Dawn of Mathematical Cryptology: Probabilists Vs Algebraists Or Algebraists & Probabilists?

Total Page:16

File Type:pdf, Size:1020Kb

Dawn of Mathematical Cryptology: Probabilists Vs Algebraists Or Algebraists & Probabilists? Dawn of Mathematical Cryptology: Probabilists vs Algebraists or Algebraists & Probabilists? Marek Grajek freelance consultant and historian, Poland [email protected] 1 Introduction Khalil1 (also known as Ahmed al-Farahidi), living in Basra in eight century. Their works Traditional cryptology, before the advent of linked early cryptography with the equally early the ciphering machines, relied mostly on the methods of mathematical statistics. It should be linguistical methods, and the role of mathematics noted that Al-Kindi’s interest in statistics was not in the codebreaking was limited to counting the limited to the secret writings. He proposed also a frequency of letters, their pairs and triplets. statistical approach to the medical treatment Machine cryptology changed everything; only evaluation. mathematicians were able to interpret even the During the mediaeval and early modern bare numbers of combinations resulting from the periods attacks based on the letter frequency use of the ciphering machine. The first successful were still popular due to the popularity of the application of advanced mathematics in nomenclators; monoalphabetic substitution cryptology, Marian Rejewski’s success with representing a part of the nomenclator made it Enigma, marked a change of paradigm; his attack vulnerable to statistical attack. Later on, when the was based on the algebra and the group theory. codes and nomenclators started to lose their However, soon after the outbreak of WW2 the popularity in favour of simpler and more Germans had changed the Enigma operational practical ciphers, statistical attacks have gained procedures, rendering most Polish methods of in importance; codebreakers started analysing attack ineffective. British mathematicians, who not only the frequency of the single letters, but took over from the Poles, had to revert to the old also their pairs, triplets and entire, popular words. and proven methods based on probability and Invention and fast adoption of the telegraph statistics, which dominated their work during, has changed this picture for a moment. Early and well after WW2. It was only 30 years after telegraph required not only hiding the message the end of this conflict that the role of the content, but also its compacting. Codes provided algebraic methods was restored. an easy and practical answer; second half of the This paper presents the early period of the nineteenth century was heavily dominated by the development of the mathematical cryptology, use of codes, which, from the codebreaker’s focusing on the clash of two approaches to the perspective, required the application of the codebreaking; that based on statistics and linguistical rather than statistical methods of probability on the one side, and algebraic attack. Use of the radio during the Great War has methods on the other. brought another game changer. Both sides used radio on a mass scale. Ease of interception of the radio messages forced the application of 2 Historical context cryptography at the equally mass scale, and the Although traditional, historical codebreaking traditional codes were getting more and more has always been based on linguistics rather than impractical; during World War One ciphers mathematics, at least since eight century a replaced the codes as the mainstream of component of simple application of math was cryptography, and, consequently, statistics present therein. Al-Kindi, an Arab polymath replaced the linguistics as the mainstream of living in Baghdad in ninth century, described in cryptanalysis. his “Manuscript on Deciphering Cryptographic However, statistical methods used in Messages” an attack on the monoalphabetic cryptanalysis represented rather elementary substitution ciphers based on the natural applications of mathematics, which could be frequency of letters in the language of the clear dealt with by amateurs. Immediately after the end text. As far as we know his work was based on of World War One agencies of major countries the earlier (and presently lost) writings of Al- dealing with cryptology did not realize the need Proceedings of the 3rd International Conference on Historical Cryptology, HistoCrypt 2020 70 to employ or train mathematicians. If some and in the last days of 1932 he managed to solve mathematicians happened to be employed in the his equations, reengineering thus Enigma crypto world, it was only due to their general machine in a purely mathematical way. intellectual discipline, and not to the particular Terms used in the description above do not skills resulting from their scientific discipline. leave a shadow of doubt that Rejewski was using Werner Kunze was employed at the German an absolutely pioneering approach. System