Nazi Codebreaking Documentary 147
sharv writes "Fans of Neal Stephenson's "Cryptonomicon" might be interested in tonight's (9 Nov) episode of Nova on PBS. The episode is entitled Decoding Nazi Secrets and will feature the Enigma, Dr. Turing, and "meticulous period reenactments shot inside the original buildings at Station X, including recreations of the world's first computing devices that aided codebreakers". Sounds like a popcorn event to me! " Of course, for those in the States, check your PBS listing for showtimes.
Colossus (Score:2)
That was one of the high points of my professional career.
David Kahn - The Codebreakers (Score:1)
David Kahn's "The Codebreakers". It seems to
me that it was considered a significant work,
at one time, but I haven't heard it mentioned
for a while.
Is this on In Aus? (Score:1)
Just finished Cryptonomicon (Score:2)
Beware Ice Weasels, I'm In A Red Penguin Frenzy (Score:1)
Re:Colossus (Score:1)
As well, isn't their software that allows a person to simulate a working Enigma machine? Of course, the version I am thinking of is for Windows...
bbc (Score:2)
Incidentally, for a good explanation of how enigma et al really worked, Simon Singh's 'The Code Book' is a good read.
Cryptography from today (Score:2)
Re:I wonder... (Score:1)
the secret message is... (Score:1)
--
Please capture and post on alt.binaries.mpeg (Score:1)
Re:Colossus (Score:1)
james
Enigma Emulators (Score:2)
http://www.izzy.net/~ian/enigma/a pplet/index.html [izzy.net]
Two excellent emulators that show how the Enigma machine works. The first allows you to alter the machine settings, but it is not possible to track the electrical path through the scramblers. The latter has only one setting, but has a second window that shows the scramblers moving and the subsequent effect on the electrical path.
If you're interested, for further reading check The Code Book [amazon.com] (recently reviewed here on SlashDot [slashdot.org]), Alan Turing: The Enigma [amazon.com], and the out-of-print Seizing the Enigma [amazon.com].
---------
Question: How do I leverage the power of the internet?
Re:Colossus (Score:2)
Actually (don't you hate replies that begin with "actually?"), Polish intelligence were decades ahead of English intelligence (Room 40 during WW1, GSCS later) and made significant steps toward breaking one of the keys for a very early version of Enigma (a 3-rotor machine). The keys and the machines were changed regularly, however, and the work of the Poles offered little towards Turing (and others') efforts at Bletchley Park (GSCS) toward decrypting Enigma messages. Turing's methods depended heavily upon selecting individual encrypted words from Enigma messages, guessing what they were, and running the Bombes through (at a rate of 20 operations per second) the possible positions of the Enigma machine until finding one that could generate the corresponding guessed word, and then checking to see if, when set to that position, the machine could decrypt the rest of the message into anything intelligible. Upon the addition of more rotors to the Enigma, Turing made use of modern telephone switching technology to create a machine that could perform logical operations using electrical (not mechanical) states. A significant leap (and one which brought him closer to his long-dreamt-of Universal Turing Machine, a machine which, given certain elementary logic, could solve any solvable problem (Godel had already shown that not all problems were solvable). And so on...
FYI - How to check PBS schedule in your area (Score:4)
http://www.pbs.org/whatson/locallisting s.html [pbs.org]
Getcherown Enigma (Score:1)
Yep!
Re:Getcherown Enigma (Score:1)
_________
Sometimes, when I'm feelin' bored, I like to take a necrotic equine and assault it physically.
Paper on the effect of the cracking of Enigma (Score:3)
Throughout the first half of World War II, Allied forces were struggling with a powerful, invisible foe known only as Enigma. Enigma was a device with lots of wiring and electromechanical rotors that was no larger than a television set. The intrigue and danger of Enigma was that is was a device that belonged exclusively to the Germans. The Germans used the Enigma's capability of generating codes in any one of 100 trillion possibilities to outmaneuver their enemies. The exact workings of the Enigma are beyond the scope of this paper; suffice it to say that it was originally believed to have taken 1,000 code breakers working twenty-four hours a day for 14.5 years to break one Enigma code (Momsen Chapter 2). Even if an enemy was somehow able to produce the manpower required to break a single Enigma code, it was just a matter of the Germans turning a rotor one notch to generate a completely different code. What is more is that even if armed with another Enigma, the Allied forces would have needed to know the exact settings of the German sending machine in order to decrypt the codes. Hence, Hitler thought he had the perfect machine in the Enigma and relied on it for nearly all communications to the front.
The Allies' spies were good enough to get a hold on a lot of information concerning the Enigma. They were able to piece together their own Enigmas from Polish plans and they were able to intercept Enigma codes. However, it had seemed impossible to be able to translate the codes into meaningful information. Eventually, code breakers were able to crack Enigma codes within a few months of reception, but by then, the information contained in the code was useless. The Allies turned to two machines for help.
In the United States, project Magic was developed. Using the Polish machines known as bombes, the top cryptoanalysts in the nation scurried to break all intercepted codes. The US had the advantage of being able to intercept Japanese codes (the Japanese utilized a specially made version of the Enigma) which always began with the phrase "I have the honor to inform your excellency" (Momsen Chapter 3). This gave the codebreakers something to hone in on and the US was shortly decoding all of the Japanese transmissions. However, this information proved useless in cracking the German codes, and was not even that helpful against Japan since most of the information transmitted in code was already known by American intelligence.
It was in Britain that the true key to cracking the Enigma developed. Alan Turing, a brilliant mathematician was invited to take over control of the Government Code and Cypher School (GCCS) located at Bletchley Park. Here in Bletchley, Turing developed Colossus - arguably the world's first electronic computer. The details of Colossus are still foggy, partly because of its partial classified status, but mainly because the secret of Colossus died with Turing. What is known, however is that Turing was able to set up the Colossus machine to crack the German Enigma codes within minutes of receiving them. They were then translated to English and the Allies had a complete knowledge of what the Germans thought they were sending privately.
The information generated by the Magic Project and Enigma was collectively referred to as Project ULTRA. Since the recent declassification of the project, historians have struggled to determine its effect in World War II. However, analysis shows the following to be true: The usage of project ULTRA did not cause the Allied forces to win the war. However, its usage allowed for better decisions on the part of Allied leaders and hastened the end of the war. Also, it is mandatory that historians go over their previous analyses of World War II to determine the effect of ULTRA on individual decisions and battles.
