- 1. Overview
- 2. Etymology
- 3. Cultural Impact
The Enigma-M4: A Four-Rotor Machine and the Kriegsmarine’s Illusions of Security in World War II
The Enigma-M4 (also known, perhaps with a touch of German efficiency, as Schlüssel M, or more precisely, Schlüssel M Form M4) stands as a testament to both ingenious engineering and a profound, if ultimately fatal, overestimation of its own impregnability. This rotor key machine entered service for the German Kriegsmarine for encrypted communication from October 1941, becoming a central, albeit temporary, player in the cat-and-mouse game of wartime cryptography.
What set the Enigma-M4 apart from its predecessors, such as the Enigma-M3 and the ubiquitous Enigma I favored by the German Army and Air Force, or even the more obscure Enigma-G used by German secret services, was its distinctive four-rotor configuration. Unlike the three-rotor systems that had characterized earlier models, the M4 incorporated an additional rotor, a seemingly minor alteration that dramatically amplified its cryptographic strength. This enhancement rendered its encryption significantly more robust, presenting a formidable challenge to Allied codebreakers and ensuring that it remained unbroken for a considerable period, a “blackout” that would have dire consequences for Allied shipping. The Germans, in their meticulous pursuit of secrecy, had inadvertently created a beast that would require unprecedented efforts to tame.
Previous History
The German Wehrmacht , in its entirety, relied heavily on the rotor cipher machine known as the Enigma to encrypt its classified communications. However, this reliance wasn’t uniform; various branches adopted different models tailored to their specific operational needs and perceived security requirements. While the Army (Heer) and Air Force (Luftwaffe) predominantly utilized the Enigma I , the Navy (Kriegsmarine ) opted for a series of specialized Enigma-M models, collectively and simply referred to as “Schlüssel M” (Key M).
The fundamental distinction between the Navy’s machines and the Enigma I lay in the number of selectable rotors. The Enigma I allowed operators to choose three rotors from a pool of five. This seemingly modest selection offered a total of 5 × 4 × 3 = 60 possible initial rotor arrangements, a combinatorial complexity that, while respectable for its time, would eventually prove insufficient against determined adversaries.
The Kriegsmarine , ever mindful of the vast, exposed expanses of the ocean and the critical importance of secure communication for its dispersed naval units, began with the Enigma-M1 . This model increased the available rotor assortment to six (designated I through VI), from which three were inserted into the machine. This immediately doubled the combinatorial complexity to 6 × 5 × 4 = 120 possible rotor positions. The subsequent Enigma-M2 further expanded this selection, adding yet another rotor to the pool, resulting in a total of seven available rotors. This pushed the number of possible rotor layers to 7 × 6 × 5 = 210. By the outbreak of the war, the Navy was employing the Enigma-M3 , which boasted an impressive eight rotors (I through VIII) from which three were chosen. This increased the combinatorial possibilities to 8 × 7 × 6 = 336 distinct rotor arrangements. While the M1 through M3 models consistently utilized only three rotors within the machine itself, the introduction of the M4 marked a significant paradigm shift: it incorporated four rotors side-by-side, a design choice intended to dramatically bolster its cryptographic security beyond that of its three-rotor predecessors.
The meticulous procedures for operating these machines, including the Enigma-M4, were precisely documented in the naval service regulation M.Dv.Nr. 32/1, a rather dry but utterly critical document titled “Der Schlüssel M – Verfahren M Allgemein” (Key M – Procedure M General). This manual laid out, with typical German thoroughness, the exact keying procedures to be followed.
Beyond the machine itself, a particularly vital aspect of the keying procedure, and indeed of any symmetric cryptosystem, was the pre-agreed cryptological key . Both the sender and receiver of an encrypted message had to possess not only identical machines but also identical settings. To facilitate this, top-secret key tables were distributed in advance to all authorized participants. To manage the immense scale and diverse operational requirements of the Kriegsmarine , numerous distinct key networks were established, mirroring similar structures in the Army and Air Force. Examples include Aegir for surface warships and auxiliary cruisers operating overseas, Hydra for coastal warships, Medusa for U-boats in the Mediterranean, as well as for battleships and heavy cruisers , and, most famously, Triton for the Atlantic submarines. These were not the only networks, but they illustrate the compartmentalization of naval communications. Initially, the Kriegsmarine relied exclusively on the Enigma-M3 for all these networks.
However, the relentless demands of war and the increasing sophistication of Allied intelligence soon highlighted the need for an even more secure communication channel. A dedicated, specially fortified key network was deemed essential for the elite units operating on the “Hohe See” (German for open sea or high seas). In October 1941, an official letter from the Oberkommando der Kriegsmarine (OKM), the High Command of the Navy, to the Commander of the Battleships, formally introduced the “Neptun key board” as a new, enhanced key system. This directive explicitly mandated the use of the Enigma-M4 for this purpose, a full four months before the M4 was deployed to the wider U-boat fleet. Significantly, unlike the Triton key network, Neptun remained unbroken by the Allies at that time, providing a brief, fleeting illusion of impenetrable secrecy for Germany’s most strategically important naval assets.
A closer inspection of the M4’s internal mechanism, with its rotors removed, reveals the thin reversing roller, adorned with its 26 contact plates, positioned on the left. The image of two Marine Enigma rotors poised for assembly underscores the precision required in their handling. Once fully inserted, the complete set of rotors is visible. On the far left, the slender FM C, affectionately dubbed “Caesar” (and indicated by its engraved “C-”), stands alongside one of the “Greek rollers.” This particular roller, while manually adjustable to any of 26 positions (A to Z), notably remains stationary during the actual scrambling process, a crucial distinction that contributed to the M4’s unique operational characteristics. The M4, stripped of its cover, presents a stark view of its fully inserted rotor set, a complex array of moving parts designed to confound any prying eyes.
