Colossus: Bletchley Parks Last Secret Free

Total Page:16

File Type:pdf, Size:1020Kb

Colossus: Bletchley Parks Last Secret Free FREE COLOSSUS: BLETCHLEY PARKS LAST SECRET PDF Paul Gannon | 592 pages | 11 Jan 2007 | ATLANTIC BOOKS | 9781843543312 | English | London, United Kingdom Colossus: Bletchley Park's Greatest Secret by Paul Gannon This is the last untold story of Bletchley Park. Using declassified information, Paul Gannon gives us a gripping account of the invention of the world's first true computer, Colossus. Uncover the secrets of Bletchley Park's code-breaking computers. Inalmost a year after the outbreak of the Second World war, Allied radio operators at an interception station in South London began picking up messages in a strange new code. Using science, maths, innovation and improvisation Bletchley Park codebreakers worked furiously to invent a machine to decipher what turned out to be the secrets of Nazi high command. It was called Colossus. What these codebreakers didn't realize was that they had to fashion the world's first true computer. When the war ended, this incredible invention was dismantled and hidden Colossus: Bletchley Parks Last Secret for almost 50 years. Paul Gannon has pieced together the tremendous story of what is now recognized as the greatest secret of Bletchley Park. Colossus: Bletchley Park's Last Secret. Paul Gannon. Wireless War. Codes and Ciphers. Between the Wars. A Day in the Colossus: Bletchley Parks Last Secret of Fish I. The Technology and Organization of Fish. Transatlantic Fisheries. Colossus The Legacy. If the Wind Meets it. Herring and the Cats Whiskers. Hierist Colossus: Bletchley Parks Last Secret traurig 13 Making the Difference. The Robinson Family. Inventing the Electronic Computing Machine. Colossus Arrives Today. Fish Landing the Catch. B The Vernam Cipher. Extended Example of The First Break. J Colossus Processing Tree. Bream Message Types and Examples Early O Whiting Decode 5 February A Note on Sources. Fishing the Depths. Further Reading. A Word about Words. A Window on a. Fish Dialects. Colossus: The Secrets of Bletchley Park's Codebreaking Computers This is the last untold story of Bletchley Park. Using recently declassified information, Paul Gannon has written a gripping account of the invention of the world's first true computer, Colossus. Uncover the secrets of Bletchley Park's code-breaking computers. Colossus: Bletchley Parks Last SecretColossus: Bletchley Parks Last Secret a year after the outbreak of the Second World War, Allied radio operators at an interception station in South London began picking up messages in a strange new code. Using science, maths, innovation and Colossus: Bletchley Parks Last Secret BletchleyPark codebreakers worked furiously to invent a machine to decipher what turned out to be the secrets of Nazi high command. It was called Colossus. What these codebreakers didn't realize was that they had fashioned the world's first true computer. When the war ended, this incredible invention was dismantled and Colossus: Bletchley Parks Last Secret away for almost 50 years. Paul Gannon has pieced together the tremendous story of what is now recognized as the greatest secret of BletchleyPark. Please sign in to write a review. If you have changed your email address then contact us and we will update your details. Would you like to proceed to the App store to download the Waterstones App? We have recently updated our Privacy Policy. The site uses cookies to offer you a better experience. By continuing to browse the site you accept our Cookie Policy, you can change your settings at any time. In stock Usually dispatched within 24 hours. Quantity Add to basket. This item has been added to your basket View basket Checkout. Your local Waterstones may have stock of this item. View other formats and editions. Paul Gannon has revealed a previously untold story. Gannon sets the record straight. Gannon's account of wartime interception and encryption is deeply researched. I commend the book to both the professional and the general reader. Added to basket. How to be a Victorian. Ruth Goodman. Map Of A Nation. Rachel Hewitt. The English and their History. Robert Tombs. Eleanor Of Aquitaine. Alison Weir. Leanda de Lisle. A Colossus: Bletchley Parks Last Secret Of Scotland. Neil Oliver. A Brief History of the Anglo-Saxons. Geoffrey Hindley. The Secret Listeners. Sinclair McKay. The Hollow Crown. Dan Jones. Gimson's Kings and Queens. Andrew Gimson. Tracy Borman. The Churchill Factor. Boris Johnson. A History of Ancient Britain. All the Countries We've Ever Invaded. Stuart Laycock. Helen Castor. The English Civil War. Diane Purkiss. Your review has been submitted successfully. Not registered? Remember me? Forgotten password Please enter your email address below and we'll send you a link to reset your password. Not you? Reset password. Download Now Dismiss. Simply reserve online and pay at the counter when you collect. Available in shop from just two hours, subject to availability. Your order