SlideShare ist ein Scribd-Unternehmen logo
1 von 30
The World of Alan Turing, or

From the Turing machine to the first
      commercially-available
   (general purpose) computer
The paper “On computable
           numbers…” (1936-7)
• This paper introduced 3 (principal) ideas or
  concepts – the Turing machine, with its read-
  write head, 4 basic commands and its tape as the
  ‘memory’
• The machine description, which Turing refers to
  as the m-configuration (its collection of – finite –
  states, thinking in terms of automata)
• The idea of the machine which can read – and
  operate on – its own description… the universal
  Turing machine (as a way of tackling the
  Entscheidungsproblem)
Look first at the Machine and its m-
configuration - from Marvin Minsky’s text
              “Computation”
                    Turing expresses the m-
                       configuration as a table in
                       which the rows are ‘action
                       descriptions’, e.g. (A)print
                       0; move 1 square to the
                       right
                    (B) Move 1 square to the right
                    (C) Print 1; move 1 square to
                       the right
                    (D) Move 1 square to the right
                       and go to (A)
                    Printing 010101…..
Now look at the notion of the
       Universal (Turing) machine
• This is a machine which can read a series of m-
   configurations and thus ultimately operate to any
   specifiable computational sequence (an
   algorithm)
[ of course, not all such algorithmic operations are
   deterministic – i.e. produce a defined
   result, which is repeatable ]
The importance of this notion is its universality – it
   is a way of ‘interpreting’ any expression of an
   algorithm (and thus in our terms, any program)
How did Turing become involved in
     cracking the Enigma code?
• He initially built on the work of the Polish team
  led by Marian Rejewski, who had catalogued
  patterns based on the first 6 letters of
  intercepted messages:-
Enigma messages start with the 3 – letter message
  key & its repetition, for example the sequence L
  O K R G M, in which L and R encrypt the same
  letter, the first in the message-key. This tells us
  that L and R are related by the initial setting of
  the Enigma machine
If you have 4
messages, starting with     • If enough messages are
the 6 letters of repeated     received in a day, patterns
key -
Message 1 - L O K R G M
                              can be discerned, for
Message 2 - M V T X Z E       example if you have a
Message 3 - J K T M P E       complete set of 1st and 4th
Message 4 - D V Y P Z X       letters –
                            ABCDEFGHIJKLMNOPQRSTU
Now we can see how            V W X Y Z and
letters are encoded in
these messages –
                            FQHPLWOGBMVRXUYCZITN
                              JEASDK
1st letter
                            Now we see that A is linked to F; look
ABCDEFGHIJKLMNOP…
                              up F on the top row, it is linked to W;
                              look up W on the top row, it is linked
4th letter
                              to A – which is where we started.
     P     M RX
Think now of how the Enigma machine
           is constructed -
The Enigma shown has 3 scramblers
               (rotors)
• If we think of the relations previously described
  between the 1st and 4th letters, we see a ‘chain’, here
  - in the simplest case – A->F->W->A (with 3 links)
• It can be shown that the number of links in these (multiple)
  chains is wholly dependent on the scrambler settings:
  Rejewski’s team catalogued the chain lengths generated by
  each of the 105,456 scrambler settings. Now each day
  messages were received, they could see the first 6 letters
  and thus identify the chains and the scrambler settings that
  created them. Thus the scrambler part of the day-key has
  been separated from the extra encoding performed by the
  plugboard, which operates as a straightforward substitution
  (e.g. R may be plugged to L), operating each time a certain
  letter is encyphered.
When Rejewski’s team met Knox &
            Turing
In July 1939 in a hut in the Pyry forest outside
  Warsaw, the French intelligence service
  arranged a meeting between the British cipher
  service and the Polish team. This meeting
  resulted in the handing over of a
  reconstructed Enigma, a number of bombes of
  Polish design, and the basis for cracking the
  Enigma messages using a 3-rotor Enigma.
Issues
  While the Poles had devised a method for cracking
  Enigma, it is perhaps important to note that a major
  reason for the meeting was an increase in the design
  complexity of message coding by the Germans –

