Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Trench code
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Codes used for secrecy by field armies in World War I}} {{Refimprove|date=February 2016}} '''Trench codes''' (a form of [[cryptography]]) were [[code (cryptography)|code]]s used for secrecy by field armies in [[World War I]].<ref name=friedman1942>*[https://www.nsa.gov/Portals/75/documents/news-features/declassified-documents/friedman-documents/publications/FOLDER_267/41784809082383.pdf American Army Field Codes In the American Expeditionary Forces During The First World War], William Friedman, U.S. War Department, June 1942. Contains many examples in its appendix, including a "Baseball code" (p. 254)</ref><ref>{{Cite web|title = [4.0] Codes & Codebreakers In World War I|url = http://www.vectorsite.net/ttcode_04.html|archive-url = https://web.archive.org/web/20051205014258/http://www.vectorsite.net/ttcode_04.html|url-status = usurped|archive-date = December 5, 2005|website = www.vectorsite.net|accessdate = 2016-01-07}}</ref> Messages by field telephone, radio and carrier pigeons could be intercepted, hence the need for tactical [[World War I cryptography]]. Originally, the most commonly used codes were simple substitution codes, but due to the relative vulnerability of the [[classical cipher]], trench codes came into existence. (Important messages generally used alternative encryption techniques for greater security.) The use of these codes required the distribution of [[codebook]]s to military personnel, which proved to be a security liability since these books could be stolen by enemy forces.<ref>{{Cite web|title = World War I - National intelligence communities, Sabotage, Communications and cryptology|url = http://www.faqs.org/espionage/Vo-Z/World-War-I.html|website = www.faqs.org|accessdate = 2016-01-07}}</ref> By the middle of [[World War I]] the conflict had settled down into a static battle of attrition, with the two sides sitting in huge lines of fixed earthwork fortifications. With armies generally immobile, distributing codebooks and protecting them was easier than it would have been for armies on the move. However, armies were still in danger of trench-raiding parties who would sneak into enemy lines and try to snatch codebooks. When this happened, an alarm could be raised and a code quickly changed. Trench codes were changed on a regular basis in an attempt to prevent code breakers from deciphering messages.<ref name=friedman1942/> ==French Army== The [[French Army in World War I|French Army]] began to develop trench codes in early 1916. They started as [[telephone]] codes, implemented at the request of a [[general]] whose forces had suffered devastating [[Barrage (artillery)|artillery barrages]] due to indiscretions in telephone conversations between his men. The original telephone code featured a small set of two-letter codewords that were spelled out in voice communications. This grew into a three-letter code scheme, soon adopted for wireless, with early one-part code implementations evolving into more secure two-part code implementations. The [[British Army during the First World War|British]] began to adopt trench codes as well. ==German Army== The [[Imperial German Army]] started using trench codes in the spring of 1917, evolving into a book of 4,000 codewords that were changed twice a month, with different codebooks used on different sectors of the front. French codebreakers were extremely competent at cracking [[Encryption|ciphers]] but were somewhat inexperienced at cracking codes, which require a slightly different mindset. It took them time to get to the point where they were able to crack the German codes in a timely fashion. ==U.S. troops== The Americans were relative newcomers to cryptography when they entered the war, but they did have their star players. One was [[Parker Hitt]], b. 1878, who before the war had been an [[Army Signal Corps]] instructor. He was one of the first to try to bring [[United States Army|US Army]] cryptology into the 20th century, publishing an influential short work on the subject in 1915 called the ''Manual for the solution of military ciphers.''<ref>{{cite web | url=https://archive.org/details/manualforsolutio00hittrich | title=Manual for the solution of military ciphers | date=1916 | publisher=Fort Leavenworth, Kan., Press of the Army Service Schools }}</ref> He was assigned to France in an administrative role, but his advice was eagerly sought by colleagues working in operational cryptology. Another Signal Corps officer who would make his mark on cryptology was [[Joseph Mauborgne]], who in 1914, as a [[First Lieutenant|first lieutenant]], had been the first to publish a solution to the [[Playfair cipher]]. When the Americans began moving up to the front in numbers in early 1918, they adopted trench codes<ref name=friedman1942/>{{rp|p. 222}} and became very competent at their construction, with a [[Captain (land)|Captain]] [[Howard R. Barnes]] eventually learning to produce them at a rate that surprised British colleagues. The Americans adopted a series of codes named after rivers, beginning with "Potomac". They learned to print the codebooks on paper that burned easily and degraded quickly after a few weeks, when the codes would presumably be obsolete, while using a typeface that was easy to read under trench conditions. ==Communications discipline== American code makers were often frustrated by the inability or refusal of combat units to use the codesโor worse, to use them properly. Lt. Col. Frank Moorman, reviewing U.S wireless intelligence in 1920. wrote: <blockquote> That will be the real problem for the future, to make the men at the front realize the importance of handling codes carefully and observing "foolish" little details that the code man insists on. They cannot see the need of it and they do not want to do it. They will do anything they can to get out of it. My idea would be to hang a few of the offenders. This would not only get rid of some but would discourage the development of others. It would be a saving of lives to do it. It is a sacrifice of American lives to unnecessarily assist the enemy in the solution of our code.<ref name=friedman1942/> {{rp|p.269}} </blockquote> ==Example== Below are pages from a U.S. Army World War I trench code, an edition designated as "Seneca:"<ref name=friedman1942/>{{rp|pp.185โ188}} <gallery> File:Seneca code cover.agr.jpg File:Seneca code instructions.agr.jpg File:Seneca code encoding.agr.jpg File:Seneca code decoding sample.agr.jpg </gallery> ==References== {{DerivedGoebelCrypto}} {{Reflist}} {{World War I}} {{DEFAULTSORT:Trench Code}} [[Category:History of cryptography]] [[Category:Signals intelligence of World War I]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Cite web
(
edit
)
Template:DerivedGoebelCrypto
(
edit
)
Template:Refimprove
(
edit
)
Template:Reflist
(
edit
)
Template:Rp
(
edit
)
Template:Short description
(
edit
)
Template:World War I
(
edit
)