DOjcID' 401 972 J GJ iJUVlD iJ11 lSlBl JWVU U I lB r wv S W S w StDfi S f WtDW l1aJmfi 1 I ----JV I LETTERS TO THE EDITOR o o o o o o o o o o o oo o o D I I I '0 o Bar r e r D o o i 1 am 57 o 3 Willi I l 4 IJ1 ' r J NEWS OF THE CRYPTO-LINGUISTIC ASSOCIATIO A MATTER OF STYLE o o o o o o o o o o o o NEWS OF THE COMMUNICATIONS ANALYSIS ASSOCIATION oo oooooooo oooo SOVIET COMINT AND THE CIVIL WAR o ooo o Z WHAT'S IN A NON-NAME 1 LETTERS TO THE EDITOR D Buckley M Pattie HUMAN RESOURCE DEVELOPMENT PANEL oooooo oo ooo oo oo o ooo o NSA-CROSTIC NO 17 o o o o ooooooooooo A J S o o o o o o o I HIS B6etJMEN e6N AiNS e6BEW6RB l'fIA ERIAL 10 ll 12 16 17 19 20 81wailed lsI BIRHS J SIISS8 ElIi8h 8ilU 123 2 Eye p _ CUi EO neu 'I 2 Bee ' II Hoti8eatio4 lsI tile 8 iri tor Declassified and Approved for Release by NSA on '10-'1 2- 20'1 2 pursuant to E O '135 26 vl DR Case # 54778 OOClO 4019726 T6P SEeH'f 'l' Published Monthly by PI Techniques and Standards for the Personnel of Operations YOLo Y NO 9 SEPTEMBER 1978 WILLIAM LUTWINIAK PUBLISHER BOARD OF EDITORS Editor in Chief o o o o Arthur J Salemme 52365 Collection o o o o oo o 1 8955Sr 'p L -------II s Language o ooooo o oo Machine support oo o o o -----1 816lS Mathematics o o o oo 1 85185 J L I Special Research ooooo oooo Yera R Filby 71195 Traffic Analysis ooo o ooo ooooo L - --I1 3573S Production Manager o ooo ooo oooo Harry Goff 52365 For individual subscriptions send name and organizational designator to CRYPTOLOG PI TOP 8BCRBT 1 5303S 86-36 DOCID 40T9726 SHCRB'I' SPOKE PROGRESS-1 SOVIET SPACE STATION REFUELING John Cahill A433 w ith the creation of the Salyut-8 space station the Soviets have achieved a significant improvement in the design and function of a space vehicle's propulsion system There are two types of engines on the Salyut station huge powerful thrusters f or _r ising the s_tation to a higher orbit and for making orbital corrections and smaller engines for station orientation on the earth or sun On all previous stations and on all Soyua spacecraft the power for each of these engine types was different The large thrUsters rked on a dual-component fuel and had their own separate tanks for fuel and oxidizer The small thrusters on the other hand used a $ingle-component fuel and likewise had their qwn separate storage tanks The Salyut-6 station however has a single dual-component fuel for both its large and small thrusters and fuel tanks for these engines I ThiS ne consolidated i dw c tanker spacecraft and thustlle Salyut space station can remain in orbit for 16nge r nd l onger pedod of H Sovi t co monaut have The SoIJUA-26 crew COmmander Lieutenant Colonel Yurij Romanenko and Flight Engineer Georgij Grechko had successfully docked at the aft end of the orbiting Salyut-6 space station on 11 December 1977 After transfer into the station the cosmonauts checked out and activated the pn equipment Several days later Fl t' 8lneor Grechko exited the tation thr0lllh' tM trlmsfer hatch at the forward end of the_ tlltt i in a special space suit to f j carry out a thorough inspection of the docking mechanism which was thought to be damaged by the Soyuz-25 crew Soyuz-25 cosmonauts Commander Lieutenant Colonel' Vladimir Kovalenok and Flight Engineer Valerij Ryumin had maneuvering difficulties during the approach and docking phase of their flight and on 10 October 1977 had to abort their mission after three unsuccessful attempts for a hard dock onto the station The Soyuz-28 cosmonauts had docked their spacecraft at the station's second or aft docking port -- a totally new concept in Soviet space station design All previous stations had only one docking port at the forward end of the station After about 30 days on board the station the Soyuz-26 crew was visited by the crew of Soyuz-27 under the command of Lieutenant Colonel Vladimir Dzhanibekov and Flight EngineerOleg Makarov The Soyuz-27 spacecraft successfully docked at the forward docking port which it turned out had not been damaged by the Soyuz-25 crew's abortive docking attempts and now for the first time a Salyut space station had spacecraft docked at both ends and was manned sirnultaneousltbytwo separate crews After five days together the$qyuz-27 crew departed the station and returned to earth not in their own Soyuz-27 spacecraft but in the Soyuz-26 craft i yetanothe first f r i etcosmo The now vacant aft docking portwassoonosSupied by a modified Soyuz-type spacecraft called Progress-l This new vehicle brought needed EO 1 4 Ie f or t h e stat on ' s crew an d a 1so t anS k' P'L 86-36 supp I es loaded with fuel and oxidizer to re leni Sal ut' s own fuel tanks This ania'l4Hp1' entB for the most part a compi UZtiUm 'O 't llfoifftation from open-sourc e Soviet spact t't The ov ron class' -f' -catian af'thi j Qt1 iqJji ' ver ' -s C 1 St'B1fEI'L_ - ' - - '- - ' 7 77 - -Septellber 78 CRYPTOLOG Page I c 'v Mi tJt lt'tf fihi ik t 8BCH'I' SPOKB C '''- _ ' _ can carry up to 1 300 kilograms __ l DOCID 4019726 SHEURRHI' SPOKE in front with two lights behind it on the of dry cargo includhg water in containers and up to one ton of fuel components and compressed sides When the approach and docking is going normally the lights appe rt6 be in a gas Its net load is around 33 percent of the straight line If there aI eal1Y contingencies gross weight of the spacecraft during this procedure the crew can stop the There are three compartments in Prog 'e88-1 a cargo compartment a compartment housing the -docking process Prog ' S-lsuccessfullydocked withthe station-refueling tanks and an instrumentstat on on 22 January 1978 but the actual fuel assembly comoartment The cargo co I r- ---- ---- - ' - --- - ---- - - _- - J'lt transfer did not occur until 2 Febrl lary L lof a Soyuz and is 6 6 cubic meters in -- ---- Within the docking mechanism of' the Progre88 size Special racks wtlre created to house the'v ehicle as in all Soyuz-type spacecraft various cargo needed for resupplying the there are both electrical and hydraulic lines station's crew Cargo includes sets of Clothing which automatically connect with thE' T nn film cassettes magnetic tapes new medical and I after dockim I scientific-research instruments and such large and heavy items as new air regenerators The compartment itself is pressurized with a usual P L 86-36 EO 1 4 c 0 atmospheric of mercury and a ' -------------------------------- i ll temperature pressure of 30 to of 30760 C mm On the outside of this compartment are the main fuel lines which are fed into the docking assembly These fuel lines are similar to those on Soyuz spacecraft but they have in addition two hermetically sealed connectors which enable the pumping over of fuel from the refueling tanks in the tanker spacecraft's refueling compartment after docking with the station th1S compartment does not need lifesupport systems powerful radiation and heat shielding or a parachute system since no part of the Prog 'ess-l was to be retuTned to the earth The final compartment -- the instrumentassembly compartment -- has three sections a nonpressurized section where part of the mooring and orientation engine system and the fuel tanks for this system are located a pr ssuri z ed instrument section and an assemblies section with the approach and correction propulsion system found on all Soyuz-type spacecraft L -_ The Prog 'es8-1 cargo spacecraft is launched by the same boosters used to launch all Soyuz spacecraft After orbital insertion radar antennas of the approach and docking system installed on the cdrgo and instrument-assembly compartments are deployed The Flight Control Center monitors the' spacecraft's orientation via two television cameras installed on the outer hull of the cargo compartment One of the cameras shows the space station during the approach maneuver so that the ground can -follow the approach and docking procedures if necessary The Salyut station's crew can view the approaching cargo spacecraft via the station's stern-mounted television camera Special lights on Prog 'es8-1 aid the crew in determining the spacecraft's position relativeto the station on both the day and night side of the planet These lights are uniquely arranged on retractable rods mounted on the outside of the cargo compartment One light is September 78 CRYPTQLOG Page 2 SEeR SPOKE DOCID 4019726 SESRE'f SPOKE I valves the fuel is moving to the engines There are numerous buttons on the control panel for sending the required commands to move the fuel After the ogre8s-1 docked with the SaZyut-6 station the two fueling lines -- one for oxidizer the other for fuel -- were connected to the station the hermetic seal of the lines was checked for leaks and the pressure in the station's tanks was lowered First the fuel and then the oxidizer was pumped from the refueling compartment into the station's tanks After the refueling operation was completed the fueling lines were purged and vacuum-evaporated with the use of the compressed nitrogen gas Besides fuel replenishment the station's atmosphere was renewed with air from tanks in og 'ess' s refueling compartment This op eration was necessary to replenish air lost during the earlier EVA extra-vehicular activitYJ _and because some ilir is lost during various garbagedump operations performed by the crew through a special airlock ogre88-1 was also used as the first space tug Its own propulsion engines were switched on and the spacecraft was used to boost the SaZyut-6 station into a higher orbit One final experiment was conducted with before it was allowed to burn up in the earth's atmosphere After undocking a test check of the spacecraft's own reserve automatic search and approach system was made The test was successful and on 8 February 1978 Frogre88-1 disintegrated as it reentered the earth's atmosphere og 'e88-1 LETTERS TO THE EDITOR a P L 86-36 To the Editor CRYPTOLOG To the Editor CRYPTOLOG The following letter was prompted by Eugene Ienj yed your overlon p L 8 is - 3-6lmember A Gilbertson's letter to the editor CRYPTOLOG - SPEL MAN CRYPTOLOG Jul EO 1 4 c D c n- June 1978 with regard to I 1 cern ng the long-defunct h6 U 'J ' vJ - t Wh1Ch earlier article What Ever Happened to COPES had the twin aims of traininll neonlel CRYPTOLOG January 1978 Now that COPES has been with us for a number of years I shall make again an observation r-- - ---- --------------_ J r The first half of the task is no less preposterous today than which originally was a theoretical warning it was when proposed 20 years ago The second properly discounted since in many people's half however is on