• 2 more rotors so that 3 were chosen from 5
• No. of plugboard cables up from 6 to 10

  The Polish methods could not handle these changes!
Start of operations at Bletchley
         Park (“phoney war”)
When Turing joined Bletchley Park, others like
 Gordon Welchman had already arrived and
 were preparing the ground for the
 codebreaking work. There was a heirarchy
 being built up to provide support & services to
 interact with the codebreakers & lots of
 others, some known to Turing, became
 involved. Among these were Max Newman,
 his mentor at Cambridge in much of his work.
Members of the initial heirarchy at
        Bletchley Park
The different Enigma designs –
  Abwehr, Kriegsmarine, Luftwaffe
  The German army, navy and airforce used Enigma
  designs of varying complexity –
• The army & airforce used 3 rotors chosen from 5,
• The navy 3 or later 4 from a total of 8
  The teams at Bletchley were able to develop
  techniques in Bombe design & usage to handle
  army/airforce and navy messages up to the first battle
  of the Atlantic. However, as U-boat usage of codes
  and keys became more sophisticated, decoding
  difficulties were increased and new strategies and
  techniques were needed.
The problems come to a peak
  In 1942 and early 1943, there was an 8 month
  break in being able to solve Enigma messages
  from the navy and the U-boats –
• Attacks in the Atlantic were intensifying
• 4-rotor Enigmas had been introduced
  The technique known as ‘gardening’ was the
  only real answer Bletchley had. A new strategy
  was needed. The study of ‘Fish’ was vital.
‘Dilly’ Knox dies, having broken the
           Abwehr Enigma
• Knox was a scholar & academic, not a mathematician
  (but he was originally attached to Admiralty room
  40). He suffered from cancer and died in Feb. 1943.
• He was determined to create a break into the
  Abwehr Enigma so that the Double-Cross messages
  sent via turned German agents could be verified as
  being ‘believed’ in Berlin. He succeeded in Dec. 1941.
• Once it was known that Double-Cross worked,
  continuing to read Abwehr Enigma messages became
  fundamental.
The Lorenz messages (“Tunny”)
The German high command centres used
  teleprinter-based messaging, not Enigma.
  Messages were encoded and sent using
  teleprinter code from 2 centres, on various
  routes manned by Axis forces. It was these
  messages that determined the movement and
  disposition of troops, and following the losses
  in the Russian and desert campaigns they
  became vital to intelligence. They were
  encoded using the Lorenz ciphers.
How was Lorenz different?
• There were 3 Lorenz designs, but in
  general, Lorenz used twelve wheels or rotors
  in two groups. 5 were used separately to
  encode, 5 more could be used either in unison
  or in tandem to break up the message
• There were 2 motor wheels which controlled
  the two groups of 5
• The encoding wheels were not connected at
  every letter and the inter-rotor connecting
  circuits were varied frequently.
The machines used to break Lorenz
            ciphers
 Initially, there was Heath-Robinson, a machine
 which read 2 tapes, one the encoded message
 and the second an example decode based on
 a chosen setting of the encoding wheels.
 Because tapes were read at a maximum speed
 to try and solve the complexity of having to try
 many wheel settings, this machine had many
 problems with breaking and tearing tapes.
Enter the Post Office research
            station team
  At Dollis Hill the GPO had an engineering team
  developing electronics for working on advanced
  exchange design –
• Valve electronics so reliability issues, but
• Circuitry design was advanced and offered complex
  functionality
  Tommy Flowers, head of the Dollis Hill team, was
  certain a machine could be designed to overcome the
  Heath-Robinson problems: Max Newman & Donald
  Michie are generally credited with the overall
  Colossus design
Colossus I
• 1500 valves, reads only 1 tape and stores the
  encoded message within machine ‘memory’
• Uses algorithms to test possible wheel-setting
  combinations to analyse decodes of the
  message statistically
• Results can be printed to enable the most
  likely settings on which to concentrate efforts.
Delivered to Bletchley December 1943.
Colossus II and the timing of efforts
• 2500 valves bringing more memory & power
• 5 different encodings can be processed
   together – stops breaks when no decodes.
Combined the advantages of the original design
 -> The most successful design – eventually 10
   were delivered!
The new Colossus was first delivered a few days
   before D-day and this allowed 2 simultaneous
   attacks – disinformation and codebreaking.
Colossus design - modular
War ends – what happened next? Bletchley Park was closed and there
was a bonfire to avoid secret information being retained.
The computing research efforts continued in 4 or 5 groups, some of
which had already started during the War – Radar at
Malvern, NPL, Manchester, Cambridge, others

