Tutte, Flowers, and a Bad Imitation of Turing Reflections on Pioneering Code-Breaking Efforts

Total Page:16

File Type:pdf, Size:1020Kb

Tutte, Flowers, and a Bad Imitation of Turing Reflections on Pioneering Code-Breaking Efforts viewpoints VDOI:10.1145/3018994 Thomas Haigh Historical Reflections Colossal Genius: Tutte, Flowers, and a Bad Imitation of Turing Reflections on pioneering code-breaking efforts. AY 14, 2017, will be the 100th anniversary of the birth of someone you might not have heard of: William Thomas (“Bill”) Tutte. MDuring the Second World War he made several crucial contributions to decrypt- ing the Lorenz cipher used to protect the Nazi high command’s most cru- cial radio communications. This work provided the statistical method imple- mented electronically by Tommy Flow- ers, a telecommunications engineer, in the Colossus machines, which pio- neered many of the electronic engineer- ing techniques later used to build digi- tal computers and network equipment.a Myths of Bletchley Park The British code-breaking effort of the Second World War, formerly secret, is now one of the most celebrated aspects of modern British history, an inspiring story in which a free society mobilized its intellectual resources against a ter- rible enemy. That’s a powerful source of nostalgic pride for a country whose national identity and relationship with A scene from the 2014 film The Imitation Game with actor Benedict Cumberbatch its neighbors are increasingly uncertain. portraying Alan Turing. Tutte’s centennial gives a chance to con- sider the broader history of Bletchley and the way in which it has been remem- ably comes from the Oscar-winning Park, where the codebreakers worked, bered. Some kinds of people, and work, film The Imitation Game. This gives us have become famous and others have a starting point: the film is a bad guide not. to reality but a useful summary of every- a This column draws on a research project in progress I am conducting with Mark Priest- Films reach more people than books. thing that the popular imagination gets ley, supported by L.D. Rope’s Second Chari- So statistically speaking, most of what wrong about Bletchley Park. PHOTO BY SNAP STILLS/REX/SHUTTERSTOCK BY PHOTO table Settlement. you know about Bletchley Park prob- One myth is that Alan Turing won JANUARY 2017 | VOL. 60 | NO. 1 | COMMUNICATIONS OF THE ACM 29 viewpoints Figure 1. Logical representation of the action of the Lorenz machine, dubbed “Tunny” by the when the correct settings have been British. The gap of four characters shown between the chi and psi wheels is to symbolize found. Enigma is broken! In reality this the idea of two logically independent transformations applied to a five channel bitstream, was not something that occurred to rather than a representation of the actual inner working of the machine. Turing only after he had finished build- ing a completely pointless machine, Source Lorenz Encoding Attachment but basic cryptanalytic practice already used to break Enigma manually. (paper 1 0 0 1 1 XOR χ1 1 0 1 1 XOR ψ1 0 0 0 radio tape or 0 1 0 1 0 XOR χ2 0 0 1 0 XOR ψ2 1 0 1 Even with the Bombe, breaking Enig- transmitter real time 0 1 0 0 0 XOR χ3 1 1 0 1 XOR ψ3 0 1 0 ma continued to rely on a mix of human keyboard 1 0 1 1 0 XOR χ4 1 0 1 0 XOR ψ4 0 0 0 skill, manual methods, and machine entry) 1 0 0 1 0 XOR χ5 1 0 0 0 XOR ψ5 1 0 1 power. Each Bombe was tended by a cipher text plain text µ1 µ2 (5 bit channels) (5 bit channels) team of female operators, and in recent 5 chi wheels 2 motor 5 psi wheels years a lot of attention has been paid to always wheels drive sometimes rotate psi wheels rotate the experiences of these women. The serialized Bombe operators and Enigma decryp- ciper text ters worked in factory-like conditions, Same wheel start positions and bit patterns used on encoding and decoding machines in a massive operation pioneered by Gordon Welchman for the group at- 01101 11101 01011 00101 tacking Air Force Enigma. Welchman Printer Lorenz Decoding Attachment had made his own vital contribution (Types out 1 1 0 0 1 XOR χ1 1 0 1 1 XOR ψ1 0 1 1 to the Bombe’s design, a “diagonal radio message 0 1 0 1 0 XOR χ2 1 0 0 0 XOR ψ2 1 0 1 receiver board,” but after the machines arrived as received) 0 0 0 1 0 XOR χ3 1 1 0 1 XOR ψ3 1 1 1 0 1 1 0 1 XOR χ4 1 0 1 0 XOR ψ4 0 0 0 shifted to overseeing their use. In con- 0 1 0 0 1 XOR χ5 1 0 0 1 XOR ψ5 0 0 1 trast, once logistical challenges began cipher text plain text µ1 µ2 to outweigh conceptual ones Turing drifted away from leadership of the corresponding group tackling Naval Enigma. There are many kinds of ge- the war pretty much by