Structure
The fundamental construction of the Enigma-M4, while sharing a lineage with the Enigma I , incorporated several distinctive features. The most salient difference, and indeed its defining characteristic, was the presence of four rotors (also known as Walzen or stepping wheels) in contrast to the three found in its predecessors. These four rotors were not arbitrarily chosen; they were selected from a specific assortment: eight standard rotors (I to VIII) plus two additional, specially designed “thin” rotors. The standard rotors I to V were carried over from the Enigma I , while rotors VI to VIII were familiar from the Enigma-M3 . The two new, “thin” rotors, however, were an innovation specifically for the Enigma-M4. Their reduced thickness was a direct consequence of the Navy’s pragmatic desire to retain the existing machine housing from the Enigma I and Enigma-M3 . This engineering constraint meant that the space previously occupied by a single, standard (thick) reversing roller now had to accommodate both a new, thin reversing roller and the newly added thin fourth rotor.
These thin rotors, in a departure from the traditional Roman numerals used for the standard rotors, were designated by Greek letters : “β” (Beta ) and “γ” (Gamma ). While they could each be manually rotated to one of 26 possible positions, a critical operational distinction was that, unlike rotors I to VIII, they did not advance or “step” during the automatic encryption process. This fixed nature within the messaging cycle meant they contributed to the initial setup complexity but not to the dynamic permutation generation during typing.
Intriguingly, the internal wiring diagram of the entry roller and the eight standard rotating rotors (I to VIII) within the Enigma-M4 remained identical to those found in the Enigma I and Enigma-M3 . The innovation truly lay with the two non-rotating thin rotors, “Beta” and “Gamma,” and their equally slender counterparts, the two new reversing rollers (UKW – Umkehrwalze) named “Bruno” and “Caesar.” The wiring of these thin rotors and reversing rollers was ingeniously conceived: the combination of a specific thin reversing roller with its “matching” thin rotor (i.e., Bruno with Beta, or Caesar with Gamma) was designed to produce precisely the same involutory character permutation as the thicker reversing rollers B and C of the Enigma I and Enigma-M3 when used alone. This clever design choice was driven by the practical necessity of ensuring backward compatibility with earlier systems, allowing for a seamless transition or even interoperability under specific conditions. The primary operational requirement for this compatibility was that the Spruchschlüssel (message key) of the U-boats commenced with the letter “A”. This ensured that the leftmost cylinder was in the exact rotational position needed to function identically with its paired UKW as the corresponding UKW of the other Enigma models.
Much like the civilian Model-D, the M4’s keys and lamps were arranged in a familiar QWERTZU layout, a design chosen for its ease of use for operators accustomed to standard typewriters. However, there were minor adjustments: the letters P and L were subtly shifted to the edges of the bottom row, deviating slightly from the pure QWERTZU standard. In contrast to other specialized models, such as the Model-D, Model-K, or Model-T, the Enigma-M4 offered no direct support for numerical input on its keyboard. Similarly, special characters, which were sometimes found on models like the Model-G, were not provided. This meant that all messages, including numerical data or punctuation, had to be rendered purely in letters, a constraint that added another layer of operational procedure.
To mitigate the inherent verbosity introduced by this letter-only constraint and to enhance data compression , the Navy implemented standardized signal groups (typically four letters) and relied heavily on phrases from pre-distributed codebooks , such as the Kurzsignalheft (Short Signal Booklet) and the Wetterkurzschlüssel (Weather Short Key). These resources allowed for the efficient encoding of common reports and meteorological data using purely alphabetic sequences.
When the cover of the Enigma-M4 is closed, the “Greek roller,” positioned behind the left-hand roller window, becomes almost indistinguishable from the other rotors from an external perspective, a subtle concealment of one of the machine’s most distinctive features. A detached photo shows the “thin” reversing roller B, also known as “Bruno,” nestled in the roller box of an M4 alongside several other rotors, providing a clear illustration of its unique, slender profile.
Operation
Operating the Enigma-M4 was a meticulously choreographed process, with the full setting of the key divided into distinct “outer” and “inner” key parts. This division reflected a clear hierarchy and compartmentalization of responsibility within the Kriegsmarine . The “inner key” encompassed the critical selection of the specific rotors, their initial rotational positions, and their ring settings. These sensitive adjustments could only be performed by a commissioned officer, who was authorized to unlock and open the machine’s housing, carefully select, configure, and arrange the rotors according to the day’s secret instructions. Once the inner settings were complete, the officer would re-secure the Enigma and then entrust it to the radio operator.
The radio operator, in turn, was responsible for the “external key settings.” This involved the crucial task of inserting the ten pairs of plugs into the plug board (Steckerbrett) located on the front panel of the M4, meticulously following the daily key sheet. After securing the front flap, the operator would then manually rotate the four visible rotors to their designated starting positions. While the inner settings, being more fundamental to the machine’s configuration, were typically changed only every two days, the external settings, particularly the plug board and initial rotor positions, demanded a daily refresh. This key change often occurred at 12:00 D.G.Z. (“Deutsche Gesetzliche Zeit” – German legal time), meaning that for U-boats operating far off the American east coast, the change would happen early in their local morning, adding a layer of logistical complexity to their already perilous missions.
The precise key settings were disseminated via highly classified “key boards” (Schlüsselbretter), which, like the operational procedure itself, were bifurcated into internal and external settings. An example of a key board intended for the officer, detailing the inner settings, might appear as follows, illustrating the level of detail and precision demanded:
Key M " T r i t o n "
Month: J u n e 1945 Test number: 123
Secret matter of command!
