A Life Computed

Total Page:16

File Type:pdf, Size:1020Kb

A Life Computed BOOKS & ARTS COMMENT MATHEMATICS In a nearby gallery, a twisted white metal fuselage serves as a poignant reminder of the part Turing’s ideas played in develop- ing safer air travel after the war. In 1954, the A life computed world’s first commercial jet airliner, the de Havilland Comet registered ‘Yoke Peter’, exploded in mid-air, killing everyone on James Poskett navigates a sophisticated account of board — and prompted the Royal Aircraft Alan Turing’s extraordinarily varied intellectual world. Establishment at Farnborough, UK, to find the cause. By this time, Turing’s abstract idea of a lan Turing did not invent the com- and abstracted it, Codebreaker — universal computing machine had become a puter. During the 1930s, well before imagining a universal Alan Turing’s life reality. The National Physical Laboratory in the Manchester ‘Baby’, Pilot ACE computing machine and legacy Teddington, UK, had in 1950 completed the The Science Museum, Aor EDVAC machines, thousands were in that could take on Pilot ACE, an electronic computer designed London operation all across Britain. These ‘com- all of the individual (21 June 2012– to one of Turing’s first practical specifica- puters’ were women, working in teams and tasks allocated to the 31 July 2013) tions. For a short time, this computer was each performing a discrete step of a complex women in the SCS. the fastest in the world. The huge rack of mathematical operation. This was merely a thought experiment for wires, relays and coloured transistors is dis- Employed by the Scientific Comput- him at first — an aid for approaching David played alongside the Yoke Peter wreckage. ing Service (SCS) in the United Kingdom, Hilbert’s notorious ‘decision problem’ on the It helped to process the enormous amounts these doughty women solved problems in question of whether an algorithm exists for of data needed to complete detailed analy- everything from X-ray crystallography to deciding if a given mathematical statement sis of the debris, eventually revealing the jet-engine design. That world of ‘computers has a proof or not. point of structural weakness and prompting before computers’ is featured in the open- Interestingly, although sometimes armed improvements in the design and manufac- ing gallery of Codebreaker, the celebration of with little more than a pencil and slide rule, ture of de Havilland jets. mathematician Alan Turing’s life and legacy the women working for the SCS also used The exhibition also explores links between at London’s Science Museum. basic calculating machines — one of which the Pilot ACE and Dorothy Hodgkin’s work Although the SCS may seem far removed sits in the first room of Codebreaker. These on the structure of vitamin B12. One of her from Turing’s world, knowledge of its work typewriter-like contraptions, covered in original models of the vitamin, an intricate can help us to make sense of his seminal strips of red and white buttons, helped to web of more than 100 red and blue balls, 1936 article ‘On computable numbers, with speed up ballistics calculations crucial to is on show next to the story of her use of an application to the Entscheidungs­problem’. the war effort. computers. Cryptography and X-ray crystal- This is viewed by some as the origin of the The parade of objects that follows reveals lography had much in common at this time: concepts behind the modern computer. But Turing’s impact, as well as his influences, each involved recovering information from the real story is more complex. leading the visitor through a vast intellec- a scrambled signal. Turing didn’t pluck the idea of the modern tual landscape, from aeronautical design and Hodgkin’s problem was that the images computer out of thin air. He took the idea of a biochemistry to cryptography and artificial she produced indicated only the amplitudes team of human computers working together intelligence. of the diffracted waves. To establish the cor- In one gallery, a German Enigma rect structure of a molecule, she needed to machine, tucked into its neat wooden churn through an enormous number of pos- case, sits among archival photos that sible permutations of different wave phases. evoke the atmosphere of Second World So she enlisted the help of both the SCS and War intelligence. Turing is well known to the Pilot ACE, going on to win the Nobel have worked in wartime crypt­analysis at Prize in Chemistry for her work in 1964. the Government Code & Cipher School Turing’s relationships with artificial intel- at Bletchley Park, UK. But he did not ligence and developmental biology are also operate in isolation, collaborating with on show through video interviews with Gordon Welchman on the design of the contemporary mathematical biologists LIBRARY PICTURE SCIENCE & SOCIETY electro­mechanical machines used to crack that run next to programmable robotic the code. These devices, each of which tortoises. Although Turing didn’t work on could mimic the action of several Enigma these machines himself, he was fascinated machines, in turn originated in the ear- by the possibility of an artificial mind, com- lier work of Polish cryptanalysts such as ing to London especially to see robots such Marian Rejewski. as these scurry across the floor at the Festi- val of Britain in 1951. Codebreaker does an impressive job of bringing these diverse histories together. Turing is rightly celebrated, not as a lone genius, but as an impressive intellect and brilliant collaborator. ■ James Poskett is a science writer based in Cambridge, UK, specializing in the history and philosophy of science. Alan Turing worked on devices to crack the German Enigma machine’s code during the Second World War. e-mail: [email protected] 21 JUNE 2012 | VOL 486 | NATURE | 321 © 2012 Macmillan Publishers Limited. All rights reserved.
