Book Read Free

The Bletchley Park Codebreakers

Page 40

by Michael Smith


  Turing saw that processing speed and memory capacity were the keys to computing, and his design specified a high-speed memory of roughly the same size as the chip memory of an early Macintosh computer (enormous by the standards of his day). Had Turing’s ACE been built as he planned, it would have been in a different league to the other early electronic computers. Unfortunately, delays beyond Turing’s control resulted in the NPL losing the race to build the world’s first electronic stored-program universal digital computer – an honour that went to the University of Manchester, where in Newman’s Computing Machine Laboratory the ‘Manchester Baby’ ran its first program on 21 June 1948.

  It was not until May 1950 that a small ‘pilot model’ of the Automatic Computing Engine executed its first program (some months before the EDVAC was working properly). With an operating speed of 1 MHz, the Pilot Model ACE was for some time the fastest computer in the world. DEUCE, the production version of the Pilot Model ACE, was built by the English Electric Company. Sales of this large and expensive machine exceeded thirty – confounding the suggestion, made in 1946 by Charles Darwin, grandson of the famous naturalist and Director of the NPL, that ‘one machine would suffice to solve all the problems that are demanded of it from the whole country’. The fundamentals of Turing’s ACE design were later employed by Harry Huskey (at Wayne State University, Detroit) in the Bendix G15 computer. The G15 was arguably the first personal computer; over 400 were sold worldwide. DEUCE and the G15 remained in use until about 1970. Another computer deriving from Turing’s ACE design, the MOSAIC, played a role in Britain’s air defences during the Cold War period; other derivatives include the Packard-Bell PB250 (1961).

  The delays that cost the NPL the race with Manchester were not of Turing’s making. It had been agreed between the NPL and Dollis Hill in February 1946 that a team under Flowers’ direction would carry out the engineering work for the ACE, and in March 1946 Flowers said that a ‘minimal ACE’ would be ready by August or September of that year. Unfortunately, Dollis Hill was overwhelmed by a backlog of urgent work on the national telephone system. As Flowers said, his section was ‘too busy to do other people’s work’. In February 1947, Turing suggested that the NPL set up its own electronics section in order to build the ACE. This was done but, sadly, inter-departmental rivalry hindered the work, and in April 1948 Womersley reported that hardware development was ‘probably as far advanced 18 months ago’. Meanwhile, in the autumn of 1947, Turing retreated in disgust to Cambridge for a year’s sabbatical leave, during which he did pioneering work on Artificial Intelligence. Before his leave was over, he lost patience with the NPL altogether and Newman’s offer of a job lured a ‘very fed-up’ Turing to Manchester University. In May 1948 Turing was appointed Deputy Director of the Computing Machine Laboratory (there being no Director).

  Newman had laid plans for his Computing Machine Laboratory following his appointment at Manchester in September 1945, applying to the Royal Society for a sizeable grant in order to develop an electronic stored-program computer. This was approved in July 1946. Newman introduced the electrical engineers Frederic Williams and Tom Kilburn – newly recruited to Manchester University from TRE – to the idea of the stored-program computer. Williams and Kilburn knew nothing about Colossus. At TRE they had worked during the war on radar and they were expert with electronic pulse-techniques. At the time he left TRE, Williams was developing a method for storing pulse/no pulse patterns on the face of a cathode ray tube – an idea that, with Kilburn’s help, was rapidly to lead to the type of high-speed random access memory (RAM) known as the Williams tube.

  Williams’ description of Newman’s Computing Machine Laboratory is vivid:

  It was one room in a Victorian building whose architectural features are best described as ‘late lavatorial’. The walls were of brown glazed brick and the door was labelled ‘Magnetism Room’.

  Here, Kilburn and Williams built the world’s first electronic stored-program digital computer, the ‘Manchester Baby’. As its name implies, the Baby was a very small machine. The first program, stored on the face of a Williams tube as a pattern of dots, was just seventeen instructions long. It was inserted manually, digit by digit, using a panel of switches.