Key panel M-General
(Schl.T. M Allg.) Inner attitude
Change 1200 h D.G.Z.
|Months- | | | ayd | Inner attitude |
| 29. |B Beta VII IV V | | | A G N O |
| 27. |B Beta II I VIII | | | A T Y F |
| 25. |B Beta V VI I | | | A M Q T |
The excerpt above provides a snapshot of only a few days, presented in descending chronological order—a common practice designed to facilitate the easy and secure destruction of “used” codes from previous days. A similarly structured key board would be provided for the external key parts, guiding the radio operator.
Consider the example for June 27, 1945: the internal setting “B Beta II I VIII” dictated a precise sequence of actions for the officer. First, the thin reversing roller B (Bruno) was to be selected. Next, the non-rotating Greek roller Beta was set to its ring position A. Following this, rotor II was adjusted to ring position T, rotor I to ring position Y, and finally, rotor VIII, designated as the fast rotor on the far right, was set to ring position F. These rotors were then inserted into the machine in the specified order from left to right. With a practiced touch, the ring positions could even be adjusted on already installed rotors. Upon completion, the officer would lock the rotor cover, a final act of security, and present the M4 to the encryptor, who would then proceed with the external settings using their own set of documents.
The external settings key board, which the radio operator would use, was equally detailed:
Key M " T r i t o n "
Month: J u n e 1945 Test number: 123
Secret commando matter!
Key panel M-General
(Schl.T. M Allg.) External setting
Change 1200 h D.G.Z.
| Mon- | | Home - | | ths- | P l u g c o n n e c t i o n s | Posi- | | day | | tion |
| 30. |18/26 17/4 21/6 3/16 19/14 22/7 8/1 12/25 5/9 10/15 |H F K D | | 29. |20/13 2/3 10/4 21/24 12/1 6/5 16/18 15/8 7/11 23/26 |O M S R | | 28. |9/14 4/5 18/24 3/16 20/26 23/21 12/19 13/2 22/6 1/8 |E Y D X | | 27. |16/2 25/21 6/20 9/17 22/1 15/4 18/26 8/23 3/14 5/19 |T C X K | | 26. |20/13 26/11 3/4 7/24 14/9 16/10 8/17 12/5 2/6 15/23 |Y S R B |
A distinctive feature of the M4, as seen on its type plate, was the production code “aye” for Olympia Büromaschinenwerke in Erfurt, coupled with the year “44” (indicating 1944). For the M4, the sockets on the plug board were marked with numbers rather than letters, a slight deviation from some other Enigma models. The radio master was tasked with connecting these double-pole sockets using specialized double-pole cables. Typically, exactly ten cables were inserted, leaving six letters “unplugged” and thus unaffected by the plug board’s permutations. Unlike other branches of the Wehrmacht , the Navy’s plug connections were listed numerically, not alphabetically. To aid operators, the secret Naval service regulations M.Dv.Nr. 32/1, “Der Schlüssel M – Verfahren M Allgemein,” included a comprehensive conversion table:
| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 01 | 02 | 03 | 04 | 05 | 06 | 07 | 08 | 09 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 |
With the internal and external settings meticulously applied, the key operator would then rotate the four visible rotors to their designated starting positions. Only then, with every parameter correctly aligned, was the Enigma-M4 truly ready to embark on its task of encrypting or decrypting radio messages, a complex ritual repeated daily for every vital communication. The reel marked with the Roman numeral VI, a testament to the Navy’s unique requirements, proudly stands as one of the three reels developed exclusively for their specialized Enigma variants.
Key Room
The sheer magnitude of the Enigma-M4’s “key space” — the total number of unique, distinct settings possible — is a calculation derived from the combination of its four individual partial keys, each with its own array of possible configurations. This formidable key space, which the Germans believed to be virtually impenetrable, results from the product of the following four critical factors:
a) The Rotor Arrangement (Walzenlage): For the Enigma-M4, the selection process for the rotors was multi-tiered. Three rotors were chosen from a pool of eight standard rotors (I-VIII) for the rightmost three positions. Additionally, one of the two specialized “Greek” rotors (Beta or Gamma) was selected for the fourth, leftmost position, and one of the two thin reversing rollers (Bruno or Caesar) occupied the far-left slot. This intricate selection process yields a total of 2 × 2 × (8 × 7 × 6) = 1,344 possible rotor arrangements. In terms of cryptographic strength, this corresponds to a “key length ” of approximately 10 bit , a foundational layer of complexity.
b) The Ring Position (Ringstellung): Each of the two right-hand rotors could be set to one of 26 different ring positions. These ring settings altered the point at which the next rotor would step, contributing to the machine’s dynamic behavior. The rings of the two left-hand rotors, however, did not contribute to the enlargement of the key space in the same way, as the Greek rotor, by design, did not step. Therefore, the relevant contribution to the key space from ring positions amounts to 262 = 676 unique configurations. This factor adds approximately 9 bits to the overall key length.
c) The Roller Position (Grundstellung): Before encryption commenced, each of the four rotors had to be manually set to one of 26 initial positions. The reversing roller, being fixed, did not have an adjustable position. This yields a total of 264 = 456,976 possible starting roller positions. However, a subtle cryptographic redundancy exists: if the ring position is assumed to be known, 263 - 262 = 16,900 initial positions are considered cryptographically redundant. This leaves 440,076 unique and relevant roller positions, still corresponding to just under 19 bits of key length.
d) The Plug Connections (Steckerverbindungen): The plug board (Steckerbrett) allowed for a maximum of 13 plug connections, each swapping pairs of letters before and after the main rotor encryption. Calculating the number of possible plug connections is a combinatorial exercise. Starting with the case of zero connections (an empty board, counted as 1 possibility), for the first connection, there are 26 options for the first plug end and 25 for the second. Since the order of connecting the two ends doesn’t matter, this product is divided by 2, yielding (26 × 25) / 2 = 325 possibilities for the first cable. For the second, there are (24 × 23) / 2 = 276 possibilities, and so on. In general, for the n-th plug connection, there are (26 - 2n + 2) × (26 - 2n + 1) / 2 possibilities.