There are several arguments that will be presented to point to this conclusion. First of all, ULTRA provided a direct link to the minds of Hitler and his advisors, allowing the Allies to learn how these men thought. Also, data about ULTRA's usage in individual battles shows that its value was immeasurable in hastening their end. It can also be shown that the events that were caused as a result of ULTRA knowledge would have happened anyway, it just would have taken longer and more lives would have been lost. Finally, it can be shown that since ULTRA was so long unknown to historians as a result of it being well protected during the war, historians must reanalyze previous conclusions on the war in light of its recent declassification.
Part of the reason why ULTRA has rarely been referred to by historians is the way it was protected during the war. Simply put, no one outside of the ULTRA project was ever aware of its existence. And, since this was before the time of great public skepticism and conspiracy theories, there was little to no conjecture on the existence of such a project.
The man who can be recognized for his efforts to keep ULTRA a secret is Alan Turing. The man behind Bletchley Park, Turing viewed Colossus as a child. He wanted to protect it from outside knowledge so he could keep it to himself. Since Turing was so bright and cunning, he was even able to prevent 90% of the scientists working at Bletchley from even knowing of the existence of Colossus. Much like the Manhattan Project, different people worked on different parts of the project so no one but Turing really knew the whole project (Lewin 113). And Turing, though not the only man to see the plans of the project, was perhaps the only man who ever understood them completely.
Knowing that the location and physical characteristics of ULTRA was kept secret for so long is not enough to prove that the existence of the project was a secret. After all, ULTRA constantly produced reams of information about cracked German codes. Turing's response to this was simple. Not only would just a few people be allowed to receive ULTRA information directly, there would be no written transcript of this data. Additionally, all ULTRA information was passed directly from Bletchley Park to the officers in charge of troop movement via one person. A specially trained corps was created to shuffle between Bletchley and all portions of Europe to deliver the information verbally. These were the only people besides Turing and a few others at the GCCS and intelligence officials of the US government that knew of the existence of ULTRA. At first, commanding officers found it difficult to receive orders from lower ranked strangers (the ULTRA messengers), but soon learned it was in their best interest to do so. Another thing that should be noted about the messengers is that they were so well trained that none were ever captured, but if they had been captured, they were prepared to commit suicide (Winterbotham 21).
Another major step to preventing the enemy from knowing about ULTRA was the way in which officials chose whether or not and how to use ULTRA data. If the Germans ever became suspicious that their Enigma was no longer safe, they would've stopped using it instantly. Instead, the Allies wanted the Germans to feel they could use Enigma since it provided direct insight into the workings of German forces. Therefore, no action was EVER made on the basis of ULTRA data unless it were theoretically possible the data was obtained elsewhere. For example, when it was made clear through ULTRA the exact locations of an entire fleet of German U-Boats, Allied ships in the area were instructed to send a sighting signal towards specific locations (Hinsley). Unbeknownst to the captains of these ships, these sighting signals were being intercepted by German forces. So, when the U-Boats were sunk by Allied bombers, German commanders assumed it was because of the sightings made by the Allied ships. In reality, had it not been for ULTRA, there is little chance that all of the U-Boats would have been sighted by Allied fleets.
ULTRA was also protected through misinformation. German prisoners of war were released as unwitting carriers of Allied lies. While in prison, they "overheard" stories of an advanced Allied RADAR that could detect ships and planes a thousand miles away (Hinsley). This false information was relayed back to German headquarters, offering the Allies the opportunity to imply that information that was known about Germany was known from this RADAR, when it in fact came from ULTRA.
It has only been a couple of decades since the existence of ULTRA was declassified (the process began in 1972). However, the specifics of Project Magic and of the Colossus machine remained very sketchy until recently. Sine Magic played only a nominal role in the European front, there has been little public outcry calling for more knowledge of it. However, Colossus was further "exposed" in F.W. Winterbotham's book, The Ultra Secret, first published in 1974. This was the first published account of ULTRA and of Colossus. Winterbotham was a British airman who became active with Bletchley Park during the war. As an indication of how well kept the ULTRA secret was, Winterbotham's book was originally believed to be a hoax by many. It wasn't until the British and US governments conceded the existence of ULTRA that Winterbotham's story was confirmed. Since most of the history on World War II had been written by this time, historians have been reluctant to go back over their previous conclusions in light of this revelation. This is why history books were oblivious to the value of ULTRA and continue to downplay its role in hastening the end of the war.
No amount of reconnaissance intelligence could tell the Allies what the next Axis move would be. Although Allied spy technology had provided information on the locations of Axis armaments and troop movements, it was always hard to use that information to stay one step ahead of the Axis powers. ULTRA provided the necessary insight into the minds of the Axis leaders to win the war.
Throughout World War II, the German U-Boats were the most successful submarines in battle. The deployment of these boats were undetectable by Allied RADAR, and they struck with lightning speed and efficiency. Until Colossus and Magic came online to produce ULTRA, it had appeared as if the Allies had lost the oceans. However, once the cryptoanalysts at Bletchley Park began to decode the Enigma broadcasts, the location of every U-boat was known within two-hundred yards (Winterbotham 128). Over the second half of 1941, Allied naval forces were able to reduce the size of the U-Boat fleet by a factor of 10 (Russell). ULTRA had won back the seas from the German U-Boats and ended the effectiveness of the Axis strategy to control the waters.
Another advantage that ULTRA stole from the Germans was Blitzkrieg - lightning war. Rommel, as the commander of German forces depended upon the element of surprise for his fast, powerful, deadly attacks on Allied territory. However, since ULTRA information was available prior to many of these attacks, the Allies were able to position their troops and supplies in such a way that Blitzkrieg eventually proved to be a useless tactic. ULTRA also provided information about Rommel's supplies to Allied commanders. Whenever Rommel ordered tanks to the front, Allied troops would lay down mine fields. When Rommel began to run out of anti-aircraft fire, The Allies would bring in more bombers (Halter 27-29). ULTRA allowed the Allies to constantly be one step ahead of Rommel, thus avoiding heavy Allied losses and inflicting incredible damage to German armaments.
Another weakness ULTRA revealed in German strategy was the fact that the Germans were often poorly organized. When preparing to invade England, the Germans sent out Enigma cyphers showing that the barges they had built in English waters were inadequately small. Thus, the Allies were able to ignore the barge building and concentrate their efforts on fighting the German Luftwaffe air force away from the British Isles. When the Luftwaffe launched their attack on the British Royal Air Force, they were met with an Allied force five times as large as they had predicted (Halter 18). Germany retreated and ULTRA saved England.