TOWARDS THE FIRST STORED-
PROGRAM COMPUTERS – ON SALE!
Reviewing the (unfinished) story
Main development groups in 1946
• NPL where Turing began initially after the War
  – attached to atomic energy research site at
  Harwell, very bureaucratic, already secretive
• Manchester University where memory
  advances came together and where Newman
  started the design lab. – birth of the 3 registers
  (A, B, and the combined C- PI & program
  counter). Turing joined him later.
• Cambridge under Hartree and then Wilkes – a
  pragmatic approach based on human
  “computers”- produced EDSAC and then LEO.
The different approaches
• NPL was where Turing originated the design
  for the ACE – not commercially available till
  after he died
• Manchester was where the first stored-
  program computer actually ran a program- an
  advance impossible without perfecting the
  Williams-Kilburn tube used as a program store
• Cambridge started after the Moore school
  work and chose a more pragmatic approach
The Manchester “Baby” and the
 advances that followed there
               This basic “fetch cycle”
                 design was varied and
                 improved on several
                 times at Manchester
                 University computing
                 lab. – storage was
                 increased (to 8k words)
                 to provide more
                 flexibility and allow
                 different usage strategies
The Moore school ideas & Maurice
      Wilke’s work at Cambridge
• Cambridge computing lab. started in 1937 with
  a differential analyser & desk calculators.
• After the war Wilkes got J. von Neumann’s
  “Draft report on the EDVAC” and later went to
  a Moore school course. The Moore school had
  built ENIAC but it only worked in Nov. ’45.
• Wilkes’ computer- EDSAC - used the same
  delay-line technology as ENIAC- 4 to 32 delay
  lines, 3000 valves. Printed a squares table 6
  May 1949.
Turing after 1948-49 and his
          changing interests
• After the practical successes at Manchester in
  1948, Turing became a thinker and a
  documenter again – he created the
  programming manual for the Manchester
  Mark 1, later the Ferranti Mark 1
• He moved to thinking about AI and machine
  learning and how machines, and abstract
  ‘minds’ might re-design themselves – resulting
  in the “Turing test” paper of 1950
Source books & papers
1.   Campbell-Kelly, Martin & Aspray, William, Computer: A History of the
     information machine, Basic Books, New York, 1996
2.   B. Jack Copeland & others, Colossus: The Secrets of Bletchley Park’s
     Codebreaking Computers, Oxford University Press, 2006
3.   Hinsley, F.H. & Stripp, A., Eds.: Codebreakers: The inside story of Bletchley
     Park, OUP, 1993
4.   Lavington, Simon H. Early British Computers: The story of vintage
      computers & the people who built them, Manchester University Press
      1980; and A History of Manchester Computers, British Computer
      Society, Swindon, 1998
5.   Singh, Simon The Code Book: The Secret History of Codes &
      Codebreaking, Fourth Estate, London 1999
6.   Leavitt, D. The man who knew too much: Alan Turing & the invention of
     the Computer, Phoenix, London, 2007
7.   Smith, Michael, Station X: The Codebreakers of Bletchley Park, Pan
     Books, London, 2003

Weitere ähnliche Inhalte

Andere mochten auch (6)

The trans-Turing Machine
The trans-Turing MachineThe trans-Turing Machine
The trans-Turing Machine
 
