-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathcodebreakers.html
More file actions
559 lines (529 loc) · 39 KB
/
codebreakers.html
File metadata and controls
559 lines (529 loc) · 39 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Hall X: Hall of Codebreakers — The Cipher Museum</title>
<meta name="description" content="Twenty-one moments when human ingenuity broke what mathematics could not. From Al-Kindi (850 AD) to the Copiale and Chaocipher reconstructions of 2010-2014.">
<meta name="keywords" content="codebreakers, cryptanalysis, cipher museum, Turing, Enigma, Bletchley Park, Navajo, Zodiac">
<meta property="og:title" content="Hall X: Hall of Codebreakers — The Cipher Museum">
<meta property="og:description" content="Twenty-one moments when human ingenuity broke what mathematics could not. From Al-Kindi (850 AD) to the Copiale and Chaocipher reconstructions of 2010-2014.">
<meta property="og:type" content="website">
<meta property="og:url" content="https://ciphermuseum.com/halls/codebreakers.html">
<meta name="twitter:card" content="summary">
<meta name="twitter:title" content="Hall X: Hall of Codebreakers — The Cipher Museum">
<meta name="twitter:description" content="Twenty-one moments when human ingenuity broke what mathematics could not. From Al-Kindi (850 AD) to the Copiale and Chaocipher reconstructions of 2010-2014.">
<meta name="theme-color" content="#0a0a0f">
<link rel="canonical" href="https://ciphermuseum.com/halls/codebreakers.html">
<link rel="stylesheet" href="../css/museum.css">
<link rel="icon" type="image/svg+xml" href="../favicon.svg">
<style>
.hall-hero-banner {
position:relative; height:300px; overflow:hidden;
border-bottom:1px solid var(--gold-b);
background:var(--s1);
}
.hall-hero-banner img {
width:100%; height:100%;
object-fit:cover; display:block;
filter:brightness(.45) sepia(.2);
}
.hall-hero-overlay {
position:absolute; inset:0;
background:linear-gradient(to bottom, rgba(6,6,8,.1) 0%, rgba(6,6,8,.7) 100%);
}
.hall-hero-caption {
position:absolute; left:2rem; bottom:1.25rem;
font-family:var(--fd); font-size:.9rem;
color:var(--gold-lt); letter-spacing:.1em;
}
</style>
</head>
<body>
<a class="skip-link" href="#main-content">Skip to main content</a>
<nav class="museum-nav">
<div class="nav-inner">
<a href="../index.html" class="nav-logo">
<svg class="nav-logo-icon" viewBox="0 0 32 32" fill="none">
<circle cx="16" cy="16" r="14" stroke="currentColor" stroke-width="1.5"/>
<circle cx="16" cy="16" r="8" stroke="currentColor" stroke-width="1"/>
<circle cx="16" cy="16" r="2" fill="currentColor"/>
<line x1="16" y1="2" x2="16" y2="6" stroke="currentColor" stroke-width="1.5"/>
<line x1="16" y1="26" x2="16" y2="30" stroke="currentColor" stroke-width="1.5"/>
<line x1="2" y1="16" x2="6" y2="16" stroke="currentColor" stroke-width="1.5"/>
<line x1="26" y1="16" x2="30" y2="16" stroke="currentColor" stroke-width="1.5"/>
</svg>
<span class="nav-logo-text">The Cipher Museum</span>
</a>
<ul class="nav-links">
<li><a href="../index.html">Entrance</a></li>
<li><a href="../museum-map.html">Museum Map</a></li>
<li><a href="../timeline.html">Timeline</a></li>
<li><a href="../cryptanalysis.html">Cryptanalysis Techniques</a></li>
<li><a href="../modern.html">Modern Crypto</a></li>
</ul>
</div>
</nav>
<section class="hall-hero-banner">
<img src="../images/halls/codebreakers-hero.svg"
alt="Bletchley Park codebreakers at work during World War II"
onerror="this.parentElement.style.display='none'">
<div class="hall-hero-overlay"></div>
<div class="hall-hero-caption">Special Exhibition · Hall of Codebreakers</div>
</section>
<main id="main-content" tabindex="-1">
<div class="page-hero">
<div class="breadcrumb">
<a href="../index.html">Entrance</a><span>›</span>
<a href="../museum-map.html">Museum Map</a><span>›</span>
Hall X
</div>
<span class="page-eyebrow">Hall X · The Human Stories</span>
<h1 class="page-title">Hall of Codebreakers</h1>
<p class="page-tagline">Twenty-six profiles — codebreakers, cipher designers, and the untold biographies behind the greatest cryptanalytic achievements in history</p>
<blockquote style="max-width:600px;margin:1.5rem 0 0;padding-left:1.5rem;border-left:3px solid var(--gold);font-family:var(--fb);font-size:1.25rem;font-style:italic;color:var(--gold-lt);line-height:1.7;position:relative;z-index:1;">
"A cipher is only as strong as the mind trying to break it."
