Bombe
The bombe (UK: /bɒmb/) was an electro-mechanical device used by British cryptologists to help decipher German Enigma-machine-encrypted secret messages during World War II.[1] The US Navy[2] and US Army[3] later produced their own machines to the same functional specification, albeit engineered differently both from each other and from Polish and British bombes.
The British bombe was developed from a device known as the "bomba" (Polish: bomba kryptologiczna), which had been designed in Poland at the Biuro Szyfrów (Cipher Bureau) by cryptologist Marian Rejewski, who had been breaking German Enigma messages for the previous seven years, using it and earlier machines. The initial design of the British bombe was produced in 1939 at the UK Government Code and Cypher School (GC&CS) at Bletchley Park by Alan Turing,[4] with an important refinement devised in 1940 by Gordon Welchman.[5] The engineering design and construction was the work of Harold Keen of the British Tabulating Machine Company. The first bombe, code-named Victory, was installed in March 1940[6] while the second version, Agnus Dei or Agnes, incorporating Welchman's new design, was working by August 1940.[7]
The bombe was designed to discover some of the daily settings of the Enigma machines on the various German military networks: specifically, the set of rotors in use and their positions in the machine; the rotor core start positions for the message—the message key—and one of the wirings of the plugboard.[8][9][10]
The Enigma machine
[edit]The Enigma cipher machine |
---|
Enigma machine |
Breaking Enigma |
Related |
The Enigma is an electro-mechanical rotor machine used for the encryption and decryption of secret messages. It was developed in Germany in the 1920s. The repeated changes of the electrical pathway from the keyboard to the lampboard implement a polyalphabetic substitution cipher, which turns plaintext into ciphertext and back again. The Enigma's scrambler contains rotors with 26 electrical contacts on each side, whose wiring diverts the current to a different position on the two sides. When a key is pressed on the keyboard, an electric current flows through an entry drum at the right-hand end of the scrambler, then through the set of rotors to a reflecting drum (or reflector) which turns it back through the rotors and entry drum, and out to illuminate one of the lamps on the lampboard.[11]
At each key depression, the right-hand or "fast" rotor advances one position, which causes the encipherment to change. In addition, once per rotation, the right-hand rotor causes the middle rotor to advance; the middle rotor similarly causes the left-hand (or "slow") rotor to advance. Each rotor's position is indicated by a letter of the alphabet showing through a window. The Enigma operator rotates the wheels by hand to set the start position for enciphering or deciphering a message. The three-letter sequence indicating the start position of the rotors is the "message key". There are 263 = 17,576 different message keys and different positions of the set of three rotors. By opening the lid of the machine and releasing a compression bar, the set of three rotors on their spindle can be removed from the machine and their sequence (called the "wheel order" at Bletchley Park) altered. Multiplying 17,576 by the six possible wheel orders gives 105,456 different ways that the scrambler can be set up.[12]
Although 105,456 is a large number,[13] it does not guarantee security. A brute-force attack is possible: one could imagine using 100 code clerks who each tried to decode a message using 1000 distinct rotor settings. The Poles developed card catalogs so they could easily find rotor positions; Britain built "EINS
" (the German word for one) catalogs. Less intensive methods were also possible. If all message traffic for a day used the same rotor starting position, then frequency analysis for each position could recover the polyalphabetic substitutions. If different rotor starting positions were used, then overlapping portions of a message could be found using the index of coincidence.[14] Many major powers (including the Germans) could break Enigma traffic if they knew the rotor wiring. The German military knew the Enigma was weak.[15]
In 1930, the German army introduced an additional security feature, a plugboard (Steckerbrett in German; each plug is a Stecker, and the British cryptologists also used the word) that further scrambled the letters, both before and after they passed through the rotor-reflector system. The Enigma encryption is a self-inverse function, meaning that it substitutes letters reciprocally: if A
is transformed into R
, then R
is transformed into A
. The plugboard transformation maintained the self-inverse quality, but the plugboard wiring, unlike the rotor positions, does not change during the encryption. This regularity was exploited by Welchman's "diagonal board" enhancement to the bombe, which vastly increased its efficiency.[16] With six plug leads in use (leaving 14 letters "unsteckered"), there were 100,391,791,500 possible ways of setting up the plugboard.[17]
An important feature of the machine from a cryptanalyst's point of view, and indeed Enigma's Achilles' heel, was that the reflector in the scrambler prevented a letter from being enciphered as itself. Any putative solution that gave, for any location, the same letter in the proposed plaintext and the ciphertext could therefore be eliminated.[18]
In the lead-up to World War II, the Germans made successive improvements to their military Enigma machines. By January 1939, additional rotors had been introduced so that three rotors were chosen from a set of five (hence there were now 60 possible wheel orders) for the army and air force Enigmas, and three out of eight (making 336 possible wheel orders) for the navy machines. In addition, ten leads were used on the plugboard, leaving only six letters unsteckered. This meant that the air force and army Enigmas could be set up in 1.5×1019 ways. In 1941 the German navy introduced a version of Enigma with a rotatable reflector (the M4 or Four-rotor Enigma) for communicating with its U-boats. This could be set up in 1.8×1020 different ways.[17]
Four-rotor Enigma
[edit]By late 1941 a change in German Navy fortunes in the Battle of the Atlantic, combined with intelligence reports, convinced Admiral Karl Dönitz that the Allies were able to read the German Navy's coded communications, and a fourth rotor with unknown wiring was added to German Navy Enigmas used for U-boat communications, producing the Triton system,[dubious – discuss] known at Bletchley Park as Shark.[19] This was coupled with a thinner reflector design to make room for the extra rotor. The Triton was designed in such a way that it remained compatible with three-rotor machines when necessary: one of the extra 'fourth' rotors, the 'beta', was designed so that when it was paired with the thin 'B' reflector, and the rotor and ring were set to 'A', the pair acted as a 'B' reflector coupled with three rotors. Fortunately for the Allies, in December 1941, before the machine went into official service, a submarine accidentally sent a message with the fourth rotor in the wrong position, and then retransmitted the message with the rotor in the correct position to emulate the three-rotor machine. In February 1942 the change in the number of rotors used became official, and the Allies' ability to read German submarines' messages ceased until a snatch from a captured U-boat revealed not only the four-rotor machine's ability to emulate a three-rotor machine, but also that the fourth rotor did not move during a message. This along with the aforementioned retransmission eventually allowed the code breakers to figure out the wiring of both the 'beta' and 'gamma' fourth rotors.[citation needed]
