How volunteers rebuilt World War II computers
Posted on 18 Aug 2011 at 10:41
Bletchley Park volunteers rebuilt the code-breaking Tunny machine from one photograph and a few memories
A single photograph, scraps of circuit diagrams drawn from memory and a pile of disused components – it isn’t much to go on, but from such meagre beginnings, engineers rebuilt one of the precursors to the modern computer.
The Tunny decryption machine – on display at The Museum of National Computing at Bletchley Park, Buckinghamshire – was a feat of engineering both during World War II when it was created, and over the past five years when it was rebuilt. This is the story of how a team of volunteers turned scraps of information into a fully functioning replica of a machine that helped to win the war.
What was the Tunny?
Stories of WWII code-cracking are now the stuff of Hollywood legend, but the attention is normally thrust upon machines such as Enigma and Colossus. However, the Tunny played no lesser role in the code-cracking effort.
The Tunny is an emulator of the German 12-rotor Lorenz cipher machine, which encrypted messages from the German high command using a new machine-generated code each time – not entirely unlike modern disposable passcodes.
During the war, workers at the code-breaking centre at Bletchley Park would intercept German radio signals, typing the code onto punched tape. That tape was fed into the Tunny, whose settings were controlled by the programmable Colossus machine, which was also rebuilt with the help of volunteers. The message was decrypted and printed out in German text, giving British commanders an invaluable insight into enemy plans.
The restoration team’s achievement is undoubtedly impressive, but consider the engineers and mathematicians at Bletchley Park who initially developed the emulator: while the rebuilders had only a single photograph to work from, the original Tunny was built blind: it was developed in 1942, three years before British forces laid eyes on a Lorenz.
“The people trying to break into it here at Bletchley Park had never seen it,” said John Pether, a member of the restoration team. “They had no idea what it looked like or how it worked.”
The people trying to break into it here at Bletchley Park had never seen it
It may never have been possible without a lucky break. “There was a rather fortunate incident in August 1941, when some German operators on one of these radio teleprinter links became lazy in sending the message,” explained Pether. “They actually had to send it twice; the first time they sent it, it became corrupted. They just set the cipher machines back to the same settings as the first time they sent the message to resend it. That gave the people working to break the machine the keyhole into breaking it – basically, because a couple of Germans got lazy on procedures.”
That mistake gave the British two versions of the same 4,000-character message, but with enough minor differences between them – such as shortening “number” to “nm” – to let Bletchley Park crack the code and allow, over the course of four months, mathematician Bill Tutte to deduce how the Lorenz cipher machine actually worked. Tutte gave the General Post Office’s (GPO) research team enough information to build a replica at Dollis Hill in North London.
Starting from scratch
Between 12 and 15 Tunny machines were eventually built, but all were dismantled for parts – and for security reasons – after the war ended. “As far as we know, they were all broken up at the end of the war. That’s the official story,” said Pether.
For more details about purchasing this feature and/or images for editorial usage, please contact Jasmine Samra on firstname.lastname@example.org
- Ellison steps down: but who's really running Oracle now?
- Amazon releases high-end Kindle Voyage Touch
- Sony warns of massive loss on smartphones
- Dropbox app doesn't work properly with iOS 8
- Dark clouds for Adobe as profits slide by 46%
- Windows 9 Technical Preview launch date revealed
- New Windows 9 videos show off multi-desktops and notification centre
- Chromebook owners get access to Android apps
- SanDisk lets you pop half-terabyte card in your camera
- Windows 9 video shows new Start menu
- How to check your identity hasn’t been sold to the hackers
- Tim Cook: this is how much TV has changed since the 70s
- Westminster wins the .London battle
- 20 years of PC Pro: from deep pan pizza to virtualisation
- Five reasons why the Apple Watch leaves me cold
- Apple Watch, iPhone 6 and 6 Plus: Tim Cook's Apple back with a bang?
- BT Home Hub 5: how to get maximum speed
- 20 years of PC Pro: one-star reviews (including "the worst tablet we've ever seen")
- 20 years of PC Pro: our best covers
- Why we've closed the PC Pro forums