</blockquote>
</div>
<div class="section">
<!-- Story 1: Al-Kindi -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">📜</span>
<span class="panel-title" style="color:var(--gold);">Al-Kindi</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-ancient">~850 AD</span>
<span class="badge sec-broken">Broke: All Monoalphabetic Substitution</span>
</div>
<p><strong>Person:</strong> Abu Yusuf Yaqub ibn Ishaq al-Kindi, Baghdad</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Frequency analysis</p>
<p style="margin-top:1rem;">His nine-page manuscript is the founding document of cryptanalysis. Every substitution cipher made before 850 AD and for centuries after was rendered permanently insecure. He did this with nothing but a count of letters and an understanding that language has statistical structure.</p>
<div class="callout callout-info" style="margin-top:1rem;">
<span class="callout-icon">💡</span>
<div class="callout-body">
<p>Al-Kindi's insight was simple but devastating: in any natural language, some letters appear far more often than others. In Arabic, the most common letter is alif. In English, it's E. Map the most frequent ciphertext symbol to the most frequent plaintext letter, and the cipher begins to unravel.</p>
</div>
</div>
</div>
</div>
<!-- Story 2: Phelippes -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">⚔</span>
<span class="panel-title" style="color:var(--gold);">Thomas Phelippes and Mary Queen of Scots</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-renaissance">1586</span>
<span class="badge sec-broken">Broke: Nomenclator Substitution</span>
</div>
<p><strong>Person:</strong> Thomas Phelippes, agent of Sir Francis Walsingham</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Frequency analysis + contextual knowledge</p>
<p style="margin-top:1rem;">Mary's encrypted correspondence with Babington Plot conspirators was intercepted and decoded. She was executed February 8, 1587. The break is one of history's clearest examples of cryptanalysis determining a human life.</p>
</div>
</div>
<!-- Story 2.5: Bazeries -->
<div class="panel" style="margin-bottom:2rem;" id="bazeries">
<div class="panel-head">
<span class="panel-icon">🗝️</span>
<span class="panel-title" style="color:var(--gold);">Étienne Bazeries and the Great Cipher</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-19c">1893</span>
<span class="badge sec-broken">Broke: Rossignol's Great Cipher (after 200 years of silence)</span>
</div>
<p><strong>Person:</strong> Commandant Étienne Bazeries (1846–1931), French Army cryptanalyst</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Syllabic-substitution analysis on a 587-symbol nomenclator, with contextual cribbing against historical Louis XIV correspondence</p>
<p style="margin-top:1rem;">Bazeries spent three years on the Great Cipher of Louis XIV — a nomenclator created by father-and-son <a href="../ciphers/great-cipher.html">Antoine and Bonaventure Rossignol</a> in the 1620s and used by the Sun King's court for over a century. After the Rossignols died, the system became unreadable; entire chapters of French diplomatic history sat in archives as unreadable digits. Bazeries's insight was that the symbols encoded <em>syllables</em>, not letters — a single number such as <code>124-22-125-46-345</code> spelled <em>les en-ne-mi-s</em>. He also discovered embedded traps: a few symbols meant "ignore the previous symbol," planted to mislead anyone who recovered partial mappings.</p>
<p style="margin-top:1rem;">Bazeries published his solution in 1893, identifying — among other things — the long-disputed prisoner who became known as the Man in the Iron Mask. He went on to design the <a href="../ciphers/bazeries.html">Bazeries Cylinder</a> (1898), a 20-disk wheel cipher, and authored <em>Les Chiffres Secrets Dévoilés</em> (1901), the first major French history of cryptology written by a working cryptanalyst.</p>
<div class="callout callout-info" style="margin-top:1rem;">
<span class="callout-icon">💡</span>
<div class="callout-body">
<p>The Great Cipher break is the canonical example of <strong>cryptanalysis as historiography</strong>: the tool was invented to decrypt diplomacy in real time, but its lasting payoff was unlocking a 200-year-old archive. See the exhibit: <a href="../ciphers/great-cipher.html">Hall II · Great Cipher (1626)</a>.</p>
</div>
</div>
</div>
</div>