The imatatation game
The imatatation gameThe imatatation game
The imatatation game
 
Turing machine
Turing machineTuring machine
Turing machine
 
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the worldCracking the Enigma Machine - Rejewski, Turing and the Math that saved the world
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world
 
Turing machines
Turing machinesTuring machines
Turing machines
 
Turing machine by_deep
Turing machine by_deepTuring machine by_deep
Turing machine by_deep
 

Ähnlich wie Alan turing's work before, during & after bletchley park

History of computers - Modern
History of computers - ModernHistory of computers - Modern
History of computers - Modern
Damian T. Gordon
 
Below you will find an outline for an informative speech.pdf
Below you will find an outline for an informative speech.pdfBelow you will find an outline for an informative speech.pdf
Below you will find an outline for an informative speech.pdf
study help
 
A short history of computational complexity
A short history of computational complexityA short history of computational complexity
A short history of computational complexity
sugeladi
 

Ähnlich wie Alan turing's work before, during & after bletchley park (20)

Alan M. Turing and the Enigma Machine
Alan M. Turing and the Enigma MachineAlan M. Turing and the Enigma Machine
Alan M. Turing and the Enigma Machine
 
The Engima Cipher
The Engima CipherThe Engima Cipher
The Engima Cipher
 
The Enigma and How it was Cracked
The Enigma and How it was CrackedThe Enigma and How it was Cracked
The Enigma and How it was Cracked
 
Turing Machine.pptx
Turing Machine.pptxTuring Machine.pptx
Turing Machine.pptx
 
History of computers - Modern
History of computers - ModernHistory of computers - Modern
History of computers - Modern
 
Foundation of computing history final
Foundation of computing history finalFoundation of computing history final
Foundation of computing history final
 
Below you will find an outline for an informative speech.pdf
Below you will find an outline for an informative speech.pdfBelow you will find an outline for an informative speech.pdf
Below you will find an outline for an informative speech.pdf
 
Time series anomaly discovery with grammar-based compression
Time series anomaly discovery with grammar-based compressionTime series anomaly discovery with grammar-based compression
Time series anomaly discovery with grammar-based compression
 
Enigma History
Enigma HistoryEnigma History
Enigma History
 
History of Computer
History of ComputerHistory of Computer
History of Computer
 
fored
foredfored
fored
 
Examples of operational research
Examples of operational researchExamples of operational research
Examples of operational research
 
Lecture 2: Language
Lecture 2: LanguageLecture 2: Language
Lecture 2: Language
 
A history of (Nordic) compilers and autocodes
A history of (Nordic) compilers and autocodesA history of (Nordic) compilers and autocodes
A history of (Nordic) compilers and autocodes
 
Historical background of ICT
Historical background of ICTHistorical background of ICT
Historical background of ICT
 
A short history of computational complexity
A short history of computational complexityA short history of computational complexity
A short history of computational complexity
 
NP completeness
NP completenessNP completeness
NP completeness
 
Lattices
LatticesLattices
Lattices
 
Hci history
Hci historyHci history
Hci history
 
Spring12_topic01.ppt
Spring12_topic01.pptSpring12_topic01.ppt
Spring12_topic01.ppt
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 

