Lorenz SZ 40
   HOME

TheInfoList



OR:

The Lorenz SZ40, SZ42a and SZ42b were German
rotor ROTOR was an elaborate air defence radar system built by the British Government in the early 1950s to counter possible attack by Soviet bombers. To get it operational as quickly as possible, it was initially made up primarily of WWII-era syst ...
stream cipher stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream ( keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystrea ...
machines used by the
German Army The German Army (, 'army') is the land component of the armed forces of Federal Republic of Germany, Germany. The present-day German Army was founded in 1955 as part of the newly formed West German together with the German Navy, ''Marine'' (G ...
during
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
. They were developed by C. Lorenz AG in
Berlin Berlin ( ; ) is the Capital of Germany, capital and largest city of Germany, by both area and List of cities in Germany by population, population. With 3.7 million inhabitants, it has the List of cities in the European Union by population withi ...
. The model name ''SZ'' is derived from ''Schlüssel-Zusatz'', meaning ''cipher attachment''. The instruments implemented a Vernam
stream cipher stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream ( keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystrea ...
. British
cryptanalyst Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
s, who referred to encrypted German
teleprinter A teleprinter (teletypewriter, teletype or TTY) is an electromechanical device that can be used to send and receive typed messages through various communications channels, in both point-to-point (telecommunications), point-to-point and point- ...
traffic as ''Fish'', dubbed the machine and its traffic ''Tunny'' (meaning tunafish) and deduced its logical structure three years before they saw such a machine. The SZ machines were in-line attachments to standard
teleprinter A teleprinter (teletypewriter, teletype or TTY) is an electromechanical device that can be used to send and receive typed messages through various communications channels, in both point-to-point (telecommunications), point-to-point and point- ...
s. An experimental link using SZ40 machines was started in June 1941. The enhanced SZ42 machines were brought into substantial use from mid-1942 onwards for high-level communications between the German High Command in
Wünsdorf Zossen (; , ) is a German town in the district of Teltow-Fläming in Brandenburg, about south of Berlin, and next to the Bundesstraße 96, B96 highway. Zossen consists of several smaller municipalities, which were grouped in 2003 to form the city ...
close to Berlin, and Army Commands throughout occupied Europe. The more advanced SZ42A came into routine use in February 1943 and the SZ42B in June 1944.
Radioteletype Radioteletype (RTTY) is a telecommunications system consisting originally of two or more electromechanical teleprinters in different locations connected by radio rather than a wired link. Radioteletype evolved from earlier landline teleprinter ...
(RTTY) rather than land-line circuits was used for this traffic. of ''German Tunny'' These
audio frequency shift keying Frequency-shift keying (FSK) is a frequency modulation scheme in which digital information is encoded on a carrier signal by periodically shifting the frequency of the carrier between several discrete frequencies. The technology is used for c ...
non-
Morse Morse may refer to: People * Morse (surname) * Morse Goodman (1917-1993), Anglican Bishop of Calgary, Canada * Morse Robb (1902–1992), Canadian inventor and entrepreneur Geography Antarctica * Cape Morse, Wilkes Land * Mount Morse, Churchi ...
(NoMo) messages were picked up by Britain's
Y-stations The "Y" service was a network of British signals intelligence collection sites, the Y-stations. The service was established during the First World War and used again during the Second World War. The sites were operated by a range of agencies inc ...
at
Knockholt Knockholt is a village and civil parish in the Sevenoaks District of Kent. It is located north west of Sevenoaks & south of Orpington, and is adjacent to the Kent border with Greater London. The village is mostly a ribbon development, surrou ...
in Kent, its outstation at
Higher Wincombe Higher Wincombe is a farm and small hamlet in the parish of Donhead St Mary, Wiltshire, England. It lies at the transition point between the plateau of Shaftesbury and the head of the Nadder Valley, just beyond the north-east edge of the town of ...
in Wiltshire, and at
Denmark Hill Denmark Hill is an area and road in Camberwell, in the London Borough of Southwark, London, England. It is a sub-section of the western flank of the Norwood Ridge, centred on the long, curved Ruskin Park slope of the ridge. The road is part of ...
in south London, and forwarded to the
Government Code and Cypher School The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
at
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
(BP). Some were deciphered using hand methods before the process was partially automated, first with Robinson machines and then with the
Colossus computer Colossus was a set of computers developed by British cryptanalysis, codebreakers in the years 1943–1945 to help in the cryptanalysis of the Lorenz cipher. Colossus used vacuum tube, thermionic valves (vacuum tubes) to perform Boolean algebra ...
s. The deciphered Lorenz messages made one of the most significant contributions to British ''
Ultra Ultra may refer to: Science and technology * Ultra (cryptography), the codename for cryptographic intelligence obtained from signal traffic in World War II * Adobe Ultra, a vector-keying application * Sun Ultra series, a brand of computer work ...
''
military intelligence Military intelligence is a military discipline that uses information collection and analysis List of intelligence gathering disciplines, approaches to provide guidance and direction to assist Commanding officer, commanders in decision making pr ...
and to Allied victory in Europe, due to the high-level strategic nature of the information that was gained from Lorenz decrypts.


