Page 128 - The Secret War in the Italian front in WWI (1915-1918)
P. 128

THE SECRET WAR ON THE ITALIAN FRONT IN WWI (1915 – 1918)




              encoding and the corresponding decoding process of dispatches can take place near their origin
              - generally speaking, at the code offices of emitting Headquarters - or at the premises in charge
              of transmitting and receiving the dispatches, namely telegraphic or radiotelegraphic stations or
              telephone operators. In fact, very often during the war, radio stations not only encoded and decoded
              service messages, but performed the same task also for telegrams originated by and sent to various
              units and Headquarters. For both those purposes, they employed the so called Service Ciphers.
              The transmission medium indicated in the picture may be physical (overhead wire or cable) or
              radio, with consequent changes of the transmitter and receiver structure.
              Interception  operations  do not  generally  interfere  with  the  transmitted  signal,  facilitating  the
              detection immunity, although, in some cases, certain signals could indicate enemy activities that
              may have already occurred, be underway or possible. For instance, listening to enemy conversations
              during a telephone communication is a clear sign that the talkers can be intercepted in turn.
              The picture also shows a single distribution channel for both ciphers and keys. The relevance of
              those channels and the reasons for eventually choosing different communication ways for ciphers
              and keys will discussed further ahead.



              requIred characTerIsTIcs of codes and cIPhers
              The two fundamental requirements in designing a cipher or a code are their security and quickness.
              For some applications, security achieved by a robust encryption, result to be a must, while in
              others, the need to ensure quickness and simplicity of encoding and decoding becomes prevalent,
              without neglecting the warranty of the secrecy along a time interval consistent with the dispatches
              contents.
              Therefore, at the beginning of the war, most of the armies was equipped with at least two different
              types of ciphers and codes alternatively used according to the degree of security and to the encoding
              and decoding operation conditions. One category aimed to protect communications of a strategic
              nature between high commands, while the other was suitable for tactical communications with
              and between subordinate units. In the first case, complex codes and relatively bulky manuals were
              exploited, with the purpose of increasing difficulty and time needed for dispatches’ interpretation,
              while forgoing quickness operations to a reasonable extent. On the other hand, lower-level units
              were equipped with simple and handy ciphers which involve a limited time for encoding and
              decoding operations and may be quickly  replaceable  when lost, but structured for delaying
              interpretation of cryptograms by the enemy the time necessary to render obsolete the information
              contained therein.
              In addition to being secure, quick, and simple in decrypting dispatches, military codes and ciphers
              also need to be extremely reliable in terms of precision and accuracy. Those characteristics are
              essential  to  minimize, the  probability of error  in  the  encoding  and  decoding  operations,  thus
              avoiding repetition of messages or, even worse, their misinterpretation.
              It is also obvious that coding operations should not imply an increase in length of the cryptogram
              compared to the plaintext.
              During the war, the number of codes with specific purposes (air force communication, weather
              forecasts, etc.) multiplied for all armies and moreover many units developed systems for their
              internal use. Therefore, in order to grant suitable levels of security, meeting the above-mentioned
              criteria and others specifically related to each application, centres with high-level cryptologic
              capabilities were set up in many armies, in charge of controlling the characteristics of codes and
              ciphers produced by people often without the necessary cryptologic knowledge.




                126
   123   124   125   126   127   128   129   130   131   132   133