Page 223 - The Secret War in the Italian front in WWI (1915-1918)
P. 223

CHAPTER TEN




                  W operating within the 4  Army . As usual, C3 contains two tables: a main table with 17
                                           th
                                                  55
                  columns and 11 or 12 lines, each with a different order of ciphering letters as well as an
                  auxiliary table with 5 or 6 lines.
                  However, following the recommendation in Sacco’s report, complete irregularity in
                  positioning inside the table of letters, syllables, parts of words, words, and numbers from 1
                  to 100 is finally adopted. Figl recognizes the lack of regularity and repetitions, in addition to
                  the presence of many homophones: for instance, the word ‘General’ has nine homophones.
                  Consequently, the difficulty and time required to break the cipher increased considerably
                  compared to the previous ones. Moreover, the introduction of the mentioned countermeasures
                  made hard and probably impossible to fully rebuild all the contents of the main table, allowing
                  only to perform an acceptable interpretation of most dispatches .
                                                                                56
                  However, many inaccuracies of the Italian telegraphists in managing the C3 facilitated the
                  work of Figl and his colleagues. For instance, a service dispatch requesting to repeat the
                  transmission of a telegram with another code - as the receiving station did not have the C3
                  - disclosed the very existence and name of the cipher .
                                                                      57
                  The Austrians had to make a similar effort to interpret the C4 cipher adopted in April 1917
                  by radio stations with power equal to or higher than 300 W and consisting of a two-part
                  dictionary, as shown in the next chapter . The time required to break a cipher is crucial
                                                          58
                  because, when it becomes too long, new ciphers could be adopted at intervals of time so
                  frequent that they could cause a continuous blackout of the enemy decryption.
                  Quantifying the amount of time spent by the Austro-Hungarian analysts to break each Italian
                  cipher is not a simple task, also because their names differ from the Italian ones, producing
                  some complications in recognising, on each occasion, the equivalence between the two
                  acronyms . Furthermore, there was often a considerable discrepancy between the dates
                           59
                  of the actual adoption of the various ciphers and the dates contained in Figl and Ronge’s
                  memoirs.
                  Yet an effort was made to round down the time required to break the single service ciphers from
                  the date on which they had come into force, achieving the results shown in picture 10.9 which
                  demonstrates the remarkable increase of that time interval, after the adoption of unordered
                  systems . Austro-Hungarian analysts were quite concerned about the innovations introduced
                          60
                  into the structure of service ciphers as well as about the high frequency of substitutions .
                                                                                                       61



                  55  Chief Inspector of the STM, Military Journal, Lettera con oggetto: Cifrario di Servizio C3 (Letter subject: Service Cipher
                  C3), 3 November 1916, AUSSME, Series B1, 105 S, Vol.89.
                  56  O.J. Horak, Oberst a.D. Andreas Figl, op. cit., p.173 -175.
                  57  ibidem. Obviously, such a repetition is an inexcusable cryptologic error.
                  58  Chief Inspector of the STM, Military Journal, Ordine di servizio 56 del 26marzo 1917, Cifrario di servizio C4 (Service
                  Order no. 56 of 26 March 1917, Service Cipher C4), AUSSME, Series B1, 105 S, Vol. 89.
                  59  As already mentioned in another note, the Austrian name Service Cipher IV corresponds to C2 and the so-called Service
                  Cipher V corresponds to C4. Oddly enough, the C3 cipher was indicated with the correct acronym and was not classified in
                  the usual manner.
                  60  As regards the C3, the date when its structure was finally clear to the Austrian analysts is known (14 January 1917), as
                  declared by Ronge and Figl. The 1  December 1916 was assumedly the date in which it was first used. The C4 was adopted
                                           st
                  on 10 April and, according to Ronge, broken in the early days of the Tenth Battle of the Isonzo, which started on 12 May
                  1917. (M. Ronge, Der Radiohorch, op cit., p.13). The time required for breaking a cipher generally refers to the reconstruction
                  of the structure of the main tables, not of the sub rows comprising, for instance, the terms frequently used by the Army. In
                  fact, immediately after the new cipher was introduced, the percentage of identified terms of that kind was low, which did not
                  prevent more simple dispatches from being understood.
                  61  M. Ronge, Der Radiohorch, op cit., p.9.


                                                                                                     221
   218   219   220   221   222   223   224   225   226   227   228