History

After the Second World War, a group of British and US cryptanalysts entered Germany with the front-line troops to capture the documents, technology and personnel of the various German signal intelligence organizations before these secrets could be destroyed, looted, or captured by the Soviets. They were called the
Target Intelligence Committee TICOM (Target Intelligence Committee) was a secret Allied project formed in World War II to find and seize German intelligence assets, particularly in the field of cryptology and signals intelligence. It operated alongside other Western Allied e ...
: TICOM. From captured German cryptographers Drs Huttenhain and Fricke they learnt of the development of the SZ40 and SZ42 a/b. The design was for a machine that could be attached to any teleprinter. The first machine was referred to as the SZ40 (old type) which had ten rotors with fixed cams. It was recognised that the security of this machine was not great. The definitive SZ40 had twelve rotors with movable cams. The rightmost five rotors were called ''Spaltencäsar'' but named the ''Chi'' wheels by
Bill Tutte William Thomas Tutte (; 14 May 1917 – 2 May 2002) was an English and Canadian code breaker and mathematician. During the Second World War, he made a fundamental advance in cryptanalysis of the Lorenz cipher, a major Nazi German cipher system ...
. The leftmost five were named ''Springcäsar'', ''Psi'' wheels to Tutte. The middle two ''Vorgeleger'' rotors were called ''Mu'' or motor wheels by Tutte. The five data bits of each
ITA2 The Baudot code () is an early character encoding for telegraphy invented by Émile Baudot in the 1870s. It was the predecessor to the International Telegraph Alphabet No. 2 (ITA2), the most common teleprinter code in use before ASCII. Each Chara ...
-coded telegraph character were processed first by the five ''chi'' wheels and then further processed by the five ''psi'' wheels. The cams on the wheels reversed the value of a bit if in the raised position, but left it unchanged if in the lowered position.