the surface at least minds theoretical is synonymous with most a reasonable one which was nevertheless likely wrong but which is now capable of ultimately abandoned as being beyond th capaobservation and verification bilities of the persons involved This resolu- _ I accept the fact that COPES has had an influence on distribution of effort and resources tion of the problem you might be interested to know was not limited to the NSA task group How sure are we that it has provided a reasonIn the article from the 1957 Soviet encyably objective base for such allocation deciclopedia quoted in your article Stenotypy is sions My concern stems from admissions made treated as a major office-skills advance and privately and off the record that when COPES objective satisfaction is low we change the ob- several advantages over ordinary stenography jectives so that the rate of- satisfaction looks are cited shorter training time absence of distortion at high transcription speeds rebetter and when things look too good we add duced fatigue for the transcriber etc objectives to preclude a cut in resources Altogether an upbeat view This should not be surprising it is a natural response and could have been anticipated Contrast this with the parallel piece in the theoretically as the way people react If 1976 edition of the same encyclopedia In a this is indeed taking place consciously or much briefer article Stenotypy is succinctly unconsciously the rate of objective satisfacdescribed then evaluated with this final tion is more a measure of how well we have comment adjusted our objectives to some acceptable norm Stenographic machines have not than a basis for collection resource allocation been widely accepted Because of the decisions development of magnetic sound-recording I am not a strong opponent of COPES It technology in particular the Dictadoes give us a much better understanding of what phone their production was dropped collection is doing that we had in pre-COPES in the 1950s days We must however be very careful as to So cheer up You're in good company how we use such data David H Williams Pl6 Donald Y Barrer PI 6 668 September 78 CRYPTOLOG Page 3 St1CRt1T SPOKE WANgL l '1A 6QIIHR' 61WUiHS 8UeY DOCID 4019726 8BCRBT P L 86-36 NONSECRET ENCRYPTI ON Public Key Cryptqsystems e stand today on the brink of a revo lution in cryptography 50 begins a paper entitled New Directions in Cryptography which appeared in t e November 1976 issue of the Tl'anBactions on Information Theory journal published by the Institute of Electrical and Electronics EnglJ eers IEEE We shall examine the developments to which the authors of that paper refer discuss the potential for cryptographic revolution and mention some effects which may be felt at N5A W venient way to calculate crl l '2 unless he can for example determine t'l as the logarithin of y This novel method called nonsecret encryption by Ellis received scant attention in the intelligence community because there was no recognized application for such a system One advantage of this system is that there is no need for key distribution on the other hand there are several problems of implementation First there is the matter of selection of the randomly Chosen integers maybe certain choices are weaker than others Certainly the choice t' 1 would be totally insecure and one should consider the possibility tha the product t' t'2 will be a weak choice even though t'l and t'2 are not weak Then there is the problem of errors in channel transmission To ensure that the enemy cannot solve our system by brute force the finite field must be very large allowing a large range of inequivalent choices for t'l and t'2 and so the bit streams YI and Y2 are very long For successful communication both Y and Y2 must be received with complete accuracy At the very least this may require some error-correcting capability and the capacity of the channel must be considered as well as the capability of the Computer at each end of the link The fact that a great deal of computation must be performed will also limit the bit rate at which transmissian can be effected Finally there is a seriaus problem with authentication since the onemy knows our system he will be able to estabUsh COlllllUJ1ications with us j1 -st be sending some 'a era unless we can check on his identity We in the intelligence community have become accustomed to holding a monopoly on useful advanceclcryptologic knowledge so it is with surprise and apprehension that we have witnessed in recent years an iD creas ng interest n cryptologL ' on the part of American academicians With the advont of digital technology in the storage and transaission o vast quantities of data it was inevitable that security questions would arise Eniineers mathematicians and computer scientists see in this area a relatively uncharted As early as 1969 mathematicians at GCHQ were considering the possibility of secure encipherment without the necessity of a key being held commonly between sender and recipient To do this the mathematical properties of finite fields were to be employed It turns out that in finite fields which are much the same as the real numbers but which are better adapted for computer use and for key production it is easy given a and t' to calculate the expression However the problem of recovering t' when given a and is extremely difficult to solve One's int ition suggests that as in the reals an approximate solution might be satisfactory but the initeness of the field precludes this We see 1iere a pair of inverse tasks one of which exponentiation is easily performed while the other solving the equation Y a t' for t' means taking the logarithm of Y is very difficult The idea first announced by J H Ellis in a GCHQ paper is to create a system in which the cryptographer may use only easy algorithms while the analyst is obliged to solve a hard problem Suppose that we wish to send a message to a friend but we have nomutual cryptovariable Suppose further that we have a small computer capable of performing fin ite held exponentia ' tion We may randomly select an integer t' and calculate a t' for some a which is fixed and known both to our ally and to the enemy We transmit YI a t' as a string of bits across an insecure channel so that both our ally and the enemy may be assumed to be in possession of Yl' The only secret we have is t'l and even our ally doesn't know t'l' At the other end our friend receives our bit stream and prepares himself for communication by choosing randomly another integer %2' calculating Y2 2 and transmitting the corresponding bit s ream to us We assume that the enemy also acquires knowledge o Y2' Now e are ready o determine the key wh ch w ll be used for enc - pherment we calculate y2 t'1 a t'I t'2 and u e th corresponding bit stream as key Our fr end s able to calculate the same key usingoYI t'2 But the enemy who knows a YI and Y2' has no con- IL cr cr cr I Charles Sullivan p i 86-36 EO 1 4 c - ----' September 78 o CRYPTOLOG o Page 4 8BCR T IIJIc l4BLfl 'lIA eeMllfI' ell 1d41UlL3 614L'1 DOCID 4019725 i SI3CRI3'f I field in which new and important results may be available without the obligation to assimilate enormous bodies of information Efforts to find and analyze better algorithms could easily lead to rapid advancement and recognition for academic-based researchers One of the first opportunities for scholarship arose with the development of the Data Encryption Standard DES Several papers have been written both by university researchers and by Bell Laboratories personnel which are critical of the algorithm or of the size of the cryptovariable Th authors express their anxiety about the classified principles underlyirtg some of the design While the published analyses are not of the quality one would expect to find from experienced crypto-knowledgeable analysts the intelligence and perception of the authors is easily recognized Foremost among the investigators is Martin Hellman a bright young associate professor of electrical engineering at Stanford University Widely known among information theorists for his scholarship Hellman has published several recent articles on cryptology With his student Whit field Diffie he published An Exhaustive Cryptanalysis of the NBS National Bureau of Standdards Data Encryption Standard in Computer magazine extending an earlier Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard which they and five others published at Stanford It was the Hellman-Diffie duo which in New Directions in C yptography introduced to the public the notion of a trapdoor function Hellman's ability to attract press coverage has caused their ideas to receive considerable attention Last year an episode of a popular television series featured a code expert who spoke knowingly of trapdoor functions given by Hellman and Diffie to the concept which we know as nonsecret encryption is envisioned as a convenient communication scheme for a large loose network Potential users would be financial and industrial organizations We may think of a nationwide net of banks and brokerage houses any pair of which may at some time have a desire to communicate securely Each user K will have a pair of algorithms EI for encryption DI for decryption such that for any message m DIElm m Furthermore DI and EI are algorithms which may be accomplished quickly but it must be that knowledge of one of the algorithms does not allow the other to be deduced Such a system is really a set of trapdoor one-way functions in the sense that it is computationally infeasible to find DI given EI' The algorithms E I are made public Thus anyone desiring to tra lsmi t a message to K may look up the enciphering algorithm and send the message Elm Only user K will be able to decrypt the message because only user K is in possession of the algorithm VI' Immediately one is forced to do something about authentication since the receiver has no way to verify the identity of the transmitter of a message Fortunately there is a neat solution Suppose that for all K the algorithms DI and E K also enjoy the property that EIElm m for all rho Then if A desires to send a message m to B he first applies the secret decryption algorithm DA followed by the public algorithm E When B receives the message E lJAm he first applies his secret decryption algorithm D _followed by the public algorithm E A The result is EAD E DArn Since D E x for all x this s mplifies to EAJAm - m so that the intended recipient can indeed recover the message Only he can decipher the transmission Eo TJAm for