The depth HQIBPEXEZMUG is intercepted & read. September December Whole of Research Section works on trying to analyze the key produced by the depth

Similar documents
This Hard & Calcined Earth

Code Breakers: Uncovering German Messages. by Rena Korb. Scott Foresman Reading Street 4.4.4

World War II Unit Day Four U.S. History. The key events, figures, and outcomes of the Atomic Bombing of Japan.

Background Data: Naval Warfare, Battle of the Atlantic, Cryptography, and the Code Game. Battle of the Atlantic Allied Convoys vs.

Alan Turing: Codebreaker

BP s Sturgeon, The FISH That Laid No Eggs

Barbarossa: The War in the East, Second Edition "The Child's Game of Barbarossa" v 1.0

Students To Write Newspaper for Main Unit Assignment The War Has Just Ended

AXIS AND ALLIES 1914 OPTIONAL RULE: RESEARCH AND DEVELOPMENT

Purple. Used by Japanese government. Not used for tactical military info. Used to send infamous 14-part message

Introduction. Echelon.

The NATIONAL AND INTERNATIONAL VALUE of BLETCHLEY PARK. A PLATFORM FOR DISCUSSION and its future

BREAKING TELEPRINTER CIPHERS AT BLETCHLEY PARK

Axis And Allies 1941 Board Game Rules Pdf

Overview: The works of Alan Turing ( )

DOWNLOAD OR READ : LENINGRAD THE EPIC SIEGE OF WORLD WAR II ANNA REID PDF EBOOK EPUB MOBI

The Fall Of Japan (World War II) By Keith Wheeler

2014 Griggling Games

An Axis & Allies variant

UNIT 19 Lesson Plan 1

Bulgaria: May enter the war any time from II 1915 on, or if Serbia is conquered.

Nationalities. German Italians British Americans French Soviets (occupation markers only) Combat Units. Land Units

Introduction General Erwin Rommel Components

RICHARD FLETCHER, Secretary, the Bill Tutte Memorial Fund

General Research. Air Research Projects. Jets (Germany, Britain, U.S., Russia, Japan) Air Range (Germany, Western Allies, Russia, Japan)

International Patent Cartels and Patent Statistics Between World War I and World War II

Rules of Play T A B L E O F C O N T E N T S

Airplane. Estimated Casualty Statistics for the Battle of Tannenberg Allied Powers: 267,000 Central Powers: 80,000

National HRO Receivers. Presented to the Ozaukee Radio Club May 10, 2017 Patrick Volkmann W9JI

DIY Pencil-and-Paper Encryption

HISTORY of TELEGRAPHY. Ken Beauchamp. The Institution of Electrical Engineers

Components: Game Map. Unit Chart. Weather Effects. Terrain effects are listed in the rules. Turn Track

CPSC 467: Cryptography and Computer Security

Demonstration Gathering Storm game

The Manhattan Project (NCSS8)

CHAPTER 7 THE GERMAN EMBASSY CASE

Bellwork 5/2/16. Using the second half of page 763 in Barzun, answer the question below in at least five sentences:

University of Haifa, 1 st Semester, 2015/2016 Syllabus Dr. Daniel Uziel World at War: The History of the Second World War

Education Umbrella,

JULIUS GOLDSTEIN PAPERS, approximately

Mapping the Invasion of America, 1942

Radio Data System (RDS) Dr. Campanella Michele

Codes and Nomenclators

Airplane. Estimated Casualty Statistics for the Battle of Tannenberg Allied Powers: 267,000 Central Powers: 80,000. Artillery

Historical cryptography 2. CSCI 470: Web Science Keith Vertanen

Field of Glory - Napoleonic Quick Start Rules

FOX ON THE RHINE BY DOUGLAS NILES, MICHAEL DOBSON

LA6NCA LA6NCA

Drill Time: Remainders from Long Division

Sending Messages Using Morse Code

The Rules of the Game

Alliances Leading to (Simulation Prep)

Multi-Robot Cooperative System For Object Detection

Table of Contents [2.0] GAME EQUIPMENT [0.0] USING THESE RULES [1.0] INTRODUCTION [3.0] SET UP

16.0 OPTIONAL RULES These rules may be introduced to add variety to your games. WWII on the High Seas

British Commonwealth 70. CANADA AND SOUTH AFRICA 71. AUSTRALIA 70.1 CANADA: 71.1 OVERVIEW: 70.2 SOUTH AFRICA:

History of Communication

Jeddah Knowledge International School

Axis Empires: Dai Senso! Errata and Clarifications (As of October 1, New stuff since the May 1, 2012 document appears in red.

Larsson's A&A50 House Rules

University of Florida Department of Electrical and Computer Engineering Intelligent Machine Design Laboratory EEL 4665 Spring 2013 LOSAT

Scenes From World War II Photoshopped Onto Today's Streets

Manhattan Project. This was the Manhattan Project. In 1945, they successfully tested the first Atomic Bomb.

