Colossus

Volunteer Information Exchange
Sharing what we know with those we know
Volume 4 Number 2
February 3, 2014
Contribute To The VIE
CHM's New Blog
You undoubtedly know that there is class of
new docents in training. While they are still
getting their collective feet on the ground, they
are beginning to contribute in many ways. One
way is that they are doing book reports of
many of the recommended books in our
docent library. One of those book reviews is
included this month. Written by Dave Levish,
about Colossus, it is on page 2. Thanks Dave.
We will be including more of those book
reviews in future issues.
Jeff Katz writes on his experiences with the
Quipu in his article “Who Invented the Quipu?
And When?”
Please give us your stories, experiences and
knowledge.
Jim Strickland
[email protected]
“No matter how slick the demo is in rehearsal,
when you do it in front of a live audience, the
probability of a flawless presentation is
inversely proportional to the number of people
watching, raised to the power of the amount of
money involved.”
(Mark Gibbs)
The VIE Cumulative Index is stored at:
http://s3data.computerhistory.org.s3.amazon
aws.com/chmedu/VIE000_Cumulative_Topic_Index.pdf
CONTENTS
Contribute to the VIE
1
CHM Blog
1
First Computer Bug
1
Colossus: Book Review
2
Who Invented the Quipu? And Why?
5
IBM 1620 “Plotter”
6
Coming Events
6
Recent CHM Blog Entries
Kirsten Tashev keeps us up-to-date on our CHM Blog. Recent
Entries are:
• 1/27 Guest blog post by Jonathan Rotenberg, founder of the
Boston Computer Society, as he shares with us his memories
of the night Steve Jobs presented the Macintosh to the BCS.
Also included for the first time in 30 years, the video of that
night.
• 1/23 Curator, Chris Garcia, a kind of “yesterday’s tomorrows”
piece on Computer Games
• 1/13 guest blogger, Lisa Nakamura, Professor at the
University of Maryland. Prof. Nakamura conducted research in
the CHM Archives this past year and has an interesting
perspective to share.
First Computer Bug
Bud Warashima sent an article from the Wall Street Journal by
etymologist, Ben Zimmer. It was occasioned by Google's
recent animated doodle in tribute to Grace Hopper's finding of
the moth/bug in the Harvard Mark II in 1947. We have edited
and excerpted that article.
As we know she taped the moth in her logbook and noted,
"First actual case of bug being found."
But Zimmer points out that this was not the first use of the term
“bug.” That appears to be another Edison invention. "Bug"
appeared in Edison's notebooks as early as 1876 to describe
problems in his systems. "Awful lot of bugs still," read one
notebook entry about a plan for incandescent lighting. He also
developed what he called a "bug trap" to catch relay errors in
his early telegraph system.
Within a couple of decades, Edison's usage of "bug" became
common enough to enter dictionaries. "A fault in the working of
a quadruplex telegraph or in any electrical apparatus," was how
Funk and Wagnalls' Standard Dictionary of the English
Language defined it in 1893.
So the term was known, and used by the staff of the Mark I the
precursor to the moth-ridden Mark II. A 1944 logbook entry read,
"Ran test problem. Mr. Durfee from I.B.M. [sic] was here to help
us find 'bugs." As for "debugging," the Oxford English
Dictionary traces the term back to 1945.
So Hopper was undoubtedly joking when she said, "first actual
case" of a computer bug being found. She was humorously
playing off a known usage in technical circles.
As Zimmer says, “While we celebrate the achievements of a
pioneering woman in computing, let's not perpetuate an
etymological story that's a little buggy.”
1
the styles, level of technical detail, emphasis and overall
tone frequently change from chapter to chapter. The
reader must be able to deal with the inevitable British
English in the book. German and French terms are also
used.
The book is 462 pages and consists of 26 chapters and
12 appendices divided in to 7 sections as follows:
1. Bletchley Park and the Attack on Tunny. This is a
very brief introduction to cryptography, British code
breaking through the beginning of World War II, a
description of Tunny and a high-level description of how
Tunny was broken.
2. Colossus. A description of the Colossi, the steps
taken to build them and the effort to build a working
replica in the 21st century.
3. The Newmanry. The Newmanry was the section at
Bletchley Park charged with building and operating the
Colossi and other machines that decrypted the Tunny
intercepts.
