Sie sind auf Seite 1von 16

ALAN TVRINq, ENlqMA,

and the
BREAI<INq of CiERMAN MACHINE CIPHERS
In
WORLD WAR II

By Lee A. Gladwin

COdes and ciphers were not new at the outbreak of the Second World
War; the ancient Romans had used them. Augmenting human intelligence by
technology can be traced to John Napier's invention of a calculating device
in 1617 ("Napier's Bones"). Indeed, components of the computer (storage,
processor, punch cards, and program) may be traced back to the "difference"
and "analytical engines" of Charles Babbage in the early nineteenth century.
It was only a matter of time before one machine called Enigma was applied
to the creation of the "unbreakable" cipher, and another, the "bornba" or
"bombe,' to the formidable task of breaking that cipher.
The idea that one might construct a universal machine capable of simulat-
ing any other machine was introduced by the mathematician Alan Mathison
Turing in his revolutionary essay, "On Computable Numbers" (1936). He
maintained that "anything performed by a human computer [i.e., a human
who worked with numbers] could be done by a machine,"!
During World War II, the notion of a machine imitating another machine
was to be implemented in the Polish "bomba" and British "bombe." These
machines simulated the operation of multiple German Enigma cipher
machines and allowed British intelligence to learn of German plans in time
to thwart them on land, on sea, and in the air.The British later used Colossus,
a prototype of the modern computer, to break messages simultaneously enci-
phered and transmitted over the Lorenz SZ42 teleprinters between Hitler
and his generals.The intelligence reports based upon the breaking of the Ger-
man Ciphers by these machines were referred to as "Ultra intelligence."The
fact that British intelligence was regularly breaking the German ciphers was
termed the "Ultra secret." Ultra did not become publicly known until the
OPPOSITE: Compact, twenty-
1970s, when some of the former codebreakers began to write about it. More
six-pound Enigma machines recently, thousands of once-classified National Security Agency documents
allowed mobile operation by
land, sea, or air. One oper-
have been released. These documents reveal how machines were used to
ator encoded as another mechanize the basic intelligence functions of German cipher clerks and
copied tbe substituted let- British codebreakers.
ter from a lampboard. En-
crypted messages were sent This article will describe the development of Enigma, the Polish "bomba,'
by radio. RIGHT: Alan Mathi- and its evolution into the Turing-Welchman "bombe" together with the Heath-
son Turing joined the Gov-
ernment Code and Cipher Robinson and Colossus machines, which the British used to decipher the
School at Bletchley Park, Lorenz SZ42 teleprinter codes. Finally,we shall consider the contribution of
England, in 1939. He had
written that a "universal Ultra to the winning of the war in Europe, some hazards of substituting
machine" could simulate machine for human intelligence, and some implications of Turing's thesis for
tbe bebauior of any spe-
cific machine. our postwar view of human and machine intelligence.

203
Prologue

Etiioma and the Polish Assault appearance of random gibberish. The pleted its cycle increased the possible cir-
method was a cipher machine called cuit combinations to 26 x 26, or 676 letters.
Blitzkrieg, or lightning war, was a prac- Enigma. The German military believed it to In this case, "A"would appear as itself only
tice so revolutionary that the word was not be impenetrable. after depressing the "N' key 677 times! Each
even included in the 1939 edition of Cas- Enigma was patented in 1918 by German new rotor added a factor of twenty-six.
sell's New German and English Dictio- electrical engineer Arthur Scherbius, who "Four rotors produce a period of 456,976
nary. After September 1, 1939, no dictionary offered it to the Imperial German Navy in letters; five rotors, a period of 11,881,376."3
could appear without it. The concept of the same year. Enigma was based upon the Small wonder that Scherbius boasted:
blitzkrieg envisioned a short war won rotor principle of enciphering letters. It
The key variation is so great that, with-
through the rapid onslaught of Panzer consisted of three rotors, each about four
out knowledge of the key, even with
(tank) divisions supported by the Luftwaffe and a half inches in diameter with twenty-
an available plaintext and Ciphertext
(German air force) and the speedy deploy- six letters arranged randomly around its cir-
and with the possession of a machine,
ment of the Wehrmacht (army). An aston- cumference.There were, in turn, twenty-six
the key cannot be found, since it is
ished world watched aghast as the German corresponding electrical contacts just
impossible to run through 6 billion
juggernaut routed the Polish cavalry and below the letters. Three rotors were placed
(seven rotors) or 100 trillion (thirteen
seized Poland in the space of twenty-seven inside the Enigma on a steel rod. When a
rotors) keys [rotor starting positions]."
days. There followed an uneasy period of typewriter key was pressed, the first rotor
quiescence, the "Phoney War."It ended with moved forward one notch, changing the cir- Prophetically, he added that "it would
devastating suddenness on April 9, 1940, cuit as a new contact was made and light- only make sense to search for a key . . .
with the beginning of the spring offen- ing up a letter on the lampboard or screen. when it is known that unknown cryp-
sive. Denmark surrendered tograms have the same
within four hours of the Ger- key. And when the same
man invasion. Oslo collapsed key is maintained for a
in a day; Norway, in thirty- long time'?
two. Invaded on May 10, To read a message enci-
Holland surrendered after' phered by Enigma re-
five days on May 14. Belgium quired the recipient to
held out eighteen days, calibrate his machine in
finally capitulating on June exactly the same way as
28. France, attacked on May the sender, following the
12, signed an ignominious same codebook instruc-
surrender document on June tions. He then typed in the
14 in the same train car in ciphertext. As each corre-
which Germany had sued for sponding key was pressed,
peace at the end of the Great a letter lit up on the lamp-
War. Only Great Britain re- board, revealing the origi-
mained. But for how long? nal clear or plaintext.
Coordination and control Initially rejected by the
of Germany's fast-advancing armies relied Enigma rotors, 4Y2 inches wide, had twenty-six German navy, Enigma was given a second
randomly set letters and a battery connection
upon radio communications, but these for letter substitution in the coded message. chance when it was realized that code-
Morse code messages could not be sent in books were no defense against enemy
clear, unenciphered text. The enemy might Assume the rotor was set at "A"before typ- cryptanalysis. A contract was signed be-
eavesdrop on these private exchanges ing in text and that the text consisted solely tween the navy and the Cbiffriermascbi-
between generals and armies or admirals of the letter "A" typed repeatedly. On the nen Aktien-Gesellschaft to start production
and fleets. Code was required. Code books first occasion, the "A"key might light up the in 1925.A slightly altered version of Enigma
listed words to be used in place of those to "H" on the lampboard; on a second occa- was chosen for army use in 1928. About
be kept secret, but such books could fall sion, "Y"~and on the third occasion, the "D." 1930, the twenty-six-socket plugboard was
into enemy hands, as indeed they had In fact, the rotor would have to revolve added to the front of the machine. Resem-
during World War I. (Unfortunately for the through the remaining twenty-five posi- bling a telephone switchboard, it allowed
Germans, they did not discover that the tions of the wheel before coming back to for short cables to be attached in such a
British had been reading their messages its starting position before an "A" would way as to override the rotor substitution
until after the war.") A way had to be found appear as itself; i.e. ,"A"would occur once in and make a different one; e.g., if the rotor
to encipher the coded messages, substitut- twenty-six rotations. Adding another rotor settings produced a "K," the cable running
ing one letter for another to produce the that rotated once whenever the first com- from "K" to "X" changed the letter to an "X.',6

204 Fall 1997


Prologue

This change vastly increased the invincibil- B1etchley Park. For the purpose of illustra- enciphering. The German Enigma operator
ity of Enigma. The chance of an enemy tion, we will examine sample traffic from worked from several manuals and code-
cryptanalyst discovering the original set- the German World War II police and SS traf- books in order to encode a message. The
tings (key) and deciphering German mes- fic file 8 These lower-level codes were used manuals and code books provided the
sages was one in billions! by the order police (Ordnungpolizet), Enigma operator with the day's "key" for
At the same time that these changes which was made up of uniformed police configuring his Enigma. For each day of the
were being made and the machine adapted (Schutzpolizet) and rural police (Gen- month, the Walzenlage (wheel order) col-
for use by the German armed forces (the darmerie). Police battalions formed a umn told him which rotors to select and in
Luftwaffe adopted Enigma in 1935), other branch under the order police and worked what order to place them on the rod in the
versions of Enigma made their way into the in association with the SS. They followed Enigma machine. The Ringstellung (ring
settings) told him how to position the tyre
(tire) on the side of each rotor. The Steck-
erverbindungen told him how to wire his
plugboard. The Kenngruppen (daily key
group) listed three-letter indicators from
which one was to be selected. These were
used to designate which "keys" or set of
operator instructions the sender would use
when sending the message. 10 He first typed
in the coded message. As letters on the
lamp board lit up, the clerk standing behind
him called them out to a third clerk, who
wrote them down for later transmission in
Morse code by the radio operator.
The radio signals were picked up on the
huge aerials at Chicksands (RAF), Chatham
(army), and Beaumanor, an estate located
in Leicestershire fifty miles north of Bletch-
ley Park. Straining to hear the dots and
dashes through her headset, the intercept
operator recorded the wireless transmis-
sion on her Wireless/Telegraphy Red
Form. II Basic information such as the date,
radio frequency, time of transmission, and
source "Police" were recorded, followed
by the message in five-letter groups. Such

