in the encryption system if it is
The greater the number of monoalphabetic ciphers making up the polyalphabetic cipher, the more messages must be intercepted to get the necessary depth, and the harder the cipher is to break. The ultimate polyalphabetic cipher uses a different monoalphabetic cipher for every letter of every message ever sent. For example, with a one-time pad the encrypter replaces each letter in a message with a number, so A becomes 1, B becomes 2, and so on. He then takes a pad of random numbers and adds them to each number from the original message, transmitting the results. The decrypter has a copy of the encrypter's pad of random numbers, and he decrypts the message by subtracting the random numbers off the message. The decrypter then converts 1 back to A, 2 back to B, and so on to reveal the original message. If there are only two copies of each random pad (one each for the encrypter and decrypter), if the numbers on the pad are truly random, and if none of the sheets in the pad are ever reused, then the system is theoretically unbreakable. However, for a large organization like an army that sends a huge volume of traffic, the cost of a one-time pad encryption system is prohibitive, and no power involved in the Pacific War used a true one-time pad system for any but the most sensitive messages.
Another form of decryption is transposition, in which the letters
a message are shuffled into a different order by the encrypter and
unshuffled by the decrypter. Transposition was used in
a number of hand ciphers, but it was unsuitable as a machine
since machines capable of rapid operations on stored data (a
requirement for transposition ciphers) could not be made compact
and robust enough for military use in the 1940s.
The chief operational ciphers of the major powers were essentially polyalphabetic ciphers using very long cycles. Many of these, such as the German Enigma, the American ECM Mark II or SIGABA, and the Japanese PURPLE, were machine ciphers with cycle lengths of thousands to tens of millions. Additional settings on the machines changed the basic cycle, so that there were more than a million million possible ways to begin encrypting a message. Such a system sounds utterly inpenetrable, and the fact that the Allies nevertheless penetrated Enigma and PURPLE shows how difficult it is to completely erase telltale patterns with an encryption scheme.
A code, as opposed to a cipher, provides less security than one
might expect. Even when code groups replace entire phrases,
the code still show characteristic patterns that can be analyzed
break the code. Stereotypical words or phrases that a cryptanalyst
reason to believe will appear in many messages, such as "I have
honour to report to your excellency that ..." in a Japanese report
superior, are known as cribs and can be crucial wedges for
breaking into a code or cipher.
Position reports also provided cribs in the form of latitudes and
longitudes. Many messages were sequentially numbered, which was a
giveaway for the associated code groups. The Japanese tried
unsuccessfully to foil such cribs by bisection, which consisted of
splitting messages in two at an arbitrary point and placing the
half before the first half.
United States. The United States had
successfully broken the Japanese diplomatic codes in the 1920s,
thereby learned what instructions the Japanese government had
negotiators at the Washington
Conference. However, budgets for cryptanalysis were
repeatedly slashed thereafter. Joseph
Rochefort, who enlisted in the Navy in 1918 with vague hopes of
becoming a naval aviator,
was assigned to code
research duty because the officer then in charge recalled that
liked to solve crossword puzzles. When Rochefort took charge of
Navy's code research desk in February 1926, he had just two
assistants, which was still triple the size of the group run by
predecessor. The Director of Naval Intelligence had a "slush fund"
dating from the First World War which, for lack of any other
used to fund the burgling of the Japanese consulate in New York City.
This highly illegal activity provided valuable information on
Japanese code systems.
In 1929 then-Secretary of State Henry Stimson shut down the State Department's Cryptographic Office (the "Black Chamber") on the grounds that gentlemen do not read each other's mail. This reflected the spirit of international optimism prevalent in the West at the time. However, the unstable former director of the "Black Chamber", Herbert O. Yardley, who was disgruntled and short of cash, secretly sold information on the "Black Chamber" to the Japanese, then publicly sold the story of the "Black Chamber" to the Saturday Evening Post in 1931. This created a sensation in Japan and led to tighter cryptographic practices.
However, Japan was not alone in its cryptographic weakness between the wars. Even as the United States was reading Japan's diplomatic traffic, the British and Japanese were reading the American diplomatic traffic. One British cryptanalysis told an American visitor in 1943 that he regularly read U.S. diplomatic ciphers in the 1930s and that it had been "lots of fun" (Budiansky 2000). By 1932 the Japanese had reconstructed five thousand code groups from the American Gray Code, and Japanese cryptanalysts penetrated the subsequent Brown Code by breaking into the Kobe consulate and photographing the code book. In August 1941 a pro-American Japanese official told U.S. ambassador Joseph Grew which code should be used to transmit to Washington the information he was giving the ambassador, explaining that all the other diplomatic codes had been broken.