4. The Testery. The Testery was the section at
Bletchley Park responsible for the initial manual
decryption of Tunny intercepts. When the Colossi were
installed, the Testery was responsible for determining
Tunny cam settings that were changed regularly
(initially monthly, later daily).
5. T. H. Flowers’s Laboratory at Dollis Hill. Dollis
Hill was the location where the Colossi were designed
and where several of the systems, including the first,
were built.
6. Sturgeon, The Fish That Got Away. Another
German encryption machine used during WW II.
7. Technical Appendices – To Dig Deeper. This
section contains backing material for the other sections,
such as a time line of Tunny and Colossus
developments, some of the mathematics behind the
Tunny machine and the cryptanalysis done to break it
and sources for references. This section is over 100
pages.
There is much overlap and even some conflicting
information between the sections. For instance, most
information states that 10 Colossus machines were built,
but occasionally 11 is the number used. It is unclear if
the total of 11 includes the replica built in the 2000’s or if
the number is in error.
Colossus: A Book Review
DAVE LEVISH
The Secrets of Bletchley Park’s Codebreaking
Computers
B. Jack Copeland and others (many others)
Summary:
Colossus was the name of a series of computers
(collectively called Colossi) that were built during World
War II to decode German “Tunny” messages. The first
Colossus was functioning in December 1943, about two
years before ENIAC and greatly improved Bletchley
Park’s productivity. At the end of the war, most of the
Colossi were destroyed. Their very existence was kept
secret until the mid 1970s and much information about
the Colossus project remained classified until the mid
1990s.
German Lorenz SZ40 (“Tunny”) machine
The Tunny Machine
Unlike the more famous Enigma machine, the Lorenz
SZ40 encryption machine and its later developments
collectively called “Tunny” by the British, was an
attachment to a teletype. Plain text was input to a
teletype (aka teleprinter) either by a normal keyboard or
by means of a paper tape. The Tunny machine was in
between the teletype and the communication equipment,
typically a radio. The encrypted output from Tunny was
Baudot-Murray code sent the same way as unencrypted
teletype communications. The process was reversed for
This is generally believed to be the last (10th)
Colossus built
Overview of the Book:
“Colossus” is written by a total of 31 different authors
with the largest contribution by university professor Jack
Copeland, who is listed as the primary author. Whilst it
is obvious that some editing was done for consistency,
2
reception. Thus, those sending and receiving the
message never saw the encrypted text.
Tunny was controlled by 12 wheels which could be
altered via cams and an initial starting position. There
were three distinct functions for the wheels. The first set
of 5 wheels was called Chi wheels that moved each time
a character was encoded. The second set of 5 wheels
was called Psi wheels that sometimes moved and
sometimes did not. The final set of 2 wheels, called
motor wheels, controlled whether or not the Psi wheels
moved. The original character was encrypted by
XORing the output of the Chi and Psi wheels with the
original character. This allowed the encryption to be
reversible, i.e., when the setting matched and input
encrypted character generated its original value. Baudot
code is a 5-bit code which is why there were sets of 5
wheels.
The major weakness of Tunny was that the way the Psi
wheels operated. The Psi wheels moved in unison and,
due to the action of the motor wheels, might not move at
all, causing their contribution to the output encrypted
character could remain unchanged for several
characters. This introduced a statistically significant
irregularity to the encrypted text that could be used to
determine the cam setting of the wheels and their initial
positions.
Max Newman was the project manager for this effort. He
realized that the machines used to decrypt Enigma
messages would not be sufficient for Tunny traffic and
that a new approach was needed.
A machine eventually called “Heath Robinson” was built
to test whether the initial wheel settings could be
determined by machine. Heath’s logic was primarily
relay based, though some tubes were used for higher
speed where necessary. Heath repeatedly read two
tapes at varying offsets to determine the most likely
settings of the Tunny wheels through statistical analysis
of the data read. Though it proved the task could be
done, Heath had many problems. It was too slow, too
unreliable and error prone (two identical runs could
produce different results).
An electrical engineer named Thomas (Tommy) Flowers
that worked designing electronic phone switching
equipment for the Royal Post Office (which also was
responsible for the telephone system) was brought in to
work on the problem. Between February and December
1943, his team designed and built the first Colossus
system. Although it was designed with the primary
purpose of determining the settings of the Tunny wheels
for a given intercepted message, it was designed to be
more general purpose than that so that new decryption
techniques could be incorporated as they were
developed.
