Homepage
Crypto
Index
Glossary
Enigma
Hagelin
Fialka
Nema
AT&T
Datotek
Gretag
HELL
ITT
Motorola
Mils
OMI
Philips
Racal
Siemens
STK
Tadiran
Telsy
Teltron
Transvertex
TST
USA
USSR
UK
Yugoslavia
Voice
Hand
OTP
EMU
Mixers
Phones
FILL
Codebooks
Algorithms
Spy radio
Burst encoders
Intercept
Covert
Radio
PC
Telex
People
Agencies
Manufacturers
• • • Donate • • •
Kits
Shop
News
Events
Wanted
Contact
About
Links
   Logo (click for homepage)
The Vernam Cipher
Digital bit-wise XOR

The Vernam Cipher is based on the principle that each plaintext character from a message is 'mixed' with one character from a key stream. If a truely random key stream is used, the result will be a truely 'random' ciphertext which bears no relation to the original plaintext. In that case the cipher is similar to the unbreakable One-Time Pad (OTP). As it was generally used with teleprinters and 5-level punched tape, the system is also known as One-Time Tape or OTT.

If the resulting ciphertext in the above OTT system is truely random, it can safely be sent over the air, without the risk of being deciphered by an eavesdropper. All the recipient has to do is mix the ciphertext with the same OTT to reveal the original plaintext. One only has to guarantee that the OTT is truely random, that there are only two copies of it, that both copies are destroyed immediately after use and that they are only used once. (More about security below.)

Example of a 5-level punched paper tape

The above became possible after the introduction of digital telegraphy, also known as Teletype 1 or Telex. With teletype, each character is substituted by a digital 5-bit code, represented by the 5 holes in a punched paper tape, that was commonly used with telex machines. This is commonly known as ITA2 or Baudot-Murray code. Digital codes can also be represented by a series of '1's and '0's, where 1 represents the presence of a hole and 0 represents the absense of a hole.

The ciphertext is generated by applying the logical XOR operation to the individual bits of plaintext and the key stream. The advantage of using the XOR operation for this, is that it can be undone by carrying out the same operation again. In other words:

plaintext + key = ciphertextciphertext + key = plaintext

In mathematics, the XOR operation is known as modulo-2 addition. In our case, the individual bits of the plaintext are XOR-ed with the individual bits of the key. The resulting bit will only be '1' if the two input bits are different. If they are equal (both 1 or both 0), the result will be '0'.


Take the letter 'A', which is represented by 00011, and add it to the letter 'B', represented by 11001. A bit-wise XOR operation yields 11010 which, in the ITA2 table, is the letter 'G'. In fact, each bit from the key tells us whether or not the corresponding bit from the plaintext should be inverted. By inverting these key-bits again, as shown above, the original character is revealed.
 
  1. Although 'Teletype' is actually a brand name of the Teletype Corporation, it has become a common expression for digital 5-bit telegraphy. The system is also known as Teleprinter, Teletypewriter and Telex.
  2. XOR = Exclusive OR.

Example
The principle of the Vernam Cipher is perhaps easier explained by looking at a message stored on a punched paper tape. In the example below, we want to transmit the word HELLO which is stored on the plain text tape. We also have a pre-recorded key tape, with a series of random characters; in this case the sequence AXHJB. The contents of the plaintext tape are now XOR-ed with the contents of the key tape. The result (KMIVE) is shown here as the ciphertext tape:

Mixing of the plaintext and the key

Now let us see what happens if we repeat this operation on the resulting ciphertext tape with the letters 'KMIVE'. In the illustration below, the ciphertext tape is on the left. It is XOR-ed with a copy of the original key tape (AXHJB), resulting in the original plaintext: 'HELLO'.

Mixing of the ciphertext and the key

This process of applying the XOR-operation to text and key is often called mixing, and the cipher machines that use the Vernam principle, are therefore known as mixers. In the days when teletype systems were in widespread use, technicians were often so experienced that they could read a text directly from a paper tape, simply by looking at the holes and reading the bit patterns.

Mixing of ciphertext and key by holding the two tapes against the light
Mixing of the ciphertext and the key with the human eye

The same was often true for the maintenance engineers of OTT cipher machines. By taking a ciphertext tape, overlaying it with a key tape and then holding it against a bright light source, they were often able to 'read' the plaintext directly. This is illustrated in the above drawing, in which each half-transparent hole should be interpreted as as a binary '1'.
 
Cipher Security
The above procedure is 100% safe if, and only if, the following conditions are all met:
 
  1. There are only two copies of the key-tape,
  2. Both sides of the communications link have the same key-tape,
  3. The key-tape is used only once,
  4. The key-tape is destroyed immediately after use,
  5. The key-tape contains truely random characters,
  6. The equipment is TEMPEST proof,
  7. The key tape was not compromised during transport.
If any of the above criteria is not met, the cipher will become less secure. This means, for example, that in a battlefield, sufficient supply of key-tapes have to be prepaired and distributed well in advance of a transmission. If you are communicating with a station several thousands of kilometers away, it will be very difficult to supply new key-tapes on a regular basis.