is now being processed and we have sent a confirmation email to you at. This item can be requested from the shops shown Colossus: Bletchley Parks Last Secret. If this item isn't available to be reserved nearby, add the item to your basket instead and select 'Deliver to my local shop' at the checkout, to be able to collect it from there at a later date. Preferred contact method Email Text message. When will my order be ready to collect? Following the initial email, you will be contacted by the shop to confirm that your item is available for collection. Call us on or send us an email at. Unfortunately there has been a problem with your order. Please try again or alternatively you can contact your chosen shop on or send us an email at. Colossus computer - Wikipedia Colossus was a set of computers developed by British codebreakers in the years — to help in the cryptanalysis of the Lorenz cipher. Colossus used thermionic valves Colossus: Bletchley Parks Last Secret tubes to perform Boolean and counting operations. Colossus is thus regarded [3] as the world's first programmableelectronicdigital computer, although it was programmed by switches and plugs and not by a stored program. Colossus: Bletchley Parks Last Secret Turing 's use of Colossus: Bletchley Parks Last Secret in cryptanalysis see Banburismus contributed to its design. It has sometimes been erroneously stated that Turing designed Colossus to aid the cryptanalysis of the Enigma. The prototype, Colossus Mark 1was shown to be working in December and was in use at Bletchley Park by early An improved Colossus Mark 2 that used shift registers to quintuple the processing speed, first worked on 1 Junejust in time for the Normandy landings on D-Day. The existence of the Colossus machines was kept secret until the mids; the machines and the plans for building them had previously been destroyed in the s as part of the effort to maintain the secrecy of the project. The Colossus computers were used to help decipher intercepted radio teleprinter messages that had been encrypted using an unknown device. This led the British to call encrypted German teleprinter traffic " Fish ", [14] and the unknown Colossus: Bletchley Parks Last Secret and its intercepted messages " Tunny " tunafish. Before the Germans increased the security of their operating procedures, British cryptanalysts diagnosed how the unseen machine functioned and built an imitation of it called " British Tunny ". It was deduced that the machine had twelve wheels and used a Vernam ciphering technique on message characters in the standard 5-bit ITA2 telegraph code. It did this by combining the plaintext characters with a stream of key characters using the XOR Boolean function to produce the ciphertext. In Augusta blunder by German operators led to the transmission of two versions of the same message with identical machine settings. These were intercepted and worked on at Bletchley Park. The chi wheels stepped regularly with each letter that was encrypted, while the psi wheels stepped irregularly, under the control of the motor wheels. With a sufficiently random keystream, a Vernam cipher removes the natural language property of a plaintext message of having an uneven frequency distribution of the different characters, to produce a uniform distribution in the ciphertext. The Tunny machine did this well. However, the cryptanalysts worked out that by examining the frequency distribution of the character-to-character changes in the ciphertext, instead of the plain characters, there was a departure from uniformity which provided a way into the system. This was achieved by "differencing" in which each bit or character was XOR-ed with its successor. In order Colossus: Bletchley Parks Last Secret decrypt the transmitted messages, two tasks had to be performed. The first was "wheel breaking", which was the discovery of the cam patterns for all the wheels. These patterns were set up on the Lorenz machine and then used for a fixed period of time for a succession of different messages. Each transmission, which often contained more than one message, was enciphered with a different start position of the wheels. Alan Turing invented a method of wheel-breaking that became known as Turingery. Colossi 2, 4, 6, 7 and 9 had a "gadget" to aid this process. The second task was "wheel setting"which worked out the start positions of the wheels for a particular message, and could only be attempted once the cam patterns were known. To discover the start position of the chi wheels for a message, Colossus compared two character streams, counting statistics from the evaluation of programmable Boolean functions. The two streams were the ciphertext, which was read at high speed from a paper tape, and the key stream, which was generated internally, in a simulation of the unknown German machine. After a succession of different Colossus runs to discover the likely chi -wheel settings, they were checked by examining the frequency distribution of the characters in processed ciphertext.
