Colossus: the Missing Manual

Total Page:16

File Type:pdf, Size:1020Kb

Colossus: the Missing Manual Colossus: The Missing Manual Mark Priestley Research Fellow, The National Museum of Computing — Bletchley Park, UK Thomas Haigh University of Wisconsin—Milwaukee & Siegen University 1 serialized ciper text English Cipher text of one message plain text 1 0 0 1 1 (5 channel tape) 0 1 0 1 0 0 1 0 0 0 They were already 1 0 1 1 0 1 0 0 1 0 looking at him as approached in the distance, because he just stood out. He had quite an old face, 01101 11101 01011 0010 Knockolt Newmanry Newmanry Testery Testery Hut 3 Outstation Set Chi Wheels Generate Set Psi & Decrypt Translate Intercept, & Verify Counts “dechi” Motor Wheels Message Message Record & Verify Message (Colossus) (Tunny analog (Hand methods) (Tunny analog (Bilingual machine) machine) humans) dechi 1 0 0 1 1 0 27, 12, 30, 43, 8 Chi wheel 0 1 0 1 0 1 Psi & 55, 22 Sie sahen ihn schon 0 1 0 0 0 von weitem auf sich start posns. 1 0 1 1 0 1 0 0 1 0 motor start posns. zukommen, denn er for msg el auf. Er hatte ein 31, 3, 25, 18, 5 ganz altes Gesicht, aber wie er ging, German 1 0 0 1 1 0 0 1 0 1 0 1 0110001010... plain text 0 1 0 0 0 Newmanry 1 0 1 1 0 0011010100... 1 0 0 1 0 10011001001... 01100010110... 1 0 0 1 1 0 Break Chi 01011001101... 0 1 0 1 0 1 0110001010... 0 1 0 0 0 Wheels 1 0 1 1 0 Chi wheel 0011010100... 1 0 0 1 0 Testery 10011001001... patterns 01100010110... 1 0 0 1 1 0 (Colossus & 0 1 0 1 0 1 (apply to 01011001101... 0 1 0 0 0 Break Psi 1 0 1 1 0 “rectangling” 10110010111... 1 0 0 1 0 all messages method) & Motor Wheels 01101101001... 1 0 0 1 1 0 on that link) 0 1 0 1 0 1 Psi & motor 0 1 0 0 0 (manual 1 0 1 1 0 wheel patterns 1 0 0 1 0 methods (apply to incl. “Turingery”) Cipher text of multiple messages all messages from the same radio link on that link) WORKING PAPER SERIES | NO. 10 | OCTOBER 2019 Collaborative Research Center 1187 Media of Cooperation Sonderforschungsbereich 1187 Medien der Kooperation Working Paper Series Collaborative Research Center 1187 Media of Cooperation Print-ISSN 2567–2509 Online-ISSN 2567–2517 URN urn:nbn:de:hbz:467-15072 This work is licensed under the Creative Publication of the series is funded by the German Re- Commons Attribution-NonCommercial- search Foundation (DFG). No Derivatives 4.0 International License. This Working Paper Series is edited by the Collabora- The cover image shows Colossus in use as part of a tive Research Center Media of Cooperation and serves broader system of collaboration, including many teams as a platform to circulate work in progress or preprints of humans and machines and the media passed be- in order to encourage the exchange of ideas. Please tween them. contact the authors if you have any questions or com- ments. Copyright remains with the authors. The Working Papers are accessible via the website Universität Siegen, SFB 1187 Medien der Kooperation http://wp-series.mediacoop.uni-siegen.de or can be Herrengarten 3, 57072 Siegen, Germany ordered in print by sending an email to: workingpaper www.sfb1187.uni-siegen.de [email protected] [email protected] Like many modern electronic devices, Colossus did not come with a printed manual. We provide the missing infor- mation needed to get the most out of it. Colossus: The Missing Manual Mark Priestley Research Fellow, The National Museum of Computing — Bletchley Park, UK — [email protected] Thomas Haigh University of Wisconsin — Milwaukee & Siegen University — [email protected] Abstract There has until now been no comprehensive, conve- nient, and reliable description of the actual capabilities of the Colossus codebreaking machines used at Bletchley Park during World War II, the way they were used, and the jobs they were applied to. This gap in the literature has led to a lack of under- standing of the machines’ functionality and hence to exagger- ated claims about their capabilities. In this report we remove the Colossi as far as possible from their cryptanalytical context and consider them simply as computational devices. We give an architectural description of the whole family of related ma- chines, including the initial model known as “Heath Robinson”, and a functional description of the major capabilities of the sec- ond and final Colossus design. We include detailed examples of how the machines would have been set up to perform a range of typical tasks, and conclude with a discussion of their versatility, examining in particular the question of how useful they would have been once the war had ended. We present several examples of actual Colossus configurations and the historical output they produced, illustrating the cooperation between figures typed au- tomatically by Colossus and text and annotations added by the human operator. Keywords Colossus, Fish, Bletchley Park, cryptography, Robinson Introduction mechanisms that