<!-- Story 3: Room 40 -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">📡</span>
<span class="panel-title" style="color:var(--gold);">Room 40 and the Zimmermann Telegram</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-19c">1917</span>
<span class="badge sec-broken">Broke: German Diplomatic Code 0075</span>
</div>
<p><strong>People:</strong> Room 40, British Naval Intelligence</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Code book reconstruction from partial recoveries</p>
<p style="margin-top:1rem;">Germany secretly offered Mexico an alliance against the United States. Britain decoded it, waited strategically, then shared it with Washington. The telegram helped bring America into WWI. The war ended 20 months later.</p>
</div>
</div>
<!-- Story 4: Polish Enigma -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">🔢</span>
<span class="panel-title" style="color:var(--gold);">The Polish Breaking of Enigma</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-wwii">1932</span>
<span class="badge sec-broken">Broke: German Military Enigma</span>
</div>
<p><strong>People:</strong> Marian Rejewski, Jerzy Różycki, Henryk Zygalski</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Permutation group mathematics + known message indicators</p>
<p style="margin-top:1rem;">Polish mathematicians used pure mathematics — specifically permutation group theory — to reconstruct Enigma's rotor wiring without ever seeing the machine. They built the first Enigma-breaking machines. In July 1939, six weeks before Germany invaded Poland, they handed everything to Britain and France. Without Warsaw, there is no Bletchley Park.</p>
<div class="callout callout-info" style="margin-top:1rem;">
<span class="callout-icon">🇵🇱</span>
<div class="callout-body">
<p>Rejewski's breakthrough came from analyzing the message indicator system — the first six characters of each Enigma message. By collecting enough indicators, he found patterns that revealed the mathematical structure of the rotors. Pure mathematics, applied to an engineering problem, by a 27-year-old mathematician.</p>
</div>
</div>
</div>
</div>
<!-- Story 5: Turing and the Bombe -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">⚙️</span>
<span class="panel-title" style="color:var(--gold);">Turing, Welchman, and the Bombe</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-wwii">1940</span>
<span class="badge sec-broken">Broke: German Military Enigma (all branches)</span>
</div>
<p><strong>People:</strong> Alan Turing, Gordon Welchman, and 10,000 Bletchley Park staff</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Crib-based electromechanical search</p>
<p style="margin-top:1rem;">The Bombe tested thousands of Enigma configurations per minute by exploiting known plaintext cribs — stereotyped phrases like WETTER, KEINE BESONDEREN EREIGNISSE, HEIL HITLER. The intelligence product, codenamed Ultra, remained classified until 1974. Historians estimate it shortened WWII by 2–4 years.</p>
</div>
</div>
<!-- Story 6: Tutte, Flowers, and Colossus -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">💻</span>
<span class="panel-title" style="color:var(--gold);">Bill Tutte, Tommy Flowers, and Colossus</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-wwii">1943</span>
<span class="badge sec-broken">Broke: Lorenz SZ42 — Hitler's Strategic Cipher</span>
</div>
<p><strong>People:</strong> Bill Tutte (analysis), Tommy Flowers (engineer)</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Statistical wheel-pattern analysis</p>
<p style="margin-top:1rem;">Tutte deduced the entire Lorenz machine structure without ever seeing it — working only from intercepted traffic. Tommy Flowers built Colossus, the world's first programmable electronic computer, to automate the attack. The need to break a cipher built computing.</p>
</div>
</div>
<!-- Story 7: Friedman and Purple -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">🇺🇸</span>
<span class="panel-title" style="color:var(--gold);">William Friedman and Purple</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-wwii">1940</span>
<span class="badge sec-broken">Broke: Japanese Purple Diplomatic Cipher</span>
</div>
<p><strong>Person:</strong> William F. Friedman, US Army Signal Intelligence</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Statistical analysis + machine reconstruction</p>