The U.S. Navy did not entirely neglect radio intelligence between the wars. Code breaking requires proficiency in the enemy's language, and after 1927 the Navy sent two or three officer per year to Japan to study the language. The Navy set up its first listening post at Shanghai in 1924 and set up additional posts over the next three years. Navy intelligence officers also had the foresight to design special typewriters for taking down the 48 kana characters of the Japanese Morse code, and in July 1928 a secret training program was established that eventually taught 176 enlisted men Japanese Morse. Both were paid for out of the ONI slush fund.
By 1939 the U.S. Navy was able to read both the Japanese diplomatic RED machine cipher and the Japanese Navy's Blue Book operational code, which revealed, among other things, that the Nagato class battleships were two and a half knots faster than previously believed. This may have influenced the design of the North Carolinas. However, on 20 February 1939, the RED machine cipher was replaced by a new machine cipher the Americans dubbed PURPLE, which was vastly more complicated. A little over three months later, on 1 June 1939, the Blue Book code was replaced by Ro, which became known to the Americans as "AN" or JN-25, and which was unlike any previous Japanese Navy operational code. It appeared to be totally impenetrable. American intelligence thus lost its ability to read Japanese secret communications during the crucial period between June 1939 and September 1940, when PURPLE was finally cracked. JN-25 would prove an even harder nut, and it was not until March 1942 that enough of the code was cracked to begin providing useful intelligence.
More resources became available for cryptanalysis after 8 September 1939, when Roosevelt declared a "limited national emergency", a largely rhetorical gesture having no particular standing in American law. However, Civil Service rules prevented the Americans from recruiting academic talent until after war had actually broken out; new hires had to be made from candidates who had passed a Civil Service exam. Fortunately for the Americans, William F. Friedman, the brilliant head of the U.S. Army's cryptanalysis effort, had a knack for recruiting cryptanalytic talent. Many of the new recruits were Jewish Americans or women who were highly educated but faced discrimination that prevented them from finding jobs in academia or business.
Sauce for the goose is sauce for the gander, and success in cracking other people's secret codes led the United States to look to its own cryptographic security. Friedman helped the U.S. armed services develop the ECM (Electronic Cipher Machine) Mark II, also known as SIGABA, which superficially resembled the German Enigma or Japanese Purple enciphering machines. However, it used three banks of five rotors each and had on the order of 100,000,000,000,000 possible settings. Operators were strictly admonished to avoid the kinds of procedural errors that allowed the Allies to penetrate Axis machine codes, and it is claimed that the ECM Mark II was never penetrated. Part of this was due to a seemingly trivial design decision: On Enigma, the rightmost rotor was the "fast" rotor that moved one place with each successive character, while the ECM Mark II placed the "fast" rotor in the middle of each bank of rotors. The German placement allowed cryptanalysts to deduce the wiring of the first rotor without needing to know the wiring of the successive rotors, a significant weakness that did not exist in the ECM Mark II.
On the other hand, the M-209 tactical machine cipher was
relatively insecure, and its rotors were so difficult to reset
operators tended to use the same settings day after day. The
regularly broke it, and the Japanese may have broken it from time
time as well. However, it was only used for low-level tactical
communications in the field.
Impressive as SIGABA was, American cryptographic
security sometimes went even further. Nimitz at Pearl Harbor communicated
in Washington by cable using a special telegraph machine that
automatically encoded the messages using a punched paper tape of
numbers. Only Washington had a duplicate and it was never reused,
constituting a true one-time pad system.
The American code breaking effort was characterized by its informality and by its heavy reliance on the primitive computing machinery available in the 1940s. The Army effort relied heavily on civilian specialists, and officers who tried to impose military-style discipline, in a misguided effort to increase productivity, were quietly shuffled aside. The Navy was much less inclined to use civilians, but OP-20-G (the Navy's signals intelligence unit) got around this by assigning Navy Reserve officer rank to its cryptanalysts strictly on the basis of age, then largely ignored rank. The Navy leased large numbers of IBM data processing machines (IBM's business model at the time was to never sell a piece of equipment), to the bemusement of the less resource-rich British. This led the Americans to rely more heavily on brute force attacks than the cryptanalyists of other powers, but this approach was not without success. Vast amounts of data (by 1940s standards) could be stored as punched paper tape or on film and processed by machine to calculate statistics or look for matching code groups in intercepted messages.