only he has the secret algorithm V Additionally when he has recovered m he knows that it was indeed A who sent the message for only A has the secret algori thm lJ A which must have been used unless by chance some other algorithm could convert m to DAm this can occur but with small probability one would expect The interest of Hellman and Diffie in criticizing DES is clear If they were able to destroy the confidence of industry in the DES algorithm then perhaps their own ideas would gain recognition as an effective security scheme with a resulting financial windfall Already Hellman Diffie and'another Stanford graduate student Ralph Merkle have applied for a patent on a device based upon their publication Taking adFor this attractive and simple concept to vantage of the reluctance of-NBS and NSA to succeed we shall require the existence of a discuss the strengths of DES and the weaknesses suitable family of trapdoor functions Several of the new approach articles have appeared which candidates have been proferred and an intensive strongly suggest that the Hellman-Diffie algosearch is underway to find others The first rithms are unbreakable for all practical purto attract national attention was embodied in poses and that the DES has fatal flaws which an MIT paper On Digital Signatures and Publicallow a successful attack to be mounted for Key Cryptosystems by Ron Rivest Adi Shamir between $20 and $5000 per message with an and Len Adleman which appeared in April 1977 elapsed time of anywhere from six minutes to 12 In Martin Gardner's popular Mathematical Games hours One of the more sensational of the arti column in Scientific American August 1977 cles alleged that what is beyond dispute is the appeared a challenge cipher based on the MIT fact that any system employing the same key both paper A prize of $100 has been offered to the for encoding and decoding is just too awkward for first solver of the cipher The family of trapeveryday use Robert C Cowen in TechnoZogy door functions is based on the difficulty of Review December 1977 factoring large numbers and will be detailed below A public key cryptosystem this is the name September 78 CRYPTOLOG SiCRET Page 5 IWIBbE nA eSMIII'I' elWmEbS Sf bY DOCID 4019726 SECRB'f On the heels of these advances the IEEE scheduled an International symposium on information theory to include two sessions on' cryptography at Cornell University in October 1977 Interest was heightened when the organizers of the symposium received a letter from an NSA employee which suggested that the symposium might be in violation of laws This letter and the responses of Hellman and others were publicized in the widely read Saienae magazine The sessions on cryptology were well attended especially the presentations of Hellman and Rivest Three NSA employees attended these sessions Two Stanford graduate students Merkle and Stephen Pohlig did not present their work for fear of legal action At one of these sessions Hellman remarked that he and his associates would like to analyze and publish the analysis of some of the classical cryptographic systems He specifically mentioned rotor devices and Hagelin Both Hellman and Rivest have presented their ideas at meetings of scholars throughout the country NSA employees have attended a talk by Hellman at Catholic University and a presentation by Rivest at the Applied Physics Laboratory We should expect that considerable research effort will be devoted to cryptology in the next few years Computational complexity is the area of mathematics which is most intimately involved in the search for trapdoor algorithms It is an area which has blossomed with the development of high-speed computing equipment The difficulty of a problem can be measured by the time required to solve the problem In general this will depend upon some parameter associated with the problem For example we can consider the time required to invert a square matrix of size n where n is a positive integer Naturally the time required will increase as n increases but how fast does it increase We say informally that a problem is in class P if there exists an algorithm to solve the problem such that the maximum time required to execute the algorithm is a polynomial function of the parameter A precise statement would involve the notion of a Turing machine which we choose not to introduce A problem is in class NP nondeterministic polynomial if an algorithm exists with time which is a polynomial function of the parameter to solve the problem using a computer with an unlimited degree of parallelism The class NP includes the class P but it is not known if there is indeed a problem in class NP which is not in class P There is a large class of problems known as NP-complete which share the property that if anyone of them is in class P then NP P It would be very surprising i f the equality NP P could be shown At the moment the problems which are NP-complete are regarded as sufficiently difficult to resist solution if the parameter is chosen large enough The goal of the theoretical cryptologist then is to create a system so strong that to break the system the enemy analyst must solve a problem which is NP-complete It must be realized that this is not an assurance of a secure system There is until a proof that NP I P is found a possibility that a fast algorithm exists to solve an NP-problem Even if this is not the case recall that the definition of class P was a worst case definition and it is conceivable that although no fast algorithm exists to solve the problem for all cryptovariables perhaps a fast algorithm can be found which often or sometimes solves the problem For a curious example of the distinction between class P and class NP consider the problem of assigning compatible roommates given a group of people together with their lists of satisfactory partners If two roommates are to be assigned to each room a clever algorithm given by Jack Edmonds of the University of Waterloo will accomplish the pairing in polynomial time but the same task when three are to share each room is known to be NP-complete Suppose that a traveling salesman who must visit n cities wishes to schedule his itinerary so as to minimize the mileage driven This problem is NP-complete but there exists a fast algorithm to find a good but not always optimal route One NP-complete problem which has been suggested in connection with cryptographic schemes is known in some circles as the knapsack problem A pertinent paper is by Merkle and Hellman Hiding Information and Receipts in Trap Door Knapsacks Suppose that you publish a list of say 200 very large integers al' az o azoo and accept communications as follows I write out my message as a streams of l's and O's and break it up into groups of ZOO I encipher each block by adding together the ai which correspond to l's in my message Upon receipt of my message you immediately decipher the text but the enemy cryPtanalyst who intercepts the message is unable to decipher it How is this possible It seems that both you and the enemy have the same information the sum of certain ories of a known set of numbers The secret behind this method of encryption lies in the choice of the ZOO numbers ai' Suppose that another set of ZOO positive integers bihas the property that for each i 1 the number b i is bigger than the sum b l bz b3 b i - l of all the preceding numbers It would be very easy to decipher a message sent using these numbers to encipher if the message is larger than b ZOO then the ZOOth bit of the message as 1 otherwise OJ if a 1 subtract b200 from the message and repeat with b 199 etc In this case no security is afforded by the'encryption procedure The principle behind the knapsack scheme is for you to transform a September 78 CRYPTOLOG Page 6 SECRET - - ---- - - ---- IWIBf5E 'II 6QUHR' 6MMlJ liJ i g IJ DOCID 4019126 S8CR8'f simple case into a difficult case in such a way that only you know how to reconvert the difficult case into the simple case which readily yields a solution As an example suppose you select the five integers 171 196 457 1191 and 2410 These numbers satisfy the criterion for simplicity Now you choose as your cryptovariable the numbers 3950 and 8443 in a reallife example the numbers would be much longer We require that the two numbers be relatively pr1me and that the second be at least twice as arge as the largest of the previously chosen 1ntegers It is easy to find a number x such that 95 1 mod 8443 x 2550 Multiplying our f1ve 1ntegers by 2550 and reducing modulo 8443 we obtain the ai 5457 1663 216 6013 and 7439 If I wish to transmit the message 11001 I just add 5457 1663 7439 14559 and send that number Upon receipt you multiply 14559 by 3950 and reduce mod 8443 to get 2777 which is easily deciphered in your simple scheme The enemy analyst not knowing the cryptovariables faces the task of exhausting over all 2200 possibilities or is there a better approach The proposed trapdoor function which has received the most attention is the MIT scheme which was featured in the Scientific American rticle and upon which the challenge cipher 1S based Two positive integers sand rare published with r large To encrypt a digital m ssage it must first be broken into segments w1th each segment having fewer digits than r To encipher a segment x the number xS mod r is computed this is eas ly done using current technology To decipher only one crptovariable is needed an integer t such that x S x mod r for every x For example if r is prime the condition is that at should be 1 modulo r-l and t is easily determined if a has no factors in common with r-l Because of the ease of determining t in this case it is not good to allow r to be a prime It is also weak to select an r with small factors The most promising choice seems to be r pq the product of two large primes which are ot close together and which enjoy certain other int rrelationships It is easy to find pairs of appropriate primes If it should happen that x has a factor in common with r the decryption algorithm may need modification The strength of the method rests on the inability of the enemy cryptanalyst to factor r into its factors p and q Algorithms to factor integers have been developed recently which are substantially faster than those known before this decade but the factoring of integers of say 100 digits is still well beyond the capability of current computers and known algorithms It seems that a major and quite unexpected breakthrough would be required to factor a typical r of 100 digits in a reasonable time