WWII's Colossus computer cracks codes once again
Rebuilt vacuum-tube computer runs at Bletchley Park, tackles new messages enciphered with Nazi hardware
Computerworld - A reconstructed World War II-era British computer is trying to crack messages enciphered on Nazi hardware in an event sponsored by the National Museum of Computing, located at Bletchley Park, the wartime organization famous for breaking the German Enigma codes.
Dubbed the Colossus, the vacuum tube-based computer was built using all that remained -- photographs and fragments of some circuit board schematics -- after the original 10 machines were disassembled when the war ended. In another attempt at keeping the code-breaking secret, the Colossus original drawings were deliberately burned in 1960, more than a decade before the work of Bletchley Park was revealed.
Regarded as one of the earliest electronic digital computers -- if not the first -- Colossus was used to break messages enciphered by the Germans' Lorenz machines. Lorenz, a teletype-connected system that relied on 12 ciphering wheels, was used to encipher high-level traffic between German high command and other headquarters. Unlike the more familiar portable Enigma, Lorenz wasn't used in the field.
In what the museum has called the Cipher Challenge, the rebuilt Colossus will attempt to turn back time and decipher radio messages sent from Germany today and Friday. The messages have been encrypted using one of the few remaining Lorenz machines, and have been classified as easy, hard or hardest to decipher by virtue of the clues -- or lack of them -- in the form of some starting positions of the Lorenz wheels.
Although the messages will be transmitted from Paderborn, Germany, using modern shortwave equipment, one of the two teams in the U.K. will try to receive the messages on World War II hardware that spits out paper tape, which was used by Bletchley Park to input data into the real Colossus computers.
Amateur radio operators can intercept the transmissions, and using a virtual Colossus program on the PC -- or its Web-based cousin -- try to uncover the starting position for the Lorenz's dozen wheels. Another program, a virtual Tunny -- the latter was the nickname for the Lorenz emulator that the British code breakers created during WWII -- is needed to actually decipher the message text. Users can then submit their results to the Challenge by e-mail.
As of 2 p.m. Eastern time in the U.S., no results had been posted to the Challenge Web site. A malfunction on the German end -- the aged Lorenz's main transformer went out -- stalled work yesterday.
The Challenge is also being used to spark donations to the museum. Contributions are being taken online. More information on the Cipher Challenge can be found on the museum's Web site.
Read more about Hardware in Computerworld's Hardware Topic Center.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- The Truth About Virtual Computing for CAD If you're a user of graphics-intensive software such as 3D modeling, simulation and analysis, and visualization, you might be skeptical about moving to...
- Simplifying Product Design In A Complex World Product design engineering has moved far beyond the confines of ever-more powerful workstations. Companies can't afford to restrict projects to using only local...
- A Reference Architecture for the Internet of Things The aim of this is to provide Architects and Developers of IoT projects with an effective starting point that covers the major requirements...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer... All Hardware White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!