The total number of possible plug combinations when using multiple plugs is derived from the product of the possibilities for the individual plug connections. However, the order in which these connections are made is cryptographically irrelevant (e.g., plugging A to X then B to Y is equivalent to B to Y then A to X). Therefore, this product must be divided by n! (the factorial of n, where n is the number of plug connections) to account for these cryptographically equivalent sequences. The formula for the number of possibilities for exactly n plug connections is:
${\displaystyle {\frac {1}{n!}}\prod _{i=1}^{n}{\frac {(26-2i+2)(26-2i+1)}{2}};=;{\frac {26!}{2^{n}\cdot n!\cdot (26-2n)!}}}$
A table illustrates the rapid growth of these possibilities:
| Number of the plug-in connection | Opportunities for first page | Opportunities for second page | Options for plug-in connection | Exactly n plug-in connections | Up to n plug-in connections |
|---|---|---|---|---|---|
| 0 | 1 | 1 | 1 | 1 | 1 |
| 1 | 26 | 25 | 325 | 325 | 326 |
| 2 | 24 | 23 | 276 | 44,850 | 45,176 |
| 3 | 22 | 21 | 231 | 3,453,450 | 3,498,626 |
| 4 | 20 | 19 | 190 | 164,038,875 | 167,537,501 |
| 5 | 18 | 17 | 153 | 5,019,589,575 | 5,187,127,076 |
| 6 | 16 | 15 | 120 | 100,391,791,500 | 105,578,918,576 |
| 7 | 14 | 13 | 91 | 1,305,093,289,500 | 1,410,672,208,076 |
| 8 | 12 | 11 | 66 | 10,767,019,638,375 | 12,177,691,846,451 |
| 9 | 10 | 9 | 45 | 53,835,098,191,875 | 66,012,790,038,326 |
| 10 | 8 | 7 | 28 | 150,738,274,937,250 | 216,751,064,975,576 |
| 11 | 6 | 5 | 15 | 205,552,193,096,250 | 422,303,258,071,826 |
| 12 | 4 | 3 | 6 | 102,776,096,548,125 | 525,079,354,619,951 |
| 13 | 2 | 1 | 1 | 7,905,853,580,625 | 532,985,208,200,576 |
For the Enigma-M4, standard operating procedure dictated that exactly ten plug connections be made. According to the table, this yields an staggering 150,738,274,937,250 possibilities (over 150 trillion), which translates to approximately 47 bits of key length.
The cumulative key space of an Enigma-M4, accounting for the selection of three rotors from a stock of eight, one of two Greek rotors, one of two reversing rollers, and the use of ten plug connectors, is derived by multiplying the individual possibilities calculated in sections a) through d):
1,344 (rotor arrangements) × 676 (ring positions) × 439,400 (roller positions) × 150,738,274,937,250 (plug connections) = 60,176,864,903,260,346,841,600,000
This gargantuan figure, exceeding 6 × 1025 possibilities, corresponds to a theoretical key length of nearly 86 bits . On paper, such a key space appears immensely secure, a mathematical fortress. However, as any seasoned cryptanalyst (or someone who’s merely paid attention) will tell you, the size of the key space is merely a necessary, but by no means sufficient, condition for the actual security of a cryptographic method. Even a method as rudimentary as a simple monoalphabetic substitution cipher (using the same 26 letters as the M4) boasts a theoretical key space of 26! (factorial), which is roughly 4 × 1026 possibilities, corresponding to about 88 bits . This is, ironically, even slightly larger than the Enigma-M4’s key space. Yet, a monoalphabetic substitution is notoriously weak and can be trivially deciphered by anyone with a basic understanding of frequency analysis. The true strength of a cipher lies not just in its raw complexity, but in its resistance to known attacks and, critically, in the discipline of its operators.
Deciphering
The relentless pursuit of the Enigma began with the outbreak of the war, as British cryptanalysts at Bletchley Park , a sprawling, secretive estate approximately 70 kilometers (43 miles) northwest of London , dedicated themselves to the monumental task of deciphering the Enigma ’s intricate messages.
Their primary weapon in this intellectual war was a specialized electromechanical marvel known as the Turing bomb . Invented by the brilliant English mathematician Alan Turing , these machines were designed to systematically search for and determine the valid daily keys. The bombs required “probable words” — known or highly suspected text passages that would appear in the plaintext of the intercepted messages, often referred to as “cribs ”. The cryptanalysts at Bletchley Park shrewdly exploited a key weakness in German operational security: their meticulous adherence to routine. German radio operators, in their thoroughness, frequently included predictable phrases and recurring patterns in their routine messages, such as daily weather reports. These predictable elements proved invaluable as cribs . With the aid of the Turing bomb and these operational insights, the British codebreakers achieved their first major breakthrough in January 1940, successfully deciphering radio messages encrypted by the Luftwaffe, and subsequently, those of the German Army.
However, the encryption method employed by the Kriegsmarine , the Schlüssel M, proved to be a far more formidable adversary, demonstrating significantly greater resistance to decryption attempts. Even the Enigma-M3 , with its three rotors, was inherently more difficult to break than the Enigma I used by the Luftwaffe and Army. This enhanced resilience was attributed not only to the Navy’s use of a larger pool of rotors (eight to choose from, compared to the Army’s five) but also, crucially, to a particularly sophisticated Verfahren zur Spruchschlüsselvereinbarung (message key agreement procedure) that the Navy had implemented. The British codebreakers finally managed to penetrate the Schlüssel M in May 1941, a pivotal moment in the Battle of the Atlantic. This breakthrough was precipitated by the audacious capture of the German U-boat U-110 on May 9, 1941, by the British destroyer HMS Bulldog . The capture yielded not only an intact Enigma-M3 machine but also all the crucial secret documents, including the vital codebooks and the double-letter exchange boards, providing Bletchley Park with the Rosetta Stone they desperately needed.