If this is the best attack on the MIT algorithm then it may be regarded as secure under present conditions It is not clear that this is the P L 86 36 EO l 4 c case If the primes p and q are poorly chosen special approaches which would not do in general may succeed Itis not the case that the time taken to factor is a function solely of the size of the factors There are a great many problems still to be solved before public key cryptosystems find widespread usage We have already mentioned the low rate of transmission and the need for error-correction capabilities Let us consider an application for which the scheme was intended a large-scale financial network The ability of any member of the net to communicate securely with any other is very difficult to realize using conventional cryptologic equipment but it seems to be a requirement that each user have a computer with the capability of performing the necessary arithmetic operations and with the ability to acquire the public encryption data readily reliability may be a problem A central facility may be necessary for the storage of the data this would introduce additional security considerations Some provision must be made for the possibility of a compromised decryption algorithm and the ensuing loss of authentication for that user It is conceivable that a user might intentionally allow his private decryption algorithm to become known so that he may subsequently disavow an unfortunate purchase or sale to which he had agreed If electronic means are used for transactions how can the recipient be prevented from making unauthorized copies of say stock certificates For the authentication scheme which is used to guarantee signatures to be wholly satisfactory legal precedents must be established and penalties specified When two algorithms are to be applied consecutively it may well happen that two different moduli are involved The message is blocked to allow the application of the first algorithm but it may happen that the integers which result are larger than the second modulus Solutions to this problem have been proposed but are not entirely satisfactory perhaps others will be forthcoming Probably the September 78 CRYPTOLOG Page 7 88CR8'f IWIBH VIA 6SIIHFF 6IWINEbS sm DOCID 4019726 ' 6 P L 36 While public key cryptosystems are not likelyp L 86- 3 6 to have a significant impact on American mili-D tary communications in the foreseeable future bV 1 4 c we must stay abreast of developments in the area If implementation can be effected in inexpensive and reliable components nonsecret encryption may provide secure communication in carefully chosen situations I One application for which these algorithms seem well suited is the verification of identification or credit card data The capture of one of the decrypting boxes by criminals would not allow the preparation of bogus cards with correctly coded data as would have been the case if the decryption algorithm were identical with the encryption algorithm ES EE8 P L 86-36 EO 1 4 c NEWS OF THE CRYPTO-LINGUISTIC ASSOCIATION P L Maiy rta 1973 - Frances Blank and Dr IrWin n 18 May 1978 a large number of CLA 1974 - Norman Wild ' members and their guests attended the J 1975 -I annual banquet which was held this year 1976 - John D Murphy at the Sheraton-Silver Spring Motor Inn CLA 1977 -L I o l President Donald G Lasley introduced those seated on the dais They included the CLA of1978 CLA Essay Contest ficers and their wives Joseph P Burke Comman1 laward ed the following prizes to dant National Cryptologic School past CLA winners in this year's Annual CLA E$say Context President Dr James R Nielson Mrs Annette Jaffe and the evening's guest speaker Dr 1st Prize $100 -I The Iron Robert T Meyer Dr Meyer a scholar of interThumb CRYPTOLOG national renown in the field of Celtic studies March 1978 is currently Professor of Celtic and Comparative 2nd Prize $50 - Jacob Gurin Words and Philology at Catholic University as well as the Intelligence Value Consultant on Celtic for the Library of Congress of Conversations to be He gave an informative and witty talk on Linpublished in NSA Teahniguistic Exploration in West Kerry Ireland aa JOW'11a and NSA O r CryptQ gia 3rd Prize $25 1978 Jaffe Award The Crypto-Linguistic Association's higgest recognition of exceptional achievements in the field of language the Sydnj Jaffe Award was given tol 9 with the presentation of an engraved plaque by Mrs Annette Jaffe Previous winners of the award which was established in 1972 in memory of the CLA's founder have been _IoI IoIlOlo lOl speatrum - A J SalelDDle A Linguist's Suggested Sollo1tion for the 'Language Problem' NBA Crypto ogic specti'um Winter 1977 Vol 7 No 1 's Essay Contest were Shirley Shamp and Dr U P L 86-36 September 78 CRYPTOLOG Page 8 8GCRE'f IWIBbE VIA E81lHff El iUEbS 81UH 86-36 op SE6RE UMBRA September 78 CRYPTOLOG Page 9 EO 1 4 c P L 86-36 TOP SBE3 'f' UMBR2 L DOClD 4019726 UNCLASSIFIED I II L 86-36 No passion in the lJo ro'ld no 1 ove or hate is equa1 to the passion to aUe ro someone else's draft H G wILLS USSID 300 that faithful old standby does give the writer a better idea of what is ex pected Hence one finds on page 13 of the latest edition some guidelines listed after the word Clarity Write product in a style that clearly and simply conveys the he idea for this article came about as foreign intelligence information the result of sending in a note to to the reader CRYPTOLOG asking to have my name added to the distribution list The editor Here at least is some sense of what is in replying to my request added the wanted i e a logically written report To postscr t I like your style Why don't you continue with the definition send in an article Anice compllment taken at face value but what exactly is meant by style Be consistent in style A quick look at Webster' s yields this definition mechanics and grammar sty1 e a mode of expressing thought in language esp a manner of There's that word style again If one asexpression characteristic of an indisumes the a definition from Webster's then vidual period school or nation a writer's style should never change at a b manner or tone assumed in discourse given time although it may change gradually c the cust om or plan followed in through the course of his writing career In spelling capitalization punctuation a sense we are back where we started This and typographic arrangement and being the case let us press on display Be specific in facts background This is not altogether helpful There is an and analysis excess of verbiage contained in 'the definition but the reader remains essentially unenlightened Good advice but obviously if you didn't write It is obvious that everyone is able to express clearly and simply this advice would be thought in language hence everyone has style spurious Granted the method of expression by some leaves much to be desired yet they still have style Use short plain concrete words Of course more is meant than just expressAvoid passive verb phase ing thought in language It should be done logically and progressively so that the reader Here we come to the crux of the matter Here can get from point A to point B without getting is the B Ze I use the word too the Agency is lost in a tangle of words It must follow that looking fbr It can allow for precisely what NSA condones certain styles while rejecting is needed -- a clear concise and logical others Discovering the acceptable course is report usually by trial and error 15-250 and other Unfortunately there is one pitfall'undercourses notwithstanding Even if a report has lying these instructions It allows all of been prepared in the acceptable style there us to fall into a set lackluster form of is always someone along the line willing and writing In essence many product reports' eager to change your report -- your report -which leave this Agency read the same The in some manner Since all of us are prone to only real differences are the time of the actierror some of these changes are warranted vity and the entity inVOlved This kind of Others are inexplicable T September 78 CRYPTOLOG Page 10 UNCLASSIFIED DOCID 4019726 UNCLASSIFIED writing requires no creativity but only the analyst's ability to fill in the blanks Before irate report writers come storming in to protest let me emphasize that this is not always the case However it does happen and frequently All of us like to think we write well Most of us can given the chance I know of analysts who deliberately pattern their writing with their editors in mind What they have written is not necessarily their own but an aping of what the editor wants Their own writing not always bad has been edited so often that they change their style of writing in self-defense 'When a new editor appears and begins enforcing his or her interpretations about what a good report should sound like the report writer simply apes the new style again through trial and error There is no pride in writing It is simply a matter of getting the job done and moving on to something else It should be the job of all of us to encourage creative writing as far as possible under the guidelines established in USSID 300 All of us have an affinity for certain words We should however resist the urge to emend another's report simply to replace thexr words with ours Editing of reports is a required function and done properly can be used as a teaching experience for new writers Emendations for the sake of preference rather than improvement are counterproductive In such cases the writer has three courses open to him He can argue his case with the editor and try to get his wording restored he can continue a silent war with the editor by continuing to submit his own textual preferences in the hope of slipping one by or he can change his use of words whether he agrees with the change or not It is important to remember that the prime task of the editor is to strive for precision and clarity If a report must be changed for reasons of clarity or excess verbiage the editor should try to discuss these chan2es with the writer whenever possible Both will benefit from the experience U News of the Communications Analysis Association L -_ _ o l P14 P L 86-36 Dues Yes dues Here he goes again George talking about money again You can be a member of CAA for just one dollar a year Hey I'm a dolUz to -a-year man Ethel I'm too young to remember what that means George The dollar brings you all the CAA news and minutes of meetings and announcements of various events If you heard about CAA events too late to attend