Colossus I could process an input encrypted message at
5,000 characters per second (many passes were
needed), used 1600 vacuum tubes and was programmed
through the use of patch cords and switches. Its logic
unit could perform 100 Boolean operations on the input
stream and set counters as each character was read.
Output results were printed on an automatic typewriter.
Colossus was, by every measure, the world’s first
electronic computer.
Colossus II was a much improved version of Colossus I.
It contained 2400 vacuum tubes, processed encrypted
messages at nearly 25,000 characters per second (125
times faster than “Heath Robinson”) and was the world’s
first electronic parallel computer.
In all, ten Colossus computers were built – all of them
differing to some degree – by the end of the war. When
the war was over, eight of the Colossi were destroyed
with some of the parts being sent to various universities
after they were altered to the point that their original
function could not be determined. The remaining Colossi
were transferred to the U.K.’s GCHQ . The last Colossus
was destroyed in 1960.
The Tunny traffic that the Colossi decrypted consisted
primarily of messages between the highest level German
commands. Messages decrypted by the Colossi
contributed to the defeat for the Germans by the
Russians at the battle of Kursk (the beginning of the end
on the Eastern Front) and to the decision to launch the
D-Day invasion. It has been estimated by multiple
Colossus
Diagram of how Lorenz SZ40 (Tunny)
encryption works
The Tunny machine code was broken by several flashes
of brilliant insight. Although the intercepted messages
could be decrypted by a well defined set of operations, it
was quickly realized that decryption of non-trivial
messages could take hundreds of years except in those
cases where usage errors by the Germans simplified
matters. This led to efforts to “mechanise” decryption of
the messages as had been done for Enigma messages.
3
sources that Colossus decrypts shortened the European
war by as much as two years.
Importance in computer history
Colossus I was functioning in December 1943, about two
Key People
years before ENIAC which is usually regarded as the first
Tommy Flowers – The architect of Colossus. He already electronic computer. ENIAC was announced February
had experience designing large telephone exchanges
14, 1946 and was presumably operating a short time
that used 3000 to 4000 vacuum tubes for switching
before that. Colossus II was the first parallel computer.
purposes which made designing Colossus a natural fit.
Though most of the original Colossus machines were
He was considered one of the, if not the, world’s leading destroyed and their existence was kept secret for 30
authority on vacuum tube based electronic equipment
years, Colossus influenced the early British computers.
design.
Alan Turing, aided by the knowledge that Colossus had
Max Newman – The project manager at Bletchley Park
been built using vacuum tubes and worked, went on to
for Colossus. Max Newman’s section was responsible
design the ACE system. A stripped-down version of this
for the procurement and operation of Colossus and other was implemented as Pilot ACE which was the world’s
equipment used to break the German Tunny machine.
fastest computer for a few years. ACE led to the British
Before the war, Max was a professor at Cambridge
MOSAIC and the American Bendix G-15 computers.
University. Among his students was Alan Turing. Max
Max Newman (along with a number of others what
was intrigued by Alan Turing’s 1936 paper about
worked at Bletchley Park) went to the University of
universal computing machinery and this has been
Manchester. Max was well aware that the technology in
credited as an influence in his decision to proceed with
Colossus could be used to create a stored program
Colossus.
computer. He was instrumental in the construction of the
Alan Turing – A well known mathematician and
Manchester SSEM a.k.a. “Baby” computer, which is one
cryptographer at Bletchley Park. Alan’s 1936 paper on
of the first stored program computers. This led directly to
universal computing machinery is one of the
the Feranti Mk 1, one of the first commercially available
cornerstones of computer science. Some of Alan’s work computers.
on decryption and his work in building machines to speed
Additional sources of information and interesting
decryption of Enigma intercepts influenced the work on
facts
Colossus. In particular, his “Bombe” machine
The Colossus computers were primarily operated by
popularized the idea of mechanized decryption. Some
women. These women were mostly in the Royal Navy
books and articles erroneously credit Alan Turing with
and known informally as Wrens (From Women’s Royal
designing Colossus. His involvement was at most
Navy Service or WRNS).
peripheral, though the fact that Colossus was built and
operated successfully no doubt contributed to his
Colossus was designed with the tubes in a horizontal
architecture of the later ACE system.
orientation to aid with heat dissipation. It was contained
in 8 racks in two rows, about 90 inches high, not
Important Dates
including the tape reader. Power consumption was
• December 1942 – Bletchley Park decides to
about 5 kW.
proceed with “mechanized” breaking of Tunny
The punched tape containing the encrypted message
intercepts
• February 1943 – Tommy Flowers submits his initial was used as the source of clock pulses for the Colossus
proposal for Colossus, which is immediately approved machine. The machine could run up to about 3 times
faster, but the tape would tend break at over 5,000 CPS.