<p style="margin-top:1rem;">Friedman's team reconstructed the Purple machine without ever possessing one. The US could read Japanese diplomatic traffic for years before Pearl Harbor. The intelligence existed. The failure was in how it was shared — not cryptanalytic but bureaucratic.</p>
<div class="callout callout-warn" style="margin-top:1rem;">
<span class="callout-icon">⚠️</span>
<div class="callout-body">
<p><strong>The lesson:</strong> Breaking the cipher was not enough. The intelligence from Purple (codenamed MAGIC) warned of Japanese intentions, but inter-service rivalry, poor distribution, and bureaucratic inertia prevented the warnings from reaching Pearl Harbor's commanders in time. The cryptanalysis succeeded. The intelligence system failed.</p>
</div>
</div>
</div>
</div>
<!-- Story 8: Navajo Code Talkers -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">🛡️</span>
<span class="panel-title" style="color:var(--gold);">The Navajo Code Talkers</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-wwii">1942–1945</span>
<span class="badge sec-secure">Never Broken</span>
</div>
<p><strong>People:</strong> 420 Navajo Marines, US Marine Corps</p>
<p style="margin-top:.5rem;"><strong>Cipher:</strong> Navajo language as operational field code</p>
<p style="margin-top:1rem;">This is the only story in this hall about a code that was NOT broken. It belongs here because the story of wartime cryptography is incomplete without it. 420 Navajo Marines transmitted battlefield orders in a language that Japanese linguists could not touch. The code was declassified in 1968 and the Code Talkers received the Congressional Gold Medal in 2001.</p>
<p style="margin-top:1rem;"><a href="../ciphers/navajo-code-talkers.html" style="color:var(--gold);font-family:var(--fm);font-size:.85rem;">View the Navajo Code Talkers exhibit →</a></p>
</div>
</div>
<!-- Story 8.1: Joan Clarke -->
<div class="panel" style="margin-bottom:2rem;" id="clarke">
<div class="panel-head">
<span class="panel-icon">♕</span>
<span class="panel-title" style="color:var(--gold);">Joan Clarke and Naval Enigma</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-wwii">1940–1945</span>
<span class="badge sec-broken">Broke: Kriegsmarine Enigma (Hut 8)</span>
</div>
<p><strong>Person:</strong> Joan Elisabeth Lowther Clarke (later Murray), 1917–1996</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Banburismus — Bayesian sequential analysis of Enigma indicators</p>
<p style="margin-top:1rem;">Recruited from Cambridge mathematics in 1940, Clarke became one of the most productive cryptanalysts in Hut 8 and rose to deputy head — extraordinary in a service that paid female staff at clerical rates and barred them from "officer" titles. She was a fluent practitioner of Banburismus, the Bayesian sequential procedure invented by Turing to slash the Bombe's workload by ranking which wheel orders to test first. On the most stubborn naval traffic she shared the load with Turing himself; on shorter runs she worked alone.</p>
<p style="margin-top:1rem;">Her work fed directly into the Battle of the Atlantic: Hut 8's reads of <em>Hydra</em>, <em>Triton</em> (the four-rotor U-boat key), and other naval keys let convoys be re-routed around U-boat wolf packs. Clarke remained at GCHQ until 1977. Her contribution was not declassified in any meaningful detail until the 1990s; she was appointed MBE in 1946 and otherwise spent the rest of her life in deliberate obscurity.</p>
</div>
</div>
<!-- Story 8.2: Bill Tutte (solo) -->
<div class="panel" style="margin-bottom:2rem;" id="tutte">
<div class="panel-head">
<span class="panel-icon">📐</span>
<span class="panel-title" style="color:var(--gold);">Bill Tutte: Reverse-Engineering Lorenz from Ciphertext</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-wwii">1941–1942</span>
<span class="badge sec-broken">Broke: Lorenz SZ40/42 (machine reconstruction without a captured device)</span>
</div>
<p><strong>Person:</strong> William Thomas "Bill" Tutte, 1917–2002, Cambridge graph theorist</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Statistical period-finding on a 4,000-character depth produced by an operator's August 1941 mistake</p>
