词条 | Bombe | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
释义 |
The bombe ({{IPAc-en|UK|b|ɒ|m|b}}) is an electro-mechanical device used by Polish and British cryptologists to help decipher German Enigma-machine-encrypted secret messages during World War II.{{sfn|Welchman|2005|pp=138–145}} The US Navy{{sfn|Wilcox|2001|p=33}} and US Army{{sfn|Wenger|1945}} later produced their own machines to the same functional specification, albeit engineered differently both from each other and from Polish and British Bombes. The British bombe was a development from a device that had been designed in Poland at the Biuro Szyfrów (Cipher Bureau) by cryptologist Marian Rejewski, known as the "bomba" ({{lang-pl|bomba kryptologiczna}}) who had been breaking German Enigma messages for the previous seven years using it and earlier machines. The initial design of the British bombe was produced in 1939 at the UK Government Code and Cypher School (GC&CS) at Bletchley Park by Alan Turing,{{sfn|Smith|2007|p=60}} with an important refinement devised in 1940 by Gordon Welchman.{{sfn|Welchman|2005|p=77}} The engineering design and construction was the work of Harold Keen of the British Tabulating Machine Company. The first bombe, code-named Victory, was installed in March 1940[1] while the second version, Agnus Dei or Agnes, incorporating Welchman's new design, was working by August 1940.[2] The bombe was designed to discover some of the daily settings of the Enigma machines on the various German military networks: specifically, the set of rotors in use and their positions in the machine; the rotor core start positions for the message—the message key—and one of the wirings of the plugboard.{{sfn|Budiansky|2000|p=195}}{{sfn|Sebag-Montefiore|2004|p=375}}{{sfn|Carter|p=1}} The Enigma machine{{Main|Enigma machine}}{{EnigmaSeries}}The Enigma is an electro-mechanical rotor machine used for the encryption and decryption of secret messages. It was developed in Germany in the 1920s. The repeated changes of the electrical pathway from the keyboard to the lampboard implement a polyalphabetic substitution cipher, which turns plaintext into ciphertext and back again. The Enigma's scrambler contains rotors with 26 electrical contacts on each side, whose wiring diverts the current to a different position on the two sides. On depressing a key on the keyboard, an electric current flows through an entry drum at the right-hand end of the scrambler, then through the set of rotors to a reflecting drum (or reflector) which turns it back through the rotors and entry drum, and out to cause one lamp on the lampboard to be illuminated.{{sfn|Carter|2010}} At each key depression, the right-hand or "fast" rotor advances one position, which causes the encipherment to change. In addition, at a certain point, the right-hand rotor causes the middle rotor to advance; in a similar way, the middle rotor might cause the left-hand (or "slow") rotor to advance. Each rotor causes the "turnover" of the rotor to its left after a full rotation. The Enigma operator could rotate the wheels by hand to change the letter of the alphabet showing through a window, to set the start position of the rotors for enciphering a message. This three-letter sequence is the "message key". There are 26 × 26 × 26 {{=}} 17,576 possible positions of the set of three rotors, and hence different message keys. By opening the lid of the machine and releasing a compression bar, the set of three rotors on their spindle could be removed from the machine and their sequence (called the "wheel order" at Bletchley Park) could be altered. Multiplying 17,576 by the six possible wheel orders gives 105,456 different ways that the scrambler could be set up.{{cn|date=August 2018}} Although 105,456 is a large number[3], it does not guarantee security. A brute-force attack is possible: one could imagine using 100 code clerks who each tried to decode a message using 1000 distinct rotor settings. The Poles developed card catalogs so they could easily find rotor positions; Britain built " In 1930, the German army introduced an additional security feature, a plugboard (Steckerbrett in German; each plug is a Stecker) that further scrambled the letters. The Enigma encryption is a self inverse: it swapped letters in pairs: if An important feature of the machine from a cryptanalyst's point of view, and indeed Enigma's Achilles' heel, was that the reflector in the scrambler meant that a letter was never enciphered as itself. Any putative solution that gave, for any location, the same letter in the proposed plaintext and the ciphertext could therefore be eliminated.[7] In the lead up to World War II, the Germans made successive improvements to their military Enigma machines. By January 1939, additional rotors had been introduced so that there was a choice of three from five (i.e. 60 wheel orders) for the army and airforce Enigmas, and three out of eight (336 wheel orders) for the navy machines. In addition, ten leads were used on the plugboard leaving only six letters unsteckered. This meant that the airforce and army Enigmas could be set up 1.5×1019 ways. In 1941 the German navy introduced a version of Enigma with rotatable reflector (the M4 or Four-rotor Enigma) for communicating with its U-boats. This could be set up in 1.8×1020 different ways.