Japanese leaders too, had their minds "probed" by ULTRA. The skeptical Japanese leaders relied much less on cryptography than Germany, so ULTRA was less successful in helping the Allies win the war in the Pacific than the war in Europe. However, Japan did use two forms of Enigma encryption, called "Red" and "Purple." Red and Purple were used right before Pearl Harbor, but since information on the invasion could not have come from any source but ULTRA, and ULTRA depended on corroborating sources to protect its secrecy, the information was withheld. Therefore, the decrypted message was never used to help the US fleet in Hawaii (Momsen Chapter 2). ULTRA did prove to be advantageous against Japan at the end of the war though. Red and Purple cyphers concerning the placement of Japanese troops were key with negotiations to end the war. Since the Allies knew where the Japanese forces were, they knew which Pacific countries were most in need of protection through the peace treaty (Hinsley). Also, ULTRA had decoded information sent to Japanese negotiators detailing what the Japanese government would settle for in terms of monetary, troop, and land losses. Armed with this information, Allied negotiators knew exactly what Japan would accept and were able to control the entire negotiation process (Hinsley).
It is important to constantly realize that ULTRA was the most secretive "weapon" of World War II, and its secrecy depended on the fact that every Allied decision based on ULTRA had to be theoretically confirmed by another source. It is for this reason that ULTRA was ignored in Pearl Harbor. This is also why the German supply submarines, the milchcows, which were stationed throughout the Atlantic were attacked one by one even though ULTRA indicated the locations of the entire fleet (Halter 24). Even with this limitation, ULTRA intelligence was extremely effective in many battles.
As has already been mentioned, ULTRA provided the Allies with invaluable information regarding the location of German U-Boats. The systematic destruction of these submarines made it possible for the Allies to ship supplies freely while hindering the Axis abilities to do the same. There were many other instances where ULTRA provided the key in Axis defeats. In the Battle of Matapan, Enigma signals were decrypted that gave warning to the British fleet that they would be attacked by Italy. Also, ULTRA gave information to the Allies that led to the sinking of the Bismarck in May '41 and assisted the Allied soldiers who were sent to Greece retreat without harm when decrypted transmissions showed that they could not beat the Germans in that battle (Hinsley).
Additionally, having ULTRA allowed the Allies to force Germany into stalemates when Germany had more manpower as well as causing greater German losses when the Allies had more manpower. On the German attack of Crete, the attack was not thwarted, but high German losses made the German attack more detrimental than helpful for Hitler. Also, when Germany won the Battle of Gazala in '42, ULTRA data allowed the Allies to prepare for Rommel's attack on Egypt. By knowing the location of all supplies and reinforcements, the Allied forces starved Rommel of fuel and ammunition while the British waltzed towards am easy battle at El Alamein, ending all German hope of securing Egypt (Hinsley).
Although ULTRA was obviously responsible for hastening the end of several battles, it probably caused nothing to happen that would not have eventually happened anyway. Since all ULTRA data was corroborated, it would have only been a matter of time before careful examination of available intelligence would have resulted in the same conclusions ULTRA provided. An analysis of some of the events of the War prove this statement.
By keeping Rommel out of Egypt, Germany never had an opportunity to gain control of Africa. Had Hitler controlled the continent, many historians estimate it would have taken up to a year for the Allies to recapture it (Lewin 287). Also, according to Sir Harry Hinsley, German control of Egypt would have made it impossible for the Allies to control all of Northern Africa by May '43, as had really happened. Control of this region resulted in the opening of the Mediterranean to Allied ships. The opening of the Mediterranean made it possible to concentrate naval efforts off the Normandy beachheads for the D-Day invasion of '44. This domino effect shows that intelligence gained from ULTRA allowed the Allies to reach goals in quicker times than would have been possible without such knowledge.
ULTRA also sped up the process of winning the war through enhancing communication between the US and the British governments. Since the British Colossus was largely responsible for breaking Enigma codes, and the American Magic was the main source of deciphering Japanese Red and Purple codes, the two powers were forced to combine their efforts. The combination of Magic and Colossus to form ULTRA was apparently unbeatable. Also, since relations had to be strengthened in order to support ULTRA, Churchill and Roosevelt were forced by circumstances to increase their trust of each other. This resulted in more shared decisions between the two countries, thus doubling the thought that went into each decision.
In order to prove that the Allies would have won the War without ULTRA, there are three key points to look at. First of all, since Russia initially distrusted ULTRA data revealed to them since its source was never revealed (Halter 24), all Russian victories were achieved without ULTRA. The decisive Battle of the Bulge, in which Germany was halted from further Russian advances, showed Germany was defeatable without ULTRA's capabilities. Secondly, the US Government entered the war without relying on ULTRA from the beginning. However, many of the battles the US was first involved with (before the full operation of ULTRA) were decisive wins for the allies (Lewin 120). Therefore, American strategy was effective without ULTRA's assistance. The third, and most important point to look out, is the relative strength of the Axis and Allied powers. Germany and its allies were most effective in quick battles and short wars. The Allied forces, on the other hand, were used to centuries of multi-year wars. Also, the Allied forces had greater overall man and weapon power compared to the Axis powers. In the long run, ULTRA did not win the war -- it was inevitable -- it only served to hasten the war's end.
The arguments presented have shown that ULTRA provided insights into the minds of German and Japanese leaders, ULTRA led to wins in many decisive battles, and that ULTRA only hastened inevitable events. It has also been shown that since real information on ULTRA has only become available recently, it is imperative that historians re-examine the events of World War II to determine where ULTRA had a considerable impact.
This conclusion helps to explain a phenomenon that has occurred throughout history; technologically advanced nations will triumph over less technologically advanced nations. ULTRA was a combination of US and British technological superiority over Germany and Japan. The US use of the atomic bomb against Japan was another example of technological superiority, as was the US success over Russia in the Cold War. The final example of technological superiority advancing a nation over others is seen in present day Japan; being the most technologically advanced nation in the world, Japan is capable at holding the US economy at bay. The fact that ULTRA was another technological superiority adds more credence to the theory that technologically superior countries will lead the world.
