Foundations of Coding Compression Encryption Error Correction 1st Edition Jean-Guillaume Dumas 2024 Scribd Download
Foundations of Coding Compression Encryption Error Correction 1st Edition Jean-Guillaume Dumas 2024 Scribd Download
com
https://ebookname.com/product/foundations-of-coding-
compression-encryption-error-correction-1st-edition-jean-
guillaume-dumas/
OR CLICK BUTTON
DOWNLOAD EBOOK
https://ebookname.com/product/error-control-coding-2nd-edition-shu-
lin/
ebookname.com
https://ebookname.com/product/essentials-of-error-control-coding-1st-
edition-jorge-castineira-moreira/
ebookname.com
https://ebookname.com/product/quantum-error-correction-and-fault-
tolerant-quantum-computing-1st-edition-frank-gaitan/
ebookname.com
https://ebookname.com/product/paul-on-marriage-and-celibacy-the-
hellenistic-background-of-1-corinthians-7-2nd-edition-will-deming/
ebookname.com
https://ebookname.com/product/neuroscientific-foundations-of-
anesthesiology-1st-edition-george-a-mashour/
ebookname.com
https://ebookname.com/product/the-european-parliament-and-its-
international-relations-1st-edition-stelios-stavridis/
ebookname.com
https://ebookname.com/product/ballot-box-to-jury-box-the-life-and-
times-of-an-english-crown-court-judge-1st-edition-john-baker/
ebookname.com
https://ebookname.com/product/elementary-and-intermediate-algebra-
graphs-and-models-4th-edition-marvin-l-bittinger/
ebookname.com
Mechanical engineers handbook 3rd ed Edition Myer Kutz
https://ebookname.com/product/mechanical-engineers-handbook-3rd-ed-
edition-myer-kutz/
ebookname.com
FOUNDATIONS
OF CODING
FOUNDATIONS
OF CODING
Compression,
Encryption,
Error Correction
JEAN-GUILLAUME DUMAS
Université de Grenoble
JEAN-LOUIS ROCH
Université de Grenoble
ÉRIC TANNIER
Inria, Université de Lyon
SÉBASTIEN VARRETTE
Université du Luxembourg
Copyright © 2015 by John Wiley & Sons, Inc. All rights reserved
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or
by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as
permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior
written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to
the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax
(978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should
be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ
07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in
preparing this book, they make no representations or warranties with respect to the accuracy or
completeness of the contents of this book and specifically disclaim any implied warranties of
merchantability or fitness for a particular purpose. No warranty may be created or extended by sales
representatives or written sales materials. The advice and strategies contained herein may not be suitable
for your situation. You should consult with a professional where appropriate. Neither the publisher nor
author shall be liable for any loss of profit or any other commercial damages, including but not limited to
special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our
Customer Care Department within the United States at (800) 762-2974, outside the United States at
(317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may
not be available in electronic formats. For more information about Wiley products, visit our web site at
www.wiley.com.
Dumas, Jean-Guillaume.
Foundations of coding : compression, encryption, errorcorrection / Jean-Guillaume Dumas, Jean-Louis
Roch, Eric Tannier, Sebastien Varrette.
pages cm
Includes bibliographical references and index.
ISBN 978-1-118-88144-6 (cloth)
1. Coding theory. I. Roch, Jean-Louis (Mathematician) II. Tannier, Eric. III. Varrette, Sebastien.
IV. Title.
TK5102.92.D86 2015
003′ .54–dc23
2014039504
10 9 8 7 6 5 4 3 2 1
CONTENTS
1 Foundations of Coding 5
1.1 From Julius Caesar to Telecopy, 6
1.1.1 The Source: from an Image to a Sequence of Pixels, 6
1.1.2 Message Compression, 7
1.1.3 Error Detection, 8
1.1.4 Encryption, 9
1.1.5 Decryption, 9
1.1.6 Drawbacks of the Fax Code, 11
1.1.7 Orders of Magnitude and Complexity Bounds for Algorithms, 12
1.2 Stream Ciphers and Probabilities, 15
1.2.1 The Vernam Cipher and the One-Time-Pad Cryptosystem, 15
1.2.2 Some Probability, 16
1.2.3 Entropy, 18
1.2.4 Steganography and Watermarking, 23
1.2.5 Perfect Secrecy, 24
1.2.6 Perfect Secrecy in Practice and Kerckhoffs’ Principles, 24
1.3 Block Ciphers, Algebra, and Arithmetic, 26
1.3.1 Blocks and Chaining Modes from CBC to CTR, 27
1.3.2 Algebraic Structure of Codewords, 30
v
vi CONTENTS
3 Cryptology 136
3.1 General Principles, 137
3.1.1 Terminology, 137
3.1.2 What is the Use of Cryptography? 138
3.1.3 Main Types of Threats, 139
3.2 Secret Key Cryptography, 141
3.2.1 Principle of Symmetric Cryptography, 141
3.2.2 Classes of Symmetric Encryption Schemes, 143
3.2.3 Data Encryption Standard (DES) System, 145
3.2.4 Rijndael: Advanced Encryption Standard (AES), 151
CONTENTS vii
List of Figures
ix
x LIST OF FIGURES, TABLES, ALGORITHMS AND ACRONYMS
List of Tables
List of Algorithms
Acronyms
This work has been initiated in spring 2000 with the creation of the joint
ENSIMAG-ENSERG Telecommunication department at the National Polytechnic
Institute of Grenoble (INPG – France) and the setting up of a general course (last
year French Licence level in the Licence-Master-Doctorate scheme) providing an
introduction to codes and their applications.