of foreign ministry cipher office in 1919, but it was equations represents a term functioning in the only in 1936 that he became the head of its newly purely algebraic context. Permutations are used created mathematical section. William Friedman in the context of the theory of groups. Neither published in 1930 an offer to employ three reminds ideas or notions used in the probability “government mathematicians” at some obscure or statistics, dominating codebreaking up to that agency of the US Army. From the memories of moment. It is somewhat surprising that Rejewski Solomon Kullback, Frank Rowlett and Abraham had not started his attack from the statistical Sinkov, whom he selected from among the approach, considering his earlier professional candidates, we learn that for the first several plans. Just after having completed his studies in years nature of their occupations was rather mathematics at the Poznań University, he distant from mathematics. decided to continue education in the actuarial statistics at Göttingen. One of his relatives was It seems that the first agency dealing with among the founders of the first life insurance cryptology that consciously and purposefully company in Wielkopolska, and Marian Rejewski decided to employ and train mathematicians was obviously planned to start a career in the the Polish Cipher Bureau in 1928. Effects of that insurance business. decision are well known among the historians of cryptology; after the half year training in Algebraic and group theoretic approach, used cryptology in Poznań, in 1929, and three years by Rejewski in his breakthrough attack at the long period of apprenticeship in the Enigma cipher, had numerous advantages over codebreaking, Marian Rejewski was asked to the statistical attacks used against the earlier hand take a look at the real objective of this effort – the ciphers. Its crucial advantage was that it worked. Enigma cipher. It took him less than three months Codebreaking agencies of the major countries to break the cipher and, simultaneously, to initially declared helplessness when confronted change the nature of cryptology forever. with the Enigma cipher. William Clarke, one of the veterans of British Room 40, remarked in a 3 Probabilists vs Algebraists memorandum written in 1937 that “only one cloud obscures the horizon – possibility of When in October 1932 Maksymilian Ciężki general application of the ciphering machines. had asked Marian Rejewski to take a look at the One can argue that it would mean the complete materials that Polish Cipher Bureau was able to end of the codebreaking”. Frank Birch noted an gather about Enigma (Rejewski, 1967), opinion of one of G.C.&C.S. heads of section Rejewski, in spite of his over three years long stating that “(a)ll the German ciphers are training in cryptology, was still a mathematician unbreakable. (…) putting pundits on them rather than the codebreaker. One might say, represents a waste of time”. luckily for the civilized world; had he been the Rejewski’s approach was unique among the cryptologist, he would have probably tried to traditional codebreaking methods, as its success apply the traditional codebreaking methods, was deterministic rather than probabilistic. Most completely ineffective versus Enigma cipher. codebreaking methods used up to his Rejewski started his work identifying some breakthrough were offering only a promise of purely mathematical features of the cipher and success, without granting it. Success depended continued transforming his entire knowledge on many factors beyond the codebreaker’s about the machine and its cipher into a system of control: errors committed by the cipher clerk, equations. He was unable to solve these external evidence permitting to guess the content equations outright, as the variables they of the message, inspired guess of the probable contained represented unknown permutations cleartext. Algebraic approach invented by rather than the numbers. Theory permitting to Rejewski virtually granted the success, provided solve such type of equations was missing and that the codebreaker was able to accumulate Rejewski had to provide it himself, which he did, some 80-100 messages during a single day. Proceedings of the 3rd International Conference on Historical Cryptology, HistoCrypt 2020 71 Finally, with the proper tooling Rejewski’s He developed the new idea within a month and it method was extremely efficient and fast. In 1935 took the AVA company working for Polish Polish team decided to construct a simple intelligence service another month to deliver six electromechanical device named cyclometer. prototypes, but nobody was proud of this Cyclometer was used to simplify the preparation achievement. First – because in December the of the catalogue of so called cyclic Germans increased the number of rotors to five, characteristics.
Recommended publications
  • To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (1939­1945).