[6] Four-rotor EnigmaBy late 1941 a change in German Navy fortunes in the Battle of the Atlantic, combined with intelligence reports, convinced Admiral Karl Dönitz that the Allies could read German Navy coded communications, and a fourth rotor with unknown wiring was added to German Navy Enigmas used for U-boat communications, producing the Triton system,{{dubious|reason=Triton was a network; the machine was the M4|date=January 2015}} known at Bletchley Park as Shark. This was coupled with a thinner reflector design to make room for the extra rotor. The Triton was designed in such a way that it remained compatible with three-rotor machines when necessary. One of the extra 'fourth' rotors, the 'beta', was designed so that when it was paired with the thin 'B' reflector and rotor and ring were set to 'A', the pair acted as a standard three-rotor wide 'B' reflector. As before, the unknown wiring would prevent unauthorized reading of messages. Fortunately for the Allies, in December 1941, before the machine went into official service, a submarine accidentally sent a message with the fourth rotor in the wrong position. It then retransmitted the message with the rotor in the correct (three-rotor emulating) position. In February 1942 the change in the number of rotors used became official, and the Allies' ability to read German submarines' messages ceased until a snatch from a captured U-boat revealed not only the four-rotor machine's ability to emulate a three-rotor machine, but also that the fourth rotor did not move during a message. This along with the aforementioned mistake allowed the code breakers to eventually figure out the wiring of both the 'beta' and 'gamma' fourth rotors.{{cn|date=August 2018}} The first half of 1942 was the "Second Happy Time" for the German U-boats, with renewed success in attacking Allied shipping. This was due to the security of the new Enigma, and their ability to read Allied convoy messages sent in Naval Cipher No. 3. Between January and March 1942, German submarines sank 216 ships off the US east coast. In May 1942 the US began using the convoy system and requiring a blackout of coastal cities so that ships would not be silhouetted against their lights, but this yielded only slightly improved security for Allied shipping. The Allies' failure to change the cipher for three months plus the fact that Allied messages never contained any raw Enigma decrypts (or even mentioned that they were decrypting messages), helped convince the Germans that their messages were secure. Conversely, the Allies learned that the Germans had broken the naval cipher almost immediately from Enigma decrypts, but lost many ships due to the delay in changing the cipher.{{citation needed|date=July 2015}} The principle of the bombeThe following settings of the Enigma machine must be discovered to decipher German military Enigma messages. Once these are known, all the messages for that network for that day (or pair of days in the case of the German navy) could be decrypted. Internal settings (that required the lid of the Enigma machine to be opened)
External settings (that could be changed without opening the Enigma machine)
The bombe identified possible initial positions of the rotor cores and the stecker partner of a specified letter for a set of wheel orders. Manual techniques were then used to complete the decryption process.{{sfn|Mahon|1945|p=24}} In the words of Gordon Welchman, "... the task of the bombe was simply to reduce the assumptions of wheel order and scrambler positions that required 'further analysis' to a manageable number".{{sfn|Welchman|2005|p=120}} StructureThe bombe was an electro-mechanical device that replicated the action of several Enigma machines wired together. A standard German Enigma employed, at any one time, a set of three rotors, each of which could be set in any of 26 positions. The standard British bombe contained 36 Enigma equivalents, each with three drums wired to produce the same scrambling effect as the Enigma rotors. A bombe could run two or three jobs simultaneously. Each job would have a menu that had to be run against a number of different wheel orders. If the menu contained 12 or fewer letters, three different wheel orders could be run on one bombe; if more than 12 letters, only two. In order to simulate Enigma rotors, each rotor drum of the bombe had two complete sets of contacts, one for input towards the reflector and the other for output from the reflector, so that the reflected signal could pass back through a separate set of contacts. Each drum had 104 wire brushes, which made contact with the plate onto which they were loaded. The brushes and the corresponding set of contacts on the plate were arranged in four concentric circles of 26. The outer pair of circles (input and output) were equivalent to the current in an Enigma passing in one direction through the scrambler, and the inner pair equivalent to the current flowing in the opposite direction. The interconnections within the drums between the two sets of input and output contacts were both identical to those of the relevant Enigma rotor. There was permanent wiring between the inner two sets of contacts of the three input/output plates. From there, the circuit continued to a plugboard located on the left-hand end panel, which was wired to imitate an Enigma reflector and then back through the outer pair of contacts. At each end of the "double-ended Enigma", there were sockets on the back of the machine, into which 26-way cables could be plugged. The bombe drums were arranged with the top one of the three simulating the left-hand rotor of the Enigma scrambler, the middle one the middle rotor, and the bottom one the right-hand rotor. The top drums were all driven in synchrony by an electric motor. For each full rotation of the top drums, the middle drums were incremented by one position, and likewise for the middle and bottom drums, giving the total of 26 × 26 × 26 = 17,576 positions of the 3-rotor Enigma scrambler.[9][10] The drums were colour-coded according to which Enigma rotor they emulated: I Red; II Maroon; III Green; IV Yellow; V Brown; VI Cobalt (Blue); VII Jet (Black); VIII Silver.