Alan turing's work before, during & after bletchley park

  • 1. The World of Alan Turing, or From the Turing machine to the first commercially-available (general purpose) computer
  • 2. The paper “On computable numbers…” (1936-7) • This paper introduced 3 (principal) ideas or concepts – the Turing machine, with its read- write head, 4 basic commands and its tape as the ‘memory’ • The machine description, which Turing refers to as the m-configuration (its collection of – finite – states, thinking in terms of automata) • The idea of the machine which can read – and operate on – its own description… the universal Turing machine (as a way of tackling the Entscheidungsproblem)
  • 3. Look first at the Machine and its m- configuration - from Marvin Minsky’s text “Computation” Turing expresses the m- configuration as a table in which the rows are ‘action descriptions’, e.g. (A)print 0; move 1 square to the right (B) Move 1 square to the right (C) Print 1; move 1 square to the right (D) Move 1 square to the right and go to (A) Printing 010101…..
  • 4. Now look at the notion of the Universal (Turing) machine • This is a machine which can read a series of m- configurations and thus ultimately operate to any specifiable computational sequence (an algorithm) [ of course, not all such algorithmic operations are deterministic – i.e. produce a defined result, which is repeatable ] The importance of this notion is its universality – it is a way of ‘interpreting’ any expression of an algorithm (and thus in our terms, any program)
  • 5. How did Turing become involved in cracking the Enigma code? • He initially built on the work of the Polish team led by Marian Rejewski, who had catalogued patterns based on the first 6 letters of intercepted messages:- Enigma messages start with the 3 – letter message key & its repetition, for example the sequence L O K R G M, in which L and R encrypt the same letter, the first in the message-key. This tells us that L and R are related by the initial setting of the Enigma machine
  • 6. If you have 4 messages, starting with • If enough messages are the 6 letters of repeated received in a day, patterns key - Message 1 - L O K R G M can be discerned, for Message 2 - M V T X Z E example if you have a Message 3 - J K T M P E complete set of 1st and 4th Message 4 - D V Y P Z X letters – ABCDEFGHIJKLMNOPQRSTU Now we can see how V W X Y Z and letters are encoded in these messages – FQHPLWOGBMVRXUYCZITN JEASDK 1st letter Now we see that A is linked to F; look ABCDEFGHIJKLMNOP… up F on the top row, it is linked to W; look up W on the top row, it is linked 4th letter to A – which is where we started. P M RX
  • 7. Think now of how the Enigma machine is constructed -
  • 8. The Enigma shown has 3 scramblers (rotors) • If we think of the relations previously described between the 1st and 4th letters, we see a ‘chain’, here - in the simplest case – A->F->W->A (with 3 links) • It can be shown that the number of links in these (multiple) chains is wholly dependent on the scrambler settings: Rejewski’s team catalogued the chain lengths generated by each of the 105,456 scrambler settings. Now each day messages were received, they could see the first 6 letters and thus identify the chains and the scrambler settings that created them. Thus the scrambler part of the day-key has been separated from the extra encoding performed by the plugboard, which operates as a straightforward substitution (e.g. R may be plugged to L), operating each time a certain letter is encyphered.
  • 9. When Rejewski’s team met Knox & Turing In July 1939 in a hut in the Pyry forest outside Warsaw, the French intelligence service arranged a meeting between the British cipher service and the Polish team. This meeting resulted in the handing over of a reconstructed Enigma, a number of bombes of Polish design, and the basis for cracking the Enigma messages using a 3-rotor Enigma.
  • 10. Issues While the Poles had devised a method for cracking Enigma, it is perhaps important to note that a major reason for the meeting was an increase in the design complexity of message coding by the Germans – • 2 more rotors so that 3 were chosen from 5 • No. of plugboard cables up from 6 to 10 The Polish methods could not handle these changes!
  • 11. Start of operations at Bletchley Park (“phoney war”) When Turing joined Bletchley Park, others like Gordon Welchman had already arrived and were preparing the ground for the codebreaking work. There was a heirarchy being built up to provide support & services to interact with the codebreakers & lots of others, some known to Turing, became involved. Among these were Max Newman, his mentor at Cambridge in much of his work.
  • 12. Members of the initial heirarchy at Bletchley Park
  • 13. The different Enigma designs – Abwehr, Kriegsmarine, Luftwaffe The German army, navy and airforce used Enigma designs of varying complexity – • The army & airforce used 3 rotors chosen from 5, • The navy 3 or later 4 from a total of 8 The teams at Bletchley were able to develop techniques in Bombe design & usage to handle army/airforce and navy messages up to the first battle of the Atlantic. However, as U-boat usage of codes and keys became more sophisticated, decoding difficulties were increased and new strategies and techniques were needed.
  • 14. The problems come to a peak In 1942 and early 1943, there was an 8 month break in being able to solve Enigma messages from the navy and the U-boats – • Attacks in the Atlantic were intensifying • 4-rotor Enigmas had been introduced The technique known as ‘gardening’ was the only real answer Bletchley had. A new strategy was needed. The study of ‘Fish’ was vital.
  • 15. ‘Dilly’ Knox dies, having broken the Abwehr Enigma • Knox was a scholar & academic, not a mathematician (but he was originally attached to Admiralty room 40). He suffered from cancer and died in Feb. 1943. • He was determined to create a break into the Abwehr Enigma so that the Double-Cross messages sent via turned German agents could be verified as being ‘believed’ in Berlin. He succeeded in Dec. 1941. • Once it was known that Double-Cross worked, continuing to read Abwehr Enigma messages became fundamental.