himself. Bene- and eventually triumphing. In reality, nius, and Turing’s was not of the mana- dict Cumberbatch played Turing as Turing was far from a marginal and de- gerial variety. television’s Sherlock: a humorless, asex- spised figure at Bletchley Park, moving By early 1945 more than 10,000 peo- ual loner whose superhuman mental quickly to a leadership role. The ob- ple worked directly on the British code- powers are compromised only by an stacles Cumberbatch faces are mostly breaking effort. Most of them were almost autistic indifference to social fictional and often absurd. His boss (in women. The film directs some heavy- norms. This combines the traditional reality Turing’s subordinate) Hugh Alex- handed sexism at Joan Clarke, a rare focus of popular science writing on ander tries to smash Christopher. Like female cryptanalyst, to give viewers a the lone genius who changes the world all military men Alastair Denniston, the chance to feel superior to their grand- with the modern movie superhero nar- head of Bletchley Park, is a belligerent parents. Word at Bletchley Park was rative of a freak who must overcome idiot. He smashes down the door, hop- indeed deeply stratified by class and his own flaws before he can save the ing to have Christopher destroyed. A gender, and cryptanalytic work of the world. (This is, I understand, exactly the little later Cumberbatch is blackmailed kind done primarily by upper middle same arc Cumberbatch follows in Doc- into passing secrets to a Soviet spy. class men like Turing has traditionally tor Strange, a literal superhero movie). Cumberbatch’s growth is symbolized been the most celebrated. Yet its own A team of six bright young men arrive by his making friends with the other erasure of the work routinely done by at Bletchley Park and are given the job brilliant codebreakers, but they seem women reflects a more modern sexism. of breaking the German Enigma code. just as arrogant as he was. Fearful that A single giant machine, given by a su- After introducing himself as “the best Bletchley Park managers will get in the perman, clunks without human inter- mathematician in the world,” Cumber- way, they pretend that Enigma is unbro- vention until the answer emerges. batch dismisses his fellow codebreak- ken and instead run the Battle of the At- That’s silly. So is the myth that bril- ers, saying “I don’t have time to explain lantic from their machine room, decid- liant scientists need no help from engi- myself as I go along, and I’m afraid ing which convoys to save and which the neers. Cumberbatch drew up the engi- these men would only slow me down.” U-boats should be allowed to sink. neering blueprints for the one and only Over their objections, and the opposi- Another myth is that code-breaking Bombe during a montage, then built it tion of almost everyone else at Bletch- machines eliminated human labor at Bletchley Park aided by a handful of ley Park, he designs a machine called and code-breaking skill. At first Chris- briefly glimpsed assistants. In fact, ap- Christopher to beat Enigma. topher spins uselessly, producing proximately 200 Bombes were manufac- The film struggles to shoehorn a dramatic tension but no Enigma set- tured, none of them at Bletchley Park, complicated, nuanced, and tragic sto- tings. At the last minute, Cumberbatch with design and production work done ry into the generic template of a hero thinks of looking for the common primarily by the British Tabulating Ma- overcoming obstacles, facing disaster, phrases, such as “Heil Hitler,” to detect chine Company, under the direction of 30 COMMUNICATIONS OF THE ACM | JANUARY 2017 | VOL. 60 | NO. 1 viewpoints its chief engineer Harold Keen. BTM had Tunny before Tunny, with the result that early licensed IBM punched card technology There’s another popular myth en- histories assumed that all intelligence for sale throughout the British Empire, dorsed by the The Imitation Game: that delivered by Bletchley Park had come giving it command of the necessary the Enigma was the only significant from Enigma. technologies and engineering methods. German cipher broken at Bletchley The British knew nothing about the In this way, and countless others, Park. In reality another cipher, code- machine producing Tunny, working technology transcended, rather than named Tunny, was just as important. entirely on clues from the intercepted supplemented, human labor and bu- Enigma was used by the German mili- messages. In contrast, the team break- reaucracy. Perhaps nobody would pay tary to communicate with forces in ing Enigma had a number of resources to see a movie centered on heroic pro- the field.
