Professional Documents
Culture Documents
Ulug Kuzuoglu Chinese Cryptography: The Chinese Nationalist Party and Intelligence Management, 1927-1949
Ulug Kuzuoglu Chinese Cryptography: The Chinese Nationalist Party and Intelligence Management, 1927-1949
Ulug Kuzuoglu Chinese Cryptography: The Chinese Nationalist Party and Intelligence Management, 1927-1949
net/publication/324372100
CITATIONS READS
0 470
1 author:
Ulug Kuzuoglu
Washington University in St. Louis
7 PUBLICATIONS 4 CITATIONS
SEE PROFILE
All content following this page was uploaded by Ulug Kuzuoglu on 31 August 2021.
Ulug Kuzuoglu
To cite this article: Ulug Kuzuoglu (2018): Chinese cryptography: The Chinese Nationalist Party
and intelligence management, 1927–1949, Cryptologia
none defined
ABSTRACT KEYWORDS
This paper is the first scholarly attempt to examine the history Chinese cipher machines;
of Chinese cryptography and the role it played in building the Chinese codebooks; Chinese
intelligence network of the Chinese Nationalist Party (KMT) from cryptography; Chinese
Nationalist Party;
1927 to 1949. Rather than investigating the institutional
intelligence networks; KMT;
structure of intelligence, I focus on Chinese characters, the Zhang Yanxiang
primary medium that made cryptology and intelligence
possible. Given that the Chinese writing system is by nature
nonalphabetic and thus noncipherable, how did cryptography
work in Chinese? How did the state and its scientists reengineer
Chinese characters for the purposes of secret communication?
This paper argues that due to the Chinese writing system itself,
Chinese cryptography was bound to the use of codebooks
rather than ciphers; thus, “codebook management” was central
to building intelligence networks in China.
continued the information war against the CCP during the Civil War
(1946–1949). During these two decades of incessant security crises, was it true
that one could get the Chinese codebook in any post office?
Chinese cryptography has not received any scholarly attention in the
literature, despite well-documented histories of intelligence networks in China
(Yu 1996; Wakeman 2003; Kahn 2004; Yu 2008). Frederick Wakeman,
Yu Maochun, and David Kahn have all immensely contributed to our knowl-
edge of the KMT’s intelligence history, but none of them tackled the technical
issue concerning the nature of cryptography with Chinese characteristics.
Cryptography in world history—be it the Caesar Cipher, the Vigenère Cipher,
or Al-Kindi’s cryptanalysis—by definition relies on the technology of the
alphabet (Kahn 1967; Singh 1999). It may be argued that Western cryptogra-
phy, including Arabic cryptography, would not exist in the form of ciphers
(i.e., alphanumerical substitutions of letters) if its linguistic system was not
alphabetical. How, then, did Chinese cryptography work given that the
Chinese writing system is quintessentially nonalphabetic? Was Chinese
cryptography so backward that the codebooks could be bought in any post
office? Or did the Chinese develop different methods of encryption, especially
during the information warfare of the 1930s and 1940s?
This article investigates the role of codes and cryptography in Chinese
information warfare during the 1930s and 1940s, and it discusses the
methods invented by Chinese cryptographers to come to terms with modern
cryptography. Works on the history of cryptography by and large exclude the
history of Chinese cryptography, partly because of the paucity of sources and
partly because of a mistaken belief that there is nothing to discuss. If it enters
the domain of world history at all, it does so only with reference to Western
cryptanalysts such as Herbert Yardley, who worked with the KMT’s head of
intelligence, Dai Li, from 1938 to 1940 as part of an effort to decipher
Japanese wartime communication (Kahn 2004, 187–198). The literature is
not any richer with regards to other East Asian countries, with the exception
of a recent scholarly contribution on Vietnamese cryptography by Hieu and
Koblitz (2017) and various publications on the Japanese Purple Cipher
Machine, which occupied an important place in the Pacific War (Prados
1995; Smith 2000). We also do not find any relevant works in the fields of
modern Middle Eastern, South Asian, or other non-Euro-American
cryptographies.
Chinese cryptography is a part of a history of modern Chinese information
sciences that has reflected the incongruence between a global alphabetical
infrastructure, imposed on China through the technology of the telegraph,
and a nonalphabetic Chinese writing system. As recent literature has demon-
strated, the historical development of Chinese information technologies has
followed a path that was intrinsically different from Euro-American models
of information sciences that were predetermined by the alphabet. Historical
CRYPTOLOGIA 3
1
There is indirect evidence in Vietnamese sources that the Chinese Communist Party as opposed to the KMT was
using strong double encryption methods. I would like to thank the anonymous reviewer of this article for pointing
this out. For more information on the exchange between the Viet Minh and the People’s Republic of China (PRC) in
the 1950s, see Hieu and Koblitz (2017).