Although it was initially published as a handout, it evolved and became reference
material for several courses in Grenoble universities – both in the INPG and in the
Joseph Fourier University (UJF) at the master level.
We take this occasion to thank our colleagues who participated in these courses and
helped us improve our material with their remarks: Gilles Debunne, Yves Denneulin,
Dominique Duval, Grégory Mounié and Karim Samaké.
In 2007, a book was published in French by Dunod editions in their mathematics
and computer science collection. It was then reprinted, with a few amendments, in
the beginning of 2009, and edited in an augmented version in 2013.
Éric Bourre, Cécile Canovas-Dumas, Mélanie Favre, Françoise Jung, Madeline
Lambert, Benjamin Mathon, Marie-Aude Steineur, and Antoine Taveneaux partici-
pated to these first two editions by reading the drafts and spotting some mistakes.
This English edition was started in 2009, when our colleagues Rodney Coleman
and Romain Xu undertook the task of translating the 352 pages of the French edition
in English. Let them be gratefully thanked here.
Compared to this translation, this book has been revised and significantly
augmented (20% additional pages and 27 new exercises). We now cover modern
and frequently used techniques, as elliptic curves, low density codes, or matrix
bar-codes as well as new standards like the estream portfolio, Galois hashing and
counter mode, and the new standard hashing algorithm 3, Keccak. In addition, we
xvii
xviii FOREWORD
This work is aimed at providing a textbook for master students in applied mathematics
or computer science. It can be used as a reference book by teachers, researchers, or
companies involved in telecommunication or information security. The book is, to a
certain extent, self-contained, that is, all used concepts are introduced. However, some
training in algebra, algorithmics, and probability theory will be helpful. Indeed, the
originality of this book is to present fundamental structures and applications, covering
all coding operations, in a single framework.
The subject is the automatic transmission of numerical information. We will focus
on the structure of information, without regarding the type of transmission support.
Information can be of any kind as long as we can give a numerical representation of
it: for example texts, images, sounds, and videos. Transmission of this type of data
is ubiquitous in technology, especially in telecommunications. Hence, it is necessary
to rely on solid bases for that transmission to be reliable, the term “reliable" having
several different meanings depending on the objectives that will guide us throughout
this book.
Transmission channels can also be of any kind (wirenets or wavenets), possibly
through data storage. We will not consider the physical issues coming with transmis-
sion, which are the subjects of the theory known as “signal” theory. “Coding” deals
with information itself when it is meant to be transmitted or stored.
Communication of a piece of information begins with a sender writing it, goes
on with its transmission through a channel and ends with the reconstruction of the
1
2 INTRODUCTION
Perturbation
Encoding Decoding
Source Channel Destination
message by the recipient. Sometimes, the sender is also the recipient: it is the case of
a processor or a person saving data in a register, a memory, or a disk and reading it
later on. Information has to be fully, safely, and quickly transmitted to its recipient.
However, whatever the channel may be, with variations depending on the support,
it can never be considered “safe” in several ways: errors can appear during trans-
missions, and the message is likely to be read, and even modified, by a potentially
malicious third party.
It is up to the sender to compose his messages in a form that allows the recipient
to reconstruct them – considering potential alterations during the transfer or confi-
dentiality of some information – while minimizing the size of data.
These constraints are the starting points of several fields in mathematics and com-
puting that are often developed separately although they deal with the same subject.
The purpose of this book is to gather them into one volume and to present a single
theory whose subject is the form given to information during its transmission, namely
a general coding theory.
In 1948, Claude Shannon layed the foundation stone of what he called a “mathe-
matical theory of communication.” It is said that his theory began with his comments
on natural languages: Shannon used to hide some parts of the text he was reading
and to recover them from the visible part. When removing a few words, he was able
to determine the meaning of a sentence with absolute certainty. Actually, the hidden
words were redundant, they did not add anything to the meaning of the message.