<p style="margin-top:1rem;">In August 1941 a German operator sent a 4,000-character message twice on the same Lorenz key after the receiving station asked for a repeat — the kind of depth that should never happen. John Tiltman recovered the plaintext by hand. Tutte then spent four months turning that single keystream into a complete schematic of a machine he had never seen. Working only with pencil and squared paper, he discovered the SZ40/42 used twelve wheels in two banks (the chi-stream and psi-stream wheels) plus two motor wheels, and he derived the period of every wheel from the statistical structure of the recovered key. The result, "Tutte's 1+2 break-in," became the foundation of the British attack on Hitler's strategic cipher.</p>
<p style="margin-top:1rem;">Tutte's analytical method was what Tommy Flowers needed to mechanise. Colossus exists because Tutte's break gave it something to compute. After the war Tutte returned to mathematics and became one of the founders of modern graph theory. The Bletchley Park work was classified for fifty years; Tutte's role was not publicly acknowledged until the late 1990s. Canada later named the Tutte Institute for Mathematics and Computing in his honour.</p>
<div class="callout callout-info" style="margin-top:1rem;">
<span class="callout-icon">💡</span>
<div class="callout-body">
<p>See also: <a href="../ciphers/lorenz.html">Hall VII · Lorenz exhibit</a> for the machine; Story 6 above for Tommy Flowers and Colossus.</p>
</div>
</div>
</div>
</div>
<!-- Story 8.3: Elizebeth Friedman -->
<div class="panel" style="margin-bottom:2rem;" id="elizebeth-friedman">
<div class="panel-head">
<span class="panel-icon">🌹</span>
<span class="panel-title" style="color:var(--gold);">Elizebeth Smith Friedman: Rum-Runners and Nazi Spies</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-20c">1923–1946</span>
<span class="badge sec-broken">Broke: Prohibition smuggler ciphers; Abwehr South-American spy-ring traffic</span>
</div>
<p><strong>Person:</strong> Elizebeth Smith Friedman, 1892–1980</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Hand cryptanalysis of commercial codes, polyalphabetics, and one-part nomenclators across 12,000+ messages</p>
<p style="margin-top:1rem;">Hired by oilman George Fabyan's Riverbank Laboratories in 1916, Elizebeth and her husband William essentially invented modern American cryptanalysis as a married team. From 1923 she ran the cryptanalytic unit of the US Coast Guard and broke the encrypted radio traffic of the Prohibition rum-runners — testifying as the government's expert witness in 33 federal trials and reading aloud, in court, messages the defendants insisted no one could read. Her unit decoded cipher systems from the simplest substitution to multi-stage Hagelin-class machines.</p>
<p style="margin-top:1rem;">During WWII the Coast Guard unit was folded into a joint operation that broke the South-American Abwehr networks — the German clandestine radio circuit running from Hamburg through Brazil, Argentina, and Chile. Hoover's FBI publicly took credit for rolling up the spy ring; Elizebeth's unit had done the cryptanalysis. The full story stayed classified until her papers were opened at the Marshall Library in 2008 and Jason Fagone's <em>The Woman Who Smashed Codes</em> (2017) reconstructed it.</p>
</div>
</div>
<!-- Story 8.4: Agnes Meyer Driscoll -->
<div class="panel" style="margin-bottom:2rem;" id="driscoll">
<div class="panel-head">
<span class="panel-icon">⚓</span>
<span class="panel-title" style="color:var(--gold);">Agnes Meyer Driscoll: Madame X of US Naval Intelligence</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-20c">1920s–1940s</span>
<span class="badge sec-broken">Broke: Imperial Japanese Navy Red Book, Blue Book, and JN-25 (initial entry)</span>
</div>
<p><strong>Person:</strong> Agnes Meyer Driscoll, 1889–1971, US Navy civilian cryptanalyst</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Stripping superencipherment off four-digit code groups; manual book reconstruction</p>
<p style="margin-top:1rem;">Driscoll joined the Navy's code and signal section in 1918 and stayed for the rest of her career — through the Red Book of the 1920s, the Blue Book in 1930 (after a covert physical compromise of the Japanese codebook in New York), and the long entry into JN-25, the Imperial Japanese Navy's main fleet operational code. The same JN-25 line of work was the one Joe Rochefort's Hawaii team rode to the Midway intelligence break in 1942. Driscoll trained nearly every senior US Navy cryptanalyst of the WWII generation; her nickname inside the building was "Madame X."</p>
