Breaking Teleprinter Ciphers at Bletchley Park -  - E-Book

Breaking Teleprinter Ciphers at Bletchley Park E-Book

4,8
131,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a variety of contexts arising out of several separate but intersecting story lines, some only implicit in the GRT. * Explores the likely roots of the ideas entering into the Tunny cryptanalysis * Includes examples of original worksheets, and printouts of the Tunny-breaking process in action * Presents additional commentary, biographies, glossaries, essays, and bibliographies

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 1664

Veröffentlichungsjahr: 2015

Bewertungen
4,8 (18 Bewertungen)
15
3
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



IEEE Press

445 Hoes Lane

Piscataway, NJ 08854

 

IEEE Press Editorial Board

Tariq Samad, Editor in Chief

 

George W. Arnold

Vladimir Lumelsky

Linda Shafer

Dmitry Goldgof

Pui-In Mak

Zidong Wang

Ekram Hossain

Jeffrey Nanzer

MengChu Zhou

Mary Lanzerotti

Ray Perez

George Zobrist

 

Kenneth Moore, Director of IEEE Book and Information Services (BIS)

BREAKING TELEPRINTER CIPHERS AT BLETCHLEY PARK

An edition of

I. J. Good, D. Michie and G. Timms

GENERAL REPORT ON TUNNY WITH EMPHASIS ON STATISTICAL METHODS (1945)

Edited and with introductions and notes by

James A. Reeds, Whitfield Diffie and J. V. Field

Copyright © 2015 by The Institute of Electrical and Electronics Engineers, Inc., and © Crown Copyright.

All material (textual and photographic images) copied from The National Archives of the UK, and from the Government Communications Headquarters is Crown Copyright, and is used with permission of The National Archives of the UK, and of the Director, GCHQ.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey. All rights reserved.

Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic format. For information about Wiley products, visit our web site at www.wiley.com.

Library of Congress Cataloging-in-Publication is available.

ISBN 978-0-470-46589-9

Printed in the United States of America.

Guide

Cover

Table of Contents

Preface

Pages

xiii

xiv

xiv

xv

xvii

xviii

xix

xx

xxi

xxii

xxiii

xxiv

xxv

xxvi

xxvii

xxviii

xxix

xxx

xxxi

xxxii

xxxiii

xxxiv

xxxv

xxxvi

xxxvii

xxxviii

xxxix

xl

xli

xlii

xliii

xliv

xlv

xlvi

xlvii

xlviii

xlix

l

li

lii

liii

liv

lv

lvi

lvii

lviii

lix

lx

lxi

lxii

lxiii

lxiv

lxv

lxvi

lxvii

lxviii

lxix

lxx

lxxi

lxxii

lxxiii

lxxiv

lxxv

lxxvi

lxxvii

lxxviii

lxxix

lxxx

lxxxi

lxxxii

lxxxiii

lxxxiv

lxxxv

lxxxvi

lxxxvii

lxxxviii

lxxxix

xc

xci

xcii

xciii

xciv

xcv

xcvi

xcvii

xcviii

xcix

c

ci

ciii

civ

cv

cvi

cvii

cix

cx

cxi

3

4

5

6

7

8

9

10

11

12

13

14

16

17

18

19

20

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

164

180

181

182

183

184

185

186

187

188

189

190

191

192

194

195

196

197

198

199

202

203

204

205

207

208

210

211

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

262

263

264

265

266

267

268

269

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

381

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

453

454

455

444

445

446

447

448

449

450

451

452

453

454

455

456

457

458

459

460

461

462

463

464

465

466

467

468

471

472

473

474

475

476

477

478

479

480

481

482

483

484

485

486

487

488

489

490

491

492

493

495

496

497

498

499

500

501

502

503

504

505

506

507

508

509

510

511

512

513

514

515

516

517

518

519

520

521

522

524

525

526

527

528

529

530

531

532

533

534

535

536

537

538

539

540

541

547

548

549

550

551

552

553

554

555

556

557

558

559

560

561

624

633

645

Preface

This volume has its origins in a meeting of the British Society for the History of Mathematics held in Cambridge (UK) in 2000. The subject was the history of cryptography and one of the speakers, Prof. Donald Michie, used the occasion to announce that it had been agreed that the Report of the group of cryptographers to which he had belonged at Bletchley Park during the Second World War was to be declassified. This was the group that had designed and used the Colossus machines, so the planned declassification was of great interest to historians of computing as well as to historians of cryptography. The audience decided there and then that the book, which at the time no one present except Prof. Michie had seen, should be published. The present volume is the product of that resolution.