Vernam cipher

Gilbert Vernam Gilbert Sandford Vernam (April 3, 1890 – February 7, 1960) was a Worcester Polytechnic Institute 1914 graduate and AT&T Bell Labs engineer who, in 1917, invented an additive polyalphabetic stream cipher and later co-invented an automated ...
was an
AT&T AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
Bell Labs Nokia Bell Labs, commonly referred to as ''Bell Labs'', is an American industrial research and development company owned by Finnish technology company Nokia. With headquarters located in Murray Hill, New Jersey, Murray Hill, New Jersey, the compa ...
research engineer who, in 1917, invented a cipher system in which the plaintext bitstream is enciphered by combining it with a random or pseudorandom bitstream (the "keystream") to generate the ciphertext. This combination is done using the
Boolean Any kind of logic, function, expression, or theory based on the work of George Boole is considered Boolean. Related to this, "Boolean" may refer to: * Boolean data type, a form of data with only two possible values (usually "true" and "false" ...
"exclusive or" (XOR) function, symbolised by ⊕. This is represented by the following "
truth table A truth table is a mathematical table used in logic—specifically in connection with Boolean algebra, Boolean functions, and propositional calculus—which sets out the functional values of logical expressions on each of their functional arg ...
", where 1 represents "true" and 0 represents "false". Other names for this function are: Not equal (NEQ),
modulo In computing and mathematics, the modulo operation returns the remainder or signed remainder of a division, after one number is divided by another, the latter being called the '' modulus'' of the operation. Given two positive numbers and , mo ...
2 addition (without 'carry') and modulo 2 subtraction (without 'borrow'). Vernam's cipher is a
symmetric-key algorithm Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between ...
, i.e. the same key is used both to encipher
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
to produce the
ciphertext In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext ...
and to decipher ciphertext to yield the original plaintext: and: This produces the essential reciprocity that allows the same machine with the same settings to be used for both encryption and decryption. Vernam's idea was to use conventional telegraphy practice with a paper tape of the plaintext combined with a paper tape of the key. Each key tape would have been unique (a
one-time tape The one-time pad (OTP) is an encryption technique that cannot be cracked in cryptography. It requires the use of a single-use pre-shared key that is larger than or equal to the size of the message being sent. In this technique, a plaintext is ...
), but generating and distributing such tapes presented considerable practical difficulties. In the 1920s four men in different countries invented rotor cipher machines to produce a key stream to act instead of a tape. The 1940 Lorenz SZ40/42 was one of these. of ''German Tunny''


Operating Principle

The logical functioning of the Tunny system was worked out well before the Bletchley Park cryptanalysts saw one of the machines—which only happened in 1945, as Germany was surrendering to the Allies. The SZ machine served as an in-line attachment to a standard Lorenz teleprinter. It had a metal base and was high. The teleprinter characters consisted of five data
bit The bit is the most basic unit of information in computing and digital communication. The name is a portmanteau of binary digit. The bit represents a logical state with one of two possible values. These values are most commonly represented as ...
s (or "impulses"), encoded in the International Telegraphy Alphabet No. 2 (ITA2). The SZ machine generated a stream of
pseudorandom A pseudorandom sequence of numbers is one that appears to be statistically random, despite having been produced by a completely deterministic and repeatable process. Pseudorandom number generators are often used in computer programming, as tradi ...
characters as the key that was combined with the plaintext input characters to form the ciphertext output characters. The combination was by means of the XOR (or modulo 2 addition) process. of ''German Tunny'' The key stream consisted of two component parts that were XOR-ed together. These were generated by two sets of five wheels which rotated together. The Bletchley Park cryptanalyst Bill Tutte called these the ''χ'' (" ''chi''") wheels, and the ''ψ'' (" ''psi''") wheels. Each wheel had a series of cams (or "pins") around their circumference. These cams could be set in a raised (active) or lowered (inactive) position. In the raised position they generated a '1' which reversed the value of a bit, in the lowered position they generated a '0' which left the bit unchanged. The number of cams on each wheel equalled the number of impulses needed to cause them to complete a full rotation. These numbers are all
co-prime In number theory, two integers and are coprime, relatively prime or mutually prime if the only positive integer that is a divisor of both of them is 1. Consequently, any prime number that divides does not divide , and vice versa. This is equiva ...
with each other, giving the longest possible time before the pattern repeated. This is the product of the number of positions of the wheels. For the set of ''χ'' wheels it was 41 × 31 × 29 × 26 × 23 = 22,041,682 and for the ''ψ'' wheels it was 43 × 47 × 51 × 53 × 59 = 322,303,017. The number of different ways that all twelve wheels could be set was i.e. 16 billion billion. The set of five ''χ'' wheels all moved on one position after each character had been enciphered. The five ''ψ'' wheels, however, advanced intermittently. Their movement was controlled by the two ''μ'' (" ''mu''") or "motor" wheels in series. of ''German Tunny'' The SZ40 ''μ''61 motor wheel stepped every time but the ''μ''37 motor wheel stepped only if the first motor wheel was a '1'. The ''ψ'' wheels then stepped only if the second motor wheel was a '1'. The SZ42A and SZ42B models added additional complexity to this mechanism, known at Bletchley Park as ''Limitations''. Two of the four different limitations involved characteristics of the plaintext and so were autoclaves. The key stream generated by the SZ machines thus had a ''χ'' component and a ''ψ'' component. Symbolically, the key that was combined with the plaintext for enciphering and with the ciphertext for deciphering, can be represented as follows. ::::key = ''χ''-key ⊕ ''ψ''-key However to indicate that the ''ψ'' component often did not change from character to character, the term ''extended psi'' was used, symbolised as: ''Ψ. So enciphering can be shown symbolically as: ::::plaintext ⊕ ''χ''-stream ⊕ ''ψ-stream = ciphertext and deciphering as: ::::ciphertext ⊕ ''χ''-stream ⊕ ''ψ-stream = plaintext.


