SIGSALY

SIGSALY
SIGSALY exhibit at the National Cryptologic Museum

In cryptography, SIGSALY (also known as the X System, Project X, Ciphony I, and the Green Hornet) was a secure speech system used in World War II for the highest-level Allied communications.

It pioneered a number of digital communications concepts, including the first transmission of speech using pulse-code modulation.

The name SIGSALY was not an acronym, but a cover name that resembled an acronym—the SIG part was common in Army Signal Corps names (eg, SIGABA). The prototype was called the "Green Hornet" after the popular radio show The Green Hornet, because it sounded like a buzzing hornet — resembling the show's theme tune — to anyone trying to eavesdrop on the conversation.

Contents

Development

At the time of its inception, long distance telephone communications were broadcast using the "A-3" voice scrambler developed by AT&T. The Germans had a listening station on the Dutch coast which could intercept and break A-3 traffic [1].

Although telephone scramblers were used by both sides in World War II, they were known not to be very secure in general, and both sides often cracked the scrambled conversations of the other. Inspection of the audio spectrum using a spectrum analyzer often provided significant clues to the scrambling technique. The insecurity of most telephone scrambler schemes led to the development of a more secure scrambler, based on the one-time pad principle.

A prototype was developed at Bell Telephone Laboratories, better known as "Bell Labs", under the direction of A. B. Clark, assisted by British mathematician Alan Turing (see external link 1, below), and demonstrated to the US Army. The Army was impressed and awarded Bell Labs a contract for two systems in 1942. SIGSALY went into service in 1943 and remained in service until 1946.

Operation

SIGSALY used a random noise mask to encrypt voice conversations which had been encoded by a vocoder. The latter was used both to minimize the amount of redundancy (which is high in voice traffic), and also to reduce the amount of information to be encrypted.

The voice conversation was first encoded by the vocoder as:

  • ten low-frequency (less than 25 Hz) signals, giving the amplitude in ten separate frequency bands, which together covered the telephone passband (250 Hz - 2,950 Hz);
  • another signal indicating whether the sound is voiced or unvoiced;
  • if voiced, a signal indicating the pitch; this also varied at less than 25 Hz.

Next, each signal was sampled for its amplitude once every 20 milliseconds. For the band amplitude signals, the amplitude converted into one of six amplitude levels, with values from 0 through 5. The amplitude levels were on a nonlinear scale, with the steps between levels wide at low amplitudes and narrower at high amplitudes. This scheme, known as "companding" or "compressing-expanding", exploits the fact that the fidelity of voice signals is more sensitive to high amplitudes than to low amplitudes. The pitch signal, which required greater sensitivity, was encoded by a pair of six-level values (one coarse, and one fine), giving thirty-six levels in all.

A cryptographic key, consisting of a series of random values from the same set of six levels, was subtracted from each sampled voice amplitude value to encrypt them before transmission. The subtraction was performed using modular arithmetic: a "wraparound" fashion, meaning that if there was a negative result, it was added to six to give a positive result. For example, if the voice amplitude value was 3 and the random value was 5, then the subtraction would work as follows:

3 - 5 \equiv -2 \equiv -2 + 6 \equiv 4\mod 6

— giving a value of 4.

The sampled value was then transmitted, with each sample level transmitted on one of six corresponding frequencies in a frequency band, a scheme known as "frequency-shift keying (FSK)". The receiving SIGSALY read the frequency values, converted them into samples, and added the key values back to them to decrypt them. The addition was also performed in a "modulo" fashion, with six subtracted from any value over five. To match the example above, if the receiving SIGSALY got a sample value of 4 with a matching random value of 5, then the addition would be as follows:

4 + 5 \equiv 9 \equiv 9 - 6 \equiv 3\mod 6

— which gives the correct value of 3.

To convert the samples back into a voice waveform, they were first turned back into the dozen low-frequency vocoded signals. An inversion of the vocoder process was employed, which included:

  • a white noise source (used for unvoiced sounds);
  • a signal generator (used for voiced sounds) generating a set of harmonics, with the base frequency controlled by the pitch signal;
  • a switch, controlled by the voiced/unvoiced signal, to select one of these two as a source;
  • a set of filters (one for each band), all taking as input the same source (the source selected by the switch), along with amplifiers whose gain was controlled by the band amplitude signals.

The noise values used for the encryption key were originally produced by large mercury-vapor rectifying vacuum tubes and stored on a phonograph record. The record was then duplicated, with the records being distributed to SIGSALY systems on both ends of a conversation. The records served as the SIGSALY "one-time pad", and distribution was very strictly controlled (although if one had been seized, it would have been of little importance, since only one pair of each was ever produced). For testing and setup purposes, a pseudo-random number generating system made out of relays, known as the "threshing machine", was used.

