World Library  
Flag as Inappropriate
Email this Article

World War II cryptography

Article Id: WHEBN0000889043
Reproduction Date:

Title: World War II cryptography  
Author: World Heritage Encyclopedia
Language: English
Subject: History of cryptography, Nanking Massacre, Battle of the Atlantic, World War I cryptography, Outline of cryptography
Collection: History of Cryptography, Signals Intelligence of World War II
Publisher: World Heritage Encyclopedia

World War II cryptography

Cryptography was used extensively during World War II, with a plethora of code and cipher systems fielded by the nations involved. In addition, the theoretical and practical aspects of cryptanalysis, or codebreaking, was much advanced.

Probably the most important cryptographic event of the war was the successful decryption by the Allies of the German "Enigma" Cipher. The first complete break into Enigma was accomplished by Poland around 1932; the techniques and insights used were passed to the French and British Allies just before the outbreak of the War in 1939. They were substantially improved by British efforts at the Bletchley Park research station during the War. Decryption of the Enigma Cipher allowed the Allies to read important parts of German radio traffic on important networks and was an invaluable source of military intelligence throughout the War. Intelligence from this source (and other high level sources, including the Fish ciphers) was eventually called Ultra.

A similar break into an important Japanese cipher (PURPLE) by the US Army Signals Intelligence Service started before the US entered the War. Product from this source was called MAGIC. It was the highest security Japanese diplomatic cipher.


  • Australia 1
  • France 2
  • Germany 3
  • Italy 4
  • Japan 5
  • Poland 6
  • Soviet Union 7
  • Sweden 8
  • United Kingdom 9
  • United States 10
  • See also 11







Soviet Union

As is common with World War II discussions of cryptology, there is a curious absence of information on Soviet efforts and accomplishments. Given the Red Army offenses on the Eastern Front, they must have obtained Enigma machines. What they did with them seems to be an unanswered question.


United Kingdom

United States

See also

This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.