Solving a Tunny Challenge with Computerized “Testery” Methods

Total Page:16

File Type:pdf, Size:1020Kb

Solving a Tunny Challenge with Computerized “Testery” Methods Solving a Tunny Challenge with Computerized “Testery” Methods George Lasry The DECRYPT Project [email protected] Abstract This article is structured as follows: In Section 1, a functional description of the Lorenz SZ42 is given. The Lorenz SZ42, codenamed Tunny, was In Section 2, the contents of the Testery report are a teleprinter encryption device used by Ger- surveyed, highlighting the parts that reveal new in- many during WW2 for strategic commu- formation. In Section 3, the primary techniques nications. Its successful cryptanalysis at for the cryptanalysis of Tunny are described. In Bletchley Park (BP) provided the Allies with Section 4, a Tunny cipher challenge is introduced. high-grade intelligence about several fronts, In Section 5, new automated or partially automated as well as for the preparations for the D- versions of the Testery manual methods are de- Day landings. The story of Tunny’s code- scribed, as well as how they were used to solve breaking and Colossus is well known, fol- the Tunny cipher challenge. In Section 6, the main lowing the declassification of the General results of this study are summarized. Report on Tunny in 2000 (Good et al., 1945), and the publication of several books 1 The Lorenz SZ42 (Tunny) (Reeds et al., 2015; Gannon, 2014; Copeland, 2010; Roberts, 2017; Mayo-Smith, 2014). The history of the Lorenz SZ42 and the details The work on Colossus and other machines of its design and functioning are documented in was carried out in the Newmanry, under the references (Reeds et al., 2015; Gannon, 2014; the leadership of the mathematician Max Copeland, 2010). In this section, only a brief func- Newman. tional description is given. The Lorenz SZ42 is a teleprinter encryption de- The work of the Testery, the other Tunny vice. It encodes Baudot teleprinter symbols that section at BP, is less known. Named after consist of five impulses. Each impulse can have his commander, Major Ralph Tester, the one of two states. It can be active, denoted as cross Testery was responsible for the develop- according to BP terminology, or x. Or it can be in- ment and application of hand methods, that active, denoted as dot or •. The Baudot alphabet, complemented the work of machines like as well as BP’s notation for the Baudot symbols, Colossus. For some reason, the report on is given in Table 1. the Testery was not declassified until 2018. The Lorenz SZ42 functions as a Vernam device. Following its recent release, it is possible It applies an XOR addition (denoted as ⊕) to en- to fully assess the achievements of the Testery crypt plaintext Baudot symbols. The effect of the cryptanalysts and their key contribution to XOR operation on a pair of impulses a and b is BP’s success against Tunny (Testery, 1945). described in Table 2. The XOR operation can also The work described in this article is an at- be applied to a pair of Baudot symbols with five tempt to determine whether the Testery man- impulses each. In that case, it is applied sequen- ual methods can be mechanized with mod- tially one impulse at a time. An example is given ern computing. The author was able to in Table 3. It should be noted that adding (using automate some of the techniques and par- an XOR addition) a symbol to itself, results in the tially automate some others. With these symbol ••••• which has only dots, as illustrated techniques, the author also succeeded in in Table 4. recovering the key settings and the plain- The Lorenz SZ42 generates a keystream K of text of two Tunny challenge messages. pseudo-random symbols and performs an XOR ad- Proceedings of the 3rd International Conference on Historical Cryptology, HistoCrypt 2020 96 dition on a stream of plaintext P, producing the Symbol BP Meaning in Meaning in ciphertext Z, as described in Equation 1, the en- Notation Letter Shift Figure Shift cryption formula. ••••• / null ••••x E E 3 •••x• 4 carriage return Z = P ⊕ K (1) •••xx A A - ••x•• 9 space Encryption and decryption are implemented iden- ••x•x S S ’ tically. This is possible since adding (XOR) the ••xx• I I 8 ••xxx U U 7 keystream K to the ciphertext Z cancels out the •x••• 3 line feed effect of the keystream K originally added during •x••x D D Who are you? encryption, as shown in Equation 2, the decryption •x•x• R R 4 •x•xx J J BELL formula. •xx•• N N , •xx•x F F % •xxx• C C : Z ⊕ K = (P ⊕ K) ⊕ K = P ⊕ (K ⊕ K) = P (2) •xxxx K K ( x•••• T T 5 As a result, two machines using identical set- x•••x Z Z + x••x• L L ) tings can communicate properly, one side encrypt- x••xx W W 2 ing plaintext and transmitting ciphertext, the other x•x•• H H £ receiving and decrypting the ciphertext. x•x•x Y Y 6 x•xx• P P 0 The functioning of the Lorenz SZ42 is illus- x•xxx Q Q 1 trated in Figure 3 in the Appendix. The keystream xx••• O O 9 K is generated by a set of twelve wheels, divided xx••x B B ? xx•x• G G & into three functional groups: xx•xx 5 or + figure shift xxx•• M M . • Five c wheels, c1 to c5: Those wheels have xxx•x X X / 41, 31, 29, 26, and 23 pins, respectively. Each xxxx• V V ; pin can be set to either an active (cross) or an xxxxx 8 or - letter shift inactive (dot) state. The c wheels regularly Table 1: The Baudot Teleprinter Alphabet step after the encryption (or decryption) of each symbol. The stream of Baudot symbols generated by the five c wheels is denoted as the c stream. a b a ⊕ b • • • • Five y wheels, y1 to y5: Those wheels have • x x 43, 47, 51, 53, and 59 pins, respectively. Each x • x x x • pin can be set to either an active or an in- active state. Their stepping is governed by Table 2: The XOR (⊕) Operation the motor wheels. Either all five y wheels step or none of them steps. The actual stream of symbols generated by the y wheels is de- noted as the y0 stream. It differs from a the- K •xxxx G xx•x• oretical y stream, that would have been gen- K ⊕ G x•x•x erated if the y wheels always stepped. The y0 stream is an extended version of the y Table 3: XOR (⊕) on the Symbols K and G stream, with symbols duplicated at positions where the y wheels did not step. • Two motor or m wheels, m1 and m2: Wheel G xx•x• G xx•x• m1 has 61 pins, which govern the stepping of G ⊕ G ••••• wheel m2. If the current pin of wheel m1 is ac- tive (cross), wheel m2 steps. Wheel m2 has 37 Table 4: XOR (⊕) on the Same Symbol pins, and if its current pin is active, all five y wheels step. The single-impulse stream Proceedings of the 3rd International Conference on Historical Cryptology, HistoCrypt 2020 97 generated by wheel m2 is denoted as the base motor stream. In later models of the Lorenz SZ42, various motor limitations were intro- duced to reduce the number of motor stops, that is, positions where the y wheels are not stepping.1 The keystream K consists of the (XOR) addition of two streams, c, and y0: K = c ⊕ y0 (3) Therefore: Z = P ⊕ K = P ⊕ c ⊕ y0 (4) We define D, also known as the dechi stream (or simply, the dechi), as: D = Z ⊕ c (5) Figure 1: Testery Report – Table of Contents The term dechi originates from the fact that we are removing c from the ciphertext Z, by adding it so that the original contribution of c cancels out: In some places, it lacks some details or examples 0 0 necessary to understand some of the key points. D = Z ⊕ c = P ⊕ c ⊕ y ⊕ c = P ⊕ y : (6) The GRT only briefly mentions the work and methods of the Testery. Those hand methods are If we add y0 to both sides of D = P ⊕ y0, it also also described (in even less detail) in testimonies follows that P = D ⊕ y0. and books written by Testery veterans (Roberts, 2 The Testery Report 2017; Mayo-Smith, 2014). The Testery report was not declassified together Each of the two main Tunny sections at BP – the with the GRT back in 2000. A possible reason Newmanry and the Testery – wrote a report. The is that the Testery report may have contained sen- General Report on Tunny with Emphasis on Sta- sitive information about methods still in use af- tistical Methods (GRT) was written in 1945 by I.J. ter WW2. This contrasts with a statement by D. Good, D. Mitchie, and G. Timms from the New- Mitchie, one of the GRT authors, who was allowed manry (Good et al., 1945; Reeds et al., 2015). It to review the Testery report, and wrote that ”a was declassified in 2000. It describes in detail the good deal of [the Testery report’s] content is di- work on codebreaking machines such as the Heath rectly inferable from other sources, including Gen- Robinson and Colossus in the Newmanry, as well eral Report on Tunny. The full Testery report am- as their mathematical and statistical foundations. plifies this knowledge.” (Copeland, 2010, P. 246) While it provides a wealth of technical informa- In 2017, at the NSA Symposium on Cryptologic tion, the GRT is not easy to read, and its struc- History, the author met the GCHQ historian, Dr.
