TNMOC-Newsletter-Q2-2014.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

TNMOC-Newsletter-Q2-2014.Pdf InSync News desk ummer Bytes is upon us. From TNMOC’s You Tube channel is 26th July to 2nd September, expanding with some fascinating Featured Machine Sthe whole Museum is open videos. Recent additions include every day from 11am to 5pm with two videos of TNMOC volunteers. digital fun and games for all the Machine People was made by a family. See page 16 for more details group from Queen Mary University and keep up-to-date on the web at of London and a video on two www.tnmoc.org/bytes EDSAC volunteers has been made by David Allen. Summer Bytes is being supported by Bloomberg and there will be There are now 13 videos tracing some fascinating special events the development of the EDSAC including a retro games weekend, project. The latest one gives a creating your own special effects great overview of progress by and a look back at effects pre-GCI Andrew Herbert and a first switch- with Mat Irvine of Blake’s 7 props on event is planned for the autumn. fame. At the beginning of September, The TNMOC shop has been watch out for an announcement of refurbished and is beginning to stock sponsorship from Ocado lots of new merchandise. An Technology to introduce youngsters example of the new items will be a to coding. reproduction of the Colossus infographic that appeared in The We welcome your suggestions Times earlier this year. and comments. Contact us via After the highly successful Colossus [email protected] Robinson at 70 event in February and the May or via regular post to: There’s a new project at TNMOC: to BBC TV One Show programme on recreate the Robinson. the Colossus veterans, more InSync Editor Colossus veterans and relatives Robinson was an early attempt to have made contact with the The National Museum of mechanise code-breaking and pre- Museum. We plan another reunion Computing dated Colossus. It wasn’t entirely event for September. satisfactory because it broke down a Block H lot, so the team has the odd task of The Winter Lecture Series is taking Bletchley Park reconstructing a machine that doesn’t work that well! shape and places for some of the Milton Keynes lectures are about to go on sale — Progress can be seen in the Tunny see p10 and the website for details. MK3 6EB gallery. Connecting with the Museum of Computing Keep up to date with the latest information from the museum by visiting our various social media and website presences. The handy QR codes below will connect you to our website, Twitter, Facebook, Google Plus, Flickr and YouTube sources. If you are reading this newsletter on a computer or tablet device, the you can tap on the QR codes below or if you are reading a printed version, then you can scan these codes with a QR reader on a smart phone or tablet device. TNMOC also has an iPhone navigator app that is a great introduction to the experiences in store if you visit the museum. More details can be found later in this edition of inSync. QR scanners are readily available from your app store (iTunes, Google Play, Windows phone stores). Just search for and install a free QR code reader and start using these handy codes: TNMOC newsletter 2 Q2 2014 n 4th June 2014, a Memorial Service for Capt Jerry ORoberts MBE was held in St Martin-in-the-Fields in Trafalgar Square, London. The achievements of Captain Raymond "Jerry" Roberts MBE, code breaker in the Testery were recalled in a touching Memorial Service led by the Reverend Katherine Hedderly. Professor Susanne Kord, Lord Charles Brockett (pictured above)and Sir rofessor Brian Randell, who John Scarlett spoke of Jerry's work and achievements through a long life brought news of Colossus to that passed from linguist, code breaker, war crimes investigator, market Ppublic view in 1975, visited research entrepreneur and culminated in his tireless campaign to ensure China recently to talk about that the code breakers of Bletchley Park would be remembered by future uncovering Colossus. Visiting generations. Beihang University in Beijing with his wife Liz, he faced a Colossal Jerry's fondness of classical music was reflected in the Choir's singing of surprise. We do hope the poster Mozart's Laudate Dominium and Brahm's Geistliches Lied. didn’t confuse Lorenz with Enigma! Jerry's grandsons, Ben and Sammy Sarfas, performed a remarkable jazz- Professor Randell's talks were very influenced version of We'll Meet Again to a backdrop of a photo montage of well received, although he did face a Jerry's life compiled by his loving wife Mei. rather unusual first question which was actually more of a statement of After a reading from Dora Roberts, a tribute and reading by Jerry and Mei's incredulity: "You wrote to the Prime daughter Chao and closing music of Ode by Brad Mehldau played by Ben Minister!?", exclaimed a Chinese Safras on violin accompanied by Mark Edwards on piano, the congregation student who couldn't begin to retired to the Crypt to reflect on and celebrate the long and hugely