The Battle of Advantage between Stealing and Decrypting the German Naval Enigma Key in the Battle of the Atlantic (1940-1941)

Authors

  • Hangyu Liang

DOI:

https://doi.org/10.62051/1ny8bm98

Keywords:

World War II; Enigma cipher machine; Battle of the Atlantic; Cryptanalysis; Intelligence; Utilitarianism; Deontology.

Abstract

In the early years of World War II, German Navy used Enigma to encode messages and prevent their intelligence by Allies. This work considers advantages of stealing and technically decrypting the German Naval Enigma key during the Battle of Atlantic from 1940-41; while Allies had already succeeded in decrypting the German Army Enigma prior to the war. The complexities of Naval Enigma introduced new challenges. Yet British codebreakers persisted with technological decryption — an approach they adopted following their earlier successes. However, details embedded within Naval Enigma plus changes implemented by Germans stood as obstacles against their progress. Solving the encryption required more than what had been previously done. This led them to take an unconventional path: stealing materials related to Enigma. This decision was resource-intensive but it paid off quickly in yielding results that were more practical and morally justifiable than pure decryption efforts made until then. The successful thefts like that which took place during the Lofoten Islands raid and in May 1941 when German ships were captured provided critical Enigma keys and quickened decryption, allowing Allies to obtain valuable intelligence, reroute convoys, and better address the U-boat threat. The work concludes that from a utilitarian perspective stealing Enigma materials was morally justified because it minimized Allied casualties. It also notes that the non-malicious intentions behind theft conformed to deontological principles, underscoring the ethical standing of British actions vis-a-vis Germans'. Ultimately, the British strategy of technological decryption combined with thefts led decisively to turning the tide against Nazis during Battle of Atlantic: hence this paper investigates whether we might perhaps say they were acting ethically (even if illegally) by stealing Enigma-related material.

Downloads

Download data is not yet available.

References

G. Bateman, The Enigma Cipher Machine, American Intelligence Journal 5 (1983) 6-7.

R.A. Ratcliff, How statistics led the Germans to believe Enigma secure and why they were wrong: Neglecting the practical mathematics of cipher machines, Cryptologia 27(2) (2003) 119-131.

J. Wilcox, Solving the Enigma History of the Cryptanalytic Bombe, National Security Agency, Fort George G. Meade, Md, 2006, pp. 7-18.

K. Gaj, A. Orłowski, Facts and Myths of Enigma: Breaking Stereotypes, in: Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 2003, pp. 106-122, 110-111.

D. Kahn, Codebreaking in World Wars I and II: The Major Successes and Failures, Their Causes and Their Effects, The Historical Journal 23(3) (1980) 629-639.

G.M. Bateman, The Enigma Cipher Machine, American Intelligence Journal 5 (1983) 7.

D. Kahn, Codebreaking in World Wars I and II: The Major Successes and Failures, Their Causes and Their Effects, The Historical Journal 23(3) (1980) 629.

S. Gao, Er zhan zhong de mi ma zhan [The Code War in World War II], China Academic Journal Electronic Publishing House, Beijing, n.d.

S. Singh, The Code Book: The Science of Secrecy from Egypt to Quantum Cryptography, first ed., Anchor Books, New York, 2000.

R.A. Ratcliff, How Statistics Led the Germans to Believe Enigma Secure and Why they were Wrong: Neglecting the Practical Mathematics of Cipher Machines, Cryptologia 27(2) (2003) 119-131.

D.W. Davies, The Bombe: A Remarkable Logic Machine, Cryptologia 23(2) (1999) 108-138.

Z. Liu, Di er ci shi jie da zhan qing bao shi [History of World War II Intelligence], Jie fang jun chu ban she, Beijing, 2009, p. 189.

S. Singh, The Code Book: The Science of Secrecy from Egypt to Quantum Cryptography, first ed., Anchor Books, New York, 2000, pp. 176-177.

Z. Liu, Di er ci shi jie da zhan qing bao shi [History of World War II Intelligence], Jie fang jun chu ban she, Beijing, 2009, p. 190.

S. Singh, The Code Book: The Science of Secrecy from Egypt to Quantum Cryptography, first ed., Anchor Books, New York, 2000, p. 177.

Z. Liu, Di er ci shi jie da zhan qing bao shi [History of World War II Intelligence], Jie fang jun chu ban she, Beijing, 2009, p. 193.

S. Budiansky, Battle of Wits: The Complete Story of Codebreaking in World War II, Simon & Schuster, New York, 2000, p. 158.

S. Budiansky, Battle of Wits: The Complete Story of Codebreaking in World War II, Simon & Schuster, New York, 2000, pp. 158-159.

H. Hinsley, A. Stripp, Codebreakers: The Inside Story of Bletchley Park, first ed., Oxford University Press, Oxford, 2001, pp. 122-123.

J. Richelson, A Century of Spies: Intelligence in the Twentieth Century, Oxford University Press, New York, 1995, p. 192.

Z. Liu, Di er ci shi jie da zhan qing bao shi [History of World War II Intelligence], Jie fang jun chu ban she, Beijing, 2009, p. 193.

S. Singh, The Code Book: The Science of Secrecy from Egypt to Quantum Cryptography, first ed., Anchor Books, New York, 2000, p. 182.

L. Wu, Mi ma yu zhan zheng: Wuxian dian zhen cha ji qi zai di er ci shi jie da zhan Zhong de zuo yong [Cipher and War: Radio Reconnaissance and Its Role in World War II], Qun Zhong chu ban she, Beijing, 1984, p. 147.

D. Chalmers, What Do Philosophers Believe, Springer Science, New York, 2013, p. 16.

K. Kortenkamp, Ethics under Uncertainty: The Morality and Appropriateness of Utilitarianism When Outcomes Are Uncertain, The American Journal of Psychology 127(3) (2014) 367-368.

S. Singh, The Code Book: The Science of Secrecy from Egypt to Quantum Cryptography, first ed., Anchor Books, New York, 2000, p. 183.

M. Wu, En ni ge ma mi ma ji yin fa de gu shi er zhan zhong mi ma dui lei zhan ji shi [The Enigma Cipher Machine: A Chronicle of Cryptographic Battles in World War II], China Academic Journal Electronic Publishing House, Beijing, n.d., p. 13.

L. Wu, Mi ma yu zhan zheng: Wuxian dian zhen cha ji qi zai di er ci shi jie da zhan Zhong de zuo yong [Cipher and War: Radio Reconnaissance and Its Role in World War II], Qun Zhong chu ban she, Beijing, 1984, p. 83.

S. Singh, The Code Book: The Science of Secrecy from Egypt to Quantum Cryptography, first ed., Anchor Books, New York, 2000, p. 178.

S. Singh, The Code Book: The Science of Secrecy from Egypt to Quantum Cryptography, first ed., Anchor Books, New York, 2000, p. 179.

J. Richelson, A Century of Spies: Intelligence in the Twentieth Century, Oxford University Press, New York, 1995, p. 193.

Downloads

Published

29-08-2024

How to Cite

Liang, H. (2024). The Battle of Advantage between Stealing and Decrypting the German Naval Enigma Key in the Battle of the Atlantic (1940-1941). Transactions on Social Science, Education and Humanities Research, 12, 346-354. https://doi.org/10.62051/1ny8bm98