COLOSSUS Ooo O • O O Ooooooooooooooooooooooeoooooo O OOOO OO O OOO the Secrets of Bletchley Park's Codebreaking Computers

Total Page:16

File Type:pdf, Size:1020Kb

COLOSSUS Ooo O • O O Ooooooooooooooooooooooeoooooo O OOOO OO O OOO the Secrets of Bletchley Park's Codebreaking Computers COLOSSUS ooo o • o o ooooooooooooooooooooooeoooooo O OOOO OO O OOO The Secrets of Bletchley Park's Codebreaking Computers B.Jack Copeland and others (Edited by B.Jack Copeland) OXFORD UNIVERSITY PRESS Contents List of Photographs x Notes on the Contributors xii Introduction 1 Jack Copeland SECTION 1. BLETCHLEY PARK AND THE ATTACK ON TUNNY 1. A Brief History of Cryptography from Caesar to Bletchley Park 9 Simon Singh 2. How It Began: Bletchley Park Goes to War 18 Michael Smith 3. The German Tunny Machine 36 Jack Copeland 4. Colossus, Codebreaking, and the Digital Age 52 Stephen Budiansky 5. Machine against Machine 64 Jack Copeland 6. D-Day at Bletchley Park 78 Thomas H. Flowers 7. Intercept! 84 Jack Copeland SECTION 2. COLOSSUS 8. Colossus 91 Thomas H. Flowers 9. Colossus and the Rise of the Modern Computer 101 Jack Copeland 10. The PC-User's Guide to Colossus 116 Benjamin Wells viii Contents 11. Of Men and Machines 141 Brian Randell 12. The Colossus Rebuild 150 Tony Sale SECTION 3. THENEWMANRY 13. Mr Newman's Section 157 Jack Copeland, with Catherine Caughey, Dorothy Du Boisson, Eleanor Ireland, Ken Myers, and Norman Thurlow 14. Max Newman—Mathematician, Codebreaker, and Computer Pioneer 176 William Newman 15. Living with Fish: Breaking Tunny in the Newmanry and the Testery 189 Peter Hilton 16. From Hut 8 to the Newmanry 204 Irving John (Jack) Good 17. Codebreaking and Colossus 223 Donald Michie SECTION 4. THE TESTERY 18. Major Tester's Section 249 Jerry Roberts 19. Setter and Breaker 260 Roy Jenkins 20. An ATS Girl in the Testery 264 Helen Currie 21. The Testery and the Breaking of Fish 269 Peter Edgerley SECTION 5. T. H. FLOWERS' LABORATORY AT DOLLIS HILL 22. Dollis Hill at War 281 Jack Copeland, with David Bolam, Harry Fensom, Gil Hayward, and Norman Thurlow 23. The British Tunny Machine 291 Gil Hayward 24. How Colossus was Built and Operated—One of its Engineers Reveals its Secrets 297 Harry Fensom Contents ix SECTION 6. STURGEON, THE FISH THAT GOT AWAY 25. Bletchley Park's Sturgeon—The Fish That Laid No Eggs 307 Frode Weierud 26. German Teleprinter Traffic and Swedish Wartime Intelligence 328 Craig McKay TECHNICAL APPENDICES—TO DIG DEEPER Al. Timeline: The Breaking of Tunny 337 A2. The Teleprinter Alphabet 348 Jack Copeland A3. The Tunny Addition Square 350 Jack Copeland A4. My Work at Bletchley Park 352 William T. Tutte A5. The Tiltman Break 370 Friedrich L. Bauer A6. Turingery 378 Jack Copeland A7. Ax-Method 386 Max Newman A8. Newman's Theorem 391 Friedrich L. Bauer A9. Rectangling 396 Frank Carter A10. The Motor-Wheels and Limitations 406 Jack Good, Donald Michie, and Geoffrey Timms All. Motorless Tunny 409 Jack Good and Donald Michie A12. Origins of the Fish Cypher Machines 411 Friedrich L. Bauer Notes and References 419 Sources of Photographs 452 Index 453.
Recommended publications
  • To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (1939­1945).