imagine writing to the present productive and influential life of Captain Raymond "Jerry" Roberts MBE. Chinese equivalent, Li Keqiang, the Anyone wishing to contribute to a planned annual Jerry Roberts code Premier of the People's Republic of breaking workshop at his old school Latymer Upper School may do so China. Professor Randell wrote to online at http://www.latymer-upper.org/jerryroberts. UK Prime Minister Edward Heath in 1973 seeking permission to reveal We at The National Museum of Computing will greatly miss Jerry's the existence of Colossus. The recounting of his code breaking days and his determination to ensure that request was refused, but two year's the story of the breaking of Lorenz, Hitler's vital secret cipher, is properly later was granted via another route. told. He has been an irreplaceable key source of knowledge for the displays in the Tunny and Colossus Galleries. The existence of Colossus was unknown to the audience but the TNMOC's tribute to Captain Roberts can be found on its website at http:// TNMOC may now see an influx of www.tnmoc.org/news/news-releases/capt-raymond-jerry-roberts-mbe-1920- Chinese visitors. 2014 with a series of video clips of Jerry recalling various code breaking activities. Professor Randell's talk can be seen on You Tube: http:// Leaving Trafalgar Square, some of us wondered if Jerry's vision of a statue www.youtube.com/watch? of Bill Tutte on the Fourth Plinth would ever come to fruition. It should!. v=Yl6pK1Z7B5Q#t=2593. he spectacular Bletchley Park Maze which disappeared at the beginning of World War II has been recreated digitally for visitors to Texplore at The National Museum of Computing on Bletchley Park over the Easter Bytes event. Children of all ages enjoyed activities such as searching for Easter eggs in the maze, building LEGO EV3 Mindstorms robots, using the SketchBot sand table robot to draw their face in the sand, create computer music, see a demonstration of 3D printing by BlackCountryAtelier and got to use the Oculus Rift virtual reality headset. The event returns as Summer Bytes over the Summer holiday (see back page) for more details. TNMOC newsletter Q2 2014 3 n the weekend of 14th-15th June, TNMOC took part for the first time in the International red Harris and David Allen (pictured above, photo OMuseums On the Air Weekend and made courtesy Ian Pare) visited TNMOC in June to recall contact with museums in the UK and abroad. Ftheir time on the BBC TV ground-breaking computer literacy programmes of the 1980s. Members of the Milton Keynes Amateur Radio Society set up a radio station in the TNMOC meeting room and David was the producer of the full series of programmes erected a temporary aerial above the museum building and Fred was the presenter on Micro Live. Their combined chemistry on the day showed exactly why the The station used the unique call sign GB2NMC (Golf series proved so popular. Bravo 2 National Museum of Computing) We learned a few secrets of the programme including Over the weekend over 200 stations were contacted, the barely controlled panic that was going on off Sunday being the busiest day. From our initial call at microphone when Micro Live s email was being hacked about 10am Sunday morning a very large number of during a live programme. stations were trying to contact us, amongst them one at the Museum of Flight, North Weald Airfield and a Secret We also saw the emergency prop that Fred would keep Nuclear Bunker! below his seat in case they had to come up with an item to fill a space on the live programme. It was a 5.25” Contact was also made with many French, Belgium and floppy disc with a special tool to enable it to be used on Dutch radio amateurs. Berne, Switzerland was the most both sides. distant contact. David Allen’s talk for the TNMOC Winter Lecture series International Museums on The Air is an annual event is available on the TNMOC channel on You Tube: and has been running since 2002 for more information www.youtube.com/user/tnmoc. see www.radio-amateur-events.org/IMW/. he TNMOC Video Running time Number of views channel on TYou Tube has Harwell Dekatron / WITCH Reboot 00:50:00 1,024,854 several videos tnmoc.org available for free viewing. The table lists the top EDSAC Re-creation Overview 00:07:10 22,959 five most viewed videos: All videos can be PDP8 - Presentation #1 00:02:44 21,974 accessed at: http:// The reboot of the Harwell Dekatron / www.youtube.com/ WITCH computer, the world's oldest 00:21:07 16,297 user/tnmoc/videos working computer Uncovering Colossus - Prof Brian 01:03:22 9,193 Randell TNMOC newsletter 4 Q2 2014 Rediscovered EDSAC diagrams giving us some fascinating insights about how EDSAC was built and show that we are very much in tune with the original engineers: both teams have been exercised by the same concerns! "Importantly, the drawings clearly show that the aim of EDSAC's designer, Sir Maurice Wilkes, was to produce a working machine quickly rather than to create a more refined machine that would take longer to build.
