2.4 The Navajo Code

✐
✐
“crypttext” — 2017/3/27 — 9:18 — page 22 — #30
✐
22
✐
CHAPTER 2. SUBSTITUTION CIPHERS
7. A description of cryptanalysis of Playfair ciphers can be found in U.S.
Army Field Manual 34-40-2 [28]. Find a copy of this manual, and
write a summary of how it describes Playfair cipher cryptanalysis.
8. Find some information about two-square and four-square ciphers, and
write a summary of your findings.
9. Find some additional information about the Beale ciphers, and write
a summary of your findings.
2.4
The Navajo Code
While simple substitution ciphers are not very secure, and even ciphers
such as Playfair that substitute for digraphs can be broken through a type
of frequency analysis on longer ciphertexts, not all ciphers based on substitution alone are easy to break. The Navajo code, a cipher famously created
by Native Americans, primarily from the Navajo Nation that occupies a
large region of Utah, Arizona, and New Mexico, and used effectively by
the Americans throughout the Pacific Campaign during World War II, was
essentially a substitution cipher. The Navajo language was at the time exclusively oral, very complex, and unknown to virtually everyone outside the
Navajo Nation. The idea of using Navajos basically speaking their native
language as a means for encrypting messages originated in 1942 with a man
named Philip Johnston. Having grown up the son of a missionary to the
Navajo, Johnston was very familiar with the Navajo culture, and was one
of only a handful of non-Navajos who spoke the Navajo language fluently.
Johnston was a veteran of World War I, where he may have seen Native
Americans, specifically from the Choctaw Nation, encrypting messages for
the U.S. Army basically by speaking their native language. More likely,
Johnston first read of the use of Choctaw by the U.S. Army during World
War I shortly after the Japanese attack on Pearl Harbor that thrust the
U.S. into World War II. Whatever the origin of his idea, Johnston recruited
four Navajos to demonstrate to a group of U.S. Marine officers how they
could quickly and flawlessly translate English messages into the Navajo
language, communicate these messages to each other via radio, and then
translate these messages back into English. Convinced of the potential
of the Navajo language, the Marines ordered a pilot project in which an
eight-week communications training course was completed by a group of
29 Navajos, who became the original Navajo code talkers. A graduation
picture from this training course is shown in Figure 2.1 on page 23.
Before this training course could commence, the Marines had to figure
out a way to overcome a problem that had plagued attempts at using Native
American languages as a means for encrypting messages during World War
✐
✐
✐
✐
✐
✐
“crypttext” — 2017/3/27 — 9:18 — page 23 — #31
✐
2.4. THE NAVAJO CODE
✐
23
Figure 2.1 Graduation picture of the original Navajo code talkers.
I—many military words, for example, SUBMARINE and DIVE BOMBER, had
no translatable equivalent in Native American languages. To overcome this
problem, the Navajo trainees decided that they would indicate such military
words using literal English translations of things in the natural world for
which they had Navajo translations. For example, the word SUBMARINE was
given the literal English translation IRON FISH, which was translatable in
the Navajo language as BESH-LO. A few examples of military words and
some other words, the literal English translations of these words used by
the Navajo code talkers, and the Navajo translations, or code words, of
these literal translations are shown in Table 2.2 on page 24.
An encoded phonetic alphabet was also created so less common English
words to be translated one letter at a time. Individual letters in such words
were also indicated by literal English translations of things for which translations existed in the Navajo language, and then the words were encoded
one letter at a time using the Navajo translations. The individual letters,
the literal English translations of these letters used by the Navajo code
talkers, and the Navajo translations of these literal translations are shown
in Table 2.3 on page 25. Multiple translations were used for most letters
to increase the difficulty of attacking the code using frequency analysis.
By the conclusion of World War II, the full Navajo code included approximately 800 code words. A list of the code words in the full code can
be found at https://www.history.navy.mil/research/library/online-readingroom/title-list-alphabetically/n/navajo-code-talker-dictionary.html [21].