Recommended publications
  • To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (1939­1945).
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • Cryptography in a Quantum World
    Cryptography in a Quantum World ⋆ Gilles Brassard 1,2 1 D´epartement d’informatique et de recherche op´erationnelle Universit´ede Montr´eal, C.P. 6128, Succursale Centre-ville Montr´eal (QC), H3C 3J7 Canada 2 Canadian Institute for Advanced Research [email protected] http://www.iro.umontreal.ca/~brassard/en/ Abstract. Although practised as an art and science for ages, cryptog- raphy had to wait until the mid-twentieth century before Claude Shannon gave it a strong mathematical foundation. However, Shannon’s approach was rooted is his own information theory, itself inspired by the classical physics of Newton and Einstein. But our world is ruled by the laws of quantum mechanics. When quantum-mechanical phenomena are taken into account, new vistas open up both for codemakers and codebreakers. Is quantum mechanics a blessing or a curse for the protection of privacy? As we shall see, the jury is still out! Keywords: Cryptography, Quantum mechanics, Quantum computa- tion, Post-quantum cryptography, Quantum communication, Quantum key distribution, Edgar Allan Poe 1 Introduction For thousands of years, cryptography has been an ongoing battle between code- makers and codebreakers [1,2], who are more formally called cryptographers and cryptanalysts. Naturally, good and evil are subjective terms to designate code- makers and codebreakers. As a passionate advocate for the right to privacy, my allegiance is clearly on the side of codemakers. I admit that I laughed hyster- ically when I saw the Zona Vigilada warning that awaits visitors of the Pla¸ca de George Orwell near City Hall in Barcelona [3]. Nevertheless, I recognize that codebreakers at Bletchley Park during the Second World War were definitely on the side of good.
    [Show full text]
  • War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946
    Programmed Inequality How Britain Discarded Women Technologists and Lost Its Edge in Computing Marie Hicks HD 6135 H53 2017 The Library Mt. St. Vincent Univ. Halifax, N.S. B3M 2J6 The MIT Press Cambridge, Massachusetts London, England 1 War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946 In recent years, the restoration of Bletchley Park has attracted worldwide attention. The country estate in Milton Keynes, United Kingdom, was the site of the most important codebreaking operations of World War II and home to the first digital, electronic, programmable computer: the Colossus. The British-designed and manufactured Colossus computers, of which there were ten in all by war's end, were critical to the conduct of Allied wartime operations. Unlike their better-known U.S. counter­ part, the ENIAC, the Colossus computers were actually deployed during the war, actively changing its outcome. Kept secret for decades, the full import of the developments at Bletchley has only recently become widely known.1 Yet while popular culture has begun to recognize the importance of Bletchley's wartime operations, misunderstandings persist about the nature of the information work performed there. The 2014 blockbuster The Imitation Game, for instance, cleaves the Colossus computers from the narrative entirely in favor of building a "great man" narrative for a single codebreaker.2 Hidden within the story of Bletchley is a less popular narrative that cannot leverage the appeal of a lone genius and his accomplishments. Thousands of women worked at Bletchley during the war-most in tech­ nical roles.3 Although it is generally accepted that the striking and wide­ ranging roles of the mostly women workers within Bletchley Park give lie to stereotypes about computing as a traditionally masculine field, the contributions of these women have not been analyzed as constitutive of larger trends in the history of computing.
