Slidex British WWII tactical bigram cipher card
A piece of paper, a sliding strip, and a daily key card — the cipher that secured British platoon traffic from Normandy to Burma.
Why This Matters
Slidex was the British answer to a problem every WWII army faced: how do you encrypt platoon-level radio traffic without giving every signaller a fragile machine? The answer was a small printed card with a movable strip. The cipher was deliberately weak — it would not stop a serious cryptanalyst given a few days of traffic — but it was robust against an opponent who needed the message now, in the next 30 minutes, before the gunfire moved.
It was issued from 1943 onwards across the British and Commonwealth armies and saw heavy use in Normandy, Italy, and the Far East. The Germans broke it routinely; the Japanese had less success, but tactical traffic is by its nature obsolete within hours.
Each Slidex card carries a 17×17 grid (or 12×12 in some issues). The rows and columns are headed by mixed alphabets that change daily. Inside each cell is a printed bigram (e.g. “BT”, “QM”) drawn from a pool of 289 distinct two-letter combinations. To encrypt:
- Find your plaintext bigram by locating its two letters as the row label and column label.
- Read off the cipher bigram printed in that cell.
A sliding paper strip lets the operator change the row alphabet rapidly, giving a polyalphabetic flavour to long messages. Decryption reverses the lookup.
The demo above builds a deterministic 26×26 Slidex card from your seed and substitutes plaintext bigrams accordingly. Odd-length messages are padded with X (the standard Slidex convention).
A bigram cipher with a fixed daily card is essentially a monoalphabetic substitution on the 676-symbol bigram alphabet. The bigrams TH, HE, IN, ER are extremely common in English; identifying just the top few collapses the cipher quickly. German Y-Service units routinely read tactical Slidex within hours of intercept.
“Wilco out”, “roger over”, position reports with grid references, fixed call-signs — tactical traffic is full of cribs. Slidex relied on the message being obsolete by the time the cipher was broken, not on resisting analysis.
| Slidex lesson | Modern echo |
|---|---|
| Cryptographic strength is a function of how long the secret matters | Modern “forward secrecy” — yesterday’s key shouldn’t decrypt tomorrow’s traffic |
| Tactical cipher ≠ strategic cipher | Different threat models for ephemeral vs long-lived data |
| Paper crypto for non-specialist users | Modern “one-glance” safety: emoji codes, SAS pairing, QR-key exchange |
| Stereotyped templates leak structure | Why protocol designers obsess over removing predictable headers (HTTP/2 HPACK) |
| Origin | Royal Signals, United Kingdom |
| Year | In service 1943 – late 1950s |
| Mechanism | Bigram substitution from a printed grid + sliding strip |
| Use | Tactical voice and morse traffic; never strategic |
| Successor | BATCO (Battle Code) from late 1950s |