ULTRA also helps to provide answers to previously hard to explain situations of World War II. Originally, most nations believed the US had developed some sort of "advanced RADAR" that could find all the U-Boats in the world's seas. Yet, after the war, evidence of this RADAR never surfaced. It was, in reality, ULTRA that provided this information, which disproves the advanced RADAR theory. Also, ULTRA explains why Germany appeared so disorganized. It made little sense until recently how a country with such a smooth military machine could be defeated so decidedly. Now that it is known that the Allies knew everything the Germans were planning, it is easy to see how the Allied matching of all Axis moves would make Germany appear foolish. It also explains how the most advanced naval forces of the time, the U-Boats, were destroyed by decades old Allied ships.
Perhaps the most important lesson that can be learned from ULTRA is the fact that history is not static. For close to three decades, no one outside of Bletchley Park fully understood or even know of the existence of ULTRA. Now, it becomes apparent that the current view of the way events took place in WWII may be entirely incorrect. It is necessary now for historians who are truly in favor of discovering the truth in history to examine all available documents and events pertaining to World War II to determine ULTRA's effects in the War.
The most devastating effect of ULTRA to history (and perhaps the reason why many historians still continue to ignore its existence), is that it requires people to examine the ways history is viewed. The question now must be constantly asked of each explanation to a historical event, "Is this REALLY why?" Also, official government reports must be questioned. If two governments are able to keep ULTRA secret for thirty years, while successfully denying its existence the whole time, how can any "official" report be trusted? The answer is, everything must now be questioned; the effects ULTRA had on WWII are nothing compared to the effects it will have on the way history will need to be studied in the future.
Bibliography
Primary sources:
*Calvocoress, Peter. Top Secret Ultra. London: Cassel, 1980.
Hinsley, Sir Harry. "The Influence of ULTRA in the Second World War." Babbage Lecture Theatre, Bletchley Park, England. 19 Oct. 1993.
Cracked German Enigma code as found on page 372 of:
Lewin, Ronald. Ultra goes to war. London: Hutchinson & Co., Ltd., 1978.
Russell, Commander Jerry C. ULTRA AND THE CAMPAIGN AGAINST THE U-BOATS IN WORLD WAR II. Carlisle Barracks, PA, US Army War College, 1980.
*Winterbotham, F.W. The Ultra Secret. New York: Harper & Row, 1974.
Secondary Sources:
"Cryptography - Enigma Cypher." http://www.trincoll.edu/~cpsc/cryptography/enigma
Fargo, Ladislas. The Broken Seal. New York: Random House, 1967.
Goldston, Robert. Sinister Touches: the Secret War Against Hitler. New York: The Dial Press, 1982.
Halter, Jon C. Top Secret Projects of World War II. New York: Julian Messner, 1978.
Koczaczuk, Wladyslaw. "The Origins of the Enigma/Ultra Operation." http://biwww.urv.gov.pl/ mszdp:/enigmaa.html.
Lewin, Ronald. Ultra goes to war. London: Hutchinson & Co., Ltd., 1978.
Momsen, Bill. "Codebreaking & Secret Weapons in WWII - Chapter I 1926-1939."
http://members.aol.com/nbrass/1enigma.htm.
- - -. "Codebreaking & Secret Weapons in WWII - Chapter II 1939-1941."
http://members.aol.com/nbrass/2enigma.htm.
- - -. "Codebreaking & Secret Weapons in WWII - Chapter III 1939."
http://members.aol.com/nbrass/3enigma.htm.
Sale, Anthony E. "Colossus Rebuild." http://www.cranfield.ac.uk/CCC/BPark/colossus.htm
another opportunity to mention Cryptonomicon (Score:2)
Look, data havens! Just like in Cryptonomicon! Nope, there was never any such thing as offshore banking until it was invented in Crytponomicon, and now people have said, "gee what a keen idea. think I'll set one up." Ooh, encryption! Just like in Crytponomicon! Never mind the many times it's been mentioned before.
Which is not to say I don't like the author... But damn. Overhype is making me sick.
Re:Windows Enigma simulator (Score:1)
jeez, couldn't have just given us a link? (Score:1)
hypertext is your friend...USE IT!!!!!!!!
Show times (Score:1)
I guess that means everyone should check their local stations [pbs.org].
Nova on November 9 1999, 9 pm (Score:1)
How many sides does a novagon have again? Or is that a nonagon?
Re:another opportunity to mention Cryptonomicon (Score:2)
Re:Cryptography from today (Score:3)
The coputing power available for less than $2k these days is just phenomenal compared to what was available at all back in the fourties. And going to the megabuck range of modern computers would seem absolutely magical to those early computing pioneers.
Yes, I laugh at the power of a VIC-20 (and the other PCs of the time), but for both reasons. I laugh at their punyness compared to now, and their might compared to the 40's. Things have come a long way in the last 50 odd years. I wonder where computing will be after another 50 years: will desktop beowulfs have been superceded by something realy wild, or will we be stuck with Windows 2050 running on an Intel Merconium (and yes, I know exactly what that word means:).
Watchable PBS! (Score:2)
If it was still sweeps we'd see a show about a Nazi Loch Ness monster who travels times to help the germas develop an ubercode.
Yeah yeah I know PBS doesn't go for sweeps...
"Hiel Herr Ness!"
Re:Getcherown Enigma (Score:1)
/peter
A few good books (Score:1)
For instance, Clay Blair wrote two books on the U-Boat war. In them, he essentially plays down the role that breaking enigma had on defeating the U-Boat threat. Other factors such as HuffDuff (Hi Frequency Directional Finders), radar, convoy escorts, closing the air gap, and bad German strategic decisions were more critical to the Allied success.
Another good book is Combined Fleet Decoded by Prados, which discusses the intelligence war against the Japanese Navy. It really helps if you already know something about the war in the Pacific.
MacArthur's Ultra is another book you might be interested in although it is not as good as Blair or Prados' books.
Finally, a new book just came out that I'm going to get and read; Venona: Decoding Soviet Espionage in America. This one should be very interesting. Our friends in Fort Meade have some of the Venona documents on-line at their web site. I read a few of these, which justs whets my appetite for more info.
Re:Cryptography from today (Score:1)
Re:Cryptography from today (Score:1)
gloria: Squirt Down my Leg
www.thecouch.com/diaries/gloria/diary.4.12.1996.h
Hmmm, this harkens back to Intel's river motif, but what is this about ham in her uterus??