Operation

Each "Tunny" link had four SZ machines with a transmitting and a receiving teleprinter at each end. For enciphering and deciphering to work, the transmitting and receiving machines had to be set up identically. There were two components to this; setting the patterns of cams on the wheels and rotating the wheels for the start of enciphering a message. The cam settings were changed less frequently before summer 1944. The ''ψ'' wheel cams were initially only changed quarterly, but later monthly, the ''χ'' wheels were changed monthly but the motor wheel patterns were changed daily. From 1 August 1944, all wheel patterns were changed daily. of ''German Tunny'' Initially the wheel settings for a message were sent to the receiving end by means of a 12-letter
indicator Indicator may refer to: Biology * Environmental indicator of environmental health (pressures, conditions and responses) * Ecological indicator of ecosystem health (ecological processes) * Health indicator, which is used to describe the health o ...
sent un-enciphered, the letters being associated with wheel positions in a book. In October 1942, this was changed to the use of a book of single-use settings in what was known as the QEP book. The last two digits of the QEP book entry were sent for the receiving operator to look up in his copy of the QEP book and set his machine's wheels. Each book contained one hundred or more combinations. Once all the combinations in a QEP book had been used it was replaced by a new one. The message settings should never have been re-used, but on occasion they were, providing a "depth", which could be utilised by a cryptanalyst. As was normal telegraphy practice, messages of any length were keyed into a
teleprinter A teleprinter (teletypewriter, teletype or TTY) is an electromechanical device that can be used to send and receive typed messages through various communications channels, in both point-to-point (telecommunications), point-to-point and point- ...
with a
paper tape Five- and eight-hole wide punched paper tape Paper tape reader on the Harwell computer with a small piece of five-hole tape connected in a circle – creating a physical program loop Punched tape or perforated paper tape is a form of data st ...
perforator. The typical sequence of operations would be that the sending operator would punch up the message, make contact with the receiving operator, use the ''EIN / AUS'' switch on the SZ machine to connect it into the circuit, and then run the tape through the reader. At the receiving end, the operator would similarly connect his SZ machine into the circuit and the output would be printed up on a continuous sticky tape. Because this was the practice, the plaintext did not contain the characters for "carriage return", "line feed" or the null (blank tape, 00000) character.


Cryptanalysis

British cryptographers at
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
had deduced the operation of the machine by January 1942 without ever having seen a Lorenz machine, a feat made possible thanks to mistakes made by German operators.


Interception

Tunny traffic was known by Y Station operators used to listening to
Morse code Morse code is a telecommunications method which Character encoding, encodes Written language, text characters as standardized sequences of two different signal durations, called ''dots'' and ''dashes'', or ''dits'' and ''dahs''. Morse code i ...
transmission as "new music". Its interception was originally concentrated at the Foreign Office Y Station operated by the Metropolitan Police at
Denmark Hill Denmark Hill is an area and road in Camberwell, in the London Borough of Southwark, London, England. It is a sub-section of the western flank of the Norwood Ridge, centred on the long, curved Ruskin Park slope of the ridge. The road is part of ...
in
Camberwell Camberwell ( ) is an List of areas of London, area of South London, England, in the London Borough of Southwark, southeast of Charing Cross. Camberwell was first a village associated with the church of St Giles' Church, Camberwell, St Giles ...
, London. But due to lack of resources at this time (around 1941), it was given a low priority. A new Y Station,
Knockholt Knockholt is a village and civil parish in the Sevenoaks District of Kent. It is located north west of Sevenoaks & south of Orpington, and is adjacent to the Kent border with Greater London. The village is mostly a ribbon development, surrou ...
in
Kent Kent is a Ceremonial counties of England, ceremonial county in South East England. It is bordered by Essex across the Thames Estuary to the north, the Strait of Dover to the south-east, East Sussex to the south-west, Surrey to the west, and Gr ...
, was later constructed specifically to intercept Tunny traffic so that the messages could be efficiently recorded and sent to Bletchley Park. The head of Y station,
Harold Kenworthy Harold may refer to: People * Harold (given name), including a list of persons and fictional characters with the name * Harold (surname), surname in the English language * András Arató, known in meme culture as "Hide the Pain Harold" Arts ...
, moved to head up Knockholt. He was later promoted to head the Foreign Office Research and Development Establishment (F.O.R.D.E).