you're probably not on our mailing list And you're not on the mailing list because that's right because you haven't become a member If you used to get our announcements but you haven't seen one lately you're an ex-member He means you haven't paid yoi ' dues z at lY 'George It Call our treasurer L _ or one of the other board members and get them to mail you an application card Then mail it with the dollar to Tim Hand me a dollar Ethel U P L LI Jldidstir up a lot of people with his analysis of the Outer Space SIGINT problem which he gave as the June CAA presentation Does that problem exist who are they Who 'do- they' think we are Protein indeed Maybe we should consider a follow-up dis cussion series to Clint's talk By the time you read this we may have already begun but only those on our mailing list will know for sure And of course they will know too won't they September presentation Have you ever tried to use a crystal ball IWill tell you how he uses his WaL t c h f o r t h e announcements I SOLUTION TO NSA-CROSTIC No 16 by David H Williams P16 CRYPTOLOG June 1978 U I Letter to the Editor CRYPTOLOG July 1977 My point was not to malign the fine women of our Agency or propose a process in violation of an re lation Boal'd of Gove rno1'8 eAA President David Gaddy President-elect Frank Parrino Secretary - _ J Treasurer i m Mu r h Board members L I However the times are changing U September 78 CRYPTOLOG Page 11 EO 1 4 c P L 86-36 86-36 UNCLASSI nED 32t7 5B791 8 25 3791 4935 5991 3575 3369 L U P L 86-36 8 6- 3 6 86-36 DOCID 4019726 UNCLASSIFIED SOVIET COM INT THE CIVIL WAR lI l i Translator's note The following is a translation of the article The Organization and Combat Use of Radio Intelligence During the Civil War by Lt Col Yu Ural'skij in Voenno-istoricheskij zhurnal Journal of Military History Moscow No 11 1972 The article gives a rare glimpse into the early operations of Soviet COMINT and the importance that the top leadership gave to it from the very beginning of the Soviet regime Footnotes citing Soviet archival records have been eliminated and a few explanatory footnotes enclosed in brackets have been added hen setting up control agencies units and subdivisions of the communications troops of the Red Army that was being created to defend the Soviet authority the Revvoensovet Revolutionary Military Council of the Republic RSVR l attached great importance to the use of radio as a means of communication among the troops and to its application in the interests of intelligence 2 o During the period of the civil war the radio situation that had developed on all fronts favored the organization of radio intelligence by the Red Army since the combat actions encompassed a large territory of Soviet Russia and were of a mobile nature The interventionists and White Guardists made rather broad communications use of fixed and mobile field radio sets which were supplied to the headquarters of their armies corps and divisions as well as to naval vessels and merchant ships that were carrying troops arms ammunition and other military supplies to the White Armies of the Entente 3 Attached to the headquarters of Kolchak Denikin and Vrangel' were military-diplomatic missions from the Entente countries with a staff of military advisors who had radio sets at their disposal They maintained contact with London Paris Warsaw Athens Constantinople and other cities The interventionists and the internal counterrevolutionaries carried out radio communications W 1 The RSVR was set up on 2 September 1918 to unify all military control at the fronts and in the rear during the civil war period 2Radio intelligence had sprung up and had received its organizational formulation during World War I 3 It appears that the Soviet use of the term Entente includes all the non-Russian interventionist forces rather than just the World War I Allies September 78 1n t e range 0 meters W1t wave lengths from 290 to 740 meters being used for field communications The White Guardists had at their disposal the radio sets of the former Russian Army as well as American British and French equipment that had been supplied by the Entente For example Kolchak's headquarters in Omsk had radio set with a power of 30 kilowatts which was used to set up communications along the lines Omsk-Arkhangel'sk-London and Omsk-Nikolaev-Constantinople-Paris The fixed radio sets had a power of 3-30 kilowatts and the field and shipboard radio sets respectivel ' 0 5 and 3 kilowatts this made it possible on medium and long waves to coverratner considerable distances either directly or by way of intermediate radio sets At the same time this allowed radio intelligence to monitor the enemy's radio transmissions from a considerable distance There was almost no observance of communications security or discipline among the White forces Operational summaries concerning combat operations at the fronts and sometimes even combat orders were transmitted by radio in the clear Sometimes the addresses in the radio messages were not encrypted for example Urgent Operational summary No 3 Via Krinichnaya by radio to General Shkuro The radio data callsigns frequencies etc of field radio sets were not changed for long periods of time It was possible to determine who the radio sets belonged to by their callsigns for example PGL -- poezd generala Vra elya General Vrangel's train ALM -cru1ser Almaz ZhA -- destroyer Zharkij' ShI -- submarine Shipka GRV -- Gur'ev 'etc The grouping of enemy troops and the deployment and movements of headquarters could be learned from radio messages from radio direction-finding information from conversations in the clear between officials or indirectly when the field radio s t ceased operating and then started broadcasting again but with reduced audibility Thus the White and interventionist radio communications were a priceless source of information for the Red Army radio intelligence service concerning the enemy When in the course of the civil war Soviet Russia proved to be surrounded by a fiery ring of fronts telegraphic communication with the Western European countries was cut off and the delivery of foreign newspapers and magazines stopped there was a sharp limitation in tne amount of incoming information concerning international life However as during the years of World War I the international radio stations Paris Lyon Nauen Carnarvon CRYPTOLOG Page 12 UNCLASSIFIED DOClD 4019726 UNCLASSIFIED Corsi Rome continued to transmit regularly within the wave-length band of 600 to 1500 meters newspaper reports concerning the international and military situation The reports submitted by the foreign correspondents accredited to the headquarters of the White armies tr eled along these channels All this was of interest and enabled the RSVR and the Red Army headquarters and troops to intercept that information and to be informed concerning the international and military events and to obtain valuable information about the enemy For the Petrograd Telegraph Agency PTA and subsequently the Russian Telegraph Agency ROSTA the interception of foreign reports was carried out at the Moscow Tver' and Tsarskoe Selo radio stations which had been constructed in 1914 for the purpose of linking the Russian Army's General Staff with the frontline staffs and with the Allies In April 1918 these and other radio stations in the War Department were transfered by decree of the Council of People's Commissars to the People's Commissariat for Mail and Telegraph In order to increase the amount of information in the facilities occupied by ROSTA its own radio station was set up in 1919 that radio station received Teports from the correspondents at the civil war fronts and also intercepted foreign telegrams They were used in Pravda and Izve8til1ar irQ egular y printed surveys of military opfitrations a the fronts and in addi tion prQ id cLspedal pagesfor the Red Army man A s iQ la r radi station was located at the People' s Olllllj ssariat for Foreign Affairs The organization ofa radio intelligence service in the Red Army dates from the beginning of 1919 However attempts to carry out radio intelligence and to intercept enemy radio messages had been undertaken earlier by Red Army units For example during the second half of 1918 the interception of foreign reports was organized at radio stations 504 600 601 and 602 of the Western Sector of the screen detachments which had been intended for operational communications This was carried out by radiotelegraph operators who were familiar with radio intelligence from having served in the old Russian army During the period from July to October 1918 they intercepted 1576 radio messages In July 1918 radio station 504 carried out surveillance and interception of the radio messages from the field radio stations of the Krasnov troops which were operating in the Don area The necessity of organizing not only radio intelligence but also radio counterintelligence was recognized by the front headquarters For example the Board for the Administration of the Military Telegraph Communications of the Northern Front in a report to the military commissar of the Northern Front in November 1918 noted in order to detect and to provide warn- ings concerning the possible operation of enemy radio stations in the rear of our armies and also in order to obtain information concerning the location and operation of radio stations attached to enemy military units it is necessary to set up radio direction-finding stations and to organize radio monitoring on the front The formation of radio intelligence subdivisions began in January 1919 Every front and army headquarters was supposed to have one intercept station priemo-informatsionnaya stantsiya and a radio direction-finding station The former was intended for the reception of ROSTA summaries beginning with the words to all Soviet deputies to all editorial offices to all propaganda points and for the interception of of foreign newspaper reports and radio messages transmitted by the enemy's field radio sets It was manned by eight persons and had one or two radio receivers with a vacuum-tube amplifier The latter was supposed to detect enemy radio stations and get bearings on them The staff at the radio direction-finding station consisted of 19 persons In January 1919 for the purpose of supporting the Field Staff of the RVSR with intelligence information a radio intercept station manned by 22 persons was set up at Serpukhovo Radio intelligence tasks were frequently assigned also to the field radio stations of troop staffs