Recommended publications
  • To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (1939­1945).
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • Stdin (Ditroff)
    Notes to accompany four Alan Turing videos 1. General The recent (mid-November 2014) release of The Imitation Game movie has caused the com- prehensive Alan Hodges biography of Turing to be reprinted in a new edition [1]. This biog- raphy was the basis of the screenplay for the movie. A more recent biography, by Jack Copeland [2], containing some new items of information, appeared in 2012. A more techni- cal work [3], also by Jack Copeland but with contributed chapters from other people, appeared in 2004. 2. The Princeton Years 1936–38. Alan Turing spent the years from 1936–38 at Princeton University studying mathematical logic with Prof. Alonzo Church. During that time Church persuaded Turing to extend the Turing Machine ideas in the 1936 paper and to write the results up as a Princeton PhD. You can now obtaing a copy of that thesis very easily [4] and this published volume contains extra chapters by Andrew Appel and Solomon Feferman, setting Turing’s work in context. (Andrew Appel is currently Chair of the Computer Science Dept. at Princeton) 3. Cryptography and Bletchley park There are many texts available on cryptography in general and Bletchley Park in particu- lar. A good introductory text for the entire subject is “The Code Book” by Simon Singh [5] 3.1. Turing’s Enigma Problem There are now a large number of books about the deciphering of Enigma codes, both in Hut 6 and Hut 8. A general overview is given by “Station X” by Michael Smith [6] while a more detailed treatment, with several useful appendices, can be found in the book by Hugh Sebag-Montefiore [7].
    [Show full text]
  • Sir Andrew J. Wiles
    ISSN 0002-9920 (print) ISSN 1088-9477 (online) of the American Mathematical Society March 2017 Volume 64, Number 3 Women's History Month Ad Honorem Sir Andrew J. Wiles page 197 2018 Leroy P. Steele Prize: Call for Nominations page 195 Interview with New AMS President Kenneth A. Ribet page 229 New York Meeting page 291 Sir Andrew J. Wiles, 2016 Abel Laureate. “The definition of a good mathematical problem is the mathematics it generates rather Notices than the problem itself.” of the American Mathematical Society March 2017 FEATURES 197 239229 26239 Ad Honorem Sir Andrew J. Interview with New The Graduate Student Wiles AMS President Kenneth Section Interview with Abel Laureate Sir A. Ribet Interview with Ryan Haskett Andrew J. Wiles by Martin Raussen and by Alexander Diaz-Lopez Allyn Jackson Christian Skau WHAT IS...an Elliptic Curve? Andrew Wiles's Marvelous Proof by by Harris B. Daniels and Álvaro Henri Darmon Lozano-Robledo The Mathematical Works of Andrew Wiles by Christopher Skinner In this issue we honor Sir Andrew J. Wiles, prover of Fermat's Last Theorem, recipient of the 2016 Abel Prize, and star of the NOVA video The Proof. We've got the official interview, reprinted from the newsletter of our friends in the European Mathematical Society; "Andrew Wiles's Marvelous Proof" by Henri Darmon; and a collection of articles on "The Mathematical Works of Andrew Wiles" assembled by guest editor Christopher Skinner. We welcome the new AMS president, Ken Ribet (another star of The Proof). Marcelo Viana, Director of IMPA in Rio, describes "Math in Brazil" on the eve of the upcoming IMO and ICM.