If he removed too many words, he was unable to guess the message with certainty.
Then Shannon developed a theory that would allow one to calculate the “amount of
information” of any kind of message, hence the determination of a redundancy rate.
Nowadays, the operation of reducing redundancy is called compression or “infor-
mation theory.” Here, we are not only looking for efficiency in terms of optimization
of the storage space but mainly in terms of transmission speed: we are interested
in having the shortest message by keeping only what is necessary, or even better,
reformulating it without redundancy.
Another and older concern in the transmission of a piece of information is con-
fidentiality. Assuming that roads (as well as numerical channels) are not safe – and
that a message can be intercepted during the transmission – the text has to be trans-
formed, uncorrelated from its signification, while guaranteeing that only its recipients
INTRODUCTION 3
are given the decryption keys. The history of societies and nations is full of secret code
stories and battles between code inventors and code breakers (who wanted to recover
the meaning of the message without knowing the key). Shannon also contributed in
this field by giving the first theoretical proof of confidentiality in 1949.
Today, a scientific discipline is dedicated to secret codes – cryptology. Not only
do current techniques guarantee the secrecy of a message, but they also allow one to
sign documents and identify a sender.
In addition to ill-intentioned third parties, all channels that are used in transmission
of numerical information can suffer from perturbations that are likely to alter some
parts of the messages, hence to modify their meaning. If the information is sent with-
out redundancy, the least significant modification can lead to misunderstandings once
at destination. As for natural languages, most of the errors will not alter the percep-
tion of the reader because redundancy will allow him to recover the initial message.
Once again, Shannon presented a revolutionary result in 1948: even on channels with
high error rate, it is still possible to add enough redundancy so that the message will
be entirely received. But the proof is not constructive and this theorem keeps moti-
vating the development of methods including ordered and optimized redundancy for
the recipient to be able to detect modifications of the message (detection codes) and
to correct potential errors himself (correction codes). All these methods are cus-
tomizable – flexible – depending on the kind of support considered and its error
rate.
Efficiency, security, and integrity are the three concerns for developers of infor-
mation transmission methods. This book tackles those issues in one single volume
through their common object – the code – which is used to structure the information
on all current technological support.
The general theory of codes is based on a background coming from linear algebra,
arithmetic, probability theory, algorithmic, and combinatorial analysis. In the first
chapter of this book, we will present the mathematical models and the first algorith-
mic developments that structure the notion of code. The presentation of these models
includes some introduction to useful mathematical concepts for the manipulation of
codes, as well as general notions on the efficiency of calculation methods, which will
be frequently used throughout the present work. Reading this chapter will require
a basic theoretical knowledge of linear algebra (a first course in this field should
be sufficient). Some elements go beyond the standard knowledge of nonmathemati-
cian students and are presented in detail here. The reader will soon be aware of their
real practical importance, most of the time during their very introduction. Figure I.2
clarifies the usefulness of these notions and the dependencies between them.
As linear reading is not necessary, this scheme will also allow a reader in a
hurry – or only interested in a specific part of this book – to quickly find his way.
Although the first chapter is meant to introduce the foundations of coding, it can
also be used as a reference toolbox during the reading of the following chapters.
Those chapters deal with the notions of compression, cryptography, detection, and
correction codes separately. They present the fundamental theoretical results and the
algorithms that follow from them. Each chapter is illustrated with concrete examples
and training exercises in the field of telecommunications. We have striven to present
4 INTRODUCTION
both classical coding theories and the most recent developments dealing with them
as far as such an introductory book allow us to.
Not only does this book gathers mathematical theories sharing the same subject,
but its creed is also algorithmic. Here, the mathematical properties of the functions
are used in order to make their calculation efficient. Computation methods are always
detailed and can be immediately implemented in any programming language. Effi-
ciency of the methods is always stated and debated. Existing implementations are
compared.
These sciences are derived from both Greek mathematics – whose quality was
based on their aesthetic nature – and oriental mathematics – which focused on useful-
ness and calculation. This is what can also bring together the foundations of coding,
and one of their greatest merit is to call upon rigorous mathematics – which are
appreciated by aesthetes – in order to build efficient methods applied to common
communications. Hence, this book is at the confluence of these rivers and will attract
technology and number theory enthusiasts, as well as all those whose imagination
is still fired by stories of decryption of arcane languages, machines that correct their
own errors and secret codes.
1
FOUNDATIONS OF CODING
This first chapter is an introduction to the notion of code. It contains the mathematical
background, necessary to manipulate the codes, and the coding operations. Through
this chapter, the reader will understand the constraints of the transmission of informa-
tion, starting from historical examples and eventually learning advanced techniques.