Code breaking

On 30 August 1941, a message of some 4,000 characters was transmitted from
Athens Athens ( ) is the Capital city, capital and List of cities and towns in Greece, largest city of Greece. A significant coastal urban area in the Mediterranean, Athens is also the capital of the Attica (region), Attica region and is the southe ...
to
Vienna Vienna ( ; ; ) is the capital city, capital, List of largest cities in Austria, most populous city, and one of Federal states of Austria, nine federal states of Austria. It is Austria's primate city, with just over two million inhabitants. ...
. However, the message was not received correctly at the other end. The receiving operator then sent an uncoded request back to the sender asking for the message to be retransmitted. This let the codebreakers know what was happening. The sender then retransmitted the message but, critically, did not change the key settings from the original "HQIBPEXEZMUG". This was a forbidden practice; using a different key for every different message is critical to any stream cipher's security. This would not have mattered had the two messages been identical, however the second time the operator made a number of small alterations to the message, such as using abbreviations, making the second message somewhat shorter. From these two related ciphertexts, known to cryptanalysts as a depth, the veteran cryptanalyst Brigadier John Tiltman in the Research Section teased out the two plaintexts and hence the
keystream In cryptography, a keystream is a stream of random or pseudorandom characters that are combined with a plaintext message to produce an encrypted message (the ciphertext). The "characters" in the keystream can be bit The bit is the most basic ...
. But even almost 4,000 characters of key was not enough for the team to figure out how the stream was being generated; it was just too complex and seemingly random. After three months, the Research Section handed the task to mathematician
Bill Tutte William Thomas Tutte (; 14 May 1917 – 2 May 2002) was an English and Canadian code breaker and mathematician. During the Second World War, he made a fundamental advance in cryptanalysis of the Lorenz cipher, a major Nazi German cipher system ...
. He applied a technique that he had been taught in his cryptographic training, of writing out the key by hand and looking for repetitions. Tutte did this with the original teleprinter 5-bit International Telegraph Alphabet No. 2 (ITA2) (which was a development of the Baudot code (ITA1)), which led him to his initial breakthrough of recognising a 41-bit repetition. Over the following two months up to January 1942, Tutte and colleagues worked out the complete logical structure of the cipher machine. This remarkable piece of
reverse engineering Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accompl ...
was later described as "one of the greatest intellectual feats of World War II". After this cracking of Tunny, a special team of code breakers was set up under
Ralph Tester Ralph Paterson Tester (2 June 1902 – May 1998) was an administrator at Bletchley Park, the British codebreaking station during World War II. He founded and supervised a section named the '' Testery'' for breaking Tunny (a Fish cipher). Backgrou ...
, most initially transferred from
Alan Turing Alan Mathison Turing (; 23 June 1912 â€“ 7 June 1954) was an English mathematician, computer scientist, logician, cryptanalyst, philosopher and theoretical biologist. He was highly influential in the development of theoretical computer ...
's
Hut 8 Hut 8 was a section in the Government Code and Cypher School (GC&CS) at Bletchley Park (the British World War II codebreaking station, located in Buckinghamshire) tasked with solving German naval (Kriegsmarine) Enigma messages. The section ...
. The team became known as the
Testery The Testery was a section at Bletchley Park, the British codebreaking station during World War II. It was set up in July 1942 as the "FISH Subsection" under Major Ralph Tester, hence its alternative name. Four founder members were Tester himself ...
. It performed the bulk of the subsequent work in breaking Tunny messages, but was aided by machines in the complementary section under
Max Newman Maxwell Herman Alexander Newman, FRS (7 February 1897 – 22 February 1984), generally known as Max Newman, was a British mathematician and codebreaker. His work in World War II led to the construction of Colossus, the world's first operatio ...
known as the
Newmanry The Newmanry was a section at Bletchley Park, the British codebreaking station during World War II. Its job was to develop and employ statistical and machine methods in cryptanalysis of the Lorenz cipher. It worked very closely with the Testery wh ...
.


