131,99 €
This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a variety of contexts arising out of several separate but intersecting story lines, some only implicit in the GRT. * Explores the likely roots of the ideas entering into the Tunny cryptanalysis * Includes examples of original worksheets, and printouts of the Tunny-breaking process in action * Presents additional commentary, biographies, glossaries, essays, and bibliographies
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 1664
Veröffentlichungsjahr: 2015
IEEE Press
445 Hoes Lane
Piscataway, NJ 08854
IEEE Press Editorial Board
Tariq Samad, Editor in Chief
George W. Arnold
Vladimir Lumelsky
Linda Shafer
Dmitry Goldgof
Pui-In Mak
Zidong Wang
Ekram Hossain
Jeffrey Nanzer
MengChu Zhou
Mary Lanzerotti
Ray Perez
George Zobrist
Kenneth Moore, Director of IEEE Book and Information Services (BIS)
An edition of
I. J. Good, D. Michie and G. Timms
GENERAL REPORT ON TUNNY WITH EMPHASIS ON STATISTICAL METHODS (1945)
Edited and with introductions and notes by
James A. Reeds, Whitfield Diffie and J. V. Field
Copyright © 2015 by The Institute of Electrical and Electronics Engineers, Inc., and © Crown Copyright.
All material (textual and photographic images) copied from The National Archives of the UK, and from the Government Communications Headquarters is Crown Copyright, and is used with permission of The National Archives of the UK, and of the Director, GCHQ.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey. All rights reserved.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic format. For information about Wiley products, visit our web site at www.wiley.com.
Library of Congress Cataloging-in-Publication is available.
ISBN 978-0-470-46589-9
Printed in the United States of America.
Cover
Table of Contents
Preface
xiii
xiv
xiv
xv
xvii
xviii
xix
xx
xxi
xxii
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
xxxvii
xxxviii
xxxix
xl
xli
xlii
xliii
xliv
xlv
xlvi
xlvii
xlviii
xlix
l
li
lii
liii
liv
lv
lvi
lvii
lviii
lix
lx
lxi
lxii
lxiii
lxiv
lxv
lxvi
lxvii
lxviii
lxix
lxx
lxxi
lxxii
lxxiii
lxxiv
lxxv
lxxvi
lxxvii
lxxviii
lxxix
lxxx
lxxxi
lxxxii
lxxxiii
lxxxiv
lxxxv
lxxxvi
lxxxvii
lxxxviii
lxxxix
xc
xci
xcii
xciii
xciv
xcv
xcvi
xcvii
xcviii
xcix
c
ci
ciii
civ
cv
cvi
cvii
cix
cx
cxi
3
4
5
6
7
8
9
10
11
12
13
14
16
17
18
19
20
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
164
180
181
182
183
184
185
186
187
188
189
190
191
192
194
195
196
197
198
199
202
203
204
205
207
208
210
211
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
262
263
264
265
266
267
268
269
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
381
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
453
454
455
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
624
633
645
This volume has its origins in a meeting of the British Society for the History of Mathematics held in Cambridge (UK) in 2000. The subject was the history of cryptography and one of the speakers, Prof. Donald Michie, used the occasion to announce that it had been agreed that the Report of the group of cryptographers to which he had belonged at Bletchley Park during the Second World War was to be declassified. This was the group that had designed and used the Colossus machines, so the planned declassification was of great interest to historians of computing as well as to historians of cryptography. The audience decided there and then that the book, which at the time no one present except Prof. Michie had seen, should be published. The present volume is the product of that resolution.
We are grateful to the Royal Society (London) for a grant that enabled us to pay for professional help in carrying out what proved to be an intricate task in typography. We are grateful to John Gilmore for providing additional financial support for the initial stage of the typesetting. We are grateful also to the Newcomen Society, which acted as our banker.
Many friends and colleagues have given us various forms of support and encouragement in our editorial work. Our greatest debts are to the late Prof. I. J. Good and the late Prof. Donald Michie, who were patient and generous in dealing with appeals for information and guidance. We are also grateful to the following: Prof. Richard Aldrich, Steve Boyack, A. O. Bauer, Prof. Colin Burke, Pam Camp, Ray Chase, Tom Collins, David DeGeorge, Gina Douglas and John Parmenter, Ralph Erskine, Frederika and Stephen Freer, David Goldschmidt, Ruth Greenstein, David Hamer, Barbara Hamilton, Mrs Vicki Hammond, Robert Hanyok, Jim Haynes, Ms Marit Hartveit, Grete Heinz, David Kahn, the late Hans-Georg Kampe, Joy MacCleary (ne´e Timms), the late Dr Bera MacClement (ne´e Timms), Bob McGwire, Marjorie McNinch, Alex Magoun, Ross Moore, Ned Neuburg, Selmer Norlund, Harris Nover, Sharon Olson, Jon D. Paul, John O'Rourke, H. N. Reeds, Karen Reeds, Randy Rezabek, the late Tony Sale, David Saltman, John N. Seaman, Jr, William Seaman, Betsy Rohaly Smoot, Christoph Steger, Rene´ Stein, Elaine Tennant, Frode Weierud, Tom Whitmore, Bill Williams, the late Shaun Wylie, Prof. Sandy Zabell, the current Departmental Historian of GCHQ, Tony Comer, and his predecessor, and his predecessor, the late Peter Freeman, and the staffs of the David Sarnoff Library, Princeton, New Jersey, the Hagley Museum and Library, Wilmington, Delaware, the Linda Hall Library, Kansas City, Missouri, the National Archives of the United Kingdom, the National Archives of the United States, and the National Cryptologic Museum, Ft. Meade, Maryland.
