Is Your Security Navajo-Marine Grade?

Looking for an example of ironclad encryption? Then think back to when U.S. Marines deployed native Navajo-speakers to encrypt commands and reports.


7 July 2014

navajo

Looking for an example of ironclad encryption? Then think back about seven decades ago to World War II, the battle of the Pacific in particular. It was there that U.S. Marines deployed native Navajo-speakers to encrypt commands and reports on the battlefield.

In fact, just last month one of the last survivors of the original volunteer encryption unit passed on, as an article in the Economist points out. (You may recall the movie “Windtalkers,” with Nicolas Cage, which covered the subject.)

During war, knowing the enemy’s plan is crucial. One can anticipate future moves and counter them. Armies often devote enormous resources to code making and code breaking. But for these Navajo warriors, the task was fairly simple, and with their radio communications, they offered a long-term advantage to the U.S. war effort in the Pacific.

A Native Advantage for Encryption

The Japanese wanted badly to decrypt the communications — but were unable to. What did the code talkers do right? Here are some factors to consider:

  • Complex building blocks: The “verb-rich and adjective-poor” Navajo tongue is so complicated, that even to describe it requires special terminology. (A Navajo-to-English dictionary of the language is available here, courtesy of the U.S. Department of the Interior.)
  • Proprietary: Not only was Navajo virtually unknown outside of the tribe, it hadn’t even been committed to paper.
  • Super-hardened security: The Navajo cryptologists took their baffling (to outsiders) language and used it to create a unique code. Navajo words replaced common military terms: for instance, a fighter plane became a “hummingbird.” Even other Navajos couldn’t understand the code — forget about Japanese cryptologists.
  • Secrecy: The entire program was invisible to the outside world. The U.S. government belatedly acknowledged the contribution of the code talkers only after 1968, when the program was declassified.

The code talkers offered unbreakable encryption; but their methods were also more efficient, as the Economist points out. A command that might take, say, an hour to send and receive on the existing mechanical encryption systems took the code talkers just 40 seconds.

Lessons of Coding History

For you history buffs, here are some other examples of how encryption (and decryption) played decisive roles in World War II:

  • The father of modern computing, Englishman Alan Turing, broke the German military’s Enigma encryption system code. Some estimated that this action shortened the war by two years.
  • The U.S. Navy cryptologists discovered the Japanese navy planned to assault Midway Island. This advance warning allowed the U.S. fleet to prepare accordingly and win a decisive victory.
  • An encryption goof up caused serious problems for the U.S. Navy at the Battle of Leyte Gulf, and influenced its outcome.

Codes and code breakers have been with us for a long time — they will remain with us into the foreseeable future. Sometimes, they affect the very course of history. Moore’s law dictates (indirectly, at least) there will always be better and faster hacking capabilities coming. And as one of our experts notes: “Security is an arms race — you need to move or you will get left behind.”



Marc Songini

Marc Songini

Marc Songini has worked in the information technology field for more than 16 years. His roles have included those of journalist, analyst, and marketing communications specialist. He admits that when he started out as a cub high tech reporter, Netscape was still rocking the industry with a wondrous new user interface called a “browser.” During his 10 years with International Data Group (IDG), Marc wrote for NetworkWorld and Computerworld, both award-winning magazines. Marc specializes in cloud, enterprise apps, and figuring out the meaning of being human in an automated world.