Lecture 17: Double Deltas and Banburismus 2

Total Page:16

File Type:pdf, Size:1020Kb

Lecture 17: Double Deltas and Banburismus 2 Lorenz Cipher Lecture 17: Machine Double Deltas and Banburismus We’ll finish up the tree sorting next week Colossus Rebuilt, Bletchley Park, Summer 2004 CS150: Computer Science Today’s notes: on-line only (links) University of Virginia David Evans Computer Science http://www.cs.virginia.edu/evans Lecture 17: Double Deltas and Banburismus 2 Lorenz Wheels Breaking Fish 12 wheels • GCHQ learned about first Fish link (Tunny) 501 pins in May 1941 total (set – Intercepted unencrypted Baudot-encoded test to control messages wheels) • August 30, 1941: Big Break! Work to break in – Operator retransmits failed message with same Θ(pw) so real starting configuration Lorenz is 41 12 /5 3 ~ – Gets lazy and uses some abbreviations, makes 1 quintillion ( 10 18 ) some mistakes times harder! • SPRUCHNUMMER/SPRUCHNR (Serial Number) Lecture 17: Double Deltas and Banburismus 3 Lecture 17: Double Deltas and Banburismus 4 “Two Time” Pad “Cribs” • Allies have intercepted: • Know: C1, C2 (intercepted ciphertext) ⊕ ⊕ C1 = M1 ⊕ K1 C1 C2 = M1 M2 C2 = M2 ⊕ K1 • Don’t know M1 or M2 – But, can make some guesses (cribs) Same key used for both (same starting • SPRUCHNUMMER configuration) • Sometimes allies moved ships, sent out bombers to help the • Breaking message: cryptographers get good cribs • Given guess for M1, calculate M2 C1 ⊕ C2 = (M1 ⊕ K1 ) ⊕ (M2 ⊕ K1 ) M2 = C1 ⊕ C2 ⊕ M1 = (M1 ⊕ M2) ⊕ (K1 ⊕ K1 ) • Once guesses that work for M1 and M2 = M1 ⊕ M2 K1 = M1 ⊕ C1 = M2 ⊕ C2 Lecture 17: Double Deltas and Banburismus 5 Lecture 17: Double Deltas and Banburismus 6 1 Reverse Engineering Lorenz Intercepting Traffic • From the 2 intercepted messages, Col. John • Set up listening post to intercept traffic from Tiltman worked on guessing cribs to find M1 12 Lorenz (Fish) links and M2: 4000 letter messages, found 4000 – Different links between conquered capitals letter key K1 – Slightly different coding procedures, and different • Bill Tutte (recent Chemistry graduate) given configurations task of determining machine structure • 600 people worked – Already knew it was 2 sets of 5 wheels and 2 on intercepting traffic wheels of unknown function – Six months later new machine structure likely to generate K1 Lecture 17: Double Deltas and Banburismus 7 Lecture 17: Double Deltas and Banburismus 8 Breaking Traffic Recognizing a Good Guess • Knew machine structure, but a different • Intercepted Message (divided into 5 initial configuration was used for each channels for each Baudot code bit) message Zc = z 0z1z2z3z4z5z6z7… • Need to determine wheel setting: ⊕ ⊕ zc, i = mc,i xc,i sc,i – Initial position of each of the 12 wheels Message Key (parts from S-wheels and rest) – 1271 possible starting positions • Look for statistical properties – Needed to try them fast enough to decrypt message while it was still strategically valuable – How many of the zc,i ’s are 0? ½ (not useful) ⊕ – How many of (z c,i+1 zc,i ) are 0? ½ This is what you did for PS4 (except with fewer wheels) Lecture 17: Double Deltas and Banburismus 9 Lecture 17: Double Deltas and Banburismus 10 Double Delta Actual Advantage ∆ ⊕ • Probability of repeating letters Zc,i = Zc,i Zc,i+1 ∆ ⊕ ∆ Combine two channels: Prob[ M1, i M2, i = 0] ~ 0.614 ∆ ⊕ ∆ ∆ ⊕ ∆ 3.3% of German digraphs are repeating Z1, i Z2, i = M1, i M2, i > ½ Yippee! ⊕ ∆ ⊕ ∆ • Probability of repeating S-keys X1, i X2, i = ½ (key) ⊕ ∆ ⊕ ∆ Prob[∆ S ⊕ ∆ S = 0] ~ 0.73 S1, i S2, i > ½ Yippee! 