✐
✐
✐
✐
✐
✐
“crypttext” — 2017/3/27 — 9:18 — page 24 — #32
✐
24
✐
CHAPTER 2. SUBSTITUTION CIPHERS
English word
ABANDON
AMERICA
ASSAULT
BATTALION
BRITAIN
CAPTAIN
DIVE BOMBER
GERMANY
ORDER
SAILORS
SUBMARINE
THE
Literal translation
RUN AWAY FROM
OUR MOTHER
FIRST STRIKER
RED SOIL
BETWEEN WATERS
TWO SILVER BARS
CHICKEN HAWK
IRON HAT
ORDER
WHITE CAPS
IRON FISH
BLUE JAY
Navajo code word
YE-TSAN
NE-HE-MAH
ALTSEH-E-JAH-HE
TACHEENE
TOH-TA
BESH-LEGAI-NAH-KIH
GINI
BESH-BE-CHA-HE
BE-EH-HO-ZINI
CHA-LE-GAI
BESH-LO
CHA-GEE
Table 2.2 Navajo code words for selected English words.
Example 2.8 Consider the plaintext THE DIVE BOMBER SANK THE SUBMARINE. The English word SANK was translated in Navajo one letter at
a time. Thus, by Tables 2.2 and 2.3, one possible ciphertext of Navajo code
words for this message is CHA-GEE GINI DIBEH TSE-NILL A-CHIN KLIZZIEYAZZIE CHA-GEE BESH-LO. The literal English translation of this ciphertext
is BLUE JAY CHICKEN HAWK SHEEP AXE NOSE KID BLUE JAY IRON FISH.
!
Example 2.9 Consider the ciphertext of Navajo code words BESHLEGAI-NAH-KIH WOL-LA-CHEE LIN BE-LA-SANA TOISH-JEH KLIZZIE BELA-SANA A-KEH-DI-GLINI AH-NAH CHA-GEE BE-EH-HO-ZINI. The literal
English translation of this ciphertext is TWO SILVER BARS ANT HORSE APPLE
BARREL GOAT APPLE VICTOR EYE BLUE JAY ORDER. By Tables 2.2 and 2.3,
the plaintext for this message is CAPTAIN AHAB GAVE THE ORDER.
!
The Navajo code was completely oral and never written down. As a result,
each code talker, of which there were more than 400 by the end of World
War II, had to know every code word by memory. This was not difficult for
the Navajos, though, since their language had never had a written script.
William McCabe, one of the original 29 code talkers, noted: “In Navajo,
everything is in the memory—songs, prayers, everything. That’s the way
we were raised.”
The speed, accuracy, and security of the Navajo code proved it highly
successful. Messages that would have taken hours to encrypt or decrypt
using rotor machines like the Enigma were encrypted or decrypted in just
minutes using the Navajo code. Just as importantly, the Navajo code is not
known to have ever been broken, and it played a critical role in the American
success in the Pacific Campaign during World War II. U.S. Major Howard
Connor, 5th Marine Division signal officer at Iwo Jima, noted: “Were it
✐
✐
✐
✐
✐
✐
“crypttext” — 2017/3/27 — 9:18 — page 25 — #33
✐
25
2.4. THE NAVAJO CODE
Letter Literal
Code word
A
ANT
WOL-LA-CHEE
A
APPLE
BE-LA-SANA
A
AXE
TSE-NILL
B
BADGER
NA-HASH-CHID
B
BARREL
TOISH-JEH
B
BEAR
SHUSH
C
CAT
MOASI
C
COAL
TLA-GIN
C
COW
BA-GOSHI
D
DEER
BE
D
DEVIL
CHINDI
D
DOG
LHA-CHA-EH
E
EAR
AH-JAH
E
ELK
DZEH
E
EYE
AH-NAH
F
FIR
CHUO
F
FLY
TSA-E-DONIN-EE
F
FOX
MA-E
G
GIRL
AH-TAD
G
GOAT
KLIZZIE
G
GUM
JEHA
H
HAIR
TSE-GAH
H
HAT
CHA
H
HORSE
LIN
I
ICE
TKIN
I
INTESTINE
A-CHI
I
ITCH
YEH-HES
J
JACKASS
TKELE-CHO-GI
J
JAW
AH-YA-TSINNE
J
JERK
YIL-DOI
K
KETTLE
JAD-HO-LONI
K
KEY
BA-AH-NE-DI-TININ
✐
Letter
K
L
L
L
M
M
M
N
N
N
O
O
O
P
P
P
Q
R
R
R
S
S
T
T
T
U
U
V
W
X
Y
Z
Literal
KID
LAMB
LEG
LION
MATCH
MIRROR
MOUSE
NEEDLE
NOSE
NUT
OIL
ONION
OWL
PANT
PIG
PRETTY
QUIVER
RABBIT
RAM
RICE
SHEEP
SNAKE
TEA
TOOTH
TURKEY
UNCLE
UTE
VICTOR
WEASEL
CROSS
YUCCA
ZINC
Code word
KLIZZIE-YAZZIE
DIBEH-YAZZIE
AH-JAD
NASH-DOIE-TSO
TSIN-TLITI
BE-TAS-TNI
NA-AS-TSO-SI
TSAH
A-CHIN
NESH-CHEE
A-KHA
TLO-CHIN
NE-AHS-JAH
CLA-GI-AIH
BI-SO-DIH
NE-ZHONI
CA-YEILTH
GAH
DAH-NES-TSA
AH-LOSZ
DIBEH
KLESH
D-AH
A-WOH
THAN-ZIE
SHI-DA
NO-DA-IH
A-KEH-DI-GLINI
GLOE-IH
AL-NA-AS-DZOH
TSAH-AS-ZIH
BESH-DO-TLIZ
Table 2.3 Navajo code words for alphabet letters.