4 U. KUZUOGLU
Zhou Enlai, the future premier of the People’s Republic of China (PRC),
formed the CCP’s first intelligence agency, the Special Department (teke),
in 1927, while Chen Lifu formed the Central Statistics Bureau (zhongtong;
CSB), the first intelligence unit of the KMT. Both intelligence webs were
sustained through codebooks.
Codebook management was not unique to China. Before the age of
mechanized cryptography, of which the German Enigma Machine and the
Japanese Purple Machine offer famous examples, codebooks were central
across the world to maintaining information security. But codebooks in China
were even more central to cryptography than in the West. The management
of secret communication in China was most of all the management of
codebooks, the loss of which required the printing and distribution of new
codebooks to reconnect the broken lines of communication. In 1943, for
instance, this was precisely what happened when the CCP seized one of the
KMT’s codebooks in Yanan. The KMT agents were using this codebook to
communicate with the Organization Department of the Central Executive
Commission, the Bureau of Investigation and Statistics, and the Ministry of
Propaganda, and the codebook’s loss required an immediate reshuffling of
the code-numbers to restore the secret flow of information (PHI 1943).
Moreover, maintaining secrecy through codebooks was a costly enterprise.
Not only did it demand trust in human agents—who could steal, copy, lose,
or sell the codebooks—but it was also economically not the most feasible
method of encryption. The codebooks’ constant redesign and redistribution
required time and money. Thus, the KMT operatives sought alternatives.
The third section of this article traces the transformation of cryptological
services during the Chinese Civil War (1946–1949). Although physical
codebooks were central to the management of secret communication,
intelligence and cryptology went through a major transformation with the
start of the civil war in 1946, when the intelligence technologies of the
KMT proved to be inadequate in processing valuable information. By order
of Generalissimo Chiang Kai-shek the Ministry of National Defense started
to work on cipher machines that would enable greater speed and complexity
by applying a second layer of encryption. Even though these analog machines
could not overcome the limits imposed by Chinese characters and codebooks,
they represented an important stage in the mechanization of Chinese
cryptography that continued during the decades ahead and found new footing
with the introduction of binary code.
Figure 1. Viguier’s Dianbao xinshu 電報新書 (The New Telegraph Codebook), 1872.
CRYPTOLOGIA 7
2
The first telegraph codebook in 1871 was slightly different, and the character xin 信 corresponded to 0230.
8 U. KUZUOGLU
(ren mi 仁密), Dong Code (dong mi 東密), and Yong Code (yong mi 雍密)
among others.5
Although Plain-Cipher was the dominant cryptographic method, it was not
the only one. For international communication an alphabetical interface was
used for coding messages, both for economic and cryptographic purposes. In
1903 the London Telegraph Conference defined the regulations for the use of
plain, code, and cipher languages in telegraphic communications and allowed
the transmission of any pronounceable ten-letter word as one word. As long
as each artificial word could be pronounced in one of the authorized
languages (i.e., German, English, Spanish, French, Dutch, Italian, Portuguese,
and Latin), a ten-letter word could be transmitted for the price of one word
(Twisaday and Neilson 1904, 14–15). A fragment of the KMT’s secret
communication with Japan in 1918 shows that a condensing table was devised
to recode the four-digit numbers as pronounceable words (see next page).
According to this condensing table, the alphabetical code for 2514 was
“caze,” 2894 was “dite,” 1129 was “zude,” 0668 was “yuni,” and 3634 was
“gufe.” Five Chinese characters could thus be coded as two words—cazeditezu
deyunigufe—which saved money and added an extra layer of security to the
transmission of messages. In sending a coded text, the telegram would start
5
PHI, Yiban dang’an [General Archives], yiban050/5.32, “Yong mi dianmaben, 1923/9”; yiban050/5.33, “Dong mi
dianmaben, 1922/6”; yiban050/5.35, “Cheng mi dianmaben, 1922/6”; yiban050/5.3, “Ren mi dianmaben, 1913/4.”