The knowledge of some historical aspects is pedagogically useful to work first on sim-
ple structures. In cryptology, history is also essential for efficient protection against
the whole range of known attacks.
The principle is always to start from examples of codes, showing step by step why
some mathematical notions are useful so that the codes are short, safe, and efficient.
While the following chapters describe recent, elaborate, and currently used protocols
for coding, this chapter provides the foundations of this activity.
Simple objects from probability theory, algebra, or algorithmic are introduced
along the lines of this chapter, when they become necessary. For example, block
coding calls for the definition of structures in which elements can be added, mul-
tiplied, which justifies the introduction of groups and fields. The emphasis is always
put on the effective construction of introduced structures. This calls for a section on
algorithms, as well as polynomials and primitive roots.
This chapter is organized in four sections. The first three allow to focus on the three
important mathematical notions related to coding: algorithms and their complexity,
which is at the core of coding theory; probabilities, related to stream cipher; and
algebra, related to block coding. Then, the last section of this chapter is devoted to
5
Random documents with unrelated
content Scribd suggests to you:
the first landing, again on June 4, and again in August when the
ambitious advance was made from Anzac and Suvla, victory had
been in sight, and the lack of reserves had robbed the Dardanelles
army of the triumph for which they had paid so heavy a price.
On arrival at the crowded beach they awaited their turn to board
the “beetles.” The French had a number of haystacks on the shore,
and had posted a sentry to give warning of the coming of the shells
by blowing a horn the instant that he saw the flash from an “Asiatic
Annie” across the Straits. The bursting of the shell had been timed to
follow the flash by twenty-three seconds, so the sounding of the horn
was the signal for a rush to the haystacks or other available cover.
These were seconds of extreme tension until the crash came and
men realized that they at any rate had respite for a time; though in
the dark it was impossible to know what damage had been done
elsewhere. Piers were struck and great gaps made as parties were
about to cross. Throughout the long night the embarkation
proceeded, most of the men crossing the hulk of the River Clyde.[6]
The wind was rising, and the transfer from the lighters to the larger
transports was made dangerous by the roll of both vessels, and
much argument ensued between the Royal Navy and the Mercantile
Marine. In due course it was accomplished and, as the dawn showed
pink in the east, the convoy steamed away towards Mudros. Eight
months ago nearly 14,000 Lancashire Territorials had disembarked
on the inhospitable shores which were now receding. The Division
that left Gallipoli barely numbered 5000, though every battalion and
unit had received drafts from the second and third lines in England,
or from Egypt, and thousands of casualties had rejoined from
hospital. Few of the 14,000 who had landed in May with such high
hopes and in such good spirits, took part in the last melancholy
parade to the beaches, or sailed on this December day to Mudros,
but those few thought of what might have been, and of the great-
hearted comrades and brothers-in-arms whom they had left behind.
Many now lay in the cemetery above Lancashire Landing, a glorious
resting-place from which, when alive, they had looked out upon the
intense blue of the Ægean Sea, with the peaks of Imbros and
Samothrace to the west, to the south and east the coast of Asia
Minor and the straits, and direful Achi Baba to the north; others had
been buried where they fell. Soon the lovely blossoms of the rock-
rose and the gorgeous poppy would be covering their graves.
Perhaps to none of the survivors would these memories be more
poignant than to two of the padres, the Rev. E. T. Kerby, M.C.,[7] and
the Rev. F. W. Welbon, M.C., who had been untiring and absolutely
fearless in giving comfort to the dying, in performing the last rites
under fire, and in sharing the dangers and privations of the men in
the front line.
The Divisional Artillery remained behind, and also a small
detachment of Engineers and the 1st and 3rd Field Ambulances, all
attached for duty to the 13th Division. The more modern guns must
first be saved, and as each battery was withdrawn a battery of the
old 15-pounders of the 42nd Division was substituted, so there was
no cessation of fire during the day. For several nights no artillery fire
was permitted between 9 p.m. and 2 a.m., in order to accustom the
Turk to quiet nights with little or no firing. When the final evacuation
took place three of the old guns were taken away successfully and
the remainder destroyed. Some of the gunners and the greater part
of the R.A.M.C. left a few days before the curtain fell on the final
scene of the great tragedy of Gallipoli. The last men of the 42nd
Division—and among the very last of the allied forces—to leave the
peninsula were detachments of artillery and R.A.M.C. and a small
party of Engineers.