In practice, distribution of key tapes always was a big problem, resulting in many violations of the above rules. In some cases a key tape was used more than once, or was inserted the other way around (i.e. starting at the end). There were even cases where an operator would take a piece of key tape and use it as an endless loop, by joining both ends with a piece of cellotape.
 
Pseudo-random versus OTP
Although the OTP was, and still is, the only cipher that is totally secure by design, many systems based on the Vernam Cipher were replaced by cipher systems that used a pseudo-random key generator (PRNG) with a very long cipher period. If both ends of the communication link initialize their pseudo-random key generators identically, the Vernam principle can still be applied.

With this method, the initialization of the pseudo-random generator has become the key or seed, or initialization vector, which is typically much shorter than the message itself. Such a short key produces far less distribution problems, but also results in a reduced security of the cipher. In practice it's a trade-off between the desired secrecy level and the strength of the key.
 
Generating OTT key tapes
It is also very important to consider how key tapes were made. The cipher is only 100% safe, if the key tape contains evenly-spread truely random characters. That would be the case if the tape was filled with white noise from, say, a diode or an empty radio channel.

In practice, however, military organisations often used pseudo-random number generators for the creation of the key tape. The simple fact that such a generator is pseudo-random, makes the cipher less secure. There is always the danger that a potential enemy finds out what algorithm is used to generate the pseudo-random sequence; either by mathematical methods or through espionage. Examples of proper key tape generators are the Philips EROLET and the Mils A-6723.

 More about generating key tapes
 
Mixer machines
Cipher machines, intended for operation with teletype signals, that use the Vernam Cipher, are generally called mixers or mixer machines. In most cases, they are equipped with two paper-tape readers.

 Mixers on this website
  
Click here for an overview of mixer machines on this website

 
Invention
The Vernam Cipher is named after Gilbert Sandford Vernam (1890-1960) who, in 1917, invented the stream cipher and later co-invented the OTP. His patent US1310719 [1] was filed in 1918 and is, according to the NSA, perhaps the most important one in the history of cryptography.

Snapshot from Gilbert Vernam's Patent US1310719. Click to read the complete document.

Over the years, many have claimed the invention of the mixer machine. In 1921, the German manufacturer Siemens filed patent DE371087 in which a nearly identical principle is claimed. The patent drawing even shows two puched paper readers side-by-side. One of Siemens' claims is that it could be used as an online cipher system by driving the telegraph relay directly [2].

Snapshot from German Patent DE371087. Click to read the complete document.

During WWII, the German Army relied on hand ciphers and rotor-based cipher machines, such as the Enigma, the Siemens T-52 Geheimschreiber and the Lorenz SZ-40/42. In 1943, Siemens developed their first online mixer machine based on the above principle. It was named T-43 and less than 50 of them were built. At the end of WWII, the Germans destroyed most of these T-43 machines. The ones that survived were captured by the Americans and later the by British.

In 1952, a similar patent was filed by Bjørn Røhrholdt, a Colonel, engineer, veteran and liason of the Norwegian Army, and Kåre Meisingset of STK in Norway [3]. The collaboration of the two engineers eventually resulted in the release of the ETCRRM, a mixer machine that used valves (tubes) rather than electric relays. The machine was soon adopted by the Americans for communication at the highest level and later also by the newly established NATO. At height of the Cold War, the ETCRRM was used at the heart of the Washington-Moscow Hotline.

In the late 1950s, the Dutch PTT developed its own range of mixer machines, again based on the same principle. As the PTT didn't have sufficient production capacity, the machines were manufactured by Philips Usfa in Eindhoven (Netherlands). The first machine to be released in 1956 was the Ecolex I. Like the ETCRRM, it was valve-based. It was followed in 1960 by the fully transistorized Ecolex II. After that, Philips Usfa took over the development of cipher machines, resulting in 1963 in the Ecolex IV. According to a former company director, Philips had to pay royalties to the principal inventor at the Dutch PTT for many years, for the use of his patents [4].
 
Modern use of the Vernam Cipher
The Vernam Cipher can also be implemented with modern computer technology. Instead of the 5-bit word of a teletype system, computer words consist of 8 or even more bits. The principle, however, remains the same as the XOR-operation is applied to the individual bits of the data word. The use of the XOR-operation is still at the heart of many cryptographic algorithms today.

One warning however: always use a dedicated device for this, and never a common personal computer (PC) with a piece of software. There is no such thing as a secure personal computer.

 More about the One-Time Pad (OTP)
 
Patents
  1. US Patent 1310719, Secret Signalling System
    Filed 13 September 1918.

  2. US Patent 1310719, Ciphering Device
    Filed 23 July 1920.

References
  1. Gilbert S. Vernam, US Patent 1310719
    Filed 13 September 1918.

  2. Siemens und Halske, German Patent DE371087
    Filed 10 July 1921.

  3. Norwegian National Security Authority (NSM), Årsmelding 2008
    NSM Annual Report 2008 (Norwegian). Noen kryptosuksesser. p. 15.

  4. Anonymous former company director of Philips Usfa
    Interview at Crypto Museum. April 2013.

Further information

Any links shown in red are currently unavailable. If you like the information on this website, why not make a donation?
Crypto Museum. Created: Saturday 11 August 2012. Last changed: Thursday, 28 January 2016 - 06:33 CET.
Click for homepage