10 U. KUZUOGLU
64 Sixtyfourth
u o i e a
x 01 02 03 04 05
y 06 07 08 09 10
z 11 12 13 14 15
b 16 17 18 19 20
c 21 22 23 24 25
d 26 27 28 29 30
f 31 32 33 34 35
g 36 37 38 39 40
h 41 42 43 44 45
j 46 47 48 49 50
k 51 52 53 54 55
l 56 57 58 59 60
m 61 62 63 64 65
n 66 67 68 69 70
p 71 72 73 74 75
q 76 77 78 79 80
r 81 82 83 84 85
s 86 87 88 89 90
t 91 92 93 94 95
v 96 97 98 99 00
with the number of the table (in this case 64) and then continue with
cazeditezu deyunigufe.6
Even though lettered encryption proved to be useful for international com-
munication, Plain-Cipher was the most widely used method domestically,
because even for alphabetical interfaces a codebook was still necessary to
decipher what cazeditezu deyunigufe, or “2514 2894 1129 0668 3634,”
indicated. Furthermore, the translation of numbers into characters or
characters into numbers produced fewer mistakes than the threefold
translation among characters, numbers, and letters. Alphabetical interfaces
were again introduced with the mechanization of cryptography, but even then
codebooks were still the building blocks of encrypted communication.
built (Wakeman 2003, 272–273; Yu 2008, 203). From 1933 until his sudden
death in 1946, Dai Li was the central figure in KMT’s management of
intelligence.
For Dai Li the Special Services Unit was not simply for gathering
information. In a report he penned in 1934 on the activities of the Special
Services Unit, Dai Li defined espionage as the direct means to “construct a
psychology (jianshe xinli) through recuperating China’s inherent virtue
(guoyou zhi dexing), and turning the people’s minds toward the correct
revolutionary path (geming zhi zhenggui)” (AH 1934, 10:015a). Dai Li’s choice
of words was significant as the year 1934 was the start of the “New Life
Movement” (xin shenghuo yundong), Chiang Kai-shek’s initiative to reinvent
Chinese tradition, and discipline citizen behavior accordingly, through the
lens of a militarist and increasingly fascist ideology (Dirlik 1975; Culp 2006;
Ferlanti 2010; Tsui 2013). A return to “inherent” (guyou) customs, the
recuperation of an imagined “virtuous essence” (dexing), and the rectification
of the correct revolutionary path were the pillars of Chiang’s new regime,
which Frederick Wakeman has provocatively named “Confucian Fascism”
(Wakeman 1997). The Revival Society (fuxing she), under which the Secret
Services Unit worked, embodied in its name this essence of recuperating
and reviving ancient traditions. For Dai Li espionage was the most effective
way to achieve this end. Collecting information about the society was the first
step toward surveillance, control, and eventually the construction of a new
social psychology.
Dai Li did not mention in his letter the necessary mechanics of espionage
(i.e., operatives, radios, and codes), but he was already attending to them. Dai
Li quickly expanded his intelligence network of spies and secret communi-
cation technologies. There were two “great dangers” (da nan) threatening
the unity of China: Japanese imperialist occupation and the “flood of red
catastrophe” (chihuo zhi hengliu; i.e., the Communists; AH 1934, 10:28a).
By the end of 1934 an intelligence network (qingbao wang) was installed
throughout the nation. By 1938 the Secret Services Unit was in 67 different
locations in China. The major centers (qu 區), which were then divided into
smaller units (zhan 站 and zu 組), were in Nanjing, Shanghai, Wuhan,
Lanzhou (the only center in the northwest), Chuan-Kang (which connected
Chengdu, Guangdong, Hong Kong, Guangxi, Guizhou, Yunnan, and an
offshoot branch in Minbei), and Beiping (including parts of inner Mongolia
and Manchuria) (AH 002000001035A, “Special Intelligence,” 002-080102-
00034-006). The purpose of the Secret Services Unit was to collect intelligence
on important figures and their backgrounds, interests, commercial and polit-
ical connections, and attitudes toward the army, then secretly send reports
back to the headquarters (AH 148000000001A, “Development,” 10:46a).
The management of intelligence technologies, such as wireless radio
stations or encrypted messages, was of crucial importance yet difficult to
CRYPTOLOGIA 13
maintain. Dai Li and Wei Daming were building their own network of spies
and machines so as not to rely on Chen Lifu’s, but one of the immediate
problems they faced was the lack of wireless machines. The amount of
information exchanged between the undercover officers and the party cadre
was growing rapidly, yet the technical difficulties in wireless communication
caused miscommunication. Sometimes 20 to 30 characters out of 100 would
be incorrectly transmitted. When even one character could make a huge
difference, reported Dai, 30 percent entropy was simply unacceptable (ibid.,
10:19a). Starting in 1934 new wireless machines were built, new personnel
were trained, and small transponders were invented for field agents; in a
few years Dai Li’s intelligence network of humans, machines, and codes
occupied virtually every corner of the nation (AH 148000000001A,
“Development,” 10:20a; Wakeman 2003, 274). In 1938 there were 191 radio
stations (diantai 電台) established across China in the Secret Services Unit’s
quarters (AH 002000001035A, “Special Intelligence,” 002-080102-00034-006).