The records were played on turntables, but since the timing – the clock synchronization – between the two SIGSALY terminals had to be precise, the turntables were by no means just ordinary record-players. The rotation rate of the turntables was carefully controlled, and the records were started at highly specific times, based on precision time-of-day clock standards. Since each record only provided 12 minutes of key, each SIGSALY had two turntables, with a second record "queued up" while the first was "playing".

Usage

A SIGSALY terminal in 1943.

The SIGSALY terminal was massive. Consisting of 40 racks of equipment, it weighed over 50 tons, and used about 30 kW of power, necessitating an air-conditioned room to hold it. Too big and cumbersome for general use, it was only used for the highest level of voice communications.

A dozen SIGSALY terminal installations were eventually set up all over the world. One was installed in a ship and followed General Douglas MacArthur during his South Pacific campaigns. It supported about 3,000 high-level telephone conferences. The encrypted phone link between the US President and Churchill in WW2 was probably an example of SIGSALY.

The system was cumbersome, but it worked very effectively. When the Allies invaded Germany, an investigative team discovered that the Germans had recorded significant amounts of traffic from the system, but had erroneously concluded that it was a complex telegraphic encoding system.[citation needed]

Significance

SIGSALY has been credited with a number of "firsts"; this list is taken from (Bennett, 1983):

  1. The first realization of enciphered telephony
  2. The first quantized speech transmission
  3. The first transmission of speech by pulse code modulation (PCM)
  4. The first use of companded PCM
  5. The first examples of multilevel frequency shift keying (FSK)
  6. The first useful realization of speech bandwidth compression
  7. The first use of FSK - FDM (Frequency Shift Keying-Frequency Division Multiplex) as a viable transmission method over a fading medium
  8. The first use of a multilevel "eye pattern" to adjust the sampling intervals (a new, and important, instrumentation technique)

In popular culture

SIGSALY was featured in Neal Stephenson's novel Cryptonomicon, in a conversation between the fictional character Lawrence Waterhouse and the historical character Alan Turing.

See also

Further reading

  • M. D. Fagen (editor), National Service in War and Peace (1925–1975), Volume II of A History of Engineering and Science in the Bell System (Bell Telephone Laboratories, 1978) pp. 296–317

References

  1. ^ The SIGSALY Story, by Patrick D. Weadon, National Security Agency/Central Security Service[dead link]Archive copy at the Wayback Machine
Notes
  • William R. Bennett, Fellow, IEEE, "Secret Telephony as a Historical Example of Spread-Spectrum Communications," IEEE Transactions on Communications, Vol. COM-31, No. 1, January 1983, 99.
  • Weadon, P., "Sigsaly Story", National Security Agency Central Security Service, January 2009

External links


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Secure voice — (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. Contents 1 History 2 Analog Secure Voice technologies 3 Di …   Wikipedia

  • Vocoder — A vocoder (  /ˈvoʊk …   Wikipedia

  • Pulse-code modulation — PCM redirects here. For other uses, see PCM (disambiguation). Pulse code modulation (PCM) is a method used to digitally represent sampled analog signals. It is the standard form for digital audio in computers and various Blu ray, Compact Disc and …   Wikipedia

  • Homer Dudley — Homer W. Dudley (1896 1987) was a pioneering electronic and acoustic engineer who created the first electronic voice synthesizer for Bell Labs in the 1930s and led the development of a method of sending secure voice transmissions during World War …   Wikipedia

  • Scrambler — For other uses, see Scrambler (disambiguation). In telecommunications, a scrambler is a device that transposes or inverts signals or otherwise encodes a message at the transmitter to make the message unintelligible at a receiver not equipped with …   Wikipedia

  • Spread spectrum — Passband modulation v · d · e Analog modulation AM · …   Wikipedia

  • Frequency-hopping spread spectrum — (FHSS) is a method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver. A spread spectrum transmission offers three main advantages over… …   Wikipedia

  • Digital recording — Audio levels display on a digital audio recorder (Zoom H4n) In digital recording, digital audio and digital video is directly recorded to a storage device as a stream of discrete numbers, representing the changes in air pressure (sound) for audio …   Wikipedia

  • World War II cryptography — Cryptography was used extensively during World War II, with a plethora of code and cipher systems fielded by the nations involved. In addition, the theoretical and practical aspects of cryptanalysis , or codebreaking , was much advanced. Probably …   Wikipedia

  • Interface (band) — Infobox musical artist Name = Interface Img capt = Img size = 200 Landscape = Background = group or band Alias = Origin = United States Genre = aggrotech futurepop electro industrial Years active = 1993 Label = Tinman Records (1999 2005) Nilaihah …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”