Recommended publications
  • May 21St at the Time, the EDSAC Used IBM 726 Three Small Cathode Ray Tube Börje Langefors Screens to Display the State of Its Announced Memory
    it played tic-tac-toe (known as Noughts and Crosses in the UK). May 21st At the time, the EDSAC used IBM 726 three small cathode ray tube Börje Langefors screens to display the state of its Announced memory. Each one could draw a May 21, 1952 Born: May 21, 1915; grid of 35 x 16 dots. Douglas re- purposed one of them for his Ystad, Sweden The IBM 726 was the company’s game, and obtained input (i.e. Died: Dec. 13, 2009 first magnetic tape unit, where to place a nought or intended for use with the Langefors developed the cross) via EDSAC’s rotary recently announced IBM 701 ‘infological equation’ in 1980, controller. [April 7], the company’s first which describes the difference electronic computer. between information and data in terms of additional semantic The 726 utilized half-inch tapes background and a with seven tracks. Six were for communication time interval. the data and the seventh was employed as a parity track. Langefors joined SAAB, the Some tapes were 1,200 feet long, Swedish aerospace and defense could store 2.3 MB of data, and company, in 1949 where he IBM claimed that just one could utilized analog devices for replace 12,500 punch cards. calculating wing stresses. The need for more powerful tools The drive could write 100 became evident, and the only characters per inch on a tape Swedish computer of the time, EDSAC CRT Tubes. Computer and read 75 inches per second. the BESK [April 1], was Lab, Univ. of Cambridge. CC BY To withstand the system’s fast insufficient for the task.
    [Show full text]
  • Codebreaker in the Far East 1
    CODEBREAKER o IN THE FAR EAST ALANSTRIPP With an Introduction by CHRISTOPHER ANDREW FRANK CASS First published in Greal Britain by FRANK CASS & CO. LTD. , Gainsborough House, Gainsborough Road, LoJldon Ell 1RS, England ~/() and in the United States ofAmerica by D FRANK CASS & CO. LTD. clo Biblio Distribution Center Contents C~% 81 Adams Drive, P.O. Box 327, Totowa, NJ 07511 6 Copyright tt> 1989 Alan Stripp List of illustrations vii S-t- Author's Note ix British Library Cataloguing in Publication Data I qq~9 Acknowledgments xi Stripp, Alan, 1924- Introduction by Christopher Andrew xiii Codebreaker in the Far East 1. World War 2. Military Cryptology I. Title 940.54'85 PART ONE: TOURS OF DUTY ISBN 0-7146-3363-1 A11408 737468 1. Cambridge, Bedford and Yorkshire 3 2. Bletchley Park 13 . --Library of Congress Cataloging-in-Publicatioll Data 3. Marc,ping Orders 29 Stripp, Alan, 1924- 4. Delhi 39 Codebreaker in the Far East p. cm. 5. Naini Tal, Agra and Abbottabad 48 Bibliography: p 58 Includes index. 6. Bangalore, Singapore and Cambridge ISBN 0-7146-3363-1 1. Stripp, AIan, 1924- .2. World War, 1939-1945-Cryptography. 3. World War, 1939-1945-Personal narratives, English. 4: World PART TWO: JAPANESE PUZZLES War, 1939-1945-Campaigns-Bunna. I. Title D81O.C88S76 1989 7. Japanese Codes and Ciphers: what were they like? 65 940.54'86'41-dcl9 89-741 80 CIP 8. What did they tell us? 9. How were they sent? 89 All rights reserved. No part of this publication may be repro­ 10. How were they intercepted? 93 duced in any form or by any means, electronic, mechanical photocopying, recording or otherwise, witho;lt the prio; 11.