Bletchley Park-designed replicas of the German Tunny machines could be configured with newly
discovered settings. Cryptanalysis could then decipher all of the relayed messages using those
settings.

railroad administration, the Polizei (police), the German army, and their chief functions
the Abwehr (military intelligence), Sicher- were to round up, execute, or transport
heitsdienst SD (Nazi party intelligence ser- vanquished populations.? Police reports
vice), the dockyards, and navy weather provided British intelligence with informa- . zuui .
service? tion about the effects of bombings as well Ableitcn des NotschliisseJs .
as a variety of socioeconomic and industrial fiirClie Schliisselmaschine
A Brief Introduction to the Intercepts data. Enigma
A message might begin with an SS or
Before proceeding further with how the police officer who handed a written plain-
Enigma codes were broken after the fall of text message to three Enigma clerks for
Poland, it may be well to look at the
odyssey of a message from point of origin Enigma manuals contained the day's "eey=for
rotor rotation and circuitry settings. Safety mea-
to its decipherment and translation at sures included printing with water-soluble ink.

Turing and Enigma 205


Prologue

A teletype keyboard such as tions of letters differed radically from pre-


this one was attached to the
Tunny machine to type mes- vious naval messages. Repetition of letter
sages to be enciphered. groupings disappeared. Polish cryptanalysts
were suddenly unable to read these early

Breakitip Eni8ma- Enigma-produced messages. Within a few

Early Polish Efforts months of this discovery, a commercial ver-


sion of the Enigma was acquired either
Poland's Cipher Bureau, through direct purchase or duplicating one
so singularly successful in that spent an unchaperoned weekend in
breaking German codes dur- the Warsaw Customs Office. Members of
ing and after the Great War, the Cipher Bureau carefully examined it
was confronted by some- and recruited three students from the uni-
thing new and ominous in versity at Poznan to help solve the prob-
the German military mes-
Intercept operators transferred German Morse
sages broadcast on July 15, code signals to a "Red Form"for analysis, not-
1928. Frequency distribu- ing date, time, and source (e.g.,police or 55).

messages were the raw material to be deci-


phered by the cryptanalysts using both S.13 J 9.
WIT RED FORM. :A·~.1r!
manual and machine methods. Once deci-
phered, they would then be translated and
given to the proper service branch. An
... ,,;~ or..,,~tio=- _~__. jZ. ..."0"--_£( '!Y.
;',:~n:d -21 H9
01'" ~i?
-:1. _~ __
s.~ . ._..__. _.
urgent message would be sent to Bletchley
Park via teleprinter; otherwise, it was hand-
10 ;,'1
To' 6 / :'''''.
hCl.ll1r:!h.:y ~\
-
~~'Sle-,T1.
/

carried by motorcycle. Wireless stations


>c._.". ----'.2·...:·(J·~- - .------- ...-... ---...-. f-.

were staffed largely by members of the Fr;'"":'l~ 37tA

Women's Auxiliary Air Force (WAAF).12


Enigma's known vulnerabilities were 0(J1ij'
acquisition of cryptographic materials or
information by betrayal, accident, or seizure N~ /LL ~-J:2-1 2~P /?~# ..
by the enemy. To prevent the last of these,
the German navy printed its books of set-
ting indicators and codes in water-soluble
ink. These and the rotors were to be cast
into the sea in the event of imminent cap-
ture by the enemy. Summarizing the chal-
lenge presented to Allied cryptanalysts on
the eve of World War II, historian and for-
mer Bletchley Park cryptanalyst Francis
Harry Hinsley wrote:

By the outbreak of war, as a result of


these modifications, the Germans
judged that they had rendered it safe
even in the event of capture; and they
had indeed made it into a cypher sys-
tem that presented formidable obsta-
cles to the cryptanalyst. Instructions
for arranging and setting the wheels
could be changed as frequently as
every 24 hours; anyone not knowing
the setting was faced with the prob-
lem of choosing from one hundred .. _._._; -_ .•_ ..._-_ ... --.
and fifty million, million, million solu- /-IveJNU
tions.'>

206 Fall 1997


Prologue

lem: Marian Rejewski, jerzy Rozycki, and by the Poles was identical to that of the mil- ued to discover ways to defeat these
Henryk Zygalski. They began work Septem- itary version. This error impeded solution changes by manual methods. Their discov-
ber 1,193214 of the equations to the point of near aban- eries became the basis of Allied codebreak-
Rejewski, a brilliant young mathemati- donment.Then, "quite unexpectedly on 9 ing during World War II. If the period
cian, was removed from his friends and December 1932, at just the right moment, I 1932-1936 was characterized by the prolif-
exiled to a separate room. He was provided was given a photocopy of two tables of eration of Enigma machines throughout the
with the commercial version of Enigma and daily keys for September and October, German military and civilian organizations,
"several dozen messages daily, enciphered 1932."15 Unknown to him, these, and later the period following it displayed Germany's
on the military Enigma."The problem: How materials, were purchased by Capt. Gustave growing concern with system security. It
to discover the configuration of the Enigma Bertrand, French Intelligence, from a finan- was also the period of continued German re-
that produced a given set of messages.What cially pressed member of the Chiffrierstelle armament, the reoccupation of the Rhine-
was the order of the three rotors? What (Cipher Center) named Hans-Thilo Schmidt. land (1936), the Anschluss, and Neville
were their internal settings (ring settings) The equations became solvable, and their Chamberlain's sacrifice of Czechoslovakia
on the shaft? How many plugs were used, solution, together with the new materials, at Munich for "peace in our time" (1938).
and which letters were cabled together? led to methods for arriving at the daily keys Changes came slowly at first.Among the
Finally, what were the rotor starting posi- or settings of the rotors, their sequence, the first was altering the schedule for replacing
tions?
Using mathematical set theory and calcu-
lus, Rejewski first determined the clear let- f\ @MRA61/7/2/4~ POLICE
ters that were enciphered into three totally
different letters (ciphertext) at the begin-
ning of a message. Two sources made such
solutions possible: 1) the availability of v SRS1] ~ fSRS8 NR
about sixty messages for a single day and 2) C J) E
the shortcuts taken by German encipherers
who slipped into bad habits such as typing
the letter "A" three times as their indicator ~FHU~J RKYDX •• AXC ISZ. V •• U.. • Fl<.
key. Knowledge of these individual habits K
identified the senders and made code-
LN AZL QC TEl< QXO TL AUUBV CZGTE UQW~
breaking easier for the Polish and subse-
quent code breakers.
In the course of a day, the Germans enci-
phered many messages and sent them out IHZDO VAOUX QIVVH RK FGD OK QHG VCT
in Morse code. The Poles then picked up
and recorded these wireless messages, and
the collections gradually made their way to
OFMUF YWLQL XBWSX PQ 1RV WQFZF G IC'
the Cipher Bureau and Rejewski. He began
by analyzing the six-letter indicators that
began the radio transmissions (e.g., KYL Morse code transmissions translated to five-letter cryptograms that were sent to various teams at

Bletchley Park. Careless habits of German operators enabled cryptanalysis to dtscouer the initial

BTG), looking for patterns that might pro- settings ana break many codes.
vide clues to the Enigma settings that pro-
duced them. From an examination of sixty connections in the plugboard, and the posi- the fast-moving rotor on the far right side of
or more indicators and the application of tions of the rings-all in the space of about the Enigma machine. Through 1935, the
basic set theory, he was able to identify cer- four months! Provided with this informa- sequence of rotors I, II, and III changed
tain recurring twenty-six letter patterns tion, the Cipher Bureau began building its once a quarter. By October 1,1936, changes
that suggested that pressing a certain key own Enigma replicas to test hypothesized were made daily. On that same date, the
on the Enigma machine produced a spe- keys. Germans increased the number of plug-
cific letter as output on each of the three board cables from six to eight. The Poles
rotors. He was also able to determine how German Cry ptoloqical Ch alletioes created a special machine, the Cyclometer
the rotors were wired using a set of six and Polish Responses, 1936-1939 (consisting of two sets of rotors), and a card
equations with four unknowns to solve. catalog to determine rotor order. It took
There was some initial confusion owing Throughout the remainder of the 1930s, over a year to prepare just six card catalogs.
to Rejewski's false assumption that the key- the Germans continued to make changes in Then, on November 2, 1937, the Germans
board of the commercial Enigma obtained their Cipher system, and the Poles con tin- changed one of the rotors, forcing the Poles