A particularly agonizing period for the British, often referred to as a “black-out,” occurred when the Enigma-M3 was replaced by the four-rotor M4 in the U-boat fleet on February 1, 1942. This new procedure, known to the Germans as Schlüsselnetz Triton and to the British as “Shark” (German: “Hai”), remained unbroken for a grueling ten months. This period, ironically dubbed the “Second Happy Time ” by U-boat sailors, saw German U-boats achieve devastating successes against Allied shipping, causing immense losses and threatening to sever Britain’s vital supply lines. The “Shark” cipher was not finally broken until December 1942. This critical breakthrough followed another daring naval action: the British destroyer Petard’s engagement with the German U-boat U-559 in the Mediterranean Sea on October 30, 1942. U-559 was subsequently boarded in a desperate salvage operation, resulting in the capture of invaluable secret key documents, including the Kurzsignalheft (short signal booklet) and Wetterkurzschlüssel (weather shortcut key). These captured materials provided Bletchley Park with the definitive insights needed to overcome the Enigma-M4 and, crucially, the Triton network. Initially, however, deciphering these messages still took several days, which inevitably reduced the immediate tactical value of the intelligence.
From 1943 onwards, American ingenuity dramatically accelerated the decryption effort. Under the leadership of Joseph Desch at the United States Naval Computing Machine Laboratory (NCML), based at the National Cash Register Company (NCR) in Dayton , Ohio , over 120 high-speed variants of the British bombes were produced by April 1943. These American machines were specifically optimized for tackling the M4. Agencies such as the Signal Security Agency (SSA), the Communications Supplementary Activity (CSAW), and the United States Coast Guard Unit 387 (USCG Unit 387) significantly alleviated the British burden of time-consuming daily key finding. They rapidly achieved routine and efficient breaks into the Triton network. From this point, the British largely ceded the M4’s key detection to their American allies and their swift Desch Bombes. By September 1943, deciphering M4 radio messages typically took less than 24 hours, transforming intelligence gathering. Even with complete decipherment, however, not all parts of a message were always immediately understandable, as position information was often “overcoded” using a special, additional procedure for enhanced protection. The Kriegsmarine had introduced this “address book procedure” in November 1941, adding yet another layer of complexity for the codebreakers.
On June 4, 1944, just days before D-Day, the capture of U-505 yielded another treasure trove of up-to-date key material: the Kurzsignalheft, Kenngruppenbuch (identification group booklet), and, most critically, the detailed instructions for the aforementioned address book procedure. This was the long-sought secret method for overcoding U-boat locations, a piece of the puzzle that had eluded the Allies. The intelligence haul from U-505 was considered to be on par with the pivotal captures from U-110 and U-559 , underscoring its immense value.
Throughout the entirety of the war, more than a million naval radio messages were ultimately deciphered within Hut 8 (Barrack 8) at Bletchley Park . This impressive feat covers the period from the autumn of 1941 until the unconditional surrender of the Wehrmacht in May 1945. With the notable exception of the “blackout” period between February and December 1942, the Allies largely maintained an uninterrupted capability to decipher these crucial communications, a strategic advantage that profoundly shaped the course of the Battle of the Atlantic and, by extension, the war itself. The identification group booklet, captured by the Americans from U-505 , stands as a tangible relic of this relentless cryptographic struggle.
Significance for the History of War
The successful decoding of the Enigma-M4 radio traffic was of immeasurable, indeed transformative, importance for Allied progress in U-boat warfare (Anti-Submarine Warfare, or ASW). The intercepted reports from German U-boats, meticulously detailing their precise positions, courses, and intentions, provided the Allies with an unprecedented and comprehensive strategic situation picture. This intelligence allowed Allied commanders to anticipate U-boat movements, reroute convoys, and direct hunter-killer groups with devastating precision.
U-boats often inadvertently betrayed their presence simply by transmitting radio telegrams, which could be detected and localized by radio direction finding (RDF) systems like Huff-Duff aboard Allied warships. Furthermore, technological advancements such as radar for radiolocation at sea and ASDIC (an early form of sonar ) for underwater sound detection provided crucial tactical tools for submarine hunting. However, none of these technologies, individually or collectively, offered the complete, predictive strategic overview that the deciphered radio transmissions provided. They were reactive tools; Enigma intelligence was proactive.
A direct and immediate consequence of the American decryption efforts, particularly against the M4, was the catastrophic sinking of eleven of the eighteen German Versorgungs-U-Boote (“Milchkühe” or “milk cows”) within just a few months in 1943. These crucial supply U-boats, designed to refuel and resupply other U-boats at sea, were the logistical lifeblood of the German Atlantic fleet. Their destruction crippled the operational reach and endurance of all Atlantic U-boats, forcing them to undertake the long, dangerous journey back through the Bay of Biscay to their bases on the French west coast for resupply. This significantly reduced their time on station and their effectiveness.
The intelligence derived from the M4 was particularly critical for the execution of Operation Overlord , the planned invasion of Normandy. It was paramount for the Allied leadership to possess the most comprehensive, up-to-date, and, above all, accurate intelligence picture possible. The capture of U-505 just two days before the planned D-Day (which ultimately occurred on June 6) sparked intense fears. Allied command worried that the Germans, upon learning of the capture, might immediately change their key procedures, potentially preventing the breaking of Enigma keys on the very day of the invasion. Such a disruption could have had catastrophic consequences for the invading forces. In reality, however, the Germans remained blissfully unaware of the breach. Consequently, the daily key for D-Day could be broken in less than two hours after midnight, thanks to the well-guessed crib “WETTERVORHERSAGEBISKAYA” (weather forecast Biscay) — a testament to both German predictability and Allied ingenuity. The invasion, against all odds and the Germans’ perceived secrecy, succeeded.