We are grateful to the Royal Society (London) for a grant that enabled us to pay for professional help in carrying out what proved to be an intricate task in typography. We are grateful to John Gilmore for providing additional financial support for the initial stage of the typesetting. We are grateful also to the Newcomen Society, which acted as our banker.

Many friends and colleagues have given us various forms of support and encouragement in our editorial work. Our greatest debts are to the late Prof. I. J. Good and the late Prof. Donald Michie, who were patient and generous in dealing with appeals for information and guidance. We are also grateful to the following: Prof. Richard Aldrich, Steve Boyack, A. O. Bauer, Prof. Colin Burke, Pam Camp, Ray Chase, Tom Collins, David DeGeorge, Gina Douglas and John Parmenter, Ralph Erskine, Frederika and Stephen Freer, David Goldschmidt, Ruth Greenstein, David Hamer, Barbara Hamilton, Mrs Vicki Hammond, Robert Hanyok, Jim Haynes, Ms Marit Hartveit, Grete Heinz, David Kahn, the late Hans-Georg Kampe, Joy MacCleary (ne´e Timms), the late Dr Bera MacClement (ne´e Timms), Bob McGwire, Marjorie McNinch, Alex Magoun, Ross Moore, Ned Neuburg, Selmer Norlund, Harris Nover, Sharon Olson, Jon D. Paul, John O'Rourke, H. N. Reeds, Karen Reeds, Randy Rezabek, the late Tony Sale, David Saltman, John N. Seaman, Jr, William Seaman, Betsy Rohaly Smoot, Christoph Steger, Rene´ Stein, Elaine Tennant, Frode Weierud, Tom Whitmore, Bill Williams, the late Shaun Wylie, Prof. Sandy Zabell, the current Departmental Historian of GCHQ, Tony Comer, and his predecessor, and his predecessor, the late Peter Freeman, and the staffs of the David Sarnoff Library, Princeton, New Jersey, the Hagley Museum and Library, Wilmington, Delaware, the Linda Hall Library, Kansas City, Missouri, the National Archives of the United Kingdom, the National Archives of the United States, and the National Cryptologic Museum, Ft. Meade, Maryland.

In addition, J. V. Field is grateful to Dr A. E. L. Davis, Dr J. Barrow-Green, Prof. Graeme Gooday, the late Prof. A. R. Hall, Prof. Frank A. J. L. James, Prof. Jonathan Michie, Alec Muffett, C. J. Reid and Dr K. C. Sugden for help on historical or technical points and occasional practical assistance. Thanks are also due to the archivists of various institutions: from Cambridge the archivists of Magdalene, Queens', St John's, Sidney Sussex and Trinity Colleges, and of Trinity Hall, from Oxford the archivists of New College, Balliol, Magdalen, Merton, Queen's and Wadham Colleges, and the university archivist; and the archivists of Imperial College, London, of the Royal Aeronautical Society, London, and of the former Beaumont College (Old Windsor).

J. A. Reeds, Princeton

W. Diffie, Woodbridge

J. V. Field, London

Editorial Notes

1. The essay ‘Statistics at Bletchley Park’, the editorial endnotes to the text of the General Report on Tunny, and the Appendices have been subject to review by the U.S. Department of Defense.

2. To avoid repetition in the introductory essays and editorial endnotes, we have provided a set of short biographies of people mentioned in the General Report on Tunny and other primary sources cited in this volume. In particular we have sought to include anyone we had occasion to refer to as having worked at Bletchley Park. There are also brief notes on a few famous people whose work was used at Bletchley Park, such as Bayes and Laplace. There are longer biographies of the three editors of the original Report.