Turing and Enigma 207


Prologue

to re-do much of their work. 16 cally what was no longer feasible to accom- Sharin8 the Secret
Not all the news was bad. In September plish manually. Since there were six possi-
1937 a new communications network ble Enigma rotor sequences, one "bomba" In the bleak December of 1938, Gustave
made its appearance: the Sicherheitsdienst was created per sequence. These were con- Bertrand, head of cipher section of French
(SD), the Nazi party's security service. After structed and ready for use in November intelligence, invited his opposite numbers
some initial difficulties in determining ring 1938. In this, possibly the first, example of from Poland and Great Britain to Paris for
settings, the codebreakers selected a group parallel processing, the "bomba" ran an Enigma conference in February 1939.
of letters from the middle of a message for through all possible Enigma settings and The Poles were instructed to say nothing
analysis. It was typed out on an Enigma stopped when a likely Enigma setting was unless the French and British had some-
replica, using all possible rotor sequences, found. The operator copied the hypothe- thing to share." They didn't. Everyone left
in order to discover a plain, unenciphered sized key (settings) and tested it on an the conference frustrated. Something of
text fragment. What they found were the Enigma replica specially built for the pur- this mood is reflected in a memorandum
letters "ein." Apparently, the officer sending pose. If the plaintext appeared, the key was written much later:
the message could find nothing in his code- found; if not, the process began again. zo The
Early in 1939, about February, [Alastair
book that would permit him to encode and machine solution could, however, be frus-
G.] Denniston and [A. Dillwyn] Knox
transmit it as a four-letter ciphertext, so he trated by multiplying the number of plug-
were asked by the French to come to
sent it unenciphered. This "slip-up" of mix- board cablings.
Paris to discuss "E" [Enigma] with the
ing plain with coded text enabled the Poles To get around the plugboard problem, a
Poles. They went, and met the Poles,
to reconstruct the entire daily key, com- method was needed to factor out the plug-
but on that occasion the Poles told
plete with the ring settings. 17 "EINsing," as it board settings and derive likely ring and
them little that GC&CS [Government
was later called by Great Britain's Bletchley rotor settings. Henryk Zygalski came up
Code & Cipher School] did not already
Park codebreakers, was thus added to the with a set of sheets, "about 60 x 60 cen-
know. Subsequent events showed that
arsenal of cryptological weapons for timeters, designated with the successive let-
the Poles were "holding out" on the
assaulting Enigma. ters of the alphabet -a large square divided
British and Prench."
Between September 1938 and the out- into 51 x 51 smaller squares. Down both
break of the war on September 1, 1939, a sides and across the top and bottom of The question of sharing their discoveries
change was made to the indicator keys.The each large square were placed the letters with the British and French was rendered
cipher clerk had "to select three letters at from 'a' through 'z' and once again from 'a' moot by subsequent events. Following
will, which he placed, unenciphered, at the through 'y' ."ZIEach sheet provided a system Hitler's acquisition of the non-German por-
head of the message. Then he set the drums of coordinates for determining the posi- tion of Czechoslovakia, Britain and France
[rotors] to those letters, chose three other tions of rotors II and III given the position signed a treaty of assistance with Poland,
letters as his message key and, as before, of rotor I, the right-most and fastest-moving pledging their support in event of an
after enciphering these twice, placed them rotor. Every sheet had nearly a thousand unprovoked attack by Germany. On April
at the beginning of the message. Then he perforations made in it, and "26 sheets were 27, 1939, Germany renounced its 1934
set the drums to the message key and needed for each of the 6 rotor orders.<' By nonaggression agreement with Poland. May
began the actual encipherment of the mes- superimposing these sheets over each witnessed an increase in incendiary
sage itself." 18 These changes left the Poles other, "the number of apertures that shone speeches by Hitler, which touched off dis-
able to read only the SD traffic. through gradually decreased, and if one had turbances in Poland and Germany.
a sufficient number of keys with single- On June 30, Gwido Langer, head of
letter cycles, in the end there remained a Poland's Cipher Bureau, called for a confer-
Breakiru; Eni8ma-The Polish
single aperture that shone through all the ence to be held in Warsaw on July 24-25.
Bomba and the ZY8alski Sheet
sheets and that corresponded to the right Bertrand and a French cryptologist
To discover the keys enciphered using case [probable rotor settings]."Z3 attended for France. Denniston, Knox, and
the revised security procedures, Rejewski On December 15, 1938, the Germans Comdr. Humphrey Sandwich represented
proposed the creation of "a device that basi- increased the number of rotors from three Britain.
cally comprised the sets of drums from six to five. Instead of six possible rotor orders,
Enigmas and that . . . synchronously re- there we're now sixty! Each "bomba" would It then was disclosed that the Poles
volved the drums and (after ... about two require thirty-six rotors, and fifty-eight addi- had been successfully dealing with a
hours, running through all the possible 263 tional sets of Zygalski sheets would be large amount of "E." Denniston's
= 17,576 positions) signaled when the con- required. It would be a costly and time- impression is that the Poles' continuity
dition for lighting three pairs of lamps (in consuming feat, and time was rapidly run- ran well back into the early twenties.
each pair the same) was fulfilled."? It was ning out. While the SD network remained They had bombes. Knox was outraged
called a "bomba," possibly after a popular readable until July 1,1939, only one in ten that the Poles had been reticent in Feb-
ice cream dessert. It sought to do mechani- military messages could be read." ruary; not realizing that the Poles

208 Fall 1997


Prologue

understood English, he made very by war's end. A sense of helpless frustration tape, which of these are observed by the
derogatory remarks while riding in a possessed its leaders in September 1940 as computer (possibly with a special order),
cab with Denniston and one of the they viewed the daunting task of overcom- and the state of mind of the computer'v"
Poles, to Denniston's great embarrass- ing the new Enigma changes. In a letter to Given a "table of behavior" describing the
ment. Denniston and Knox took back Comdr. Edward Travis, head of Bletchley computer's actions and "states of mind,"
notes and ideas to England, set about Park, written in August 1940, Naval Section Turing proclaimed, "We may now construct
building bombes, etc. Before GC&CS head Frank Birch wrote "that he was told a machine" to perform the same task.36 If a
got well into "E" traffic, war broke when war broke out that 'all German codes specific "machine" could be described by a
out?? were unbreakable.' I was told it wasn't "table," then a universal machine might be
worth while putting pundits onto them."32 designed that could simulate the behavior
Two Polish-built Enigmas were later
This was the defeatist state of affairs when of any specific machine.
given to Bertrand, who passed one of them
Alan Mathison Turing arrived on September Through a 1945 interview with co-crypt-
on to "C,"head of Secret Service, Col. Stew-
4, 1939, at the Government Code and analyst and unit historianA. P.Mahon,Turing
art Menzies, at Victoria Station on August
Cypher School, Bletchley Park. described Hut 8, where German naval
16.28World War II was less than two weeks
A mathematical genius of independent codes were broken, at the time of his
away.
spirit, he was recruited from Cambridge arrival:
University by GC&CS through a series of
Alan M. Tut ino and the British Bombe When Turing joined the organization
special workshops given to the best and
in 1939, no work was being done on
Poland fell in less than a month. Miracu- brightest at Cambridge and Oxford. Interest
Naval Enigma and he himself became
lously, Marian Rejewski and other members may have focused upon him because of his
interested in it "because no one else
of the Cipher Bureau escaped, with French original suggestion that a machine might be
was doing anything about it and I
aid, to France. With Gustave Bertrand's devised that could imitate any other.
could have it to myself." Machine cryp-
help, they were quickly provided with quar- Alan Turing's concept of "mechanical
tographers were on the whole work-
ters at the Chateau de Vignolles near Gretz- intelligence" began with a jog in the English
ing on the Army and Air Force cyphers
Armainvilliers, about thirty miles northeast countryside early in the summer of 1935.
with which considerable success had
of Paris. The relocated Polish -cipher unit Resting in a meadow, Turing pondered
been obtained.V
was designated PC (for Poste de Comman- whether a machine might be so designed as
dement) Brun029 to determine the "provability of any mathe- Shy and lacking in self-confidence, Alan
The newly arrived Polish cipher team matical assertion presented to it."33To be Mathison Turing epitomized the absent-
resumed work, and on January 17, 1940, "mechanical" implied predictable re- minded professor and was quickly nick-
with the aid of 1,560 Zygalski sheets pro- sponses under given conditions or configu- named "The Prof" by his Hut 8 colleagues.
vided by the GC&CS, they found the Ger- rations; e.g., upper or lower case in the He stuttered and laughed in a raucous,
man army key (code-named Green by instance of a typewriter. Each machine had almost machine-like, way. Tales of Turing's
GC&CS) for October 28, 1939.The German a finite set of possible configurations or set- eccentricities abounded. Bothered by
Luftwaffe keys (Blue for "practice pur- tings. He proceeded to the design of a the- pollen each summer, he donned a gas mask
poses" and Red for "operational and admin- oretical "universal" machine that scanned a before pedaling his bicycle to and from
istrative communications") were recovered tape of infinite length, noted whether a work each day.38His lack of concern about
by GC&CS between mid-January and late given square was blank or contained a num- personal appearance carried over to his
March 1940.30 Results of the Polish break- ber "I," and then, according to a "table of written work as well.The paper he wrote to
throughs and the efforts of GC&CS were behavior" (program), the scanner might introduce newly hired cryptanalysts to
discussed at a meeting held in Paris early in move forward or backward, write or erase a Enigma and codebreaking (baptized "Prof's
1940. Among those in attendance was a number. The "table" identified possible con- Book" by Hut 8 staff) appears to have been
new member of the Allied cryptanalytic figurations and described what the scanner typed with an old ribbon on a dry platen.
team, Alan Mathison Turing.t' He knew was to do in every situation. Mistakes or rephrasings were typed over,
something he did not share with the Poles. This and more was eventually set down but the pages were never retyped. His first
in his paper "Computable Numbers."Turing and final draft of "Turing's Treatise on the
observed that the "behavior of the com- Enigma" are one in the same. Pages were
Alan Tur inp and Bletchley Park
puter [a human doing calculations] at any removed and new ones added without
Bletchley Park, a complex of temporary moment is determined by the symbols renumbering the whole of the work. Still,
"huts" surrounding a Victorian manor which he is observing, and his 'state of this is the only work that reveals Turing's
house, was located north of London. The mind' at that time."34 Continuing his insights into Enigma and how they led him
GC&CS was moved there in 1939. Begin- description of a human computer, he from where the Polish effort stalled to the
ning with a staff of about one hundred, it wrote: "We know the state of the system if design of the British bombe. Written in the
rapidly expanded to about eight thousand we know the sequence of symbols on the summer of 1940, it provides a detailed, sys-