Recommended publications
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • Stdin (Ditroff)
    Notes to accompany four Alan Turing videos 1. General The recent (mid-November 2014) release of The Imitation Game movie has caused the com- prehensive Alan Hodges biography of Turing to be reprinted in a new edition [1]. This biog- raphy was the basis of the screenplay for the movie. A more recent biography, by Jack Copeland [2], containing some new items of information, appeared in 2012. A more techni- cal work [3], also by Jack Copeland but with contributed chapters from other people, appeared in 2004. 2. The Princeton Years 1936–38. Alan Turing spent the years from 1936–38 at Princeton University studying mathematical logic with Prof. Alonzo Church. During that time Church persuaded Turing to extend the Turing Machine ideas in the 1936 paper and to write the results up as a Princeton PhD. You can now obtaing a copy of that thesis very easily [4] and this published volume contains extra chapters by Andrew Appel and Solomon Feferman, setting Turing’s work in context. (Andrew Appel is currently Chair of the Computer Science Dept. at Princeton) 3. Cryptography and Bletchley park There are many texts available on cryptography in general and Bletchley Park in particu- lar. A good introductory text for the entire subject is “The Code Book” by Simon Singh [5] 3.1. Turing’s Enigma Problem There are now a large number of books about the deciphering of Enigma codes, both in Hut 6 and Hut 8. A general overview is given by “Station X” by Michael Smith [6] while a more detailed treatment, with several useful appendices, can be found in the book by Hugh Sebag-Montefiore [7].
    [Show full text]
  • Polish Mathematicians Finding Patterns in Enigma Messages
    Fall 2006 Chris Christensen MAT/CSC 483 Machine Ciphers Polyalphabetic ciphers are good ways to destroy the usefulness of frequency analysis. Implementation can be a problem, however. The key to a polyalphabetic cipher specifies the order of the ciphers that will be used during encryption. Ideally there would be as many ciphers as there are letters in the plaintext message and the ordering of the ciphers would be random – an one-time pad. More commonly, some rotation among a small number of ciphers is prescribed. But, rotating among a small number of ciphers leads to a period, which a cryptanalyst can exploit. Rotating among a “large” number of ciphers might work, but that is hard to do by hand – there is a high probability of encryption errors. Maybe, a machine. During World War II, all the Allied and Axis countries used machine ciphers. The United States had SIGABA, Britain had TypeX, Japan had “Purple,” and Germany (and Italy) had Enigma. SIGABA http://en.wikipedia.org/wiki/SIGABA 1 A TypeX machine at Bletchley Park. 2 From the 1920s until the 1970s, cryptology was dominated by machine ciphers. What the machine ciphers typically did was provide a mechanical way to rotate among a large number of ciphers. The rotation was not random, but the large number of ciphers that were available could prevent depth from occurring within messages and (if the machines were used properly) among messages. We will examine Enigma, which was broken by Polish mathematicians in the 1930s and by the British during World War II. The Japanese Purple machine, which was used to transmit diplomatic messages, was broken by William Friedman’s cryptanalysts.
