Muutke küpsiste eelistusi

E-raamat: Breaking Teleprinter Ciphers at Bletchley Park - an edition of I. J. Good, D. Michie, and G. Timms, General Report on Tunny with emphasis on...: An edition of I.J. Good, D. Michie and G. Timms: General Report on Tunny with Emphasis on Statistical Methods (1945) [Wiley Online]

Edited by (Sun Microsystems, Menlo Park, CA), Edited by (Center for Communications Research, Princeton, NJ), Edited by (ndon, London, UK)
  • Formaat: 792 pages, Photos: 39 B&W, 0 Color; Drawings: 76 B&W, 0 Color; Exhibits: 44 B&W, 0 Color
  • Ilmumisaeg: 28-Aug-2015
  • Kirjastus: Wiley-IEEE Press
  • ISBN-10: 1119061601
  • ISBN-13: 9781119061601
  • Wiley Online
  • Hind: 165,94 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Formaat: 792 pages, Photos: 39 B&W, 0 Color; Drawings: 76 B&W, 0 Color; Exhibits: 44 B&W, 0 Color
  • Ilmumisaeg: 28-Aug-2015
  • Kirjastus: Wiley-IEEE Press
  • ISBN-10: 1119061601
  • ISBN-13: 9781119061601
This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a variety of contexts arising out of several separate but intersecting story lines, some only implicit in the GRT.
  • Explores the likely roots of the ideas entering into the Tunny cryptanalysis
  • Includes examples of original worksheets, and printouts of the Tunny-breaking process in action
  • Presents additional commentary, biographies, glossaries, essays, and bibliographies
Preface xiii
Editorial Notes xiv
Notes on Vocabulary xiv
List of Abbreviations xv
Cryptanalytic Significance of the Analysis of Tunny xvii
Whitfield Diffie
Editors' Introduction xxv
Whitfield Diffie
J.V. Field
Statistics at Bletchley Park lxxv
S.L. Zabell
Biographies of Authors ciii
Notes on the Editors of the Present Volume cvii
List of Figures cix
General Report on Tunny, with emphasis on statistical methods 1(2)
Part 0 Preface
Chapter 01 Preface
3(3)
Part 1 Introduction
Chapter 11 German Tunny
6(16)
11A Fish machines
6(4)
11B The Tunny cipher machine
10(6)
11C Wheel patterns
16(2)
11D How Tunny is used
18(1)
11E The Tunny network
19(3)
Chapter 12 Cryptographic Aspects
22(10)
12A The problem
22(1)
12B Modern strategy
23(2)
12C Chi breaking and setting: Solution of Z = X + D
25(4)
12D Motor and psi breaking and setting: Solution of D = ψ'
29(1)
12E Methods involving key: Solution of Z = K + P, and K = X + ψ'
30(2)
Chapter 13 Machines
32(3)
13A Explanation of the categories
32(1)
13B Counting and stepping machines
33(1)
13C Copying machines
34(1)
13D Miscellaneous simple machines
34(1)
Chapter 14 Organisation
35(4)
14A Expansion and growth
35(1)
14B The two sections in 1945
36(1)
14C Circulation
37(2)
Chapter 15 Some Historical Notes
39(4)
15A First stages in machine development
39(1)
15B Early organisation and difficulties
40(1)
15C Period of expansion
40(3)
Part 2 Methods of Solution
Chapter 21 Some Probability Techniques
43(7)
Chapter 22 Statistical Foundations
50(30)
22A Introductory
50(1)
22B The chi-stream
51(1)
22C The motor stream
52(1)
22D The psi stream
53(3)
22E The sum of two streams
56(1)
22F The key stream
57(2)
22G The plain language stream
59(10)
22H The de-chi stream
69(5)
22J The cipher stream
74(1)
22K Sampling errors in alphabetical counts
74(1)
22W Some further streams
75(1)
22X The algebra of proportional bulges
76(2)
22Y The amount of evidence derived from a letter count
78(2)
Chapter 23 Machine Setting
80(30)
23A Introduction
80(1)
23B The choice of runs
81(1)
23C Weighing the evidence
82(2)
23D Annotated exhibits
84(5)
23E X-setting with X 2limitation
89(2)
23F Message slides
91(1)
23G Wheel slides
92(1)
23H Flogging runs
93(3)
23J Flogging the evidence
96(1)
23K Checks on setting
96(2)
23L Statistical setting of the motor
98(3)
23M ψ-setting
101(1)
23N Coalescence
102(1)
23P Example
103(1)
23W Calculation of the odds of the best score in a x-setting run
