In the history of cryptography, the ECM Mark II was a cipher machine used by the United States for message encryption from World War II until the 1950s. The machine was also known as the SIGABA or Converter M-134 by the Army, or CSP-888/889 by the Navy, and a modified Navy version was termed the CSP-2900.
Like many machines of the era it used an electromechanical system of rotors in order to encipher messages, but with a number of security improvements over previous designs. No successful cryptanalysis of the machine during its service lifetime is publicly known.
It was clear to US cryptographers well before World War II that the single-stepping mechanical motion of rotor machines (e.g. the Hebern machine) could be exploited by attackers. In the case of the famous Enigma machine, these attacks were supposed to be upset by periodically moving the rotors to random locations, once for each new message. This, however, proved not to be random enough, and the Enigma was being broken with relative ease late in the war.
William Friedman, director of the US Army's Signals Intelligence Service, devised a system to correct for this attack by truly randomizing the motion of the rotors. His modification consisted of a paper tape reader from a teletype machine attached to a small device with metal "feelers" positioned to pass electricity through the holes. When a letter was pressed on the keyboard the signal would be sent through the rotors as it was in the Enigma, producing an encrypted version. In addition, the current would also flow through the paper tape attachment, and any holes in the tape at its current location would cause the corresponding rotor to turn, and then advance the paper tape one position. In comparison, the Enigma rotated its rotors one position with each key press, a much less random movement. The resulting design went into limited production as the M-134, and its message settings included the position of the tape and the settings of a plugboard that indicated which line of holes on the tape controlled which rotors. However, there were problems using fragile paper tapes under field conditions.
Friedman's associate, Frank Rowlett, then came up with a different way to advance the rotors, using another set of rotors. In Rowlett's design, each rotor must be constructed such that between one and four output signals were generated, advancing one or more of the rotors (rotors normally have one output for every input). There was little money for encryption development in the US before the war, so Friedman and Rowlett built a series of "add on" devices called the SIGGOO (or M-229) that were used with the existing M-134s in place of the paper tape reader. These were external boxes containing a three rotor setup in which five of the inputs were live, as if someone had pressed five keys at the same time on an Enigma, and the outputs were "gathered up" into five groups as well — that is all the letters from A to E would be wired together for instance. That way the five signals on the input side would be randomized through the rotors, and come out the far side with power in one of five lines. Now the movement of the rotors could be controlled with a day code, and the paper tape was eliminated. They referred to the combination of machines as the M-134-C.
In 1935 they showed their work to a US Navy cryptographer in OP-20-G, Joseph Wenger. He found little interest for it in the navy until early 1937, when he showed it to Commander Laurance Safford, Friedman's counterpart in the Office of Naval Intelligence. He immediately saw the potential of the machine, and he and Commander Seiler then added a number of features to make the machine easier to build, resulting in the Electric Code Machine Mark II (or ECM Mark II), which the navy then produced as the CSP-889 (or 888).
Oddly, the army was unaware of either the changes or the mass production of the system, but were "let in" on the secret in early 1940. In 1941 the army and navy joined in a joint cryptographic system, based on the machine. The army then started using it as the SIGABA.
On the 26th of June 1942, the army and navy agreed not to allow SIGABA machines to be placed in foreign territory except where armed American personnel were able to protect the machine.
The SIGABA would only be made available to Allied personnel if an American liaison officer prevented those personnel from direct access to the machine or its operation.
SIGABA was similar to the Enigma in basic theory, in that it used a series of rotors to encipher every character of the plaintext into a different character of ciphertext. Unlike Enigma's three rotors however, the SIGABA included fifteen, and did not use a reflecting rotor.
The SIGABA had three banks of five rotors each; the action of two of the banks controlled the stepping of the third.
- The main bank of five rotors was termed the cipher rotors, and each had 26 contacts. This acted similarly to other rotor machines, such as the Enigma; when a plaintext letter was input, a signal would enter one side of the bank and exit the other, denoting the ciphertext letter.
- The second bank of five rotors was termed the control rotors. These were also 26 contact-rotors. The control rotors received four signals at each step. After passing through the control rotors, the outputs were divided into ten groups of various sizes, ranging from 1–6 wires. Each group corresponded to an input wire for the next bank of rotors.
- The third bank of rotors was called the index rotors. These rotors were smaller with only ten contacts, and did not step during the encryption. After travelling though the index rotors, one to four of five output lines would have power. These then turned the cypher rotors.
The SIGABA advanced one or more of its main rotors in a complex, pseudorandom fashion. This meant that attacks which could break other rotor machines with more simple stepping (for example, Enigma) were made much more complex. Even with the plaintext in hand, there are so many potential inputs to the encryption that it is difficult to work out the settings.
On the downside, the SIGABA was also large, heavy, expensive, difficult to operate, mechanically complex and fragile. It was nowhere near as practical a device as the Enigma, which was smaller and lighter than the radios with which it was used. It found widespread use in the radio rooms of the US Navy's ships, but as a result of these practical problems the SIGABA simply couldn't be used in the field, and, in most theatres other systems were used instead, especially for tactical communications. The most famous may be the Navajo code talkers who provided tactical field communications in parts of the Pacific Theater beginning at Guadalcanal. In other theatres, less secure, but smaller, lighter, and tougher machines were used, such as the M-209. SIGABA, impressive as it was, was overkill for tactical communications. This said, new speculative evidence emerged more recently that the M-209 code was broken by Reinold Weber in WW2 &
Combined cipher machine
- Sterling, Christopher H (2008). Military Communications: From Ancient Times to the 21st Century. USA: ABC-CLIO. p. 565. ISBN 9781851097326.
- Mercury — British machine which also used rotors to control other rotors
- SIGCUM — teleprinter encryption system which used SIGABA-style rotors
- Mark Stamp, Wing On Chan, "SIGABA: Cryptanalysis of the Full Keyspace", Cryptologia v 31, July 2007, pp 201–2222
- Rowlett wrote a book about SIGABA (Aegean Press, Laguna Hills, California).
- Michael Lee, "Cryptanalysis of the Sigaba", Masters Thesis, University of California, Santa Barbara, June 2003 (PDF) (PS).
- John J. G. Savard and Richard S. Pekelney, "The ECM Mark II: Design, History and Cryptology", Cryptologia, Vol 23(3), July 1999, pp211–228.
- Crypto-Operating Instructions for ASAM 1, 1949, .
- CSP 1100(C), Operating Instructions for ECM Mark 2 (CSP 888/889) and CCM Mark 1 (CSP 1600), May 1944, .
- Electronic Cipher Machine (ECM) Mark II by Rich Pekelney
- SIGABA simulator for Windows
- Code Book Tool for the Sigaba Simulator (Windows 2000-XP)
- The ECM Mark II, also known as SIGABA, M-134-C, and CSP-889 — by John Savard
- Cryptanalysis of SIGABA, Michael Lee, University of California Santa Barbara Masters Thesis, 2003
- The SIGABA ECM Cipher Machine - A Beautiful Idea