    [Show full text]
  • Two Influential British World War 2 Technologies Aram Soultanian
    Two Influential British World War 2 Technologies Aram Soultanian London HUA 2900 Dr. David Spanagel & Esther Boucher-Yip 6/20/18 1 Soultanian Introduction When fighting a war, technology can provide one of the greatest advantages the military can possess. A country’s ability to produce more advanced technologies and determine whether or not their technologies have been compromised is probably the difference between winning and losing. Every year, the United States spends billions of dollars developing and building stealth technologies used in state-of-the-art fighter jets and helicopters. The fifth generation F-35 Lightning II and F-22 Raptor have the RADAR Cross Section comparable in size to a golf ball and bumble bee respectively.1 This makes these fighter jets virtually impossible to detect until it is far too late, and the plane has passed with its payload dropped. The concept of stealth planes came from the development of RADAR systems in World War II. Today, not a single F-35 or F-22 has been shot down in combat or in air-to-air exercise and will likely not for another 5-10 years.2 Additionally, the paranoia surrounding encryption began after Alan Turing and a group of codebreakers developed a machine to discover the exact setup of Enigma machines used by the German Navy. Military and private companies alike are prioritizing data security to ensure their data is only accessible to those authorized. The ability to know precisely when an enemy will attack allows preemptive safety measures such as evacuation and coordination of counter attacks, thus reducing the number of casualties.
    [Show full text]
  • History Today 12 June 2018: Back to Basics
    Back to Basics June 12 The CCH has seen a few instances recently where published histories on the outside that deal with World War II cryptology have used WW II cryptologic terminology incorrectly or made other erroneous statements about the wartime effort. We decided it would be a good idea to lay out some terminology and basic facts for reference. If all this sounds like a primer, well, yes, it is. But we hope it is also an interesting primer. Both the United States and Great Britain had intensive cryptanalytic efforts before World War II, and both enjoyed a measure of success. Although both countries worked a variety of targets, the British concentrated on German cryptosystems, and the U.S. on Japanese systems. Each gave a covername to the systems they sought to solve, and, when successful against an adversary’s system, they applied a different covername to the results of the cryptanalysis. The Americans and British began cautious sharing in early 1941 of what the British called Signals Intelligence (SIGINT) and U.S. officials called Communications Intelligence (COMINT). Over the course of the war, just as the two nations grew closer in military operations, their cryptologic organizations greatly increased cooperation. Both countries had a covername that was applied to the information derived from exploiting a foreign cryptosystem. This had a double purpose; it would help keep the intelligence information within carefully controlled distribution system, and it would alert the reader to the fact that the intelligence had been obtained through an extremely fragile process and could only be discussed with others who held the proper clearances for that kind of intelligence.
    [Show full text]
  • Gordon Welchman: Bletchley Parks Architect of Ultra Intelligence Pdf, Epub, Ebook
    GORDON WELCHMAN: BLETCHLEY PARKS ARCHITECT OF ULTRA INTELLIGENCE PDF, EPUB, EBOOK Joel Greenberg | 288 pages | 02 Feb 2016 | Pen & Sword Books Ltd | 9781848327528 | English | Barnsley, United Kingdom Gordon Welchman: Bletchley Parks Architect of Ultra Intelligence PDF Book Book Description Frontline, London, McMillan , Hardcover 5. Replies 1 Views He began to ask for advice about publishing a more complete account and sought access to GCHQ documents. Media Test New media New comments Search media. This machine was developed in order to produce a systematic analysis of decrypted messages. These cookies are used to make advertising messages more relevant to you. Brand new Book. His book, The Hut Six Story, was the first to reveal not only how they broke the codes, but how it was done on an industrial scale. Search forums. New Posts. Gordon Welchman: Bletchley Park? In a personal paper titled A Personal Record , written shortly before his death in , Welchman stated:. Latest: Cregg Bristle 3 minutes ago. Gordon Welchman was one of the Park's most important figures. The book has a good selection of well reproduced black and white photographs. Book Description Frontline, London, Like Turing, his pioneering work was fundamental to the success of Bletchley Park and helped pave the way for the birth of the digital age. It will require some mathematical back ground to understand this part of the book. The intercepted German army and air force messages were decrypted in Huts 6 and 3; the navy messages which were encrypted with a different Enigma machine in Huts 8 and 4. Author copepod Creation date 9 Apr Tags bletchley park code breaking gordon welchman.