On the 7th of January the last fight was fought on Gallipoli. After
seven hours’ heavy bombardment the Turks attacked, but they found
the front line more heavily manned than it had been for months past,
and the attack failed. Probably they were surprised by the vigour of
their repulse, as they must have been convinced by now that the
Helles force was in process of evacuation. It is likely that the strong
opposition encountered led the Turk to believe that the British
departure was less imminent than he had hoped, and that he would
have to wait a little longer before he could catch his enemy on the
run. If his suspicions were lulled in this way it was fortunate that he
chose for his attack the day immediately preceding the final
evacuation. Heavy casualties were inflicted on both sides, and the
East Lancs R.A.M.C. men were hard at work without a pause from
5.30 p.m. to 3.30 a.m. on the 8th. Their good work in attending to the
wounded of the 13th Division brought them the personal thanks of
General Maude, who also sent a letter of appreciation to the
Divisional Commander. Lieutenant R. Hartley, R.F.A., distinguished
himself and upheld the Division’s reputation, by putting out a fire,
which had started in a wagon full of ammunition, at great personal
risk.
Other
Officers.
Ranks.
Divisional Headquarters 14 120
Divisional Signal Company, Cable Section and 5 229
Airline Section
Artillery and Divisional Ammunition Column 108 2,520
Royal Engineers 16 296
125th Brigade and Signal Section 124 1,764
126th Brigade and Signal Section 117 2,244
127th Brigade and Signal Section 114 1,584
A.S.C. Supply Details 9 77
R.A.M.C 24 537
Attached—
3rd County of London Yeomanry 5 93
1/2nd W. Lancs. Field Coy., R.E. 6 143
Monmouth R.E. 3 83
Sanitary Section, R.A.M.C. 1 22
19th Mobile Veterinary Section 1 12
1st Essex Regiment 26 934
2nd Hampshire Regiment 25 900
Total 598 11,558
(1) The northern caravan route along the coast through El Arish to
Kantara, the route by which Joseph’s brethren, and later the Holy
Family, and in more recent times Napoleon, had travelled from
Palestine to Egypt.
(2) The central Hassana—Ismailia route.
(3) The southern Akaba—Suez route.
Lack of water along the greater part of the central and southern
tracks renders them impracticable for any but a small, mobile,
desert-bred force, and against raiding parties of this description the
chain of posts under construction would be a sufficient defence. But
the El Arish—Katia—Kantara route is of a different character. Oases
are more numerous, and in the vicinity of Katia and Romani, within
twenty miles of the Canal, wells are plentiful, and the water, though
brackish, is drunk by animals, and to a certain extent by natives. No
army, British or Turkish, could occupy this region until water-pipes
and a railway had been laid, but the possibility of a rapid dash had to
be provided against, so the system of defence on the northern route
was extended to a point much farther east than was necessary in the
central and southern sections, and it included the coast of the Bay of
Tina and the water-bearing area around Katia and Romani.
Kantara was the base for this northern section, El Ferdan for the
central, and Shallufa, where the 42nd Division was stationed during
February and March, for the southern. Here trenches were dug and
revetted with wooden frames and hurdles backed with canvas; miles
of barbed-wire entanglements were put up; hutments of matting over
wooden frames for mess and recreation, sun-proof standings for
horses, and fly-proof larders were erected at the posts on the Canal
banks. Gangs hauled the chain-ferry, and every one was kept
steadily at work. In fact, the whole of the Canal zone for a hundred
miles from Port Said to Suez has been described as a vast hive of
workers; and the company humorist—who, by the way, always
alluded to the desert as “the croft”—would ask plaintively: “Is it true,
sir, that we’re staying here till we’ve got all the desert into
sandbags?”
Water for men and animals was obtained from the Nile, via the
Sweet Water Canal, which runs a few hundred yards west of the
Suez Canal. Darius the Persian is credited with the construction of
the Sweet Water Canal, which he used for transport between the
Mediterranean and the Red Sea. After Actium the remnant of
Cleopatra’s galleys took refuge therein. It fell into disuse for
centuries, and was restored by de Lesseps as a water-supply for his
workmen while the Suez Canal was under construction. There were
filtering plants at all pumping stations, and as Nile water contains the
parasite of the dreaded disease bilharziosis, there was a strict rule
against bathing in the Nile or the Sweet Water Canal. Water for the
troops was at first brought in barges from Suez and stored in tanks
on both sides of the Suez Canal, being distributed by camel
transport to the outposts in fanatis. A fantasse (plural, fanatis) is a
stoppered flat box of zinc which holds from ten to twelve gallons and
usually leaks a little. A camel carries a fantasse slung on either side.
As the scheme grew the engineers laid a six-inch water-main across
the desert, and thus the ancient prophecy that Palestine would never
be freed from the Turkish yoke until Nile water flowed into it was
fulfilled.