  Once Turing had arrived in Manchester, he designed the input mechanism and programming system for an expanded machine and wrote a programming manual for it. This expanded machine was known as the Manchester Mark I. At last Turing had his hands on a stored-program computer. He was soon using it to model biological growth, a field nowadays known as ‘Artificial Life’. While the rest of the world was just waking up to the idea that electronics was the new way to do binary arithmetic, Turing was talking very seriously about programming digital computers to think.

  At the time of the Baby machine and the Mark I, Kilburn and Williams, the men who had translated the logico-mathematical idea of the stored-program computer into hardware, were given too little credit by the mathematicians at Manchester. They were regarded as excellent engineers, but perhaps not as ideas men. This was unfair, but now the tables have turned. During the official celebrations of the fiftieth anniversary of the Baby, held at Manchester in June 1998, Newman’s name was not so much as mentioned. Fortunately the words of the late Williams still exist on tape:

  Now let’s be clear before we go any further that neither Tom Kilburn nor I knew the first thing about computers when we arrived in Manchester University … Newman explained the whole business of how a computer works to us.

  Newman had played a crucial role indeed in the triumph at Manchester. Through him, both Colossus and Turing’s abstract universal computing machine of 1936 were vital influences on the Manchester computer.

  Meanwhile, momentum was gathering on the other side of the Atlantic. After visiting America in January 1947, Turing reported that the ‘number of different computing projects is now so great that it is no longer possible to have a complete list’. The most visible players were Eckert, Mauchly, and von Neumann. Eckert and Mauchly had entered into a contract with the US Army Ordnance Department in June 1943 to build an electronic machine, the ENIAC. Construction got under way at the Moore School of Electrical Engineering at the University of Pennsylvania. Von Neumann was involved in the Manhattan Project at Los Alamos, where human computers armed with desk calculating machines were struggling to carry out the massive calculations required by the physicists. Hearing about ENIAC by chance, he saw to it that he was appointed as a consultant to the Eckert–Mauchly project. By the time he arrived at the Moore School, the design of the program-controlled ENIAC had been frozen in order to complete construction as soon as possible. Programming consisted of re-routing cables and setting switches. Von Neumann brought his knowledge of Turing’s 1936 paper to the practical arena of the Moore School. Thanks to Turing’s abstract logical work, von Neumann knew that by making use of coded instructions stored in memory, a single machine of fixed structure could in principle carry out any task that can be done by a human computer. It was von Neumann who placed Turing’s abstract universal computing machine into the hands of American engineers.

  After extensive discussions with Eckert and Mauchly, von Neumann wrote the ‘First Draft of a Report on the EDVAC’, describing a stored-program computer. The first draft (not quite finished) was circulated, bearing only von Neumann’s name. Eckert and Mauchly were outraged, knowing that von Neumann would be given credit for everything in the report – their ideas as well as his own. There was a storm of controversy. As a result, von Neumann abandoned the proposed EDVAC and in 1946 established his own project to build a stored-program computer in the Institute for Advanced Study at Princeton. Von Neumann gave his engineers Turing’s ‘On Computable Numbers’ to read. The completed machine, with a high-speed memory consisting of forty Williams tubes, was working by the summer of 1951. It had approximately the same number of valves as Colossus II. Known as the IAS computer, this was not the first of the various stored-program computers under construction in the US to work, but it was t
he most influential, and served as the model for a series of what were called ‘Princeton Class’ computers.

  Von Neumann is sometimes falsely described as the ‘inventor of the computer’ and the ‘inventor of the stored-program concept’. Books and articles that purport to tell the story of the stored-program computer sometimes place von Neumann centre stage and make no mention of Turing. Von Neumann himself, however, repeatedly emphasized the fundamental importance of Turing’s ‘On Computable Numbers’. For example, in a letter to the mathematician Norbert Wiener, von Neumann spoke of ‘the great positive contribution of Turing’, Turing’s mathematical demonstration that ‘one, definite mechanism can be “universal”’. In a lecture delivered at the University of Illinois in 1949 (entitled ‘Rigorous Theories of Control and Information’) von Neumann said:

  The importance of Turing’s research is just this: that if you construct an automaton right, then any additional requirements about the automaton can be handled by sufficiently elaborate instructions … [A]n automaton of this complexity can, when given suitable instructions, do anything that can be done by automata at all.

