JN-25 is the name given by code-breakers to the main, most secure, communications scheme used by the IJN during World War II. Named as the 25th Japanese Navy system identified, it was initially called AN-1 as a "research project" rather than a "current decryption" job. The project required reconstructing the meaning of thirty thousand code groups and piecing together thirty thousand random additives. Introduced from 1 June 1939 to replace Blue (and the most recent descendant of the Red code) it was an enciphered code, producing five-numeral groups for transmission. New code books and
super-enciphering books were introduced from time to time, each new version requiring a more or less fresh cryptanalytic attack.
John Tiltman with some help from
Alan Turing at
Government Communications Security Bureau (GCSB) had broken JN25 by 1941. They knew that it was a five-digit code with a codebook to translate words into five digits and there was a second "additive" book that the sender used to add to the original numbers. Knowing this did not enable them read a message. By April 1942 JN25 was about 20 percent readable and code-breakers could read "about one in five words";
traffic analysis was far more useful. Tiltman had devised a (slow; neither easy nor quick) method of breaking it and had noted that all the numbers in the codebook were divisible by three. "Breaking" rather than "solving" a code involves learning enough code words and indicators so that a message can be read. JN-25 was significantly changed on 1 December 1940 (JN25a) and again on 4 December 1941 (JN25b) just before the
attack on Pearl Harbor. British, Australian, Dutch and American cryptanalysts co-operated on breaking JN-25 well before the Pearl Harbor attack but because the Japanese Navy was not engaged in significant battle operations before then, there was little traffic available to use as raw material. IJN discussions and orders could generally travel by routes more secure than broadcast, such as courier or direct delivery by an IJN vessel. Publicly available accounts differ but the most credible agree that the JN-25 version in use before December 1941 was not more than perhaps 10 per cent broken at the time of the attack, and that primarily in stripping away its super-encipherment. JN-25 traffic increased immensely with the outbreak of naval warfare at the end of 1941 and provided the cryptographic "depth" needed to substantially break the existing and subsequent versions of JN-25. The American effort was directed from Washington, D.C. by the U.S. Navy's signals intelligence command,
OP-20-G; the Navy Combat Intelligence Unit (
Station HYPO, at Pearl Harbor, also known as COM 14) was commanded by Commander
Joseph Rochefort. In 1942 not every cryptogram was decoded, as Japanese traffic was too heavy for the undermanned Combat Intelligence Unit. With the assistance of
Station CAST (also known as COM 16, jointly commanded by Lts Rudolph Fabian and John Lietwiler) in the Philippines and the British
Far East Combined Bureau in Singapore. Using a
punched card tabulating machine manufactured by
International Business Machines, a successful attack was mounted against the 4 December 1941 edition (JN25b). Together they made considerable progress by early 1942.
"Cribs" exploited common formalities in Japanese messages, such as "I have the honor to inform your excellency" (see
known plaintext attack). New versions of JN-25 were introduced: JN-25c from 28 May 1942, deferred from 1 April then 1 May; providing details of the attacks on Midway and Port Moresby. JN-25d was introduced from 1 April 1943, and while the additive had been changed, large portions had been recovered two weeks later, which provided details of Yamamoto's plans that were used in
Operation Vengeance, the shooting-down of his aircraft. ==JN-39==