    [Show full text]
  • War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946
    Programmed Inequality How Britain Discarded Women Technologists and Lost Its Edge in Computing Marie Hicks HD 6135 H53 2017 The Library Mt. St. Vincent Univ. Halifax, N.S. B3M 2J6 The MIT Press Cambridge, Massachusetts London, England 1 War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946 In recent years, the restoration of Bletchley Park has attracted worldwide attention. The country estate in Milton Keynes, United Kingdom, was the site of the most important codebreaking operations of World War II and home to the first digital, electronic, programmable computer: the Colossus. The British-designed and manufactured Colossus computers, of which there were ten in all by war's end, were critical to the conduct of Allied wartime operations. Unlike their better-known U.S. counter­ part, the ENIAC, the Colossus computers were actually deployed during the war, actively changing its outcome. Kept secret for decades, the full import of the developments at Bletchley has only recently become widely known.1 Yet while popular culture has begun to recognize the importance of Bletchley's wartime operations, misunderstandings persist about the nature of the information work performed there. The 2014 blockbuster The Imitation Game, for instance, cleaves the Colossus computers from the narrative entirely in favor of building a "great man" narrative for a single codebreaker.2 Hidden within the story of Bletchley is a less popular narrative that cannot leverage the appeal of a lone genius and his accomplishments. Thousands of women worked at Bletchley during the war-most in tech­ nical roles.3 Although it is generally accepted that the striking and wide­ ranging roles of the mostly women workers within Bletchley Park give lie to stereotypes about computing as a traditionally masculine field, the contributions of these women have not been analyzed as constitutive of larger trends in the history of computing.
    [Show full text]
  • Judith Leah Cross* Enigma: Aspects of Multimodal Inter-Semiotic
    91 Judith Leah Cross* Enigma: Aspects of Multimodal Inter-Semiotic Translation Abstract Commercial and creative perspectives are critical when making movies. Deciding how to select and combine elements of stories gleaned from books into multimodal texts results in films whose modes of image, words, sound and movement interact in ways that create new wholes and so, new stories, which are more than the sum of their individual parts. The Imitation Game (2014) claims to be based on a true story recorded in the seminal biography by Andrew Hodges, Alan Turing: The Enigma (1983). The movie, as does its primary source, endeavours to portray the crucial role of Enigma during World War Two, along with the tragic fate of a key individual, Alan Turing. The film, therefore, involves translation of at least two “true” stories, making the film a rich source of data for this paper that addresses aspects of multimodal inter-semiotic translations (MISTs). Carefully selected aspects of tales based on “true stories” are interpreted in films; however, not all interpretations possess the same degree of integrity in relation to their original source text. This paper assumes films, based on stories, are a form of MIST, whose integrity of translation needs to be assessed. The methodology employed uses a case-study approach and a “grid” framework with two key critical thinking (CT) standards: Accuracy and Significance, as well as a scale (from “low” to “high”). This paper offers a stretched and nuanced understanding of inter-semiotic translation by analysing how multimodal strategies are employed by communication interpretants. Keywords accuracy; critical thinking; inter-semiotic; multimodal; significance; translation; truth 1.