A.D.I.(K) Report No.525/1944

Caesar Augustus. Introduction. Caesar Augustus Copyright Edward Seager A board game by Edward Seager

Montelimar: Anvil of Fate Scenario 1 -Opening Blows - The Feint

Quick Guide: How to Play The Cold War Era

CORRECT THIRD REICH by Stuart Smart

World History Unit 13 Lesson 1 The Start of WWI The Belle Epoque The late 1800s & early 1900s had been a time of great scientific discoveries &

FUTURE WAR WAR OF THE ROBOTS?

Intercepting WW II Enemy Wireless Signals at Ottawa Monitoring Station. Ernie Brown VA3OEB

Areas of the museum to visit for this lesson plan: The Admiral Nimitz Museum and the George H.W. Bush Gallery

SECRET A. D. I. (K) Report No. 402/1945

Struggle of Empires Game design by Martin Wallace. Artwork by Peter Dennis.

Caesar Augustus. Introduction. Caesar Augustus Copyright Edward Seager A board game by Edward Seager

CANDOER News. Volume 8 Number 2 Inside this issue

RESERVES RESERVES CONTENTS TAKING OBJECTIVES WHICH MISSION? WHEN DO YOU WIN PICK A MISSION RANDOM MISSION RANDOM MISSIONS

HEXBLITZ GENERAL INFORMATION

Do Now. Don't forget to turn your homework into the basket! Describe what you know about how the Japanese were defeated in World War II.

Free MInieZine - April With BONUS Poster!

1.- Historical Introduction... Pág The Barbarossa Game... Pág Playing on a compute... Pág. 5

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

1) He was the American President during the duration of the First World War.

General Rules. 1. Game Outline DRAGON BALL SUPER CARD GAME OFFICIAL RULE When all players simultaneously fulfill loss conditions, the MANUAL

General Rules. 1. Game Outline DRAGON BALL SUPER CARD GAME OFFICIAL RULE. conditions. MANUAL

Chapter 14 Section 3. The War in the Pacific

Course Outline. Textbook: G. Michael Schneider and Judith L. Gersting, "Invitation to Computer Science C++ Version," 3rd Edition, Thomson, 2004.

Chapter 4 MASK Encryption: Results with Image Analysis

Canada and the Second World War

MA 111, Topic 2: Cryptography

Deep-water fish stocks ICES advice Tom Blasdale ICES WGDEEP

All about Go, the ancient game in which AI bested a master 10 March 2016, by Youkyung Lee

La Storia dei Messaggi Segreti fino alle Macchine Crittografiche

WHITE PAPER Saving Lives with Intelligent In-Vehicle Systems

DistrictVilages QualitativeStudy: In-DepthInterview Guides

Revolutionary Activity Guide Discover Revolutionary New Jersey

Components Locked-On contains the following components:

quick q st uick ar st t ar guide t

Generic Profiles V 1.0

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

Transcription:

Appendix A - Fish Chronology 1940 First non-morse transmissions heard, but not followed up due to lack of resources and concentration on Enigma Swedish codebreaker, Arno Beurling, breaks the Siemens T52 version of the Geheimschreiber used on landline between Denmark and Norway. 1941 Research Section set up under Colonel John Tiltman and Major Gerry Morgan More non-morse Baudot/teleprinter and Hellschreiber transmissions detected and experiments with new directional wireless techniques. Bill Tutte and Jack Good join GC&CS First Tunny (Lorenz SZ40) link opens between Vienna and Athens. Work in Research Section starts on wireless teleprinter cipher. Hitler launches invasion of Russia, Barbarossa. The depth HQIBPEXEZMUG is intercepted & read. September Whole of Research Section works on trying to analyze the key produced by the depth Norwegian secret agent passes information about Swedish break of the Siemens T52 to GC&CS GC&CS considers exchanging information on the SZ40 with the Russians in the hope that they may provide useful information in return. Russia counter-attacks at Moscow; Japanese attack on US fleet at Pearl Harbour; Germany declares war on USA. 1942 Tunny Machine broken for 1941 following Bill Tutte s analysis of the key produced by reading the depth. References to Geheimschreiber intercepted on non-morse links during operator chat.

March GC&CS identifies four Non-Morse groups in operation (NoMo1 4) Broken traffic shows pin patterns re-arranged, so preventing Tutte s technique for analyzing the key from a depth Tone transmission replaces Hellschreiber July October First Tunny analogue machines ordered GC&CS breaks the SZ40 Geheimschreiber for March 1942 First attempts at Chi setting References to Saegefisch intercepted in chat on non-morse lines and on parallel Enigma/Morse wireless links. Decision taken to set up special non-morse wireless interception station Wheels broken before the end of the month by the indicator method First Tunny analogue arrives Land requisitioned for Knockholt non-morse wireless interception station on the North Downs in Kent. Testery founded to take over work from Research Section Current traffic read for the first time Turingery method introduced Montgomery reverses defeats in desert, halting Rommel at Alam Halfa Introduction of Quatsch (nonsense text) Interceptions begin at Knockholt. Experimental Tunny link closed, replaced by link called Octopus. Codfish link to South Russia opens. Use starts of QEP systems and monthly change of Psi patterns Testery confined to depths Research Section starts to investigate statistical methods Battle of El Alamein. Max Newman joins GC&CS New Fish links to Russia intercepted Newman suggests electronic counters 1+2 break in invented by Tutte for implementing statistical approach Message set statistically using delta-cipher-1 + delta-cipher-2 rectangle Newman given task of developing machines for setting Tunny German 6 Army surrounded at Stalingrad. Herring link opens between Rome and North Africa