1, i 2, i ∆ ⊕ ∆ ∆ ⊕ ∆ ⊕ ∆ ⊕ ∆ Why is M1,i M2,i > ½ Prob[ Z1, i Z2, i X1, i X2, i = 0] Message is in German, more likely following = 0.614 * 0.73 + (1-0.614) * (1-0.73) letter is a repetition than random ∆ M and S are 0 ∆ M and S are 1 ∆ ⊕ ∆ Why is S1,i S2,i > ½ = 0.55 S-wheels only turn when M-wheel is 1 if the wheel settings guess is correct (0.5 otherwise) Lecture 17: Double Deltas and Banburismus 11 Lecture 17: Double Deltas and Banburismus 12 2 Using the Advantage Heath Robinson • If the guess of X is correct, should see higher • Dec 1942: Decide to build a than ½ of the double deltas are 0 machine to do these ⊕s • Try guessing different configurations to find quickly, due June 1943 highest number of 0 double deltas • Apr 1943: first Heath Robinson machine is • Problem: delivered! # of double delta operations to try one config • Intercepted ciphertext on tape: = length of Z * length of X – 2000 characters per second = for 10,000 letter message = 12 M for each (12 miles per hour) ⊕ – Needed to perform 7 ⊕ setting * 7 per double delta operations each ½ ms = 89 M ⊕ operations Heath Robinson, British Cartoonist (1872-1944) Lecture 17: Double Deltas and Banburismus 13 Lecture 17: Double Deltas and Banburismus 14 Colossus Colossus Design Ciphertext Tape • Heath Robinson machines were too slow • Colossus designed and first built in Jan 1944 Electronic Keytext Logic Tape Reader • Replaced keytext tape loop with electronic keytext Generator generator • Speed up ciphertext tape: Position Counter – 5,000 chars per second = 30 mph Counter – Perform 5 double deltas simultaneously – Speedup = 2.5X for faster tape * 5X for parallelism Printer Lecture 17: Double Deltas and Banburismus 15 Lecture 17: Double Deltas and Banburismus 16 Impact on WWII Colossus History • 10 Colossus machines operated at Kept secret after the war, all machines destroyed Bletchley park – Various improvements in speed • Decoded 63 million letters in Nazi command messages • Learned German troop locations to plan D- Day (knew the deception was working) Rebuild, Bletchley Park, During WWII Summer 2004 Lecture 17: Double Deltas and Banburismus 17 Lecture 17: Double Deltas and Banburismus 18 3 How could the folks at Bletchley Park solve a problem ~ 1 quintillion times harder than ps4? Poster in RAF Museum Lecture 17: Double Deltas and Banburismus 19 Lecture 17: Double Deltas and Banburismus 20 Motivation Helps… The Good News... Confronted with the prospect of defeat, the Allied cryptanalysts had worked night and day to penetrate German ciphers. It No problems on your exam are would appear that fear was the main 1/quintillionth as hard as driving force, and that adversity is one of the foundations of successful breaking the Lorenz cipher codebreaking. Simon Singh, The Code Book Lecture 17: Double Deltas and Banburismus 21 Lecture 17: Double Deltas and Banburismus 22 Banburismus Enigma • Invented commercially, 1923 Given two Enigma- • German Navy, Army, Air Force encrypted messages, how • About 50,000 in use (many were can we determine if they captured by Allies) were encrypted starting • Modified throughout WWII, with the same wheel Germans believed perfectly secure settings? • Kahn’s Codebreakers (1967) didn’t know it was broken Enigma machine • Turing’s 1940 Treatise on Enigma at Bletchley Park declassified in 1996 Lecture 17: Double Deltas and Banburismus 23 Lecture 17: Double Deltas and Banburismus 24 4 Simple Substitution Ciphers Reverse Engineering ABCDEFGHIJKLMNOPQRSTUVWXYZ Enigma encrypt “This fictional movie about a fictional U.S. submarine mission is followed by a mention in the end credits of those actual British missions. Oh, the British deciphered the decrypt Enigma code, too. Come to think of it, they pretty much did everything in real life that the Americans do in this JIDKQACRSHLGWNFEXUZVTPMYOB movie.” ⇒ Roger Ebert’s review of U-571 CS DZ Lecture 17: Double Deltas and Banburismus 25 Lecture 17: Double Deltas and Banburismus 26 g Rotor Wheels Simple substitution Latch turns next rotor once per rotation Imagefrom http://en.wikipedia.org/wiki/Image:Enigma-action.pn Lecture 17: Double Deltas and Banburismus 27 Lecture 17: Double Deltas and Banburismus 28 Enigma’s Rotating Substitutions Language is Non-Random ABCDEFGHIJKLMNOPQRSTUVWXYZ • Random strings: the probability of two JIDKQACRSHLGWNFEXUZVTPMYOB