He added: "The sort of codes that were constructed to be used during operations were designed only to be read by the senders and the recipients. Unless you get rather more idea than we have about who actually sent the message and who it was sent to we are not going to be able to find out what the underlying code was."