How volunteers rebuilt World War II computers
Posted on 18 Aug 2011 at 10:41
Bletchley Park volunteers rebuilt the code-breaking Tunny machine from one photograph and a few memories
A single photograph, scraps of circuit diagrams drawn from memory and a pile of disused components – it isn’t much to go on, but from such meagre beginnings, engineers rebuilt one of the precursors to the modern computer.
The Tunny decryption machine – on display at The Museum of National Computing at Bletchley Park, Buckinghamshire – was a feat of engineering both during World War II when it was created, and over the past five years when it was rebuilt. This is the story of how a team of volunteers turned scraps of information into a fully functioning replica of a machine that helped to win the war.
What was the Tunny?
Stories of WWII code-cracking are now the stuff of Hollywood legend, but the attention is normally thrust upon machines such as Enigma and Colossus. However, the Tunny played no lesser role in the code-cracking effort.
The Tunny is an emulator of the German 12-rotor Lorenz cipher machine, which encrypted messages from the German high command using a new machine-generated code each time – not entirely unlike modern disposable passcodes.
During the war, workers at the code-breaking centre at Bletchley Park would intercept German radio signals, typing the code onto punched tape. That tape was fed into the Tunny, whose settings were controlled by the programmable Colossus machine, which was also rebuilt with the help of volunteers. The message was decrypted and printed out in German text, giving British commanders an invaluable insight into enemy plans.
The restoration team’s achievement is undoubtedly impressive, but consider the engineers and mathematicians at Bletchley Park who initially developed the emulator: while the rebuilders had only a single photograph to work from, the original Tunny was built blind: it was developed in 1942, three years before British forces laid eyes on a Lorenz.
“The people trying to break into it here at Bletchley Park had never seen it,” said John Pether, a member of the restoration team. “They had no idea what it looked like or how it worked.”
The people trying to break into it here at Bletchley Park had never seen it
It may never have been possible without a lucky break. “There was a rather fortunate incident in August 1941, when some German operators on one of these radio teleprinter links became lazy in sending the message,” explained Pether. “They actually had to send it twice; the first time they sent it, it became corrupted. They just set the cipher machines back to the same settings as the first time they sent the message to resend it. That gave the people working to break the machine the keyhole into breaking it – basically, because a couple of Germans got lazy on procedures.”
That mistake gave the British two versions of the same 4,000-character message, but with enough minor differences between them – such as shortening “number” to “nm” – to let Bletchley Park crack the code and allow, over the course of four months, mathematician Bill Tutte to deduce how the Lorenz cipher machine actually worked. Tutte gave the General Post Office’s (GPO) research team enough information to build a replica at Dollis Hill in North London.
Starting from scratch
Between 12 and 15 Tunny machines were eventually built, but all were dismantled for parts – and for security reasons – after the war ended. “As far as we know, they were all broken up at the end of the war. That’s the official story,” said Pether.
For more details about purchasing this feature and/or images for editorial usage, please contact Jasmine Samra on email@example.com
- IDC: iPad intertia opens door for Windows tablets
- Rivals put on notice as Spotify snaps up The Echo Nest
- Windows 8.1 Update 1 leaks via Microsoft's website
- Mozilla questions why Dell charges £16 to install Firefox
- Hundreds of NHS sites vulnerable to hackers
- Samsung Chromebook 2 gets faux-leather look - and bloatware
- Windows 8.1 Update 1 hits RTM
- Hackers take Meetup.com offline over $300 ransom
- Office 365 goes social with "Oslo" news feed
- Windows XP: upgrading 30,000 PCs in 30 days
- Hour of Code: five steps to learn how to code
- Sony Xperia Z2 Tablet review: first look
- Sony Xperia Z2 review: first look
- Samsung Galaxy Gear 2 review: first look
- Nokia XL review: first look
- Samsung Galaxy S5 review: first look
- Nokia X review: first look
- Censorship by copyright: Myles Powers and abuse of DMCA takedowns
- Turn an old smartphone into an in-car entertainment system
- Apple's OSes set to surpass Windows