Long after the war, many German U-boat commanders, most notably the former chief of the B-Dienst (observation service) of the Kriegsmarine , remained stubbornly convinced that “their” four-rotor key machine was utterly “unbreakable.” The revelation in 1974, when British information conclusively proved the opposite, sent a genuine shockwave through the surviving community of U-boat veterans. Of the approximately 40,000 German submariners who served, around 30,000 never returned home from deployment, representing the highest loss rate of all German branches of the armed forces. This devastating human cost makes the M4’s compromise particularly poignant. The profound historical significance of the Enigma-M4 and its decryption is perhaps best encapsulated by a statement from former British Prime Minister Winston Churchill : “The only thing that really frightened me during the war was the U-boat peril.” (German: “Das einzige, wovor ich im Krieg wirklich Angst hatte, war die U-Boot-Gefahr.”) The M4 was at the heart of that peril.
Security Check
Despite the Germans’ unwavering confidence in their Enigma machines, a series of suspicious events, particularly the inexplicably high losses of U-boats, prompted internal investigations into the security of their cryptographic systems. A particularly revealing insight into these German deliberations, their procedures, conclusions, and subsequent countermeasures, can be found in a highly secret interrogation protocol, classified at the time as TOP SECRET “ULTRA.” This document, published immediately after the war on June 21, 1945, by the Allied (British-American) TICOM (Target Intelligence Committee ) at the Marine Intelligence School in Flensburg-Mürwik , records the statements of German naval officer Lt.z.S Hans-Joachim Frowein. From July to December 1944, Frowein had been specifically assigned to OKM/4 Skl II (Abteilung II der Seekriegsleitung – Naval Warfare Command, Department II) with the explicit task of investigating the security of the M4. The leading German cryptanalyst, Wilhelm Tranow , who was also interrogated in this context, elucidated the primary motivation for this urgent investigation: the alarmingly high rate of losses suffered by German U-boats, especially throughout 1943 and the first half of 1944. The German naval command found these losses inexplicable, particularly the recurring pattern of U-boats being sunk in very specific, often predicted, locations. This led to the harrowing, inescapable question: “Is the machine safe?”
To definitively answer this question, Frowein was seconded from Skl III to Skl II for a six-month period starting in July 1944, with a clear directive to conduct a thorough, independent investigation into the four-rotor Enigma’s security. He was allocated two other officers and ten men for this crucial task. Their investigations commenced with a rather bold, yet entirely necessary, assumption: that the enemy already possessed knowledge of the machine, including all its rotors, and that they had a suspected plaintext fragment (crib ) of 25 letters in length. The choice of this relatively short crib length was informed by their awareness that U-boat radio messages were often, by necessity, quite concise. The chilling conclusion of their internal investigation was that this assumed scenario – a known machine and a 25-letter crib – was indeed sufficient to deduce both the rotor positions and the plug board settings.
Frowein, in his post-war interrogation, was able to articulate in meticulous detail his thought processes and the methodologies he and his team had employed to unravel their own machine. Despite the fact that neither he nor any of his colleagues possessed prior experience in the cryptanalysis of complex key machines like the commercial Enigma, they had, within a mere six months, successfully “broken” the M4, at least in theory. What is truly remarkable, and perhaps a testament to the universality of cryptographic principles, is that the methods they independently developed bore striking similarities to those actually deployed by the British at Bletchley Park – a fact of which Frowein, of course, remained entirely ignorant at the time. As he further explained, he had also identified a critical vulnerability: his theoretical break-in method would be severely complicated if the left or middle rotor advanced during the span of the crib . This would necessitate numerous case distinctions in the cryptanalysis, potentially increasing the workload by a factor of 26, a computational burden they considered practically unacceptably high for any potential attacker.
Upon reviewing Frowein’s findings, the naval command concluded that while both the M3 and even the M4 were theoretically vulnerable to attack, this vulnerability would be significantly mitigated if the frequency of the middle rotor’s advance was sufficiently increased. Consequently, in December 1944, a directive was issued with immediate effect: only rotors featuring two transfer notches (specifically, one of rotors VI, VII, or VIII) were to be used as the right-hand (fastest) rotor. This measure, while intended to strengthen the machine against the newly recognized weakness, paradoxically more than halved the number of possible unique rotor positions (from 8 × 7 × 6 = 336 down to 7 × 6 × 3 = 126). This actually represented a weakening of the machine’s combinatorial complexity (a reduction by a factor of 3/8, or approximately 1.4 bit ), even as it was designed to counter the specific operational flaw Frowein had identified. A classic case of solving one problem while inadvertently creating or exacerbating another.
The Kriegsmarine , ever the diligent bureaucracy, also disseminated the results of this crucial security investigation to the other branches of the Wehrmacht . These other services, notably the Army and Air Force, continued to rely on the Enigma I , a machine cryptographically weaker than the M4, with only three cylinders and a resulting 60 possible rotor layers. According to Frowein’s statement in the TICOM report, the Heeresführung (Army High Command) was “astonished at the Navy’s view based on this investigation” (…the Army were astonished at the Navy’s view based on this investigation), a testament to the differing perspectives and perhaps a touch of inter-service rivalry even in the face of existential threat.
Timeline
The following chronological enumeration highlights some of the most pivotal dates in the operational history and ultimate compromise of the Enigma-M4:
- October 15, 1941: The “Neptune” key network is officially introduced for the Kriegsmarine’s battleships, marking the initial deployment of the M4 for these critical surface vessels. This was a significant step towards greater perceived security for high-value assets.
- November 1941: The “address book procedure” is implemented. This additional layer of encryption was designed specifically to conceal sensitive position information , adding another hurdle for Allied codebreakers, who would struggle with it for years.