Recommended publications
  • To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (1939­1945).
    [Show full text]
  • Codebreaker in the Far East 1
    CODEBREAKER o IN THE FAR EAST ALANSTRIPP With an Introduction by CHRISTOPHER ANDREW FRANK CASS First published in Greal Britain by FRANK CASS & CO. LTD. , Gainsborough House, Gainsborough Road, LoJldon Ell 1RS, England ~/() and in the United States ofAmerica by D FRANK CASS & CO. LTD. clo Biblio Distribution Center Contents C~% 81 Adams Drive, P.O. Box 327, Totowa, NJ 07511 6 Copyright tt> 1989 Alan Stripp List of illustrations vii S-t- Author's Note ix British Library Cataloguing in Publication Data I qq~9 Acknowledgments xi Stripp, Alan, 1924- Introduction by Christopher Andrew xiii Codebreaker in the Far East 1. World War 2. Military Cryptology I. Title 940.54'85 PART ONE: TOURS OF DUTY ISBN 0-7146-3363-1 A11408 737468 1. Cambridge, Bedford and Yorkshire 3 2. Bletchley Park 13 . --Library of Congress Cataloging-in-Publicatioll Data 3. Marc,ping Orders 29 Stripp, Alan, 1924- 4. Delhi 39 Codebreaker in the Far East p. cm. 5. Naini Tal, Agra and Abbottabad 48 Bibliography: p 58 Includes index. 6. Bangalore, Singapore and Cambridge ISBN 0-7146-3363-1 1. Stripp, AIan, 1924- .2. World War, 1939-1945-Cryptography. 3. World War, 1939-1945-Personal narratives, English. 4: World PART TWO: JAPANESE PUZZLES War, 1939-1945-Campaigns-Bunna. I. Title D81O.C88S76 1989 7. Japanese Codes and Ciphers: what were they like? 65 940.54'86'41-dcl9 89-741 80 CIP 8. What did they tell us? 9. How were they sent? 89 All rights reserved. No part of this publication may be repro­ 10. How were they intercepted? 93 duced in any form or by any means, electronic, mechanical photocopying, recording or otherwise, witho;lt the prio; 11.
    [Show full text]
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946
    Programmed Inequality How Britain Discarded Women Technologists and Lost Its Edge in Computing Marie Hicks HD 6135 H53 2017 The Library Mt. St. Vincent Univ. Halifax, N.S. B3M 2J6 The MIT Press Cambridge, Massachusetts London, England 1 War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946 In recent years, the restoration of Bletchley Park has attracted worldwide attention. The country estate in Milton Keynes, United Kingdom, was the site of the most important codebreaking operations of World War II and home to the first digital, electronic, programmable computer: the Colossus. The British-designed and manufactured Colossus computers, of which there were ten in all by war's end, were critical to the conduct of Allied wartime operations. Unlike their better-known U.S. counter­ part, the ENIAC, the Colossus computers were actually deployed during the war, actively changing its outcome. Kept secret for decades, the full import of the developments at Bletchley has only recently become widely known.1 Yet while popular culture has begun to recognize the importance of Bletchley's wartime operations, misunderstandings persist about the nature of the information work performed there. The 2014 blockbuster The Imitation Game, for instance, cleaves the Colossus computers from the narrative entirely in favor of building a "great man" narrative for a single codebreaker.2 Hidden within the story of Bletchley is a less popular narrative that cannot leverage the appeal of a lone genius and his accomplishments. Thousands of women worked at Bletchley during the war-most in tech­ nical roles.3 Although it is generally accepted that the striking and wide­ ranging roles of the mostly women workers within Bletchley Park give lie to stereotypes about computing as a traditionally masculine field, the contributions of these women have not been analyzed as constitutive of larger trends in the history of computing.