<p style="margin-top:1rem;">She also helped design the Navy's "CM" cipher machine in the 1930s and reviewed the work that became SIGABA. By the time the Navy fully mechanised cryptanalysis after 1945 Driscoll's hand methods were being phased out, but the JN-25 lineage she opened ran straight through the Pacific war.</p>
</div>
</div>
<!-- Story 8.5: Leo Marks -->
<div class="panel" style="margin-bottom:2rem;" id="marks">
<div class="panel-head">
<span class="panel-icon">📜</span>
<span class="panel-title" style="color:var(--gold);">Leo Marks and the SOE Agent Codes</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-wwii">1942–1945</span>
<span class="badge sec-secure">Designed: silk one-time pads and worked-out keys for field agents</span>
</div>
<p><strong>Person:</strong> Leopold Samuel "Leo" Marks, 1920–2001, Head of Codes, Special Operations Executive</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Replacing memorised "poem codes" with printed-silk one-time pads; introducing planned indicator schemes that survived agent error and torture</p>
<p style="margin-top:1rem;">Marks took over SOE's code section at 22 and inherited a system in which agents in occupied Europe encoded radio messages using lines from memorised poems. Memorised keys are short, agents under stress make transcription mistakes, and an "indecipherable" message that has to be re-transmitted gives direction-finding teams a second chance to fix the radio. Marks proved that a meaningful fraction of "indecipherables" were in fact breakable by his own staff in London with a few hours of work — and started doing it routinely so the agent did not have to repeat the message.</p>
<p style="margin-top:1rem;">He then replaced the poem codes with <strong>printed-silk one-time pads</strong>: small, silent, easily concealed, and disposable strip by strip after use. Combined with worked-out keys (WOKs) and letter-one-time-pads (LOPs), the silks gave SOE field circuits something approaching real cryptographic security for the first time. Marks also wrote, for an agent killed in 1944, the poem <em>The Life That I Have</em> — later one of the most-quoted English love poems of the century. His memoir <em>Between Silk and Cyanide</em> (1998) is the canonical inside account of agent cryptography.</p>
<div class="callout callout-info" style="margin-top:1rem;">
<span class="callout-icon">💡</span>
<div class="callout-body">
<p>See also: <a href="../ciphers/one-time-pad.html">Hall IX · One-Time Pad</a> for the underlying mathematics of what SOE's silks actually delivered to the field.</p>
</div>
</div>
</div>
</div>
<!-- Story 9: VENONA -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">🕵️</span>
<span class="panel-title" style="color:var(--gold);">VENONA and the Soviet OTP</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-coldwar">1943–1980</span>
<span class="badge sec-broken">Broke: Soviet One-Time Pad (via key reuse)</span>
</div>
<p><strong>People:</strong> Meredith Gardner and the US Army Signal Intelligence Service</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Depth attack on reused pad pages</p>
<p style="margin-top:1rem;">The OTP is mathematically unbreakable. Soviet signals officers reused pad pages under WWII supply pressure. XOR-ing two messages with the same key eliminates the key: C1 ⊕ C2 = P1 ⊕ P2. VENONA decoded thousands of messages and exposed Julius Rosenberg, Klaus Fuchs, Donald Maclean, and others. The project remained classified until 1995.</p>
<div class="callout callout-danger" style="margin-top:1rem;">
<span class="callout-icon">⚡</span>
<div class="callout-body">
<p><strong>The math never failed — the people did.</strong> The one-time pad's mathematical proof of perfect secrecy remains unbroken. What broke was operational discipline. Under the pressure of wartime logistics, Soviet cipher clerks reused key pages. That single human decision exposed an entire intelligence network and changed the course of the Cold War.</p>
</div>
</div>
</div>
</div>
<!-- Story 10: Zodiac Z-340 -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">🔍</span>
<span class="panel-title" style="color:var(--gold);">Oranchak, Blake, Van Eycke and the Zodiac Z-340</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-coldwar">2020</span>
<span class="badge sec-broken">Broke: Zodiac Z-340</span>
</div>