- February 1, 1942: The M4 is now broadly introduced for the U-boat fleet, a move that plunges Allied intelligence into the “blackout” period. Initially, only the Greek rotor β (Beta ) is used, but even this limited deployment proves devastating.
- October 30, 1942: HMS Petard achieves a crucial victory, capturing the second edition of the Wetterkurzschlüssel (weather shortcut key) from the stricken U-boat U-559 . This capture provides invaluable data for cracking the M4.
- December 12, 1942: Bletchley Park finally succeeds in breaking into the Triton network, ending the agonizing ten-month “Second Happy Time” for German U-boats and restoring a critical intelligence advantage to the Allies.
- March 10, 1943: A third edition of the Wetterkurzschlüssel is introduced by the Germans, requiring renewed efforts from Allied cryptanalysts to incorporate the new changes into their decryption processes.
- July 1, 1943: The second Greek rotor, γ (Gamma ), is introduced into service, further diversifying the M4’s configuration and adding another layer of complexity for the codebreakers, though by this point, the Allies had a strong foothold.
- June 5, 1944: Just two days before D-Day , the capture of U-505 yields a treasure trove of current key material, including the Kurzsignalheft (short signal booklet), Kenngruppenbuch (identification group booklet), the address book procedure, and an intact M4 machine. This capture provides critical, up-to-the-minute intelligence.
The following table visually represents the periods of Allied success and failure in breaking the Schlüssel M:
| Year | J | F | M | A | M | J | J | A | S | O | N | D |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1939 | o | o | o | o | ||||||||
| 1940 | o | o | o | o | o | o | o | o | o | o | o | o |
| 1941 | o | o | o | o | # | # | # | # | # | o | # | # |
| 1942 | # | o | o | o | o | o | o | o | o | o | o | # |
| 1943 | # | # | o | # | # | # | # | # | # | # | # | # |
| 1944 | # | # | # | # | # | # | # | # | # | # | # | # |
| 1945 | # | # | # | # | # |
Legend: o No deciphering # Deciphering succeeds
The three distinct “gaps” (marked with ‘o’) in the Allies’ deciphering capability are particularly telling, each representing a period where German cryptographic innovation or operational changes temporarily regained an advantage:
- October 1941: The formation of “Triton” as a separate key network specifically for U-boats, initially still utilizing the Enigma-M3 , provided a brief respite from Allied decryption efforts.
- February 1942: The introduction of the M4 for U-boats ushered in the infamous “Second Happy Time,” a ten-month period during which the new four-rotor machine proved impervious to Allied efforts, until it was finally overcome in December of that year.
- March 1943: A new edition of the Wetterkurzschlüssel briefly disrupted Allied decryption, requiring Bletchley Park to re-establish their methods based on the updated codebook . However, by September 1943, M4 radio messages were typically being broken within 24 hours, demonstrating the Allies’ continually improving capabilities.
The production of the M4 commenced in 1941, primarily at the Konski & Krüger (K&K) production plant in Berlin . As the war intensified and demand grew, production was wisely outsourced to other locations from 1942 onwards, as detailed in the List of Enigma production codes. A substantial proportion (around 45%) of the M4’s production from 1942 was undertaken by Olympia Büromaschinenwerke AG in Erfurt . The available production figures paint a clear picture of this manufacturing effort:
| Year | Number K&K | Number Olympia |
|---|---|---|
| 1941 | 1011 | – |
| 1942 | 1450 | – |
| 1943 | 2238 | 300 |
| 1944 | 1500 | 2870 |
| 1945 | – | 800 |
This photo from March 1941, taken just under a year before the M4’s official entry into service on February 1, 1942, shows an Enigma-M3 still in use within the radio locker of U-124, a space that often doubled as the key room. Another image shows an M4, famously captured from the German submarine U-505 , equipped with the “Schreibmax,” an accessory that eliminated the laborious and error-prone task of manually reading the illuminated letter lamps.
Authentic Radio Message
To truly appreciate the intricate dance of encryption and decryption, one need only examine an authentic radio message. Consider a communication from Lieutenant Captain Hartwig Looks, commander of the German U-boat U-264 , encrypted with an Enigma-M4 on November 19, 1942, precisely during the critical “black-out” period for Allied intelligence. Prior to encryption, the radio operator carefully transcribed the message into “Enigma notation,” a standardized format, which he then painstakingly encrypted letter by letter using the M4. Finally, the resulting ciphertext was transmitted via Morse code .
Given that the Enigma machine could only encode uppercase letters, specific conventions were strictly adhered to. Numbers were written out digit by digit (e.g., “8” became “ACHT”), punctuation marks were replaced by designated letters (“Y” for comma, “X” for period), proper names were bracketed with “J” (e.g., “JLOOKSJ”), and important terms or letters were often doubled or even tripled to guard against misunderstandings or transmission errors over unreliable radio links. A further naval convention, distinct from the Army and Air Force, was the arrangement of the transmitted text into groups of four letters, whereas other branches used groups of five. These operational nuances, combined with the inherent brevity of many U-boat radio messages and the almost unavoidable spelling and transmission errors in real-world conditions, significantly complicated any attempts at statistical analysis-based deciphering.
A more detailed reconstruction of the plaintext reveals the context of the message:
By U-264 Hartwig Looks - Radio Telegram 1132/19 - Contents: During an attack by depth charge (ordnance)/water bombs we were pushed under water. The last enemy location we detected was at 8:30 o’clock in naval square AJ 9863 (51°33′00″N 41°34′59″W / 51.550°N 41.583°W / 51.550; -41.583 (Enigma-M4 radio message U-264 Looks on November 19, 1942)), heading 220 degrees, speed 8 knot . We are joining. Weather data: barometric pressure 1014 millibar falling. wind from north-northeast, strength 4. Visibility 10 nautical miles .