103(1)
23X Theory of coalescence
104(1)
23Z History of machine setting
105(5)
Chapter 24 Rectangling
110(29)
24A Introductory
110(1)
24B Making and entering rectangles
111(5)
24C Crude convergence
116(1)
24D Starts for converging rectangles
117(2)
24E Rectangle significance tests
119(2)
24F Conditional rectangle
121(1)
24G Some generalized rectangles
122(1)
24W Theory of convergence
123(4)
24X Significance tests
127(9)
24Y Other theory of rectangles
136(3)
Chapter 25 Chi-Breaking from Cipher
139(46)
25A The short wheel-breaking run
139(3)
25B Weighing the evidence
142(2)
25C General plan of wheel-breaking
144(2)
25D Particular methods
146(4)
25E Special methods for X2 limitation
150(2)
25F Special method for ab not = to 1/2
152(1)
25G Wheel-breaking exhibits
152(28)
25W Derivation of formulae for the weighing of evidence
180(3)
25X The number of legal wheels
183(1)
25Y Proportional bulges relating to X2
183(2)
Chapter 26 Wheel-Breaking from Key
185(34)
26A Introduction
185(1)
26B Starts
185(6)
26C Hand counting for X2ψ'1 limitation
191(3)
26D Recognising the ψ repeat and numbering
194(1)
26E Hand counting on X2 key
194(1)
26F Devil exorcism
195(1)
26G Key work in the Newmanry
195(3)
26H General considerations
198(1)
26J Exhibits
198(15)
26X Key-breaking significance tests
213(2)
26Y Formulae used in key-breaking
215(4)
Chapter 27 Cribs
219(18)
27A General notions
219(1)
27B German TP links
220(1)
27C German TP operating practices
221(1)
27D Crib prediction
222(1)
27E Preparation of decode and cipher
223(1)
27F Tape making
224(2)
27G Statistical technique: running on Robinson
226(5)
27H History of crib organisation
231(1)
27W Basic crib formula
231(1)
27X Δ98 theory
232(2)
27Y Delta;31 theory
234(3)
Chapter 28 Language Methods
237(25)
28A Depths
237(2)
28B ψ setting from de-X
239(5)
28C ψ-Breaking from de-X
244(2)
28D Motor breaking and setting
246(5)
28E Decoding
251(11)
Part 3 Organisation
Chapter 31 Mr Newman's Section
262(5)
31A Growth
262(1)
31B Staff requirements
262(1)
31C Administration
263(1)
31D Cryptographic staff
263(1)
31E W.R.N.S.
264(1)
31F Engineers
265(1)
31G Education
265(1)
31H Statistics bureau
266(1)
Chapter 32 Organisation of the Testery
267(1)
Chapter 33 Knockholt
268(1)
33A Ordering tapes
268(1)
33B Treatment of tapes
268(1)
Chapter 34 Registration and Circulation
269(2)
Chapter 35 Tapemaking and Checking
271(4)
35A Introduction
271(1)
35B General rules
271(1)
35C Checking and alteration of tapes
271(1)
35D Preparation of message tapes
272(1)
35E Making of de-chis
273(1)
35F Wheel tapes and test tapes
273(1)
35G Rectangles
274(1)
35H Other Tunny jobs
274(1)
Chapter 36 Chi-Breaking from Cipher
275(2)
36A History and resources
275(1)
36B Rectangles and chit cap runs
275(1)
36C Times
276(1)
Chapter 37 Machine Setting Organisation
277(3)
Chapter 38 Wheel-Breaking from Key, Organisation
280(2)
Chapter 39 Language Methods
282(2)
39A Circulation
282(1)
39B Cryptography
282(1)
39C Decoding
283(1)
39D Issuing
283(1)
Part 4 Early Methods and History
Chapter 41 The First Break
284(6)
41A Early traffic
284(1)
41B Tunny shown to be a letter subtractor
285(1)
41C A depth read
285(1)
41D Key analysed
286(3)
41E Two more depths
289(1)
Chapter 42 Early Hand Methods
290(8)
42A First efforts at message setting
290(1)
42B Machine breaking for March 1942
291(1)
42C Message setting for March 1942
292(1)
42D April 1942
293(1)
42E The indicator method
294(4)
Chapter 43 Testery Methods 1942-44
298(7)
43A Breaking Tunny August-October 1942
298(1)
43B Turingery
298(2)
43C The pre-Newmanry QEP era
300(2)
43D The foundation of the Newmanry and after
302(3)
Chapter 44 Hand Statistical Methods
305(4)
44A Introduction of the QEP (QSN) system
305(1)
44B Setting - statistical methods
306(2)
44C Introduction of P5 limitation