Priority in resources was given to the European war and to the Japanese Navy, and Japanese Army codes were not seriously tackled until 1943, when the Americans discovered that Japanese Army communications often dealt with the ambiguity of written Japanese by spelling out words using the Chinese Telegraph Code. This provided the necessary wedge, and by June 1943 the Water Transport system (used by the Army's fleet of ships) was providing useful intelligence. The capture of the entire code library of 20 Division at Sio (147.371E 5.954S) in New Guinea in January 1944 broke the Japanese Army codes wide open, yielding a flood of intelligence. This included a 13-part report by a "Staff Officer Izumi" detailing high-level conversations between the Japanese Army and Navy on strategy for the New Guinea and Solomons area.
By the end of the war, Radio Analysis Group Forward Area
(RAGFOR) at Guam had over 600
cryptanalysts working for it.
Britain. The British
had been very successful in breaking German codes during the First
World War, but this capability languished between the wars, and it
not until the debacle in Norway in 1940 that signals intelligence
to be taken seriously again by British military leaders. This
attitude was largely driven by Churchill,
who insisted on seeing the most important raw decrypts and who
use them as ammunition during arguments with his military leaders.
Most of the British effort was focused on the German Enigma machine cipher, a story that has been widely told elsewhere and does not directly bear on the Pacific War. However, the British in the Far East put considerable effort into breaking the Japanese codes, and made important contributions to the Allied effort to recover code and addend groups for the JN-25 code. The British Army in Burma also had significant success breaking the Japanese Army codes, which contributed significantly to the British victory in the Burma campaign of 1944-1945.
The British code breaking effort recruited "men of the
professor type" (Budiansky 2000) but only three of the first 21
academics recruited were
mathematicians. Partly this reflected the network of the contacts
the leaders of the effort, but it also reflected the contemporary
attitude that a proper education was focused on the study of Latin
Greek. Science and mathematics were tainted by their usefulness
implied association with "trade." Such mathematics as was studied
the most prestigious British universities was of a highly abstract
character. Thus the three mathematicians hired early on were pure
mathematicians of the first order, and included the brilliant Alan
Japan. The Japanese Army code breaking effort was almost
entirely focused on the Russians
and Chinese, regarding Britain and
the United States as the concern of the Navy. A number of
lower-level Russian codes were broken by Kwantung Army
intelligence officers, which yielded considerably information on
the German-Russian war. The
ability of the Army to read Chinese diplomatic communications
tipped Army leaders off to the fact that Japanese Prime Minister
was sending diplomats to negotiate with the Chinese in July 1937,
the Army found an excuse to arrest the couriers and thus hinder
negotiations. The Chinese Mi-ma
code was broken by May 1940, allowing the Japanese to track the
movements of practically every Chinese division involved in the
Army in northern Burma
had a cryptanalysis team and veterans claimed that this allowed
the Japanese to anticipate almost every move by the Allies during
hte Myitkyina campaign.
Japanese intelligence veterans have claimed that the Japanese
to shoot down U.S. Vice President Wallace during a trip to China
1943 based on cryptographic intelligence. The Chinese Communists
were more security-conscious than the Kuomintang and tended to use
Russian code systems, and their codes were broken only
intermittently by the Japanese during the war.
Army intelligence belated shifted its main effort to the
in July 1943, rather late in the game, but Japanese Army
did have some successes against the western Allies, penetrating
American prewar diplomatic
Brown Code (by breaking into the Kobe
consulate and photographing the code book) and, by 1943, the
strip cipher. As with many cryptographic breakthroughs, the
the strip cipher was aided by American operator carelessness. The
Japanese also broke some lower-level prewar British diplomatic
hinted that the defenses of Malaya
were inadequate. Japanese Army intelligence
veterans later claimed that they made significant inroads into the
M-209 machine cipher and thus were able to anticipate some B-29 raids. These
included the Hiroshima raid,
though its full significance was not realized in time to take any
Japanese Navy cryptography had only limited
successes. The Navy
succeeded in cracking the American diplomatic Gray Code in the
assuming that NADED, which appeared frequently, meant "stop", a
use of a crib. The Navy also broke Brown, the successor to Gray,
independently of the Army. In July 1937 the Owada Receiving
Station, which monitored Chinese and American signal traffic,
intercepted and decoded Chinese defense plans for 27 Army.
