Combined Cipher Machine

From Wikipedia, the free encyclopedia

CSP 1600, the replacement stepping unit to adapt the ECM Mark II to CCM
Enlarge
CSP 1600, the replacement stepping unit to adapt the ECM Mark II to CCM

The Combined Cipher Machine (CCM) (or Combined Cypher Machine) was a common cipher machine system for securing Allied communications during World War II and for a few years after amongst NATO. The British Typex machine and the US ECM Mark II were both modified so that they were interoperable.

Stepping mechanism in the CSP 1600
Enlarge
Stepping mechanism in the CSP 1600

The British had shown their main cipher machine — Typex — to the US on their entry into the war, but the Americans were reluctant to share their machine, the ECM Mark II. There was a need for secure inter-Allied communications, and so a joint cipher machine adapted from both countries' systems was developed by the US Navy. The "Combined Cipher Machine" was approved in October 1942, and production began two months later. The requisite adapters, designed by Don Seiler, were all manufactured in the US, as Britain did not have sufficient manufacturing resources at the time. The CCM was initially used on a small scale for naval use from 1 November 1943, becoming operational on all US and UK armed services in April 1944.

The adapter to convert the ECM into the CCM was denoted the ASAM 5 by the US Army (in 1949) and CSP 1600 by the US Navy (the Navy referred to the entire ECM machine with CCM adapter as the CSP 1700). The adapter was a replacement rotor basket, so the ECM could be easily converted for CCM use in the field. A specially converted ECM, termed the CCM Mark II, was also made available to Britain and Canada.

Typex 23, pictured, was similar to the Mark 22, but modified for use with the Combined Cypher Machine (CCM).
Enlarge
Typex 23, pictured, was similar to the Mark 22, but modified for use with the Combined Cypher Machine (CCM).

The CCM programme cost US$6 million.

SIGROD was an implementation of the CCM which, at one point, was proposed as a replacement for the ECM Mark II (Savard and Pekelney, 1999).

Typex 23 was a later model of Typex adapted for use with the Combined Cipher Machine.

[edit] Security

While Allied codebreakers had much success reading the equivalent German machine, the Enigma, their German counterparts, although performing some initial analysis, had no success with the CCM.

However, there were security problems with the CCM. In one case, it was discovered that certain rotor combinations produced a dangerously short period of 338, and that the rotor wiring could have been recovered from an actual 1,000-group message that had been sent using the machine.

In 1952, a later version of CCM, "Ajax", was also found to have security problems.

[edit] References

  • Ralph Erskine, "The Admiralty and Cipher Machines During the Second World War: Not So Stupid after All", Journal of Intelligence History, 2(2) (Winter 2002).
  • Ralph Erskine, "The Development of Typex", The Enigma Bulletin 2 (1997): pp69–86.
  • John J. G. Savard and Richard S. Pekelney, "The ECM Mark II: Design, History and Cryptology", Cryptologia, Vol 23(3), July 1999, pp211–228.
  • CSP 1100(C), Operating Instructions for ECM Mark 2 (CSP 888/889) and CCM Mark 1 (CSP 1600), May 1944, [1].
  • Crypto-Operating Instructions for ASAM 1, 1949, [2].

[edit] See also

Cipher machines
v  d  e
Rotor machines: CCM | Enigma | Fialka | Hebern | HX-63 | KL-7 | Lacida | M-325 | Mercury | NEMA | OMI | Portex | SIGABA | SIGCUM | Singlet | Typex
Mechanical: Bazeries cylinder | C-36 | C-52 | CD-57 | Cipher disk | HC-9 | Kryha | Jefferson disk | M-94 | M-209 | Reihenschieber | Scytale
Teleprinter: 5-UCO | BID 770 | KW-26 | KW-37 | Lorenz SZ 40/42 | Siemens and Halske T52
Secure voice: KY-3 | KY-57 | KY-58 | KY-68 | OMNI | SIGSALY | STE | STU-II | STU-III | VINSON | SCIP | Sectéra Secure Module
Miscellaneous: Cryptex | JADE | KG-84 | KL-43 | Noreen | PURPLE | Pinwheel | Rockex
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers