In the history of cryptography, Typex (alternatively, Type X or TypeX) machines were British cipher machines used from 1937. It was an adaptation of the commercial German Enigma with a number of enhancements that greatly increased its security. The cipher machine (and its many revisions) was used until the mid-1950s when other more modern military encryption systems came into use.
Like Enigma, Typex was a rotor machine. Typex came in a number of variations, but were five-rotor machines (as opposed to three or four in the Enigma) with a non-rotating reflector. Typically the first two rotors were stationary during encipherment, although they could be set by hand. These additional stationary rotors provided a similar sort of protection to that of the Enigma's plugboard (but without the weakness of being reciprocal), which the Typex lacked in early models.
An improvement the Typex had over the standard German Services Enigma was that the rotors in the machine contained multiple notches that would turn the neighbouring rotor.
Some Typex rotors came in two parts—a slug containing the wiring was inserted into a metal casing. Different casings contained different numbers of notches around the rim, such as 5, 7 or 9 notches. Each slug could be inserted into a casing in two different ways by turning it over. In use, all the rotors of the machine would use casings with the same number of notches. Normally five slugs were chosen from a set of ten. On a Typex rotor, each electrical contact was doubled to improve reliability.
On some models, operators could achieve a speed of 20 words a minute, and the output ciphertext or plaintext was printed on paper tape. For some portable versions, such as the Mark III, a message was typed with the left hand while the right hand turned a handle.
Several Internet Typex articles say that only Vaseline was used to lubricate Typex machines and that no other lubricant was used. Vaseline was used to lubricate the rotor disc contacts. Without this there was a risk of arcing which would burn the insulation between the contacts. For the rest of the machine two grades of oil (Spindle Oils 1 and 2) were used. Regular cleaning and maintenance was essential. In particular, the letters/figures cam-cluster balata discs had to be kept lubricated.
History and development
By the 1920s, the British Government were seeking a replacement for their book code systems, which had been shown to be insecure and which proved to be slow and awkward to use. In 1926, an inter-departmental committee was formed to consider whether they could be replaced with cipher machines. Over a period of several years and at large expense, the committee investigated a number of options but no proposal was decided upon. One suggestion was put forward by Wing Commander Oswyn G. W. G. Lywood to adapt the commercial Enigma by adding a printing unit but the committee decided against pursuing Lywood's proposal.
In August 1934, Lywood began work on a machine regardless, authorised by the RAF. Lywood worked with J. C. Coulson, Albert P. Lemmon, and Ernest W. Smith at Kidbrooke in Greenwich, with the printing unit provided by Creed & Company. The first prototype was delivered to the Air Ministry on 30 April 1935. In early 1937, around 30 Typex Mark I machines were supplied to the RAF. The machine was initially termed the "RAF Enigma with Type X attachments".
The design of its successor had begun by February 1937. In June 1938, Typex Mark II was demonstrated to the cipher-machine committee, who approved an order of 350 machines. The Mark II model was bulky, incorporating two printers: one for plaintext and one for ciphertext. As a result, it was significantly larger than the Enigma, weighing around 120 pounds, and measuring 30" × 22" × 14". After trials, the machine was adopted by the RAF, Army and other government departments. During World War II, a large number of Typex machines were manufactured by the tabulating machine manufacturer Powers-Samas.
Typex Mark III was a more portable variant, using the same drums as the Mark II machines powered by turning a handle (it was also possible to attach a motor drive). The maximum operating speed is around 60 letters a minute, significantly slower than the 300 achievable with the Mark II.
Typex Mark VI was another handle-operated variant, measuring 20"×12"×9", weighing 30 pounds and consisting of over 700 components.
Plugboards for the reflector were added to the machine from November 1941.
For inter-Allied communications during World War II, the Combined Cipher Machine (CCM) was developed, used in the Royal Navy from November 1943. The CCM was implemented by making modifications to Typex and the United States ECM Mark II machine so that they would be compatible.
Typex Mark VIII was a Mark II fitted with a morse perforator.
Typex 22 (BID/08/2) and Typex 23 (BID/08/3) were late models, that incorporated plugboards for improved security. Mark 23 was a Mark 22 modified for use with the CCM. In New Zealand, Typex Mark II and Mark III were superseded by Mark 22 and Mark 23 on 1 January 1950.
Erskine (2002) estimates that around 12,000 Typex machines were built by the end of World War II.
Security and use
From 1943 the Americans and the British agreed upon a Combined Cipher Machine (CCM). The British Typex and American ECM Mark II could be adapted to become interoperable. While the British showed Typex to the Americans, the Americans never permitted the British to see the ECM, which was a more complex design. Instead, attachments were built for both that allowed them to read messages created on the other.
Although a British test cryptanalytic attack made considerable progress, the results were not as significant as against the Enigma, due to the increased complexity of the system and the low levels of traffic.
A Typex machine without rotors was captured by German forces during the Battle of France and more than one German cryptanalytic section proposed attempting to crack Typex; however, the B-Dienst codebreaking organization gave up on it after six weeks, when further time and personnel for such attempts was refused.
One German cryptanalyst stated that the Typex was more secure than the Enigma since it had seven rotors, therefore no major effort was made to crack Typex messages as they believed that even the Enigma's messages were unbreakable.
Although the Typex has been attributed as having good security, the historic record is much less clear. There was an ongoing investigation into Typex security that arose out of German POWs in North Africa claiming that Typex traffic was decipherable.
A brief excerpt from the report
TOP SECRET U [ZIP/SAC/G.34]
THE POSSIBLE EXPLOITATION OF TYPEX BY THE GERMAN SIGINT SERVICES
The following is a summary of information so far received on German attempts to break into the British Typex machine, based on P/W interrogations carried out during and subsequent to the war. It is divided into (a) the North African interrogations, (b) information gathered after the end of the war, and (c) an attempt to sum up the evidence for and against the possibility of German successes.
Apart from an unconfirmed report from an agent in France on 19/7/42 to the effect that the GAF were using two British machines captured at DUNKIRK for passing their own traffic between BERLIN and GOLDAP, our evidence during the war was based on reports that OKH was exploiting Typex material left behind in TOBRUK in 1942.
Advantages over Enigma
All the versions of the Typex had advantages over the German military versions of the Enigma machine. The German equivalent teleprinter machines in World War II (used by higher-level but not field units) were the Lorenz SZ 40 and Siemens and Halske T52 using Fish cyphers.
- Most versions of the Enigma required two operators to operate effectively—one operator to input text into the Enigma and the other to copy down the enciphered or deciphered characters—Typex required just one operator.
- Typex avoided operator copying errors, as the enciphered or deciphered text was automatically printed on paper tape.
- Unlike Enigma, Typex I machines were linked to teleprinters while Typex II machines could be if required.
- Enigma messages had to be written, enciphered, transmitted (by Morse), received, deciphered, and written again, while Typex messages were typed and automatically enciphered and transmitted all in one step, with the reverse also true.
- Cryptanalysis of the Enigma
- Cryptanalysis of the Lorenz cipher
- Mercury (Typex Mark X)—a Typex descendent used for on-line traffic.
- Deavours and Kruh
- Ratcliff, Rebecca Ann (2006). Delusions of Intelligence. Cambridge University Press. p. 165. ISBN 0-521-85522-5.
- Mogon, Eric. "Chapter 8-A History of Communications Security in New Zealand/ Codes & Cyphers in World War 2". Unofficial RNZN Communications History. RNZN Communicators Association. Retrieved 28 December 2014. (PDF version-135 Kb)
- Ferris, John Robert (2005). Intelligence and Strategy. Routledge. p. 153. ISBN 0-415-36194-X.
- Martin Campbell-Kelly, ICL: A Business and Technical History, Oxford University Press, 1990.
- Dorothy Clarkson, "Cypher Machines: Maintenance and Restoration Spanning Sixty Years", Cryptologia, 27(3), July 2003, pp. 209–212.
- Cipher A. Deavours and Louis Kruh, "Machine Cryptography and Modern Cryptanalysis", Artech House, 1985, pp. 144–145; 148–150.
- Ralph Erskine, "The Admiralty and Cipher Machines During the Second World War: Not So Stupid after All". Journal of Intelligence History 2(2) (Winter 2002).
- Ralph Erskine, "The Development of Typex", The Enigma Bulletin 2 (1997): pp. 69–86
- Kruh and Deavours, "The Typex Cryptograph" Cryptologia 7(2), pp. 145–167, 1983
- Eric Morgon, "The History of Communications Security in New Zealand", Part 1 (PDF).[dead link]Possibly related page as html
|Wikimedia Commons has media related to Typex.|