[11] At each position of the rotors, an electric current would or would not flow in each of the 26 wires, and this would be tested in the bombe's comparator unit. For a large number of positions, the test would lead to a logical contradiction, ruling out that setting. If the test did not lead to a contradiction, the machine would stop. The operator would record the candidate solution by reading the positions of the indicator drums and the indicator unit on the Bombe's right-hand end panel. The operator then restarted the run. The candidate solutions, stops as they were called, were processed further to eliminate as many false stops as possible. Typically, there were many false bombe stops before the correct one was found. The candidate solutions for the set of wheel orders were subject to extensive further cryptanalytical work. This progressively eliminated the false stops, built up the set of plugboard connections and established the positions of the rotor alphabet rings.{{sfn|Carter|p=4}} Eventually, the result would be tested on a Typex machine that had been modified to replicate an Enigma, to see whether that decryption produced German language.[12] Bombe menuA bombe run involved a cryptanalyst first obtaining a crib — a section of plaintext that was thought to correspond to the ciphertext. Finding cribs was not at all straightforward; it required considerable familiarity with German military jargon and the communication habits of the operators. However, the codebreakers were aided by the fact that the Enigma would never encrypt a letter to itself. This helped in testing a possible crib against the ciphertext, as it could rule out a number of cribs and positions, where the same letter occurred in the same position in both the plaintext and the ciphertext. This was termed a crash at Bletchley Park. Once a suitable crib had been decided upon, the cryptanalyst would produce a menu for wiring up the bombe to test the crib against the ciphertext. The following is a simplified explanation of the process of constructing a menu. Suppose that the crib is ATTACKATDAWN to be tested against a certain stretch of ciphertext, say, WSNPNLKLSTCS. The letters of the crib and the ciphertext were compared to establish pairings between the ciphertext and the crib plaintext. These were then graphed as in the diagram. It should be borne in mind that the relationships are reciprocal so that A in the plaintext associated with W in the ciphertext is the same as W in the plaintext associated with A in the ciphertext. At position 1 of the plaintext-ciphertext comparison, the letter A is associated with W, but A is also associated with P at position 4, K at position 7 and T at position 10. Building up these relationships into such a diagram provided the menu from which the bombe connections and drum start positions would be set up.
In the illustration, there are three sequences of letters which form loops (or cycles or closures), ATLK, TNS and TAWCN. The more loops in the menu, the more candidate rotor settings the bombe could reject, and hence the fewer false stops. Alan Turing conducted a very substantial analysis (without any electronic aids) to estimate how many bombe stops would be expected according to the number of letters in the menu and the number of loops. Some of his results are given in the following table.{{sfn|Carter|p=3}} Recent bombe simulations have shown similar results.
Stecker valuesThe German military Enigma included a plugboard (Steckerbrett in German) which swapped letters (indicated here by {{math|P}}) before and after the main scrambler's change (indicated by {{math|S}}). The plugboard connections were known to the cryptanalysts as Stecker values. If there had been no plugboard, it would have been relatively straightforward to test a rotor setting; a Typex machine modified to replicate Enigma could be set up and the crib letter However, with the plugboard, it was much harder to perform trial encryptions because it was unknown what the crib and ciphertext letters were transformed to by the plugboard. For example, in the first position, {{math|P(}} Turing's solution to working out the stecker values (plugboard connections) was to note that, even though the values for, say, {{math|P(}} A worked example of such reasoning might go as follows: a cryptanalyst might suppose that {{math|P(}}
Due to the function {{math|P}} being its own inverse, we can apply it to both sides of the equation and obtain the following: {{Math|P(}} This gives us a relationship between {{math|P(}} {{math|P(}} While the crib does not allow us to determine what the values after the plugboard are, it does provide a constraint between them. In this case, it shows how {{math|P(}} Likewise, we can also observe that {{math|P(}} Similarly, in position 6, {{math|P(}} And again, the same sort of reasoning applies at position 7 to get: {{math|P(}} However, in this case, we have derived a contradiction, since, by hypothesis, we assumed that {{math|P(}} The cryptanalyst hypothesised one plugboard interconnection for the bombe to test. The other stecker values and the ring settings were worked out by hand methods. Automated deductionTo automate these logical deductions, the bombe took the form of an electrical circuit. Current flowed around the circuit near-instantaneously, and represented all the possible logical deductions which could be made at that position. To form this circuit, the bombe used several sets of Enigma rotor stacks wired up together according to the instructions given on a menu, derived from a crib. Because each Enigma machine had 26 inputs and outputs, the replica Enigma stacks are connected to each other using 26-way cables. In addition, each Enigma stack rotor setting is offset a number of places as determined by its position in the crib; for example, an Enigma stack corresponding to the fifth letter in the crib would be four places further on than that corresponding to the first letter. In practicePractical bombes used several stacks of rotors spinning together to test multiple hypotheses about possible setups of the Enigma machine, such as the order of the rotors in the stack. While Turing's bombe worked in theory, it required impractically long cribs to rule out sufficiently large numbers of settings. Gordon Welchman came up with a way of using the symmetry of the Enigma stecker to increase the power of the bombe. His suggestion was an attachment called the diagonal board that further improved the bombe's effectiveness.