Owada evaluated the results of Japanese air strikes
Incident later than
year by intercepting and decoding Chinese damage reports. However,
there were no Japanese breakthroughs into Allied operational codes
comparable to those made by Allied cryptographers into
most damaging breakthrough was into the aircraft movement codes,
revealed the numbers and types of aircraft departing from and
at airbases in the Southwest
China. The western Allies were well aware that
the Japanese had cracked the Kuomintang codes. However,
the western Allies valued their own ability to read Kuomintang
diplomatic dispatches, and therefore avoided giving sensitive
information to the Kuomintang rather than inform the Kuomintang
their codes had been compromised. Concerns for Chinese security
were also cited as a reason why Chiang Kai-shek was
refused a seat on the Combined Chiefs of Staff.
The most significant code
penetration of the Pacific War was of the main Japanese
This code was introduced on 1 June 1939 and proved far more
to cryptanalysis that previous Japanese Navy codes. The American
naval intelligence unit at Pearl
the leadership of Rochefort, had correctly
JN-25 by the time war broke out, but it took time to reconstruct
Japanese code books. Useful intelligence did not start to become
available until March 1942.
A Japanese communications technician would prepare a message for transmission by first looking up the five-digit code number for each phrase or syllable in the message from a basic code book. This contained over 30,000 code groups for the most common words or phrases used in naval messages, with the most frequently used being represented by several groups to frustrate frequency analysis -- an example of an injective code. The technician would then select a random location in a second addend code book containing over 30,000 random five-digit numbers. The sequence of random numbers from the second book would be added to the sequence of code numbers representing the message (ignoring all carries in the addition) and transmitted along with the start location in the addend book. The communications technician responsible for decoding the message at the other end would reverse the process, subtracting the random addends from the coded message (ignoring all borrows) to reveal the original code numbers, which were then looked up in the basic code book to reveal the original message.
Breaking the system required reconstructing both the basic code book and the addend code book. This was done largely by inspired guesswork, aided by the primitive computing machines available in 1941. (The U.S. Navy became an important customer of IBM as war approached.) Certain stereotypical phrases, such as "Long live the Emperor!", appeared in many messages, and by finding these cribs the code breakers could recover addends. As more and more addends were recovered, the code breakers could interpolate the gaps in the messages, filling out both the basic and the addend code books. But this was a tedious process that relied on having a very large volume of intercepted messages to work with. Little progress had been made prior to the attack on Pearl Harbor, but the enormous volume of messages intercepted after war broke out, combined with the highly predictable contents of certain messages, allowed the code breakers to reconstruct about 15% of the code books by the time of the Midway operation.
The code breaking process was made easier by Japanese complacence. The Japanese seemed to feel that their language was so difficult for Westerners to master, and their code system so cleverly constructed, that it was invulnerable to penetration by the Allies. The Japanese issued new addend books about every six months, but the resulting ULTRA intelligence blackouts were brief, due of the Japanese habit of continuing to send messages in the old code while the new code was distributed across the vast reaches of the Pacific. A message sent in both the old and new codes immediately gave the code breakers part of the new addend book. Another weakness of the system was that all the five-digit numbers were chosen such that the sum of the digits was divisible by three; this made it easier for the intended recipient to detect garbles, but it was also a weakness that was exploited by the code breakers.
Japanese refusal to believe JN-25 could be compromised
prevented the Navy from drawing the correct conclusions after Yamamoto was shot
The Navy investigation placed the blame on the Army for
Yamamoto's itinerary in a low-level code. Hence, interservice
played a role in the lack of Japanese cryptographic security.
In addition to breaking JN-25, the Allies penetrated the machine
cipher used by the Japanese diplomatic service, which was dubbed
by the Americans. This code was first introduced on 20 February
and proved far more complex than any machine cipher previously
the Japanese. The American cryptologists worked on the cipher for
year without success, but on 8 September 1939 Roosevelt had
"limited national emergency" (a rhetorical gesture having no
standing in U.S. law) and more resources were made available to
cryptanalysts. The Japanese had continued using RED for a time
PURPLE was introduced, and it was not difficult to figure out
messages in RED were duplicated in PURPLE. This provided a wealth
The cryptanalysis also discovered that six letters appeared with
different frequency from the others, showing that they were being
encrypted separately, but they were not being shuffled in a way
could be carried out with rotors. Eventually it was realized that
using telephone exchange stepping switches rather than
Unlike the rotors in the German Enigma, these could not be swapped
greatly reducing the number of potential settings. Soon the
could be reliably cracked, but the "twenties" (the
other twenty letters of the alphabet) remained unsolved. The
were finally cracked when the cryptanalysts realized that they
being encrypted using a cascade of scrambler units. Within a few
the cryptanalysts had constructed their own PURPLE machine, and in
September 1940 they began reading PURPLE traffic almost as quickly
the Japanese diplomats themselves.