Egad, there are strange things afoot for the year 2050...
~Jason Maggard
"Cat, Hat, in French, Chat, Chapeau, in Merconium she's Proscuitto In Utero..."
-Dr. Seuss
Re:Please capture and post on alt.binaries.mpeg (Score:1)
neener neener neener...
Re:Is this on In Aus? (Score:1)
Another codebreaker (Score:1)
The Poles broke Enigma. (Score:2)
The Poles had (primarily) 3 mathematicians that they trained in cryptography as early as 1936, because even then they feared a German invasion and thought that reading German Enigma traffic would be crucial.
The main person who did most of the theoretical work in cracking Enigma was a man named Marjan Rajewski. There were 2 others, but I only remember one other name, Henri Zygalski.
At one point the Poles were able to intercept a German diplocmatic shipment and capture an enigma machine and duplicate them. At that since the poles had captured some plaintext, with the corresponding cipher-text he was able through substitution to calculate the internal wirings of the Enigma rotors (of which the machine came with 5, but only 3 could be used at once. That is unless it was a Naval Enimga machine which used 4 rotors, the 4th did not rotate however.)
As I recall, the Diplomatic Enigma machine might not have come with a STECKER (plugboard) but it was then a simple matter for the Polish engineers to add that to the diplomatic machine to get a fully functional Enigma machine.
The single best reference I have found for Enigma history and information is THIS [amazon.com] one. Though it is out of print.
It's a great read if you can find it at your library. Many former Bletchley Park members have confirmed it as being factual as well.
If anyone is interested I have some photos of various Enigma machines that I took at The NSA's Crypto Museum. I'll post a link if anyone would like to see them.
Re:Cryptography from today (Score:1)
Otherwise, that was funny.... t
Re:Paper on the effect of the cracking of Enigma (Score:2)
Re:Watchable PBS! (Score:1)
Freudian typo?
Re:Merconium -> Meconium (Score:2)
Re:The Poles broke Enigma. (Score:2)
It's also interesting to note that initially the Allies were not particulary interested in the Polish breakthrough.
-------
Interesting Parallel (Score:1)
Yet another example of how human error due to undue faith in a "secure" technology can make any system vunerable.
DARWR ERDRD AEWQO EIRDK WERMR
JUSTA NOTHE RPERL HACKE RXXXX
Re:Seen it before (Score:1)
-slams
Re:another opportunity to mention Cryptonomicon (Score:1)
Um, except that they have more in common than the crypto theme: some of the characters, places, and subplots are the same!
The novel has Turing and he breaks Nazi codes. If it were a documentary about breaking Viet Cong codes or something, you'de be right. But the novel has Turing and Bletchley Park and Nazis, so what do you expect?
Complaining about Cryptonomicon references is like complaining about Braveheart movies references when people are talking about William Wallace. Or singing tunes from the 1776 musical when talking about the Declaration of Independence. :-)
Yes, it's overhyped. But it really is topical.
---
Re:Just finished Cryptonomicon (Score:1)
I finished it and immediately started over on it..
The interweaving of the two time periods in which the book takes place, combined with the way some characters are developed and some not (Glory sure had a quick fade-out..) combined with the wide scope of technical/mathematical/scientific detail made it well worth a second read.
There's been an amazing range of related topics appear: the "Mother Earth/Mother Board" hacker travelogue re: submarine cables at Wired; Cryptonomicon; tonight's show on Enigma and Bletchley Park; seems there was one other thread related to Enigma lately.. oh well, gone now..
I'm still trying to find Kinakuta in my National Geographic World Atlas..
I think it's really Banggi Island (or maybe not..)
Cool stuff..
t_t_b
--
This show rox (Score:1)
Re:another opportunity to mention Cryptonomicon (Score:1)
Hey, this one is good (Score:1)
While there is the expected over-dramaticization over some aspects of code breaking, this documentary is very even-handed. Woops, take that back. Now they are getting over-dramatic in their commentary.
Hey guys and gals, what about the development and use of radar? What about the Manhattan Project?
Charlie Rose == David Boiles (Score:2)
Check this out folks
Re:Colossus (Score:1)
Thwaappt! Boies, not Boiles (Score:1)
Excellent (Score:1)
-----------------------------------------
Everybody's got something to hide except for me and my monkey...
www.stampede.org
Re:Watchable PBS! (Score:1)
I swear, I saw something sticking out of the water! It was huge! It must have been...the BREAST of LOCH NESS!!
These criminal must be prosecuted! (Score:1)
Where is the RIAA when we really need them?
Re:Getcherown Enigma (Score:1)
Nah, that's just a fairly standard German keyboard layout, I think. They use QWERTZ rather than QWERTY.
Re:Hey, this one is good (Score:1)
Re:Getcherown Enigma (Score:1)
/peter
Re:The Poles broke Enigma. (Score:1)
This has always been a sore point with me (The Poles crypto successes being ignored by history in general) becaus I am Polish and we all know what nationality gets the largest brunt of stupid jokes thrown at them.
From what I read the Polish trio (Rajewski, Zygalski, and the other guy whose name I was reminded of by PBS tonight but once again can not seem to remember) fled to occupied France to continue their work decrypting Enigma, after Germany blitzed Poland. They remained in France until things got too hot there for them, and then went to England where, yes, they were not allowed to actually work at Bletchley, and were reduced to breaking low-level German diplomatic codes.
The gentleman whose name I keep forgetting (it was something like Rosicki) died before the war ended when he was fleeing Poland. I think his boat was torpedoed and sank. I don't remember what happened to Zygalski, but Rajewski was rewarded by the Polish gov't with some monetary compensation for his work, and he did survive long enough (into the 1970's, when Enigma was finally declassified) to receive some small acclaim for his accomplishments. He was interviewed by (if I recall correctly) the TV show 60-Minutes, and a Polish film maker did a film about him and his Polish colleagues.
I must say that I think the PBS special did give the Poles more acclaim than history generally gives them, and was pretty well made with the exception of a few pet peeves.
I might get flamed for this, but according to my research on Enigma (and I read quote a bit in a quest to actually build one) Alan Turing's role in cracking Enigma was much over-hyped, and had less to do with the history of Bletchley Park than history leads us to believe.