• June 1943 – The “Heath Robinson” device begins
The message tape being decrypted moved at about 30
its initial testing
miles per hour.
• December 8, 1943 – Colossus I is operating at
Dollis Hill laboratories
Colossus used bi-quinary (bi-qui) to represent decimal
• February 5, 1944 – Colossus I is operational at
digits. A pair of tubes, one with 5 states and one with 2
Bletchley Park
states, was used for each decimal digit. This is roughly
similar to the representation used by an abacus and
• June 1, 1944 – The much improved Colossus II is
used less tubes than binary (which was considered).
operational at Bletchley Park
• April 1945 – Colossus X is operational at Bletchley Times were kept for Colossus runs. Typical times for
Park
determining the initial Tunny wheel settings for messages
• Sometime in 1960 – Colossus X, the last surviving
were 15 to 30 minutes, depending on the length of the
Colossus system, is turned off and destroyed
message and the actual setting values.
Colossus architect Tommy Flowers said of Colossus: “I
don't think they understood very clearly what I was
proposing until they actually had the machine."
4
Colossus could be “single stepped” for hardware
diagnostic purposes and to debug programming. This
was an intentional part of the original design.
The logic panel was set to determine what results were
interesting enough to be printed (typically very few).
Colossus was designed to handle interrupts, primarily to
deal with times when the output typewriter could not
keep up with the results being generated.
There is a working replica of a later model Colossus at
the Bletchley Park Museum.
Colossus could theoretically be programmed to do
decimal multiplication, but the necessary operations
would not complete within a single clock cycle.
• Use of interrupt mechanism (to prevent overloading
the printer)
• Use of higher-level description of the program
(short-hand notation, sort of like assembler)
• Optical reading of paper tape
• Use of shift registers
Web Sites
http://www.alanturing.net/turing_archive/pages/Referenc
e%20Articles/BriefHistofComp.html#Col
(Very brief description of Colossus in the context of what
led to and flowed from it)
http://www.alanturing.net/tunny_report/
(The General Report on Tunny - the German
Cryptographic system Colossus was used against.
General Report on Tunny is the source of most
declassified information that exists on Colossus.)
http://www.codesandciphers.org.uk/lorenz/rebuild.htm
(The Colossus rebuild project at Bletchley Park Museum)
http://www.codesandciphers.or.uk
(Additional information on Colossus, Lorenz (Tunny), and
simulators)
The following are generally regarded to be
computing “firsts” for Colossus
• Application of logic controlled by an alterable
program (emphasis in original)
• Use of clock-syncing pulse sent to a large block of
logic (emphasis in original)
• Parallel processing
Who Invented the Quipu? And When?
Jeff Katz
Occasionally on a tour a visitor will inquire about the
(replica) Quipu Inca knotted string memory/accounting
device we have on display in the storage gallery. The
conventional wisdom is that this complex item was used
by the Incas to record and remember important
information, possibly also to keep track of which citizens
owed what taxes. While there are several scholarly
efforts to divine how the Quipu was actually used, no
User's Manuals exist. The Incas had no written
language, so the knowledge was simply passed on, and
disappeared with the demise of the Incas at the time of
the Spanish conquistadors. Not understanding the
Quipus, and fearing what they might represent, the
conquistadors destroyed as many as they could find, and
killed the Incan elders who used them. A few hundred
original Quipus are known to exist, most in very poor
condition. They are, after all, only string, unlikely to hold
up very well over hundreds of years.
During a recent visit to Lake Titicaca in Bolivia, I was
privileged to visit a pre-Inca region, the ruins of the
Tiwanaku people, near the southern shore of the lake.
The Tiwanaku people lived in the high Andes around the
sacred lake from approximately 1500 BC until
approximately 1200 AD, and left evidence of a
sophisticated culture. The evidence suggests they were
especially adept at astronomical timekeeping,
architecture and building, agriculture and social order.