    [Show full text]
  • Breaking the Enigma Cipher
    Marian Rejewski An Application of the Theory of Permutations in Breaking the Enigma Cipher Applicaciones Mathematicae. 16, No. 4, Warsaw 1980. Received on 13.5.1977 Introduction. Cryptology, i.e., the science on ciphers, has applied since the very beginning some mathematical methods, mainly the elements of probability theory and statistics. Mechanical and electromechanical ciphering devices, introduced to practice in the twenties of our century, broadened considerably the field of applications of mathematics in cryptology. This is particularly true for the theory of permutations, known since over a hundred years(1), called formerly the theory of substitutions. Its application by Polish cryptologists enabled, in turn of years 1932–33, to break the German Enigma cipher, which subsequently exerted a considerable influence on the course of the 1939–1945 war operation upon the European and African as well as the Far East war theatres (see [1]–[4]). The present paper is intended to show, necessarily in great brevity and simplification, some aspects of the Enigma cipher breaking, those in particular which used the theory of permutations. This paper, being not a systematic outline of the process of breaking the Enigma cipher, presents however its important part. It should be mentioned that the present paper is the first publication on the mathematical background of the Enigma cipher breaking. There exist, however, several reports related to this topic by the same author: one – written in 1942 – can be found in the General Wladyslaw Sikorski Historical Institute in London, and the other – written in 1967 – is deposited in the Military Historical Institute in Warsaw.
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • THE-POLISH-TRACE-Ebook.Pdf
    8 THE POLISH TRACE COMPOSED FROM COMMONLY AVAILABLE SOURCES BY LECH POLKOWSKI FOR IJCRS2017 FOREWORD It is a desire of many participants of conferences to learn as much as possible about the history and culture of he visited country and place and organizers try to satisfy this desire by providing excursions into attractive places and sites. IJCRS2017 also tries to take participants to historic sites of Warmia and Mazury and to show elements of local culture. As an innovation, we propose a booklet showing some achievements of Polish scientists and cryptographers, no doubt many of them are known universally, but some probably not. What bounds all personages described here is that they all suffered due to world wars, th efirst and the second. These wars ruined their homes, made them refugees and exiles, destroyed their archives and libraries, they lost many colleagues, friends and students but were lucky enough to save lives and in some cases to begin the career overseas. We begin with the person of Jan Czochralski, world famous metallurgist, discoverer of the technique of producing metal monocrystals `the Czochralski methode’ and inventor of duraluminum and the `bahnalloy’ who started his career and obtained its heights in Germany, later returned to Poland, became a professor at the Warsaw Polytechnical, played an important role in cultural life of Warsaw, lived in Warsaw through the second world war and the Warsaw Uprising of August-September 1944 and after the war was accused of cooperating ith occupying German forces and though judged innocent was literally erased from the public life and any information about him obliterated.
    [Show full text]
  • The Imagination Game Storia E Fantasia in the Imitation Game
    The Imagination Game storia e fantasia in The Imitation Game Cap. 2: Bletchley Park e Ultra Giovanni A. Cignoni – Progetto HMR 1/28 Bletchley Park e Ultra • Un’organizzazione poderosa • Bletchley Park • I luoghi, le strutture, le procedure • I meccanismi e gli appoggi • Il personale, le (tante) donne di BP • Ultra • Cos’era, come era nascosto • L’impatto sul conflitto, episodi e numeri Giovanni A. Cignoni – Progetto HMR 2/28 A lezione dai Polacchi • 1919, Biuro Szyfrów • Militari, Kowalewski, e matematici, Mazurkiewicz, Sierpiński, Leśniewski • Nel 1938 il 75% dei messaggi tedeschi intercettati era decifrato (Rejewski, Zygalski, Różycki) • Dopo il ’39 PC Bruno, Cadix, Boxmoor • In Inghilterra • Room40 (1914), GC&CS (1919), BP (1938) • Parigi (gennaio ’39), con Francesi e Polacchi • Pyry vicino Varsavia (luglio ’39) Giovanni A. Cignoni – Progetto HMR 3/28 Un posto strategico Bletchley Park - Gayhurst - Wavendon - Stanmore - Eastcote - Adstock Cambridge Banbury Letchworth Oxford London Giovanni A. Cignoni – Progetto HMR 4/28 Bletchley Park, 1942ca Giovanni A. Cignoni – Progetto HMR 5/28 Nel film, ci somiglia... Giovanni A. Cignoni – Progetto HMR 6/28 … ma non è Giovanni A. Cignoni – Progetto HMR 7/28 Il nume tutelare • 1941.10.21: Action this day! • In un momento di successo • Dopo una visita di Churchill • Le Bombe ci sono, mancano persone • Garanzie per i tecnici BTM • Personale per la catena • Intercettazione in grande • Risorse per una pesca industriale • Un po’ come “Echelon” Giovanni A. Cignoni – Progetto HMR 8/28 Il personale • Una grande industria • Da 9000 a 10000 persone, centinaia di macchine • Piuttosto stabile, circa 12000 nomi • Escluso l’indotto, fornitori e logistica • Reclutamento • Inizialmente diretto, da persona a persona • Poi attraverso controlli e selezioni metodiche • Soprattutto nell’ambito delle leve militari • Ma con un occhio anche ai civili Giovanni A.