could be reconfigured to tackle scientific computing work. However, these program- A great deal has been written about the Colossus ming mechanisms have not been comprehensively machines, but descriptions of their architecture and described. functioning are usually embedded in detailed his- Most descriptions of Colossus begin with a mass tories of code breaking techniques and the work of of detail about code breaking techniques and work Bletchley Park. Although Colossus is usually called at Bletchley Park, focusing more on the details of a computer, and sometimes claimed as “the first codebreaking practice and the quirks of the Lorenz computer” (or, more precisely, as “the first program- machines Colossus was designed to attack than on mable electronic computer”) it has not been clearly the capabilities of the Colossus machines themselves. described from the viewpoint of computer architec- Our original intention was to reverse the usual struc- ture. Claims that Colossus had a crucial and often ture of Colossus discussion by presenting as little in- overlooked place in the history of computing hinge formation as possible about codebreaking practice. on the idea that, if not decommissioned at the end Instead, we aimed to produce the “missing manual” of the war and kept secret for decades thereafter, the for Colossus, explaining its capabilities and program- machines could have been applied to many comput- ming mechanisms in general terms.1 ing tasks beyond the specific codebreaking work for which they were designed. This is a counterfactual discussion, but the validity of such claims depends 1 This title is inspired by the “missing manual” series on the extent to which Colossus had programming of books written by David Pogue and others in the early 2 CRC Media of Cooperation Working Paper Series No. 10 October 2019 As our research progressed we discovered that Most Colossus family machines had two input there was a good reason for the previous tendency streams3; each input stream consisted of 5 bitstreams to embed descriptions of Colossus deep within dis- which we refer to as the “channels” of the input cussion of codebreaking techniques: Colossus was stream. (In contemporary discussions, the five chan- not programmable after all, and could not have use- nels were called “impulses.”) The 5 channels allowed fully been applied to tasks other than attacking the the encoding of the 32 characters in the conventional specific cipher for which it was designed without teleprinter alphabet used by the Germans but, as we considerable hardware modification. So we had to discuss below, the machines treated the channels as go much deeper than we originally anticipated into independent streams. the details of codebreaking to make its capabilities At least one of the input streams was read at high and architecture fully comprehensible. Nevertheless, speed from a paper tape loop. The source of the sec- we have attempted to honor our original objective as ond stream was the key difference between the Rob- far as possible. We begin with an abstract look at the inson branch of the family and the Colossus branch. Colossus family machines as information processing Robinsons read both streams optically from paper devices, describing Colossus as a bitstream processor tape. Colossi generated the second stream electroni- before explaining, to the minimum extent necessary, cally, based on bit patterns set up on control boards. its relationship to codebreaking practice and offering Most Colossus family machines printed out poten- a range of codebreaking configurations as examples tially relevant counts using a typewriter mechanism. of how the Colossi were actually used. In further pub- lications we plan to delve more deeply into that prac- tice by exploring the full range of surviving Colossus 1.1 A Note on Terminology output and associated materials. It is not quite accurate to talk about the reading or combining units of Colossus family machines manip- 1 The Colossus Family as Bitstream Processors ulating characters or numbers. They processed each channel as an independent series of bits, rather than The details of how Bletchley Park managed to retrieve interpreting bits from different channels as charac- key sequences from encrypted messages, and so read ters or binary coded numbers. Fish traffic, are fascinating but exceedingly complex. Colossus read five channels from its paper tape, For the purposes of this report, it is enough to know but it never combined these as the five constitu- that the machines in the Colossus family were origi- ent bits of a single number. In contrast, computers nally designed to automate a particular operation clump bits together in fixed-length chunks (such within this complicated procedure.
Recommended publications
  • To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (1939­1945).