    [Show full text]
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • An Early Program Proof by Alan Turing F
    An Early Program Proof by Alan Turing F. L. MORRIS AND C. B. JONES The paper reproduces, with typographical corrections and comments, a 7 949 paper by Alan Turing that foreshadows much subsequent work in program proving. Categories and Subject Descriptors: 0.2.4 [Software Engineeringj- correctness proofs; F.3.1 [Logics and Meanings of Programs]-assertions; K.2 [History of Computing]-software General Terms: Verification Additional Key Words and Phrases: A. M. Turing Introduction The standard references for work on program proofs b) have been omitted in the commentary, and ten attribute the early statement of direction to John other identifiers are written incorrectly. It would ap- McCarthy (e.g., McCarthy 1963); the first workable pear to be worth correcting these errors and com- methods to Peter Naur (1966) and Robert Floyd menting on the proof from the viewpoint of subse- (1967); and the provision of more formal systems to quent work on program proofs. C. A. R. Hoare (1969) and Edsger Dijkstra (1976). The Turing delivered this paper in June 1949, at the early papers of some of the computing pioneers, how- inaugural conference of the EDSAC, the computer at ever, show an awareness of the need for proofs of Cambridge University built under the direction of program correctness and even present workable meth- Maurice V. Wilkes. Turing had been writing programs ods (e.g., Goldstine and von Neumann 1947; Turing for an electronic computer since the end of 1945-at 1949). first for the proposed ACE, the computer project at the The 1949 paper by Alan M.
    [Show full text]
  • Registrations Subject to the Submission Goods/Services Subject To
    Trademark Trial and Appeal Board Electronic Filing System. https://estta.uspto.gov ESTTA Tracking number: ESTTA1141608 Filing date: 06/21/2021 IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE TRADEMARK TRIAL AND APPEAL BOARD Proceeding 92075258 Party Defendant Shenzhen UFactory Technology Co., Ltd. Correspondence ERIC P. MIRABEL, JD, LLM Address 3783 DARCUS HOUSTON, TX 77005 UNITED STATES Primary Email: [email protected] Secondary Email(s): [email protected] 281-772-3794 Submission Answer and Counterclaim Filer's Name Eric Mirabel Filer's email [email protected] Signature /Eric Mirabel/ Date 06/21/2021 Attachments 4thCLEANAmendedanswercounterclaim.pdf(192292 bytes ) Registrations Subject to the submission Registration No. 4980649 Registration date 06/21/2016 International Re- NONE International Re- NONE gistration No. gistration Date Registrant ARM Limited 110 FULBOURN ROAD CAMBRIDGE, CB19NJ UNITED KINGDOM Goods/Services Subject to the submission Class 009. First Use: 0 First Use In Commerce: 0 All goods and services in the class are requested, namely: Electronic data processing equipment; computer hardware; integrated circuits; memory circuits for system-on-chip devices; microprocessors; Computer chips; RISC-based instruction set architectures, namely, software instructions designed to function with particular microprocessors; data processors; interfaces for computers; printed circuit boards; electronic circuit boards; telephones; mobile computing devices, namely, portable computers, laptop computers, notebook computers,
    [Show full text]
  • The Millennium Technology Prize Laureate 2010 Professor Stephen
    1 (9) The Millennium Technology Prize Laureate 2010 “For his invention of the ARM microprocessor and its implementation on silicon chips. This invention has enabled the revolution in mobile electronics. To date, more than 18 billion ARM-based chips have been manufactured and are used in ubiquitous computing applications, such as mobile phones, digital photography and video, music players, fixed and wireless networking, automobiles and health care, benefitting a large number of people all over the world.” Professor Stephen Furber Professor of Computer Engineering, the University of Manchester, United Kingdom Born March 1953 in Manchester, United Kingdom. Timeline 1982 Acorn BBC Micro launched 1983 Acorn starts RISC Machine project with Furber as principal designer 1985 First ARM microprocessor produced 1987 ARM processor debuts as the first RISC processor for Acorn Archimedes desktop computer 1990 Advanced RISC Machines (ARM) spins out of Acorn and Apple Computers collaboration, Furber continues his research of low power computing as a professor at University of Manchester. 1998 ARM listed on the London Stock Exchange and NASDAQ. Over 50 million ARM powered products shipped. 2010 20 billion ARM based chips manufactured Creator of the ARM microprocessor The 2010 Millennium Technology Prize Laureate Steve Furber is the principal designer of the ARM 32- bit RISC microprocessor, an innovation that revolutionised mobile electronics. The ingeniously designed processor enabled the development of cheap, powerful handheld, battery-operated devices. In the past 25 years nearly 20 billion ARM based chips have been manufactured. You may never have heard of ARM microprocessors, but probably use at least one every day. They tick inside our mobile phones, mp3-players, video recorders and home routers.