    [Show full text]
  • Historical Ciphers Part 2
    ECE 646 - Lecture 7 Required Reading • W. Stallings, Cryptography and Network Security, Historical Ciphers Chapter 3, Classical Encryption Techniques Part 2 • A. Menezes et al., Handbook of Applied Cryptography, Chapter 7.3 Classical ciphers and historical development 1 2 14 Substitution Ciphers (2) 12 Character frequency 2. Polyalphabetic substitution cipher 10 in a long English 8 plaintext M = m1 m2 … md 6 m m … m d+1 d+2 2d 4 m2d+1 m2d+2 … m3d 2 ….. 0 a b c d e f g h i j k l m n o p q r s t u v w x y z C = f1(m1) f2(m2) … fd(md) Character frequency 14 in the corresponding f1(md+1) f2(md+2) … fd(m2d ) 12 ciphertext f1(m2d+1 ) f2( m2d+2) … fd(m3d ) 10 for a polyalphabetic ….. 8 substitution cipher d is a period of the cipher 6 1 4 × 100% » 3.8 % Key = d, f1, f2, …, fd 26 2 d 26 d Number of keys for a given period d = (26!) » (4 × 10 ) 0 a b c d e f g h i j k l m n o p q r s t u v w x y z 3 4 1 Polyalphabetic substitution ciphers Vigenère Cipher - Example Simplifications (1) Plaintext: TO BE OR NOT TO BE A. Vigenère cipher: polyalphabetic shift cipher Key: NSA Invented in 1568 Encryption: T O B E O R ci = fi mod d(mi) = mi + ki mod d mod 26 N O T T O B -1 mi = f i mod d(ci) = ci - ki mod d mod 26 E Key = k0, k1, … , kd-1 Number of keys for a given period d = (26)d 5 6 Vigenère Square Vigenère Square plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z 3 a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z b c d e
    [Show full text]
  • Polska Myśl Techniczna W Ii Wojnie Światowej
    CENTRALNA BIBLIOTEKA WOJSKOWA IM. MARSZAŁKA JÓZEFA PIŁSUDSKIEGO POLSKA MYŚL TECHNICZNA W II WOJNIE ŚWIATOWEJ W 70. ROCZNICĘ ZAKOŃCZENIA DZIAŁAŃ WOJENNYCH W EUROPIE MATERIAŁY POKONFERENCYJNE poD REDAkcJą NAUkoWą DR. JANA TARCZYńSkiEGO WARSZAWA 2015 Konferencja naukowa Polska myśl techniczna w II wojnie światowej. W 70. rocznicę zakończenia działań wojennych w Europie Komitet naukowy: inż. Krzysztof Barbarski – Prezes Instytutu Polskiego i Muzeum im. gen. Sikorskiego w Londynie dr inż. Leszek Bogdan – Dyrektor Wojskowego Instytutu Techniki Inżynieryjnej im. profesora Józefa Kosackiego mgr inż. Piotr Dudek – Prezes Stowarzyszenia Techników Polskich w Wielkiej Brytanii gen. dyw. prof. dr hab. inż. Zygmunt Mierczyk – Rektor-Komendant Wojskowej Akademii Technicznej im. Jarosława Dąbrowskiego płk mgr inż. Marek Malawski – Szef Inspektoratu Implementacji Innowacyjnych Technologii Obronnych Ministerstwa Obrony Narodowej mgr inż. Ewa Mańkiewicz-Cudny – Prezes Federacji Stowarzyszeń Naukowo-Technicznych – Naczelnej Organizacji Technicznej prof. dr hab. Bolesław Orłowski – Honorowy Członek – założyciel Polskiego Towarzystwa Historii Techniki – Instytut Historii Nauki Polskiej Akademii Nauk kmdr prof. dr hab. Tomasz Szubrycht – Rektor-Komendant Akademii Marynarki Wojennej im. Bohaterów Westerplatte dr Jan Tarczyński – Dyrektor Centralnej Biblioteki Wojskowej im. Marszałka Józefa Piłsudskiego prof. dr hab. Leszek Zasztowt – Dyrektor Instytutu Historii Nauki Polskiej Akademii Nauk dr Czesław Andrzej Żak – Dyrektor Centralnego Archiwum Wojskowego im.
    [Show full text]
  • This Story Begins Sometime in the Early 1930S, When the Poles And