  • 16. The Lorenz messages (“Tunny”) The German high command centres used teleprinter-based messaging, not Enigma. Messages were encoded and sent using teleprinter code from 2 centres, on various routes manned by Axis forces. It was these messages that determined the movement and disposition of troops, and following the losses in the Russian and desert campaigns they became vital to intelligence. They were encoded using the Lorenz ciphers.
  • 17. How was Lorenz different? • There were 3 Lorenz designs, but in general, Lorenz used twelve wheels or rotors in two groups. 5 were used separately to encode, 5 more could be used either in unison or in tandem to break up the message • There were 2 motor wheels which controlled the two groups of 5 • The encoding wheels were not connected at every letter and the inter-rotor connecting circuits were varied frequently.
  • 18. The machines used to break Lorenz ciphers Initially, there was Heath-Robinson, a machine which read 2 tapes, one the encoded message and the second an example decode based on a chosen setting of the encoding wheels. Because tapes were read at a maximum speed to try and solve the complexity of having to try many wheel settings, this machine had many problems with breaking and tearing tapes.
  • 19. Enter the Post Office research station team At Dollis Hill the GPO had an engineering team developing electronics for working on advanced exchange design – • Valve electronics so reliability issues, but • Circuitry design was advanced and offered complex functionality Tommy Flowers, head of the Dollis Hill team, was certain a machine could be designed to overcome the Heath-Robinson problems: Max Newman & Donald Michie are generally credited with the overall Colossus design
  • 20. Colossus I • 1500 valves, reads only 1 tape and stores the encoded message within machine ‘memory’ • Uses algorithms to test possible wheel-setting combinations to analyse decodes of the message statistically • Results can be printed to enable the most likely settings on which to concentrate efforts. Delivered to Bletchley December 1943.
  • 21. Colossus II and the timing of efforts • 2500 valves bringing more memory & power • 5 different encodings can be processed together – stops breaks when no decodes. Combined the advantages of the original design -> The most successful design – eventually 10 were delivered! The new Colossus was first delivered a few days before D-day and this allowed 2 simultaneous attacks – disinformation and codebreaking.
  • 22. Colossus design - modular
  • 23. War ends – what happened next? Bletchley Park was closed and there was a bonfire to avoid secret information being retained. The computing research efforts continued in 4 or 5 groups, some of which had already started during the War – Radar at Malvern, NPL, Manchester, Cambridge, others TOWARDS THE FIRST STORED- PROGRAM COMPUTERS – ON SALE!
  • 25. Main development groups in 1946 • NPL where Turing began initially after the War – attached to atomic energy research site at Harwell, very bureaucratic, already secretive • Manchester University where memory advances came together and where Newman started the design lab. – birth of the 3 registers (A, B, and the combined C- PI & program counter). Turing joined him later. • Cambridge under Hartree and then Wilkes – a pragmatic approach based on human “computers”- produced EDSAC and then LEO.
  • 26. The different approaches • NPL was where Turing originated the design for the ACE – not commercially available till after he died • Manchester was where the first stored- program computer actually ran a program- an advance impossible without perfecting the Williams-Kilburn tube used as a program store • Cambridge started after the Moore school work and chose a more pragmatic approach
  • 27. The Manchester “Baby” and the advances that followed there This basic “fetch cycle” design was varied and improved on several times at Manchester University computing lab. – storage was increased (to 8k words) to provide more flexibility and allow different usage strategies
  • 28. The Moore school ideas & Maurice Wilke’s work at Cambridge • Cambridge computing lab. started in 1937 with a differential analyser & desk calculators. • After the war Wilkes got J. von Neumann’s “Draft report on the EDVAC” and later went to a Moore school course. The Moore school had built ENIAC but it only worked in Nov. ’45. • Wilkes’ computer- EDSAC - used the same delay-line technology as ENIAC- 4 to 32 delay lines, 3000 valves. Printed a squares table 6 May 1949.
  • 29. Turing after 1948-49 and his changing interests • After the practical successes at Manchester in 1948, Turing became a thinker and a documenter again – he created the programming manual for the Manchester Mark 1, later the Ferranti Mark 1 • He moved to thinking about AI and machine learning and how machines, and abstract ‘minds’ might re-design themselves – resulting in the “Turing test” paper of 1950
  • 30. Source books & papers 1. Campbell-Kelly, Martin & Aspray, William, Computer: A History of the information machine, Basic Books, New York, 1996 2. B. Jack Copeland & others, Colossus: The Secrets of Bletchley Park’s Codebreaking Computers, Oxford University Press, 2006 3. Hinsley, F.H. & Stripp, A., Eds.: Codebreakers: The inside story of Bletchley Park, OUP, 1993 4. Lavington, Simon H. Early British Computers: The story of vintage computers & the people who built them, Manchester University Press 1980; and A History of Manchester Computers, British Computer Society, Swindon, 1998 5. Singh, Simon The Code Book: The Secret History of Codes & Codebreaking, Fourth Estate, London 1999 6. Leavitt, D. The man who knew too much: Alan Turing & the invention of the Computer, Phoenix, London, 2007 7. Smith, Michael, Station X: The Codebreakers of Bletchley Park, Pan Books, London, 2003

