Combined Cipher Machine

The Combined Cipher Machine (CCM) (or Combined Cypher Machine) was a common cipher machine system for securing Allied communications during World War II and, for a few years after, by NATO. The British Typex machine and the US ECM Mark II were both modified so that they were interoperable.

CSP 1600, the replacement stepping unit to adapt the ECM Mark II to CCM
Stepping mechanism in the CSP 1600

History

edit

The British had shown their main cipher machine — Typex — to the US on their entry into the war, but the Americans were reluctant to share their machine, the ECM Mark II. There was a need for secure inter-Allied communications, and so a joint cipher machine adapted from both countries' systems was developed by the US Navy.

The "Combined Cipher Machine" was approved in October 1942, and production began two months later. The requisite adapters, designed by Don Seiler, were all manufactured in the US, as Britain did not have sufficient manufacturing resources at the time. The CCM was initially used on a small scale for naval use from 1 November 1943, becoming operational on all US and UK armed services in April 1944.

The adapter to convert the ECM into the CCM was denoted the ASAM 5 by the US Army (in 1949) and CSP 1600 by the US Navy (the Navy referred to the entire ECM machine with CCM adapter as the CSP 1700). The adapter was a replacement rotor basket, so the ECM could be easily converted for CCM use in the field. A specially converted ECM, termed the CCM Mark II, was also made available to Britain and Canada.

 
Typex Mark 23, pictured, was similar to the Mark 22, but modified for use with the Combined Cypher Machine (CCM).

The CCM programme cost US$6 million.

SIGROD was an implementation of the CCM which, at one point, was proposed as a replacement for the ECM Mark II (Savard and Pekelney, 1999).

TypeX Mark 23 was a later model of the Typex cipher machine family that was adapted for use with the Combined Cipher Machine.

Security

edit

While Allied codebreakers had much success reading the equivalent German machine, the Lorenz cipher, their German counterparts, although performing some initial analysis, had no success with the CCM.

However, there were security problems with the CCM. It was discovered that certain rotor combinations produced a dangerously short period of 338;[citation needed] a three-rotor Enigma machine had a period of 16,900.[1] In addition, the rotor wiring could be recovered from a 1,000-group message that had been sent using the machine.[citation needed]

In 1952, a later version of CCM, "Ajax", was also found to have security problems.[citation needed]

See also

edit
  • KL-7 – a rotor-based cipher machine used by the US in the 1950s and 1960s

References

edit
  1. ^ Hamer, David (January 1997). "Enigma: Actions Involved in the 'Double-Stepping' of the Middle Rotor". Cryptologia. 21 (1): 47–50. doi:10.1080/0161-119791885779. Archived from the original (zip) on 19 July 2011.
  • Ralph Erskine, "The Admiralty and Cipher Machines During the Second World War: Not So Stupid after All", Journal of Intelligence History, 2(2) (Winter 2002).
  • Ralph Erskine, "The Development of Typex", The Enigma Bulletin 2 (1997): pp69–86.
  • John J. G. Savard and Richard S. Pekelney, "The ECM Mark II: Design, History and Cryptology", Cryptologia, Vol 23(3), July 1999, pp211–228.
  • CSP 1100(C), Operating Instructions for ECM Mark 2 (CSP 888/889) and CCM Mark 1 (CSP 1600), May 1944, [1].
  • Crypto-Operating Instructions for ASAM 1, 1949, [2] Archived 2010-12-03 at the Wayback Machine.
edit