    XYZ Prof. Włodzimierz Zawadzki Institute of Physics, Polish Academy of Sciences [email protected] Mathematicians are important, and not just in wartime. his story begins sometime in the early 1930s, developing programmable computers. Knox informed when the Poles and the French first took an Turing about the progress made by the Poles, and Tur- T interest in breaking the code generated by the ing built a sophisticated machine of his own that was Enigma encryption machines. The Enigma was a Ger- capable of cracking the increasingly complex Wehr- man-made electro-mechanical device that looked a bit macht codes. In a nod to the Polish pioneers, Turing like a typewriter with little lights, and prior to WWII too called his device “the bomb.” Despite the urgings they were available commercially. The decision to of British intelligence, Bertrand was reluctant to get crack the Enigma code proved far-sighted when the the Polish team out of Nazi-occupied France and into machines underwent a complex and classified rede- Bletchley Park. The team ended up in southern France sign for military purposes in the run-up to the war. and, at one point, in North Africa. Despite their con- Codebreaking challenges had earlier been handled tinuing insights, the Polish team’s direct contribution by linguists, but the Enigma’s rotor-encrypted codes to the breaking of the Enigma code diminished. required codebreakers with a mathematical back- When the United States joined the war, one of the ground. The Polish Cipher Bureau, an intelligence out- most difficult aspects of Enigma decryption focused fit located near Warsaw, set up a task force consisting on the communications of the German U-boat fleet, of Marian Rejewski, Henryk Zygalski and Jerzy Róży- which harassed American supply convoys crossing cki.
    [Show full text]
  • Historical Ciphers • A
    ECE 646 - Lecture 6 Required Reading • W. Stallings, Cryptography and Network Security, Chapter 2, Classical Encryption Techniques Historical Ciphers • A. Menezes et al., Handbook of Applied Cryptography, Chapter 7.3 Classical ciphers and historical development Why (not) to study historical ciphers? Secret Writing AGAINST FOR Steganography Cryptography (hidden messages) (encrypted messages) Not similar to Basic components became modern ciphers a part of modern ciphers Under special circumstances modern ciphers can be Substitution Transposition Long abandoned Ciphers reduced to historical ciphers Transformations (change the order Influence on world events of letters) Codes Substitution The only ciphers you Ciphers can break! (replace words) (replace letters) Selected world events affected by cryptology Mary, Queen of Scots 1586 - trial of Mary Queen of Scots - substitution cipher • Scottish Queen, a cousin of Elisabeth I of England • Forced to flee Scotland by uprising against 1917 - Zimmermann telegram, America enters World War I her and her husband • Treated as a candidate to the throne of England by many British Catholics unhappy about 1939-1945 Battle of England, Battle of Atlantic, D-day - a reign of Elisabeth I, a Protestant ENIGMA machine cipher • Imprisoned by Elisabeth for 19 years • Involved in several plots to assassinate Elisabeth 1944 – world’s first computer, Colossus - • Put on trial for treason by a court of about German Lorenz machine cipher 40 noblemen, including Catholics, after being implicated in the Babington Plot by her own 1950s – operation Venona – breaking ciphers of soviet spies letters sent from prison to her co-conspirators stealing secrets of the U.S. atomic bomb in the encrypted form – one-time pad 1 Mary, Queen of Scots – cont.