My other pet peave (and this popped up frequently in the PBS special tonight) is that CODES and CIPHERS are 2 different things. Enigma was a cipher, not a code, and they kept saying "enigma encoded things", which is technically false. For example, Morse Code isn't a code at all, it's a cipher. (this is also a pet peeve of Peter Calvocoressi, a former Bletchley worker who was coincidentally interviewed on the Nova special, and who has written several good beginners books on codes and ciphers)
The difference being ciphers replace a single letter with a single letter. Codes generally replace entire words with groups of letters and numbers, or other words, and actually require a CODE-TO-PLAINTEXT book to decode a message, and a PLAINTEXT-TO-CODE book to encode a message. A cipher only requires a simple key.
If you want to see one.. (Score:1)
I thought the most interesting thing was the newspaper clippings describing the museum's opening. Apparently, the NSA opened it without telling anyone -- and denied knowledge of any such museum for months afterwards.
Human error. (Score:2)
At any rate, one of the major themes would have to be the role of human error in tipping off the decoders.
Wouldn't the same be true for the supercodes in use today?
--
It's October 6th. Where's W2K? Over the horizon again, eh?
Re:What about Axis code breakers? (Score:2)
--
It's October 6th. Where's W2K? Over the horizon again, eh?
Re:another opportunity to mention Cryptonomicon (Score:1)
Cryptonomicon was a great read but I agree with this post entirely. More so because none of that stuff in Cryptonomicon is new, it's clearly based on lots of time reading the cypherpunks mailing list back in the early 90's. Don't get me wrong, I loved the fact that it took from those ideas... but Stephenson didn't invent them.
-Blake (who kept waiting for references to L. Detweiller and Assassination Politics to appear in the novel)
Damn, I missed the last 30 minutes! (Score:1)
Yeah, someone need to encode this and post on net. =).
Thank you in advance for replies.
Re:What about Axis code breakers? (Score:1)
Re:another opportunity to mention Cryptonomicon (Score:1)
So for people without a whole lot of historical cryptographic background, anything that discusses this history is seen as relating to the book.
Lecture by Tony Sale on Lorenz code and Colossus (Score:1)
Re:Early british nerds (Score:1)
One day, he had cause to report a burglary to the police, and told them that his partner was male, by the by, and they charged him with indecency-related offences.
This tragic and brilliant figure eventually took his own life, years before the world was allowed to know how many lives, both allied and german/japanese/italian etc he saved by hastening the end of the second world war.
Of course, his idealised computing devices (partly an attempt on the fortress of Goedel's theorem) helped define a lot of the grounds of Formal Systems, and computation theory. Although the concept of the Universal Turing Machine was more or less an abstraction of Babbage's unbuilt second Difference Engine, he was the father of the modern computer (iterative models being much more practical for most purposes than Church's functional approach).
So his brilliance in breaking the more secure version of enigma (the first one was broken by a brilliant Polish crypanalyst, exploiting repeated day keys, and turing took a lot of inspiration from his approach) wasn't his only huge contribution. It's what most people know him for, but ultimately, hundreds of years hence, his achievements in the field of computation should be seen as more important.
I still think it's a tragedy that we lost such a brilliant mind to homophobia, though.
Just my two pennorth...
http://www.mp3.com/tib for my crappy amatuerish noises...
This thread is not relelvant... (Score:1)
The subject matter is very pertinent, but did anyone at /. HQ think for a second that the heading and the general gist of the story is of /no relevance whatsoever/ to anyone living outside of the US of A? Jesus, you can be so inconsiderate sometimes. This is a global medium, remember?
Bah humbug!
--
Barry de la Rosa,
Features Editor, Network News (UK)
Work: barry_delarosa[at]vnu.co.uk,
tel. +44 (0)171 316 9364
Re:Odder and Odder (Score:1)
Fairly near the beginning of the war, we got the Polish codebreaking team to come across to the UK. They'd managed to work out a device which had a number of enigma machines - 4 or 5, I think - operating linked with some complicated extra doohickys, and _that_ gave them limited decryption facilities. I don't know how good it was, but that was the original Polish device.
Greg
Re:What about Axis code breakers? (Score:2)
The German navy had cracked certain Admiralty ciphers in early 1940 and again in 1943, which were of considerable importance in the naval actions off Norway, and then in the battle of the convoys. Luftwaffe cryptanalysis also penetrated some of Bomber Command's ciphers. Even some of the private messages between Churchill and Roosevelt were intercepted, in 1940 when the American "Gray code" cipher was betrayed by a State department clerk in London, and at intervals between 1941 and 1943 when parts of telephone messages could be read due to deficiencies in the AT&T "A-3" scrambler.
The Germans were also quick to take advantage of poor wireless security in the field. As well as revealing the theft of the "Black code" cipher, used by American military attaches throughout the world, which (as other posters have said) was giving the Germans detailed reports on the British morale, dispositions and plans throughout the Middle East, the Australian attack on Rommel's wireless intelligence unit at Tel-el-Eisa in July 1942 showed just how much the Germans had been able to learn from British radio traffic. Use of radiotelephones, call signs, cryptographic procedures, voice codes, wireless silences for units on the move -- all had been found wanting, and were shown to need deep reform.
However, the comprehensive records also underlined how effective wireless signals could be for deception, and German analysis of fake radio traffic later led to many misdirections. In particular, false signals traffic was extensively used in the deception to persuade Hitler that an even larger invasion army under Patton was preparing to land at Calais. This ultimately prevented German deployment of their main Panzer divisions for several weeks even after the actual invasion in Normandy.
Even so, signal intelligence did give them a strong clue as to the truth:
"In late April [1944], ... after an intensive study of the wireless traffic of both British and American divisions, Funkabwehr analysts realised that when they heard the distinctive traffic indicating that an air liaison official had been assigned to a division to provide a link between ground and air forces, it could be assumed, first, that it was an assault division and, second, that it was preparing for offensive operations. In a relatively short period of time, the Funkabwehr heard all the divisions in southern and southwestern England broadcasting air liaison traffic, and they deduced, with considerable accuracy, that the invasion was imminent, and that the axis of the attack would be in the direction of Plymouth/Portsmouth and LeHavre/Cherbourg." (p.550)
In the event there was no weakening of the garrisons in the Pas-de-Calais; but the Germans began to double the anti-tank and anti-aircraft defences in Normandy, and two further divisions were ordered in.