    [Show full text]
  • Code Breaking at Bletchley Park
    Middle School Scholars’ CONTENTS Newsletter A Short History of Bletchley Park by Alex ​ Lent Term 2020 Mapplebeck… p2-3 Alan Turing: A Profile by Sam Ramsey… ​ Code Breaking at p4-6 Bletchley Park’s Role in World War II by ​ Bletchley Park Harry Martin… p6-8 Review: Bletchley Park Museum by ​ Joseph Conway… p9-10 The Women of Bletchley Park by Sammy ​ Jarvis… p10-12 Bill Tutte: The Unsung Codebreaker by ​ Archie Leishman… p12-14 A Very Short Introduction to Bletchley Park by Sam Corbett… p15-16 ​ The Impact of Bletchley Park on Today’s World by Toby Pinnington… p17-18 ​ Introduction A Beginner’s Guide to the Bombe by Luca ​ “A gifted and distinguished boy, whose future Zurek… p19-21 career we shall watch with much interest.” This was the parting remark of Alan Turing’s Headmaster in his last school report. Little The German Equivalent of Bletchley could he have known what Turing would go on Park by Rupert Matthews… 21-22 ​ to achieve alongside the other talented codebreakers of World War II at Bletchley Park. Covering Up Bletchley Park: Operation Our trip with the third year academic scholars Boniface by Philip Kimber… p23-25 this term explored the central role this site ​ near Milton Keynes played in winning a war. 1 intercept stations. During the war, Bletchley A Short History of Bletchley Park Park had many cover names, which included by Alex Mapplebeck “B.P.”, “Station X” and the “Government Communications Headquarters”. The first mention of Bletchley Park in records is in the Domesday Book, where it is part of the Manor of Eaton.
    [Show full text]
  • Notes and References Documents Held at the Public Record Office, London, Are Crown Copyright and Are Reproduced by Permission of the Controller Ofhm Stationery Office
    Notes and References Documents held at the Public Record Office, London, are crown copyright and are reproduced by permission of the Controller ofHM Stationery Office. I NTRODUCTION Christopher Andrew and David Dilks I. David Dilks (ed.), The Diaries rifSir Alexander Cadogan O.M. 1938-1945 (Lon­ don , (971) , p. 21. 2. Interview with Professor Hinsley in Part 3 of the BBC Radio 4 documentary series 'T he Profession of Intelligence', written and presented by Christopher Andrew (producer Peter Everett); first broadcast 16 Aug 1981. 3. F. H. Hinsleyet al., British Intelligencein the Second World War (London, 1979-). The first two chapters of volume I contain a useful retrospect on the pre-war development of the intelligence community. Curiously, despite the publication of Professor Hinsley's volumes, the government has decided not to release the official histories commissioned by it on wartime counter-espionage and deception. The forthcoming (non-official) collection of essays edited by Ernest R. May, Knowing One's Enemies: IntelligenceAssessment before the Two World Wars (Princeton) promises to add significantly to our knowledge of the role of intelligence on the eve of the world wars. 4. House of Commons Education, Science and Arts Committee (Session 1982-83) , Public Records: Minutes ofEvidence, pp . 76-7. 5. Chapman Pincher, Their Trade is Treachery (London, 1981). Nigel West, A Matter of Trust: MI51945-72 (London, 1982). Both volumes contain ample evidence of extensive 'inside information'. 6. Nigel West , MI5: British Security Operations /90/-/945 (London, 1981), pp . 41, 49, 58. One of the most interesting studies of British peacetime intelligence which depends on a substantial amount of inside information is Antony Verrier's history of post-war British foreign policy , Through the Looking Glass (London, 1983) .
    [Show full text]
  • Parallel Computing Prehistory
    Parallel Computing Prehistory John Burkardt Information Technology Department Virginia Tech .......... FDI Summer Track V: Using Virginia Tech High Performance Computing http://people.sc.fsu.edu/∼jburkardt/presentations/... history 2009 vt.pdf 26-28 May 2009 1 / 43 How Did We Get Here? [date uncertain] I don't know where I am, but I'm making record time! Last transmission from a Navy pilot, somewhere in the Pacific... 2 / 43 What Happens if You Don't Know Where You Are In 1707, Admiral Sir Cloudesly Shovell sank his fleet by sailing directly into the Scilly Islands, which weren't where he thought they were...because he didn't know where he was. 3 / 43 Fine Clockwork Can Tell You Where You Are The British Admiralty put out an RFP, seeking a reliable means of determining longitude. John Harrison's "superclock" solved the problem...though of course he had much trouble getting reimbursed! 4 / 43 Babbage Shows Calculation is Like Clockwork The Navy still had plenty of navigational problems in the 19th century, and (partially) funded Charles Babbage's Difference Engine and his Analytical Engine. 5 / 43 Hollerith Automates Data Processing Hermann Hollerith, inspired by an automatic weaving device, developed a machine to tabulate the 1890 census - later a big seller for the International Business Machine Corporation, aka IBM. 6 / 43 Numerical Calculations Were Done by "Computers" Computing was done by computers, that is, people. This is the computer lab for the Harvard Astronomical Observatory in 1890. 7 / 43 Richardson Forecasts the Weather Lewis Richardson attempted the first weather forecast in 1917.