The first half of 1942 was the "Second Happy Time" for the German U-boats, with renewed success in attacking Allied shipping, as the US had just entered war unprepared for the onslaught, lacking in anti-submarine warfare (ASW) aircraft, ships, personnel, doctrine and organization. Also, the security of the new Enigma and the Germans' ability to read Allied convoy messages sent in Naval Cipher No. 3 contributed to their success. Between January and March 1942, German submarines sank 216 ships off the US east coast. In May 1942 the US began using the convoy system and requiring a blackout of coastal cities so that ships would not be silhouetted against their lights, but this yielded only slightly improved security for Allied shipping. The Allies' failure to change their cipher for three months, together with the fact that Allied messages never contained any raw Enigma decrypts (or even mentioned that they were decrypting messages), helped convince the Germans that their messages were secure. Conversely, the Allies learned that the Germans had broken the naval cipher almost immediately from Enigma decrypts, but lost many ships due to the delay in changing the cipher.[citation needed]
The principle of the bombe
[edit]The following settings of the Enigma machine must be discovered to decipher German military Enigma messages. Once these are known, all the messages for that network for that day (or pair of days in the case of the German navy) could be decrypted.
Internal settings (that required the lid of the Enigma machine to be opened)
- The selection of rotors in use in the Enigma's scrambler, and their positions on the spindle (Walzenlage or "wheel order"). Possible wheel orders numbered 60 (three rotors from a choice of five) for army and air force networks and 336 (three rotors from a choice of eight) for the naval networks.
- The positions of the alphabet rings' turnover notch in relation to the core of each rotor in use (Ringstellung or "ring settings"). There are 26 possible ring settings for each rotor.[21]
External settings (that could be changed without opening the Enigma machine)
- The plugboard connections (Steckerverbindungen or "stecker values"). The ten leads could be arranged in different combinations (approximately 151 trillion).[22]
- The scrambler rotor positions at the start of enciphering the message key (the Grundstellung or "indicator-setting") — up to May 1940; or thereafter the initial positions of each rotor at the start of enciphering the message (the "message key") from which the indicator-setting could be derived. There are 17576 possible three-letter keys.
The bombe identified possible initial positions of the rotor cores and the stecker partner of a specified letter for a set of wheel orders. Manual techniques were then used to complete the decryption process.[23] In the words of Gordon Welchman, "... the task of the bombe was simply to reduce the assumptions of wheel order and scrambler positions that required 'further analysis' to a manageable number".[24]
Structure
[edit]The bombe was an electro-mechanical device that replicated the action of several Enigma machines wired together. A standard German Enigma employed, at any one time, a set of three rotors, each of which could be set in any of 26 positions. The standard British bombe contained 36 Enigma equivalents, each with three drums wired to produce the same scrambling effect as the Enigma rotors. A bombe could run two or three jobs simultaneously. Each job would have a 'menu' that had to be run against a number of different wheel orders. If the menu contained 12 or fewer letters, three different wheel orders could be run on one bombe; if more than 12 letters, only two.
In order to simulate Enigma rotors, each rotor drum of the bombe had two complete sets of contacts, one for input towards the reflector and the other for output from the reflector, so that the reflected signal could pass back through a separate set of contacts. Each drum had 104 wire brushes, which made contact with the plate onto which they were loaded. The brushes and the corresponding set of contacts on the plate were arranged in four concentric circles of 26. The outer pair of circles (input and output) were equivalent to the current in an Enigma passing in one direction through the scrambler, and the inner pair equivalent to the current flowing in the opposite direction.
The interconnections within the drums between the two sets of input and output contacts were both identical to those of the relevant Enigma rotor. There was permanent wiring between the inner two sets of contacts of the three input/output plates. From there, the circuit continued to a plugboard located on the left-hand end panel, which was wired to imitate an Enigma reflector and then back through the outer pair of contacts. At each end of the "double-ended Enigma", there were sockets on the back of the machine, into which 26-way cables could be plugged.
The bombe drums were arranged with the top one of the three simulating the left-hand rotor of the Enigma scrambler, the middle one the middle rotor, and the bottom one the right-hand rotor. The top drums were all driven in synchrony by an electric motor. For each full rotation of the top drums, the middle drums were incremented by one position, and likewise for the middle and bottom drums, giving the total of 26 × 26 × 26 = 17576 positions of the 3-rotor Enigma scrambler.[25][26]
The drums were colour-coded according to which Enigma rotor they emulated: I red; II maroon; III green; IV yellow; V brown; VI cobalt (blue); VII jet (black); VIII silver.[27]
At each position of the rotors, an electric current would or would not flow in each of the 26 wires, and this would be tested in the bombe's comparator unit. For a large number of positions, the test would lead to a logical contradiction, ruling out that setting. If the test did not lead to a contradiction, the machine would stop.
The operator would then find the point at which the test passed, record the candidate solution by reading the positions of the indicator drums and the indicator unit on the Bombe's right-hand end panel. The operator then restarted the run. The candidate solutions, stops as they were called, were processed further to eliminate as many false stops as possible. Typically, there were many false bombe stops before the correct one was found.
The candidate solutions for the set of wheel orders were subject to extensive further cryptanalytical work. This progressively eliminated the false stops, built up the set of plugboard connections and established the positions of the rotor alphabet rings.[28] Eventually, the result would be tested on a Typex machine that had been modified to replicate an Enigma, to see whether that decryption produced German language.[29]
Bombe menu
[edit]A bombe run involved a cryptanalyst first obtaining a crib — a section of plaintext that was thought to correspond to the ciphertext. Finding cribs was not at all straightforward; it required considerable familiarity with German military jargon and the communication habits of the operators. However, the codebreakers were aided by the fact that the Enigma would never encrypt a letter to itself. This helped in testing a possible crib against the ciphertext, as it could rule out a number of cribs and positions, where the same letter occurred in the same position in both the plaintext and the ciphertext. This was termed a crash at Bletchley Park.
Once a suitable crib had been decided upon, the cryptanalyst would produce a menu for wiring up the bombe to test the crib against the ciphertext. The following is a simplified explanation of the process of constructing a menu. Suppose that the crib is ATTACKATDAWN to be tested against a certain stretch of ciphertext, say, WSNPNLKLSTCS. The letters of the crib and the ciphertext were compared to establish pairings between the ciphertext and the crib plaintext. These were then graphed as in the diagram. It should be borne in mind that the relationships are reciprocal so that A in the plaintext associated with W in the ciphertext is the same as W in the plaintext associated with A in the ciphertext. At position 1 of the plaintext-ciphertext comparison, the letter A is associated with W, but A is also associated with P at position 4, K at position 7 and T at position 10. Building up these relationships into such a diagram provided the menu from which the bombe connections and drum start positions would be set up.
Ciphertext | W | S | N | P | N | L | K | L | S | T | C | S |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Plaintext "crib" | A | T | T | A | C | K | A | T | D | A | W | N |
Message position | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 |
Upper drum setting | Z | Z | Z | Z | Z | Z | Z | Z | Z | Z | Z | Z |
Middle drum setting | Z | Z | Z | Z | Z | Z | Z | Z | Z | Z | Z | Z |
Lower drum setting | A | B | C | D | E | F | G | H | I | J | K | L |
In the illustration, there are three sequences of letters which form loops (or cycles or closures), ATLK, TNS and TAWCN. The more loops in the menu, the more candidate rotor settings the bombe could reject, and hence the fewer false stops.
Alan Turing conducted a very substantial analysis (without any electronic aids) to estimate how many bombe stops would be expected according to the number of letters in the menu and the number of loops. Some of his results are given in the following table.[30] Recent bombe simulations have shown similar results.
Number of letters on the menu | |||||||||
---|---|---|---|---|---|---|---|---|---|
Loops | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 |
3 | 2.2 | 1.1 | 0.42 | 0.14 | 0.04 | <0.01 | <0.01 | <0.01 | <0.01 |
2 | 58 | 28 | 11 | 3.8 | 1.2 | 0.30 | 0.06 | <0.01 | <0.01 |
1 | 1500 | 720 | 280 | 100 | 31 | 7.7 | 1.6 | 0.28 | 0.04 |
0 | 40000 | 19000 | 7300 | 2700 | 820 | 200 | 43 | 7.3 | 1.0 |
Stecker values
[edit]The German military Enigma included a plugboard (Steckerbrett in German) which swapped letters (indicated here by P) before and after the main scrambler's change (indicated by S). The plugboard connections were known to the cryptanalysts as Stecker values. If there had been no plugboard, it would have been relatively straightforward to test a rotor setting; a Typex machine modified to replicate Enigma could be set up and the crib letter A encrypted on it, and compared with the ciphertext, W. If they matched, the next letter would be tried, checking that T encrypted to S and so on for the entire length of the crib. If at any point the letters failed to match, the initial rotor setting would be rejected; most incorrect settings would be ruled out after testing just two letters. This test could be readily mechanised and applied to all 17576 settings of the rotors.
However, with the plugboard, it was much harder to perform trial encryptions because it was unknown what the crib and ciphertext letters were transformed to by the plugboard. For example, in the first position, P(A) and P(W) were unknown because the plugboard settings were unknown.
Turing's solution to working out the stecker values (plugboard connections) was to note that, even though the values for, say, P(A) or P(W), were unknown, the crib still provided known relationships amongst these values; that is, the values after the plugboard transformation. Using these relationships, a cryptanalyst could reason from one to another and, potentially, derive a logical contradiction, in which case the rotor setting under consideration could be ruled out.
A worked example of such reasoning might go as follows: a cryptanalyst might suppose that P(A) = Y. Looking at position 10 of the crib:ciphertext comparison, we observe that A encrypts to T, or, expressed as a formula:
- T = P(S10(P(A)))
Due to the function P being its own inverse, we can apply it to both sides of the equation and obtain the following:
- P(T) = S10(P(A))
This gives us a relationship between P(A) and P(T). If P(A) = Y, and for the rotor setting under consideration S10(Y) = Q (say), we can deduce that
- P(T) = S10(P(A)) = S10(Y) = Q
While the crib does not allow us to determine what the values after the plugboard are, it does provide a constraint between them. In this case, it shows how P(T) is completely determined if P(A) is known.
Likewise, we can also observe that T encrypts to L at position 8. Using S8, we can deduce the steckered value for L as well using a similar argument, to get, say,
- P(L) = S8(P(T)) = S8(Q) = G
Similarly, in position 6, K encrypts to L. As the Enigma machine is self-reciprocal, this means that at the same position L would also encrypt to K. Knowing this, we can apply the argument once more to deduce a value for P(K), which might be:
- P(K) = S6(P(L)) = S6(G) = F
And again, the same sort of reasoning applies at position 7 to get:
- P(A) = S7(P(K)) = S7(F) = N
However, in this case, we have derived a contradiction, since, by hypothesis, we assumed that P(A) = Y at the outset. This means that the initial assumption must have been incorrect, and so that (for this rotor setting) P(A) ≠ Y (this type of argument is termed reductio ad absurdum or "proof by contradiction").
The cryptanalyst hypothesised one plugboard interconnection for the bombe to test. The other stecker values and the ring settings were worked out by hand methods.
Automated deduction
[edit]To automate these logical deductions, the bombe took the form of an electrical circuit. Current flowed around the circuit near-instantaneously, and represented all the possible logical deductions which could be made at that position. To form this circuit, the bombe used several sets of Enigma rotor stacks wired up together according to the instructions given on a menu, derived from a crib. Because each Enigma machine had 26 inputs and outputs, the replica Enigma stacks are connected to each other using 26-way cables. In addition, each Enigma stack rotor setting is offset a number of places as determined by its position in the crib; for example, an Enigma stack corresponding to the fifth letter in the crib would be four places further on than that corresponding to the first letter.
In practice
[edit]Practical bombes used several stacks of rotors spinning together to test multiple hypotheses about possible setups of the Enigma machine, such as the order of the rotors in the stack.
While Turing's bombe worked in theory, it required impractically long cribs to rule out sufficiently large numbers of settings. Gordon Welchman came up with a way of using the symmetry of the Enigma stecker to increase the power of the bombe. His suggestion was an attachment called the diagonal board that further improved the bombe's effectiveness.[5]
The British Bombe
[edit]The Polish cryptologic bomba (Polish: bomba kryptologiczna; plural bomby) had been useful only as long as three conditions were met. First, the form of the indicator had to include the repetition of the message key; second, the number of rotors available had to be limited to three, giving six different "wheel orders" (the three rotors and their order within the machine); and third, the number of plug-board leads had to remain relatively small so that the majority of letters were unsteckered.[dubious – discuss] Six machines were built, one for each possible rotor order. The bomby were delivered in November 1938, but barely a month later the Germans introduced two additional rotors for loading into the Enigma scrambler, increasing the number of wheel orders by a factor of ten. Building another 54 bomby was beyond the Poles' resources. Also, on 1 January 1939, the number of plug-board leads was increased to ten. The Poles therefore had to return to manual methods, the Zygalski sheets.
Alan Turing designed the British bombe on a more general principle, the assumption of the presence of text, called a crib, that cryptanalysts could predict was likely to be present at a defined point in the message. This technique is termed a known plaintext attack and had been used to a limited extent by the Poles, e.g., the Germans' use of "ANX" — "AN", German for "To", followed by "X" as a spacer.
A £100,000 budget for the construction of Turing's machine was acquired and the contract to build the bombes was awarded to the British Tabulating Machine Company (BTM) at Letchworth.[31] BTM placed the project under the direction of Harold 'Doc' Keen. Each machine was about 7 feet (2.1 m) wide, 6 feet 6 inches (1.98 m) tall, 2 feet (0.61 m) deep and weighed about a ton.[32] On the front of each bombe were 108 places where drums could be mounted. The drums were in three groups of 12 triplets. Each triplet, arranged vertically, corresponded to the three rotors of an Enigma scrambler. The bombe drums' input and output contacts went to cable connectors, allowing the bombe to be wired up according to the menu. The 'fast' drum rotated at a speed of 50.4 rpm in the first models[33] and 120 rpm in later ones,[34] when the time to set up and run through all 17,576 possible positions for one rotor order was about 20 minutes.[35]
The first bombe was named "Victory". It was installed in "Hut 1" at Bletchley Park on 18 March 1940. It was based on Turing's original design and so lacked a diagonal board.[36] On 26 April 1940, HMS Griffin captured a German trawler (Schiff 26, the Polares) flying a Dutch flag; included in the capture were some Enigma keys for 23 to 26 April.[37] Bletchley retrospectively attacked some messages sent during this period using the captured material and an ingenious Bombe menu where the Enigma fast rotors were all in the same position.[38] In May and June 1940, Bletchley succeeded in breaking six days of naval traffic, 22–27 April 1940.[39] Those messages were the first breaks of Kriegsmarine messages of the war, "[b]ut though this success expanded Naval Section's knowledge of the Kriegsmarines's signals organization, it neither affected naval operations nor made further naval Enigma solutions possible."[40] The second bombe, named "Agnus dei", later shortened to "Agnes", or "Aggie", was equipped with Welchman's diagonal board, and was installed on 8 August 1940; "Victory" was later returned to Letchworth to have a diagonal board fitted.[41] The bombes were later moved from "Hut 1" to "Hut 11". The bombe was referred to by Group Captain Winterbotham as a "Bronze Goddess" because of its colour.[42] The devices were more prosaically described by operators as being "like great big metal bookcases".[43]
During 1940, 178 messages were broken on the two machines, nearly all successfully. Because of the danger of bombes at Bletchley Park being lost if there were to be a bombing raid, bombe outstations[44] were established, at Adstock, Gayhurst and Wavendon, all in Buckinghamshire.[45] In June–August 1941 there were 4 to 6 bombes at Bletchley Park, and when Wavendon was completed, Bletchley, Adstock and Wavenden had a total of 24 to 30 bombes. When Gayhurst became operational there were a total of 40 to 46 bombes, and it was expected that the total would increase to about 70 bombes run by some 700 Wrens (Women's Royal Naval Service). But in 1942 with the introduction of the naval four-rotor Enigma, "far more than seventy bombes" would be needed. New outstations were established at Stanmore and Eastcote, and the Wavendon and Adstock bombes were moved to them, though the Gayhurst site was retained. The few bombes left at Bletchley Park were used for demonstration and training purposes only.[46]
Type | Number of Enigma equivalents | Mechanism | Number built |
---|---|---|---|
Original standard | 36 (30 in pre-production) | 3-rotor Enigma equivalents | 73 |
Jumbo | 36 | 3-rotor Enigma equivalents plus an additional mechanism to check each stop and print the results (dubbed the "machine gun" because of the noise its uniselectors made) | 14 |
Mammoth | 36 | 4-rotor Enigma equivalents with high-speed relays to sense stops | 57 |
Cobra | 36 | 4-rotor Enigma equivalents with an electronic sensing unit designed by C. E. Wynn-Williams and Tommy Flowers' team at the GPO Research Station[49] (this machine was unreliable) | 12 |
'New'[50] standard | 36 | 3-rotor Enigma equivalents (with high-speed Siemens-type sense relays) | 68 |
Production of bombes by BTM at Letchworth in wartime conditions was nowhere near as rapid as the Americans later achieved at NCR in Dayton, Ohio.
Year | Month | Number |
---|---|---|
1941 | December | 12 |
1942 | December | 40 |
1943 | June | 72 |
1943 | December | 87 |
1944 | December | 152 |
1945 | May | 155 |
Sergeant Jones was given the overall responsibility for Bombe maintenance by Edward Travis. Later Squadron Leader and not to be confused with Eric Jones, he was one of the original bombe maintenance engineers, and experienced in BTM techniques. Welchman said that later in the war when other people tried to maintain them, they realised how lucky they were to have him. About 15 million delicate wire brushes on the drums had to make reliable contact with the terminals on the template. There were 104 brushes per drum, 720 drums per bombe, and ultimately around 200 bombes.[52]
After World War II, some fifty bombes were retained at RAF Eastcote, while the rest were destroyed. The surviving bombes were put to work, possibly on Eastern bloc ciphers. Smith cites the official history of the bombe as saying that "some of these machines were to be stored away but others were required to run new jobs and sixteen machines were kept comparatively busy on menus." and "It is interesting to note that most of the jobs came up and the operating, checking and other times maintained were faster than the best times during the war periods."[53]
Response to the four-rotor Enigma
[edit]A program was initiated by Bletchley Park to design much faster bombes that could decrypt the four-rotor system in a reasonable time. There were two streams of development. One, code-named Cobra, with an electronic sensing unit, was produced by Charles Wynn-Williams of the Telecommunications Research Establishment (TRE) at Malvern and Tommy Flowers of the General Post Office (GPO).[54] The other, code-named Mammoth, was designed by Harold Keen at BTM, Letchworth. Initial delivery was scheduled for August or September 1942.[47] The dual development projects created considerable tension between the two teams, both of which cast doubts on the viability of the opposing team's machine. After considerable internal rivalry and dispute, Gordon Welchman (by then, Bletchley Park's Assistant Director for mechanisation) was forced to step in to resolve the situation. Ultimately, Cobra proved unreliable and Mammoth went into full-scale production.[55]
Unlike the situation at Bletchley Park, the United States armed services did not share a combined cryptanalytical service. Indeed, there was considerable rivalry between the US Army's facility, the Signals Intelligence Service (SIS), and that of the US Navy known as OP-20-G.[56] Before the US joined the war, there was collaboration with Britain, albeit with a considerable amount of caution on Britain's side because of the extreme importance of Germany and her allies not learning that its codes were being broken. Despite some worthwhile collaboration amongst the cryptanalysts, their superiors took some time to achieve a trusting relationship in which both British and American bombes were used to mutual benefit.
In February 1941, Captain Abe Sinkov and Lieutenant Leo Rosen of the US Army, and US Naval Lieutenants Robert Weeks and Prescott Currier, arrived at Bletchley Park bringing, amongst other things, a replica of the 'Purple' cipher machine for the Bletchley Park's Japanese section in Hut 7.[57] The four returned to America after ten weeks, with a naval radio direction finding unit and many documents[58] including a 'paper Enigma'.[59]
Currier later wrote:
There was complete cooperation. We went everywhere, including Hut 6. We watched the entire operation and had all the techniques explained in great detail. We were thoroughly briefed on the latest techniques in the solution of Enigma and the operations of the bombes. We had ample opportunity to take as many notes as we wanted and to watch first hand all operations involved.[60]
The main response to the Four-rotor Enigma was the US Navy bombe, which was manufactured in much less constrained facilities than were available in wartime Britain.
Year | Month | Number |
---|---|---|
1943 | June | 4 |
1943 | December | 95 |
1944 | December | 160 |
1945 | May | 180 |
US Navy Bombe
[edit]Colonel John Tiltman, who later became Deputy Director at Bletchley Park, visited the US Navy cryptanalysis office (OP-20-G) in April 1942 and recognised America's vital interest in deciphering U-boat traffic. The urgent need, doubts about the British engineering workload and slow progress, prompted the US to start investigating designs for a Navy bombe, based on the full blueprints and wiring diagrams received by US Naval Lieutenants Robert Ely and Joseph Eachus at Bletchley Park in July 1942.[62][16][63] Funding for a full, $2 million, navy development effort was requested on 3 September 1942 and approved the following day.
Commander Edward Travis, Deputy Director and Frank Birch, Head of the German Naval Section travelled from Bletchley Park to Washington in September 1942. With Carl Frederick Holden, US Director of Naval Communications they established, on 2 October 1942, a UK:US accord which may have "a stronger claim than BRUSA to being the forerunner of the UKUSA Agreement," being the first agreement "to establish the special Sigint relationship between the two countries," and "it set the pattern for UKUSA, in that the United States was very much the senior partner in the alliance."[65] It established a relationship of "full collaboration" between Bletchley Park and OP-20-G.[16]
An all electronic solution to the problem of a fast bombe was considered,[16] but rejected for pragmatic reasons, and a contract was let with the National Cash Register Corporation (NCR) in Dayton, Ohio. This established the United States Naval Computing Machine Laboratory.[3] Engineering development was led by NCR's Joseph Desch.
Alan Turing, who had written a memorandum to OP-20-G (probably in 1941),[66] was seconded to the British Joint Staff Mission in Washington in December 1942, because of his exceptionally wide knowledge about the bombes and the methods of their use. He was asked to look at the bombes that were being built by NCR and at the security of certain speech cipher equipment under development at Bell Labs.[67] He visited OP-20-G, and went to NCR in Dayton on 21 December. He was able to show that it was not necessary to build 336 Bombes, one for each possible rotor order, by utilising techniques such as Banburismus.[16] The initial order was scaled down to 96 machines.
The US Navy bombes used drums for the Enigma rotors in much the same way as the British bombes. They had eight Enigma-equivalents on the front and eight on the back. The fast drum rotated at 1,725 rpm, 34 times the speed of the early British bombes. 'Stops' were detected electronically using thermionic valves (vacuum tubes)—mostly thyratrons—for the high-speed circuits. When a 'stop' was found[68] the machine over-ran as it slowed, reversed to the position found and printed it out before restarting. The running time for a 4-rotor run was about 20 minutes, and for a 3-rotor run, about 50 seconds.[69] Each machine was 10 feet (3.0 m) wide, 7 feet (2.1 m) high, 2 feet (0.61 m) deep and weighed 2.5 tons.
The first machine was completed and tested on 3 May 1943. By 22 June, the first two machines, called 'Adam' and 'Eve' broke a particularly difficult German naval cipher, the Offizier settings for 9 and 10 June.[70] A P Mahon, who had joined the Naval Section in Hut 8 in 1941, reported in his official 1945 "History of Hut Eight 1939-1945":
The American bombe was in its essentials the same as the English bombe though it functioned rather better as they were not handicapped by having to make it, as Keen was forced to do owing to production difficulties, on the framework of a 3 wheel machine. By late autumn [1943] new American machines were coming into action at the rate of about 2 a week, the ultimate total being in the region of 125.[71]
These bombes were faster, and soon more available, than the British bombes at Bletchley Park and its outstations. Consequently, they were put to use for Hut 6 as well as Hut 8 work.[72] In Alexander's "Cryptographic History of Work on German Naval Enigma", he wrote as follows.
When the Americans began to turn out bombes in large numbers there was a constant interchange of signal - cribs, keys, message texts, cryptographic chat and so on. This all went by cable being first encyphered on the combined Anglo-American cypher machine, C.C.M. Most of the cribs being of operational urgency rapid and efficient communication was essential and a high standard was reached on this; an emergency priority signal consisting of a long crib with crib and message text repeated as a safeguard against corruption would take under an hour from the time we began to write the signal out in Hut 8 to the completion of its decyphering in Op. 20 G. As a result of this we were able to use the Op. 20 G bombes almost as conveniently as if they had been at one of our outstations 20 or 30 miles away.[73] Ch. VIII para. 11
Production was stopped in September 1944 after 121 bombes had been made.[69] The last-manufactured US Navy bombe is on display at the US National Cryptologic Museum. Jack Ingram, former Curator of the museum, describes being told of the existence of a second bombe and searching for it but not finding it whole. Whether it remains in storage in pieces, waiting to be discovered, or no longer exists, is unknown.
US Army Bombe
[edit]The US Army Bombe was physically very different from the British and US Navy bombes. The contract for its creation was signed with Bell Labs on 30 September 1942.[74] The machine was designed to analyse 3-rotor, not 4-rotor traffic. It was known as "003" or "Madame X".[75][76] It did not use drums to represent the Enigma rotors, using instead telephone-type relays. It could, however, handle one problem that the bombes with drums could not.[69][72] The set of ten bombes consisted of a total of 144 Enigma-equivalents, each mounted on a rack approximately 7 feet (2.1 m) long 8 feet (2.4 m) high and 6 inches (150 mm) wide. There were 12 control stations which could allocate any of the Enigma-equivalents into the desired configuration by means of plugboards. Rotor order changes did not require the mechanical process of changing drums, but was achieved in about half a minute by means of push buttons.[68] A 3-rotor run took about 10 minutes.[69]
Bombe rebuild
[edit]In 1994 a group led by John Harper of the BCS Computer Conservation Society started a project to build a working replica of a bombe.[77] The project required detailed research, and took thirteen years of effort before the replica was completed, which was then put on display at the Bletchley Park museum. In March 2009 it won an Engineering Heritage Award.[78] The Bombe rebuild was relocated to The National Museum of Computing on Bletchley Park in May 2018,[79] the new gallery officially re-opening on 23 June 2018.[80]
Simulators
[edit]- Virtual Bombe - Online 3D simulation of a Turing-Welchman Bombe
- Turing Bombe and US Navy Bombe simulator
See also
[edit]Notes
[edit]- ^ Welchman 2005, pp. 138–145.
- ^ Wilcox 2001, p. 33.
- ^ a b Wenger 1945.
- ^ Smith 2007, p. 60.
- ^ a b Welchman 2005, p. 77.
- ^ Fitzgerald, John; Larsen, Peter Gorm; Mukherjee, Paul; Plat, Nico; Verhoef, Marcel (6 December 2005). Validated Designs for Object-oriented Systems. ISBN 9781846281075.
- ^ Simon Singh (26 January 2011). The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. ISBN 9780307787842.
- ^ Budiansky 2000, p. 195.
- ^ Sebag-Montefiore 2004, p. 375.
- ^ Carter, p. 1.
- ^ Carter 2010.
- ^ Sale, Tony. "Military Use of the Enigma: The complexity of the Enigma machine". www.codesandciphers.org.uk. Retrieved 10 November 2019.
- ^ Kahn 1991, p. 40 states that early Enigma used 3 rotors in the machine, but 5 rotors were available. That would produce about 1 million possible starting positions. Instead of 26 positions, the early naval Enigma had 29 because it included 3 characters with umlauts.
- ^ Kahn 1991, p. 40 describes German concerns about superimposition attack.
- ^ Kahn (1991, p. 43), stating, "In particular, it accepted the uncomfortable conclusions of a study by Lieutenant Henno Lucan, second radio officer of the battleship Elsass, that in neither physical nor cryptologic security did the Enigma meet modern requirements."
- ^ a b c d e Budiansky 2000, pp. 238–242.
- ^ a b Sale, Tony, A quick revision of the Enigma machine, its physical and operational characteristics, retrieved 9 June 2011
- ^ Sale, Tony, "The Principle of the Enigma", The Enigma cipher machine, retrieved 4 February 2010
- ^ "Enigma M4: Naval 4-wheel Enigma". Crypto Museum. Retrieved 18 September 2020.
- ^ Harper 2007.
- ^ The position of the turnover notch determines at which position of a rotor's full rotation the subsequent rotor advances one step
- ^ Sale, Tony, Military Use of the Enigma: The complexity of the Enigma machine, retrieved 4 January 2014
- ^ Mahon 1945, p. 24.
- ^ Welchman 2005, p. 120.
- ^ Sale, Tony, Virtual Wartime Bletchley Park: Alan Turing, the Enigma and the Bombe, retrieved 28 February 2010
- ^ Sale, Tony, The Turing/Welchman Bombe,
Remember that the top, fast, drum on the Bombe corresponds to the slow left hand drum on the Enigma machine.
- ^ US Army 6812th Signal Security Detachment (15 June 1945). "US 6812 Bombe Report" (PDF). Retrieved 5 December 2023.
- ^ Carter, p. 4.
- ^ Sale, Tony, Virtual Wartime Bletchley Park: The Bombe and the Ringstellung problem, retrieved 30 June 2011
- ^ Carter, p. 3.
- ^ Smith 2007.
- ^ Ellsbury 1988, Ch. 2 Description of the Bombe.
- ^ Wilcox 2001, p. 12.
- ^ Ellsbury 1988, Ch. 4 How the Bombe Worked.
- ^ Alexander c. 1945, Ch. I para. 44.
- ^ Hinsley, Ransom & Knight 1988, p. 954.
- ^ Kahn 1991, p. 116–117.
- ^ Wright 2016.
- ^ Erskine, Ralph. "Allied Breaking of Naval Enigma". uboat.net. Retrieved 6 February 2017.
- ^ Kahn 1991, pp. 117–118.
- ^ "Outstations - A Brief History", Bletchley Park Jewels, archived from the original on 14 June 2011, retrieved 1 May 2010
- ^ Winterbotham 2001, p. 15.
- ^ Mary Stewart, 'Bombe' Operator, interviewed in "The Men Who Cracked Enigma", UKTV History Channel documentary series "Heroes of World War II", 2003
- ^ "Outstations from the Park", Bletchley Park Jewels, archived from the original on 13 December 2009, retrieved 16 April 2010
- ^ Toms, Susan (2005), Enigma and the Eastcote connection, archived from the original on 4 December 2008, retrieved 16 April 2010
- ^ Welchman 2005, pp. 139, 141.
- ^ a b Budiansky 2000, pp. 359–360.
- ^ Harper 2007, "Bombe Types".
- ^ Copeland, B. Jack, ed. (2006), Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, p. 285, ISBN 978-0-19-284055-4
- ^ Harper 2007, "Definitions".
- ^ Alexander c. 1945, Ch. V, para. 3.
- ^ Welchman 2005, p. 147
- ^ Smith 2007, p. 206.
- ^ Smith 2014, p. 213.
- ^ Smith 2014, pp. 213–214.
- ^ Budiansky 2000, p. 87.
- ^ Budiansky 2000, p. 176.
- ^ Budiansky 2000, p. 179.
- ^ Jacobsen, Philip H. (2000), British provision of German naval Enigma information, archived from the original on 11 July 2011, retrieved 26 March 2010
- ^ Smith 2007, p. 134.
- ^ Alexander c. 1945, Ch. V para. 3.
- ^ DeBrosse & Burke 2004, p. 74.
- ^ Wilcox 2001, p. 21.
- ^ DeBrosse, Jim (2015), Film snubs Ohioans' role breaking Enigma, Cincinnati.com: part of the USA Today network
- ^ Erskine, Ralph (Summer 1999), "The Holden Agreement on Naval Sigint: The First BRUSA?", Intelligence and National Security, 14 (2): 187–197, doi:10.1080/02684529908432545
- ^ Turing, Alan (c. 1941), "Memorandum to OP-20-G on Naval Enigma", in Copeland, B. Jack (ed.), The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma, Oxford: Oxford University Press, pp. 341–352, ISBN 0-19-825080-0
- ^ Copeland, B. Jack (2012), Turing: Pioneer of the Information Age, Oxford: Oxford University Press, pp. 81–84, ISBN 978-0-19-963979-3
- ^ a b Wenger 1945, p. 51.
- ^ a b c d Wenger 1945, p. 52.
- ^ Budiansky 2000, pp. 294–295.
- ^ Mahon 1945, p. 89.
- ^ a b Welchman 2005, p. 135.
- ^ Alexander c. 1945.
- ^ Sebag-Montefiore 2004, p. 254.
- ^ Farley 1990, p. 12.
- ^ Burke 2002, p. 136.
- ^ "The Bombe tops engineers' poll". Computer Conservation Society. Retrieved 6 February 2017.
- ^ British Computer Society (2009), BCS bombe team receives award (published 31 March 2009), archived from the original on 7 August 2016, retrieved 22 May 2009
- ^ "The Bombe arrives". The National Museum of Computing. 1 May 2018. Archived from the original on 22 June 2018. Retrieved 22 June 2018.
- ^ "Bombe Gallery opens 23 June". The National Museum of Computing. 7 June 2018. Retrieved 22 June 2018.
References
[edit]- Alexander, C. Hugh O'D. (c. 1945), Cryptographic History of Work on the German Naval Enigma, The National Archives, Kew, Reference HW 25/1
- Budiansky, Stephen (2000), Battle of wits: The Complete Story of Codebreaking in World War II, Free Press, ISBN 978-0-684-85932-3
- Burke, Colin B. (2002) [1994], It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis, 1930s-1960s (PDF), Fort Meade: Center for Cryptologic History, National Security Agency, archived from the original (PDF) on 5 March 2016
- Carter, Frank, From Bombe 'stops' to Enigma keys (PDF), Technical Papers, Milton Keynes: Bletchley Park Trust, archived from the original (PDF) on 8 January 2010
- Carter, Frank (2010), "The Turing Bombe", The Rutherford Journal, 3, ISSN 1177-1380
- Davies, Donald (April 1999), "The Bombe — a Remarkable Logic Machine", Cryptologia, 23 (2): 108–138, doi:10.1080/0161-119991887793, ISSN 0161-1194
- Davies, Donald (July 1999), "Effectiveness of the Diagonal Board", Cryptologia, 23 (3): 229–239, doi:10.1080/0161-119991887865, ISSN 0161-1194
- DeBrosse, Jim; Burke, Colin (2004), The Secret in Building 26: The Untold Story of America's Ultra War Against the U-Boat Enigma Codes, Random House, ISBN 978-0375508073
- Ellsbury, Graham (1988), The Turing Bombe: what it was and how it worked, retrieved 1 May 2010
- Farley, Robert D. (1990), Oral History Interview NSA-OH-14-83 Campaigne, Howard, Dr. 29 June 1983 (PDF), US National Security Agency, archived from the original (PDF) on 18 September 2013, retrieved 3 January 2014
- Harper, John (2007), The British Bombe: CANTAB The Rebuild Project
- Hinsley, F.H.; Ransom, C.F.G.; Knight, R.C.C. (1988), British Intelligence in the Second World War: Volume 3, Part 2: v. 3, Cambridge: Cambridge University Press, ISBN 978-0-521-35196-6
- Kahn, David (1991), Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939–1943, Houghton-Mifflin, ISBN 0-395-42739-8
- Keen, John (2003), Harold 'Doc' Keen and the Bletchley Park bombe, Cleobury Mortimer, England: M & M Baldwin, ISBN 978-0-947712-42-6
- Mahon, A.P. (1945), The History of Hut Eight 1939 - 1945, UK National Archives Reference HW 25/2, retrieved 10 December 2009
- Sale, Tony, "Alan Turing, the Enigma and the Bombe", Virtual Wartime Bletchley Park, retrieved 1 May 2010
- Sebag-Montefiore, Hugh (2004) [2000], Enigma: The Battle for the Code (Cassell Military Paperbacks ed.), London: Weidenfeld & Nicolson, ISBN 978-0-297-84251-4
- Smith, Christopher (2014), "How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park", History of Science, 52 (2): 200–222, doi:10.1177/0073275314529861, S2CID 145181963
- Smith, Michael (2007) [1998], Station X: The Codebreakers of Bletchley Park, Pan Grand Strategy Series (Pan Books, Revised and Extended ed.), London: Pan MacMillan Ltd, ISBN 978-0-330-41929-1
- US Army (1945), "The US 6812 Division Bombe Report Eastcote 1944", Tony Sale's Codes and Ciphers, archived from the original on 22 July 2009, retrieved 1 May 2010
- Welchman, Gordon (2005) [1997], The Hut Six story: Breaking the Enigma codes, Cleobury Mortimer, England: M&M Baldwin, ISBN 9780947712341 New updated edition of 'Welchman, Gordon (1982), The Hut Six Story: Breaking the Enigma Codes, London: Allen Lane, ISBN 0-7139-1294-4' with an addendum consisting of a 1986 paper written by Welchman that corrects his misapprehensions in the 1982 edition.
- Wenger, J. N.; Engstrom, H. T.; Meader, R. I. (30 May 1944), History of The Bombe Project: Memorandum for the Director of Naval Communications, The Mariner's Museum (published 1998), archived from the original on 16 June 2010
- Wenger, J. N. (12 February 1945), "Appendix II: U. S. Army Cryptanalytic Bombe", Solving the Enigma: History of the Cryptanalytic Bombe, a NSA phamphlet, archived from the original on 2 October 2014, retrieved 24 January 2017 (also National Archives and Records Administration Record Group 457, File 35701.)
- Wilcox, Jennifer E (2001), "About the Enigma", Solving the Enigma: History of the Cryptanalytic Bombe, a NSA phamphlet, Center for Cryptologic History, National Security Agency, ASIN B0006RLRA4, archived from the original on 17 March 2010, retrieved 9 April 2010
- Winterbotham, F.W. (2001) [1974], The ULTRA Secret, Orion Books Ltd, ISBN 0-7528-3751-6
- Wright, John (2016), "The Turing Bombe Victory and the first naval Enigma decrypts", Cryptologia, 41 (4): 295–328, doi:10.1080/01611194.2016.1219786, S2CID 205488462
External links
[edit]- A bombe simulator (in Javascript)
- Museum of Learning - Bombe: The Challenge Of The Four Rotor Enigma Machine
- Enigma and the Turing Bombe by N. Shaylor, 17 April 1997. Includes a simulator (a Java applet and C)
- Dayton Codebreakers — documentary on the US Navy's Bombe; information on Desch, personnel of the US Naval Computing Machine Laboratory.
- A simulator for both Turing and US Navy Bombes
- Breaking German Navy Ciphers - The U534 Enigma M4 messages: Cracked with a Turing Bombe software
- Enigma Cipher Machines at Crypto Museum.