Decryption machines

Several complex machines were built by the British to aid the attack on Tunny. The first was the British Tunny. This machine was designed by Bletchley Park, based on the
reverse engineering Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accompl ...
work done by Tiltman's team in the Testery, to emulate the Lorenz Cipher Machine. When the pin wheel settings were found by the Testery, the Tunny machine was set up and run so that the messages could be printed. A family of machines known as "
Robinsons Robinsons or Robinson's may refer to: Businesses Department stores * Robinsons Malls, shopping mall and retail operator in the Philippines * Robinsons, former department store chain owned by Robinson & Co. in Singapore and Malaysia * Robinson Dep ...
" were built for the Newmanry. These used two
paper tape Five- and eight-hole wide punched paper tape Paper tape reader on the Harwell computer with a small piece of five-hole tape connected in a circle – creating a physical program loop Punched tape or perforated paper tape is a form of data st ...
s, along with logic circuitry, to find the settings of the ''χ'' pin wheels of the Lorenz machine. The Robinsons had major problems keeping the two paper tapes synchronized and were relatively slow, reading only 2,000 characters per second. The most important machine was the
Colossus Colossus, Colossos, or the plural Colossi or Colossuses, may refer to: Statues * Any exceptionally large statue; colossal statues, are generally taken to mean a statue at least twice life-size ** List of tallest statues ** :Colossal statues * ...
of which ten were in use by the war's end, the first becoming operational in December 1943. Although not fully programmable, they were far more efficient than their predecessors, representing advances in electronic digital
computer A computer is a machine that can be Computer programming, programmed to automatically Execution (computing), carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic set ...
s. The
Colossus Colossus, Colossos, or the plural Colossi or Colossuses, may refer to: Statues * Any exceptionally large statue; colossal statues, are generally taken to mean a statue at least twice life-size ** List of tallest statues ** :Colossal statues * ...
computers were developed and built by
Tommy Flowers Thomas Harold Flowers Order of the British Empire, MBE (22 December 1905 – 28 October 1998) was an English engineer with the British General Post Office. During World War II, Flowers designed and built Colossus computer, Colossus, the world's ...
, of the
Dollis Hill Dollis Hill is an area in northwest London, which consists of the streets surrounding the Gladstone Park, London, Gladstone Park. It is served by a London Underground station, Dollis Hill tube station, Dollis Hill, on the Jubilee line, providi ...
Post Office Research Station The Post Office Research Station was first established as a separate section of the General Post Office in 1909. In 1921, the Research Station moved to Dollis Hill, north west London, initially in ex-army huts. The main permanent buildings at ...
, using algorithms developed by
Bill Tutte William Thomas Tutte (; 14 May 1917 – 2 May 2002) was an English and Canadian code breaker and mathematician. During the Second World War, he made a fundamental advance in cryptanalysis of the Lorenz cipher, a major Nazi German cipher system ...
and his team of mathematicians. Colossus proved to be efficient and quick against the twelve-rotor Lorenz SZ42 on-line teleprinter cipher machine. Some influential figures had doubts about his proposed design for the decryption machine, and Flowers proceeded with the project while partly funding it himself. Like the later
ENIAC ENIAC (; Electronic Numerical Integrator and Computer) was the first Computer programming, programmable, Electronics, electronic, general-purpose digital computer, completed in 1945. Other computers had some of these features, but ENIAC was ...
of 1946, Colossus did not have a
stored program A stored-program computer is a computer that stores program instructions in electronically, electromagnetically, or optically accessible memory. This contrasts with systems that stored the program instructions with plugboards or similar mechani ...
, and was programmed through plugboards and jumper cables. It was faster, more reliable and more capable than the Robinsons, so speeding up the process of finding the Lorenz ''χ'' pin wheel settings. Since Colossus generated the putative keys electronically, it only had to read one tape. It did so with an optical reader which, at 5,000 characters per second, was driven much faster than the Robinsons' and meant that the tape travelled at almost 30 miles per hour (48 km/h). This, and the clocking of the electronics from the optically read paper tape sprocket holes, completely eliminated the Robinsons' synchronisation problems. Bletchley Park management, which had been sceptical of Flowers's ability to make a workable device, immediately began pressuring him to construct another. After the end of the war, Colossus machines were dismantled on the orders of Winston Churchill, but GCHQ retained two of them.