    [Show full text]
  • How to Decrypt a Lorenz SZ42 Message Using Virtual Colossus 3D
    How to decrypt a Lorenz SZ42 message using Virtual Colossus 3D A tutorial on decrypting a German Lorenz SZ42 message using Virtual Colossus 3D https://virtualcolossus.co.uk This document will take you through an example process used on Colossus to get the start positions of a received message. There wasn't a set program which would run to work out the settings, it was a matter of following a "menu" of different algorithms and sometimes required knowledge of what worked on a particular radio link. Colossus was not able to run a sequence of algorithms or use the results of previous calculations (like we would expect from a computer today), each run required a decision by the operator or code breaker assigned to that machine on which operation would be the next best to run. Once the start positions of each of the twelve rotors are calculated, we can use a Lorenz machine to try to decipher the final message. Wheel breaking We will assume that we have already broken the wheel patterns for this message. Wheel breaking meant working out the pin settings of all 501 pins on each of the twelve Lorenz cipher wheels. This was generally done using a few methods including from messages in depth (where several messages were received enciphered with the same key) in a process devised by Alan Turing called Turingery. Later, a new process called rectangling allowed wheel breaking potentially using a single long message. Colossus could help with rectangling to assist with wheel breaking, and Colossus 6 was used almost exclusively for this, but in general, wheel breaking was done by hand methods.
    [Show full text]
  • Secure Volunteer Computing for Distributed Cryptanalysis
    ysis SecureVolunteer Computing for Distributed Cryptanal Nils Kopal Secure Volunteer Computing for Distributed Cryptanalysis ISBN 978-3-7376-0426-0 kassel university 9 783737 604260 Nils Kopal press kassel university press ! "# $ %& & &'& #( )&&*+ , #()&- ( ./0 12.3 - 4 # 5 (!!&& & 6&( 7"#&7&12./ 5 -839,:,3:3/,2;1/,2% ' 5 -839,:,3:3/,2;13,3% ,' 05( (!!<& &!.2&.81..!")839:3:3/2;133 "=( (!!, #& !(( (2221,;2;13/ '12.97 # ?@7 & &, & ) ? “With magic, you can turn a frog into a prince. With science, you can turn a frog into a Ph.D. and you still have the frog you started with.” Terry Pratchett Abstract Volunteer computing offers researchers and developers the possibility to distribute their huge computational jobs to the computers of volunteers. So, most of the overall cost for computational power and maintenance is spread across the volunteers. This makes it possible to gain computing resources that otherwise only expensive grids, clusters, or supercomputers offer. Most volunteer computing solutions are based on a client-server model. The server manages the distribution of subjobs to the computers of volunteers, the clients, which in turn compute the subjobs and return the results to the server. The Berkeley Open Infrastructure for Network Computing (BOINC) is the most used middleware for volunteer computing. A drawback of any client-server architecture is the server being the single point of control and failure. To get rid of the single point of failure, we developed different distribution algorithms (epoch distribution algorithm, sliding-window distribution algorithm, and extended epoch distribution algorithm) based on unstructured peer-to-peer networks. These algorithms enable the researchers and developers to create volunteer computing networks without any central server.