{{sfn|Welchman|2005|p=77}} The British BombeThe Polish cryptologic bomba (Polish: bomba kryptologiczna; plural bomby) had been useful only as long as three conditions were met. First, the form of the indicator had to include the repetition of the message key; second, the number of rotors available had to be limited to three, giving six different "wheel orders" (the three rotors and their order within the machine); and third, the number of plug-board leads had to remain relatively small so that the majority of letters were unsteckered.{{dubious|date=May 2013}} Six machines were built, one for each possible rotor order. The bomby were delivered in November 1938, but barely a month later the Germans introduced two additional rotors for loading into the Enigma scrambler, increasing the number of wheel orders by a factor of ten. Building another 54 bomby was beyond the Poles' resources. Also, on 1 January 1939, the number of plug-board leads was increased to ten. The Poles therefore had to return to manual methods, the Zygalski sheets. Alan Turing designed the British bombe on a more general principle, the assumption of the presence of text, called a crib, that cryptanalysts could predict was likely to be present at a defined point in the message. This technique is termed a known plaintext attack and had been used to a limited extent by the Poles, e.g., the Germans' use of "ANX" — "AN", German for "To," followed by "X" as a spacer. Bletchley Park's commanding officer Edward Travis acquired a £100,000 budget for the construction of Turing's machine, and the contract to build the bombes was awarded to the British Tabulating Machine Company (BTM) at Letchworth.{{sfn|Smith|2007}} BTM placed the project under the direction of Harold 'Doc' Keen. Each machine was about {{convert|7|ft|m}} wide, {{convert|6|ft|6|in|m}} tall, {{convert|2|ft|m}} deep and weighed about a ton.{{sfn|Ellsbury|1988|loc=Ch. 2 Description of the Bombe}} On the front of each bombe were 108 places where drums could be mounted. The drums were in three groups of 12 triplets. Each triplet, arranged vertically, corresponded to the three rotors of an Enigma scrambler. The bombe drums' input and output contacts went to cable connectors, allowing the bombe to be wired up according to the menu. The 'fast' drum rotated at a speed of 50.4 rpm in the first models{{sfn|Wilcox|2001|p=12}} and 120 rpm in later ones,{{sfn|Ellsbury|1988|loc=Ch. 4 How the Bombe Worked}} when the time to set up and run through all 17,576 possible positions for one rotor order was about 20 minutes.{{sfn|Alexander|c. 1945|loc=Ch. I para. 44}} The first bombe was named "Victory". It was installed in "Hut 1" at Bletchley Park on 18 March 1940. It was based on Turing's original design and so lacked a diagonal board.{{sfn|Hinsley|Ransom|Knight|1988|p=954}} On 26 April 1940, {{HMS|Griffin|H31|6}} captured a German trawler (Schiff 26, the Polares) flying a Dutch flag; included in the capture were some Enigma keys for 23 to 26 April.{{sfn|Kahn|1991|p=116–117}} Bletchley retrospectively attacked some messages sent during this period using the captured material and an ingenious Bombe menu where the Enigma fast rotors were all in the same position.{{sfn|Wright|2016}} In May and June 1940, Bletchley succeeded in breaking six days of naval traffic, 22–27 April 1940.[13] Those messages were the first breaks of Kriegsmarine messages of the war, "[b]ut though this success expanded Naval Section's knowledge of the Kriegsmarines's signals organization, it neither affected naval operations nor made further naval Enigma solutions possible."{{sfn|Kahn|1991|pp=117–118}} The second bombe, named "Agnus dei", later shortened to "Agnes", or "Aggie", was equipped with Welchman's diagonal board, and was installed on 8 August 1940; "Victory" was later returned to Letchworth to have a diagonal board fitted.[14] The bombes were later moved from "Hut 1" to "Hut 11". The bombe was referred to by Group Captain Winterbotham as a "Bronze Goddess" because of its colour.{{sfn|Winterbotham|2001|p=15}} The devices were more prosaically described by operators as being "like great big metal bookcases".[15] During 1940, 178 messages were broken on the two machines, nearly all successfully. Because of the danger of bombes at Bletchley Park being lost if there were to be a bombing raid, bombe outstations[16] were established, at Adstock, Gayhurst and Wavendon, all in Buckinghamshire.[17] In June–August 1941 there were 4 to 6 bombes at Bletchley Park, and when Wavendon was completed, Bletchley, Adstock and Wavenden had a total of 24 to 30 bombes. When Gayhurst became operational there were a total of 40 to 46 bombes, and it was expected that the total would increase to about 70 bombes run by some 700 Wrens (Women's Royal Naval Service). But in 1942 with the introduction of the naval four-rotor Enigma, "far more than seventy bombes" would be needed. New outstations were established at Stanmore and Eastcote, and the Wavendon and Adstock bombes were moved to them, though the Gayhurst site was retained. The few bombes left at Bletchley Park were used for demonstration and training purposes only.{{sfn|Welchman|2005|pp=139, 141}}
Production of bombes by BTM at Letchworth in wartime conditions was nowhere near as rapid as the Americans later achieved at NCR in Dayton, Ohio.