Turing and Enigma 209


Prologue

tematic account of how Enigma was bro- gins to the town of Banbury, where the described the unwitting, but indispensable,
ken and his design of the British bombe.'? sheets were produced.f') Banburismus help from the enemy:
The revelations came to Turing late in required the construction of possible
The German operator to encode his
1939 while looking at the intercepts pro- wheel alphabets in order to discover the
message is given the steckers [plug-
vided by the Poles. He observed the rela- coincidence between Cipher texts, or "fits,"
board settings], wheel order and ring-
tionships between the known indicators To accomplish this, all of a given day's mes-
stellung for the day, but not the
and window starting positions for four mes- sages were sorted against each other, and
starting position. He must pick six let-
sages transmitted by the Germans on May "fits" of four or more letters were listed. "At
ters for this purpose, three for the
5,1937: the same time," Mahon continues, "mes-
starting position and three for a setting
sages were punched by hand onto Ban-
in which to encode the starting posi-
Indicator Window start buries, long strips of paper with alphabets
tion. The selection of these letters is
KFlXEWTW PCV printed vertically, so that any 2 messages
where carelessness creeps in to assist
SYLGEWUF BZV could be compared together and the num-
us in the "breaking". The operator is
JMHOUVCG MEM ber of repeats be recorded by counting the
apt to pick easy stereotyped combina-
JMFE FEVC MYK number of holes showing through both
tions, such as the first three letters on
Banburiesv'Turing developed a scoring sys-
the top and middle rows of the enigma
He observed that the "repetition of the tem of "decibans" to record "the value of
machine keyboard (QWEAST), and use
EW combined with the repetition of V sug- fltS."44The value of a ban was ten, and a
them repeatedly. One operator with a
gests that the fifth and sixth letters describe deciban was 1/10 of a ban. A ban of evi-
girl friend back in Germany by the
the third letter of the window position, and dence made "a hypothesis ten times as
name of Cillie continuously used the
Similarly one is led to believe that the first likely as it had been before."
six letters of her name. The term "Cil-
two letters of the indicator UM] represent Turing confessed, however, "I was not
lies" has come to be applied to all sorts
the first letter [M] of the window position, sure that it would work in practice, and was
of stereotyped phraseology, of which
and that the third and fourth represent the not in fact sure until some days had actually
the following are examples:
second.r'? But there were still some prob- broken.r'? The last step was to tally the
lems; i.e., there was no similar correlation score for the alphabet. The one with the "Quiet night"-used by operator in
between the second and third indicator let- highest score was tested on a "bombe." North Africa
ters and the second window starting letter, Given the scarcity of bombes and the "Wine barrels on hand"-used by
suggesting that additional manual substitu- demands made upon them by the compet- operator in Czechoslovakia
tions were being made. This manual substi- ing service organizations, Banburismus "RAF plane over airport"-used by
tution hypothesis was supported by further saved vital time and resources by reducing obliging operator in France
observations and by a fateful fluke of his- the number of wheel alphabets to be "Good morning"-used by operator
tory. tested. Mahon writes that "Banburismus in Norway."?
A U-boat with the "call sign AFA had not was a delightful intellectual game" that "was
been provided with the bigramme tables"!' eventually killed in 1943 by the rapidly The Tur itip- Welchman Bombe
of letter substitutions and was forced to increasing number of bombes which made
rely on the older system until the tables it unnecessary to spend much time and Based upon previous work by the Poles,
were supplied. From May 1 to May 4, 1940, labour in reducing the number of wheel the British bombe owes its existence to the
U-boatAFA sent enough messages to enable orders to be run: it was simpler and quicker work of Alan M. Turing and Gordon Welch-
the Grundstellung (ground setting) to be to run all wheel orders.v'? man, head of Hut 6, who oversaw the break-
discovered. The cable pluggings had been ing of German army and air force codes.
found previously. Turing wrote: Help from the Enemy Turing introduced the subject in chapter 6
of his "Treatise" under the heading "The
It was natural to assume that the
As the Poles had learned earlier, the Ger- Steckered Enigma, Bombe and Spider."
Grundstellung used by AFA was the
man Enigma operators were frequently the Invaluable as was Banburismus, manual
Grundstellung to be used with the cor-
source of cribs through bad habits, laziness, methods, Turing admitted, "are not practica-
rect method of indication, and as soon
or the press of time on high-traffic days. If ble for cases where there are many Stecker
as we noticed the two indicators men-
one knew the habits of an operator, the crib [plugboard settings], or even where there
tioned above we tried this one out and
was easily guessed. Individual operators are few Stecker and many wheel orders="
found it to be the case."
were identified through their radio fre- Turing's "bombe," an improvement over
Alan Turing also developed the concept quencies, call signs, and the serial numbers the Polish "bomba," may be thought of as a
of Banburismus, a method of obtaining the for the day.The anonymous historian of the bank of thirty-six interconnected Enigmas
middle and right hand rotor wheel alpha- 6812th Signal Security Detachment U.S. that, when set up according to a "menu"
bets. (The term "Banburismus" owed its ori- Army Europe, Bletchley Park, Hut 6, of instructions, moved synchronously