    [Show full text]
  • Codebreaker in the Far East 1
    CODEBREAKER o IN THE FAR EAST ALANSTRIPP With an Introduction by CHRISTOPHER ANDREW FRANK CASS First published in Greal Britain by FRANK CASS & CO. LTD. , Gainsborough House, Gainsborough Road, LoJldon Ell 1RS, England ~/() and in the United States ofAmerica by D FRANK CASS & CO. LTD. clo Biblio Distribution Center Contents C~% 81 Adams Drive, P.O. Box 327, Totowa, NJ 07511 6 Copyright tt> 1989 Alan Stripp List of illustrations vii S-t- Author's Note ix British Library Cataloguing in Publication Data I qq~9 Acknowledgments xi Stripp, Alan, 1924- Introduction by Christopher Andrew xiii Codebreaker in the Far East 1. World War 2. Military Cryptology I. Title 940.54'85 PART ONE: TOURS OF DUTY ISBN 0-7146-3363-1 A11408 737468 1. Cambridge, Bedford and Yorkshire 3 2. Bletchley Park 13 . --Library of Congress Cataloging-in-Publicatioll Data 3. Marc,ping Orders 29 Stripp, Alan, 1924- 4. Delhi 39 Codebreaker in the Far East p. cm. 5. Naini Tal, Agra and Abbottabad 48 Bibliography: p 58 Includes index. 6. Bangalore, Singapore and Cambridge ISBN 0-7146-3363-1 1. Stripp, AIan, 1924- .2. World War, 1939-1945-Cryptography. 3. World War, 1939-1945-Personal narratives, English. 4: World PART TWO: JAPANESE PUZZLES War, 1939-1945-Campaigns-Bunna. I. Title D81O.C88S76 1989 7. Japanese Codes and Ciphers: what were they like? 65 940.54'86'41-dcl9 89-741 80 CIP 8. What did they tell us? 9. How were they sent? 89 All rights reserved. No part of this publication may be repro­ 10. How were they intercepted? 93 duced in any form or by any means, electronic, mechanical photocopying, recording or otherwise, witho;lt the prio; 11.
    [Show full text]
  • War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946
    Programmed Inequality How Britain Discarded Women Technologists and Lost Its Edge in Computing Marie Hicks HD 6135 H53 2017 The Library Mt. St. Vincent Univ. Halifax, N.S. B3M 2J6 The MIT Press Cambridge, Massachusetts London, England 1 War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946 In recent years, the restoration of Bletchley Park has attracted worldwide attention. The country estate in Milton Keynes, United Kingdom, was the site of the most important codebreaking operations of World War II and home to the first digital, electronic, programmable computer: the Colossus. The British-designed and manufactured Colossus computers, of which there were ten in all by war's end, were critical to the conduct of Allied wartime operations. Unlike their better-known U.S. counter­ part, the ENIAC, the Colossus computers were actually deployed during the war, actively changing its outcome. Kept secret for decades, the full import of the developments at Bletchley has only recently become widely known.1 Yet while popular culture has begun to recognize the importance of Bletchley's wartime operations, misunderstandings persist about the nature of the information work performed there. The 2014 blockbuster The Imitation Game, for instance, cleaves the Colossus computers from the narrative entirely in favor of building a "great man" narrative for a single codebreaker.2 Hidden within the story of Bletchley is a less popular narrative that cannot leverage the appeal of a lone genius and his accomplishments. Thousands of women worked at Bletchley during the war-most in tech­ nical roles.3 Although it is generally accepted that the striking and wide­ ranging roles of the mostly women workers within Bletchley Park give lie to stereotypes about computing as a traditionally masculine field, the contributions of these women have not been analyzed as constitutive of larger trends in the history of computing.
