A one-clause extract from the
New Zealand Radiocommunication
Regulations With interpretation demonstrating the compliance of Enigma-encrypted transmissions.
Quoting directly from the New Zealand Radiocommunication Regulations (General User Radio Licence for Amateur Radio Operators) Notice 2013 Clause 5 (4) Communications must not be encoded for the purpose of obscuring their meaning, except for control signals by the operators of remotely controlled amateur stations. It can be seen that only the word encoded appears in the context of interest, which by accepted definition refers to the act of converting a string of letters, numbers or symbols (presumably originating from plain text) into a data stream, most often in a digital or pseudo-digital format. The quoted clause lacks any other useful detail, is at best ambiguous and at worst obsolete. The word 'encryption', whereby plain text is converted into cypher text [with or without digital encoding] is conspicuous by its absence. Logically therefore, encryption is permitted because it is not excluded, but because nothing what-so-ever is stated about such encypherment, one is left to guess whether cypher text needs to be decypherable at all. It seems to depend upon whether the author of the legislation understood the definitions of the two very different uses and functions of those notionally secretive methodologies at the time of writing the Bill for (presumably) consideration by a Select Committee before being enacted into Law. Enigma encryption and recovery of plain text is simple compared to (say) SSTV, where not only are frequency-shifted tones used to convey data, but even special visible-data capture and display devices are needed. The simplicity of Enigma is further proven by all the necessary decryption resources being provided in software, despite there being no Law prohibiting encryption and nothing to indicate the requirement for decryption resources, either in hardware or software, should encryption be used. A further critical ambiguity exists in the wording of the regulation surrounding the use of control signals for remotely controlled amateur stations, which are specifically permitted. But there is no mention of the identical genre of signals used for controlling IRLP nodes via amateur radio/repeaters. Since such tones are not directly controlling remote amateur stations, but instead control computers, are they therefore illegal? Documentation is publicly available detailing some, but certainly not all, DTMF tone-control functions used for IRLP computer control. Fortunately, most amateur operators identify themselves and state the purpose of their DTMF-tone encoded transmissions, but not all. Ergo, encoded transmissions without any possibility of being decoded to reveal their function, legitimate or otherwise, are regularly heard on the amateur bands without any known detrimental effect. It appears therefore that under present regulations, (since no encoding of text or symbols has taken place), neither decoding nor decryption utilities need be provided for Enigma transmissions. Despite the above conclusion, this website, along with those either linked to or quoted, provide all the facilities needed to decrypt any Enigma-encrypted message which has been transmitted by this station and those corresponding, thereby stopping dead in its tracks any proposition that the purpose of the Enigma encryption was to intended to obscure the meaning of the plain text. Instead, it can easily be seen that its purpose was simply to raise historical interest and increase the range of skills and disciplines employed by amateur radio operators with a penchant for communication in Vail, Morse or whatever other interrupted CW-type codes he wishes within the allocated bands. Because on any given day, both outgoing and incoming Enigma traffic will by default always use the key from the same dated row on the same key page, traffic may be decrypted as soon as any listener desires, in conjunction with the free utilities downloadable from the websites mentioned. Any traffic up to twelve months old (assuming it was received and copied down correctly at the time) may still be decrypted by referring to the key page archive. Therefore uncoded amateur transmissions from this station remain compliant with the appropriate New Zealand Radiocommunication Regulations because they have not been encrypted with any intent to obscure their meaning: anyone wishing to read them is quite able and entitled to do so. Only the mode of encryption is rare compared to any other mode of encryption or encoding regularly in use on the amateur bands today. It is obviously INTENDED by this author that by providing the data necessary to perform decryption, contemporary Enigma-encrypted transmissions to and from this station may be broken quickly without let or hindrance. In fact, even if the information (provided here) was either not provided at all or was intentionally suppressed, through use of today's ubiquitous computing power, the machine settings could be discovered within minutes, providing ad hoc software is also used. Thus it can be demonstrated that Enigma encryption, as a security or obscuring protocol, is well past its use-by date and can no longer be considered a secure cypher in any sense of the word. Except for the wiring, battery and incandescent lamps, the original Enigma machine processes were entirely mechanical and required a great deal of slow manual input, often employing three operators, each attending to a different function. Even with the Virtual Enigma Machine (thanks to the award winning freeware EnigmaSim program by Dirk Rijmenants) there is, not unexpectedly, considerable keyboard input required, retaining the mode's authenticity with its characteristic slowness and difficulty, compared to doing the same thing with other forms of digital/analogue coding, e.g. PSK31, SSTV, RTTY, or indeed any other 'modern' non-voice mode. While Enigma cannot be decrypted in real time, the most obvious similarity between it and all other such modes is that either special hardware, or the downloading and installation of ad hoc software is mandatory for decoding them, otherwise they all remain unreadable to the casual listener. Conforming to the expected standards of good amateur radio operator practice for transmissions, outgoing encrypted Enigma traffic from this station consists only of civil and so-called inconsequential comments (conforming entirely with the Regulations), in exactly the same way as amateur voice communications should. Obviously no such guarantee can be given, or responsibility taken, for incoming traffic. The URL of this website, and therefore the de facto provision of all necessary tools for decrypting Enigma, is sent in the closing protocol of each message: 'DECRYPT ENIGMA WWW.ZL3TK.TK' immediately before the standard handover protocol).
|
| Home
| Key pages | Key page structure |
Key page archive |
Principles & links | |
All Copyrights and Trademarks remain
the property of their respective owners. |
![]() |