210 Fall 1997


Prologue

through all 26 x 26 x 26 = 17,576 positions Turing wrote the position number below gram using scrap paper and colored pencils
of each simulated Enigma.t? At each point, the connecting line between the letters. At and dashed over to Hut 8:
a test was applied to determine whether position 4, N encodes as D. There are two
Turing was incredulous at first, as I had
that particular rotor setting could produce closed loops (Z, Q, I, E, M, Z) and (1, E,A, I)
been, but when he had studied my dia-
the observed crib. To clarify the approach, where the cycles of letters repeats; i.e., after
gram he agreed that the idea would
he provided the following example: the "M"in the cycle Z, Q, I, E, M,"M" encodes
work, and became as excited about it
as "Z," and the cycle
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 192021 22 23 24 25
as I was. He agreed that the improve-
repeats. A menu would
DAEDAQOZSIQMMKB I LGMPWHA I V ment over the type of bombe that he
KEINEZUSAE TZ E Z MVOR B E RI QT later be further anno-
had been considering was spectacu-
tated along the lines to
lar.52
The numbers 1-25 refer to the successive indicate hypothesized starting rotor set-
Enigma positions "at which the letters of tings; e.g., IEM, where the first of the three The diagram was passed along to Harold
the plain text were encoded." The Enigma letters is the assumed window starting "Doc" Keen, of the British Tabulating
position was dependent, in turn, upon the position of the left-hand wheel, the second Machine Company at Letchworth, for inclu-
positions of the three wheels. 50 letter, "E,"of the middle wheel, and the third sion in the bombe. The Turing-Welchman
Turing noted that "the method of solu- letter, "M," the right-hand wheel. These Bombe design served as the basis for the
tion will depend on taking hypotheses drawings, accompanied by directions for American bombes later produced by the
about parts of the keys and drawing what wheel selection, order, ring setting, and U.S. Army and U.S. Navy in 1943. Some of
conclusions one can, hoping to get either a wheel starting positions were given to the the these bombes may have been sent to
confirmation or a contradiction." The Wrens (Women's Reserve Naval Service) in BIetchley Park, where they received such
"parts" to be included in the "key" were Hut 11 for testing on the bombes, or to fol- nicknames as "Rochester" and "Atlanta".
"wheel order, the rod start of the crib, low Turing's analogy, the "spider." His actual
whether there are any turnovers in the crib nickname for the first bombe was Agnus
Breakitu; Hitler's Teleprinter Network
and if so where, and the Stecker." For the Dei, which others, less gifted linguistically,
purpose of his example, it was assumed shortened to "Agnes." In mid-1941, British radio operators
that the right-hand wheel remained in the The defect of Turing's original design began hearing a brisk musical rhythm quite
same position and that a wheel turnover was that it depended upon the identifica- unlike the usual non-Morse enciphered
would occur somewhere between posi- tion of closed loops and did not take advan- transmissions. 53 These were picked up "on
tions twenty and twenty-five. He began by tage of nonloop associations that might be a German Army link between Vienna and
trying to determine "characteristics of the found. Gordon Welchman, working inde- Athens which used a machine later named
crib which are independent of the Stecker." pendently in a converted school on the 'Tunny' by GC and CS." These new mes-
These characteristics were represented pic- grounds of BIetchley Park, solved these sages were encrypted using the Lorenz
torially in what was called a "web" or problems with his Diagonal Board. It SZ42 cipher machine.
"menu.'>' Beginning with position 1, the allowed for the testing and elimination of The Germans began experimenting with
menu and the table state that pressing all possible plugboard settings for the given unenciphered non-Morse teleprinter mes-
Enigma key K encodes that letter as D. positions in one pass. He sketched out a dia- sages as early as 1932. By the latter half of

,:,)''''It'''
I
I-~-"'-O

R-J~ rl

ABOVE Turing improved upon the Polish "bomba" by formulating


tests to overcome seueral problems including the many Stecker
(Plugs), wheel orders, and wheel (rotor) turnovers. His sketch of a
"web" or "menu" was designed to isolate the settings that might
produce the "characteristics of the crib" or assumed plain text.
RIGHT: The American military replicated and refined the British
bombe designs in 1943. These machines, located in Bletchley Park,
were given names such as "Rochester"and "Atlanta".

Turing and Enigma 211


Prologue

2,4 SECRET Whiting (Konigsberg- alphabet consisted of 32 characters, includ-


Riga),Turbot (Copen- ing six special codes indicating carriage
hagen), and Perch returns, spaces, shifts to upper or lower
(Konigsberg-Dvinakj.P case, new line starts, line feeds, or simply
Call signs were as- "nothing," represented by "I". The acronym
signed to the various NARA would be punched as follows, with
cities and armies: e.g., "0" representing hole punches and "" the
Berlin (HBL), Konigs- absence of a punched hole, or a space:
berg (HKB), Ober-
N A RA (plaintext)
fehlshaber West or
Paris (HMEX), Army o 0
Group B (HBIX), and 000
Fifth Panzer Army o
(HLEX). Fuhrer HQ o 0
used ANNA when in
Berlin or Rastenburg
but might use WFST To encipher these letters, Tunny manu-
when elsewhere. 56 factured "a stream of letters which we will
Though a separate call key, and second, it adds them succes-
network, "Sturgeon," sively to the plain text" using Modulo 2
was set up using the addition. Modulo 2 addition followed
Siemens T52 tele- these basic rules:
printer for German
L + (no perforation)
air force traffic,
~ ---- ". -~ ;: 2. 0 + 0 (no perforation)
~/-~ , , -. GC&CS decided to
.. .' ,"
concentrate on Tunny.
3. + 0 o (a perforation)
~- STATION HOSE IN BERLIN, _. 4. o + o (a perforation)
---STATION ANNo/BU IN BERLIN: ~ By 1944 Thnny's net-
LINKS NOT IN BERLIN . ..:
PRIOR 24 AUG. 1944
work had two cen- Adding the letters D, F,X, B (our key), we
ters:"Straussberg near obtain the ciphertext as follows:
The Germans' use of the new Lorenz 5Z42 cipher machine in 1942 Berlin as the termi-
expanded the quantity and flow of non-Morse messages. The British Plaintext + Key Ciphertext
nus for western sta-
charted the new German "Fish"network; the Berlin-Paris link, for exam- N (.00) D (0 ..0) S (0.0.)
ple, was 'Jellyfish." tions and Konigsberg
A (00 ...) F (0.00.) C (.000)
as the terminus for
R (.0.0) X (0.000) Q (000.0)
1940, the first enciphered non-Morse mes- eastern stations," with twenty-six links in
A (00 ...) B (0..00) G(.0.00)
sages were being intercepted. This traffic alL To intercept the growing number of
was termed "Fish" by GC&CS "on the transmissions, a new British radio intercept Thnny's eleven wheels performed this addi-
strength of an Enigma reference to the fact station was established late in 1942 at tion as the operator typed in the message.
that one non-Morse encyphered system, Knockholt, about fifteen miles southeast of To derive the plain from the ciphertext, it is
properly named Geheimschreiber, was London. Staff there grew to about six hun- necessary to subtract the key from the
being called 'Sagfisch," For the moment, dred as links and the lengths of transmis- ciphertext.
these new messages arrived only intermit- sions increased. While Enigma messages The German operator's procedure was
tently As the use of Tunny proliferated dur- were usually kept to below 250 words, Fish somewhat simpler than that of the
ing 1942 and new communications links messages could run into several hundred; at Enigma's operator, though they shared
were established, additional Fish names least one ran to sixty thousand! Hence, the some things in common. Both machines
were given to these links. "Shark" denoted need for a large number of staff employed wheels to encipher the message,
the U-boat traffic link.54 Over this network The Lorenz SZ42 was an online "auto- but Thnny used eleven to Enigma's three or
passed strategic information between matic ciphering machine resembling a tele- four. The output of a message enciphered
Hitler's headquarters and those of his gen- type" that "enciphers at one end of a circuit on Enigma was afterward handed to a radio
erals and between the generals themselves. and deciphers at the other automatically, operator for transmission in Morse code;
"Jellyfish" was the code name given to the using the 'Baudot alphabet.">? Its output Tunny enciphered online as the operator
link with Paris. "Squid" and "Stickleback" was directed to a perforated paper tape, typed the message. Both used codebooks.
were links to commands in the Ukraine. about an inch wide, and consisted of The Tunny operator first alerted the re-
"Bream" connected Berlin to Rome. Other groups of five perforation or nonperfora- ceiver that a message was about to be sent.
connections were "Tarpon" (Bucharest), tion encodings of the Baudot alphabet. The This was followed by a second message