But that was caused by an acute shortage of radio facilities and radiotelegraph operators working in the intelligence field The radio apparatus used for radio intelligence consisted of old models and was produced both by foreign companies and in the shops of the Navy Department For the most part they were detection receivers with a wave length range of 240 to 5100 meters With the aid of changeable circuits the limit of the range was extended to 15 000 meters In order to increase the sensitivity of the radio receivers three-cascade amplifiers operating on radio tubes were used Because of the shortage of radio directionfinding stations an engineer at the Communications Directorate of the Red Army V I Bazhenov invented a special antenna This antenna made it possible to adapt for purposes of direction-finding the ordinary field radio sets 4 Organizationally speaking the radio intercept and radio direction-finding stations were part of the radiotelegraph battalions of fronts and armies The overall management of the radio intelligence service was carried out by the radio See Instruktsiya po prisposobleniyu polevykh radiostantsij k radiopelengovaniyu po sposobu inzhenera Bazhenova Instruction Manual for Adapting Field Radio Sets to Radio Direction-Finding by Engineer Bazhenov's Method Mosco'w 1922 September 78 CRYPTOLOG Page 13 UNCLASSIFIED -_ 0 '-_ _ o _ _ o Jj DOCID UNCLASSIFIED 4019726 department of the Communications Directorate of the Red Army and at the fronts by radiocommunications and radio-intelligence sections of the communications directorates of the fronts and armies The sections summarized the radio-intercept data and drew up informational documents -- daily radio-intelligence summaries and diagrams showing enemy radio communications as they had reconstructed it These materials were intended for the Field Headquarters of the RVSR and for the intelligence sections of the appropriate staffs The most important informa tion was immediately transmitted by telegraph to the Field Headquarters of the RSVR and to other interested headquarters It should however be noted that the possibility of organizing and making combat use of Red Army radio intelligence at the fronts was limited because of the shortage of radio equipment and specialists As a result of this circumstance on all fronts except the Caucasian Front it was impossible to carry out completely the rad o direction-finding of enemy radio sets During the civil war years the radio-intercept stations intercepted a large quantity of radio reports issued by foreign telegraph agencies During 1919-1921 approximately 1000 intelligence summaries were issued solely on the basis of materials intercepted by just one radio station attached to the RVSR translated from English French German and Italian Summaries of radio-intercept materials from the foreign press were reported to V I Lenin They were also regularly provided to members of the RVSR People's Commissar for Foreign Affairs G V Chicherin the Moscow Oblast' Committee of the RKP b the VChK5 ROSTA and the directorates and departments of the RVSR Field Headquarters on matters pertaining to their areas of responsibility The communiques transmitted by foreign radio stations contained important poli tical economic and military information For example a radio message intercepted early in 1919 revealed Kolchak's overall strategic plan for the 1919 spring offensive In a statement made by Kolchak in Omsk it was stated We will attempt to establish contact with Arkhangel'sk and as soon as we succeed in occupying a line on the Volga we shall establish contact with the south and General Denikin after which we will change over to the offensive and advance on Moscow Seizing Moscow is our primary goal In his article How the Bourgeoisie Uses Renegades V I Lenin emphasized the value of foreign radio communiques Our radio stations he wrote intercept radio messages from Carnarvon England Paris and other European centers Paris is now the center of the worldwide alliance of imperialists and therefore its radio messages are frequently of 5 Secret police predecessor of KGB particular interest n6 The radio waves were the first to carry across the front line the information that the Entente was_preparing a new campaign against Soviet Russia the chief reliance being placed on bourgeois Poland and Vrangel' During the period of ed Army combat operatIons agaInst Kolchak in 1918-1919 the radio intelligence service on the Eastern Front successfully monitored the radio communications of Kolchak's Siberian Western and Urals White Cossack armies was well as White Guard radio stations in the Astrakhan' Gur'ev Krasnovodsk and Baku areas Kolchak's radio contact with the Entente was also established Radio messages and radio conversations in the clear made it possible to establish the location of the headquarters of Kolchak Denikin the Caspian Front the Caucasian and Don Armies the Astrakhan' Detachment and the group'of forces in the Northern Caucasus In the summer of 1919 in combat engagements against the White Cossack Urals Army the enemy's radio communications were monitored not only by the radio-intercept stations at the headquarters of the Turkestan Front and the r and IV Armies but also by radio station 529 at the headquarters of the 3rd Cavalry Division 596 at the 24th Rifle Division and 530 at the 25th Rifle Division On the Southern and Southeastern Fronts in 1919 radio stations 504 522 518 and others monitored the field radio stations of Denikin's army and the fixed stations situated on the coast of the Black Sea Nikolaev Odessa Sevastopol' On the basis of radio messages and radio conversations in the clear the radio intelligence service on the Southern Front in May 1919 succeeded in revealing rather precisely a grouping of Denikin troops in the south and in noting a concentration of the Volunteer Army in the Azov-Donetsk sector the III Don Army in the Lugansk sector the II Don Army on the Northern Donets the I Don Army to the south of the Don in the Tsaritsyn sector and General Vrangel' s Caucasian Army in the Northern Caucasus and also succeeded in establishing the deployment of many of the White Guard troop headquarters On 5 October 1919 a radio intercept station at the IX Army headquarters intercepted and decrypted radiogram 04118 which contained a a combat order issued by the Commander of the Voronezh Group General-Lieutenant Shkuro The order assigned tasks to the units of Shkuro's cavalry corps after its seizure of Voronezh The information received was immediately transmitted to the headquarters of the Southeastern Front The radio intelligence service of the Red Army operated more successfully against 6V I Lenin PoZn BOhr Bach Complete Collected Works Vol 39 p 182 September 78 CRYPTOLOG Page 14 UNCLASSIFIED DOCID 4019726 UNCLASSIFIED Vrangel' in the concluding phase of the civil war Factors that contributed to this were the experience that had been accumulated in the combat use of radio facilities for purposes of intelligence and the improvement n the su plying of technical equipment to rad10 batta110ns During the Red Army's combat actions against the Vrangel' forces many of the intercepted radio messages dealt with enemy groupings the redeployment of headquarters and the headlong flight of the White Guardists from the Crimea For example in one radio intelligence summary issued by the headquarters of the Southern Front it was indicated From radio messages intercepted by the chief front station from radio stations 6ZhT 7ZY and SPY one can make the following conclusion radio station SPY attached to the 2nd Don Cavalry Division approximately between 29 September and 1 October was transferred together with the division to the area to the north of Volkovakha previously that radio station had been in the Aleksandrovka area The data obtained was subsequently confirmed by tactical reconnaissance removed for transfer to a new location During the past few days we have observed almost no activity by the enemy's field radio stations One can assume that the headquarters of the divisions and corps to which the field stations are attached are being redeployed Radio communications also provided information about the course of the evacuation of Vrangel's troops from the Crimea For example General Kutepov reported to the fleet commander that he had 6500 officers and men on board a steamship and there was absolutely no water or bread He also reported that the LAZAR which was being towed by it had sunk as a result of a leak The KRONSHTADT reported to Constantinople that it had absolutely no coal or food supplies it had 5000 passengers on board and was towing the ZVONKIJ On the basis of the radio intercept information the Commander of the Southern Front M V Frunze in an order dated 15 November 1920 demanded the development of the most energetic efforts on the part of submarines and the liquidation of the enemy's attempts to use the sea to escape the blows being dealt by our armies Beginning on 8 August 1920 the radio stations on the Caucasian Front neted an excepThus it follows from what has been stated tionally large amount of radio traffic in the Sea of Azov area The possibility of a landing that during the years of the civil war the Red Army's radio facilities were used successoperation was raised And indeed on 14 fully for intelligence purposes against the August under the command of General Ulagay a enemy landing was made in the Akhtarsk area Frontline radio intelligence continuously monitored At a conference of front-level chiefs of commuthe enemy's radio communications intercepting nications troops that was held in 1921 the acradio messages and official conversations tivities of radio ill te11 igence were rated highly The information thus received contributed to The radio intelligence service that had been the defeat of this landing created in our Armed Forces completely justified its purpose and provided the Red Army with On 16 October a radio intercept station of valuable material concerning the enemy thus the Caucasian Front headquarters intercepted helping the Red Army to achieve victory The an order from the Commander of the II Army role and importance of communications troops General Abramov which had been sent in the including the role and importance of the radio clear That order concerned the changeover facilities were also given their proper credit on 17 October to the offensive against the Red by the Revolutionary Military Council of the Army units on the Kakhovka bridgehead KnowRepublic which