    [Show full text]
  • Colossus: the Missing Manual
    Colossus: The Missing Manual Mark Priestley Research Fellow, The National Museum of Computing — Bletchley Park, UK Thomas Haigh University of Wisconsin—Milwaukee & Siegen University 1 serialized ciper text English Cipher text of one message plain text 1 0 0 1 1 (5 channel tape) 0 1 0 1 0 0 1 0 0 0 They were already 1 0 1 1 0 1 0 0 1 0 looking at him as approached in the distance, because he just stood out. He had quite an old face, 01101 11101 01011 0010 Knockolt Newmanry Newmanry Testery Testery Hut 3 Outstation Set Chi Wheels Generate Set Psi & Decrypt Translate Intercept, & Verify Counts “dechi” Motor Wheels Message Message Record & Verify Message (Colossus) (Tunny analog (Hand methods) (Tunny analog (Bilingual machine) machine) humans) dechi 1 0 0 1 1 0 27, 12, 30, 43, 8 Chi wheel 0 1 0 1 0 1 Psi & 55, 22 Sie sahen ihn schon 0 1 0 0 0 von weitem auf sich start posns. 1 0 1 1 0 1 0 0 1 0 motor start posns. zukommen, denn er for msg el auf. Er hatte ein 31, 3, 25, 18, 5 ganz altes Gesicht, aber wie er ging, German 1 0 0 1 1 0 0 1 0 1 0 1 0110001010... plain text 0 1 0 0 0 Newmanry 1 0 1 1 0 0011010100... 1 0 0 1 0 10011001001... 01100010110... 1 0 0 1 1 0 Break Chi 01011001101... 0 1 0 1 0 1 0110001010... 0 1 0 0 0 Wheels 1 0 1 1 0 Chi wheel 0011010100..
    [Show full text]
  • Polish Mathematicians Finding Patterns in Enigma Messages
    Fall 2006 Chris Christensen MAT/CSC 483 Machine Ciphers Polyalphabetic ciphers are good ways to destroy the usefulness of frequency analysis. Implementation can be a problem, however. The key to a polyalphabetic cipher specifies the order of the ciphers that will be used during encryption. Ideally there would be as many ciphers as there are letters in the plaintext message and the ordering of the ciphers would be random – an one-time pad. More commonly, some rotation among a small number of ciphers is prescribed. But, rotating among a small number of ciphers leads to a period, which a cryptanalyst can exploit. Rotating among a “large” number of ciphers might work, but that is hard to do by hand – there is a high probability of encryption errors. Maybe, a machine. During World War II, all the Allied and Axis countries used machine ciphers. The United States had SIGABA, Britain had TypeX, Japan had “Purple,” and Germany (and Italy) had Enigma. SIGABA http://en.wikipedia.org/wiki/SIGABA 1 A TypeX machine at Bletchley Park. 2 From the 1920s until the 1970s, cryptology was dominated by machine ciphers. What the machine ciphers typically did was provide a mechanical way to rotate among a large number of ciphers. The rotation was not random, but the large number of ciphers that were available could prevent depth from occurring within messages and (if the machines were used properly) among messages. We will examine Enigma, which was broken by Polish mathematicians in the 1930s and by the British during World War II. The Japanese Purple machine, which was used to transmit diplomatic messages, was broken by William Friedman’s cryptanalysts.
    [Show full text]
  • Timeline of Computer History
    Timeline of Computer History By Year By Category Search AI & Robotics (55) Computers (145)(145) Graphics & Games (48) Memory & Storage (61) Networking & The Popular Culture (50) Software & Languages (60) Bell Laboratories scientist 1937 George Stibitz uses relays for a Hewlett-Packard is founded demonstration adder 1939 Hewlett and Packard in their garage workshop “Model K” Adder David Packard and Bill Hewlett found their company in a Alto, California garage. Their first product, the HP 200A A Called the “Model K” Adder because he built it on his Oscillator, rapidly became a popular piece of test equipm “Kitchen” table, this simple demonstration circuit provides for engineers. Walt Disney Pictures ordered eight of the 2 proof of concept for applying Boolean logic to the design of model to test recording equipment and speaker systems computers, resulting in construction of the relay-based Model the 12 specially equipped theatres that showed the movie I Complex Calculator in 1939. That same year in Germany, “Fantasia” in 1940. engineer Konrad Zuse built his Z2 computer, also using telephone company relays. The Complex Number Calculat 1940 Konrad Zuse finishes the Z3 (CNC) is completed Computer 1941 The Zuse Z3 Computer The Z3, an early computer built by German engineer Konrad Zuse working in complete isolation from developments elsewhere, uses 2,300 relays, performs floating point binary arithmetic, and has a 22-bit word length. The Z3 was used for aerodynamic calculations but was destroyed in a bombing raid on Berlin in late 1943. Zuse later supervised a reconstruction of the Z3 in the 1960s, which is currently on Operator at Complex Number Calculator (CNC) display at the Deutsches Museum in Munich.