    [Show full text]
  • Code Breaking at Bletchley Park
    Middle School Scholars’ CONTENTS Newsletter A Short History of Bletchley Park by Alex ​ Lent Term 2020 Mapplebeck… p2-3 Alan Turing: A Profile by Sam Ramsey… ​ Code Breaking at p4-6 Bletchley Park’s Role in World War II by ​ Bletchley Park Harry Martin… p6-8 Review: Bletchley Park Museum by ​ Joseph Conway… p9-10 The Women of Bletchley Park by Sammy ​ Jarvis… p10-12 Bill Tutte: The Unsung Codebreaker by ​ Archie Leishman… p12-14 A Very Short Introduction to Bletchley Park by Sam Corbett… p15-16 ​ The Impact of Bletchley Park on Today’s World by Toby Pinnington… p17-18 ​ Introduction A Beginner’s Guide to the Bombe by Luca ​ “A gifted and distinguished boy, whose future Zurek… p19-21 career we shall watch with much interest.” This was the parting remark of Alan Turing’s Headmaster in his last school report. Little The German Equivalent of Bletchley could he have known what Turing would go on Park by Rupert Matthews… 21-22 ​ to achieve alongside the other talented codebreakers of World War II at Bletchley Park. Covering Up Bletchley Park: Operation Our trip with the third year academic scholars Boniface by Philip Kimber… p23-25 this term explored the central role this site ​ near Milton Keynes played in winning a war. 1 intercept stations. During the war, Bletchley A Short History of Bletchley Park Park had many cover names, which included by Alex Mapplebeck “B.P.”, “Station X” and the “Government Communications Headquarters”. The first mention of Bletchley Park in records is in the Domesday Book, where it is part of the Manor of Eaton.
    [Show full text]
  • A Note on His Role As World War Ii Cryptanalyst
    Internatiuonal Journal ofApplied Engineering and Technology ISSN: 2277-212X (Online) An Online International Journal Available at http://www.cibtech.org/jet.htm 2013 Vol. 3 (1) January-March, pp.21-26/Afreen Historical Note ALAN TURING: A NOTE ON HIS ROLE AS WORLD WAR II CRYPTANALYST *Rahat Afreen *Department of MCA, Millenium Institute of Management, Dr. RafiqZakariaCampus,Aurangabad, Maharashtra *Author for Correspondence ABSTRACT Alan Mathison Turing is well known to the world of computer for the concept of Turing Machine- A conceptual machine presented by him which proves that automatic computation cannot solve all mathematical problems – also called as Halting Problem of Turing Machine. He was attributed as the founder of Computer Science. But, until late 20th century, his contributions in the field of Number Theory, Cryptography, Artificial Intelligence and more importantly how his ideas protected England in the times of world war II were unknown. Key Words: Alan Turing, Enigma, Bombe, Colossus, Tunny, ACE INTRODUCTION Alan Turing was born on 23rd June 1912 in Paddington, London. His father Julius Mathison Turing worked for Indian Civil Services at Orrisa for British government in India. But he and his wife decided to keep their children back in England for education. He got his education from Sherbrone School, Sherbrone and did his higher education from King‟s College Cambridge where he later became a fellow. He had an interest in the field of mathematics and presented numerous papers on famous problems of mathematics. At the age of 24 Turing wrote a paper entitled “On Computable Numbers, with an Application to the Entscheidungs problem”.
    [Show full text]
  • Colossus and the Origins of Programmability
    Colossus and the Origins of Programmability Draft for discussion at the 2016 SIGCIS Workshop. Do not quote or cite without permission of the authors. Thomas Haigh ([email protected]) and Mark Priestley ([email protected]) This is an initial draft of some material from our ongoing project to explore the history of Tommy Flowers, the ways in which Colossus was used and configured, and its place in the history of information technology. This work is sponsored by Mrs. L.D. Rope’s Second Charitable Trust. The current draft is very preliminary, so please do not quote, cite, or distribute without our permission. If names and references are confusing to you our apologies! Fortunately the basics of Colossus and Bletchley Park are well covered in Wikipedia. Colossus was a codebreaking device built by the British General Post Office at the end of 1943, under the direction of career telecommunications engineer Tommy Flowers. It entered use at Bletchley Park in 1944 to speed the work of codebreakers targeting what was then codenamed “fish,” a family of Lorenz teleprinter codes used for high level German military communication. Colossus was not a one‐off machine, like most early electronic computers, but the prototype for a family of ten “colossi,” in which later models incorporated some significant improvements. The machines were used by the Newmanry, a group under mathematician Max Newman, where ingenious codebreaking users discovered new applications for them which, in turn, shaped the provision of additional controls and capabilities in the later models. Unlike ENIAC, which began in modest secrecy but soon graced the front page of the New York Times, Colossus was highly classified and remained unknown to the public until the 1970s.
