Feeds

Bletchley Park completes epic Tunny machine

Glorious pipe-smoking boffinry recreated from old telco kit

High performance access to file storage

A new exhibit opens today at Bletchley Park that illustrates the entire World War II codebreaking process from signal intercept to final decrypt by Tunny machines.

The original Tunny, a British project to re-engineer the then-unseen German Lorenz S42 cipher machine, was developed in 1942. After tens of thousands of man-hours and with only scattered information about the original, a team at The National Museum of Computing recently succeeded in completing a fully functioning rebuild of a Tunny machine.

The machine is the centrepiece of an exhibition at the National Museum of Computing due to be opened by four World War II codebreakers later on Thursday.

The original machines were built by a team led by Bill Tutte that worked out the logical structure of the 12-rotor machine using samples of its encrypted output and the manual decrypts laboriously extracted by other teams at Bletchley Park. The 12 rotors of the Lorenz machine gave it 1.6 quadrillion (1.6 x 1015) possible start positions.

Tunny completed its first decrypts in 1942 but it really came into its own when the more celebrated Colossus was completed in 1944. Colossus was able to supply wheel settings much more quickly to Tunny than the earlier "Robinson" machines. Colussus reduced the difficult task of determining wheel settings in a matter of hours and reduced the total time spent deciphering a message from several weeks to up to four days.

Around 15 Tunny machines were built. All were dismantled after the war. The original Tunny project, though technically not as significant as the development of Colossus (the world's first modern computer), was still a remarkable achievement in its own right. The machines were an essential component in the decoding of Lorenz-encrypted communications.

The rebuild team had only a few photographs, partial circuit diagrams and the fading memories of a few original Tunny operators to go on. Nonetheless a team led by John Pether and John Whetter was able to complete this restoration work.

Pether explained that getting the electronics to work proved to be the most difficult part of the restoration process.

"We've succeeded in rebuilding Tunny with scraps of evidence, and although we are very proud of our work it is rather different from the truly astonishing achievement of Bill Tutte's re-engineering of the Lorenz machine," he said. "Sourcing 200 suitable relays and dealing with the complex wiring schedules was difficult, but we really got in tune with the original team when we had to set up the electronic timing circuits. They were a continuous source of problems then as they are even now for the rebuild team – except the original team didn't even have the benefit of digital storage oscilloscopes."

The rebuild took place in four stages: the construction of a one-wheel Tunny to ensure that timing circuits and relays worked correctly, followed by progressively more complex five-, seven- and 12-wheel Tunny. At each stage, the rebuilds were tested. Key components for the Tunny rebuild were salvaged from decommissioned analogue telephone exchanges, donated by BT. The same components were used to complete the earlier Colussus rebuild project.

Andy Clark, a trustee and director of TNMOC, added:

"We can now present the whole process of code-breaking as it happened during World War II in the historic Block H on Bletchley Park. The completion of the Tunny rebuild superbly complements the rebuild of Colossus by Tony Sale's team in 2007 and will undoubtedly attract even more visitors to the array of fascinating working vintage computers at TNMOC." ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.