Codebooks remained as the fundamental means of maintaining infor-
mation security during the 1930s and 1940s. All communication between
government offices was conducted through the Plain-Cipher, and the KMT
was constantly changing the codes to ensure security. The Military Affairs
Commission’s Confidential Office (junshi weiyuanhui jiyao shi) determined
the design of the codebooks, and the Office of Bureaucracy (wenguan chu)
put them in use through informing each government office. In January
1937, for instance, the Office of Bureaucracy ordered each committee and
ministry to change the Tong Code 統密 and Yi Code 一密 to Sheng Code
勝密 and Li Code 利密, respectively (AH 001000004248A, “National
Government,” 001-043160-0001-076a). In July it ordered the change of
codebooks from Zhi Code 治密 to Min Code 民密. Then in August the
Military Affairs Commission ordered the government offices to abandon both
Zhi and Min Codes and employ Ting Code 霆密 instead (AH 001000004249A,
“National Government,” 001-043160-0002-043a). In September the Office of
Bureaucracy sent another order, this time asking the offices to use the Jian Code
建密 until October 15 and She Code 設密 after (AH 001000004250A, “National
Government,” 001-043160-0003-036x). A new order came in January 1938 to use
Mu Code 穆密 and Yong Code 雍密; another one in April to use Lin Code 麟密
and Jiao Code 角密; another in June for Xue Code 雪密 and Chi Code 恥密;
another in August for Wu Code 務密 and Zi Code 茲密; and so on (AH
001000004251A, “National Government,” 001-043160-0004-058a, 120a, 174a, 195a).7
The constant change of codebooks was necessary because even Plain-
Cipher telegraph codebooks were not that difficult to break. Plain-Cipher
7
Sometimes a new set of numbers would replaced the old numbers while changing page numbers. An order given
on 30 April 1939, for instance, demanded simply to replace “1234567890” with “3690142875,” which meant that
page number “21” would be replaced with “63,” “43” with “09,” and so on. See AH 001000004252A, “National
Government,” 001-043160-0005-152a.
14 U. KUZUOGLU
was based on the standard telegraph codebook, and even if numbers were
shuffled every page had a certain number and characters on that page were
still arranged according to a standard order. For example, the characters gang
港, xiang 湘, tang 湯, and yuan 源 were always on the same page, regardless of
the page number, because they all shared the same root radical, 氵(水). If the
number assigned for this page was 54, all these characters had to start with 54;
depending on the content, this could facilitate decoding a given message
(Zhang 1939, 2). In addition, any character on the same row or column would
share the same third or fourth digit. These were security concerns imposed by
the physical medium of the Plain-Cipher.
To overcome this problem, different kinds of codebooks were used for
different levels of secrecy. For ensuring secrecy at the highest level, for
example, indexing according to 214 radicals was abandoned and new indexing
schemes were employed to devise “special codebooks” (tezhong midian ben) in
which characters would be arranged according to a different indexing logic,
resulting in completely different numbers. During the 1920s and 1930s,
new methods of indexing Chinese characters was a fiercely debated topic,
and there were close to a hundred different indexing schemes invented to
replace the established practice of Kangxi’s 214 radicals (Ping 2014). The most
famous of these indices was the well-known “Four-Corner Numeral Index”
invented by Wang Yunwu, the owner of the Commercial Press, who relied
on numbers and corner-strokes to index Chinese characters (Wong 1928).
Highly popular, it was just one among many numerical indices, some of
which, the written evidence suggests, have been used for designing new code-
books.8 This, however, was again not immune to the general problem posed
by the physicality of codebooks. If a special codebook was seized by the
enemy, all of the secret communication (including past communication)
could be deciphered. Besides, when a codebook was taken out of operation
it was hard to receive back all the codebooks in circulation, leaving an open
door for the enemy to seize a codebook and decipher past communications.
Second, it was too difficult to manage all the codebooks at the same time.
If there were 100 different codebooks running simultaneously, it would be
difficult for the operators to manage all of them. Third, when a new codebook
was put in circulation it had to be physically delivered to a receiving party,
and it could never be known whether the codebook had been compromised
on the way. In short, although special codebooks were employed in practice,
the time, labor, and money put into devising them could prove to be
impractical (Yanxiang 1939).
An alternative was proposed by Zhang Yanxiang 張延祥, also known as
Jameson Y. Chang. Zhang was born in Zhejiang in 1900. He studied electrical
8
I was unable to locate an example of these specially engineered codebooks in the archives, but it is highly likely
that these codebooks used indexing methods that were similar to the numerical methods of indexing widely
discussed during the period under scrutiny (Yanxiang 1939, 2–3).