in recognition of the valorous ledge of the enemy's plan of operations helped and extremely valuable work for the benefit of the headquarters of the Southern Front-- to Soviet Russia expressed its appreciation to whom the intercepted White order was forwarded the entire complement of commissars commanders -- to destroy the Vrangel' forces at Kakhovka Red Army men in the Red Army communications and In the final stage of the Red Army's combat troops actions in the fight for the Crimea the White Guardists did not have enough time to The combat experience of using radio equipencrypt their combat documents and the radio ment for intelligence purposes during the years traffic was sent in the clear The radio mesof the civil war was used for the further sages contained informa tion concerning the wi thdevelopment of the radio intelligence service drawal of units their evacuation from the in the Red Army Crimea For example changes in the enemy's groupings were mentioned in the 25 October 1920 7 Mo V Frunze na fxoontakh grazhdanskoj vojny radio-intelligence summary issued by the South- eM V Frunze on the Civil War Fronts Colern Front fl o o o radio station OCh attached lection of articles Moscow 1941 p 448 Unto I Army headquarters was removed for trans- fortunately the submarine forces could not exefer to a new location Apparently the enemy has cute this order The two submarines in the begun evacuating Melitopol' Radio station Black Sea -- the AG-23 and the AG-24 -- were 81T which serves the headquarters of the troops not ready for operations in the open sea operating in the Nikolaev area also has been September 78 CRYPTOLOG Page 15 UNCLASSIFIED DOCID 4019726 EURONFIDEN'fIAb P L F or some unknown reason it seems that persons writing or talking about language skills functions and work loads have been unable to find an appropriate descriptive or general heading for the world of the translator In contrast the world of the transcriber presents no apparent difficulty for it is neatly and effectively packaged and labeled as voice We speak hear read and write about the voice problem a voice linguist can this be a transcriber voice traffic voice skills the voice language technician and the voice language analyst As for that other world however no such overall descriptive has been discovered or devised At some point someone decided to adopt a binary approach in resolving this problem In our daily routine we are constantly involved in situations where we are faced with a choice or conditxon of two alternatives such as on-off yes-no 0-1 It follows therefore that if the one world is voice what can be more simple than to call the other world non-voice This term has gained acceptability and respectability and is now virtually official NSAese When one carefully examines the word nonvoice one can only conclude that it is a nonword It is vague and imprecise The rejoinder to this might be Well you know what it means from context True enough Yet one could also understand the connotation of the term non-transcriber if it were used as a substitute for translator in the proper context Fortunately no one has suggested the use of the expression non-voice langUage analyst or nonvoice language technician as career occupational titles although such an eventuality is not unreasonable' to imagine In seeking an alternative to non-voice I thought it would be helpful to scan the NSA Basic Crypto10gic Glossary of June 1971 which the Director in his foreword urged all of us to consul t and be guided by in the preparation of' briefings technical reports and other documents I was in for quite a surprise If a linguist wants to give his or her tender sensibilities a real working over he or she should review the 20 main categories of cryptology listed on page 47 of the glossary Neither language nor linguistics nor cryptolinguistics made the honor roll although cryptolinguistics does appear as an entry It is interesting to note that the entries transcript and transcription appear under the category Collection Interception I It is evident that the compilers must have wrestled with the placement of the entry cryptolinguistics because it is listed -- along with scanning gist kana Cyrillic alphabet -- under the category General In effect although this glossary represents the codification of the highly specialized vocabulary of cryptology the few terms from the world of the linguist are lumped together as General As for the cryptologic dramatis personae a traffic analyst is defined as a person versed in the art of traffic analysis and a cryptanalyst is of course a person versed in the art of cryptanalysis or the science of cryptana1ytics A bookbreaker is a cryptanalyst who specializes in the recovery of plain text values in a code One can only assume that the compilers of the glossary would have referred those who inquired about the definition of a linguist to Webster's dictionary The Webster's Third IntezonationaZ Dictionazoy defines a linguist as 1 a person ac omp1ished in languages and especially in living languages one who is facile in several languages 2 a student of or expert in linguistics The merits and demerits or validity of this definition in the crypto10gic context eould undOUbtedly provide a stimulating subject for discussion among the practitioners of the linguiStic art The next official source I consulted was the textbook Radio Traffic Analysis vintage 1964 which contains a Glossary of Traffic Analysis Terminology Although transcription and voice appear in this glossary my search for other language-related terms was in vain And then the trail led to the earlier edition 1955 of Radio Traffic Analysis and -its glossary There for all the world to see is the entry linguist Instead of providing a September 78 o CRYPTOLOG o Page 16 JONFIBRN'fIA IWIBbE nh SeIHN'f SIWRIEbS eN Y 86-36 DOCID 4019726 definition at that point the glossary advises one to See LINGUISTIC PERSONNEL For linguistic personnel the glossary explains In cryptology those persons skilled in language The glossary adds what it calls the specific categories of linguistic personnel en gaged in cryptologic work Would you believe To the Editor CRYPTOLOG 11 categories They are This letter is in response to two articles identifier by Mr Mark Pattie What Language Problem interpreter CRYPTOLOG May 1976 and As I Was Saying Two language specialist Years Ago CRYPTOLOG June 1978 linguist one who has expert knowledge You were wrong in 1976 Mr Pattie and you of a foreign language are wrong again Worse your attempt or any listener attempt to prove that there is a high-level reader for those who may be puzzled by this a reader is a language specialist Agency-wide conspiracy against linguists is doomed to failure because no such conspiracy who deals with a foreign language in exists Nor has it ever existed Individual its written form inequities -- probably but no more in the scanner spotter not one who locates enemy targets ranks of linguists than in any other cryptologic area or a civilian who watches for approachThere are some fatal flaws in your articles ing airplanes or one who removes spots that ought not to be there if for no other but rather a reader who sorts traffic reason than because of your cryptanalytic backby means of key terms ground For example the current group of GGtranscriber ISs in the SR Language CA and TA fields translator and breaks down to one SRA nine linguists 11 voice translator a listener who transCA and one TA Using your analytic methodology lates recorded language voice transthe lingu sts are in pretty good shape in missions into written English How did the compilers of this glossary overlook the cryptologic skills area In fact we might deduce that they don't do badly when measured the non-voice translator against the CA field and that they are 9 times From the context in which non-voice is better of than the SRAs and TAs used it presumably refers to a foreign lanWe might make that deduction but we had guage in its written or printed form although better not because those numbers don't tell us one may make a good case for including Morse anything at all except that there are a certain code semaphore smoke signals or even intelnumber of people at a certain grade in a parligible drumbeats If this presumption is cor- ticular group of COSCs In short they don't rect then why not use the term graphic tell us any more than your numbers did If we defined by Webster's as of or relating to the took a further look we would find that the written or printed word or the symbols or devices nine linguists are in fact almost all diviused in writing or printing to represent sound or sion chiefs research linguists or language coconvey meaning In combination forms it may ordinators rather than language analysts or even offer some euphonious possibilities -voice language analysts And that is who we graphic traffic anyone In fact paper are talking about isn't it We must get that linguist has been occasionally used as a syno- straight at the beginning If we are going to nym for translator However it comes too close talk about language analysts and voice language to paper tiger and our tocal humorists have analysts at the 13 or higher grade levels we enough material already are not talking about language people at the technician level Your second fatal flaw then I have been using the term graphic in the I believe was to put all language people into language context for some time now without the same pot Surely you are aware that the having elicited any noticeable confusion disterminal grade for language techs is GG-12 and comfort or demurral on the part of readers or since that job has requirement for only a listeners Notwithstanding the fact that the level-2 language proficiency GG-12 seems quite age of verbal permissiveness is upon us and generous to me I should point out that in the almost anything goes I offer it as an effectechnician arena in grades GG-S through GG-12 tive substitute for non-voice language people enjoy a promotion rate and an Years ago there was a popular song written attrition rate that is nearly identical to that by the late Johnny Mercer that contained some of the other cryptologic skills relevant sound advice in its opening lines 'But I digress We are not supposed to be You got to accentuate the positive eliminate the negative latch on to the affirmative talking about technician-level language people don't mess with Mr In-between but rather professionals You made a big thing out of the statistic that said linguists got 4 LETTERS TO