    [Show full text]
  • Colossus: the Missing Manual
    Colossus: The Missing Manual Mark Priestley Research Fellow, The National Museum of Computing — Bletchley Park, UK Thomas Haigh University of Wisconsin—Milwaukee & Siegen University 1 serialized ciper text English Cipher text of one message plain text 1 0 0 1 1 (5 channel tape) 0 1 0 1 0 0 1 0 0 0 They were already 1 0 1 1 0 1 0 0 1 0 looking at him as approached in the distance, because he just stood out. He had quite an old face, 01101 11101 01011 0010 Knockolt Newmanry Newmanry Testery Testery Hut 3 Outstation Set Chi Wheels Generate Set Psi & Decrypt Translate Intercept, & Verify Counts “dechi” Motor Wheels Message Message Record & Verify Message (Colossus) (Tunny analog (Hand methods) (Tunny analog (Bilingual machine) machine) humans) dechi 1 0 0 1 1 0 27, 12, 30, 43, 8 Chi wheel 0 1 0 1 0 1 Psi & 55, 22 Sie sahen ihn schon 0 1 0 0 0 von weitem auf sich start posns. 1 0 1 1 0 1 0 0 1 0 motor start posns. zukommen, denn er for msg el auf. Er hatte ein 31, 3, 25, 18, 5 ganz altes Gesicht, aber wie er ging, German 1 0 0 1 1 0 0 1 0 1 0 1 0110001010... plain text 0 1 0 0 0 Newmanry 1 0 1 1 0 0011010100... 1 0 0 1 0 10011001001... 01100010110... 1 0 0 1 1 0 Break Chi 01011001101... 0 1 0 1 0 1 0110001010... 0 1 0 0 0 Wheels 1 0 1 1 0 Chi wheel 0011010100..
    [Show full text]
  • Code Breaking at Bletchley Park
    Middle School Scholars’ CONTENTS Newsletter A Short History of Bletchley Park by Alex ​ Lent Term 2020 Mapplebeck… p2-3 Alan Turing: A Profile by Sam Ramsey… ​ Code Breaking at p4-6 Bletchley Park’s Role in World War II by ​ Bletchley Park Harry Martin… p6-8 Review: Bletchley Park Museum by ​ Joseph Conway… p9-10 The Women of Bletchley Park by Sammy ​ Jarvis… p10-12 Bill Tutte: The Unsung Codebreaker by ​ Archie Leishman… p12-14 A Very Short Introduction to Bletchley Park by Sam Corbett… p15-16 ​ The Impact of Bletchley Park on Today’s World by Toby Pinnington… p17-18 ​ Introduction A Beginner’s Guide to the Bombe by Luca ​ “A gifted and distinguished boy, whose future Zurek… p19-21 career we shall watch with much interest.” This was the parting remark of Alan Turing’s Headmaster in his last school report. Little The German Equivalent of Bletchley could he have known what Turing would go on Park by Rupert Matthews… 21-22 ​ to achieve alongside the other talented codebreakers of World War II at Bletchley Park. Covering Up Bletchley Park: Operation Our trip with the third year academic scholars Boniface by Philip Kimber… p23-25 this term explored the central role this site ​ near Milton Keynes played in winning a war. 1 intercept stations. During the war, Bletchley A Short History of Bletchley Park Park had many cover names, which included by Alex Mapplebeck “B.P.”, “Station X” and the “Government Communications Headquarters”. The first mention of Bletchley Park in records is in the Domesday Book, where it is part of the Manor of Eaton.