308(1)
Part 5 Machines
Chapter 51 Introductory
309(3)
Chapter 52 Development of Robinson and Colossus
312(4)
Chapter 53 Colossus
316(20)
53A Introduction
317(1)
53B The Z stream
317(1)
53C The X, µ, ψ streams
318(1)
53D Stepping and setting
319(1)
53E Differencing
319(1)
53F Counting
320(1)
53G Recording of scores
320(2)
53H Spanning
322(1)
53J Q panel
323(3)
53K Plug panel
326(2)
53L Multiple test
328(4)
53M Colossus rectangling gadgets
332(2)
53N Control panel
334(1)
53P Colossus testing
334(2)
Chapter 54 Robinson
336(10)
54A Introduction
336(1)
54B How scores are exhibited
336(1)
54C Bedsteads and position counting
337(1)
54D The plug panel
338(2)
54E The switch panel
340(2)
54F Miscellaneous counter facilities
342(1)
54G The printer
343(1)
54H Control tapes
343(1)
54J Some Robinson plugging used operationally
344(2)
Chapter 55 Specialized Counting Machines
346(4)
55A Dragon
346(1)
55B Proteus
347(1)
55C Aquarius
348(2)
Chapter 56 Copying Machines
350(11)
56A Hand perforator
350(1)
56B Angel
350(1)
56C Insert machine
350(1)
56D Junior
351(1)
56E Garbo
351(1)
56F Miles
352(1)
56G Miles B, C, D
352(3)
56H Miles A
355(3)
56J Tunny and decoding machines
358(1)
56K The (Newmanry) Tunny machine
358(2)
56L Decoding machine
360(1)
Chapter 57 Simple machines
361(1)
Chapter 58 Photographs
362(19)
Part 6 Raw Materials
Chapter 61 Raw Materials - Production, with Plans of Tunny Links
381(6)
Part 7 References
Chapter 71 Glossary and Index
387(48)
Chapter 72 Notation
435(6)
Chapter 73 Bibliography
441(3)
73A Research logs
441(1)
73B Screeds
441(1)
73C Statistics
442(1)
73D Administration, standing orders, etc
442(1)
73E Charts and tables
442(2)
Chapter 74 Chronology
444(8)
Part 8 Conclusions
Chapter 81 Conclusions
452(4)
81A Organisation
452(2)
81B Theory
454(1)
81C Machines
455(1)
Part 9 Appendices
Chapter 91 The 5202 Machine
456(15)
91A Principle of the 5202
456(2)
91B Technical aspects
458(6)
91C Times and routines
464(3)
91D Crib run
467(1)
91E Conclusions
467(4)
Chapter 92 Recovery of Motor Patterns from De-chi
471(11)
92A Introduction and outline
471(1)
92B Decibanage of ΔD letters
472(1)
92C Construction of Motor Rectangle
473(1)
92D The Scoring of Columns against each other
473(1)
92E The Recovery of Patterns (A). Finding the dottage of µ61
474(2)
92F The Recovery of Patterns (B). The approximate µ37 and µ41
476(2)
92G Finishing off the µ's
478(1)
92H Recovery of the ψ patterns
479(1)
92I Example of method (b)
479(1)
92K Experiment in recovery by method of the smooth µ61
479(3)
Chapter 93 Thrasher
482(2)
Chapter 94 Research into the QEP System
484(4)
Chapter 95 Mechanical Flags
488(7)
95A General description
488(1)
95B Mechanical ordinary flag
489(2)
95C Mechanical combined key flag
491(4)
Appendix A: Transmission of Teleprinter Signals 495(8)
J.A. Reeds
Appendix B: Activities at Knockholt 503(27)
J.A. Reeds
Appendix C: The 5202 Machine 530(5)
J.A. Reeds
Appendix D: Initial Conception of Colossus 535(5)
J.A. Reeds
Appendix E: List of Scanned Exhibits 540(2)
Supplementary Glossary 542(5)
Biographical Notes 547(14)
Notes 561(63)
Bibliography 624(21)
Index 645
James A. Reeds is an applied mathematician and is currently on the research staff at the Center for Communications Research, Princeton, NJ.

Whitfield Diffie is best known for his 1975 discovery of the concept of public key cryptography. Since 1993, he has worked largely on public policy aspects of cryptography. His position in opposition to limitations on the business and personal use of cryptography has been the subject of articles in the New York Times and programs on networks such as CNN.

J.V. Field, an Honorary Visiting Research Fellow in the Department of History of Art at Birkbeck, University of London, is now a historian of science but in the 1960s worked as a computer programmer.