Sergeant Jones was given the overall responsibility for Bombe maintenance by Edward Travis. Later Squadron Leader and not to be confused with Eric Jones, he was one of the original bombe maintenance engineers, and experienced in BTM techniques. Welchman said that later in the war when other people tried to maintain them, they realised how lucky they were to have him. About 15 million delicate wire brushes on the drums had to make reliable contact with the terminals on the template. There were 104 brushes per drum, 720 drums per bombe, and ultimately around 200 bombes.[21] After World War II, some fifty bombes were retained at RAF Eastcote, while the rest were destroyed. The surviving bombes were put to work, possibly on Eastern bloc ciphers. Smith cites the official history of the bombe as saying that "some of these machines were to be stored away but others were required to run new jobs and sixteen machines were kept comparatively busy on menus." and "It is interesting to note that most of the jobs came up and the operating, checking and other times maintained were faster than the best times during the war periods."{{sfn|Smith|2007|p=206}} Response to the four-rotor EnigmaA program was initiated by Bletchley Park to design much faster bombes that could decrypt the four-rotor system in a reasonable time. There were two streams of development. One, code-named Cobra, with an electronic sensing unit, was produced by Charles Wynn-Williams of the Telecommunications Research Establishment (TRE) at Malvern and Tommy Flowers of the General Post Office (GPO).{{sfn|Smith|2014|p=213}} The other, code-named Mammoth, was designed by Harold Keen at BTM, Letchworth. Initial delivery was scheduled for August or September 1942.{{sfn|Budiansky|2000|pp=359–360}} The dual development projects created considerable tension between the two teams, both of which cast doubts on the viability of the opposing team's machine. After considerable internal rivalry and dispute, Gordon Welchman (by then, Bletchley Park's Assistant Director for mechanisation) was forced to step in to resolve the situation. Ultimately, Cobra proved unreliable and Mammoth went into full-scale production.{{sfn|Smith|2014|pp=213{{ndash}}214}} Unlike the situation at Bletchley Park, the United States armed services did not share a combined cryptanalytical service. Indeed, there was considerable rivalry between the US Army's facility, the Signals Intelligence Service (SIS), and that of the US Navy known as OP-20-G.{{sfn|Budiansky|2000|p=87}} Before the US joined the war, there was collaboration with Britain, albeit with a considerable amount of caution on Britain's side because of the extreme importance of Germany and her allies not learning that its codes were being broken. Despite some worthwhile collaboration amongst the cryptanalysts, their superiors took some time to achieve a trusting relationship in which both British and American bombes were used to mutual benefit. In February 1941, Captain Abe Sinkov and Lieutenant Leo Rosen of the US Army, and US Naval Lieutenants Robert Weeks and Prescott Currier, arrived at Bletchley Park bringing, amongst other things, a replica of the 'Purple' cipher machine for the Bletchley Park's Japanese section in Hut 7.{{sfn|Budiansky|2000|p=176}} The four returned to America after ten weeks, with a naval radio direction finding unit and many documents{{sfn|Budiansky|2000|p=179}} including a 'paper Enigma'.[22] Currier later wrote:{{quote|There was complete cooperation. We went everywhere, including Hut 6. We watched the entire operation and had all the techniques explained in great detail. We were thoroughly briefed on the latest techniques in the solution of Enigma and the operations of the bombes. We had ample opportunity to take as many notes as we wanted and to watch first hand all operations involved.{{sfn|Smith|2007|p=134}}}} The main response to the Four-rotor Enigma was the US Navy bombe, which was manufactured in much less constrained facilities than were available in wartime Britain.
