Itercept date: 5th November 1944 on a German Air Force frequency.
172OKR 5TLE 250 WRB HOW SKN
GSBGH XBVGJ PPIOW OFTBM USYBT IRQRZ OLYVM JHLKO
WYLZO BYWYM TPBAN IOHZY FJGRQ ZBITM ICEPC AZIMO
CMIGF XOUWC XVQKV IZPZX SOYEL UWWCL FJBQB ZQTEV
KCGNS GVMCT CRNIB CCJWW EDKBG TBORD KXZUA ICXOX
MNPGC ADTWT JCBYJ CEKIY WKCJK PAQBJ UTATU ZNDZZ
YOSZF WYVXV XLEQY QWSUI XZXOH FMXPS LLKIL QKCGT
QNTKZ OUZXW
On the
original intercept were written JPA JZQ (possibly the start and
end Enigma wheel letters for the original decrypt)
and this is thought to be the original German message.
EINSXZUSAMMENFASSUNGDERAUFKLARRUNGSERGEB
NISSIVOMXVIERXELFXVIERVIERXABLESQLOSSLNX
VIERXELFXEINSSIEBENNULLNULLXUHRYYAUFKLAE
RUNGDURQIETTERLKGEUNDPLATZZUSTXNDBEHINDE
RTYYAUFSTRASSENIMRAUMWESTUNCNORDWESTXBEL
GRADXKEINEGROEBSERENBEWEGUNGENOYUEBERKSA
VESAVEYBEI
This is the message to decipher using the Enigma configuration found
by breaking the above cipher text.
CACS5 25/01/03 AES JZR BYS
PXYLL QMUBD HIMWA TXJKC ZTSHU VJUHL SSCGQ JDIBD
DFVWK AAAXU UCFDQ LBARC OTSUB FDANG
Hints:
German Air Force 1944 means wheels 1 to 5 available from
which to select 3.
Because such a long crib is available, the modulo 26 method
is best for finding a menu. See this
for an example.
When you have a good menu Look at Intro
to the High Speed Bombe and make up a text file of data using Wordpad.
Save this into the \anoraks\tools\hsbombe folder and then exit this html page and run
bombe.exe from \anoraks\tools on your hard disk.
When you have achieved a Bombe stop, use a 3 wheel Army/Air Force Enigma
from \anoraks\tools to check that the stop wheel order, wheel letters and steckers
decipher the cipher text into the German text.
When this goes wrong you have either found some more steckers or you
have found the turnover point for the right hand wheel.
To set the turnover point correctly, change the ring setting on the
right hand wheel.
Now you need to get the true ring settings for the left hand and
centre wheels. The clue here is that the deciphering start letters
had been found to be JPA, so you need to change the rings so that
your core postions are where you have found them with J and P in the windows.
The check that you have it right is to turn the wheels to HOW, the
indicator, and decipher SKN the message key, if this gives JPA
you have got it right.
Finally, decipher the second message after finding the wheel start
position by deciphering the message key from the indicator wheels start
position.