Update
In The Japanese FUJI diplomatic cipher 1941-43 I’ve added the following:The OKW/Chi designation for FUJI was system J-13/J2B4BCüRuW (Japanese 2-letter and 4-letter code with stencil and transposition –...
View ArticleSoviet cryptologic history
The following interesting articles cover important aspects of Soviet cryptologic history:The birth of Soviet cryptographyCryptanalyst B.A. AronskyCryptanalyst S.S. TolstoyThey forged victory
View ArticleNSA Early Computer History
Several reports on NSA cryptanalytic computers have been uploaded to the NSA website:https://www.nsa.gov/news-features/declassified-documents/nsa-early-computer-history/
View ArticleTICOM DF-240
The NSA FOIA office has released the TICOM report DF-240‘Characteristics, Analysis and security of cryptographic systems’. Google drive link.Contents of the file:240 A - Table of contents 240 B -...
View ArticleThe compromise of the Swiss diplomatic Enigma K cipher machine in WWII
In the course of WWII the Allied and Axis codebreakers attacked not only the communications of their enemies but also those of the neutral powers, such as Switzerland, Spain, Portugal, Turkey, Ireland,...
View ArticleUpdate
1). In Soviet cipher teleprinters of WWII, I’ve added the following:More details about the Forschungsamt solution of the Soviet cipher teleprinter are given by Bruno Kröger in TICOM reports DF-240 and...
View ArticleThe Communist agents cipher solved by the Forschungsamt
In the recently released TICOM report DF-240 ‘Characteristics, Analysis and security of cryptographic systems’ there is a short description of a cryptosystem used by communist agents:It is interesting...
View Article2017 Cryptologic History Symposium
The NSA’s Center for Cryptologic History and the National Cryptologic Museum Foundation are co-sponsoring the 2017 Cryptologic History Symposium:19 - 20 October, 2017, Johns Hopkins Applied Physics...
View ArticleUpdate
In Decoding Prime Minister Chamberlain’s messages I’ve added the following:A clue regarding the cipher system used is available from the TICOM report DF-241‘The Forschungsamt - Part IV’, p40 ‘Of the...
View ArticleSignals intelligence and codebreaking operations during the Greek-Italian War...
At the start of WWII the Kingdom of Greece, ruled by Ioannis Metaxas (head of the 4th of August Regime) followed a neutral foreign policy and tried to avoid taking part in the conflict. However...
View ArticleThe reconstructed Slidex card
At Crypto museum I saw that they’ve uploaded some Slidex cards from 1944. I had a quick look to see if I could locate the one solved by the German codebreakers and found in the report E-Bericht FNASt 9...
View ArticleWWII documentary
Interesting newfound footage from WWII. Hitler’s mental and physical deterioration can be clearly seen in this documentary.
View ArticleThe code of mr Seymour Parker Gilbert - Agent General for Reparations to Germany
After the Allied victory in WWI, the leaders of the US, UK and France imposed harsh peace terms on the defeated Germans. Germany (and the other defeated Central Powers) had to make reparations to the...
View ArticleWaiting for the Carlson-Goldsberry report...
I have one more essay that I’m going to upload and it covers, in some detail, the compromise of State Department communications in WWII.Ideally I would like to get a copy of the Carlson-Goldsberry...
View ArticleBritish Tank Production and the War Economy, 1934-1945
All the major powers of WWII used tanks and especially in North Africa and in Europe they played an important role in the actual combat operations. Some of these tanks like the German Tiger were famous...
View ArticleWar Over the Steppes - The Air Campaigns on the Eastern Front 1941-45
The war between Nazi German and the Soviet Union was the largest land campaign of WWII and it involved millions of troops and tens of thousands of tanks and warplanes.In the East the Luftwaffe played a...
View ArticleProgress of my FOIA cases
So far in 2017 my following NSA FOIA cases have been processed:1). TICOM report DF-229 ‘Three reports on the work of OKW/Chi’: I received the file. 2). Request for any postwar interrogation reports on...
View ArticleCompromise of State Department communications in WWII
In the course of WWII both the Allies and the Axis powers were able to gain information of great value from reading their enemies secret communications. In Britain the codebreakers of Bletchley Park...
View ArticleCriticism by Nigel Askey of the ‘Myth of German superiority on the WW2...
Interesting essay by Nigel Askey regarding German and Soviet combat performance in the Eastern Front in WWII.My opinion on this matter is given in the following comparisons:Strength and loss data...
View Article