CRYPTOLOGIA 15
9
In the closing years of the Civil War, he worked especially with Westinghouse Electric Corporation to invent a
teletypewriter for cryptographic purposes. For his mention of teletypewriters, see, “Zhang’s Letter,” May 27,
1948, ibid., 0013a-0014a.
10
The approval was reproduced in Yanxiang 1939, n.p.
16 U. KUZUOGLU
Plaintext: 0123456789
Ciphertext for first number 1308249567
Ciphertext for second number 1452807693
Ciphertext for third number 1846970325
Ciphertext for fourth number 2057968134
Ciphertext for fifth number 2541783906
dian dian dian dian dian 7193 7193 7193 7193 7193
Divided into four groups 71937 19371 93719 37193
Encryption 54579 33615 72306 86841
Redivision into five groups (encrypted text) 5457 9336 1572 3068 684111
with “71937.” He then used a different ciphertext for each number. The
number “7” was thus enciphered as “5” according to “ciphertext for first
number,” “1” was enciphered as “4” according to “ciphertext for second
number,” and so on. After enciphering each of the four units composed of five
digits accordingly, he recombined the units and redivided them into five units
composed of four digits. The encrypted text thus became significantly
different than the plaintext.
It is difficult to gauge how widely Zhang’s One Hundred Million Secret Codes
was put to use during wartime, but given its simplicity and a couple of scattered
references to it in the archives, it is possible to assume that it was (AH
017000001858A, “An Example,” 6-21-09-05; Nanjing Number Two Archives,
“Official Document Concerning,” 5-1795(1)).12 Still, it did not replace the wide-
spread use of codebooks; although the increasing number of codebooks made
their management more troublesome, it also made it more difficult for the
enemy to decode them because messages were sent through different channels
and protected by different codes. However impractical or uneconomical these
codebooks seemed to be, they were the most important means of sustaining
the channels of communication during the war. In a report written in 1946
for the Ministry of National Defense’s Second Department (guofangbu di er
ting), an unidentified witness noted that he saw more than 900 different code-
books in the Ministry of National Defense, including standard codebooks and
special codebooks indexed in different ways (Nanjing Number Two Archives,
“Preserving Secrets in Communication,” 787-31, 5-1802).13
Given the widespread use of codebooks the entire system required a
continuous and tedious management of them, but this management began
losing efficacy after the Second World War. The KMT’s espionage network
and cryptography entered a new phase with the start of the Civil War between
11
Yanxiang 1939, 8. I changed Zhang’s example to dian (7193) to keep it simple.
12
Zhang Yanxiang also devised a “codebook of Chinese phrases (ziju dianmashu)” that was put in use during the war.
See AH 003000008514A, 003-010101-0603-0015x.
13
The witness also noted that chengyu codebooks were employed during the early years of the war. Chengyu code-
books were indexed according to combinations of characters instead of individual characters. For instance, “the
mayor of Chengdu” (chengdu shi shizhang) corresponded to one “word.” See Jiaotong bu bian, Chengyu dianma
[Chengyu Codebook] (1948), 424. This was similar to the codebooks used in Western languages, where certain
phrases were condensed to save time and money. The witness also wrote that there were long- and short-
numbered codes (changduan ma), but it is not clear what these codes looked like.
CRYPTOLOGIA 17
the Communists and the Nationalists, in which the KMT’s cryptanalysis and
cryptography were solely geared toward the CCP. Codebooks, the intelligence
officers came to realize, were not sufficient enough to ensure security; for the
first time the KMT started funding projects for cipher machines.
of Foreign Affairs Intelligence Unit (waijiaobu qingbao si), and the Military
Police Command (xianbing silingbu). The entire intelligence work was now
directed “against traitors and spies” (fangjian fangdie), referring to anyone
affiliated with the CCP. All intelligence units were now ordered to examine
the correspondence between the CCP and the Soviet Union, both in
and out of China (AH 002000001040A, “Comprehensive Examination,”
002-080102-00039-025).
Zheng Jiemin’s Second Department was the most powerful intelligence unit
of the KMT during the Civil War, but Zheng’s management of cryptological
information was not going well. According to a report on intelligence gather-
ing activities in 1946, there was little intelligence worth mentioning. Most of
the intelligence reports were received through the Technological Research
Office, which sent 15,174 reports, followed by the Security Bureau’s 8,209,
CBS’s 6,892, the Ministry of Foreign Affairs Intelligence Unit’s 1,181, and
the Military Police Command’s 781. When analyzed on a monthly basis, there
was a serious drop in the number of reports received from January to Decem-
ber 1946. In January the total number of reports was 3,444, and the amount
was highest in March with 3,729. But by December the amount had dropped
to 2,108 (AH 002000001040A, “Comprehensive Examination,” 002-080102-
00039-026). The Ministry of National Defense was not even receiving good
intelligence on the Soviet Union. Everything they received was either from
the Soviet consulates or Soviet “clubs,” so the information did not amount
to much (AH 002000001040A, “Comprehensive Examination,” 002-080102-
00039-025-005x). As for intelligence on the CCP, most of what they received
was official reports or publications of the CCP. When compared with the
intelligence gathering activities of the year before, there was no improvement
(AH 002000001040A, “Comprehensive Examination,” 002-080102-00039-
025-006x).