3. The text of the General Report on Tunny used for our edition is held in the UK National Archives (TNA). Unless otherwise noted, material on pp. 1–258 is from TNA HW 25/4 and that on pp. 258–493 from TNA HW 25/5. The text, together with accompanying artwork, is Crown Copyright.

Notes on Vocabulary

In 2015, a cryptographer is the person making ciphers or encrypting texts, a cryptanalyst is the one breaking ciphers in order to read the original plain text. Obviously, each needs to know something of the craft practised by the other and at Bletchley Park it seems to have been usual to use the term ‘cryptographer’ in referring to both types of practitioner. The term ‘cryptanalyst’ was known at the time but seems to have been widely used in England only after the war. When engaging directly with texts of the 1940s we have generally adopted ‘cryptographer’ (using ‘actors’ categories') but on occasion the newer, narrower term has been used for the sake of clarity.

The authors of the General Report on Tunny worked in an institution whose title was ‘Government Code and Cypher School’. This title implies that in formal usage, at least, there was a distinction between the terms ‘code’ and ‘cipher’. In technical usage, a code is a system of some kind for conveying information, a cipher is a system for concealing information. However, the authors of the General Report on Tunny often use the term ‘code’ instead of ‘cipher’. We have made no attempt to correct these technically incorrect uses of ‘code’. No doubt in 1945, as in 2015, such usage was acceptable in a colloquial context. Our own text uses ‘cipher’ where appropriate.

The ‘Glossary’ of the General Report on Tunny (chapter 71) makes its own usages clear by supplying the definition ‘CRYPTOGRAPHY The science of breaking codes and ciphers. Usually applied specifically to hand processes.’ It refers the reader to chapter 39 section B for details.

List of Abbreviations

We list here bibliographic abbreviations. Organisational abbreviations used in wartime sources, such as ‘GCCS’ for ‘Government Code and Cypher School’, will be found in one of the two glossaries below: the original ‘Glossary’ provided in 1945 (chapter 71 of the General Report on Tunny, pp. 400-446; this edition, pp. 387-434) or the ‘Supplementary Glossary’ provided by the present editors (pp. 542-546). Throughout this book we use a bold face to indicate chapter and section numbers in the original text of the General Report on Tunny. Throughout this book, URL visit dates are given in day/month/year format.

GRT

General Report on Tunny, with Emphasis on Statistical Methods,

TNA HW 25/4 and HW 25/5. See

‘Report’

below.

NARA

United States National Archives and Records Administration; the College Park, Maryland branch holding the records we cite.

ODNB

Oxford Dictionary of National Biography (Oxford Dictionary of National Biography: In Association with the British Academy: From the Earliest Times to the Year 2000,

ed. by H.C.G. Matthew and Brian Harrison (London: Oxford University Press, 2004), URL:

http://www.oxforddnb.com/subscribed/

(visited on 07/06/2014)).

Report

General Report on Tunny, with Emphasis on Statistical Methods.

We use this term ambiguously, to refer both to the text of the

Report,

an edition of which we present in this volume, and to the physical artefact in the archives, items TNA HW 25/4 and 25/5: the ‘original

Report’.

TNA

The National Archives of the United Kingdom, located in Kew, Surrey.

Cryptanalytic Significance of the Analysis of Tunny

Whitfield Diffie

The analyses conducted at Bletchley Park of the higher-grade German cryptosystems — above the division-level Enigma system — are usually viewed in the military-historical context of their impact on the course of the Second World War. Also well known is the role this analysis played in the construction of Colossus, immediate ancestor of modern stored-program digital computers. What is less well known is the significance of the analytic process of which Colossus was but a part. The Lorenz SZ 40 and the Siemens and Halske T52 were given the cover names Tunny and Sturgeon by the British and collectively referred to as ‘Fish’. Although these systems are crude by the standards of systems to follow within a decade, they look more like the binary systems that came to dominate cryptography than they do like the Enigma with its 26-letter rotors. The attack on Tunny can thus be seen as the first major ‘modern’ cryptanalysis.

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!