    [Show full text]
  • June 1St Heath Robinson Operational
    similar vein to Rube Goldberg in The Mark 2 supported the US). conditional branching, just as Charles Babbage’s analytical June 1st The machine consisted of a engine had done [Dec 23], frame (called the bedspread) although there’s no evidence to which supported two long suggest that the Mark 2's Heath Robinson teleprinter paper tapes on a designer, Tommy Flowers [Dec network of reels, and two other 22], was aware of Babbage's Operational racks holding counters and logic design. June 1, 1943 circuits. Ten Colossi were operating by One tape could hold 2,000 The "Heath Robinson" was a the end of the war and an characters of cipher text, while code-breaking machine used at eleventh had been the other stored patterns that Bletchley Park [Aug 15] to help commissioned. They allowed the the codebreakers believed might decrypt the Lorenz (aka Tunny) Allies to extract a vast amount of represent the Lorenz cipher. intelligence from intercepted encryption. The second tape had radio messages sent from Lorenz was a much more to be precisely one character German High Command advanced cipher than the better longer than the first, and throughout Europe. known Enigma [Feb 23]. For keeping the tapes synchronized example, Enigma machines was a major challenge. A functioning reconstruction of a initially used just three rotors Mark 2 was completed in 2008 Max Newman [Feb 7] was during their encryption process, by Tony Sale and volunteers; it's while a Lorenz device employed responsible for the Robinson's on display at The National functional specification, but twelve.
    [Show full text]
  • A Note on His Role As World War Ii Cryptanalyst
    Internatiuonal Journal ofApplied Engineering and Technology ISSN: 2277-212X (Online) An Online International Journal Available at http://www.cibtech.org/jet.htm 2013 Vol. 3 (1) January-March, pp.21-26/Afreen Historical Note ALAN TURING: A NOTE ON HIS ROLE AS WORLD WAR II CRYPTANALYST *Rahat Afreen *Department of MCA, Millenium Institute of Management, Dr. RafiqZakariaCampus,Aurangabad, Maharashtra *Author for Correspondence ABSTRACT Alan Mathison Turing is well known to the world of computer for the concept of Turing Machine- A conceptual machine presented by him which proves that automatic computation cannot solve all mathematical problems – also called as Halting Problem of Turing Machine. He was attributed as the founder of Computer Science. But, until late 20th century, his contributions in the field of Number Theory, Cryptography, Artificial Intelligence and more importantly how his ideas protected England in the times of world war II were unknown. Key Words: Alan Turing, Enigma, Bombe, Colossus, Tunny, ACE INTRODUCTION Alan Turing was born on 23rd June 1912 in Paddington, London. His father Julius Mathison Turing worked for Indian Civil Services at Orrisa for British government in India. But he and his wife decided to keep their children back in England for education. He got his education from Sherbrone School, Sherbrone and did his higher education from King‟s College Cambridge where he later became a fellow. He had an interest in the field of mathematics and presented numerous papers on famous problems of mathematics. At the age of 24 Turing wrote a paper entitled “On Computable Numbers, with an Application to the Entscheidungs problem”.
    [Show full text]
  • Colossus and the Origins of Programmability
    Colossus and the Origins of Programmability Draft for discussion at the 2016 SIGCIS Workshop. Do not quote or cite without permission of the authors. Thomas Haigh ([email protected]) and Mark Priestley ([email protected]) This is an initial draft of some material from our ongoing project to explore the history of Tommy Flowers, the ways in which Colossus was used and configured, and its place in the history of information technology. This work is sponsored by Mrs. L.D. Rope’s Second Charitable Trust. The current draft is very preliminary, so please do not quote, cite, or distribute without our permission. If names and references are confusing to you our apologies! Fortunately the basics of Colossus and Bletchley Park are well covered in Wikipedia. Colossus was a codebreaking device built by the British General Post Office at the end of 1943, under the direction of career telecommunications engineer Tommy Flowers. It entered use at Bletchley Park in 1944 to speed the work of codebreakers targeting what was then codenamed “fish,” a family of Lorenz teleprinter codes used for high level German military communication. Colossus was not a one‐off machine, like most early electronic computers, but the prototype for a family of ten “colossi,” in which later models incorporated some significant improvements. The machines were used by the Newmanry, a group under mathematician Max Newman, where ingenious codebreaking users discovered new applications for them which, in turn, shaped the provision of additional controls and capabilities in the later models. Unlike ENIAC, which began in modest secrecy but soon graced the front page of the New York Times, Colossus was highly classified and remained unknown to the public until the 1970s.