    [Show full text]
  • The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life: Plus the Secrets of Enigma
    The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life: Plus The Secrets of Enigma B. Jack Copeland, Editor OXFORD UNIVERSITY PRESS The Essential Turing Alan M. Turing The Essential Turing Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma Edited by B. Jack Copeland CLARENDON PRESS OXFORD Great Clarendon Street, Oxford OX2 6DP Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide in Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Taipei Toronto Shanghai With offices in Argentina Austria Brazil Chile Czech Republic France Greece Guatemala Hungary Italy Japan South Korea Poland Portugal Singapore Switzerland Thailand Turkey Ukraine Vietnam Published in the United States by Oxford University Press Inc., New York © In this volume the Estate of Alan Turing 2004 Supplementary Material © the several contributors 2004 The moral rights of the author have been asserted Database right Oxford University Press (maker) First published 2004 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, or under terms agreed with the appropriate reprographics rights organization. Enquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above.
    [Show full text]
  • Simply Turing
    Simply Turing Simply Turing MICHAEL OLINICK SIMPLY CHARLY NEW YORK Copyright © 2020 by Michael Olinick Cover Illustration by José Ramos Cover Design by Scarlett Rugers All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. For permission requests, write to the publisher at the address below. [email protected] ISBN: 978-1-943657-37-7 Brought to you by http://simplycharly.com Contents Praise for Simply Turing vii Other Great Lives x Series Editor's Foreword xi Preface xii Acknowledgements xv 1. Roots and Childhood 1 2. Sherborne and Christopher Morcom 7 3. Cambridge Days 15 4. Birth of the Computer 25 5. Princeton 38 6. Cryptology From Caesar to Turing 44 7. The Enigma Machine 68 8. War Years 85 9. London and the ACE 104 10. Manchester 119 11. Artificial Intelligence 123 12. Mathematical Biology 136 13. Regina vs Turing 146 14. Breaking The Enigma of Death 162 15. Turing’s Legacy 174 Sources 181 Suggested Reading 182 About the Author 185 A Word from the Publisher 186 Praise for Simply Turing “Simply Turing explores the nooks and crannies of Alan Turing’s multifarious life and interests, illuminating with skill and grace the complexities of Turing’s personality and the long-reaching implications of his work.” —Charles Petzold, author of The Annotated Turing: A Guided Tour through Alan Turing’s Historic Paper on Computability and the Turing Machine “Michael Olinick has written a remarkably fresh, detailed study of Turing’s achievements and personal issues.
    [Show full text]
  • WWII Innovations - Codebreaking, Radar, Espionage, New Bombs, and More
    Part 6: WWII Innovation​ s - Codebreaking, Radar, Espionage, New Bombs, and More. Part 7: WWII Innovations - Codebreaking, Radar, Espionage, New Bombs, and More. ​ ​ Objective: How new innovations impacted the war, people in the war, and people after the war. Assessment Goals: ​ 1. Research and understand at least three of the innovations of WWII that made a difference on the war and after the war. (Learning Target 3) ​ 2. Determine whether you think dropping the atomic bombs on Hiroshima and Nagasaki was a wise decision or not. (Learning Target 2) ​ Resources: Resources in Binder (Video links, websites, and articles) ​ ​ Note Graph (Create something similar in your notes): Use this graph for researching innovations: Innovation #1: ______________________ Innovation #2: ______________________ Innovation #3: ______________________ (Specific notes about impact on war and after) (Specific notes about impact on war and after) (Specific notes about impact on war and after) Use the graph on the next page to organize your research about the atomic bomb. Evidence that dropping the bombs was wise: Evidence that dropping the bombs was not wise: (Include quotes, document citations, and (Include quotes, document citations, and statistics) statistics) ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● My position: My overall thoughts about the choice to drop the bombs: If I were a Japanese civilian, what would I have wanted to happen and why? If I were a U.S. soldier, what would I have wanted to happen and why? Resources: Part 7 - WW2 Innovations - Codebreaking,
    [Show full text]
  • Gendering Decryption - Decrypting Gender
    1 Gendering decryption - decrypting gender The gender discourse of labour at Bletchley Park 1939-1945 Photograph taken from Smith 2011. Spring 2013 MA thesis (30 hp) Author: Annie Burman Supervisor: Mikael Byström Seminar leader: Torkel Jansson Date of seminar: 4 June 2013 2 Abstract Ever since the British efforts to break Axis codes and ciphers during the Second World War were declassified in the 1970s, the subject of Government Code and Cipher School, the organisation responsible, Bletchley Park, its wartime headquarters, and the impact of the intelligence on the war has fascinated both historians and the general public. However, little attention has been paid to Bletchley Park as a war station where three-quarters of the personnel was female. The purpose of this thesis is to explore the gender discourse of labour at Bletchley Park and how it relates to the wider context of wartime Britain. This is done through the theoretical concepts of gendering (the assignation of a gender to a job, task or object), horizontal gender segregation (the custom of assigning men and women different jobs) and vertical gender segregation (the state where men hold more prestigious positions in the hierarchy than women). The primary sources are interviews, letters and memoirs by female veterans of Bletchley Park, kept in Bletchley Park Trust Archive and the Imperial War Museum’s collections, and printed accounts, in total two monographs and five articles. Surviving official documents from Bletchley Park, now kept in the National Archives, are also utilised. Using accounts created by female veterans themselves as the main source material allows for women’s perspectives to be acknowledged and examined.
