Hall VI · Military WWII · 1943–1945 Tactical (intentionally weak)

Slidex British WWII tactical bigram cipher card

A piece of paper, a sliding strip, and a daily key card — the cipher that secured British platoon traffic from Normandy to Burma.

OriginRoyal Signals, United Kingdom
YearIn service 1943 – late 1950s
MechanismBigram substitution from a printed grid + sliding strip
UseTactical voice and morse traffic; never strategic
SuccessorBATCO (Battle Code) from late 1950s

Why This Matters

Slidex was the British answer to a problem every WWII army faced: how do you encrypt platoon-level radio traffic without giving every signaller a fragile machine? The answer was a small printed card with a movable strip. The cipher was deliberately weak — it would not stop a serious cryptanalyst given a few days of traffic — but it was robust against an opponent who needed the message now, in the next 30 minutes, before the gunfire moved.

It was issued from 1943 onwards across the British and Commonwealth armies and saw heavy use in Normandy, Italy, and the Far East. The Germans broke it routinely; the Japanese had less success, but tactical traffic is by its nature obsolete within hours.

⚙️How It Works

Each Slidex card carries a 17×17 grid (or 12×12 in some issues). The rows and columns are headed by mixed alphabets that change daily. Inside each cell is a printed bigram (e.g. “BT”, “QM”) drawn from a pool of 289 distinct two-letter combinations. To encrypt:

  1. Find your plaintext bigram by locating its two letters as the row label and column label.
  2. Read off the cipher bigram printed in that cell.

A sliding paper strip lets the operator change the row alphabet rapidly, giving a polyalphabetic flavour to long messages. Decryption reverses the lookup.

The demo above builds a deterministic 26×26 Slidex card from your seed and substitutes plaintext bigrams accordingly. Odd-length messages are padded with X (the standard Slidex convention).

💀How It Was Broken
Bigram frequency analysis
Complexity: Routine — days of traffic suffice

A bigram cipher with a fixed daily card is essentially a monoalphabetic substitution on the 676-symbol bigram alphabet. The bigrams TH, HE, IN, ER are extremely common in English; identifying just the top few collapses the cipher quickly. German Y-Service units routinely read tactical Slidex within hours of intercept.

Stereotyped tactical traffic
Complexity: Trivial when message templates are predictable

“Wilco out”, “roger over”, position reports with grid references, fixed call-signs — tactical traffic is full of cribs. Slidex relied on the message being obsolete by the time the cipher was broken, not on resisting analysis.

🔬What It Teaches Modern Cryptography
Slidex lessonModern echo
Cryptographic strength is a function of how long the secret mattersModern “forward secrecy” — yesterday’s key shouldn’t decrypt tomorrow’s traffic
Tactical cipher ≠ strategic cipherDifferent threat models for ephemeral vs long-lived data
Paper crypto for non-specialist usersModern “one-glance” safety: emoji codes, SAS pairing, QR-key exchange
Stereotyped templates leak structureWhy protocol designers obsess over removing predictable headers (HTTP/2 HPACK)
Quick Facts
OriginRoyal Signals, United Kingdom
YearIn service 1943 – late 1950s
MechanismBigram substitution from a printed grid + sliding strip
UseTactical voice and morse traffic; never strategic
SuccessorBATCO (Battle Code) from late 1950s
← Previous Zimmermann Telegram