Red (Type A)
The Japanese diplomatic machine that taught US analysts how to think before Purple appeared.
Why This Matters
Red is historically important less for a single battle and more for methodology. It gave US cryptanalysts practical experience with Japanese machine traffic, stepping behavior, and class-partitioned substitution. When Purple replaced Red, those lessons dramatically shortened the time to conceptual breakthrough.
Before Purple, Japanese diplomatic traffic relied on a machine system now called Red (Type A). Like later Japanese designs, Red partitioned text into distinct character classes and processed them with different stepping behavior. Signals Intelligence Service teams in the United States attacked this traffic in the mid-1930s and produced substantial recovery.
That achievement was not final victory. It was reconnaissance in method space: analysts learned which statistical clues survive stepping substitution and how repeated diplomatic formats can anchor machine-state recovery even when hardware is unknown.
- Clean the message to alphabetic text.
- Route vowels and consonants into separate substitution streams.
- Apply a stepping substitution table to each stream independently.
- Recombine characters in original order to form ciphertext.
This page models the structural idea, not classified wiring details. The crucial historical point is the split-stream architecture, inherited and expanded by Purple.
Separating vowels and consonants narrows local uncertainty and leaves uneven statistical traces in each stream. Over large diplomatic traffic volumes, these traces provide footholds for state reconstruction and crib exploitation.
Diplomatic templates, date headers, and repeated formal language generate recurring plaintext structure. Even partial cribs can bootstrap deeper machine analysis when combined with message metadata and traffic correlation.
| Red Design Choice | Modern Implication |
|---|---|
| Split substitution by character class | Avoid structural side channels across symbol classes |
| Deterministic stepping families | Key schedules must be high-entropy and hard to correlate |
| Heavy dependence on operator discipline | Human process errors remain first-order security failures |
| Opaque hardware as security layer | Kerckhoffs still applies: assume adversary learns design |
| Hall | VII - Mechanical Machines |
| Nation | Japan |
| Era | 1931-1938 |
| Role | Diplomatic traffic |
| Analytic Legacy | Direct bridge to Purple success |
| Status | Broken by pre-war SIS effort |