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • Two Influential British World War 2 Technologies Aram Soultanian
    Two Influential British World War 2 Technologies Aram Soultanian London HUA 2900 Dr. David Spanagel & Esther Boucher-Yip 6/20/18 1 Soultanian Introduction When fighting a war, technology can provide one of the greatest advantages the military can possess. A country’s ability to produce more advanced technologies and determine whether or not their technologies have been compromised is probably the difference between winning and losing. Every year, the United States spends billions of dollars developing and building stealth technologies used in state-of-the-art fighter jets and helicopters. The fifth generation F-35 Lightning II and F-22 Raptor have the RADAR Cross Section comparable in size to a golf ball and bumble bee respectively.1 This makes these fighter jets virtually impossible to detect until it is far too late, and the plane has passed with its payload dropped. The concept of stealth planes came from the development of RADAR systems in World War II. Today, not a single F-35 or F-22 has been shot down in combat or in air-to-air exercise and will likely not for another 5-10 years.2 Additionally, the paranoia surrounding encryption began after Alan Turing and a group of codebreakers developed a machine to discover the exact setup of Enigma machines used by the German Navy. Military and private companies alike are prioritizing data security to ensure their data is only accessible to those authorized. The ability to know precisely when an enemy will attack allows preemptive safety measures such as evacuation and coordination of counter attacks, thus reducing the number of casualties.
    [Show full text]
  • Code Breaking at Bletchley Park
    Middle School Scholars’ CONTENTS Newsletter A Short History of Bletchley Park by Alex ​ Lent Term 2020 Mapplebeck… p2-3 Alan Turing: A Profile by Sam Ramsey… ​ Code Breaking at p4-6 Bletchley Park’s Role in World War II by ​ Bletchley Park Harry Martin… p6-8 Review: Bletchley Park Museum by ​ Joseph Conway… p9-10 The Women of Bletchley Park by Sammy ​ Jarvis… p10-12 Bill Tutte: The Unsung Codebreaker by ​ Archie Leishman… p12-14 A Very Short Introduction to Bletchley Park by Sam Corbett… p15-16 ​ The Impact of Bletchley Park on Today’s World by Toby Pinnington… p17-18 ​ Introduction A Beginner’s Guide to the Bombe by Luca ​ “A gifted and distinguished boy, whose future Zurek… p19-21 career we shall watch with much interest.” This was the parting remark of Alan Turing’s Headmaster in his last school report. Little The German Equivalent of Bletchley could he have known what Turing would go on Park by Rupert Matthews… 21-22 ​ to achieve alongside the other talented codebreakers of World War II at Bletchley Park. Covering Up Bletchley Park: Operation Our trip with the third year academic scholars Boniface by Philip Kimber… p23-25 this term explored the central role this site ​ near Milton Keynes played in winning a war. 1 intercept stations. During the war, Bletchley A Short History of Bletchley Park Park had many cover names, which included by Alex Mapplebeck “B.P.”, “Station X” and the “Government Communications Headquarters”. The first mention of Bletchley Park in records is in the Domesday Book, where it is part of the Manor of Eaton.
    [Show full text]