Hinweis der Redaktion

  1. The talk is not just about Turing, but rather about what he started, namely the computer program, and how it was done, and how this work developed
  2. Of course this summary of the paper is incomplete- principally, it doesn’t talk about the 4 basic commands - but it draws out the important principles which were built upon to create computers.
  3. Here we see a machine with 3 scramblers and a plugboard at the front. Some machines had 4 scramblers; each scrambler was picked from a set (if there were 3 to be picked, the set would be of 5; if there were 4 to be picked, it might be of 6 or more)
  4. The emphasis (italics) is there to show that if you unplug the plugboard cables in a (replica) Enigma, set up with the scramblers, type in the encrypted message, then a resemblance to real German would normally be discerned
  5. This may be a good time to talk a little about the teams at Bletchley and answer any questions about the leaders in Bletchley- not Turing!
  6. It may be worth noting here that the U-boat code Shark was broken into again, following the capture of a submarine’s codebook, and continued to be read with breaks in late 1943 because boats with 4 rotor Enigmas had to signal port authorities with 3 rotor machines.
  7. Note here that teleprinter code is not all letters or even just letters and numbers- so wheels had more than 26 teeth and in fact differed as to how many teeth were on each wheel – come back to this when talking through the next slide.
  8. Here elaborate on how Tutte worked out the construction of the Lorenz from a repeated message of nearly 4000 characters.
  9. This might be good time to show pictures of the Lorenz machine and Colossus and allow a Q & A break! Any engineers in audience, etc.?
  10. Here talk about disinformation as to where the D-day attack would come ashore, and the use of the mole Cairncross. Also the decode break after D-day, in August-September-early October.
  11. You should have talked about Newman as Turing’s mentor by now, also the secrecy that surrounded everyone once involved in Bletchley.
  12. Here you can talk about the multi-layer memory in the ACE design, the Baby design and the EDSAC (which still used delay-line memory) v. EDVAC.
  13. People may want to ask questions as to the design of the Baby(previous slide) in more detail, and in comparison with the technology used in EDSAC.