    [Show full text]
  • Colossus: the Missing Manual
    Colossus: The Missing Manual Mark Priestley Research Fellow, The National Museum of Computing — Bletchley Park, UK Thomas Haigh University of Wisconsin—Milwaukee & Siegen University 1 serialized ciper text English Cipher text of one message plain text 1 0 0 1 1 (5 channel tape) 0 1 0 1 0 0 1 0 0 0 They were already 1 0 1 1 0 1 0 0 1 0 looking at him as approached in the distance, because he just stood out. He had quite an old face, 01101 11101 01011 0010 Knockolt Newmanry Newmanry Testery Testery Hut 3 Outstation Set Chi Wheels Generate Set Psi & Decrypt Translate Intercept, & Verify Counts “dechi” Motor Wheels Message Message Record & Verify Message (Colossus) (Tunny analog (Hand methods) (Tunny analog (Bilingual machine) machine) humans) dechi 1 0 0 1 1 0 27, 12, 30, 43, 8 Chi wheel 0 1 0 1 0 1 Psi & 55, 22 Sie sahen ihn schon 0 1 0 0 0 von weitem auf sich start posns. 1 0 1 1 0 1 0 0 1 0 motor start posns. zukommen, denn er for msg el auf. Er hatte ein 31, 3, 25, 18, 5 ganz altes Gesicht, aber wie er ging, German 1 0 0 1 1 0 0 1 0 1 0 1 0110001010... plain text 0 1 0 0 0 Newmanry 1 0 1 1 0 0011010100... 1 0 0 1 0 10011001001... 01100010110... 1 0 0 1 1 0 Break Chi 01011001101... 0 1 0 1 0 1 0110001010... 0 1 0 0 0 Wheels 1 0 1 1 0 Chi wheel 0011010100..
    [Show full text]
  • June 1St Heath Robinson Operational
    similar vein to Rube Goldberg in The Mark 2 supported the US). conditional branching, just as Charles Babbage’s analytical June 1st The machine consisted of a engine had done [Dec 23], frame (called the bedspread) although there’s no evidence to which supported two long suggest that the Mark 2's Heath Robinson teleprinter paper tapes on a designer, Tommy Flowers [Dec network of reels, and two other 22], was aware of Babbage's Operational racks holding counters and logic design. June 1, 1943 circuits. Ten Colossi were operating by One tape could hold 2,000 The "Heath Robinson" was a the end of the war and an characters of cipher text, while code-breaking machine used at eleventh had been the other stored patterns that Bletchley Park [Aug 15] to help commissioned. They allowed the the codebreakers believed might decrypt the Lorenz (aka Tunny) Allies to extract a vast amount of represent the Lorenz cipher. intelligence from intercepted encryption. The second tape had radio messages sent from Lorenz was a much more to be precisely one character German High Command advanced cipher than the better longer than the first, and throughout Europe. known Enigma [Feb 23]. For keeping the tapes synchronized example, Enigma machines was a major challenge. A functioning reconstruction of a initially used just three rotors Mark 2 was completed in 2008 Max Newman [Feb 7] was during their encryption process, by Tony Sale and volunteers; it's while a Lorenz device employed responsible for the Robinson's on display at The National functional specification, but twelve.
    [Show full text]
  • MTAT.07.006 Research Seminar in Cryptography the Enigma Cipher Machine
    MTAT.07.006 Research Seminar in Cryptography The Enigma Cipher Machine Kadri Hendla November 28, 2005 Abstract 3.1 The Rotors The aim of this survey is to give a brief overview on Rotors are the most important part of an Enigma Enigma cipher machine and its cryptanalysis before machine. A rotor is a disc about 10 cm in diameter and during the Second World War. The survey is and it’s usually made of hard rubber or bakelite. mostly based on the articles [1] and [7] on Enigma On one face are 26 brass pins forming a circle; on from Wikipedia. the other side are corresponding electrical contacts. Each pin represents a letter in the alphabet. Inside the rotor are 26 wires connecting the pins on one 1 Introduction side to the contacts on the other side; the wiring is different for each rotor. The rotor also has a finger Enigma is a portable cipher machine, famous for wheel for turning the rotor by hand and an alpha- the role it played in World War II. The breaking of bet ring, so the operator can see the rotor position. Enigma codes is considered to be one of the reasons In the earlier versions of Enigma the alphabet ring for the Allies victory. was fixed; the later versions allowed adjusting the alphabet ring relative to the core wiring. This po- sition of the ring is known as the ring settings. The 2 History of Enigma rotors are placed in the machine side by side, which causes the pins and contacts of the neighbouring In 1918 German engineer Arthur Scherbius applied rotors to form an electrical connection.