212 Fall 1997


Prologue

telling where the setting was to be found in Robinson compared two to four tapes read from a loop of 5-level paper tape,
the codebook; e.g., QEP 35 meant to use simultaneously. To fmd a crib, only two Colossus generated data electronically'<'
the setting at line 35.The receiver set up his tapes were required, "one with the crib, and Tony Sale, curator of the Bletchley Park
machine according to the same settings and the other with the cipher text." For a longer Museum, explained how Colossus operated
flashed back UMUM, ready to receive and run, three tapes were compared: the cipher during a 1996 lecture at the National
transmission began. Another code indicated text, key, and plaintext. The machine uti- Archives:
end of transmission. Daily machine setting lized continuously looping tapes, standard
What Colossus does, in a nutshell, is to
changes could occur at any time during the telephone plugs, plugboard, and photo-
generate the key streams-that is, the
day.58 cells.Though a vast improvement over man-
sequence of symbols on the wheels of
ual methods, Heath-Robinson was slow and
No cipher text is ever repeated. If the Lorenz machine-internally in its
required great care in getting the lengths of
something does not get through per- electronic circuits. It reads the inter-
tape in the loops precisely correct before
fectly, the plain [text] is repeated, but cepted message tape at 5,000 charac-
the run.62
the cipher continues, and, as a cipher, ters a second, comparing the tape of
Prime Minister Winston Churchill gave
is uninterrupted. When a transmission the intercepted enciphered text with
the Fish program highest priority in his
is completed and has been receipted these internally represented key
instructions of February 1943.While Heath-
for, it is finished, and as a cipher does streams. Then, making some very
Robinson continued to be used and
not exist to the Germans. There is no sophisticated cross-correlations, it
improved upon, attention shifted to design-
record of cipher text.t? fmds the start-wheel positions for the
ing and constructing "a faster and more
particular enciphered message.v'
British radio operators received German flexible machine."This was to be Colossus,
signals primarily at Knockholt. There a the foundation of the postwar British com- Colossus used twenty-five hundred valves
watch of twenty-four operators monitored puter design and development program. It (vacuum tubes) to generate and store the
the network links. Their equipment con- viewed tape four times as fast as Heath- key stream, which was then compared with
sisted of "two radio receivers which oper- Robinson and executed "five operations the five-hole punched tape input. Its output
ate a tape printer, a tape perforator, and an simultaneously, gaining a factor of 20" over was the wheel setting used by the Lorenz
undulator tape [that recorded holes and the former machine. Both machines exam- operator for a given message. These settings
spaces], as well as head phones." Following ined binary data (the presence or absence were then used on a Tunny machine to
interception, a Red Form (Wirelessffelegra- of perforations), "but whereas Robinson decipher the message. The first Colossus
phy) with printed tape attached, perforated
tape, and undulator tape were forwarded to
the checkers for comparison. A manual
comparison of the undulator and printed
Red Form tape was made. If a discrepancy
were noted, the perforated tape was cor-
rected. When a corrected tape was made, it
was transmitted to Bletchley Park over
duplicate multiplex cables. About fifty peo-
ple were involved in the checking of these
tapes. Once at BletcWey Park, the tapes
were turned over to Newmanry, the branch
named after M.H.A. (Max) Newman, for
deciphering. 60
A special Fish section was established in
July 1942 to deal with these non-Morse
transmissions. Their task was to discover
"the details of the wheels and the setting
letters." But once these were known,
decryption was still an exhausting process
when done manually. The initial step was to
mechanize the process. A research team
studied the problem and concluded in
December 1942 that high-speed machines
American liaison officers were first assigned to Bletchley Park in May 1942. The spacious grounds,
were needed. The first of these, Heath- located fifty miles from London, housed many cryptographic units. The officers'sensitive knowledge
Robinson, was ready in May 194361 Heath- kept most of them there through the war.

Turing and Enigma 213


Prologue

became available in December 1943. By D 1944, "the meeting or supplying of U-Boats mation about the enemy was fre-
day, there were ten. was on 3 occasions interrupted by enemy quently treated as interesting rather
When the tactical intelligence provided action."Three vessels were lost! A high-level than valuable. Of course this attitude
by Enigma was combined with the top- meeting was held on February 26, 1944, to varied according to the commander.
secret strategic knowledge gleaned from consider the question, "Did the enemy read Yet the story of the short but drasti-
Colossus and Tunny, the intelligence thus our signals as a result of cryptographic cally successful battle of Alam Haifa
provided a formidable weapon in Allied work?" The investigating committee con- [August 30-September 6, 1942] may
hands. From this Ultra intelligence, Field cluded: point the moral best. "The brave but
Marshal Bernard Montgomery and Gen. battled Eighth Army" was holding an
As from the above arguments, reading
Dwight Eisenhower learned that their D improvised line at El Alamein. A new
the traffic, whether by cryptography
day deception had convinced Hitler that commander arrived in the desert. It
or capture [of Enigma machines or
Calais was the target of the coming inva- became obvious from Ultra that Rom-
codebooks], is shown to be out of the
sion. mel intended his [mal drive to Alexan-
question, only two possibilities
dria in the full moon of August by a
remain: Treachery or discovery by
sweep through the Southern flank The
In TechnoloBY They Trusted enemy aerial reconnaissance.v"
Army Commander accepted the evi-
Given the complexity of Enigma and the Despite the use of the sophisticated dence and made his arrangements.
Lorenz SZ42 machines, it is easy to under- Enigma machine, Germany's security was, Believing that the confidence of his
stand German faith in the impregnability of in the end, dependent upon relatively unso- men was the prerequisite of victory, he
their cipher machines. T4g. Walter Jacobs, phisticated cipher clerks and teleprinter told them with remarkable assurance
Army Signal Corps, then stationed at BIetch- operators. The detailed manual work of how the enemy was going to be
ley Park, wrote this tribute to those who enciphering messages had been shifted to defeated. The enemy attack was
broke Tunny: flawed machines operated by fallible delayed and the usual jokes were made
humans-a lethal combination for the about the "crystal-gazers.rA day or two
The solution of Tunny traffic is one of
Reich. later everything happened according
the great achievements of cryptanaly-
to plan.The morale emerging from the
sis. That a system of such high grade
promise so positively fulfilled formed
and trusted to such a degree by the The Triumph oJTechnoloBY Over
the psychological background condi-
Germans, could be read in any appre- lntellipeoce: "The Dancer oj Ultra"
tioning the victory which was to fol-
ciable amount would be remarkable;
low. Thereafter Intelligence came into
but much more than this has been The British triumphed technologically
its own.69
accompJished.A complete and general over the German cipher machines, but did
solution has been found, and a consid- the work of these clandestine warriors
Ultra also provided information about
erable volume of traffic is read cur- make a difference? Did their achievements
the location of German Wolf Packs, allow-
rently [April 14, 1945]. In March, 1945, affect the outcome of the war? Of even a
ing convoys to avoid them and Allied air-
upwards of five million letters of cur- battle? In his appreciation of the code-
craft to hunt them down. According to
rent transmission, containing intelli- breakers' accomplishments, Brig. E. T.
Humphreys, "Air reconnaissance for a ship
gence of the highest order, was Williams, Chief Intelligence Officer to Field
or convoy known to be on passage from 'U'
declphered.P Marshal Montgomery, wrote "that very few
sources was not laid on in specific terms of
Armies ever went to battle better informed
The trust of the Germans in their tech- a search for such movement," which might
of their enerny'"? Gen. Sir Claude Auchin-
nology is, perhaps, best reflected in one of have revealed the source of the intelli-
leek, Commander-in-Chief Middle East,
their own investigation reports. In 1943 the gence. Rather, air reconnaissance "sorties
"expressed the opinion that, had we not
Supreme Command Armed Forces (GIS) were organized with cross-over points
had the 'U' [Ultra] service, Rommel would
received this startling message through its allowing for particularly full cover of cru-
certainly have got through to Cairo.,,68 An
Swiss office: cial areas"?"
example of the importance of Ultra intelli-
During the D day preparations, Brig. E. T.
For some months, German Naval codes gence to Montgomery is provided by
Williams remarked that Ultra "was the only
giving orders to operational U-Boats Brigadier Williams:
source revealing the enemy's reactions to a
have been successfully broken. All
What we should have done without it cover plan. Without Ultra we should never
orders are read currently. Note. The
is idle to linger over, yet it must be have known:' He offers the example of
source is a Swiss American in an
made quite clear that Ultra and Ultra Operation Fortitude (the Pas de Calais
important secretarial position in the
only put Intelligence on the map .... cover plan), noting "that without Ultra con-
U.S. Navy Department.
From 1939 to 1942 Intelligence was firmation that it was selling, the plan might
Between mid-January and mid-February the Cinderella of the Staff and infor- have been dropped."?'