The third line of works was within easy walking Shallufa and Suez
distance of the Canal. It was good fun for the
veterans of Gallipoli to bandy repartees from the water with the
newly-trained drafts for India and Mesopotamia who, looking down
upon them from the towering decks of big transports, asked when
they were going to “do their bit,” instead of taking a seaside holiday
at an Egyptian pleasure-resort. Much booty in the form of tins of
cigarettes thrown by passengers on liners was gathered in by bold
swimmers. The weather was cool, and, in spite of very strenuous
labour in the loose sand, the stay at Shallufa was a pleasant holiday
as compared with conditions in Gallipoli. The sandstorms of March
were decidedly unpleasant, however, for the sand penetrated
everywhere. To attempt to keep it out of food, equipment, clothing or
lungs was quite futile, and a sandstorm would quickly fill the trenches
that had been dug at the cost of several days’ steady labour. These
sandstorms began with amazing regularity about midday and
continued until 6 p.m. All cooking had to be done before or after
these hours.
During the Shallufa period many officers and men returned to duty
from hospital. These would feel that this record of the 42nd Division
would be incomplete indeed were no reference made and no tribute
paid to the founder and the workers of the admirable Convalescent
Home at Alexandria, established in June, 1915, by Lady Douglas,
whose solicitude for the welfare of all ranks under her husband’s
command will be remembered with lasting gratitude by the Division.
The hospital was supported by the units and by subscriptions from
friends at home. In addition to the return of those who had been
absent through wounds and sickness, units were further
strengthened by small drafts from home—but numbers still remained
much below strength. The Division was weakened by the return to
England of time-expired Territorials, including a number of the best
men. Two officers who had been in command of their units
throughout the Gallipoli campaign also left the Shallufa camp for
England in the spring of 1916—Lieut.-Colonel S. L. Tennant, R.E., on
leave, and Major England, A.S.C., who left to take charge of the 66th
Divisional Train, the duties of Senior Supply Officer devolving upon
Captain A. Gillibrand.
The Artillery here received their 18-pounder guns—handed over
by the 29th Division—and their training and reorganization were
taken seriously in hand, with firing practice in the desert. The three
Field Ambulances remained on the Canal bank, and when not
engaged in training or in attending to the cases brought in on camels
or by light railways from the desert posts, were able to enjoy the
bathing in the Canal. Sick were conveyed by steam launch from
Kabrit and Genefa to Shallufa, and many of the high-temperature
cases were dipped and sponged in the cooling, refreshing water of
the Salt Lake. The Division settled down to a diet of “ginger, spit, and
polish,” the hard work, the swimming, games, sports, concerts—
including a singing competition “for the championship of Asia”—
proved wonderfully efficacious in restoring the vitality and the
smartness of the Division after its long spell of trench life. Invariably,
however, there is the man who has to acquire polish at the cost of
much tribulation to himself and to his immediate superiors. There
was, for instance, the sentry who failed to turn out the guard for the
Divisional Commander. In excuse he explained: “Well, sir, I didn’t
see at first that you were a Staff Colonel,” then, being of an amiable
disposition, he leant forward and added in confidential tones: “You
see, by rights I oughtn’t to be here at all. I’m the sanitary man!” It
was felt that this man was not a success, either as sentry or
diplomat.
During the last days of March and the first days of April, the
Division left Shallufa to camp in the desert about two miles north-
west of Suez. With the assistance of a Belgian contractor and native
carpenters the infantry, under the supervision of the engineers,
rapidly erected a large number of huts with double roofs of matting
and also long lines of stables. A macadam road was made through
the camp and was eventually extended to Kubri. A thorough course
of company, battalion, and brigade training was carried out here, the
physique and efficiency of the troops improving greatly in
consequence. Much of this training was carried out in the desert
west of Suez and along the ancient tower-marked road that leads to
Cairo—the “far end” of the very road which had become so familiar
to the Division in the first autumn and winter of the war. The
machine-gun sections had constant practice; and it was here that the
Brigade M.G. Companies took definite form as separate units.
Emphasis was laid on the training of the young officer; and the
offensive spirit was successfully fostered and stimulated. Once more
it was proved that close-order drill and punctilious discipline,
diversified and relieved by games and sports, formed the basis on
which that military ideal must be built up. Rugby, soccer, hockey, and
even donkey polo were played, and the Rugby team of the 5th
Manchesters won great renown. Canteens now provided cigarettes,
biscuits, chocolates, and other articles much appreciated by the
troops. A Dramatic Society was formed, and plays specially written
by Major G. B. Hurst were given at the “Theatre Royal.” The
rehearsals and presentation gave great fun.
While at Suez the Artillery brigades and batteries were renamed.