    [Show full text]
  • The Turing Guide
    The Turing Guide Edited by Jack Copeland, Jonathan Bowen, Mark Sprevak, and Robin Wilson • A complete guide to one of the greatest scientists of the 20th century • Covers aspects of Turing’s life and the wide range of his intellectual activities • Aimed at a wide readership • This carefully edited resource written by a star-studded list of contributors • Around 100 illustrations This carefully edited resource brings together contributions from some of the world’s leading experts on Alan Turing to create a comprehensive guide that will serve as a useful resource for researchers in the area as well as the increasingly interested general reader. “The Turing Guide is just as its title suggests, a remarkably broad-ranging compendium of Alan Turing’s lifetime contributions. Credible and comprehensive, it is a rewarding exploration of a man, who in his life was appropriately revered and unfairly reviled.” - Vint Cerf, American Internet pioneer JANUARY 2017 | 544 PAGES PAPERBACK | 978-0-19-874783-3 “The Turing Guide provides a superb collection of articles £19.99 | $29.95 written from numerous different perspectives, of the life, HARDBACK | 978-0-19-874782-6 times, profound ideas, and enormous heritage of Alan £75.00 | $115.00 Turing and those around him. We find, here, numerous accounts, both personal and historical, of this great and eccentric man, whose life was both tragic and triumphantly influential.” - Sir Roger Penrose, University of Oxford Ordering Details ONLINE www.oup.com/academic/mathematics BY TELEPHONE +44 (0) 1536 452640 POSTAGE & DELIVERY For more information about postage charges and delivery times visit www.oup.com/academic/help/shipping/.
    [Show full text]
  • Codebreaker in the Far East 1
    CODEBREAKER o IN THE FAR EAST ALANSTRIPP With an Introduction by CHRISTOPHER ANDREW FRANK CASS First published in Greal Britain by FRANK CASS & CO. LTD. , Gainsborough House, Gainsborough Road, LoJldon Ell 1RS, England ~/() and in the United States ofAmerica by D FRANK CASS & CO. LTD. clo Biblio Distribution Center Contents C~% 81 Adams Drive, P.O. Box 327, Totowa, NJ 07511 6 Copyright tt> 1989 Alan Stripp List of illustrations vii S-t- Author's Note ix British Library Cataloguing in Publication Data I qq~9 Acknowledgments xi Stripp, Alan, 1924- Introduction by Christopher Andrew xiii Codebreaker in the Far East 1. World War 2. Military Cryptology I. Title 940.54'85 PART ONE: TOURS OF DUTY ISBN 0-7146-3363-1 A11408 737468 1. Cambridge, Bedford and Yorkshire 3 2. Bletchley Park 13 . --Library of Congress Cataloging-in-Publicatioll Data 3. Marc,ping Orders 29 Stripp, Alan, 1924- 4. Delhi 39 Codebreaker in the Far East p. cm. 5. Naini Tal, Agra and Abbottabad 48 Bibliography: p 58 Includes index. 6. Bangalore, Singapore and Cambridge ISBN 0-7146-3363-1 1. Stripp, AIan, 1924- .2. World War, 1939-1945-Cryptography. 3. World War, 1939-1945-Personal narratives, English. 4: World PART TWO: JAPANESE PUZZLES War, 1939-1945-Campaigns-Bunna. I. Title D81O.C88S76 1989 7. Japanese Codes and Ciphers: what were they like? 65 940.54'86'41-dcl9 89-741 80 CIP 8. What did they tell us? 9. How were they sent? 89 All rights reserved. No part of this publication may be repro­ 10. How were they intercepted? 93 duced in any form or by any means, electronic, mechanical photocopying, recording or otherwise, witho;lt the prio; 11.
    [Show full text]
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946
    Programmed Inequality How Britain Discarded Women Technologists and Lost Its Edge in Computing Marie Hicks HD 6135 H53 2017 The Library Mt. St. Vincent Univ. Halifax, N.S. B3M 2J6 The MIT Press Cambridge, Massachusetts London, England 1 War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946 In recent years, the restoration of Bletchley Park has attracted worldwide attention. The country estate in Milton Keynes, United Kingdom, was the site of the most important codebreaking operations of World War II and home to the first digital, electronic, programmable computer: the Colossus. The British-designed and manufactured Colossus computers, of which there were ten in all by war's end, were critical to the conduct of Allied wartime operations. Unlike their better-known U.S. counter­ part, the ENIAC, the Colossus computers were actually deployed during the war, actively changing its outcome. Kept secret for decades, the full import of the developments at Bletchley has only recently become widely known.1 Yet while popular culture has begun to recognize the importance of Bletchley's wartime operations, misunderstandings persist about the nature of the information work performed there. The 2014 blockbuster The Imitation Game, for instance, cleaves the Colossus computers from the narrative entirely in favor of building a "great man" narrative for a single codebreaker.2 Hidden within the story of Bletchley is a less popular narrative that cannot leverage the appeal of a lone genius and his accomplishments. Thousands of women worked at Bletchley during the war-most in tech­ nical roles.3 Although it is generally accepted that the striking and wide­ ranging roles of the mostly women workers within Bletchley Park give lie to stereotypes about computing as a traditionally masculine field, the contributions of these women have not been analyzed as constitutive of larger trends in the history of computing.