Cryptanalysis was not any better. Within the same year the cryptanalysis
group had intercepted a total of 117,475 messages in English, Japanese,
Russian, and Chinese, but deciphering them, even if possible, required more
human and machine power. Zheng Jiemin enumerated the problems as
follows: first, the machines they used to intercept and investigate the messages
were obsolete. For instance, if the other side was using a machine that sent
more than 800 words at a time, it was not possible to intercept those messages
with the KMT’s machines. Second, there was a general lack of sources on
cryptography, and this deficiency made it impossible to break into the
complicated Russian communication network. Finally, Zheng encountered
difficulties in recruiting personnel who could work with the Russian language
and technologies (AH 002000001930A, “General Sources,” 002-080200-
00541-061). To increase the quality of operations, use better wireless technol-
ogies, overcome logistical problems, and print new codebooks—in short, to
optimize intelligence gathering—Zheng Jiemin, on 7 February 1947,
CRYPTOLOGIA 19
Defense, the Second Department, the Office of Communication, and the Office
of War Industry—meticulously examined the methods for building such a
machine. The Ministry of National Defense funded his project to see further
results, and Huang, in official sources, is described as the inventor of the cipher
machine, although the archives remain silent about the details of the product
Conclusion
The 1930s and 1940s were critical decades in the history of the global infor-
mation wars. In China, with the widespread use of wireless radios for military
purposes, maintaining security over the channels of communication became a
primary concern for all sides involved in the war. The information war
between different sides was waged not only through human operatives and
wireless machines but also through codebooks. As such, the Chinese writing
system itself to a great extent shaped the trajectory of cryptology in China
because the design and redesign of the codebooks demanded effective and
creative methods to turn a nonalphabetic system into a medium of secrecy.
Cryptography was also a concern for the CCP. Even though this article has
largely examined intelligence management under the KMT, their eventual loss
of power raises a critical question: were the CCP’s cryptologic services superior
to the KMT’s? It is clear that the CCP used similar methods of encryption,
which is not surprising given the physical limitations imposed by Chinese char-
acters, but as this article points out, the KMT’s equipment was not sufficient to
decode the messages in a timely manner, especially during the Civil War (AH
002000000416A, “Documents on the Revolution,” 002-020400-00012-016-
001x). The CCP might have had better cryptanalytic equipment or stronger
double encryption during the Civil War, which might have contributed to its
victory. This, however, remains a subject that requires further scrutiny.
Chinese cryptography did not stop in 1949. On the contrary, Cold War
espionage increased the tension between the Republic of China (RoC) in
Taiwan and the People’s Republic of China (PRC). In Taiwan talented engi-
neers continued to work on cipher machines. Gao Zhongqin in particular
deserves brief attention. Gao was famous for his invention of IBM’s Chinese
Typewriter and Teletypewriter in 1946–1947, and in the ensuing decades he
became one of the fathers of Taiwanese computer technologies. In 1959 the
Ministry of National Defense proudly presented the cipher machine of Gao
Zhongqin. The details of the machine are not available in archival records,
but given Gao’s personal investment in the invention of a Chinese Teletype-
writer that used an electrical punch card to translate Chinese characters into
four-digit numbers and vice versa, one wonders whether Gao’s invention in
1959 might have been the first electric Chinese cryptography machine that
mechanized the numerical manipulation of codes. Whatever its composition
CRYPTOLOGIA 23
might have been, the cipher machine was purchased and approved by the US
Army in Japan, and the Ministry of Communication in Taiwan installed it
between Taipei and Tainan in January 1959 (AH 002-080102-00065-008,
“Brief Report”).16
The mechanization of Chinese cryptography signaled something greater.
Although cipher machines did not immediately change the means of inte-
gration between humans and machines through codes, it was the beginning
of a new era in which the physicality of codebooks no longer occupied the
same central place in the transmission of information. Eventually, as code-
books were replaced by analog machines and later by digital machines, the
nature of cryptology changed significantly. Soon binary code knitted the
world anew by integrating humans, computers, and codes, and the PRC
and the RoC assumed a new place in the world history of cryptography.