The 1st E.L. Brigade became the 210th Brigade, and the 2nd, 3rd,
and 4th became the 211th, 212th, and 213th respectively, each
having three four-gun batteries designated A, B, and C, with the
exception of the 213th Brigade, which consisted of two howitzer
batteries. After the Division left the Shallufa camp it was found that
the defences there were not progressing with sufficient rapidity, and
at the end of May the 7th and 8th Lancashire Fusiliers and the 127th
Infantry Brigade were sent to Kubri and Shallufa to assist the 54th
Division. In spite of the great heat, the Lancashire men, now more or
less acclimatized, got through more in a few days than the recently
arrived troops had accomplished in a month, and they received
deserved praise from the G.O.C. of the section for their work at
Manchester, Salford, Ashton, and other posts.
The heat in June was terrific, and a temperature of 120 degrees in
the shade—the difficulty being to find the shade!—was normal, and
on one or two occasions a midnight temperature of 105 degrees was
registered. During this hot period the scouts and signallers of the
125th Brigade, while taking part in a training scheme, were sent out
to the Ataka Hills, some seven or eight miles from camp, two parties
operating as opposing forces. Movement among the hills proved
more arduous than had been anticipated, and the men suffered
much from the blazing sun—the rays being refracted by the rocks—
and also from want of water. The greater part of them got back to
camp with considerable difficulty. A Yeomanry patrol and an
aeroplane were sent out on June 16, and parties of Arabs two days
later, to look for the missing, and the bodies of two men who had
died from heat and exhaustion were brought in. After this no training
was permitted between the hours of 8.30 a.m. and 6 p.m. For the
remaining ten hours of the day the average man could do little
except lie, lightly clad, envying the Russians in the Caucasian
snows, and dreaming of the invention or discovery of an ice-cold
drink that could be produced in unlimited quantities even in a desert,
and would remain unaffected by the temperature. But—
Khamsin winds made life almost unbearable, and bathing was the
one resource, for even bridge became too strenuous a game, though
nap was played occasionally by the energetic ones.
On June 19 the Division was ordered north to El Ferdan
take over from the 11th Division the El Ferdan
Section, the central section of the Canal zone, midway between
Ismailia and Kantara. The move was completed by the end of the
month. The 7th and 8th Lancashire Fusiliers took over the defences
at Ballah, a station on the Canal, and the 5th and 6th Lancashire
Fusiliers at Ballybunnion, a desert post about six miles to the east.
The 6th and 8th Manchesters and the 126th Brigade were stationed
at El Ferdan and Abu Uruk, about five miles north-east of El Ferdan.
The artillery was split up among the posts, the 210th Brigade at
Ballah and the 211th at El Ferdan, and during this period the
howitzer batteries were rearmed with 4·5 Q.F. howitzers. The 1st
Field Company, R.E., was at Ballah and Ballybunnion; the 2nd Field
Company at Abu Uruk, and the recently arrived 3rd Field Company
at Ferdan, where were also the 2nd and 3rd Field Ambulances. The
Division was now occupying the ground where, according to
tradition, the Israelites crossed the Red Sea. The 5th and 7th
Manchesters went as far north as Kantara, where they were
attached to the 52nd Division, and the friendship with the Lowland
Scots, begun and cemented in Gallipoli, was here revived. They also
took over posts from the 11th Manchesters, the first of the
“Kitchener” battalions of their own regiment.
The Engineer-in-Chief, Major-General H. B. Wright, called to his
aid the engineers of the Egyptian Government. Civil contractors,
labour and plant were brought down to the Canal and material was
requisitioned from all parts of the globe—from Australia, timber and
wire-netting, the latter to be used for road-making over the loose
sand; from India, water-pipes, matting and meat-safes; reed-matting
from the Sudan; the whole of her stock of Decauville (two-foot
gauge) railway material from Egypt; engines and pumps from
England; and from the United States, through Mr. J. Pierpont
Morgan, a shipload of water-pipes which were so precious as to
require a cruiser as escort. It was, however, upon the R.E. of the
Division and Corps that the brunt of the work fell, though it might
almost be said that the whole Division was temporarily transformed
into a corps of engineers. The system of communication maintained
by the Divisional Signal Company was extensive, all posts and
outlying positions being connected with Headquarters by cable, often
buried in the sand for many miles, and by visual signalling. Also all
posts had their own system of inter-communication by telephone.
Though the great heat continued during the six weeks in this section
there was often a cool breeze on the higher ground, and conditions
generally were far preferable to those prevailing in the dusty, fiery
atmosphere of Suez.
Toward the end of July information was received that a large
enemy force, led by German officers, and armed with German and
Austrian artillery and machine-guns, was moving, with a rapidity that
was surprising when the difficulties of the march of an army across
the desert are realized, westwards from El Arish. Before long aircraft
located Turkish troops at Oghratina Hod—a hod being a plantation of
date-palms—about ten miles east of Romani, held by the 52nd
Division. Aerial activity increased on both sides, and traffic swarmed
on the Romani road. The Turks meant to force a fight in the worst
possible season for British troops, and their march across the desert
was a notable military achievement.