214 Fall 1997


Prologue

Despite these achievements, Williams prisoners of war and the like must, in were disobeyed, allowing Allied codebreak-
cautioned that it was very easy to be spite of ULTRA,still remain the surest ers to break Enigma and Allied commanders
seduced by the power of Ultra and lulled guide to enemy intent for Comman- to alter the course of battle.
into either complacency or total reliance ders in the field. In this case, weather Both the Allies and the Germans were
upon it. In his analysis of Ultra's contribu- and the Siegfried Line, and not lack of seduced by the power and the promise of
tion, he wrote: effort, were presumably to blame.?" their machines, which blinded them to the
dangers of dependence upon them and to
It should not be necessary to stress the
In the war of intelligence technologies, the fallibility of the mortals who operated
value of the material in shaping the
both the Germans and the Allies fell under them. They were the first to deal with the
general Intelligence of the war. Yet it
the spell of their machines. If the Allies implications of mechanizing the once
should be emphasized from the outset
were guilty of placing uncritical faith in entirely manual tasks of enciphering and
that the material was dangerously valu-
their new oracle, the Germans no less erred deciphering coded messages. The complex-
able not only because we might lose it
in placing their trust in the invincibility of ity and cognitive demands of the code-
but also because it seemed the answer
Enigma and the infallibility of its operators. breakers' work grew so demanding that
to an Intelligence Officer's prayer. Yet
As early as 1940, German cipher clerks they contributed in large measure to the
by providing this answer it was liable
were commanded to LIsea different Grund- development of the computer, the realiza-
to save the recipient from doing Intel-
stellung (ground setting) "for every mes- tion of Alan Turing's "universal machine,"
ligence. Instead of being the best, it
sage." They were also warned that "a single special machine" that could "be
tended to become the only, source.
made to do the work of all!'76
There was a tendency at all times to Using any of the following for Grund-
await the next message and, often, to stellung and Message Cipher is forbid-
be fascinated by the authenticity of the den: any letter three times, words, Alan Tur in q, Mind, and Universal
information into failing to think abbreviations, traffic signs, call signs, Machine
whether it was significant at the par- letters in alphabetical order or in order
Alan Turing never wrote directly about
ticular level at which it was being con- of the Enigma key-board."
his wartime service, but he did work on
sidered.F
And, yet, as we saw earlier, these orders Britain's Automatic Computing Engine
The Battle of the Bulge [December 16,
1944-]anuary 16, 1945) was a glaring case
in point: "On the Ardennes offensive," he
wrote, "we were wrong. We argued the
point in early December and decided
wrongly. We gave a lead but the wrong
lead." The fault did not lie with Ultra "but
rather in our attitude to the [Bletchley)
Park. We had begun to lean: that was the
danger of Ultra."73
He was not alone in this assessment of
our intelligence failure. In response to a
request from Maj. Gen. Clayton Bissell, a
special report entitled "Indications of Ger-
man [Ardennes) Offensive" was prepared.
In a summary, the following points were
made:

Almost all evidence from ULTRA


sources of military and air prepara-
tions could have been interpreted
either as:

(I) offensive nature, or


(II) defensive plus building up of cen-
tral reserve to restore situation.

Tactical reconnaissance, active pa- US.Army bombes, built in 1943, were modeled after the Turing-Welchman machine. Nearly six feet
tall, they were motor driven and had thirty-six interconnected Enigmas with three rotors each.
trolling, capture for interrogation of Advancements in macbine intelligence, bowever, created the danger of overreliance on such sources.

Turing and Enigma 215


Prologue

(ACE) after the war. He also continued to tion by the machine can be defined instruction table."
write about the "universal machine." In his fairly specifically. They are those prob-
Following his previous ask-the-expert
landmark essay "Computing Machinery and lems which can be solved by human
suggestion, he describes a chess game
Intelligence" (1950), Turing raised "the clerical labour, working to fixed rules,
based upon "an introspective analysis of my
question as to how far it is possible in prin- and without understanding.s"
thought processes when playing" (an
ciple for a computing machine to simulate
His concern was with very well struc- unfortunate choice, as he was not consid-
human activities," i.e., "Can machines
tured, rule-governed domains such as ered a strong player by the chess masters of
think?" Initially dismissing the question as
chess, poker, bridge, theorem proving, and Bletchley Park). In this game, the machine
"too meaningless to discuss," Turing then
cryptography. plays white, and some of the moves are
went on to rephrase the question in
The essay "Intelligent Machinery" (1948) annotated by footnotes (e.g., "Most inap-
machine terms and ask: "Are there discrete
was totally devoted to "ways in which propriate moves." "Head in the sand!" "Fid-
state machines" that could fool a human
machinery might be made to show intelli- dling while Rome burns!"). The machine
into thinking that he or she was communi-
gent behavior" and the "analogy with the "resigns" at the thirtieth move "on the
cating with another human rather than a
human brain." Specifically, he argued an advice of his trainer.,,86 Turing once fol-
machiner"? This is the central question of
analogy to be drawn between his "idea of lowed the program's move rules in a hand-
his "imitation game," which in his words
an unorganized machine" and "the infant and-paper computer simulation and played
asks: "Could one make a machine which
human cortex." By "unorganized machine," and lost against a friend.
would answer questions put to it, in such a
he meant one created "in a comparatively Amazingly, Turing anticipated much of
way that it would not be possible to distin-
unsystematic way from some kind of stan- the research program taken up by the new
guish its answers from those of a man?" His
dard componenrs.<' fields of artificial intelligence and cognitive
answer:"I believe SO."78
He defined "discrete
In his famous essay "Computing Machin- science that appeared in the 1950s. His
state machines" as those "machines which
ery and Intelligence," published in the phi- postwar writings touch upon the basic
move by sudden jumps or clicks from one
losophy journal MIND, brain (hardware) analogy of mind to machine states, com-
quite definite state to another+Turing then
and mind (software) became indistinguish- puter simulations of intelligent behavior,
continued what could easily be a veiled ref-
able: "In considering the functions of the chess-playing programs, rules derived from
erence to Enigma:
mind or the brain we find certain opera- experts and coded into programs, and the
As an example of a discrete state tions which we can explain in purely brainware :hardware ::mindware:software
machine we might consider a wheel mechanical terms.,,82 Turing takes up the analogy. Underlying these provocative
which clicks round through 120 central problem of writing a program that thoughts were his Bletchley Park experi-
[degrees] once a second, but may be could play the "imitation game" and clearly ences with the extension of human func-
stopped by a lever which can be oper- states the program's goal as "trying to tions by machines, discrete state machines
ated from outside; in addition a lamp is imitate an adult human mind."83 This goal that, like their human counterparts, might
to light in one of the positions of the is quickly modified to simulating a "child- be imitated by a "universal machine."
wheel. This machine could be brain" through programming a "child- World War II witnessed the mechaniza-
described as follows. The internal state machine." The behaviorist reward- tion of intelligence. Machines took over the
of the machine (which is described by punishment model of instruction is des- labors of weary German cipher creators
the position of the wheel) may be ql, cribed, but he seems to have become more and those of Allied codebreakers. The
q2 or q3.There is an input signal iO or sympathetic toward the student. He goes transfer of these burdensome functions
i1 (position of lever).The internal state on to describe the "child-machine" as a "sys- occurred with no greater sense of loss than
at any moment is determined by the tem of logical inference" capable of receiv- the delegation of basic arithmetic compu-
last state and input signal according to ing an instruction such as "Do your tations to the calculator, no feelings of
the table [not shown here] .. This homework now," then establishing and threat or regret. Yet a line was being drawn
example is typical of discrete state ordering goals requisite to carrying it out. 84 between human and machine intelligence.
machines. They can be described by At the heart of the system would be various Without awareness of it, how could we
such tables provided they have only a propositions or rules to be followed in dif- know where it was or when we had
fmite number of possible states."? ferent situations. crossed it? Was it as near as we feared or as
Rules and propositions presumably were distant as we dreamed? If a machine could
States of mind became analogous to the
to come from an expert. He wrote: be said to be thinking, what were the im-
states of the machines he worked with at
plications for how we viewed human intel-
Bletchley Park-a rather startling idea at If one wants to make a machine mimic
ligence? Alan Turing raised these still dis-
first, perhaps, but Turing hedged his bets by the behavior of the human computer
turbing and unanswered questions .•
narrowing the focus of machine simulation: in some complex operation one has to
ask him how it is done, and then
The class of problems capable of solu- translate the answer into the form of an