    [Show full text]
  • Ted Nelson History of Computing
    History of Computing Douglas R. Dechow Daniele C. Struppa Editors Intertwingled The Work and Influence of Ted Nelson History of Computing Founding Editor Martin Campbell-Kelly, University of Warwick, Coventry, UK Series Editor Gerard Alberts, University of Amsterdam, Amsterdam, The Netherlands Advisory Board Jack Copeland, University of Canterbury, Christchurch, New Zealand Ulf Hashagen, Deutsches Museum, Munich, Germany John V. Tucker, Swansea University, Swansea, UK Jeffrey R. Yost, University of Minnesota, Minneapolis, USA The History of Computing series publishes high-quality books which address the history of computing, with an emphasis on the ‘externalist’ view of this history, more accessible to a wider audience. The series examines content and history from four main quadrants: the history of relevant technologies, the history of the core science, the history of relevant business and economic developments, and the history of computing as it pertains to social history and societal developments. Titles can span a variety of product types, including but not exclusively, themed volumes, biographies, ‘profi le’ books (with brief biographies of a number of key people), expansions of workshop proceedings, general readers, scholarly expositions, titles used as ancillary textbooks, revivals and new editions of previous worthy titles. These books will appeal, varyingly, to academics and students in computer science, history, mathematics, business and technology studies. Some titles will also directly appeal to professionals and practitioners
    [Show full text]
  • Alan Turing's Forgotten Ideas
    Alan Turing, at age 35, about the time he wrote “Intelligent Machinery” Copyright 1998 Scientific American, Inc. lan Mathison Turing conceived of the modern computer in 1935. Today all digital comput- Aers are, in essence, “Turing machines.” The British mathematician also pioneered the field of artificial intelligence, or AI, proposing the famous and widely debated Turing test as a way of determin- ing whether a suitably programmed computer can think. During World War II, Turing was instrumental in breaking the German Enigma code in part of a top-secret British operation that historians say short- ened the war in Europe by two years. When he died Alan Turing's at the age of 41, Turing was doing the earliest work on what would now be called artificial life, simulat- ing the chemistry of biological growth. Throughout his remarkable career, Turing had no great interest in publicizing his ideas. Consequently, Forgotten important aspects of his work have been neglected or forgotten over the years. In particular, few people— even those knowledgeable about computer science— are familiar with Turing’s fascinating anticipation of connectionism, or neuronlike computing. Also ne- Ideas glected are his groundbreaking theoretical concepts in the exciting area of “hypercomputation.” Accord- ing to some experts, hypercomputers might one day in solve problems heretofore deemed intractable. Computer Science The Turing Connection igital computers are superb number crunchers. DAsk them to predict a rocket’s trajectory or calcu- late the financial figures for a large multinational cor- poration, and they can churn out the answers in sec- Well known for the machine, onds.
    [Show full text]
  • Colossus: the Missing Manual
    Colossus: The Missing Manual Mark Priestley Research Fellow, The National Museum of Computing — Bletchley Park, UK Thomas Haigh University of Wisconsin—Milwaukee & Siegen University 1 serialized ciper text English Cipher text of one message plain text 1 0 0 1 1 (5 channel tape) 0 1 0 1 0 0 1 0 0 0 They were already 1 0 1 1 0 1 0 0 1 0 looking at him as approached in the distance, because he just stood out. He had quite an old face, 01101 11101 01011 0010 Knockolt Newmanry Newmanry Testery Testery Hut 3 Outstation Set Chi Wheels Generate Set Psi & Decrypt Translate Intercept, & Verify Counts “dechi” Motor Wheels Message Message Record & Verify Message (Colossus) (Tunny analog (Hand methods) (Tunny analog (Bilingual machine) machine) humans) dechi 1 0 0 1 1 0 27, 12, 30, 43, 8 Chi wheel 0 1 0 1 0 1 Psi & 55, 22 Sie sahen ihn schon 0 1 0 0 0 von weitem auf sich start posns. 1 0 1 1 0 1 0 0 1 0 motor start posns. zukommen, denn er for msg el auf. Er hatte ein 31, 3, 25, 18, 5 ganz altes Gesicht, aber wie er ging, German 1 0 0 1 1 0 0 1 0 1 0 1 0110001010... plain text 0 1 0 0 0 Newmanry 1 0 1 1 0 0011010100... 1 0 0 1 0 10011001001... 01100010110... 1 0 0 1 1 0 Break Chi 01011001101... 0 1 0 1 0 1 0110001010... 0 1 0 0 0 Wheels 1 0 1 1 0 Chi wheel 0011010100..