1943 February March July September October Early Robinson designed and ordered. Knockholt goes into full production. DZ4JA (with Chi-2 limitation) makes first appearance on Codfish Research Section breaks Chis statistically from cipher text by rectangles X2 P5 limitation tried experimentally on Herring Plans for mechanical setting of Tunny and Sturgeon well under way X2 limitation broken First sixteen Wrens arrive X2 P5 broken by Testery and Research Section Fish decrypt reveals German plans for attack on the Kursk salient, operation Zitadelle. Method of contracted de-chi successful Axis forces in North Africa surrender and two Geheimschreibers captured. Beginning of month Bream link, between Rome and Berlin, opens. The link is broken by the end of the month. It was to be the most productive of all Fish links in terms of value and volume of intelligence. Newmanry starts work Arrival of Heath Robinson First Newmanry Tunny analogue (a more complex machine than the first Tunny analogues Allied invasion of Sicily. Battle of Kursk. German offensive, Zitadelle fails and Russian army launches major counter-offensive. Fall of Mussolini. Discovery that Knocholt was producing a lot of slides in tapes Suggestion of and/or machine and repeated use of character in Colossus and Robinson Discovery that best delta-p letter is not necessarily / Expected score of motor run in terms of delta-d Allied landings in southern Italy. Changeover from two to three shifts German military occupation of Italy. Newmanry moved from Hut 11 to Block F First production Robinson arrives

Recognition that de-chis can be broken by hand Reappearance of X2 + P5 limitation in Bream and Codfish traffic Testery take on Psi and motor setting and Newmanry concentrate on Chi setting and breaking Second production Robinson arrives Recognition that delta-d statistics (rather than delta-p) are the quickest way of finding new keys. 1944 February March July General Registeries of the Newmanry and Testery amalgamated Direct teleprinter line from Knockholt to Block F installed Robinson 3 (first double bedstead machine) installed X5 now set in Newmanry rather than sending de-chis on only four impulses [units] to Testery Jellyfish link, Paris to Berlin, opens Colossus I installed Spanning suggested Colossus first used for wheel breaking Robinson IV installed Jellyfish first broken (using a crib from Bream) First motor runs successfully done on Colossus New Tunny analogue machine, new Garbos and one Mrs Miles installed Significance tests for rectangles Cribs predicted by Sixta successfully used for wheel breaking for the first time D-Day Allied invasion of North-West Europe SZ40B first used on Codfish with X2 Ps1 P5 limitation Daily meetings started Colossus II installed First indications of change of wheel pin patterns becoming more frequent than once a month. Daily wheel changes on Jellyfish Koenigsberg exchange closes and moves to Zossen Slide runs started using test tapes to check machines

Colossus III installed More reliable Robinsons designed, suitable for work on cribs New staircasing method evolved for cribs Significance tests for wheel breaking runs introduced September October Daily wheel changes on almost all Tunny links Number of computers [i.e. human operators] increased very considerably First rectangles made on Colossus Colossus IV installed. Several links cease using the P5 limitation Work starts on Block H Colossus V installed Thurlow rectangles first done Combined X3 flag for key introduced with significance test Further reorganization of Tunny Colossus VI and first super-robinson installed Colossus VI takes tapes up to 25,000 characters long Copy correction checks (for correction of tapes) introduced 15 th The Fire New type of test runs for checking Colossus test runs Kedlestone Hall starts operating Knockholt reorganized Colossus VII installed New adaptations of rectangling methods used to break short stretches of key P5 limitation largely abandoned by the Germans Extensive motor and Psi setting by machine Colossus decoding invented Theory of coalescence 1945 February Psi test runs first made De-Chi checks first done Education committee first formed Colossus VIII installed Second super-robinson finished Device installed on Colossus VI enabling rectangles to be computed quickly Rectangles now produced on tape to mechanize computing on keys

Colossus IX installed Tests carried out on Thrasher (on new Robinsons) give negative results with regard to Tunny type machines March Exchange set up at Salzburg Mechanical flags instituted Wrens taught wheel-breaking Machine tested regularly by Wrens Rectangle making started on super-robinsons Colossus X installed US 5020 optical machine arrived to start work experimentally Victory in Europe Last Tunny message sent Change from three to two shifts Work on back traffic (1942-4) History and 5202 Sections formed Two sets of German Tunny equipment arrive Experimental operations using 5202 Experimental work on Colossi for non-fish purposes