Cave Brown summarises:
"The German wireless intelligence and cryptoanalytical service -- the Funkabwehr -- had been responsible for a remarkable series of triumphs throughout the war. It would claim total penetration of French codes and ciphers, including machine ciphers; and it had consistently broken into every Russian cryptosystem from the highest commands down to battalions. As for the United States, a high officer of the Funkabwehr would later claim that German wireless intelligence had had no difficulty in penetrating American radio communications because of exteremly poor security. The same was not true of the British; they had learnt their lesson in North Africa. The Funkabwehr official would state that British radio communications were the most effective and secure of all those with which the German wireless intelligence had to contend, adding that the higher-echelon cryptosystems of the British were never compromised during the Second World War. But while the Germans had not been able to penetrate the systems, they were quite successful in analysing the characteristic patterns of British wireless traffic -- particularly the traffic of the RAF signals service. The Funkabwehr official would state that the RAF was not aware that it was responsible for revealing many carefully guarded plans of the British army and thus for many losses and casulaties; and he would add that the only possible explanation was interservice jealousy, which led the RAF to overestimate the quality and security of its wireless communications and to refuse to let them be subject to the supervision of the army." (p.549)
The Tragic Case of Alan Turing (Score:2)
Re:Paper on the effect of the cracking of Enigma (Score:1)
Colossus was not used for Enigma it was instead used for a teletype based cyper. (Which Station-X codenamed "fish".) Also credit for the development of Colossus must surely go to Tommy Flowers, the telephone engineer who built it.
Turing did not make Colossus (Score:2)
According to PBS, Turing developed the "Bomb" to decipher the German Sharp (right?) codes using "cribs". When the Germans developed a new encryption technique (using modulo 2 arithmetic to mask a message with another random message), the allies needed something much different from the special-purpose "Bomb". This Flowers guy came up with the idea to use vacuum tubes, and designed and made the whole thing himself, while people didn't really believe him that it would work.
Also, the PBS special didn't talk much about the US or Japanese. For some reason I'm thinking the "Red" code was used by Italy...I may not be remembering correctly.
Anyway, it is interesting to note that most of the allies' success in decryption was simply due to German user-error and stupidity. E.g., not resetting the code wheels upon the commencement of a new message, or setting them to something obvious or stupid like your name, or "BER-LIN" or "MAD-RID", using double-initialization which stood out in the encrypted codes, using the same phrase in the same place of every message ("Heil Hitler"). I think the Axis could actually have gotten away with it if their operators just used some common sense. Oh, plus, they should've thrown their code books overboard when that one sub was captured...duh.
It was sad to learn that Alan Turing ended up committing suicide because of being gay.
Re:Watchable PBS! (Score:2)
Re:The Poles broke Enigma. (Score:1)
Turing appears to have become a "culture hero" being credited with the work of many other people.
Re:Paper on the effect of the cracking of Enigma (Score:1)
Ummm, I think you're way off here. Sentence should read "British and US", IMHO.
Originally, most nations believed the US had developed some sort of "advanced RADAR"
Actually, the development of RADAR was never attributed to any one individual. The UK was the first to use it effectively, however, see here [umich.edu] for more details.
The whole tone of your essay seemed to overplay the US's part in this. I love the way everybody (including our supposed partners in the EU) seems to have forgotten that the UK is still paying the US back for equipment loans during WWII.
Tomorrow will be 11/11/1999. Wear your poppy [britishlegion.org.uk] with pride. Without the selfless acts of our forebears, there'd sure as hell be no Linux, and you'd probably all be running MikroWeiche Windows.
Re:Paper on the effect of the cracking of Enigma (Score:2)
I don't think they ever did this. In fact, on a purely technical and procedural basis, the German protocol was ver, VERY safe. Except the operators DIDN'T follow protocol because they were lazy or thought the very machine itself guaranteed anything they did was unbreakable. Bletchley Park got their foot in the door because operators did stupid things like send the same phrase in every message, or, in the initialization procedure, send the key twice which stood out like a sore thumb, not resetting the wheels in the morning, or setting the double-keys to something stupid like "BER-LIN", or "MAD-RID"...this was alll human error totally removed from the technical aspect. Doing this would be stupid in any encryption scheme.
Sort of makes you wonder what would have happened if they scheme was never broken. I also almost feel sorry for some of those German generals and commanders, simply not understanding why every single move led them to disaster, and that everything bad happened at exactly the worst times. Rommel, for instance, thought to his death that there was a leak in the highest command of the Italian military which was informing the English. Poor guy...
Re:The Poles broke Enigma. (Score:2)
But according to PBS, the Germans changed something, and from then on the Polish guys were not able to crack anything. This apparently happened pretty early...probably a little before or after the actual attack on poland.
Re:The Poles broke Enigma. (Score:1)
I suspect that Turing's role may well have been over hyped in quite a few ways connected with Station-X. With the actions of linguists, engineers and cryptographers being downplayed and even falsely credited to Turing.
My other pet peave (and this popped up frequently in the PBS special tonight) is that CODES and CIPHERS are 2 different things.
A very common misunderstanding.
Enigma was a cipher, not a code, and they kept saying "enigma encoded things", which is technically false. For example, Morse Code isn't a code at all, it's a cipher. (this is also a pet peeve of Peter Calvocoressi, a former Bletchley worker who was coincidentally interviewed on the Nova special, and who has written several good beginners books on codes and ciphers)
In such documentries you tend to get those narrating and interviewing to refer to "codes" whilst the (old) people they interview refer to "cyphers".
The difference being ciphers replace a single letter with a single letter.
Or groups of letters. Cyphers are comparativly easy to mechanise.
Codes generally replace entire words with groups of letters and numbers
Or to translate into a language which will not be understood by evesdroppers. Which is exactly what the Americans did in the Pacific, using Navajo speakers to send communications.
Re:Cryptography from today (Score:2)
Actually, I'm in awe of machines like that. Back then, nothing had been done on the topic. There was no "computing". These machines were basically the original brainchilds from individual people's imaginations. Nowadays everything has already been done...to make a faster chip you just decrease circuit width...etc. Sure people still design new circuits, but they have a wealth of fundamental stuff at their disposal. Back then this was absolutely amazing...people didn't even know if it was
Re:another opportunity to mention Cryptonomicon (Score:2)
--
Re:Colossus (Score:1)
Re:If you want to see one.. (Score:1)
Speaking of which, there's some kind of sculpture there with an encrypted message in it. Does anyone know if this message has been decrypted?