    [Show full text]
  • June 1St Heath Robinson Operational
    similar vein to Rube Goldberg in The Mark 2 supported the US). conditional branching, just as Charles Babbage’s analytical June 1st The machine consisted of a engine had done [Dec 23], frame (called the bedspread) although there’s no evidence to which supported two long suggest that the Mark 2's Heath Robinson teleprinter paper tapes on a designer, Tommy Flowers [Dec network of reels, and two other 22], was aware of Babbage's Operational racks holding counters and logic design. June 1, 1943 circuits. Ten Colossi were operating by One tape could hold 2,000 The "Heath Robinson" was a the end of the war and an characters of cipher text, while code-breaking machine used at eleventh had been the other stored patterns that Bletchley Park [Aug 15] to help commissioned. They allowed the the codebreakers believed might decrypt the Lorenz (aka Tunny) Allies to extract a vast amount of represent the Lorenz cipher. intelligence from intercepted encryption. The second tape had radio messages sent from Lorenz was a much more to be precisely one character German High Command advanced cipher than the better longer than the first, and throughout Europe. known Enigma [Feb 23]. For keeping the tapes synchronized example, Enigma machines was a major challenge. A functioning reconstruction of a initially used just three rotors Mark 2 was completed in 2008 Max Newman [Feb 7] was during their encryption process, by Tony Sale and volunteers; it's while a Lorenz device employed responsible for the Robinson's on display at The National functional specification, but twelve.
    [Show full text]
  • Alan Turing, Computing, Bletchley, and Mathematics, Wellington Public
    Alan Turing, Computing, Bletchley, and Mathematics Rod Downey Victoria University Wellington New Zealand Downey's research is supported by the Marsden Fund, and this material also by the Newton Institute. Wellington, February 2015 Turing I Turing has become a larger than life figure following the movie \The Imitation Game". I which followed Andrew Hodges book \Alan Turing : The Enigma", I which followed the release of classified documents about WWII. I I will try to comment on aspects of Turing's work mentioned in the movie. I I will give extensive references if you want to follow this up, including the excellent Horizon documentary. I Posted to my web site. Type \rod downey" into google. Turing Award I The equivalent of the \Nobel Prize" in computer science is the ACM Turing Award. I It is for life work in computer science and worth about $1M. I Why? This award was made up (1966) was well before Bletchley became public knowledge. I (Aside) Prof. D. Ritchie (Codebreaker)-from \Station X, Pt 3" Alan Turing was one of the figures of the century. || There were great men at Bletchley Park, but in the long hall of history Turing's name will be remembered as Number One in terms of consequences for mankind. Logic I Aristotle and other early Greeks then \modern" re-invention: Leibnitz (early 18th C), Boole, Frege, etc. I We want a way to represent arguments, language, processes etc by formal symbols and manipulate them like we do numbers to determine, e.g. validity of argument. I Simplest modern formal system propositional logic.
    [Show full text]
  • The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life: Plus the Secrets of Enigma
    The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life: Plus The Secrets of Enigma B. Jack Copeland, Editor OXFORD UNIVERSITY PRESS The Essential Turing Alan M. Turing The Essential Turing Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma Edited by B. Jack Copeland CLARENDON PRESS OXFORD Great Clarendon Street, Oxford OX2 6DP Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide in Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Taipei Toronto Shanghai With offices in Argentina Austria Brazil Chile Czech Republic France Greece Guatemala Hungary Italy Japan South Korea Poland Portugal Singapore Switzerland Thailand Turkey Ukraine Vietnam Published in the United States by Oxford University Press Inc., New York © In this volume the Estate of Alan Turing 2004 Supplementary Material © the several contributors 2004 The moral rights of the author have been asserted Database right Oxford University Press (maker) First published 2004 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, or under terms agreed with the appropriate reprographics rights organization. Enquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above.
    [Show full text]
  • Filozofski Fakultet Sveučilišta U Zagrebu Odsjek Za Informacijske I Komunikacijske Znanosti 2017/2018
    Filozofski fakultet Sveučilišta u Zagrebu Odsjek za informacijske i komunikacijske znanosti 2017/2018. Maja Mikac Kako je Colossusom razbijena Lorenzova šifra Završni rad Mentorica: dr. sc. Vjera Lopina Zagreb, 2018. Sadržaj Uvod ........................................................................................................................................... 4 1. Kratki presjek razvoja kriptografskih sustava ............................................................. 5 1.1. Kriptologija u Drugom svjetskom ratu ....................................................................... 8 2. Lorenz ................................................................................................................................ 9 2.1. Vernamova šifra ....................................................................................................... 11 2.2. Kriptoanaliza Lorenza .............................................................................................. 15 2.3. Logika stroja ............................................................................................................. 16 2.4. Turingery .................................................................................................................. 19 2.5. Testery ...................................................................................................................... 20 2.6. Newmanry ................................................................................................................ 21 3. Bletchley Park ................................................................................................................
    [Show full text]