In addition, J. V. Field is grateful to Dr A. E. L. Davis, Dr J. Barrow-Green, Prof. Graeme Gooday, the late Prof. A. R. Hall, Prof. Frank A. J. L. James, Prof. Jonathan Michie, Alec Muffett, C. J. Reid and Dr K. C. Sugden for help on historical or technical points and occasional practical assistance. Thanks are also due to the archivists of various institutions: from Cambridge the archivists of Magdalene, Queens', St John's, Sidney Sussex and Trinity Colleges, and of Trinity Hall, from Oxford the archivists of New College, Balliol, Magdalen, Merton, Queen's and Wadham Colleges, and the university archivist; and the archivists of Imperial College, London, of the Royal Aeronautical Society, London, and of the former Beaumont College (Old Windsor).
J. A. Reeds, Princeton
W. Diffie, Woodbridge
J. V. Field, London
1. The essay ‘Statistics at Bletchley Park’, the editorial endnotes to the text of the General Report on Tunny, and the Appendices have been subject to review by the U.S. Department of Defense.
2. To avoid repetition in the introductory essays and editorial endnotes, we have provided a set of short biographies of people mentioned in the General Report on Tunny and other primary sources cited in this volume. In particular we have sought to include anyone we had occasion to refer to as having worked at Bletchley Park. There are also brief notes on a few famous people whose work was used at Bletchley Park, such as Bayes and Laplace. There are longer biographies of the three editors of the original Report.
3. The text of the General Report on Tunny used for our edition is held in the UK National Archives (TNA). Unless otherwise noted, material on pp. 1–258 is from TNA HW 25/4 and that on pp. 258–493 from TNA HW 25/5. The text, together with accompanying artwork, is Crown Copyright.
In 2015, a cryptographer is the person making ciphers or encrypting texts, a cryptanalyst is the one breaking ciphers in order to read the original plain text. Obviously, each needs to know something of the craft practised by the other and at Bletchley Park it seems to have been usual to use the term ‘cryptographer’ in referring to both types of practitioner. The term ‘cryptanalyst’ was known at the time but seems to have been widely used in England only after the war. When engaging directly with texts of the 1940s we have generally adopted ‘cryptographer’ (using ‘actors’ categories') but on occasion the newer, narrower term has been used for the sake of clarity.
The authors of the General Report on Tunny worked in an institution whose title was ‘Government Code and Cypher School’. This title implies that in formal usage, at least, there was a distinction between the terms ‘code’ and ‘cipher’. In technical usage, a code is a system of some kind for conveying information, a cipher is a system for concealing information. However, the authors of the General Report on Tunny often use the term ‘code’ instead of ‘cipher’. We have made no attempt to correct these technically incorrect uses of ‘code’. No doubt in 1945, as in 2015, such usage was acceptable in a colloquial context. Our own text uses ‘cipher’ where appropriate.
The ‘Glossary’ of the General Report on Tunny (chapter 71) makes its own usages clear by supplying the definition ‘CRYPTOGRAPHY The science of breaking codes and ciphers. Usually applied specifically to hand processes.’ It refers the reader to chapter 39 section B for details.
We list here bibliographic abbreviations. Organisational abbreviations used in wartime sources, such as ‘GCCS’ for ‘Government Code and Cypher School’, will be found in one of the two glossaries below: the original ‘Glossary’ provided in 1945 (chapter 71 of the General Report on Tunny, pp. 400-446; this edition, pp. 387-434) or the ‘Supplementary Glossary’ provided by the present editors (pp. 542-546). Throughout this book we use a bold face to indicate chapter and section numbers in the original text of the General Report on Tunny. Throughout this book, URL visit dates are given in day/month/year format.
GRT
General Report on Tunny, with Emphasis on Statistical Methods,
TNA HW 25/4 and HW 25/5. See
‘Report’
below.
NARA
United States National Archives and Records Administration; the College Park, Maryland branch holding the records we cite.
ODNB
Oxford Dictionary of National Biography (Oxford Dictionary of National Biography: In Association with the British Academy: From the Earliest Times to the Year 2000,
ed. by H.C.G. Matthew and Brian Harrison (London: Oxford University Press, 2004), URL:
http://www.oxforddnb.com/subscribed/
(visited on 07/06/2014)).
Report
General Report on Tunny, with Emphasis on Statistical Methods.
We use this term ambiguously, to refer both to the text of the
Report,
an edition of which we present in this volume, and to the physical artefact in the archives, items TNA HW 25/4 and 25/5: the ‘original
Report’.
TNA
The National Archives of the United Kingdom, located in Kew, Surrey.
Whitfield Diffie
The analyses conducted at Bletchley Park of the higher-grade German cryptosystems — above the division-level Enigma system — are usually viewed in the military-historical context of their impact on the course of the Second World War. Also well known is the role this analysis played in the construction of Colossus, immediate ancestor of modern stored-program digital computers. What is less well known is the significance of the analytic process of which Colossus was but a part. The Lorenz SZ 40 and the Siemens and Halske T52 were given the cover names Tunny and Sturgeon by the British and collectively referred to as ‘Fish’. Although these systems are crude by the standards of systems to follow within a decade, they look more like the binary systems that came to dominate cryptography than they do like the Enigma with its 26-letter rotors. The attack on Tunny can thus be seen as the first major ‘modern’ cryptanalysis.
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!