The Americans thus knew by the morning of 7 December 1942 that the Japanese were about to inform the U.S. government that there was no point to further negotiations. While this was certainly ominous, and the instructions to the Japanese ambassadors to deliver the note at a precise time that morning was obviously significant, the note was not an actual declaration of war nor did it give any hints what the Japanese opening move would be. Most American leaders assumed the Philippines would be the target, and an alert message to Hawaii did not arrive until hours after the attack on Pearl Harbor had taken place.
The American effort was hampered by bureaucratic turf wars once the value of the intelligence PURPLE produced was fully recognized. The two services saw the value of combining their efforts but could not agree on who would be in charge. The problem was finally solved by an informal arrangement in which the Navy would decipher PURPLE on odd-numbered days and the Army on even-numbered days.
PURPLE continued to be read throughout the war.
The British succeeded in breaking the Navy's dockyard code in 1939, which revealed in 1941 that the Japanese were recalling their warships to port for reorganization two months earlier than usual. This was correctly interpreted as a move to prepare Combined Fleet for war.
The Japanese merchant ship code, dubbed JN-40 by the Allies, was
cracked by the British in September 1942 after a Japanese operator
repeated a message word for word except for adding his ship's
This allowed the cryptanalysts to determine that the code was a
transposition cipher based on daily tables. These were found to
according to a predictable formula, and soon all themerchant
message traffic was being read routinely.
The Japanese military attaché code was also cracked by the British, in early 1942. Among other things, this revealed Japanese plans to construct the Burma-Siam railroad. Some of the most useful intelligence came in the Tokyo Circular, a digest of Japanese military activity on all fronts that was circulated to Japanese military attachés around the world.
The WE code, used by the Japanese Navy when sending military traffic, was a very insecure code used for low-level messages, but these provided much order of battle information and cribs for more secure codes.
The General Army Administration Code, known as 7890 from the code
group used to identify messages encrypted with this system, was
by the Americans in April 1943 due to Japanese carelessness.
operators sent similar messages without bothering to change
the addend book, giving enough depth to crack the code.
The JADE machine cipher, used by Japanese naval attachés, was cracked in August 1943 by the Americans. The more difficult CORAL machine was cracked by a joint British-American effort in March 1944.
The British cracked the 6633 cipher used for air units by late
giving the Allies a very accurate order of battle for aircraft.
British also cracked the BULBIL air-to-ground code at about the
Both ULTRA (breaking of Japanese operational codes) and MAGIC
(breaking of Japanese diplomatic codes) remained largely
postwar. The fact that Japanese diplomatic codes were being read
time of Pearl Harbor became public knowledge in the postwar
Congressional investigations of that disaster. A small number of
messages from later in the war were released in the 1950s, but the
first relatively complete set of MAGIC digests were not released
1978. Even these had many sections whited out. A complete set of
uncensored MAGIC digests was finally published in 1995, revealing
(among other things) that MAGIC was reading the diplomatic
traffic of a large number of neutral countries, and even a few
powers (such as Nationalist
and the Free French.) ULTRA
begin to be revealed until the 1970s.
The fact that ULTRA and MAGIC remained secret for so long has had
enormous influence on postwar historians. The greatest single flaw
Morison's otherwise excellent History
United States Naval Operations of World War II is that it
written when ULTRA was still highly classified, and Morison
official cover story for every important ULTRA-based intelligence
in the war. A useful companion while reading Morison today is
Prados' Combined Fleet Decoded,
the ULTRA background for many important command decisions during
The gradual disclosure of MAGIC has had its effect on
of the Japanese surrender,
documented by Frank (1999). Early and
fragmentary MAGIC disclosures, indicating that the Japanese were
seeking peace terms through the Russians,
have been seized upon by critics of Truman's
decision to use nuclear
as evidence that the Japanese were on the verge of surrendering
bombings were unjustified.
Frank has argued that the complete MAGIC record released in 1995
reveals a much more complex picture that is much less supportive
this interpretation. For example, the ULTRA decrypts reveal a
picture of determination on the part of the Japanese military to
Evans and Peattie (1997)
Frank (1990, 1999)
Peattie et al. (2011)
San Francisco Maritime National Park Association (accessed 2010-4-19)
The Pacific War Online Encyclopedia © 2007-2010, 2012-2015 by Kent G. Budge. Index
Comment on this article