letters in the two messages matching is Wheel1: one Rotate position every letter 1/26 (number of letters in alphabet) ABCDEFGHIJKLMNOPQRSTUVWXYZ SQHLZNYKXUWVJRDFBETIMOGACP • Same-encrypted strings: the output letters Wheel2: one Rotate position every letters 26 will match when the input letters match ABCDEFGHIJKLMNOPQRSTUVWXYZ – This happens much more frequently because UAVGRDCBESYHLZOQKXTIMNJWFP some letters (e.g., “e” is ~13% of all letters) are more common Wheel3: one Rotate positionwhen cycles wheel2 Lecture 17: Double Deltas and Banburismus 29 Lecture 17: Double Deltas and Banburismus 30 5 Alan Turing’s Solution Banbury Bletchley Park M1: GXCYBGDSLVWBDJLKWIPEHVYGQZWDTHRQXIKEESQS M2: YNSCFCCPVIPEMSGIZWFLHESCIYSPVRXMCFQAXVXDVU Lecture 17: Double Deltas and Banburismus 31 Lecture 17: Double Deltas and Banburismus 32 Banburismus Intercepted Message 1 Intercepted Message 2 A A B B C C D D E E F F G G H H I I J J K K L L M M N N O O P P Q Q R R S S T T U U V V M1: GXCYBGDSLVWBDJLKWIPEHVYGQZWDTHRQXIKEESQS W W X X Y Y M2: YNSCFCCPVIPEMSGIZWFLHESCIYSPVRXMCFQAXVXDVU Z Z Lecture 17: Double Deltas and Banburismus 33 Lecture 17: Double Deltas and Banburismus 34 Intercepted Message 1 Trying Possible Alignments A A B B C C GXCYBGDSLVWBDJLKWIPEHVYGQZWDTHRQXIKEESQS D D E E F F YNSCFCCPVIPEMSGIZWFLHESCIYSPVRXMCFQAXVXDVU G G H H I I YNSCFCCPVIPEMSGIZWFLHESCIYSPVRXMCFQAXVXDVU J J K K L L M M YNSCFCCPVIPEMSGIZWFLHESCIYSPVRXMCFQAXVXDVU N N O O P P Q Q R R ... S S T T U U V V YNSCFCCPVIPEMSGIZWFLHESCIYSPVRXMCFQAXVXDVU W W X X Y Y Z Z Lecture 17: Double Deltas and Banburismus 35 Lecture 17: Double Deltas and Banburismus 36 6 Charge • Exam 1: Out now, due beginning of class Monday (2 minute grace period) • Please please please be honorable! – I want the other exams to be take-home also • Last 2 questions are about Banburismus Turing’s Hut 8 at Bletchley Park Don’t complain about your working space (or Small Hall). • When in London, visit Bletchley Park You can do good computer science anywhere. But find a quiet, undisturbed place to work on the exam. (about 1 hour train ride) Lecture 17: Double Deltas and Banburismus 37 Lecture 17: Double Deltas and Banburismus 38 7.
Recommended publications
  • To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (1939­1945).
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • Stdin (Ditroff)
    Notes to accompany four Alan Turing videos 1. General The recent (mid-November 2014) release of The Imitation Game movie has caused the com- prehensive Alan Hodges biography of Turing to be reprinted in a new edition [1]. This biog- raphy was the basis of the screenplay for the movie. A more recent biography, by Jack Copeland [2], containing some new items of information, appeared in 2012. A more techni- cal work [3], also by Jack Copeland but with contributed chapters from other people, appeared in 2004. 2. The Princeton Years 1936–38. Alan Turing spent the years from 1936–38 at Princeton University studying mathematical logic with Prof. Alonzo Church. During that time Church persuaded Turing to extend the Turing Machine ideas in the 1936 paper and to write the results up as a Princeton PhD. You can now obtaing a copy of that thesis very easily [4] and this published volume contains extra chapters by Andrew Appel and Solomon Feferman, setting Turing’s work in context. (Andrew Appel is currently Chair of the Computer Science Dept. at Princeton) 3. Cryptography and Bletchley park There are many texts available on cryptography in general and Bletchley Park in particu- lar. A good introductory text for the entire subject is “The Code Book” by Simon Singh [5] 3.1. Turing’s Enigma Problem There are now a large number of books about the deciphering of Enigma codes, both in Hut 6 and Hut 8. A general overview is given by “Station X” by Michael Smith [6] while a more detailed treatment, with several useful appendices, can be found in the book by Hugh Sebag-Montefiore [7].