US Navy BombeColonel John Tiltman, who later became Deputy Director at Bletchley Park, visited the US Navy cryptanalysis office (OP-20-G) in April 1942 and recognised America's vital interest in deciphering U-boat traffic. The urgent need, doubts about the British engineering workload and slow progress, prompted the US to start investigating designs for a Navy bombe, based on the full blueprints and wiring diagrams received by US Naval Lieutenants Robert Ely and Joseph Eachus at Bletchley Park in July 1942.{{sfn|DeBrosse|Burke|2004|p=74}}{{sfn|Budiansky|2000|pp=238–242}}{{sfn|Wilcox|2001|p=21}} Funding for a full, $2 million, navy development effort was requested on 3 September 1942 and approved the following day. Commander Edward Travis, Deputy Director and Frank Birch, Head of the German Naval Section travelled from Bletchley Park to Washington in September 1942. With Carl Frederick Holden, US Director of Naval Communications they established, on 2 October 1942, a UK:US accord which may have "a stronger claim than BRUSA to being the forerunner of the UKUSA Agreement," being the first agreement "to establish the special Sigint relationship between the two countries," and "it set the pattern for UKUSA, in that the United States was very much the senior partner in the alliance."[24] It established a relationship of "full collaboration" between Bletchley Park and OP-20-G.{{sfn|Budiansky|2000|pp=238–242}} An all electronic solution to the problem of a fast bombe was considered,{{sfn|Budiansky|2000|pp=238–242}} but rejected for pragmatic reasons, and a contract was let with the National Cash Register Corporation (NCR) in Dayton, Ohio. This established the United States Naval Computing Machine Laboratory.{{sfn|Wenger|1945}} Engineering development was led by NCR's Joseph Desch. Alan Turing, who had written a memorandum to OP-20-G (probably in 1941),[25] was seconded to the British Joint Staff Mission in Washington in December 1942, because of his exceptionally wide knowledge about the bombes and the methods of their use. He was asked to look at the bombes that were being built by NCR and at the security of certain speech cipher equipment under development at Bell Labs.[26] He visited OP-20-G, and went to NCR in Dayton on 21 December. He was able to show that it was not necessary to build 336 Bombes, one for each possible rotor order, by utilising techniques such as Banburismus.{{sfn|Budiansky|2000|pp=238–242}} The initial order was scaled down to 96 machines. The US Navy bombes used drums for the Enigma rotors in much the same way as the British bombes. They had eight Enigma-equivalents on the front and eight on the back. The fast drum rotated at 1,725 rpm, 34 times the speed of the early British bombes. 'Stops' were detected electronically using thermionic valves (vacuum tubes)—mostly thyratrons—for the high-speed circuits. When a 'stop' was found{{sfn|Wenger|1945|p=51}} the machine over-ran as it slowed, reversed to the position found and printed it out before restarting. The running time for a 4-rotor run was about 20 minutes, and for a 3-rotor run, about 50 seconds.{{sfn|Wenger|1945|p=52}} Each machine was {{convert|10|ft|m}} wide, {{convert|7|ft|m}} high, {{convert|2|ft|m}} deep and weighed 2.5 tons. The first machine was completed and tested on 3 May 1943. By 22 June, the first two machines, called 'Adam' and 'Eve' broke a particularly difficult German naval cipher, the Offizier settings for 9 and 10 June.{{sfn|Budiansky|2000|pp=294–295}} A P Mahon, who had joined the Naval Section in Hut 8 in 1941, reported in his official 1945 "History of Hut Eight 1939-1945":{{blockquote|The American bombe was in its essentials the same as the English bombe though it functioned rather better as they were not handicapped by having to make it, as Keen was forced to do owing to production difficulties, on the framework of a 3 wheel machine. By late autumn [1943] new American machines were coming into action at the rate of about 2 a week, the ultimate total being in the region of 125.{{sfn|Mahon|1945|p=89}}}} These bombes were faster, and soon more available, than the British bombes at Bletchley Park and its outstations. Consequently, they were put to use for Hut 6 as well as Hut 8 work.{{sfn|Welchman|2005|p=135}} In Alexander's "Cryptographic History of Work on German Naval Enigma", he wrote as follows. {{blockquote|When the Americans began to turn out bombes in large numbers there was a constant interchange of signal - cribs, keys, message texts, cryptographic chat and so on. This all went by cable being first encyphered on the combined Anglo-American cypher machine, C.C.M. Most of the cribs being of operational urgency rapid and efficient communication was essential and a high standard was reached on this; an emergency priority signal consisting of a long crib with crib and message text repeated as a safeguard against corruption would take under an hour from the time we began to write the signal out in Hut 8 to the completion of its decyphering in Op. 20 G. As a result of this we were able to use the Op. 20 G bombes almost as conveniently as if they had been at one of our outstations 20 or 30 miles away.