    [Show full text]
  • Alan Turing's Automatic Computing Engine
    5 Turing and the computer B. Jack Copeland and Diane Proudfoot The Turing machine In his first major publication, ‘On computable numbers, with an application to the Entscheidungsproblem’ (1936), Turing introduced his abstract Turing machines.1 (Turing referred to these simply as ‘computing machines’— the American logician Alonzo Church dubbed them ‘Turing machines’.2) ‘On Computable Numbers’ pioneered the idea essential to the modern computer—the concept of controlling a computing machine’s operations by means of a program of coded instructions stored in the machine’s memory. This work had a profound influence on the development in the 1940s of the electronic stored-program digital computer—an influence often neglected or denied by historians of the computer. A Turing machine is an abstract conceptual model. It consists of a scanner and a limitless memory-tape. The tape is divided into squares, each of which may be blank or may bear a single symbol (‘0’or‘1’, for example, or some other symbol taken from a finite alphabet). The scanner moves back and forth through the memory, examining one square at a time (the ‘scanned square’). It reads the symbols on the tape and writes further symbols. The tape is both the memory and the vehicle for input and output. The tape may also contain a program of instructions. (Although the tape itself is limitless—Turing’s aim was to show that there are tasks that Turing machines cannot perform, even given unlimited working memory and unlimited time—any input inscribed on the tape must consist of a finite number of symbols.) A Turing machine has a small repertoire of basic operations: move left one square, move right one square, print, and change state.
    [Show full text]
  • Filozofski Fakultet Sveučilišta U Zagrebu Odsjek Za Informacijske I Komunikacijske Znanosti 2017/2018
    Filozofski fakultet Sveučilišta u Zagrebu Odsjek za informacijske i komunikacijske znanosti 2017/2018. Maja Mikac Kako je Colossusom razbijena Lorenzova šifra Završni rad Mentorica: dr. sc. Vjera Lopina Zagreb, 2018. Sadržaj Uvod ........................................................................................................................................... 4 1. Kratki presjek razvoja kriptografskih sustava ............................................................. 5 1.1. Kriptologija u Drugom svjetskom ratu ....................................................................... 8 2. Lorenz ................................................................................................................................ 9 2.1. Vernamova šifra ....................................................................................................... 11 2.2. Kriptoanaliza Lorenza .............................................................................................. 15 2.3. Logika stroja ............................................................................................................. 16 2.4. Turingery .................................................................................................................. 19 2.5. Testery ...................................................................................................................... 20 2.6. Newmanry ................................................................................................................ 21 3. Bletchley Park ................................................................................................................
    [Show full text]
  • History of ENIAC
    A Short History of the Second American Revolution by Dilys Winegrad and Atsushi Akera (1) Today, the northeast corner of the old Moore School building at the University of Pennsylvania houses a bank of advanced computing workstations maintained by the professional staff of the Computing and Educational Technology Service of Penn's School of Engineering and Applied Science. There, fifty years ago, in a larger room with drab- colored walls and open rafters, stood the first general purpose electronic computer, the Electronic Numerical Integrator And Computer, or ENIAC. It spanned 150 feet in width with twenty banks of flashing lights indicating the results of its computations. ENIAC could add 5,000 numbers or do fourteen 10-digit multiplications in a second-- dead slow by present-day standards, but fast compared with the same task performed on a hand calculator. The fastest mechanical relay computers being operated experimentally at Harvard, Bell Laboratories, and elsewhere could do no more than 15 to 50 additions per second, a full two orders of magnitude slower. By showing that electronic computing circuitry could actually work, ENIAC paved the way for the modern computing industry that stands as its great legacy. ENIAC was by no means the first computer. In 1839, an Englishman Charles Babbage designed and developed the first true mechanical digital computer, which he described as a "difference engine," for solving mathematical problems including simple differential equations. He was assisted in his work by a woman mathematician, Ada Countess Lovelace, a member of the aristocracy and the daughter of Lord Byron. They worked out the mathematics of mechanical computation, which, in turn, led Babbage to design the more ambitious analytical engine.
    [Show full text]