Testery executives and Tunny codebreakers

*
Ralph Tester Ralph Paterson Tester (2 June 1902 – May 1998) was an administrator at Bletchley Park, the British codebreaking station during World War II. He founded and supervised a section named the '' Testery'' for breaking Tunny (a Fish cipher). Backgrou ...
: linguist and head of Testery *
Jerry Roberts Captain Raymond C. "Jerry" Roberts MBE (18 November 1920 – 25 March 2014) was a British wartime codebreaker and businessman. During the Second World War, Roberts worked at the Government Code and Cypher School at Bletchley Park from 194 ...
: shift-leader, linguist and senior codebreaker * Peter Ericsson: shift-leader, linguist and senior codebreaker * Victor Masters: shift-leader * Denis Oswald: linguist and senior codebreaker *
Peter Hilton Peter John Hilton (7 April 1923Peter Hilton, "On all Sorts of Automorphisms", ''The American Mathematical Monthly'', 92(9), November 1985, p. 6506 November 2010) was a British mathematician, noted for his contributions to homotopy theory and f ...
: codebreaker and mathematician *
Peter Benenson Peter Benenson (born Peter James Henry Solomon; 31 July 1921 – 25 February 2005) was a British barrister, human rights activist and the founder of the human rights group Amnesty International (AI); a global movement of more than 10 million pe ...
: codebreaker * Peter Edgerley: codebreaker * John Christie: codebreaker * John Thompson: codebreaker *
Roy Jenkins Roy Harris Jenkins, Baron Jenkins of Hillhead (11 November 1920 â€“ 5 January 2003) was a British politician and writer who served as the sixth President of the European Commission from 1977 to 1981. At various times a Member of Parliamen ...
: codebreaker *
Shaun Wylie Shaun Wylie (17 January 1913 – 2 October 2009ATS ATS or Ats may refer to: Businesses * ATS Wheels (''Auto Technisches Spezialzubehör''), a German wheel manufacturer and sponsor of a Formula One racing team * ATS Automation Tooling Systems, an Ontario, Canada-based factory automation company * ...
girls (as the women serving that role were then called), with a total staff of 118, organised in three shifts working round the clock.