<p><strong>People:</strong> David Oranchak, Sam Blake, Jarl Van Eycke</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Computational search + n-gram statistical scoring</p>
<p style="margin-top:1rem;">51 years unsolved. Cracked during COVID lockdown by a three-person remote team using modern computing and classical cryptanalytic intuition. The key insight: the Z-340 used a diagonal transposition before homophonic substitution — a reading order nobody had tried. Once the transposition was identified, the substitution fell to standard techniques. The killer was not identified.</p>
<p style="margin-top:1rem;"><a href="../ciphers/zodiac.html" style="color:var(--gold);font-family:var(--fm);font-size:.85rem;">View the Zodiac Cipher exhibit →</a></p>
</div>
</div>
<!-- Story 11: Frank Rowlett -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">🇺🇸</span>
<span class="panel-title" style="color:var(--gold);">Frank Rowlett and the SIS Purple Team</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-wwii">1939–1940</span>
<span class="badge sec-broken">Broke: Japanese Purple (Type 97)</span>
</div>
<p><strong>Person:</strong> Frank B. Rowlett, US Army Signal Intelligence Service</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Stepping-switch cryptanalysis from intercept traffic alone</p>
<p style="margin-top:1rem;">William Friedman is rightly famous for Purple, but Rowlett led the day-to-day attack. His team had no captured machine, no diagram, no defector — only ciphertext. Rowlett organized the SIS into specialized units that hunted statistical regularities in switch stepping, and he kept the project alive through 18 months of dead ends. When MAGIC began producing Japanese diplomatic intelligence in 1940, the analytic engine behind it was Rowlett's.</p>
<p style="margin-top:1rem;">Awarded the Presidential Medal for Merit (1946) and the National Security Medal (1965). Co-author with Friedman of the SIGABA design — the only major US cipher machine that was never broken.</p>
</div>
</div>
<!-- Story 12: Genevieve Grotjan -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">🔍</span>
<span class="panel-title" style="color:var(--gold);">Genevieve Grotjan and September 20, 1940</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-wwii">1940</span>
<span class="badge sec-broken">Broke: Purple consonant bank wiring</span>
</div>
<p><strong>Person:</strong> Genevieve Grotjan Feinstein, SIS junior cryptanalyst</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Pattern recognition across aligned worksheets</p>
<p style="margin-top:1rem;">On the afternoon of September 20, 1940, Grotjan asked Rowlett to look at a worksheet she had prepared. Aligning intercept plaintext-ciphertext pairs, she had identified a recurring relationship in the consonant cipher alphabet — the alignment that revealed how Purple's stepping switches were wired. Rowlett later described the moment as “one of the great breaks of the war.” Grotjan had been with SIS for less than two years.</p>
<div class="callout callout-info" style="margin-top:1rem;">
<span class="callout-icon">💡</span>
<div class="callout-body">
<p>Grotjan continued working on Soviet ciphers after the war as part of the team that produced VENONA, then later joined the National Security Agency. She received the Exceptional Civilian Service Award in 1946. Her single afternoon's insight is one of the most consequential pattern recognitions in cryptologic history.</p>
</div>
</div>
</div>
</div>
<!-- Story 13: Boris Hagelin -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">⚙️</span>
<span class="panel-title" style="color:var(--gold);">Boris Hagelin and the M-209</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-wwii">1934–1983</span>
<span class="badge sec-broken">Designed: C-36, M-209, CX-52</span>
</div>
<p><strong>Person:</strong> Boris C. W. Hagelin, Swedish-American engineer</p>
<p style="margin-top:.5rem;"><strong>Contribution:</strong> Pin-and-lug rotor mechanics for hand-portable cipher machines</p>
<p style="margin-top:1rem;">Hagelin inherited the AB Cryptograph engineering shop in Stockholm and turned it into the dominant supplier of mechanical cipher machines for the Western tactical market. The C-36 fit in a uniform pocket; its US derivative, the M-209, served the US Army from 1943 through Korea. After the war he reorganized the company in Switzerland as Crypto AG — later infamous for Operation RUBICON, the CIA/BND backdoor program declassified in 2020.</p>