Current theories hold that just about the time they died
out in what is now Bolivia, possibly due to severe long
term drought and associated crop failure, the Incas
appeared in what is now Peru, hundreds of miles to the
north, as a fully-formed and sophisticated society with no
apparent evolutionary origins, and adept at astronomical
timekeeping, architecture and building, agriculture and
social order. Thus it's likely that the Peruvian Incas, who
were extant from around 1200 AD until the early 1500s,
were actually just a later manifestation of the migrated
Bolivian Tiwanaku people.
So what has this interesting history to do with the Quipu?
Adjacent to the Tiwanaku ruins in Bolivia is a recently
established museum that collects and displays artifacts
recovered from the ruins. Among those artifacts is a
particular piece of pottery, which has been dated to
around 400 AD, 800 years before the Incas emerged in
Peru, bearing artwork which depicts a tribal elder or
shaman extending his arm horizontally outward to his
side. Dangling from the arm is a series of knotted strings,
clearly an early version of a Quipu.
Unfortunately I was not permitted to photograph the
artifact. But on the following page is a copy of the image
of our replica Quipu, taken from the CHM website.
When I returned home I did a little on-line research on
Quipus, and turned up some interesting articles written
by an archaeology scholar. They include a list of
reference books and papers, some of which attempt to
describe potential uses and meanings of the various
string colors and knots. Even a form of binary coding of
the knots. And I was astonished to read that the oldest
known original Quipu dates from about 4600 years ago,
recently discovered at the ruins of the ancient civilization
at Caral, on the west coast of Peru. If that archaeological
dating can be trusted it makes the Quipu one of the
5
planet’s earliest forms of record keeping, only surpassed
by the cuneiform writing on clay tablets in Mesopotamia.
If you want to learn more, check: one or more of these
links:
http://archaeology.about.com/od/qterms/qt/quipu.htm
http://archaeology.about.com/od/ancientwriting/a/caralqui
pu.htm
http://archaeology.about.com/od/americanancientwriting/
a/khipucode.htm
Now when I have a visitor interested in the Inca Quipu, I
might have to point out that the device probably actually
predates the Incas by more than three thousand years!
Making it by far the oldest storage-and-retrieval
technology in our exhibits.
IBM 1620 “Plotter”
JIM STRICKLAND
I had a visitor recently, a former IBM marketing representative, who
had at one time been the salesman on the General Motors Proving
Ground in Michigan, He said that that customer had once had an
IBM 1620 – the small scientific computer from the 1960's. The 1620
used an IBM Model B typewriter as a console and sometimes input
output device.
They worked with IBM to develop an RPQ (Request for Price
Quotation ) for special type bars for the typewriter. Those special
type bars had various configurations of dots replacing many of the
characters.
With the dots, engineers were able to produce a plot of the
performance of cars being tested at the proving grounds--an
inexpensive, special purpose graphic “plotter.”
Please contribute to the
Computer History Museum
Volunteer Information Exchange
Share your stories, your interesting
facts (and factoids) and your
knowledge
Send them to Jim Strickland
([email protected])
Coming Events (Click for details)
Date
Day
Time
Event
Feb 06
Thur.
6:00 PM Member Reception
7:00 – 8:30 Program
Regis McKenna in Conversation with John Markoff
Feb 18
Tues.
6:00 PM Member Reception
7:00 – 8:30 Program
Cisco's Padmasree Warrior in Conversation with NPR's Laura
Sydell
Feb 20
Thurs. 6:00 – 9:00 PM
Mar 04
Tues.
6:00 PM Member Reception
7:00 – 8:30 Program
MLB (Major League Baseball) Advanced Media's Robert A.
Bowman in conversation with Museum CEO John Hollar
Mar 12
Wed.
2:30 Check-in
3:00 – 4:30Program
Technion's President Peretz Lavie in conversation with Museum
CEO John Hollar
Mar. 27
Thur.
6:00 PM Member Reception
7:00 – 8:30 Program
The Art & Technology of Cirque du Soleil
April 10
Thur.
6:00 PM Member Reception
7:00 – 8:00 Program
Game Changers: Sony Computer Entertainment’s Shuhei
Yoshida in conversation with Mark Cerny
NextGen Advisory Board Presents
Ninja Innovation and Startup Culture
6