Geheimschreiber T52 (Sturgeon) Siemens & Halske teleprinter cipher
A teleprinter cipher with ten wheels and ten thousand operators — broken in two weeks by one Swedish mathematician with pencil and paper.
Why This Matters
While Lorenz SZ40/42 (“Tunny”) carried Hitler’s strategic traffic, the Siemens & Halske T52 — codenamed “Sturgeon” at Bletchley Park — carried Luftwaffe and Wehrmacht command traffic over leased Swedish telephone lines from 1940. That choice of physical medium turned out to be a catastrophic mistake.
In summer 1940 the Swedish military intelligence service (FRA) handed Arne Beurling, a 35-year-old mathematician at Uppsala University, a stack of intercepted telegrams. He was given no machine, no diagram, no captured material. Two weeks later he handed back a complete reconstruction of the T52 algorithm, derived from the ciphertext alone. By 1942 the FRA was reading 200 messages per day. It is among the most extraordinary cryptanalytic feats of the twentieth century.
The T52 is a teleprinter cipher. Plaintext is encoded in 5-bit Baudot characters and combined with a keystream generated by ten wheels with coprime lengths (47, 53, 59, 61, 67, 71, 73, 79, 83, 89). The wheels are split into two roles:
- Five wheels generate an additive keystream that shifts each character.
- Five wheels select, per character, one of several keyed substitution permutations applied after the additive shift.
In the original T52 the substitution is a bit-permutation on the 5-bit Baudot code. The educational demo above operates on the 26-letter alphabet using mod-26 addition and six keyed permutations of A–Z, which preserves the architectural lesson — additive keystream plus per-character permutation, ten coprime-length wheels — while keeping the round-trip clean for arbitrary text.
Beurling exploited two German operating errors. First, the ten wheel lengths are coprime, so the keystream period is enormous — but operators frequently sent two messages with the same wheel start position, producing a depth. Second, German operators padded with the figure-shift character, which had a distinctive bit pattern that survived the additive masking. With several deep messages and the bias from padding, Beurling derived the wheel motion algebraically.
The FRA built an electromechanical machine called “Appen” that recovered the daily wheel positions automatically once the wiring was known. By 1942 the Swedes were reading T52 traffic at production scale and quietly informing the Allies.
| Sturgeon lesson | Modern echo |
|---|---|
| Re-using a keystream produces a depth | Why nonces are mandatory and never reused (AES-GCM, ChaCha20) |
| Predictable padding leaks the keystream | Padding oracle attacks (Vaudenay, POODLE) |
| Coprime wheel lengths ≠ cryptographic security | Period ≠ unpredictability — modern PRGs require statistical tests |
| Ciphertext-only break of a complex machine | The defender must assume the attacker has only ciphertext, not vice versa |
| Origin | Siemens & Halske, Germany |
| Year | Deployed ~1932; in heavy WWII use 1940–1945 |
| Wheels | 10 (5 generate keystream, 5 select permutation) |
| Plaintext | 5-bit Baudot teleprinter code |
| Broken by | Arne Beurling, FRA Sweden, May–June 1940 |
"Fish" was Bletchley Park's umbrella codename for German teleprinter systems, named after fish species:
- Tunny = Lorenz SZ40/42 high-command traffic.
- Sturgeon = Siemens T52 Geheimschreiber family.
- Thrasher and other labels = variant circuits and routing groups.
This matters because the British did not face one "German machine cipher" but a layered ecosystem: Enigma for tactical traffic, Lorenz for OKW strategic command, and T52-class Fish circuits for teleprinter channels.