    [Show full text]
  • The Manchester University "Baby" Computer and Its Derivatives, 1948 – 1951”
    Expert Report on Proposed Milestone “The Manchester University "Baby" Computer and its Derivatives, 1948 – 1951” Thomas Haigh. University of Wisconsin—Milwaukee & Siegen University March 10, 2021 Version of citation being responded to: The Manchester University "Baby" Computer and its Derivatives, 1948 - 1951 At this site on 21 June 1948 the “Baby” became the first computer to execute a program stored in addressable read-write electronic memory. “Baby” validated the widely used Williams- Kilburn Tube random-access memories and led to the 1949 Manchester Mark I which pioneered index registers. In February 1951, Ferranti Ltd's commercial Mark I became the first electronic computer marketed as a standard product ever delivered to a customer. 1: Evaluation of Citation The final wording is the result of several rounds of back and forth exchange of proposed drafts with the proposers, mediated by Brian Berg. During this process the citation text became, from my viewpoint at least, far more precise and historically reliable. The current version identifies several distinct contributions made by three related machines: the 1948 “Baby” (known officially as the Small Scale Experimental Machine or SSEM), a minimal prototype computer which ran test programs to prove the viability of the Manchester Mark 1, a full‐scale computer completed in 1949 that was fully designed and approved only after the success of the “Baby” and in turn served as a prototype of the Ferranti Mark 1, a commercial refinement of the Manchester Mark 1 of which I believe 9 copies were sold. The 1951 date refers to the delivery of the first of these, to Manchester University as a replacement for its home‐built Mark 1.
    [Show full text]
  • 1. Types of Computers Contents
    1. Types of Computers Contents 1 Classes of computers 1 1.1 Classes by size ............................................. 1 1.1.1 Microcomputers (personal computers) ............................ 1 1.1.2 Minicomputers (midrange computers) ............................ 1 1.1.3 Mainframe computers ..................................... 1 1.1.4 Supercomputers ........................................ 1 1.2 Classes by function .......................................... 2 1.2.1 Servers ............................................ 2 1.2.2 Workstations ......................................... 2 1.2.3 Information appliances .................................... 2 1.2.4 Embedded computers ..................................... 2 1.3 See also ................................................ 2 1.4 References .............................................. 2 1.5 External links ............................................. 2 2 List of computer size categories 3 2.1 Supercomputers ............................................ 3 2.2 Mainframe computers ........................................ 3 2.3 Minicomputers ............................................ 3 2.4 Microcomputers ........................................... 3 2.5 Mobile computers ........................................... 3 2.6 Others ................................................. 4 2.7 Distinctive marks ........................................... 4 2.8 Categories ............................................... 4 2.9 See also ................................................ 4 2.10 References
    [Show full text]
  • CLUE Rock, Paper, Scissors Game Using Bluetooth Created by Kevin Walters
    CLUE Rock, Paper, Scissors Game using Bluetooth Created by Kevin Walters Last updated on 2021-07-28 03:42:04 PM EDT Guide Contents Guide Contents 2 Overview 4 Parts 4 CLUE 4 Circuit Playground Bluefruit with TFT Gizmo 5 Design 6 Rules 6 More than Two Players 6 Flow Diagram 7 User Interface 8 User Interface 8 Choice selection 8 Display on NeoPixels 9 Screens 9 Screen Transitions 10 Sprites 10 TFT Gizmo Detection 12 The Challenge of Detecting the TFT Gizmo 12 Exchanging Choices 14 Cheating 14 Simultaneous Exchange of Player Choices 15 First Idea 15 Third Idea 16 Fourth Idea 16 Fifth Idea 17 Identity and Authentication 18 Networking 19 Connection-oriented and Connection-less Communication 19 Custom Advertisement Packets using ManufacturerData 20 Simple Game 21 Advanced Game 22 Making the List of Players 22 Exchanging Data between Players 23 Scores 26 Multi-player Scoring 26 Score Table Presentation 26 CircuitPython on CLUE 27 Set up CircuitPython Quick Start! 27 CircuitPython on Circuit Playground Bluefruit 29 Install or Update CircuitPython 29 CircuitPython 31 Libraries 31 Libraries for Very Simple Game 31 Libraries for Simple Game 31 Libraries for Advanced Game for CLUE 31 Libraries for Advanced Game for Circuit Playground Bluefruit with TFT Gizmo 32 Libraries for Advanced Game for Circuit Playground Bluefruit only 32 Development Testing 33 Very Simple Game 34 Installation 34 Code 35 Code Discussion 36 Evolving the Game and some History 36 Simple Game 38 © Adafruit Industries https://learn.adafruit.com/rock-paper-scissors-circuitpython
    [Show full text]
  • De-Mythologising the Early History of Modern British Computing. David Anderson
    Contested Histories: De-Mythologising the Early History of Modern British Computing. David Anderson To cite this version: David Anderson. Contested Histories: De-Mythologising the Early History of Modern British Com- puting.. IFIP WG 9.7 International Conference on History of Computing (HC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.58-67, 10.1007/978-3-642-15199-6_7. hal-01059593 HAL Id: hal-01059593 https://hal.inria.fr/hal-01059593 Submitted on 1 Sep 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Contested Histories: De-Mythologising the Early History of Modern British Computing. David Anderson University of Portsmouth, “The Newmanry”, 36-40 Middle Street, Portsmouth, Hants, United Kindom, PO5 4BT Abstract A challenge is presented to the usual account of the development of the Manchester Baby which focuses on the contribution made to the project by the topologist M.H.A. (Max) Newman and other members of the Dept. of Mathematics. Based on an extensive re-examination of the primary source material, it is suggested that a very much more significant role was played by mathematicians than is allowed for in the dominant discourse.