    [Show full text]
  • Linguaggio Nei Numeri E Numeri Nel Linguaggio. Linguistica, Matematica E Cryptonalisi
    Linguaggio nei numeri e numeri nel linguaggio. Linguistica, Matematica e Cryptonalisi Thomas Christiansen Dipartimento Studi Umanistici, Università del Salento, Lecce, Italia 1 Intoduzione: la scienza della 1 Introduction: the Science of linguistica Linguistics Ai tradizionalisti, gli studi di matematica e di To the more traditionally minded, the studies of linguistica, potrebbero sembrare avere poco in mathematics and linguistics may seem to have comune, poiché costituiscono due modi di ap- little in common, constituting two very different prendimento molto differenti. Nelle università types of learning. In medieval universities, the medioevali le sette arti cosiddette liberali, era- seven so-called liberal arts were divided into a no separate in una divisione inferiore o trivium lower division or triuvium (grammar, rhetoric, (grammatica, retorica, e logica) e una superio- and logic) and a higher quadrivium (arithmetic, re, quadrivium (aritmetica, musica, geometria e music, geometry, and astronomy). Today, maths astronomia). Oggi la matematica è trattata come is treated as a science. Still, but increasingly less una scienza. Lo studio del linguaggio è anco- so, language is sometimes lumped together with ra, ma sempre meno, unito ad argomenti come things like literature and translation and classed letteratura e traduzione e classificato come una as one of the arts1. Added confusion comes from delle arti1. Ulteriore confusione emerge dal fatto the fact that the term linguist has quite different che il termine linguista viene utilizzato in modi uses: on the one hand, it can describe someone piuttosto differenti: da una parte descrive chi sa who is good at speaking different languages (i.e. parlare bene lingue diverse (cioè un poliglotta o a polyglot or plurilingual person); on the other, 1In maniera analoga, la logica è uscita dagli stretti con- 1Similarly, logic has also moved out of the strict confines fini del trivium in quattro campi differenti: filosofico, of the triuvium into four separate fields: philosophical, formale, informale e matematico.
    [Show full text]
  • How to Decrypt a Lorenz SZ42 Message Using Virtual Colossus 3D
    How to decrypt a Lorenz SZ42 message using Virtual Colossus 3D A tutorial on decrypting a German Lorenz SZ42 message using Virtual Colossus 3D https://virtualcolossus.co.uk This document will take you through an example process used on Colossus to get the start positions of a received message. There wasn't a set program which would run to work out the settings, it was a matter of following a "menu" of different algorithms and sometimes required knowledge of what worked on a particular radio link. Colossus was not able to run a sequence of algorithms or use the results of previous calculations (like we would expect from a computer today), each run required a decision by the operator or code breaker assigned to that machine on which operation would be the next best to run. Once the start positions of each of the twelve rotors are calculated, we can use a Lorenz machine to try to decipher the final message. Wheel breaking We will assume that we have already broken the wheel patterns for this message. Wheel breaking meant working out the pin settings of all 501 pins on each of the twelve Lorenz cipher wheels. This was generally done using a few methods including from messages in depth (where several messages were received enciphered with the same key) in a process devised by Alan Turing called Turingery. Later, a new process called rectangling allowed wheel breaking potentially using a single long message. Colossus could help with rectangling to assist with wheel breaking, and Colossus 6 was used almost exclusively for this, but in general, wheel breaking was done by hand methods.
    [Show full text]