It was now decided to transform the 8th Corps, of which the 42nd
Division formed part, into a Mobile Column, under Major-General the
Hon. H. A. Lawrence (a former Brigadier of the 127th Brigade) for
operations in the desert east of the fortified posts. Camels were to be
provided to carry all stores, such baggage as was absolutely
necessary, engineering, material, food, ammunition, and water. Kit
was cut down to the bare minimum. Wheeled transport was removed
as useless, and gun-carriages and limbers were fitted with pedrails
and equipped with extended splinter-bars to allow four animals to
pull abreast, each team consisting of twelve horses. Sand-carts and
camel cacolets would be provided for the R.A.M.C., and for the
engineers new equipment for well-sinking on an extensive scale,
with camels to carry the well-lining materials, troughs, pumps, tools,
etc.
In the last week of July the Division was hurriedly ordered north to
Kantara, the El Ferdan and Ballah area being handed over to the
54th Division and the 3rd Australian Light Horse Brigade. On the
29th and 30th of July the Mobile Column scheme was issued to unit
commanders in rough outline, details being left to them. A Base
Depot was formed at Ballah for the R.A. of the Mobile Force, and A
Battery, 210th Brigade, and certain Ammunition Column details
remained at the depot. The horse transport of the remainder of the
Division and the heavier baggage were left at the base camp at
Kantara.
The 127th Brigade, now complete, as the 5th and 7th Manchesters
had rejoined, was the advance brigade at Hill 70. On July 31 it
moved forward along the new railway to Gilban, together with the
Divisional Squadron, a battery of the 212th Brigade, R.F.A., the 3rd
Field Company, R.E., and the 3rd Field Ambulance. On the evening
of August 3 the 6th Manchesters proceeded to Pelusium, near the
coast and six miles north-west of Romani, to prepare defensive
works east of the railway line, and to cover the detraining of the rest
of the Brigade. Early in the morning of August 4 the sound of artillery
fire from the direction of Romani announced that the Turkish attack
had begun. The remainder of the Brigade was hurriedly ordered to
Pelusium, and at 3.27 p.m., as the last battalion was detraining,
Brig.-General Ormsby received the order to march at once in support
of the Anzacs, who were heavily engaged in the neighbourhood of
Mount Royston, to the south of Romani. At 3.30 p.m., within three
minutes of receipt of the order, the 5th, 7th, and 8th Manchesters
moved off without any transport—as none of the camels had arrived
—and also without their dinners, the stew which had been prepared
for them being left untouched. They passed through the 6th
Manchesters, who were ordered to remain in their positions covering
Pelusium, in order to escort and assist in organizing the expected
camel transport. Artillery, cavalry, and engineer detachments arrived
at Pelusium and moved forward, but nothing was seen or heard of
the camels until 11 p.m., when two long files, each of 1000 camels,
turned up. It was pitch dark, the transport was new to the Division,
and the task of sorting out the animals, allocating them to the various
units, loading them with fanatis, rations, ammunition and blankets,
was a stupendous one. But the 6th Manchesters understood what
every moment’s delay in delivering the goods—especially the water
—might mean to their comrades, and they put their backs into it. By
4 a.m. the camel convoys for the 127th Brigade and the attached
troops had been despatched on their trek into the desert, and the 6th
Manchesters had moved off to rejoin their Brigade.
The Turkish army numbered about 18,000 men, Battle of Romani,
including 4000 in reserve, and was well equipped. Aug. 4, 1916
The soldiers had been assured that during the
great Fast of Ramadan they should destroy the infidel and march
victoriously into Egypt. But General Lawrence, whose cavalry and
aircraft had been in touch with the advancing army since July 21,
had made very thorough preparations for its reception, and the Battle
of Romani was fought strictly in accordance with his plans, the
enemy conforming with pleasing docility to the tactics he laid down
for them. General Lawrence had a large force of artillery, cavalry,
and infantry in an entrenched camp at Romani, secured on the north
by the sea, and conspicuously protected on its eastern and southern
fronts by strong redoubts and entrenchments. The south-western
front, being left open ostentatiously, invited attack. The enemy could
not ignore the force at Romani and march on towards Kantara and
Dueidar, where the 42nd Division and two brigades of cavalry were
stationed, as they would then be taken in rear and flank by the
troops from Romani and in front by the Kantara force. They fell into
the trap. Their aircraft reported the strength of the British position to
the east and south of Romani and its apparent weakness to the
south-west. On the night of August 3 they had attacked the cavalry
outposts to the south of the camp, and had slowly driven them in. On
the morning of the 4th they made a strong feint, with the greater part
of their artillery, against the redoubts held by the 52nd Division on