{{sfn|Alexander|c. 1945}} Ch. VIII para. 11 }}Production was stopped in September 1944 after 121 bombes had been made.{{sfn|Wenger|1945|p=52}} The last-manufactured US Navy bombe is on display at the US National Cryptologic Museum. Jack Ingram, former Curator of the museum, describes being told of the existence of a second bombe and searching for it but not finding it whole. Whether it remains in storage in pieces, waiting to be discovered, or no longer exists, is unknown. US Army BombeThe US Army Bombe was physically very different from the British and US Navy bombes. A contract was signed with Bell Labs on 30 September 1942.{{sfn|Sebag-Montefiore|2004|p=254}} The machine was designed to analyse 3-rotor, not 4-rotor traffic. It was known as "003" or "Madame X".{{sfn|Farley|1990|p=12}}{{sfn|Burke|2002|p=136}} It did not use drums to represent the Enigma rotors, using instead telephone-type relays. It could, however, handle one problem that the bombes with drums could not.{{sfn|Wenger|1945|p=52}}{{sfn|Welchman|2005|p=135}} The set of ten bombes consisted of a total of 144 Enigma-equivalents, each mounted on a rack approximately {{convert|7|ft|m}} long {{convert|8|ft|m}} high and {{convert|6|in|mm}} wide. There were 12 control stations which could allocate any of the Enigma-equivalents into the desired configuration by means of plugboards. Rotor order changes did not require the mechanical process of changing drums, but was achieved in about half a minute by means of push buttons.{{sfn|Wenger|1945|p=51}} A 3-rotor run took about 10 minutes.{{sfn|Wenger|1945|p=52}} Bombe rebuildIn 1994 a group led by John Harper of the BCS Computer Conservation Society started a project to build a working replica of a bombe.[27] The project required detailed research, and took 13 years of effort before the replica was completed, which was then put on display at the Bletchley Park museum. In March 2009 it won an Engineering Heritage Award.[28] The Bombe rebuild was relocated to The National Museum of Computing on Bletchley Park in May 2018[29], the new gallery officially re-opening on the 23rd of June 2018[30] See also
Notes1. ^{{cite book |title=Validated Designs for Object-oriented Systems |author=John Fitzgerald, Peter Gorm Larsen, Paul Mukherjee, Nico Plat, Marcel Verhoef |date=6 December 2005 |isbn=9781846281075 |url=https://books.google.com/books?id=EP5zNxk8DpcC&pg=PA192&dq=Bletchley+Bombe+electro-magnetic+electronic+valve&hl=en&sa=X&ved=0ahUKEwikvpCFm_DVAhWL6oMKHWqTBggQ6AEINTAC#v=onepage&q=Bletchley%20Bombe%20electro-magnetic%20electronic%20valve&f=false}} 2. ^{{cite book |title= The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography |author=Simon Singh |date=26 January 2011 |isbn=9780307787842 |url=https://books.google.com/books?id=o3YbiVuTg70C&pg=PT258&dq=Bletchley+Bombe+Victory+Agnus+Dei+Agnes&hl=en&sa=X&ved=0ahUKEwijgoGanPDVAhVm6YMKHfwyDE0Q6AEIKjAA#v=onepage&q=Bletchley%20Bombe%20Victory%20Agnus%20Dei%20Agnes&f=false}} 3. ^{{Harvnb|Kahn|1991|p=40}} states that early Enigma used 3 rotors in the machine, but 5 rotors were available. That would produce about 1 million possible starting positions. Instead of 26 positions, the early naval Enigma had 29 because it included 3 characters with umlauts. 4. ^{{Harvnb|Kahn|1991|p=40}} describes German concerns about superimposition attack. 5. ^{{Harvtxt|Kahn|1991|p=43}}, stating, "In particular, it accepted the uncomfortable conclusions of a study by Lieutenant Henno Lucan, second radio officer of the battleship {{SMS|Elsass||2}}, that in neither physical nor cryptologic security did the Enigma meet modern requirements." 6. ^1 {{Citation | last = Sale | first = Tony | author-link = Tony Sale | title = A quick revision of the Enigma machine, its physical and operational characteristics | url = http://www.codesandciphers.org.uk/anoraks/enigma.htm | accessdate = 9 June 2011}} 7. ^{{Citation | last = Sale | first = Tony | author-link = Tony Sale | title = The Enigma cipher machine | chapter = The Principle of the Enigma | url = http://www.codesandciphers.org.uk/enigma/enigma1.htm | accessdate = 4 February 2010 }} 8. ^{{Citation | last = Sale | first = Tony | author-link = Anthony Sale | title = Military Use of the Enigma: The complexity of the Enigma machine | url = http://www.codesandciphers.org.uk/enigma/enigma3.htm | accessdate = 4 January 2014 }} 9. ^{{Citation | last = Sale | first = Tony | author-link = Tony Sale | title = Virtual Wartime Bletchley Park: Alan Turing, the Enigma and the Bombe | url = http://www.codesandciphers.org.uk/virtualbp/tbombe/tbombe.htm | accessdate = 28 February 2010 }} 10. ^{{citation |last=Sale |first=Tony |author-link=Tony Sale |title=The Turing/Welchman Bombe |url=http://www.codesandciphers.org.uk/virtualbp/tbombe/thebmb.htm |quote=Remember that the top, fast, drum on the Bombe corresponds to the slow left hand drum on the Enigma machine.