<p style="margin-top:1rem;"><a href="../ciphers/m209.html" style="color:var(--gold);font-family:var(--fm);font-size:.85rem;">View the M-209 exhibit →</a></p>
</div>
</div>
<!-- Story 14: Copiale Team -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">📖</span>
<span class="panel-title" style="color:var(--gold);">The Copiale Team</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-modern">2011</span>
<span class="badge sec-broken">Broke: Copiale Cipher (250-year-old homophonic)</span>
</div>
<p><strong>People:</strong> Kevin Knight (USC ISI), Beáta Megyesi and Christiane Schaefer (Uppsala University)</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Hidden Markov models + statistical machine translation</p>
<p style="margin-top:1rem;">A 105-page handwritten manuscript from the East Berlin Academy archive had resisted manual cryptanalysis for two and a half centuries. Knight and his collaborators treated the symbol stream as a translation problem: they trained an HMM on German n-grams, ran expectation-maximization to align symbols to phonemes, and after testing several wrong source languages, German emerged. The text turned out to be the initiation ritual of an 18th-century mystical society called the Oculist Order. The first major historical cipher broken by computational linguistics.</p>
<p style="margin-top:1rem;"><a href="../ciphers/copiale.html" style="color:var(--gold);font-family:var(--fm);font-size:.85rem;">View the Copiale Cipher exhibit →</a></p>
</div>
</div>
<!-- Story 15: Chaocipher Verifiers -->
<div class="panel" style="margin-bottom:2rem;">
<div class="panel-head">
<span class="panel-icon">🔄</span>
<span class="panel-title" style="color:var(--gold);">The Chaocipher Verifiers</span>
</div>
<div class="panel-body">
<div class="page-meta" style="margin-bottom:1rem;">
<span class="badge era-modern">2010–2014</span>
<span class="badge sec-broken">Reconstructed: Byrne's Chaocipher algorithm</span>
</div>
<p><strong>People:</strong> Moshe Rubin (algorithm reconstruction, 2010), George Lasry (cryptanalytic verification)</p>
<p style="margin-top:.5rem;"><strong>Technique:</strong> Documentary reconstruction + simulated annealing</p>
<p style="margin-top:1rem;">John F. Byrne refused to disclose how Chaocipher worked from 1918 until his death in 1960. His family donated the papers to the National Cryptologic Museum in 2010, and Moshe Rubin reconstructed the dynamic-permutation algorithm from Byrne's worked examples within months. George Lasry then demonstrated that with sufficient ciphertext (a few hundred crib characters), simulated annealing recovers the two starting alphabets — proving Chaocipher was secret rather than secure.</p>
<p style="margin-top:1rem;"><a href="../ciphers/chaocipher.html" style="color:var(--gold);font-family:var(--fm);font-size:.85rem;">View the Chaocipher exhibit →</a></p>
</div>
</div>
</div>
<div class="hall-nav">
<a href="../cryptanalysis.html" class="hall-nav-link">
<span class="hall-nav-dir">← Previous</span>
<span class="hall-nav-name">Cryptanalysis Techniques</span>
</a>
<a href="modern-crypto.html" class="hall-nav-link next">
<span class="hall-nav-dir">Next Hall →</span>
<span class="hall-nav-name">Hall XI: Modern Cryptography</span>
</a>
</div>
</main>
<footer class="museum-footer">
<div class="footer-grid">
<div class="footer-brand">
<span class="footer-logo-text">The Cipher Museum</span>
<p class="footer-brand-desc">Open-source cryptography education. MIT License. GitHub Pages.</p>
</div>
<div>
<div class="footer-col-title">Related Exhibits</div>
<ul class="footer-links">
<li><a href="../ciphers/navajo-code-talkers.html">Navajo Code Talkers</a></li>
<li><a href="../ciphers/zodiac.html">Zodiac Cipher</a></li>
<li><a href="../ciphers/enigma.html">Enigma Machine</a></li>
<li><a href="../ciphers/lorenz.html">Lorenz Cipher</a></li>
</ul>
</div>
<div>
<div class="footer-col-title">Navigate</div>
<ul class="footer-links">
<li><a href="../museum-map.html">Museum Map</a></li>
<li><a href="../timeline.html">Timeline</a></li>
<li><a href="../cryptanalysis.html">Cryptanalysis Techniques</a></li>
</ul>
</div>
</div>
<div class="footer-bottom">
<span class="footer-copy">© The Cipher Museum · MIT License</span>
<span class="footer-copy">Hall X of XIII · 13 Exhibit Halls</span>
</div>
</footer>
<script src="../js/nav.js" defer></script>
<script src="../js/lightbox.js"></script>
</body>
</html>