    [Show full text]
  • The Imagination Game Storia E Fantasia in the Imitation Game
    The Imagination Game storia e fantasia in The Imitation Game Cap. 2: Bletchley Park e Ultra Giovanni A. Cignoni – Progetto HMR 1/28 Bletchley Park e Ultra • Un’organizzazione poderosa • Bletchley Park • I luoghi, le strutture, le procedure • I meccanismi e gli appoggi • Il personale, le (tante) donne di BP • Ultra • Cos’era, come era nascosto • L’impatto sul conflitto, episodi e numeri Giovanni A. Cignoni – Progetto HMR 2/28 A lezione dai Polacchi • 1919, Biuro Szyfrów • Militari, Kowalewski, e matematici, Mazurkiewicz, Sierpiński, Leśniewski • Nel 1938 il 75% dei messaggi tedeschi intercettati era decifrato (Rejewski, Zygalski, Różycki) • Dopo il ’39 PC Bruno, Cadix, Boxmoor • In Inghilterra • Room40 (1914), GC&CS (1919), BP (1938) • Parigi (gennaio ’39), con Francesi e Polacchi • Pyry vicino Varsavia (luglio ’39) Giovanni A. Cignoni – Progetto HMR 3/28 Un posto strategico Bletchley Park - Gayhurst - Wavendon - Stanmore - Eastcote - Adstock Cambridge Banbury Letchworth Oxford London Giovanni A. Cignoni – Progetto HMR 4/28 Bletchley Park, 1942ca Giovanni A. Cignoni – Progetto HMR 5/28 Nel film, ci somiglia... Giovanni A. Cignoni – Progetto HMR 6/28 … ma non è Giovanni A. Cignoni – Progetto HMR 7/28 Il nume tutelare • 1941.10.21: Action this day! • In un momento di successo • Dopo una visita di Churchill • Le Bombe ci sono, mancano persone • Garanzie per i tecnici BTM • Personale per la catena • Intercettazione in grande • Risorse per una pesca industriale • Un po’ come “Echelon” Giovanni A. Cignoni – Progetto HMR 8/28 Il personale • Una grande industria • Da 9000 a 10000 persone, centinaia di macchine • Piuttosto stabile, circa 12000 nomi • Escluso l’indotto, fornitori e logistica • Reclutamento • Inizialmente diretto, da persona a persona • Poi attraverso controlli e selezioni metodiche • Soprattutto nell’ambito delle leve militari • Ma con un occhio anche ai civili Giovanni A.
    [Show full text]
  • STEM DISCOVERY: LONDON 8 Or 11 Days | England
    ® Learn more at Tour s for Girl Scouts eftours.com/girlscouts or call 800-457-9023 STEM DISCOVERY: LONDON 8 or 11 days | England Let STEM be your guide during your exploration of London. Uncover secret messages at Bletchley Park, the birthplace of modern information technology. Practice your sleuthing skills during a CSI-inspired forensics workshop. And plant your feet on two different hemispheres at the Royal Observatory in Greenwich, with the English capital as your backdrop. Make a special visit to Pax Lodge in Hampstead where you will participate in unique Girl Scout programming. EVERYTHING YOU GET: Full-time Tour Director Sightseeing: 2 sightseeing tours led by expert, licensed local guides (3 with extension) Entrances: London Eye, Science Museum/Natural History Museum, Tower of London, theater show, National Museum of Computing, Thames River Cruise, Royal Observatory; with extension: Louvre; Notre-Dame Cathedral Experiential learning: Forensics workshop, Stonehenge activities, Bletchley Park interactive workshop WAGGGS Centre visit: Pax Lodge All of the details are covered: Round-trip flights on major carriers; Comfortable motorcoach; Eurostar high-speed train with extension; 7 overnight stays in hotels with private bathrooms (9 with extension); European breakfast and dinner daily DAY 1: FLY OVERNIGHT TO ENGLAND DAY 2: LONDON – Meet your Tour Director at the airport in London, a city that has become one of the world’s great melting pots while maintaining a distinct character that’s all its own. – Take a walking tour of the city and ride the London Eye, a large Ferris wheel along the River Thames that offers panoramic views of the city.