THE EDITOR - l r September 78 CRYPTOLOG Page 17 CONfIBRN 1A1 t Ifl N6Lf o fA eOllUNT elb 1mfLS OlfbY DOClD 4019726 CONF'IDEN'fIAL percent of promotions in he 13-18 range while engineers captured 19 percent of the total That rate is just not strange when you also consider that all professional-level language jobs throughout the Agency constitute only 3 percent of the authorized work force while engineer and computer scientist professional-level jobs constitute 17 percent of that same work force Now if you want to argue that there should be more professional-level jobs in the language field that's a different ballgame But you would probably get a lot of argument there too The fact is that an awful lot of our current authorized level-3 professional iobs are being done by level-2 technician people In some areas the professionalization rate is under 25 percent meaning that 75 percent and more of the people on the job are not even qualified for consideration to promotion beyond grade 12 But aside from all of this I recognize that the gut issue in your mind is that we get what we pay for Not always Mr Pattie not always Sometimes we have to pay for what we get though and we do not operate in a vacuum We know what professional engineers and linguists are paid outside the Agency so we must be competitive If that means extra pay and more rapid advancement for engineers and computer scientists at the professional level then it is so because of a real-world situation -- that is it 1s so because it is what we must do to accomplish the mission You ought not to confuse ideological truths with reality everybody has an opportunity to become Deputy Director but not everyone will The career structure allows for movement in the language field up to GG-18 but there are no real jobs at that level That's the way it is Whoever told you that hiring high school kids was the latest solution to the language problem lied Nobody associated with the program that I know believes that The facts are that we are hiring very sharp high school kids as trainees in Russian only at this point because that's where the requirement is We are also hiring Russian majors other language majors as trainees ex-military many of whom were high schoolers incidentally and anybody else who can qualify as a language technician or trainee The point is that we are hirin people against requirements as trainees only when we cannot get already trained people We are doing it in language collection signals conversion and soon we will do it in the computer field You asked Why don't we hire high school graduates to be trained as engineers or mathematicians I know you were once assigned to the National Cryptologic School so I expect that you know we aren't equipped to train either from scratch We are however well equipped to train language people from the ground up with one of the best damn language teaching staffs and faculties anyWhere in the world The attrition in those classes is under 10 percent and that would be a miracle except that it has been accomplished by outstanding recruiting teaching staffing supporting and plain hard work by the students themselves Another mistake I suspect is that you are confusing the importance of the mission with the difficulty of accomplishing it We cannot realistically use job importance to set pay scales -- who's goin to decide whether it is more critical to collect decrypt translate transcribe analyze or transmit Finally solutions that cannot be carried out are not solutions About $20 million and 1000 more people would plZobably solve all our problems but neither the $20 million nor the 1000 people are available If you can figure a way around that you should immediately pass it on to the senior managers you think are involved in the conspiracy I am sure you would enjoy their unending gratitude Dan Buckley M03 Mr Pattie repZies b bbS My goodness I must certainly have struck a nerve in Mr Buckley His letter flays me up down and sideways Could it be that his role in the high school program has made him a bit sensitive to any criticism After reading his scathing letter I thought I had better reread my articles to see if I had said anything about a high-level Agencywide conspiracy against linguists I never brought up the possibility of such a conspiracy but since he did maybe it does exist Methinks he doth protest too much I suppose someone could construe my comments about senior officials and their attitudes toward language work as implying conspiracy If anyone took it that way I apologize However I do stick by my statements about individual seniors and their attitudes Although I suspect that there would be staunch denials some have definitely expresS'ed low opinions about linguists and language work Mr Buckley uses flamboyant language in castigating me and I feel reasonably sure that if he had thought about it a bit more he might well have toned down his letter For one thing I believe he could have made his first fatal flaws paragraph more comprehensible I don't know what he meant by current group of GG-15s and I don't really care for I thought I was comparing linguist promotions with those of engineers Then to take me to task for not recognizing that there is a language-technician level is raising another fatal flaw to no purpose Did any other reader believe I was talking about nonprofessional linguists All of that particular argument is a red herring havin nothing to do with the issue I tried to raise As for professionalization itself there is no question in my mind that it is far easier September 78 CRYPTOLOG Page 18 CONFIf NTIAL W'Y'IQb 'IIA EStillA' elJ H14EL 0I4L i DOCID FeR eFF I e IAt t l E el4L'i r I I I to become professionalized as an electronic contrary to his previous points about hiring engineer than as a linguist Can you deny and career structure Yes someone has decided that Mr Buckley This is so because the that pay scales for engineers are higher than Agency has determined that to be a professional those for linguists Is that a conspiracy linguist one must pass a series of very diffiI'll let you decide cult tests along with other requirements I'll end with one final point -- all the That in itself goes a long way towards explainbest engineers in the world cannot issue one ing why so many level-3 language jobs are being piece of end product Linguists can and they handled by level-2 people Engineers have a ought to be paid well for it far less stringent professionalization program Mark T Pattie Jr P13D The tone of Mr Buckley's letter is most f8l 1e unfortunate for he seems determined to read the riot act to me even when he states what I have already said in my articles Of course I recognize that the Agency must compete with the outside world in hiring The difference is that the Agency is willing to pay more to hire engineers than linguists Since he is so close to all of the facts and figures perhaps Mr Buckley could tell us how many engineers and how many linguists have been hired directly at the GGD-13 level or higher over the past few Do you hate it when only one or two copies of years or so CRYPTOLOG are circulating in your work area and And of course the statement that there you have to wait and wait to read the latest isare no real jobs in the language field at the sue until after everyone else has read and dishigher grades is a fact that we all recognize cussed the provocative ideas expressed in it But isn't that one of the things I was comWorse yet do you hate to wait to see the latest plaining about His That's the way i t is CRYPTOLOG only to find that all the pUZZles implies that that is the way it will always be have already been done -- and in ink Well and I fear he is right then why don't you just ask to be put on the Then there is the matter of the high school distribution list to receive your own personal copy of CRYPTOLOG Just send your name and orprogram for which he berates me so soundly ganizational designation to CRYPTOLOG Pl You I would still like to hear someone give facts and figures on the retention rate of the previ- don't have to type up a fancy-looking memo -a scrap of paper will do it Or you could teleous high school program If his office cannot phone the editor on 5236s That's riskier find this data I suspect that some of the however -- while he's got you on the phone he operational areas would be able to fill in might try to coax you into writing one of those the gap discussion-provoking articles yourself Incidentally this one of the best damn U language teaching staffs and faculties he refers to is composed of contract instructors many of whom have not had a raise in years and people on loan from operational elements T ANNOUNCES ESTABLISHMENT Of in addition to those who are assigned to billets in the NCS It is a real hodgepodge I do not have access to any pay records but my best guess would be that the Agency is getting this instruction at bargain rates It should also be noted that the contract instructors being only partially cleared can only carry Telecommunications and Computer Services T the students so far before their lack of knowannounces the establishment of a Human Resource ledge about our business brings a halt to their Devel pment Panel The Panel's two primary usefulness funct10ns are to assist T employees in career I do not understand the accusation that I am planning and to advise DDT in areas of human re confusing the importance of the mission with sources development career planning and utilithe difficulty of accomplishing it What zation Information about the operation of the does that really mean Panel may be obtained from the Chairman Mrs IT432 J oom 6A126 x3091s Then finally the statement that we cannot realistically use 'job importance' to set pay P L 86-36 scales does not ring true Someone does or should look at Agency mission and function U statements when determining hiring needs and tables of distribution The statement runs Do you HATE TO WAIT HUMAN RESOURCE DEVELOPMENT PANEL t------- September 78 CRYPTOLOG Page 19 F8R 8FFIeIAt t l E e tY DOCID 4019726 P L 86-3E UNCLASSIFIED NSA-crostic No 17 by A J S 2'M quotation on the 7Ul Ct page t lcUI takJm ft'om tM publuMd Wl'k of an liSA-fll' 7'1rs first lfIttfll'S of the fIORDS Bpflll out the aut1ro1 S nams and the titlfl of t1tfl WOl'k DEFINITIONS WORDS September 78 CRYPTOLOG Page 20 UNCLASSIFIED DOCID 4019726 UNCLASSIFIED lO Lu on nex mon n September 78 CRYPTOLQG Page 21 P L 86-36 UNCLASSIFIED PI-JUL 78-53-26571 DOCID 4019726 This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu