Colossus computer

[3] Colossus was designed by General Post Office (GPO) research telephone engineer Tommy Flowers[1] based on plans developed by mathematician Max Newman at the Government Code and Cypher School (GC&CS) at Bletchley Park.

[9] A functioning reconstruction of a Mark 2 Colossus was completed in 2008 by Tony Sale and a team of volunteers; it is on display in The National Museum of Computing at Bletchley Park.

This led the British to call encrypted German teleprinter traffic "Fish",[14] and the unknown machine and its intercepted messages "Tunny" (tunafish).

However, the cryptanalysts worked out that by examining the frequency distribution of the character-to-character changes in the ciphertext, instead of the plain characters, there was a departure from uniformity which provided a way into the system.

To discover the start position of the chi wheels for a message, Colossus compared two character streams, counting statistics from the evaluation of programmable Boolean functions.

The two streams were the ciphertext, which was read at high speed from a paper tape, and the keystream, which was generated internally, in a simulation of the unknown German machine.

After a succession of different Colossus runs to discover the likely chi-wheel settings, they were checked by examining the frequency distribution of the characters in the processed ciphertext.

This was the section at Bletchley Park led by Major Ralph Tester where the bulk of the decrypting work was done by manual and linguistic methods.

The feasibility of utilizing this additional capability regularly was made possible in the last few months of the war when there were plenty of Colossi available and the number of Tunny messages had declined.

Tommy Flowers MBE[d] was a senior electrical engineer and Head of the Switching Group at the Post Office Research Station at Dollis Hill.

Prior to his work on Colossus, he had been involved with GC&CS at Bletchley Park from February 1941 in an attempt to improve the Bombes that were used in the cryptanalysis of the German Enigma cipher machine.

[37] He presented this design to Max Newman in February 1943, but the idea that the one to two thousand thermionic valves (vacuum tubes and thyratrons) proposed, could work together reliably, was greeted with great scepticism,[38] so more Robinsons were ordered from Dollis Hill.

[40] Flowers and his team of some fifty people in the switching group[41][42] spent eleven months from early February 1943 designing and building a machine that dispensed with the second tape of the Heath Robinson, by generating the wheel patterns electronically.

[41] It performed satisfactorily at Dollis Hill on 8 December 1943[45] and was dismantled and shipped to Bletchley Park, where it was delivered on 18 January and re-assembled by Harry Fensom and Don Horwood.

[50] Allen Coombs took over leadership of the production Mark 2 Colossi, the first of which – containing 2,400 valves – became operational at 08:00 on 1 June 1944, just in time for the Allied Invasion of Normandy on D-Day.

[37][53] Most of the design of the electronics was the work of Tommy Flowers, assisted by William Chandler, Sidney Broadhurst and Allen Coombs; with Erie Speight and Arnold Lynch developing the photoelectric reading mechanism.

The design overcame the problem of synchronizing the electronics with the speed of the message tape by generating a clock signal from reading its sprocket holes.

Flowers designed a 6-character shift register, which was used both for computing the delta function (ΔZ) and for testing five different possible starting points of Tunny's wheels in the five processors.

[59][60] The Newmanry was staffed by cryptanalysts, operators from the Women's Royal Naval Service (WRNS) – known as "Wrens" – and engineers who were permanently on hand for maintenance and repair.

The input data for the five parallel processors was read from the looped message paper tape and the electronic pattern generators for the chi, psi and motor wheels.

Each processor could evaluate a Boolean function and count and display the number of times it yielded the specified value of "false" (0) or "true" (1) for each pass of the message tape.

Input to the processors came from two sources, the shift registers from tape reading and the thyratron rings that emulated the wheels of the Tunny machine.

Some parts, sanitised as to their original purpose, were taken to Max Newman's Royal Society Computing Machine Laboratory at Manchester University.

[74] Jack Good related how he was the first to use Colossus after the war, persuading the US National Security Agency that it could be used to perform a function for which they were planning to build a special-purpose machine.

[78] Randell was researching the history of computer science in Britain for a conference on the history of computing held at the Los Alamos Scientific Laboratory, New Mexico on 10–15 June 1976, and got permission to present a paper on wartime development of the COLOSSI at the Post Office Research Station, Dollis Hill (in October 1975 the British Government had released a series of captioned photographs from the Public Record Office).

[g] [79] In October 2000, a 500-page technical report on the Tunny cipher and its cryptanalysis—entitled General Report on Tunny[80]—was released by GCHQ to the national Public Record Office, and it contains a fascinating paean to Colossus by the cryptographers who worked with it: It is regretted that it is not possible to give an adequate idea of the fascination of a Colossus at work; its sheer bulk and apparent complexity; the fantastic speed of thin paper tape round the glittering pulleys; the childish pleasure of not-not, span, print main header and other gadgets; the wizardry of purely mechanical decoding letter by letter (one novice thought she was being hoaxed); the uncanny action of the typewriter in printing the correct scores without and beyond human aid; the stepping of the display; periods of eager expectation culminating in the sudden appearance of the longed-for score; and the strange rhythms characterizing every type of run: the stately break-in, the erratic short run, the regularity of wheel-breaking, the stolid rectangle interrupted by the wild leaps of the carriage-return, the frantic chatter of a motor run, even the ludicrous frenzy of hosts of bogus scores.

In November 2007, to celebrate the project completion and to mark the start of a fundraising initiative for The National Museum of Computing, a Cipher Challenge[84] pitted the rebuilt Colossus against radio amateurs worldwide in being first to receive and decode three messages enciphered using the Lorenz SZ42 and transmitted from radio station DL0HNF in the Heinz Nixdorf MuseumsForum computer museum.

The challenge was easily won by radio amateur Joachim Schüth, who had carefully prepared[85] for the event and developed his own signal processing and code-breaking code using Ada.

[86] The Colossus team were hampered by their wish to use World War II radio equipment,[87] delaying them by a day because of poor reception conditions.

"We are delighted to have produced a fitting tribute to the people who worked at Bletchley Park and whose brainpower devised these fantastic machines which broke these ciphers and shortened the war by many months.

A Lorenz SZ42 cipher machine with its covers removed at The National Museum of Computing on Bletchley Park
The Lorenz SZ machines had 12 wheels, each with a different number of cams (or "pins").
Wheel number 1 2 3 4 5 6 7 8 9 10 11 12
BP wheel name [ 13 ] ψ 1 ψ 2 ψ 3 ψ 4 ψ 5 μ 37 μ 61 χ 1 χ 2 χ 3 χ 4 χ 5
Number of cams (pins) 43 47 51 53 59 37 61 41 31 29 26 23
Cams on wheels 9 and 10 showing their raised (active) and lowered (inactive) positions. An active cam reversed the value of a bit (0→1 and 1→0).
Valves (vacuum tubes) seen on end in a recreation of the Colossus computer
Stepping switch said to be from an original Colossus, presented by the Director of GCHQ to the Director of the NSA to mark the 40th anniversary of the UKUSA Agreement in 1986 [ 33 ]
Colossus 10 with its extended bedstead in Block H at Bletchley Park in the space now containing the Tunny gallery of The National Museum of Computing
Colossus selection panel showing selections amongst others, of the far tape on the bedstead, and for input to the algorithm: Δ Z , Δ and Δ .
Colossus K2 switch panel showing switches for specifying the algorithm (on the left) and the counters to be selected (on the right)
Colossus 'set total' switch panel
A team led by Tony Sale (right) reconstructed a Colossus Mark II at Bletchley Park. Here, in 2006, Sale supervises the breaking of an enciphered message with the completed machine.
Front view of the Colossus reconstruction showing, from right to left: (1) The "bedstead" containing the message tape in its continuous loop and with a second one loaded. (2) The J-rack containing the Selection Panel and Plug Panel. (3) The K-rack with the large "Q" switch panel and sloping patch panel. (4) The double S-rack containing the control panel and, above the image of a postage stamp, five two-line counter displays. (5) The electric typewriter in front of the five sets of four "set total" decade switches in the C-rack. [ 90 ]