    [Show full text]
  • Pioneers in U.S. Cryptology Ii
    PIONEERS IN U.S. CRYPTOLOGY II This brochure was produced by the Center for Cryptologic History Herbert 0. Yardley 2 Herbert 0. Yardley Herbert 0 . Yardley was born in 1889 in Worthington, Indiana. After working as a railroad telegrapher and spending a year taking an English course at the University of Chicago, he became a code clerk for the Department of State. In June 1917, Yardley received a commission in the Signal Officers Reserve Corps; in July Colonel Ralph Van Deman appointed him chief of the new cryptanalytic unit, MI-8, in the Military Intelligence division. MI-8, or the Cipher Bureau, consisted of Yardley and two clerks. At MI-8's peak in November 1918, Yardley had 18 officers, 24 civilians, and 109 typists. The section had expanded to include secret inks, code and cipher compilation, communications, and shorthand. This was the first formally organized cryptanalytic unit in the history of the U.S. government. When World War I ended, the Army was considering disbanding MI-8. Yardley presented a persuasive argument for retaining it for peacetime use. His plan called for the permanent retention of a code and cipher organization funded jointly by the State and War Departments. He demonstrated that in the past eighteen months MI-8 had read almost 11,000 messages in 579 cryptographic systems. This was in addition to everything that had been examined in connection with postal censorship. On 17 May Acting Secretary of State Frank L. Polk approved the plan, and two days later the Army Chief of Staff, General Peyton C.
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • Code Breaking at Bletchley Park
    Middle School Scholars’ CONTENTS Newsletter A Short History of Bletchley Park by Alex ​ Lent Term 2020 Mapplebeck… p2-3 Alan Turing: A Profile by Sam Ramsey… ​ Code Breaking at p4-6 Bletchley Park’s Role in World War II by ​ Bletchley Park Harry Martin… p6-8 Review: Bletchley Park Museum by ​ Joseph Conway… p9-10 The Women of Bletchley Park by Sammy ​ Jarvis… p10-12 Bill Tutte: The Unsung Codebreaker by ​ Archie Leishman… p12-14 A Very Short Introduction to Bletchley Park by Sam Corbett… p15-16 ​ The Impact of Bletchley Park on Today’s World by Toby Pinnington… p17-18 ​ Introduction A Beginner’s Guide to the Bombe by Luca ​ “A gifted and distinguished boy, whose future Zurek… p19-21 career we shall watch with much interest.” This was the parting remark of Alan Turing’s Headmaster in his last school report. Little The German Equivalent of Bletchley could he have known what Turing would go on Park by Rupert Matthews… 21-22 ​ to achieve alongside the other talented codebreakers of World War II at Bletchley Park. Covering Up Bletchley Park: Operation Our trip with the third year academic scholars Boniface by Philip Kimber… p23-25 this term explored the central role this site ​ near Milton Keynes played in winning a war. 1 intercept stations. During the war, Bletchley A Short History of Bletchley Park Park had many cover names, which included by Alex Mapplebeck “B.P.”, “Station X” and the “Government Communications Headquarters”. The first mention of Bletchley Park in records is in the Domesday Book, where it is part of the Manor of Eaton.
    [Show full text]