}} 11. ^{{Citation | last = US Army 6812th Signal Security Detachment | title = US 6812 Bombe Report | year = 1945 | url = http://www.codesandciphers.org.uk/documents/bmbrpt/usbmbrpt.pdf | accessdate = 4 February 2010 }} 12. ^{{Citation | last = Sale | first = Tony | author-link = Tony Sale | title = Virtual Wartime Bletchley Park: The Bombe and the Ringstellung problem | url = http://www.codesandciphers.org.uk/virtualbp/hsbombe/hsbombe3.htm | accessdate = 30 June 2011 }} 13. ^{{cite web |last=Erskine |first=Ralph |title=Allied Breaking of Naval Enigma |url=http://uboat.net/technical/enigma_breaking.htm |website=uboat.net |access-date=6 February 2017}} 14. ^{{Citation | title = Bletchley Park Jewels | chapter = Outstations - A Brief History | url = http://www.mkheritage.co.uk/bpt/Outstations/Wavendon.htm | accessdate = 1 May 2010 }} 15. ^Mary Stewart, 'Bombe' Operator, interviewed in "[https://www.imdb.com/title/tt1155383/episodes The Men Who Cracked Enigma]", UKTV History Channel documentary series "[https://www.imdb.com/title/tt1157073/ Heroes of World War II]", 2003 16. ^{{Citation | title =Bletchley Park Jewels | chapter = Outstations from the Park | url = http://www.mkheritage.co.uk/bpt/outstations/outstations.htm | accessdate = 16 April 2010 }} 17. ^{{Citation | last = Toms | first = Susan | title = Enigma and the Eastcote connection | year = 2005 | url = http://www.ruislip.co.uk/eastcotemod/enigma.htm | accessdate = 16 April 2010 | archive-url = https://web.archive.org/web/20081204105055/http://www.ruislip.co.uk/eastcotemod/enigma.htm | archive-date = 4 December 2008 | dead-url = yes | df = dmy-all }} 18. ^{{Citation |editor-last = Harper | editor-first = John | editor-link= John Harper (computer engineer) |title = The British Bombe CANTAB |year= 2007 |contribution= Bombe Types | contribution-url = http://www.bombe.org.uk/types1 }} 19. ^{{Citation | editor-last = Copeland | editor-first = B. Jack | editor-link = Jack Copeland | title = Colossus: The Secrets of Bletchley Park's Codebreaking Computers | place = Oxford | publisher = Oxford University Press | year = 2006 | page = 285 | isbn = 978-0-19-284055-4 }} 20. ^{{Citation | editor-last = Harper | editor-first = John |editor-link= John Harper (computer engineer) |contribution = Definitiions | contribution-url = http://www.bombe.org.uk/defintn1 |year= 2007 | title = The British Bombe CANTAB }} 21. ^{{harnvb|Welchman|2005|p=147}} 22. ^{{Citation | last = Jacobsen | first = Philip H. | title = British provision of German naval Enigma information | year = 2000 | url = http://lists101.his.com/pipermail/intelforum/2000-August/002580.html | accessdate = 26 March 2010 | archive-url = https://web.archive.org/web/20110711171026/http://lists101.his.com/pipermail/intelforum/2000-August/002580.html# | archive-date = 11 July 2011 | dead-url = yes | df = dmy-all }} 23. ^{{Citation |last = DeBrosse |first = Jim |title = Film snubs Ohioans' role breaking Enigma |publisher = Cincinnati.com: part of the USA Today network |year = 2015 |url = https://www.cincinnati.com/story/opinion/contributors/2015/01/14/film-snubs-ohioans-role-breaking-enigma/21770275/ }} 24. ^{{Citation | last = Erskine | first = Ralph | title = The Holden Agreement on Naval Sigint: The First BRUSA? | journal = Intelligence and National Security | volume = 14 | issue = 2 | pages = 187–197 |date=Summer 1999 | url = http://intellit.muskingum.edu/alpha_folder/E_folder/erskine_a-o.html | doi = 10.1080/02684529908432545 }} 25. ^{{Citation | last = Turing | first = Alan | author-link = Alan Turing | date = c. 1941 | contribution = Memorandum to OP-20-G on Naval Enigma | editor-last = Copeland | editor-first = B. Jack | editor-link = Jack Copeland | title = The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma | publication-place = Oxford | publisher = Oxford University Press | pages = 341–352 | isbn = 0-19-825080-0 }} 26. ^{{Citation | last = Copeland | first = B. Jack | author-link = Jack Copeland | title = Turing: Pioneer of the Information Age | place = Oxford | publisher = Oxford University Press | year = 2012 |pages= 81-84| isbn = 978-0-19-963979-3 }} 27. ^{{cite web |title=The Bombe tops engineers’ poll |url=http://www.computerconservationsociety.org/news/bombe/bombe.htm |website=Computer Conservation Society |access-date=6 February 2017}} 28. ^{{Citation | last = British Computer Society | author-link = British Computer Society | title = BCS bombe team receives award | publication-date = 31 March 2009 | year = 2009 | url = http://www.bcs.org/server.php?show=ConWebDoc.25242 | accessdate = 2009-05-22 }} 29. ^{{Cite news|url=http://www.tnmoc.org/Bombe-arrival|title=The Bombe arrives|date=2018-05-01|work=The National Museum of Computing|access-date=2018-06-22|language=en}} 30. ^{{Cite news|url=http://www.tnmoc.org/news/news-releases/bombe-gallery-ready|title=Bombe Gallery opens 23 June|date=2018-06-07|work=The National Museum of Computing|access-date=2018-06-22|language=en}} References{{refbegin|30em}}
External links{{Commons category|Bombe}}
10 : 1930s computers|Computer-related introductions in 1939|Cryptanalytic devices|Electro-mechanical computers|Early British computers|English inventions|World War II military equipment of the United Kingdom|Bletchley Park|Alan Turing|NCR Corporation |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。