Hall VII - Diplomatic Machines Interwar to WWII - 1931-1938 Broken by SIS

Red (Type A)

The Japanese diplomatic machine that taught US analysts how to think before Purple appeared.

OriginJapanese Foreign Ministry
Service1931-1938
TypeStepping-switch substitution machine
Core PatternVowel and consonant streams handled separately
SuccessorPurple (Type B), 1939

Why This Matters

Red is historically important less for a single battle and more for methodology. It gave US cryptanalysts practical experience with Japanese machine traffic, stepping behavior, and class-partitioned substitution. When Purple replaced Red, those lessons dramatically shortened the time to conceptual breakthrough.

📜Historical Context

Before Purple, Japanese diplomatic traffic relied on a machine system now called Red (Type A). Like later Japanese designs, Red partitioned text into distinct character classes and processed them with different stepping behavior. Signals Intelligence Service teams in the United States attacked this traffic in the mid-1930s and produced substantial recovery.

That achievement was not final victory. It was reconnaissance in method space: analysts learned which statistical clues survive stepping substitution and how repeated diplomatic formats can anchor machine-state recovery even when hardware is unknown.

⚙️How It Works (Pedagogical Model)
  1. Clean the message to alphabetic text.
  2. Route vowels and consonants into separate substitution streams.
  3. Apply a stepping substitution table to each stream independently.
  4. Recombine characters in original order to form ciphertext.

This page models the structural idea, not classified wiring details. The crucial historical point is the split-stream architecture, inherited and expanded by Purple.

💀Why It Was Breakable
Character-Class Leakage
Complexity: Moderate to hard

Separating vowels and consonants narrows local uncertainty and leaves uneven statistical traces in each stream. Over large diplomatic traffic volumes, these traces provide footholds for state reconstruction and crib exploitation.

Operational Regularity
Complexity: Depends on discipline

Diplomatic templates, date headers, and repeated formal language generate recurring plaintext structure. Even partial cribs can bootstrap deeper machine analysis when combined with message metadata and traffic correlation.

🔬Modern Security Lesson
Red Design ChoiceModern Implication
Split substitution by character classAvoid structural side channels across symbol classes
Deterministic stepping familiesKey schedules must be high-entropy and hard to correlate
Heavy dependence on operator disciplineHuman process errors remain first-order security failures
Opaque hardware as security layerKerckhoffs still applies: assume adversary learns design
Quick Facts
HallVII - Mechanical Machines
NationJapan
Era1931-1938
RoleDiplomatic traffic
Analytic LegacyDirect bridge to Purple success
StatusBroken by pre-war SIS effort
← Previous JN-25