
Read Ebook {PDF EPUB} The Time Machine by Lorenz B. Graham Pardon Our Interruption. As you were browsing something about your browser made us think you were a bot. There are a few reasons this might happen: You're a power user moving through this website with super-human speed. You've disabled cookies in your web browser. A third-party browser plugin, such as Ghostery or NoScript, is preventing JavaScript from running. Additional information is available in this support article. To regain access, please make sure that cookies and JavaScript are enabled before reloading the page. After completing the CAPTCHA below, you will immediately regain access to the site again. Pardon Our Interruption. As you were browsing something about your browser made us think you were a bot. There are a few reasons this might happen: You're a power user moving through this website with super-human speed. You've disabled cookies in your web browser. A third-party browser plugin, such as Ghostery or NoScript, is preventing JavaScript from running. Additional information is available in this support article. To regain access, please make sure that cookies and JavaScript are enabled before reloading the page. After completing the CAPTCHA below, you will immediately regain access to the site again. Pardon Our Interruption. As you were browsing something about your browser made us think you were a bot. There are a few reasons this might happen: You're a power user moving through this website with super-human speed. You've disabled cookies in your web browser. A third-party browser plugin, such as Ghostery or NoScript, is preventing JavaScript from running. Additional information is available in this support article. To regain access, please make sure that cookies and JavaScript are enabled before reloading the page. After completing the CAPTCHA below, you will immediately regain access to the site again. How Alan Turing Cracked The Enigma Code. Until the release of the Oscar-nominated film The Imitation Game in 2014, the name ‘Alan Turing’ was not very widely known. But Turing’s work during the Second World War was crucial. Who was Turing and what did he do that was so important? Mathematician. Alan Turing was a brilliant mathematician. Born in London in 1912, he studied at both Cambridge and Princeton universities. He was already working part-time for the British Government’s Code and Cypher School before the Second World War broke out. In 1939, Turing took up a full-time role at Bletchley Park in Buckinghamshire – where top secret work was carried out to decipher the military codes used by Germany and its allies. Enigma and the Bombe. The main focus of Turing’s work at Bletchley was in cracking the ‘Enigma’ code. The Enigma was a type of enciphering machine used by the German armed forces to send messages securely. Although Polish mathematicians had worked out how to read Enigma messages and had shared this information with the British, the Germans increased its security at the outbreak of war by changing the cipher system daily. This made the task of understanding the code even more difficult. Turing played a key role in this, inventing – along with fellow code-breaker Gordon Welchman – a machine known as the Bombe. This device helped to significantly reduce the work of the code-breakers. From mid-1940, German Air Force signals were being read at Bletchley and the intelligence gained from them was helping the war effort. Hut 8, Bletchley Park. Turing also worked to decrypt the more complex German naval communications that had defeated many others at Bletchley. German U-boats were inflicting heavy losses on Allied shipping and the need to understand their signals was crucial. With the help of captured Enigma material, and Turing’s work in developing a technique he called 'Banburismus', the naval Enigma messages were able to be read from 1941. He headed the ‘Hut 8’ team at Bletchley, which carried out cryptanalysis of all German naval signals. This meant that – apart from during a period in 1942 when the code became unreadable – Allied convoys could be directed away from the U-boat 'wolf-packs'. Turing’s role was pivotal in helping the Allies during the Battle of the Atlantic. Turingery and Delilah. In July 1942, Turing developed a complex code-breaking technique he named ‘Turingery’. This method fed into work by others at Bletchley in understanding the ‘Lorenz’ cipher machine. Lorenz enciphered German strategic messages of high importance: the ability of Bletchley to read these contributed greatly to the Allied war effort. Turing travelled to the United States in December 1942, to advise US military intelligence in the use of Bombe machines and to share his knowledge of Enigma. Whilst there, he also saw the latest American progress on a top secret speech enciphering system. Turing returned to Bletchley in March 1943, where he continued his work in cryptanalysis. Later in the war, he developed a speech scrambling device which he named ‘Delilah’. In 1945, Turing was awarded an OBE for his wartime work. The Universal Turing Machine. In 1936, Turing had invented a hypothetical computing device that came to be known as the ‘universal Turing machine’. After the Second World War ended, he continued his research in this area, building on his earlier work and incorporating all he'd learnt during the war. Whilst working for the National Physical Laboratory (NPL), Turing published a design for the ACE (Automatic Computing Engine), which was arguably the forerunner to the modern computer. The ACE project was not taken forward, however, and he later left the NPL. Legacy. In 1952, Alan Turing was arrested for homosexuality – which was then illegal in Britain. He was found guilty of ‘gross indecency’ (this conviction was overturned in 2013) but avoided a prison sentence by accepting chemical castration. In 1954, he was found dead from cyanide poisoning. An inquest ruled that it was suicide. The legacy of Alan Turing’s life and work did not fully come to light until long after his death. His impact on computer science has been widely acknowledged: the annual ‘Turing Award’ has been the highest accolade in that industry since 1966. But the work of Bletchley Park – and Turing’s role there in cracking the Enigma code – was kept secret until the 1970s, and the full story was not known until the 1990s. It has been estimated that the efforts of Turing and his fellow code-breakers shortened the war by several years. What is certain is that they saved countless lives and helped to determine the course and outcome of the conflict. The Lorenz Cipher. The Lorenz company designed a cipher machine based on the additive method for enciphering teleprinter messages invented in 1918 by Gilbert Vernam in America. Teleprinters are not based on the 26-letter alphabet and Morse code on which the Enigma depended. Teleprinters use the 32-symbol Baudot code. Note that the Baudot code output consists of five channels each of which is a stream of bits which can be represented as no-hole or hole, 0 or 1, dot or cross. The Baudot Code. The Vernam system enciphered the message text by adding to it, character by character, a set of obscuring characters thus producing the enciphered characters which were transmitted to the intended recipient. The simplicity of Vernam's system lay in the fact that the obscuring characters were added in a rather special way (known as modulo-2 addition). Then exactly the same obscuring characters, added also by modulo- 2 addtion to the received enciphered characters, would cancel out the obscuring characters and leave the original message characters which could then be printed. The working of modulo-2 addition is exactly the same as the XOR operation in logic. If A is the plain-text character, and C the obscuring character, then in the table below, F is the cipher-text character. You can also see from this table that the addition of C to F brings you back to A again: A + C = F F + C = A x + . = x x + . = x x + x = . + x = x . + x = x x + x = . + x = x x + x = . + . = . + . = . Vernam proposed that the obscuring characters should be completely random and pre-punched on to paper tape to be consumed character by character in synchrony with the input message characters. Such a cipher system (a 'one-time pad system') using purely random obscuring characters is unbreakable. The difficulty was how to ensure, in a hot war situation, that the same random character tapes were available at each end of a communications link and that they were both set to the same start position. The Lorenz company decided that it would be operationally easier to construct a machine to generate the obscuring character sequence. Because it was a machine it could not generate a completely random sequence of characters. It generated what is known as a pseudo-random sequence. Unfortunately for the German Army it was more "pseudo" than random and that was how it was broken. The amazing thing about Lorenz is that the code breakers in Bletchley Park never saw an actual Lorenz machine until right at the end of the war but they had been breaking the Lorenz cipher for two and a half years. The first intercepts. Brigadier John Tiltman, one of the top codebreakers in Bletchley Park, took a particular interest in these enciphered teleprinter messages. They were given the code name "Fish". The messages which (as was later found out) were enciphered using the Lorenz machine, were known as "Tunny". Tiltman knew of the Vernam system and soon identified these messages as being enciphered in the Vernam manner.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages4 Page
-
File Size-