    [Show full text]
  • Breaking Enigma Samantha Briasco-Stewart, Kathryn Hendrickson, and Jeremy Wright
    Breaking Enigma Samantha Briasco-Stewart, Kathryn Hendrickson, and Jeremy Wright 1 Introduction 2 2 The Enigma Machine 2 2.1 Encryption and Decryption Process 3 2.2 Enigma Weaknesses 4 2.2.1 Encrypting the Key Twice 4 2.2.2 Cillies 5 2.2.3 The Enigma Machine Itself 5 3 Zygalski Sheets 6 3.1 Using Zygalski Sheets 6 3.2 Programmatic Replication 7 3.3 Weaknesses/Problems 7 4 The Bombe 8 4.1 The Bombe In Code 10 4.1.1 Making Menus 10 4.1.2 Running Menus through the Bombe 10 4.1.3 Checking Stops 11 4.1.4 Creating Messages 11 4.1.5 Automating the Process 11 5 Conclusion 13 References 14 1 Introduction To keep radio communications secure during World War II, forces on both sides of the war relied on encryption. The main encryption scheme used by the German military for most of World War II employed the use of an Enigma machine. As such, Britain employed a large number of codebreakers and analysts to work towards breaking the Enigma-created codes, using many different methods. In this paper, we lay out information we learned while researching these methods, as well as describe our attempts at programatically recreating two methods: Zygalski sheets and the Bombe. 2 The Enigma Machine The Enigma machine was invented at the end of World War I, by a German engineer named Arthur Scherbius. It was commercially available in the 1920s before being adopted by the German military, among others, around the beginning of World War II.
    [Show full text]
  • ALAN TURING: and the TUTORIAL MANCHESTER MARK I Program the Post-War Machine Used for Early Computer Music, JULIET KEMP Chess and Proto-Artificial Intelligence
    CODING MANCHESTER MARK I ALAN TURING: AND THE TUTORIAL MANCHESTER MARK I Program the post-war machine used for early computer music, JULIET KEMP chess and proto-artificial intelligence. lan Turing’s work at GCHQ with Colossus WHY DO THIS? during WWII is well-known, as of course is the • Take a trip back to the Turing Test, but those were far from his only 1940s A involvements with early computing developments. In • Search for large prime numbers (very slowly) the late 1940s he was working on designing a • Use the logic that first stored-program computer (Colossus couldn’t store inspired the Turing Test programs, and in any case was still very secret), and in 1948 moved to Manchester where the Manchester Baby and Manchester Mark I were being developed. The Manchester Baby (aka the Manchester Small Scale Experimental Machine) wasn’t a full general- purpose computer, but a small-scale test of Williams tube memory (cathode ray memory, using the charge well created by drawing a dot or dash on the tube). However, it is considered to be the world’s first stored-program computer, running its first program on 21 June 1948, when it found the highest proper divisor of 2^18 (262,144), and took 52 minutes to run. Only two more programs were written for it: an amended One of Turing’s projects while working on the Mark I was version of this, and a program written by Turing to to write code to investigate the Riemann hypothesis, carry out long division. which has to do with the distribution of prime numbers.
    [Show full text]