References
AH 001000003411A. “Yanjiu faming xunjiang” [Awards for merit in research and invention]
(1), 1939/12/05–1946/03/11, In Guomin zhengfu [National government], 00135100005089a.
AH 001000004248A. “Guomin zhengfu dianbao mima benlingfa” [National government’s
issue of telegraphic codes] (1), 1936/12/23–1937/07/26. In Guomin zhengfu [National
government], 001–043160-0001–076a.
AH 001000004249A. “Guomin zhengfu dianbao mima benlingfa” [National government’s
issue of telegraphic codes] (2), 1937/07/15–1937/09/24. In Guomin zhengfu [National
government], 001–043160-0002–043a.
AH 001000004250A. “Guomin zhengfu dianbao mima benlingfa” [National government’s
issue of telegraphic codes] (3), 1937/09/16–1938/01/31. In Guomin zhengfu [National
government], 001–043160-0003–036x.
AH 001000004251A. “Guomin zhengfu dianbao mima benlingfa” [National government’s
issue of telegraphic codes] (4), 1938/01/19–1938/11/02. Guomin zhengfu [National govern-
ment], 001–043160-0004–058a, 120a, 174a, 195a.
16
The principles of Gao’s typewriter can be found in AH 003000005507A, “Technical Materials.” After his first
public performance in New York, Gao started developing the typewriter into a teletypewriter. When he staged
a performance in Nanjing in August 1947, and in the famous Park Hotel in Shanghai in October, he presented
his invention both as a typewriter and a teletypewriter. See, Shijie (1947), 275–276.
24 U. KUZUOGLU
Boyu” (Tan Yi). In Junshi weiyuanhui shicong shi [Military Commission attendants and
affairs], 6–05-06–02.
AH 148000000001A. Tewu chu zuzhi gongzuo kaizhan [The development of the Special Ser-
vices Unit’s organizational work], 1943. In Guofangbu junshi qingbaoju [Ministry of
National Defense Military Affairs Office of Intelligence], 10:015a.
Baark, E. 1997. Lightning wires: The telegraph and China’s technological modernization. West-
port, CT: Greenwood Press.
Boyu, Tan. Cryptographic machine. US Patent 2,389,093, filed May 5, 1943, and issued
November 13, 1945.
Burke, C. 2007. From the archives: Codebreaking (or not) in Shanghai. Cryptologia 31 (1):84–6.
doi:10.1080/01611190601039686
China Inland Mission Private Telegraph Codebook. 2nd ed. Shanghai: Printed at the Methodist
Publishing House, 1913.
Culp, R. 2006. Rethinking governmentality: Training, cultivation, and cultural citizenship in
nationalist China. Journal of Asian Studies 65 (3):529–48. doi:10.1017/s0021911806001124
Dirlik, A. 1975. The ideological foundations of the New Life Movement: A study in counter-
revolution. Journal of Asian Studies 34 (4):945–80. doi:10.2307/2054509
Ferlanti, F. 2010. The New Life Movement in Jiangxi Province, 1934-1938. Modern Asian
Studies 44 (5):961–1000. doi:10.1017/s0026749x0999028x
“Gao Zhongqin xiansheng fangwen ji” [Records of an interview with Mr. Gao Zhongqin].
1947. Shijie, 2 (6): 275–6.
Hieu, P. D., and N. Koblitz. 2017. Cryptography during the French and American Wars in
Vietnam. Cryptologia 41 (6): 491–511. doi:10.1080/01611194.2017.1292825
Jiaotong bu dianxin zongju bian. 1948. Chengyu dianma [Chengyu Codebook]. Nanjing (?):
Jiaotong bu dianxin zongju.
Ji, Z. 2014. Maguan yi he qing zhengfu midian wenti kaozheng bu [A supplement to the tex-
tual research on the problem of the Qing government’s secret telegrams during the Shimo-
noseki negotiations]. Shandong shehui kexue 6 (226):114–19.
Kahn, D. 1967. The codebreakers: The story of secret writing. New York, NY: Macmillan.
Kahn, D. 2004. The reader of gentlemen’s mail: Herbert O. Yardley and the birth of American
codebreaking. New Haven, CT: Yale University Press.
Mullaney, T. S. 2015. Semiotic sovereignty: The 1871 Chinese telegraph code in historical
perspective. In Science and technology in modern China, 1880s–1940s, ed. J. Tsu and B.
Elman, 153–83. Leiden, Netherlands: Brill.
Mullaney, T. S. 2017. The Chinese typewriter: A history. Cambridge, MA: MIT Press.