  The Los Alamos physicist Stanley Frankel, responsible with von Neumann and others for mechanizing the large-scale calculations involved in the design of the atomic and hydrogen bombs, has described von Neumann’s attitude to Turing’s work:

  I know that in or about 1943 or ’44 von Neumann was well aware of the fundamental importance of Turing’s paper of 1936 ‘On computable numbers …’, which describes in principle the ‘Universal Computer’ of which every modern computer (perhaps not ENIAC as first completed but certainly all later ones) is a realization. Von Neumann introduced me to that paper and at his urging I studied it with care. Many people have acclaimed von Neumann as the ‘father of the computer’ (in a modern sense of the term) but I am sure that he would never have made that mistake himself. He might well be called the midwife, perhaps, but he firmly emphasized to me, and to others I am sure, that the fundamental conception is owing to Turing – insofar as not anticipated by Babbage, Lovelace, and others. In my view von Neumann’s essential role was in making the world aware of these fundamental concepts introduced by Turing and of the development work carried out in the Moore school and elsewhere.

  Given our knowledge of the achievements at Dollis Hill and Bletchley Park, the history of computing must be rewritten. Histories written in ignorance of Colossus are not only incomplete, but give a distorted picture of the emergence and development of the idea of the modern computer. Turing’s logical work in 1935–6 and Flowers’ work at Bletchley led, via Newman’s desire to put the concept of the stored-program universal computing machine into practice, to the Manchester Computing Machine Laboratory and the Manchester Mark I computer. From this in turn came another momentous development, the first mass-produced computer to go on sale, a copy of the Mark I. In the US, Turing’s work steered von Neumann to the underlying logical principles of the EDVAC and the IAS computer. Technology transferred from Manchester, the Williams tube random-access memory, was crucial to both von Neumann’s IAS machine and IBM’s first mass-produced stored-program computer, the IBM 701. The 701 was a foretaste of the global transformation soon to flow from this criss-crossing pattern of invention and influence set in motion by Alan Turing in 1936.

  20

  ENIGMA’S SECURITY: WHAT THE GERMANS REALLY KNEW

  RALPH ERSKINE

  Introduction

  Chapter 20 reveals what the Germans knew about Enigma’s security. Plugboard Enigma would have been impregnable if it had been used properly, but with up to about 40,000 Enigmas in service there was little prospect of that happening - the fundamental mistake made by the Wehrmacht was to think otherwise. However, it should never be forgotten that plugboard Enigma could be broken regularly by ‘pure’ cryptanalysis only in one set of circumstances - when it used doubly enciphered message keys. After April 1940, only the Kriegsmarine made the catastrophic mistake of employing that very fallible indicating system, with no fewer than six ciphers. All other plugboard Enigma ciphers could be broken only with a good crib, which had to occur on a daily basis before a cipher would yield to the bombes. Since Hut 6 was attacking over sixty Heer and Luftwaffe Enigma ciphers at any one time later in the war, the Germans had continually to make a lot of mistakes every day for it to succeed against them. If the Heer and Luftwaffe had monitored their radio nets more carefully, and given the OKW’s radio security organization some real power at an early date, GC&CS would have had many more problems in breaking Enigma - and Hut 6 Ultra would have been thin on the ground. As it was, introducing even the most basic precautions in preparing messages for encipherment made Hut 6’s task much more difficult, and sometimes an impossible one: one such change quintupled the amount of bombe time required to break daily keys.

  The Wehrmacht paid dearly for its decision to make Enigma a standard machine, common to all three of its branches, with only the Kriegsmarine employing extra rotors. The British did not make the same mistake with their own cipher machine, Typex, even though it was essentially a copy of commercial Enigma. Perhaps profiting from their experiences in breaking Enigma, there were about twenty different sets of rotors for Typex, which made the Germans give up their attempts to break it (and helped to protect it against US Navy attempts to solve it in 1945). Nor did the Americans overlook the principle that making good codes and ciphers is as important as breaking them. Not only did the United States produce a large number of different rotor sets for the Navy’s very advanced Electric Cipher Machine (the Army’s Sigaba), but special codebreaking units were tasked with attacking their own cryptographic systems, both in theoretical studies and, more importantly, as they were used in practice. One machine was found to be wanting, but special steps were taken to increase its security.

  Chapter 20 sets out the findings of some of the Kriegsmarine’s many inquiries into Enigma’s security. It also describes devices and precautions introduced by the Wehrmacht to improve Enigma, including one which would have had devastating effects for Ultra - if only it had been used properly. As Gordon Welchman observed, the Allies were indeed lucky.

  RE

  There has long been uncertainty about what the Germans knew about Enigma’s security. Fortunately, the release of some important post-war TICOM (Target Intelligence Committee) interrogation reports of German Sigint personnel has at last thrown considerable light on this issue. Towards the end of the war, TICOM made plans to round up the staff from the numerous German Sigint agencies, in order to find out exactly what they knew about German cipher machines and code-breaking equipment, and the extent to which the Germans had been able to penetrate Allied codes and ciphers. When the war ended, and for some while afterwards, TICOM units combed Germany for Sigint personnel and equipment and made many valuable finds.

  The German Foreign Office refused to use Enigma, since it was not convinced that Enigma was secure. Instead, it employed one-time pads to encipher its highest level traffic, in a system known to the Allies as GEE. However, GEE itself was insecure: the pads being used did not contain fully random numbers, since they had been generated by a machine which produced predictable sequences. Cryptanalysts in the US Army’s Signal Security Agency exploited this to solve GEE in the winter of 1944–5.

  A Heer or Luftwaffe Enigma key-list comprised the rotor order (Walzenlage), ring settings (Ringstellungen) and plugboard settings (Steckerverbindungen). A naval list also set out the Grundstellungen. Cryptanalysts attacking Enigma were therefore confronted by a huge key space: 60 (5×4×3) rotor orders, 676 (26×26) effective ring settings, 150 million million Stecker combinations, and 17,576 (26×26×26) message starting positions – a combined total of 1.074×1023. The total was even higher for the standard naval machine M3 (6.0144× 1023), and twenty-six times greater again for M4 – 104 times after 1 July 1943, when a second ‘Greek’ rotor (gamma) and its related thin reflector were introduced.

  These are huge numbers, but some experts in the Kriegsmarine were no
t impressed by them. Soon after the beginning of the war, German naval cryptanalysts advised that Enigma was not secure. A report prepared by Wilhelm Tranow, then a senior member of the Kriegsmarine’s codebreaking agency, the B-Dienst, recommended that the Kriegsmarine should replace Enigma by a codebook. At first sight that appears to be an odd recommendation since the B-Dienst was already breaking several British enciphered naval codes, and Tranow was fully aware of the weaknesses of such codes generally. However, Germany’s circumstances were very different from those of Britain, since its Navy did not have to operate on a global basis. Tranow’s recommendation might just have worked, particularly if the enciphering additive tables had not been overused. Once a daily Enigma key was found, all the messages in it fell, but each message in an enciphered code has to be solved separately, and it is a very slow process until the additive book being used can be substantially reconstructed.

  The Kriegsmarine, in particular, carried out many inquiries into Enigma’s security. Captain Ludwig Stummel, of the Marine Communications Service, the Marinenachrichtendienst (MND), reported on it following the capture of Schiff 26 in April 1940, and the loss of U-13 off the coast of Norfolk on 30 May 1940. On both occasions he gave assurances that Enigma was safe to use: all the important documents relating to it were printed on specially absorbent water paper, using water-soluble ink so that they should have been destroyed if a U-boat was sunk. And even if key-lists had been captured, a special Stichwort (cue word) procedure, which modified the settings, had been brought into force after the captures. But Admiral Karl Dönitz, the Admiral Commanding U-boats (Befehlshaber der U-Boote - BdU) remained deeply uneasy. Following the ambush of U-67 and U-111 by the British submarine HMS Clyde in Tarafal Bay in one of the Cape Verde Islands, off the coast of Senegal, on 28 September 1941, he concluded that:

 

‹ Prev