216 Fall 1997


Prologue

N 0 e s
1 Andrew Hodges,Alan Turing: The Enigma (J 983), p. 109. 97, RG 457, NARA.
'David Kalm,Seizing the Enigma: The Race to Break: tbe German U-Boat 49Welchman, The Hut 6 Story, p. 297.
Codes, 1939-1943(991), pp. 38-39. 50 Ibid., p.78.
3 Ibid., pp. 32-33. 51"Turing's Treatise on the Enigma," pp. 97-99, RG 457, NARA.
4 Ibid., p. 33. 52Welchman, The Hut 6 Story, p. 81.
5 Ibid., pp. 33-34. 53 "Report on British Attack on Fish," p. 12, box 579, NR 1407, Historic
6 Ibid., pp, 41-43. Cryptographic Collection, Pre-World War I Through World War II, ca.
7 Ibid., p. 51. 1891-ca. 1981, RG 457, NARA.
8 German w\VII Police and SS Traffic file, NR 4417, box 1386, Historic 54 [Francis Harry Hinsley?], "Draft Appendix to History of British Intelli-
Cryptographic Collection, Pre-World War I Through World War II, ca. gence in World War U;' pp. 1-2 (hereinafter referred to as Hinsley.Appendix
1891-ca. 1981, Records of the National Security Agency/Central Security Ser- Geheimschreiber [Fish]), box 1315, NR 3938, Historic Cryptographic Collec-
vice, Record Group 457, National Archives and RecordsAdministration,Wash- tion, Pre- World War I Through World War II, ca. 1891-ca. 1981, RG 457, NARA.
ington, DC (hereinafter cited as RG 457, NARA). 55 "FISH Weekly Report Period 6th-13th August 1943;' box 174, NR 803,
9 Daniel Jonah Goldhagen, Hitler's IVilling Executioners: Ordinary Ger- Historic Cryptographic Collection, Pre-World War I Through World War Il, ca.
mans and the Holocaust (1996), pp. 181-182. 1891-ca. 1981, RG 457, NARA.
\0 Army Machine Cipher/Areas for Use of Air Force Command Ciphers 56 "Germany: otes on the German Army Teleprinter Network," PI'. 2-3,
(German); NR 20, box 2, RG 457, NARA.Alan Stripp, "The Enigma Machine: Its box 1338, NR 4030, Historic Cryptographic Collection, Pre-World War I
Mechanism and Use," F H. Hinsley and Alan Strip, eds., Codebreaeers The Through World War II, ca. 1891-ca. 1981, RG 457, NARA.
Imide Story of Bletchley Pare (1993), p. 87. 57 "Report on British Attack on Fish;' p. 1, box 579, NR 1407, RG 457,
11 German WWII Police and SSTraffic file, NR 4417, box 1386, Historic NARA.
Cryptographic Collection, Pre-World War I Through World War II, ca. 58 Ibid., pp.12-13.
1891-ca. 1981, RG 457, NARA. 59 Ibid., p. 13.
iz Gordon Welchman, The Hut 6 Story: Breaking the Enigma Codes 60 Ibid., pp. 17-18.
(1982), pp. 149-151. 61 Hinsley, Appendix Geheimschreiber (Fish), p. 3, RG 457, NARA.
13 F. H. Hinsley, et. aI., British Intelligence in tbe Second World IVaI': Its 62 "Report on British Attack on Fish;' p. 47, box 579, NR 1407, RG 457,
Influence on Strategy and Operations, vol. 1 (1979), p. 487. ARA.
14 Marian Rejewski, "How the Polish Mathematicians Broke Enigma," in 63 Hinsley.Appendix Geheimschreiber (Fish), p. 3, RG 457, NARA.
Wladyslaw Kozaczuk, ENIGMA: How the Getman Machine Cipher Was Bro- 64Tony Sale quoted in john CornweU,''The Secret That BeatThe Nazis;' Tbe
ken and How It IV£:IS Read by tbe Allies in IVo,'ld War Two (1984), pp. Sunday Times Magazine (May 12, 1996), p. 41.
246-247.
65 "The Cryptanalysis of the 1\1I1ny Cipher Device Preface" attachment to
15 Ibid pp.255-256.
"Report of Sgt. Walter jacobs to Commanding Officer Signal Security Agency;'
16 Ibid:: pp.262-264.
May 7, 1945, p. 1, box 943, NR 2750, Historic Cryptographic Collection,
17 Ibid pp.264-265.
Pre-World War I Through World War II, ca. 1891-ca. 1981, RG 457, NARA.
18 Ibid:: pp.265-266.
66 Extracts from Strategic Security-Naval ENIGMA, Naval War Staff, Chief
19Ibid., pp.266-267.
Naval Communications Division la 10. Supreme Command of the German
20 Kahn,Seizing tbe Enigma,
p. 73. Navy, Berlin, Sept. 30, 1941-Feb. 24[6], 1943[4], R 908, box 192, NR 4246,
21 Rejewski, "How the Polish
Mathematicians Broke Enigma," p. 267. box 1364, Historic Cryptographic Collection, Pre-World War 1Through World
22 Kahn,Seizing the Enigma,
p. 74. War n, ca. 1891-ca. 1981, RG 457, NARA.
23 Rejewski, "How the Polish
Mathematicians Broke Enigma;' p. 268. 67 E. T. Williams, "Volume, Security, Use and Dissemination of SIGINT at
24 Ibid., pp. 268-269.
British Field Commands;' p. 15 in Brig. Williams and Grp. Capt. Humphreys
25 Hinsley, British Intelligence, vol. 1, p. 491. Reports Concerning Ultra, box 1424, NR 4686, Historic Cryptographic Col-
26 Memorandum from Lt. Col. Telford Taylor, GSC, to Colonels [Carter Wj lection, Pre-World War I Through World War lJ, ca. 1891-ca. 1981, RG 457,
Clarke and [W Preston] Corderman, Jan. 22, 1944, NR 4246, box 1364, His- NARA.
toric Cryptographic Collection, Pre-World War I Through World War II, ca. 68 Grp. Capt. R. H. Humphreys, "The Use of 'U' in the Mediterranean and
1891-ca. 1981, RG 457, NARA (hereinafter cited as "Early 'E' History"). Northwest African Theaters of War-October 1945,p. 7 in Brig.Williams and
27 Ibid. Grp. Capt. Humphreys Reports Concerning Ultra, box 1424, NR 4686, His-
28 Hinsley, British Intelligence, vol. 1, p. 492. toric Cryptographic CoUection, Pre-World War I Through World War II, ca.
29 Kahn, Seizing tbe Enigma, p. 91. 1891-ca. 1981, RG 457, NARA.
30 Ibid., pp. 91-92; Hinsley, British Intelligence, vol. 1, pp. 108,493. 69 Williams, "Volume, Security, Use and Dissemination of SIGINT," p. 3.
31"Early 'E' History," RG 457, NARA; Kozaczuk,ENIGMA, pp. 97-98. 70 Ibid., p. 2.
32A. P Mahon, History of Hut Eight, 1939-1945, p. 14; NR 4685, box 1424, 71 Ibid., 1'.13
Historic Cryptographic Collection, Pre- World War !Through World War II, ca. 72 Ibid., p. 1.
1891-ca. 1981, RG 457, NARA. 73 Ibid., p. 13.
33 Hodges, Alan Turing: Tbe Enigma, p. 96. 74 Memorandum from Col. H. M. O'Connor, G.S., to Maj.-Gen. Clayton Bis-
34 Ibid., p. 105. sell, GSC A.C. of S., G-2 (Jan. 13, 1945), box 1119, NR 3601, Historic Crypto-
35 Ibid. graphic Collection, Pre-World War I Through World War II, ca. 1891-<:a. 1981,
36 Ibid., p. 106. RG 457, NARA.
37 Mahon, History of Hut Eight, p. 14. 75 Tbe Enigma General Procedure, p. 24, box 622, NR 1679, Historic Cryp-
38 Hodges,Alan Turing: Tbe Enigma, pp.208-209. tographic Collection, Pre-World War I Through World War II, ca. 1891-ca.
39 Mahon, History of Hut Eight, p. 14. 1981, RG 457, NARA.
40 [Alan M.Turing],"Turing'sTreatise on the Enigma,"pp.135-137,NR 964, 76 Turing, "Lecture to the London Mathematical Society on 20 February
box 201, Historic Cryptographic Collection, Pre-World War I Through World 1947," in Collected Works of A. M. Turing, Mechanical Intelligence, ed. D. C.
War II, ca. 1891-ca. 1981, RG 457, NARA. Ince (1992), p. 93.
41 Ibid. 77Turing, "Computing Machinery and Intelligence;' in Collected Works, p.
42 Ibid. 142.
43 Hodges, Alan Turing: Tbe Enigma, 78Turing,"Digital Computers Applied to Games;' in Collected Works, p. 164.
pp. 196-197. 79 Turing, "Computing Machinery and
44 Mahon, History of Hut Eigbt, pp. Related Web Sites Intelligence," pp. 139-140.
17-19. 8OTuring,"Proposal for Development in
45 Ibid., p. 14. Blerchley Park-Britain's Best Kept Secret the Mathematics Division of an Automatic
46 Ibid., p. 20. Computing Engine (ACE)," in Collected
• http://www.cranfield.ac.uk/ccc/BPark

47 European Theater of Operations Works,pp.19-20.


6812th Signal Security Detachment U.S. Alan Turing Home Page
81 Turing, "Intelligent Machinery," in
Army Europe, Blerchley Park HUT#6 http://www.wadham.ox.ac.uk/-ahodges(furing.html
Collected IVorks, p. 113.
Decoding of German Enigma Machine 82 Turing, "Computing Machinery and
Messages, Feb.l, 1944-May 7, 1945, p. 3, Enigma Simulation Programs
Intelligence," p. 154.
NR 964, box 201, Historic Cryptographic ftp.y/ftp.ox.ac.uk/pub/crypto
83 Ibid., p. 155.
Collection, Pre-World War I Through 84 Ibid., p. 157.
Index to NSA Collection (RG 457) used for this paper
World War II, ca. 1891-ca. 1981, RG 457, 85 Ibid., p. 138.
NARA. http://www.nsa.gov:8080/programs/opendoor/narafmdaid.html S6 Turing, "Digital Computers Applied
48 "Turing's Treatise on the Enigma," p. to Games," PI'. 168-169.

Turing and Enigma 217

Das könnte Ihnen auch gefallen