    [Show full text]
  • Growing the Artificial Intelligence Industry in the Uk
    GROWING THE ARTIFICIAL INTELLIGENCE INDUSTRY IN THE UK Professor Dame Wendy Hall and Jérôme Pesenti Growing the Artificial Intelligence Industry in the UK FOREWORD We are grateful to the Business Secretary and Culture Secretary for asking us to conduct this Review of how to grow Artificial Intelligence in the UK, in terms of those developing it and deploying it. We believe that this is the right time for the UK to accelerate on AI, and ensure that our unique history of ground breaking research bears fruit in the social and economic benefits that the technology offers. We are at the threshold of an era when much of our productivity and prosperity will be derived from the systems and machines we create. We are accustomed now to technology developing fast, but that pace will increase and AI will drive much of that acceleration. The impacts on society and the economy will be profound, although the exact nature of those impacts is uncertain. We are convinced that because of the UK’s current and historical strengths in this area we are in a strong position to lead rather than follow in both the development of the technology and its deployment in all sectors of industry, education and government. We have a choice. The UK could stay among the world leaders in AI in the future, or allow other countries to dominate. We start from a good position in many respects but other leading countries are devoting significant resources to growing and deploying AI. The UK will need to act in key areas and to sustain action over a long period and across industry sectors, to retain its world leading status, and to grow our AI capability as well as deploying it much more widely.
    [Show full text]
  • The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life: Plus the Secrets of Enigma
    The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life: Plus The Secrets of Enigma B. Jack Copeland, Editor OXFORD UNIVERSITY PRESS The Essential Turing Alan M. Turing The Essential Turing Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma Edited by B. Jack Copeland CLARENDON PRESS OXFORD Great Clarendon Street, Oxford OX2 6DP Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide in Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Taipei Toronto Shanghai With offices in Argentina Austria Brazil Chile Czech Republic France Greece Guatemala Hungary Italy Japan South Korea Poland Portugal Singapore Switzerland Thailand Turkey Ukraine Vietnam Published in the United States by Oxford University Press Inc., New York © In this volume the Estate of Alan Turing 2004 Supplementary Material © the several contributors 2004 The moral rights of the author have been asserted Database right Oxford University Press (maker) First published 2004 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, or under terms agreed with the appropriate reprographics rights organization. Enquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above.
    [Show full text]
  • Filozofski Fakultet Sveučilišta U Zagrebu Odsjek Za Informacijske I Komunikacijske Znanosti 2017/2018
    Filozofski fakultet Sveučilišta u Zagrebu Odsjek za informacijske i komunikacijske znanosti 2017/2018. Maja Mikac Kako je Colossusom razbijena Lorenzova šifra Završni rad Mentorica: dr. sc. Vjera Lopina Zagreb, 2018. Sadržaj Uvod ........................................................................................................................................... 4 1. Kratki presjek razvoja kriptografskih sustava ............................................................. 5 1.1. Kriptologija u Drugom svjetskom ratu ....................................................................... 8 2. Lorenz ................................................................................................................................ 9 2.1. Vernamova šifra ....................................................................................................... 11 2.2. Kriptoanaliza Lorenza .............................................................................................. 15 2.3. Logika stroja ............................................................................................................. 16 2.4. Turingery .................................................................................................................. 19 2.5. Testery ...................................................................................................................... 20 2.6. Newmanry ................................................................................................................ 21 3. Bletchley Park ................................................................................................................
    [Show full text]