    [Show full text]
  • Polish Mathematicians Finding Patterns in Enigma Messages
    Fall 2006 Chris Christensen MAT/CSC 483 Machine Ciphers Polyalphabetic ciphers are good ways to destroy the usefulness of frequency analysis. Implementation can be a problem, however. The key to a polyalphabetic cipher specifies the order of the ciphers that will be used during encryption. Ideally there would be as many ciphers as there are letters in the plaintext message and the ordering of the ciphers would be random – an one-time pad. More commonly, some rotation among a small number of ciphers is prescribed. But, rotating among a small number of ciphers leads to a period, which a cryptanalyst can exploit. Rotating among a “large” number of ciphers might work, but that is hard to do by hand – there is a high probability of encryption errors. Maybe, a machine. During World War II, all the Allied and Axis countries used machine ciphers. The United States had SIGABA, Britain had TypeX, Japan had “Purple,” and Germany (and Italy) had Enigma. SIGABA http://en.wikipedia.org/wiki/SIGABA 1 A TypeX machine at Bletchley Park. 2 From the 1920s until the 1970s, cryptology was dominated by machine ciphers. What the machine ciphers typically did was provide a mechanical way to rotate among a large number of ciphers. The rotation was not random, but the large number of ciphers that were available could prevent depth from occurring within messages and (if the machines were used properly) among messages. We will examine Enigma, which was broken by Polish mathematicians in the 1930s and by the British during World War II. The Japanese Purple machine, which was used to transmit diplomatic messages, was broken by William Friedman’s cryptanalysts.
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • Code Breaking at Bletchley Park
    Middle School Scholars’ CONTENTS Newsletter A Short History of Bletchley Park by Alex ​ Lent Term 2020 Mapplebeck… p2-3 Alan Turing: A Profile by Sam Ramsey… ​ Code Breaking at p4-6 Bletchley Park’s Role in World War II by ​ Bletchley Park Harry Martin… p6-8 Review: Bletchley Park Museum by ​ Joseph Conway… p9-10 The Women of Bletchley Park by Sammy ​ Jarvis… p10-12 Bill Tutte: The Unsung Codebreaker by ​ Archie Leishman… p12-14 A Very Short Introduction to Bletchley Park by Sam Corbett… p15-16 ​ The Impact of Bletchley Park on Today’s World by Toby Pinnington… p17-18 ​ Introduction A Beginner’s Guide to the Bombe by Luca ​ “A gifted and distinguished boy, whose future Zurek… p19-21 career we shall watch with much interest.” This was the parting remark of Alan Turing’s Headmaster in his last school report. Little The German Equivalent of Bletchley could he have known what Turing would go on Park by Rupert Matthews… 21-22 ​ to achieve alongside the other talented codebreakers of World War II at Bletchley Park. Covering Up Bletchley Park: Operation Our trip with the third year academic scholars Boniface by Philip Kimber… p23-25 this term explored the central role this site ​ near Milton Keynes played in winning a war. 1 intercept stations. During the war, Bletchley A Short History of Bletchley Park Park had many cover names, which included by Alex Mapplebeck “B.P.”, “Station X” and the “Government Communications Headquarters”. The first mention of Bletchley Park in records is in the Domesday Book, where it is part of the Manor of Eaton.
    [Show full text]
  • The Imitation Game, Ca1rncross 1S Shown As a Mathematical Cryptanalyst Who Worked in the Same Section As Alan Turing
    NSA Daily - HISTORY TODAY - 16 January 2015 Page 1 of2 DOCID: 4190908 Dynamic Page -- Highest Possible Class1f1cat1on 1s TOP SEERETh'Sl{TALENT t<:EYI IOLE/iREL TO USA, AUS, CAN, 68R, NZL (U) HISTORY TODAY - 16 January 2015 Run Date: 01/16/2015 (U) The recent motion picture about Alan Turing, The Im1tat1on Game, shows many of the interesting characters who worked at Bletchley Park during World War II. In order to emphasize certain aspects about the life of Dr. Turing, the script sometimes portrayed these other characters differently from the way they were in real life. I I (U) One of these was John Ca1rncross, who -- after the end of the war -- confessed to spying for the Soviet Union. (U) Although much about his spying career 1s still murky, History Today would like to compare what we do know with the way Ca1rncross was portrayed in the film. (U) SPOILER ALERT ON: In The Imitat10n Game, Camcross 1s portrayed as a cryptanalyst working in the section headed by Alan Turing, which 1s trying to solve the German Navy ENIGMA machine and develop the cryptanalytic bombe to exploit 1t on a regular basis. In a private conversation, Ca1rncross reveals that he has recognized that Turing 1s homosexual. When Turing later finds out that Ca1rncross 1 1s secretly bootlegging decrypts to the Soviet Union, Ca1rncross stops him from revealing this by threatening to make Turing's secret public. Later, Turing learns that British intelligence knew of Ca1rncross' 1ll1c1t life all along and was using him to pass d1smformat1on to the Soviet leader, Joseph Stalin.