not for the Navajos, the Marines would never have taken Iwo Jima.” The
Navajo code continued to be used successfully by the Americans in the
Korean War and in the early stages of the Vietnam War.
The dedication and loyalty of the Navajo code talkers was remarkable,
from their tireless work in making the code a success to their humility in
keeping the code and their role in its success a secret. Not until years
after the code was declassified in 1968 did the code talkers begin to receive
the recognition they so richly deserved. In 1982, President Ronald Reagan
signed a resolution declaring August 14 National Navajo Code Talkers Day.
On July 26, 2001, President George W. Bush presented the original 29
code talkers the Congressional Gold Medal, the highest civilian award in
the United States. Four of the five surviving original code talkers were in
attendance.
✐
✐
✐
✐
✐
✐
“crypttext” — 2017/3/27 — 9:18 — page 26 — #34
✐
26
✐
CHAPTER 2. SUBSTITUTION CIPHERS
2.4 Exercises
1. For the plaintext in Example 2.8, use the part of the Navajo code in
Tables 2.2 and 2.3 to find two ciphertexts different from the one in
this example, and give the literal English translation of each.
2. Repeat Exercise 1 using the plaintext in Example 2.9.
3. For the following plaintexts, use the part of the Navajo code in Tables 2.2 and 2.3 to encrypt the plaintext, and give the literal English
translation of the resulting ciphertext.
(a) ABANDON HOPE.
(b) AMERICA THE BEAUTIFUL
4. For the following ciphertexts, which were formed using the Navajo
code, use Tables 2.2 and 2.3 to give the literal English translation,
and decrypt the ciphertext.
(a) NA-AS-TSO-SI BE-LA-SANA BE DZEH YEH-HES TSAH TOH-TA
(b) TSIN-TLITI TSE-NILL CHINDI AH-NAH TKIN A-CHIN BESH-BECHA-HE
5. For the following plaintexts, use the full Navajo code given in [21] to
encrypt the plaintext, and give the literal English translation of the
resulting ciphertext.
(a) TANK AMMUNITION DEPLETED.
(b) POSITIVE ON AERIAL RECONNAISSANCE
6. For the following ciphertexts, which were formed using the Navajo
code, use the full Navajo code given in [21] to give the literal English
translation, and decrypt the ciphertext.
(a) AL-TAH-JE-JAY DIBEH SHI-DA GAH TKIN NA-HASH-CHID WOLLA-CHEE MOASI TSE-GAH YEH-HES AH-DI HA-YELI-KAHN
(b) KLESH NO-DA-IH AH-LOSZ A-CHI SHUSH BE-LA-SANA TLA-GIN
LIN TKIN BIN-KIE-JINH-JIH-DEZ-JAY UT-ZAH-HA-DEZ-BIN
7. Use the full Navajo code in [21] to encrypt a plaintext of your choice
with at least four words for which Navajo code words existed and at
least two words that were translated in Navajo one letter at a time.
8. Find some information about efforts by Carl Gorman to obtain recognition for the Navajo code talkers, and summarize your findings.
9. Find some information about the Cherokee, Choctaw, and Comanche
code talkers used by the U.S. military, and summarize your findings.
✐
✐
✐
✐