    [Show full text]
  • Alan Turing 1 Alan Turing
    Alan Turing 1 Alan Turing Alan Turing Turing at the time of his election to Fellowship of the Royal Society. Born Alan Mathison Turing 23 June 1912 Maida Vale, London, England, United Kingdom Died 7 June 1954 (aged 41) Wilmslow, Cheshire, England, United Kingdom Residence United Kingdom Nationality British Fields Mathematics, Cryptanalysis, Computer science Institutions University of Cambridge Government Code and Cypher School National Physical Laboratory University of Manchester Alma mater King's College, Cambridge Princeton University Doctoral advisor Alonzo Church Doctoral students Robin Gandy Known for Halting problem Turing machine Cryptanalysis of the Enigma Automatic Computing Engine Turing Award Turing test Turing patterns Notable awards Officer of the Order of the British Empire Fellow of the Royal Society Alan Mathison Turing, OBE, FRS ( /ˈtjʊərɪŋ/ TEWR-ing; 23 June 1912 – 7 June 1954), was a British mathematician, logician, cryptanalyst, and computer scientist. He was highly influential in the development of computer science, giving a formalisation of the concepts of "algorithm" and "computation" with the Turing machine, which can be considered a model of a general purpose computer.[1][2][3] Turing is widely considered to be the father of computer science and artificial intelligence.[4] During World War II, Turing worked for the Government Code and Cypher School (GC&CS) at Bletchley Park, Britain's codebreaking centre. For a time he was head of Hut 8, the section responsible for German naval cryptanalysis. He devised a number of techniques for breaking German ciphers, including the method of the bombe, an electromechanical machine that could find settings for the Enigma machine.
    [Show full text]
  • Cryptology's Role in the Early Development of Computer
    Cryptology’s Role in the Early Development of Computer Capabilities in the United States This publication is a product of the National Security Agency history program. It presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other U.S. government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email your request to [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755-6886 Cover: A World War II COLOSSUS computer system. Cryptology’s Role in the Early Development of Computer Capabilities in the United States James V. Boone and James J. Hearn Center for Cryptologic History National Security Agency 2015 Preface ryptology is an extraordinary national endeavor where only first place counts. This attitude was prevalent among the partici- pantsC in the U.K.’s Government Code and Cypher School (GC&CS) activities at Bletchley Park1 during World War II. One of GC&CS’s many achievements during this time was the development and exten- sive use of the world’s first large-scale electronic digital computer called COLOSSUS. The highly skilled military personnel assigned to Bletchley Park returned to the U.S. with this experience and, aug- mented by the experience from other government-supported devel- opment activities in the U.S., their ideas for using electronic digital computer technology were quickly accepted by the U.S.
    [Show full text]
  • Tommy Flowers - Wikipedia
    7/2/2019 Tommy Flowers - Wikipedia Tommy Flowers Thomas Harold Flowers, BSc, DSc,[1] MBE (22 December 1905 – 28 October 1998) Thomas Harold Flowers was an English engineer with the British Post Office. During World War II, Flowers MBE designed and built Colossus, the world's first programmable electronic computer, to help solve encrypted German messages. Contents Early life World War II Post-war work and retirement See also References Bibliography External links Tommy Flowers – possibly taken Early life around the time he was at Bletchley Flowers was born at 160 Abbott Road, Poplar in London's East End on 22 December Park 1905, the son of a bricklayer.[2] Whilst undertaking an apprenticeship in mechanical Born 22 December 1905 engineering at the Royal Arsenal, Woolwich, he took evening classes at the University of Poplar, London, London to earn a degree in electrical engineering.[2] In 1926, he joined the England telecommunications branch of the General Post Office (GPO), moving to work at the Died 28 October 1998 research station at Dollis Hill in north-west London in 1930. In 1935, he married Eileen (aged 92) Margaret Green and the couple later had two children, John and Kenneth.[2] Mill Hill, London, From 1935 onward, he explored the use of electronics for telephone exchanges and by England 1939, he was convinced that an all-electronic system was possible. A background in Nationality English switching electronics would prove crucial for his computer designs. Occupation Engineer Title Mr World War II Spouse(s) Eileen Margaret Flowers' first contact with wartime codebreaking came in February 1941 when his Green director, W.
    [Show full text]