Re:Hey, this one is good (Score:1)
Re:Early british nerds (Score:1)
Actually, I think we were too busy rebuilding our cities and grieving for our dead to be too worried about what was then an abstract concept.
Rationing (of food, petrol, heating oil etc) in the UK continued way after the end of WWII; the economy was shot to bits (all the skilled workers were either still being demobilised or were dead), there was a whole load of social issues to deal with (repatriation of evacuees to their parents, broken homes because fathers were buried on French soil, although many positive things such as increased emancipation of women).
And none of this economic & social turmoil was helped by the USA demanding payment for equipment loans, based solely on the fact that Churchill's Conservatives lost to (Chamberlain's? Might be wrong - correct me pls!) the Labour party, whose socialist policies offended the sensibilities of the president even before any were enacted.
On another note, which is timely and relevant - after WW II, Germany (a monopoly) was divided into East and West by what was effectively the Department of World Justice.
West Germany went on to become a great economic power in Europe. And not more than 10 years ago they merged back again! US DoJ, read your history!
Re:Colossus (Score:1)
The machine is the encryption/decryption algorithm. That was known. All good cryptography algorithms are well known. Relying on the secrecy of the algorithm is poor cryptographic practice.
What was not known was the daily machine settings that are equivalent to the crypotgraphic key. The mathematicians used various techniques to discover the daily settings. Once the day's settings had been found, that entire day's set of dispatches could be read. But there was a new problem to solve at midnight every day.
Furthermore, the Germans altered the machine by adding rotors and by building versions of the machine that had more than the usual number of rotors. The later Lorentz cipher was only partially based on Enigma. It too was broken.
It was a remarkable feat of mathematics and engineering.
Re:Cryptography from today (Score:1)
Mercury delay tubes where an audio pulse representing a series of 0s and 1s was sent through the machine and captured at the other end so that it could be cycled around to the beginning and retransmitted reminds me of RAM refresh circuits.
The use of CRTs where the decay time of the phosphors was used to store bits for brief periods of time until they were reread and fed back into the tube. What ingenuity!
Re:The Poles broke Enigma. (Score:1)
One of many. But the real truth is that Enigma would have been more enigmatic had the germans exercised better care in key management.
The Allies found Enigma sound enough to have actually used it a little themselves when sending messages to the French resistance.
Re:Getcherown Enigma (Score:1)
Yes, and if I recall correctly. The Polish replica Enigma machines simply went A-Z left to right.
They also improved the plugboard by replacing those banana plugs with 1/4 inch phono plugs, thus requiring only one jack instead of 2 for every plugboard letter.
Re:Enigma Emulators (Score:1)
I saw the special last night, and found it very well put together for the mathematically lightweight.
As with today, most of the big breaks in cryptography came from sloppily handled transmissions and misuse of protocols. For example:
Once Lorentz was broken, though, it still took a month to decypher a single message, by which time it was essentially useless. Once Flowers's Colossus machines went on-line, a message could be broken in minutes or hours.
On the whole, it was a fascinating special, bringing together numerous sources ranging from mathematicians to code-clerks to modern-day cryptanalysts to tell the story of how Allied Intelligence greatly reduced the length and cost of World War II in Europe.
--
The Code Book (Score:1)
The power of failure and the dangers of success (Score:1)
But again the irony is if it weren't for their "mental laziness" then enigma may actually have not been broken. Every time the Germans shifted protocols the Allies of Bletchley Park were left in the "dark," until another of human natuers follies crept back into the forefront of someone's conciousness.
If the Germans had realized their failings, they definitely would have turned things around.
Fail at anything lately?
Re:Nova on November 9 1999, 9 pm (Score:1)
Re:The Tragic Case of Alan Turing (Score:1)
Re:Watchable PBS! (Score:1)
Re:What ciphers were the allies using? (Score:1)
It gets worse (Score:2)
It gets worse than that. Not only was Turing persecuted for being gay, he was offered (some would say forced to undergo) "treatment" for his "perversion". In the form of some very powerful medications. It's a pretty good bet that it was the drugs, not just the ostracism (that had been going on for a long time and while it was no doubt unpleasant, it wasn't enough to make the guy kill himself) that led to Turing's suicide.
Interactions between Oppenheimer and the OSS are another good example of the paranoid mentality that the spooks tend to adopt.
Not that it excuses in any way the abominable treatment of Dr. Turing, but maintaining a "paranoid mentality" is how spooks stay alive and do their jobs. They have to be paranoid. They don't have to be bigots. Turing's homosexuality was no more of a security risk (realistically, it was far less of risk) than the "eccentricity" that made him such a genius with codes and codebreaking machines.
Re:What ciphers were the allies using? (Score:1)
Allied Communication (Score:2)
According to the documentary, the Axis wasn't as concerned with intel. since they were winning (though they DID compromise a US diplomatic code via old fashion espionage). Nevertheless, the Allies knew what they were doing to crack the Axis codes - did it affect the Allies' procedures?
Re:Human error. (Score:1)
These are exactly the types of weaknesses that Bletchley took advantage of.
Rejewski paper (Re:The Poles broke Enigma) (Score:2)
M. Rejewski
"How Polish mathematicians deciphered the Enigma" (with discussion)
Ann. Hist. Comput. 3, 213-234 (1981)
A different translation of this paper appears as an appendix to the book by Kozaczuk (1984) recommended by the original poster.
Rejewski was the brilliant Polish mathematician who achieved the original theoretical success against the commercial version of Enigma in 1932-33. The Poles were later able to achieve substantial success against the military variant, aided by intelligence material supplied by Gustave Bertrand of the French Secret Service. According to Rejewski this material was "the decisive factor in breaking the machine's secrets". The work was the foundation for many of the attacks used against Enigma at Bletchley Park.
Why is it that history always credits Alan Turing with cracking Enigma, when in fact the Poles were reading Enigma encrypts prior to 1940? As I remember it Turing didn't become a player at Bletchley Park until about 1943, LONG after all of the theoretical work on the Enigma cipher had passed.
This is not correct:
Source: http://www.turing.org.uk/turi ng/papers/profsbook.html [turing.org.uk]
In this time he made a number of important contributions, including
Bletchley was never a one man project; but Turing's achievments were far from insignificant.
Re:What about Axis code breakers? (Score:2)
Do modern military/diplomatic/intelligence organizations do this?
--
It's October 6th. Where's W2K? Over the horizon again, eh?