Surviving machines

Lorenz cipher machines were built in small numbers; today only a handful survive in museums. In Germany, examples may be seen at the
Heinz Nixdorf MuseumsForum The Heinz Nixdorf MuseumsForum (HNF) in Paderborn, Germany, is a computer museum named after the Paderborn computer pioneer and entrepreneur Heinz Nixdorf. History In 1977, Heinz Nixdorf received numerous gifts in the form of historic office mac ...
, a computer museum in
Paderborn Paderborn (; Westphalian language, Westphalian: ''Patterbuorn'', also ''Paterboärn'') is a city in eastern North Rhine-Westphalia, Germany, capital of the Paderborn (district), Paderborn district. The name of the city derives from the river Pade ...
, and the
Deutsches Museum The Deutsches Museum (''German Museum'', officially (English: ''German Museum of Masterpieces of Science and Technology'')) in Munich, Germany, is the world's largest museum of science museum, science and technology museum, technology, with a ...
, a science and technology museum in Munich. Two further Lorenz machines are displayed at both
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
and
The National Museum of Computing The National Museum of Computing is a UK-based museum that is dedicated to collecting and restoring historic computer systems, and is home to the world's largest collection of working historic computers. The museum is located on Bletchley Par ...
in the United Kingdom. Another example is on display at the
National Cryptologic Museum The National Cryptologic Museum (NCM) is an American museum of cryptologic history that is affiliated with the National Security Agency (NSA). The first public museum in the U.S. Intelligence Community, NCM is located in the former Colony Sev ...
in Maryland, the United States. John Whetter and John Pether, volunteers with The National Museum of Computing, bought a Lorenz teleprinter on
eBay eBay Inc. ( , often stylized as ebay) is an American multinational e-commerce company based in San Jose, California, that allows users to buy or view items via retail sales through online marketplaces and websites in 190 markets worldwide. ...
for £9.50 that had been retrieved from a garden shed in
Southend-on-Sea Southend-on-Sea (), commonly referred to as Southend (), is a coastal city and unitary authorities of England, unitary authority area with Borough status in the United Kingdom, borough status in south-eastern Essex, England. It lies on the nor ...
. It was found to be the World War II military version, was refurbished and in May 2016 installed next to the SZ42 machine in the museum's "Tunny" gallery.


See also

*
Enigma machine The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the W ...
*
Siemens and Halske T52 The Siemens & Halske T52, also known as the Geheimschreiber ("secret teleprinter"), or ''Schlüsselfernschreibmaschine'' (SFM), was a World War II German cipher machine and teleprinter produced by the electrical engineering firm Siemens & Halske. ...
*
Turingery Turingery in ''Testery Methods 1942–1944'' or Turing's method (playfully dubbed Turingismus by Peter Ericsson, Peter Hilton and Donald Michie) was a manual codebreaking method devised in July 1942 by the mathematician and cryptanalyst Alan Turi ...
*
Combined Cipher Machine The Combined Cipher Machine (CCM) (or Combined Cypher Machine) was a common cipher machine system for securing Allied communications during World War II and, for a few years after, by NATO. The British Typex machine and the US ECM Mark II were ...


Notes


References

* * * Davies, Donald W., ''The Lorenz Cipher Machine SZ42'', (reprinted in ''Selections from Cryptologia: History, People, and Technology'', Artech House, Norwood, 1998) * in * in * . (Facsimile copy) ** . (Transcript of much of this document in PDF format) ** . (Web transcript of Part 1) * in * * in * * * * * in * * * Transcript of a lecture given by Prof. Tutte at the
University of Waterloo The University of Waterloo (UWaterloo, UW, or Waterloo) is a Public university, public research university located in Waterloo, Ontario, Canada. The main campus is on of land adjacent to uptown Waterloo and Waterloo Park. The university also op ...

Entry for "Tunny"
in the
Government Code and Cypher School The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
''Cryptographic Dictionary''


Further reading

* Contains a short but informative section (pages 312–315) describing the operation of Tunny, and how it was attacked. * * Paul Gannon, ''Colossus: Bletchley Park's Greatest Secret'' (Atlantic Books, 2006). Using recently declassified material and dealing exclusively with the efforts to break into Tunny. Clears up many previous misconceptions about Fish traffic, the Lorenz cipher machine and Colossus. * * Contains a lengthy section (pages 148–164) about Tunny and the British attack on it.


External links


Frode Weierud's CryptoCellar
Historical documents and publications about Lorenz ''Schlüsselzusatz'' SZ42. Retrieved 22 April 2016.





*
"Tunny" Machine and Its Solution
â€
Brigadier General John Tiltman
â€
National Security Agency
* ttp://www.alanturing.net/tunny_report/ General Report on Tunny: With Emphasis on Statistical Methods – Jack Good, Donald Michie, Geoffrey Timms – 1945!-- This report was classified until the middle of 2000, when it was released to the Public Record Office, Kew (document reference HW 25/4 and HW 25/5) -->.
Virtual Lorenz 3D
A 3D browser based simulation of the Lorenz SZ40/42 {{Authority control Cryptographic hardware Encryption devices World War II military equipment of Germany Signals intelligence of World War II Broken stream ciphers