    [Show full text]
  • MTAT.07.006 Research Seminar in Cryptography the Enigma Cipher Machine
    MTAT.07.006 Research Seminar in Cryptography The Enigma Cipher Machine Kadri Hendla November 28, 2005 Abstract 3.1 The Rotors The aim of this survey is to give a brief overview on Rotors are the most important part of an Enigma Enigma cipher machine and its cryptanalysis before machine. A rotor is a disc about 10 cm in diameter and during the Second World War. The survey is and it’s usually made of hard rubber or bakelite. mostly based on the articles [1] and [7] on Enigma On one face are 26 brass pins forming a circle; on from Wikipedia. the other side are corresponding electrical contacts. Each pin represents a letter in the alphabet. Inside the rotor are 26 wires connecting the pins on one 1 Introduction side to the contacts on the other side; the wiring is different for each rotor. The rotor also has a finger Enigma is a portable cipher machine, famous for wheel for turning the rotor by hand and an alpha- the role it played in World War II. The breaking of bet ring, so the operator can see the rotor position. Enigma codes is considered to be one of the reasons In the earlier versions of Enigma the alphabet ring for the Allies victory. was fixed; the later versions allowed adjusting the alphabet ring relative to the core wiring. This po- sition of the ring is known as the ring settings. The 2 History of Enigma rotors are placed in the machine side by side, which causes the pins and contacts of the neighbouring In 1918 German engineer Arthur Scherbius applied rotors to form an electrical connection.
    [Show full text]
  • Alan Turing and the Turing Test
    Dickinson College Dickinson Scholar Faculty and Staff Publications By Year Faculty and Staff Publications 11-2014 Alan Turing and the Turing Test John P. MacCormick Dickinson College Follow this and additional works at: https://scholar.dickinson.edu/faculty_publications Part of the Computer Sciences Commons Recommended Citation MacCormick, John. "Alan Turing and the Turing Test." Dickinson Science Magazine 1, no. 2 (2014): 31. This article is brought to you for free and open access by Dickinson Scholar. It has been accepted for inclusion by an authorized administrator. For more information, please contact [email protected]. I T*h..bqyl Alan Turing and the Turing Test John MacCormick Assoctets Pnoprsson or CovputEn ScrENct The movie is called The Imitation Game.Why? We'lI get back to that in a minute. First, who was Alan Turing, and why would anyone make a movie about him? He's sometimes described as a mathematician, some- times as an engineer, and sometimes as a computer scientist. All are true. His university degrees were in mathematics; he essentially founded the field of theoretical computer science with a breakthrough paper in the 1930s; and he later helped to engineer some of the earliest real computers. But for something worthy of the big screen, we can turn to Turing's contribution during the Second World War: he was a key member of the team that cracked the German naval Enigma code. It's generally accepted that his work saved many lives and considerably shortened the war. It also makes for an exciting movie script, especially when you consider that the work was done on a shoestring budget by a secret team operating at an English country mansion called Bletchley Park.
    [Show full text]
  • The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life: Plus the Secrets of Enigma
    The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life: Plus The Secrets of Enigma B. Jack Copeland, Editor OXFORD UNIVERSITY PRESS The Essential Turing Alan M. Turing The Essential Turing Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma Edited by B. Jack Copeland CLARENDON PRESS OXFORD Great Clarendon Street, Oxford OX2 6DP Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide in Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Taipei Toronto Shanghai With offices in Argentina Austria Brazil Chile Czech Republic France Greece Guatemala Hungary Italy Japan South Korea Poland Portugal Singapore Switzerland Thailand Turkey Ukraine Vietnam Published in the United States by Oxford University Press Inc., New York © In this volume the Estate of Alan Turing 2004 Supplementary Material © the several contributors 2004 The moral rights of the author have been asserted Database right Oxford University Press (maker) First published 2004 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, or under terms agreed with the appropriate reprographics rights organization. Enquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above.
    [Show full text]