This was then shortened for transmission efficiency to:
From Looks - FT 1132/19 - Contents: Pressed under water during attack, Wabos. Last enemy position 0830 hrs Mar.-Qu. AJ 9863, 220 degrees, 8 nm. Push to. 14 mb, falling. NNO 4. visibility 10.
The radio operator’s transcription into the specific four-letter groups, ready for Enigma input, would have looked like this:
vonv onjl ooks jfff ttte inse insd reiz woyy eins
neun inha ltxx beia ngri ffun terw asse rged ruec
ktyw abos xlet zter gegn erst andn ulac htdr einu
luhr marq uant onjo tane unac htse chsd reiy zwoz
wonu lgra dyac htsm ysto ssen achx eins vier mbfa
ellt ynnn nnno oovi erys icht eins null
After being processed through the Enigma-M4 with its daily settings, the resulting ciphertext, including any minor spelling and transcription errors that inevitably occurred in the heat of battle, was:
NCZW VUSX PNYM INHZ XMQX SFWX WLKJ AHSH NMCO CCAK
UQPM KCSM HKSE INJU SBLK IOSX CKUB HMLL XCSJ USRR
DVKO HULX WCCB GVLI YXEO AHXR HKKF VDRE WEZL XOBA
FGYU JQUK GRTV UKAM EURB VEKS UHHV OYHA BCJW MAKL
FKLM YFVN RIZR VVRT KOFD ANJM OLBG FFLE OPRG TFLV
RHOW OPBE KVWM UQFM PWPA RMFH AGKX IIBG
This particular ciphertext was famously deciphered on February 2, 2006, by modern cryptanalysis projects, revealing the following key settings that would have been used on November 19, 1942:
Basic position and key: Rotor position: UKW Bruno-Beta-II-IV-I Ring position: AAAV Plug: AT BL DF GJ HM NW OP QY RZ VX Saying key: VJNA
With these settings, the deciphered text (again, with its original spelling and transcription errors, and formatted with breaks and spaces for readability) emerged:
von von j looks j hff ttt eins eins drei zwo yy qnns neun inhalt xx
bei angriff unter wasser gedrueckt y
wabos x letzter gegnerstand nul acht drei nul uhr mar qu anton jota neun acht seyhs drei y
zwo zwo nul grad y acht sm y
stosse nach x
ekns vier mb faellt y nnn nnn ooo vier y sicht eins null
At 232 characters (comprising 58 four-letter groups), this message is unusually long for a U-boat transmission and notably does not utilize either the Kurzsignalheft (short signal booklet) or the Wetterkurzschlüssel (weather abbreviation key). For instance, the detailed weather information (“Air pressure 1014 mb falling, wind north-north-east with 4 Bft, visibility 10 nm”) would typically have been condensed by a weather abbreviation (WKS) into a mere 8 characters, such as:
hrbw apeh
Instead, the operator chose to spell it out, resulting in a much longer sequence of 44 characters:
eins vier mbfa ellt ynnn nnno oovi erys icht eins null
This operational choice, while perhaps made for clarity or due to a lack of immediate access to the codebook , inadvertently provided a more extensive crib for any potential interceptors, highlighting the constant tension between operational convenience and cryptographic security.
Literature
- Arthur O. Bauer: Funkpeilung als alliierte Waffe gegen deutsche U-Boote 1939–1945. Self-published, Diemen Netherlands 1997, ISBN 3-00-002142-6.
- Friedrich L. Bauer : Entzifferte Geheimnisse. Methoden und Maximen der Kryptologie. 3rd, revised and expanded edition. Springer, Berlin u. a. 2000, ISBN 3-540-67931-6.
- Ralph Erskine, Frode Weierud: Naval Enigma – M4 and its Rotors. In: Cryptologia . Band 11, Nr. 4, 1987, p. 235–244, doi:10.1080/0161-118791862063.
- Stephen Harper: Kampf um Enigma. Die Jagd auf U-559. Mittler, Hamburg 2001, ISBN 3-8132-0737-4.
- OKM : Der Schlüssel M – Verfahren M Allgemein. Berlin 1940. cryptomuseum.com (PDF; 3,3 MB)
- Joachim Schröder: Folgenschwerer Fund – Der „Fall" U 110 und die sensationelle Erbeutung der „Enigma". In: Clausewitz – Das Magazin für Militärgeschichte, Heft 1, 2015, p. 56–61.
- Hugh Sebag-Montefiore : Enigma – The battle for the code. Cassell Military Paperbacks, London 2004, ISBN 0-304-36662-5.
External links
Wikimedia Commons has media related to Enigma M4.
Wikimedia Commons has media related to Enigma.
Look up enigma in Wiktionary, the free dictionary.
Details
- Enigma M4 in Crypto Museum.
- Schlüssel M4 Photo gallery and explanations of the M4 and accessories.
- The History of Hut Eight 1939 – 1945 by A. P. Mahon.
- Die verschiedenen Arten von U-Boot-Funksprüchen (PDF, 378 kB) , Excerpts from the book by Arthur O. Bauer.
- The pinch from U 559 , Capture of the weather short key and the short signal booklet.
Documents
- Der Schlüssel M (PDF; 3,3 MB) , Scan of the original 1940 regulation at the Crypto Museum.
- Doppelbuchstabentauschtafeln Password: “Source”.
- Doppelbuchstabentauschtafeln Password: “Sea”.
- Doppelbuchstabentauschtafel B Password: “River” (authentic spelling).
Decipherments
- Breaking German Navy Ciphers , modern decipherment of the M4.
- M4 Message Breaking Project , modern decipherment of the M4.
- Allied Breaking of Naval Enigma by Ralph Erskine.
Exhibits
Photos, videos and audios
- Foto of a “Greek roller” Beta (β) in the Crypto Museum.
- Video-Interview with Hartwig Looks (2003) for a convoy attack on YouTube (4 min 15 s).
Reproduction projects
Simulations of the M4