█ ADRIENNE WILMOTH LERNER
The Purple Machine was an Allied codename for one of several Japanese cipher machines used during World War Two. The nickname Purple Machine was derived from the name of the code the machine produced. The first intercepted Japanese code was dubbed "Orange" by American code breakers. As the codes increased in sophistication and difficulty to decipher, cryptologists referred to the various cipher permutations with the names of colors. "Purple" was the most difficult Japanese code to break, and was used to transmit diplomatic messages from 1939 until 1945.
The mechanics of the Purple Machine were similar to other Axis encoding machines, such as the German Enigma cipher. The Purple Machine used the twenty-six-letter Latin alphabet, programmed into a pegboard with corresponding wires that governed cipher wheels, or rotors. The machine itself consisted of a typewriter joined by wires and a circuit board to a series of four rotors that shifted the type in various permutations on a second typewriter to produce coded text. The coded text was sent by wire, preceeded by a series of coded numbers that revealed the permutations used to create the code. With the setting adjusted as specified, the encoded text could
then be deciphered by again running it through the machine.
While many pre-war Japanese codes were broken mathematically with pen and paper, effectively deciphering Purple required constructing an identical cipher machine. American cryptologist William Friedman built a replica of the Purple Machine, based on intelligence information, in 1939. When the machine became operational, American code breakers were able to monitor most Japanese diplomatic messages that used the Purple code.
While breaking Purple gave U.S. intelligence services a great deal of information regarding diplomatic activities and strategies, it seldom yielded specific information regarding naval actions or fleet positions. The Japanese used a separate code for military operations, fleet positions, and troop deployments. In the months prior to the bombing of Pearl Harbor in 1941, Purple Machine intercepts indicated that the Japanese were planning an attack, but the messages did not mention Hawaii, Pearl Harbor, or a date for such an attack. However, the Japanese government did use Purple to deliver their ultimatum the day before the attack. Cryptologists decoded the series of fourteen messages between the Japanese government and their embassy in Washington, D.C., and passed the messages along to the Department of the Navy. A further intercept in the early hours of December 7, 1941, indicated that the Japanese fleet was poised and awaiting the order to attack. No action was taken on the information in the intercepts, and the U.S. Pacific fleet was bombed in port at Pearl Harbor later that day.
After Pearl Harbor, deciphered Purple Machine intercepts yielded substantial intelligence information for the United States. Paired with deciphered Japanese Navy dispatches that used another broken code, Purple Machine intercepts helped the United States to victory at the battle of Midway. In the weeks before the battle, code breakers discovered a series of messages from Tokyo to Japanese diplomats and Navy officers that discussed battle strategy in the Pacific. Some of the communications yielded fleet positions. Decoded Purple messages also allowed Allied planes to track and shoot down a military flight carrying Japanese Admiral Isoroku Yamamoto.
Breaking Purple Machine code even aided the Allied effort on the European front. A long series of dispatches between Japanese diplomats in Germany and the Japanese command in Tokyo discussed meetings with Hitler and revealed information about German defenses in occupied France. This information helped Allied forces prepare for the D-Day invasion of the continent.
The Japanese remained confident throughout the war that the Purple Machine and its code remained unbroken by the Allies, and continued to use the code even in the weeks immediately following their surrender in 1945. In United States hearings regarding intelligence, military, and political oversights in the days prior to Pearl Harbor, the government revealed that it broke the Purple code before the outbreak of the war. It was the first time former Japanese forces heard that the secrecy of the Purple Machine had been long compromised.
█ FURTHER READING:
Budiansky, Stephen. Battle of Wits: The Complete Story of Codebreaking in World War II. New York: Touchstone Books, 2002.
World War II
World War II, United States Breaking of Japanese Naval Codes
"Purple Machine." Encyclopedia of Espionage, Intelligence, and Security. . Encyclopedia.com. (August 18, 2017). http://www.encyclopedia.com/politics/encyclopedias-almanacs-transcripts-and-maps/purple-machine
"Purple Machine." Encyclopedia of Espionage, Intelligence, and Security. . Retrieved August 18, 2017 from Encyclopedia.com: http://www.encyclopedia.com/politics/encyclopedias-almanacs-transcripts-and-maps/purple-machine
Encyclopedia.com gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).
Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.
Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:
Modern Language Association
The Chicago Manual of Style
American Psychological Association
- Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most Encyclopedia.com content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
- In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list.