Nanjing Number Two Archives. “Guofangbu di er ting bianyin zhi ‘tongxin baomi’ (jiji mi)”
[“Preserving Secrets in Communication,” prepared by the Ministry of National Defense
Second Department (Top Secret)], 787–31, 5–1802.
Nanjing Number Two Archives. “Jiaoyubu youguan banfa tongyi midianma shiyi de wenshu”
[The official document concerning the Ministry of Education’s issue to unify codes], 1937/
1–1940/11.” In Jiaotong bu [Ministry of Communication], 5–1795(1).
PHI. 1918. “Zongli yu shantian wanglai suoyong riwen midianma” [The Japanese secret
code used between Yamada and the President. In Yiban dang’an [General Archives],
yiban050/1.2.
PHI. 1943, January 7. “Pingsuilu zhuwei Liu Gui zhi zhong michu dian” [The Ping-Sui Road
committee chair person Liu Gui’s telegram to the central secretariat]. In Tezhong dang’an
[Special Archives] te9/25.4.
PHI. n.d. “Hu Hanmin yu Kong Geng wanglai suoyong tong mi dianmaben” [The secret
codebook used by Hu Hanmin and Kong Geng. In Yiban dang’an [General Archives],
yiban050/5.7.
26 U. KUZUOGLU
PHI. n.d. “Shantian (Yamada) yu bendang mimi tongxun suoyong zhi liushisi hao midianma”
[Codebook no. 64, used between Yamada and the party for secret communication]. Yiban
dang’an [General Archives], yiban333/2.2.
Ping, B. 2014. Minguo shiqi hanzi jianzifa shilun [A historical discussion of Chinese indexing
methods in the republican era]. Cishu yanjiu 5:60–65.
Prados, J. 1995. Combined fleet decoded: The secret history of American intelligence and the
Japanese navy in World War II. New York, NY: Random House.
Shangwu yinshuguan [Commercial Press]. 1908. Mingmima dianbao shu [The plaintext-
ciphertext telegraph codebook]. Shanghai: Commercial Press.
Singh, S. 1999. The code book: The science of secrecy from ancient Egypt to quantum cryptography.
London: Fourth Estate.
Smith, M. 2000. The emperor’s codes: Bletchley Park and the breaking of Japan’s secret ciphers.
London: Bantam.
Tsu, J. 2015. Chinese scripts, codes, typewriting machines. In Science and technology in modern
China, 1880s–1940s, ed. J. Tsu and B. Elman, 115–51. Leiden, Netherlands: Brill.
Tsui, B. K. edH. 2013. China’s forgotten revolution: Radical conservatism in action, 1927-1949.
PhD. diss., Columbia University.
Twisaday, C. E. J., and G. R. Neilson. 1904. The international telegraph convention of St. Peters-
burg, and the international telegraph service regulations. London revision, 1903. London: The
“Electrician” Printing and Pub. Co.
Viguier, S. A. [Waijiye]. 1872. Dianbao xinshu [The new telegraph codebook]. Tongzhi shiyi
nian chun yue, Shanghai
Wakeman, F. 1997. A revisionist view of the Nanjing decade: Confucian fascism. China Quar-
terly 150 (June):395–432. doi:10.1017/s030574100005253x
Wakeman, F. 2003. Spymaster: Dai Li and the Chinese secret service. Berkeley: University of
California Press.
Wong, Y. W. [Yunwu Wang]. 1928. Wong’s system for arranging Chinese characters. Shanghai:
Commercial Press.
Xia, Weiqi. 2009. “Wanqing dianbao baomi zhidu chutan [Preliminary Explorations into the
System of Preserving Secrets in Late-Qing Telegraphs.” Shehui kexue jikan 4 (gen. no. 183):
113–118.
Xiao, Liju. 2012. Dai Li yu tewuchu qingbao gongzuo zuzhi de zhankai [Dai Li and the launch
of the Special Services Unit’s intelligence work groups]. Guoshiguan guankan 33:1–32.
Xiaoyu, Huang. 1932. Yi dianma biao Shanghai: Commercial Press, 1934 [1932]. In Shanghai
Municipal Archives (SMA), B92–2-1302/2 (1934-1944)
Yanxiang, Zhang. 1939. Wanwan midianma [One hundred million secret codes]. Xianggang
[Hong Kong]: Guohua yinwu gongsi.
Yu, Maochun. 1996. OSS in China: Prelude to cold war. New Haven, CT: Yale University Press.
Yu, Maochun. 2008. Chinese codebreakers, 1927-45. Intelligence and National Security
14 (1):201–13. doi:10.1080/02684529908432530
Zhang, P., and Shen. 1987. Guomin zhengfu zhiguan nianbiao (1925-1949), di yi ce. Taibei,
China: Academia Sinica, 206–208.