# Bombe

Last updated

The bombe () is an electro-mechanical device used by Polish and British cryptologists to help decipher German Enigma-machine-encrypted secret messages during World War II. [1] The US Navy [2] and US Army [3] later produced their own machines to the same functional specification, albeit engineered differently both from each other and from Polish and British Bombes.

British English is the standard dialect of English language as spoken and written in the United Kingdom. Variations exist in formal, written English in the United Kingdom. For example, the adjective wee is almost exclusively used in parts of Scotland and Ireland, and occasionally Yorkshire, whereas little is predominant elsewhere. Nevertheless, there is a meaningful degree of uniformity in written English within the United Kingdom, and this could be described by the term British English. The forms of spoken English, however, vary considerably more than in most other areas of the world where English is spoken, so a uniform concept of British English is more difficult to apply to the spoken language. According to Tom McArthur in the Oxford Guide to World English, British English shares "all the ambiguities and tensions in the word 'British' and as a result can be used and interpreted in two ways, more broadly or more narrowly, within a range of blurring and ambiguity".

In engineering, electromechanics combines processes and procedures drawn from electrical engineering and mechanical engineering. Electromechanics focuses on the interaction of electrical and mechanical systems as a whole and how the two systems interact with each other. This process is especially prominent in systems such as those of DC Machines which can be designed and operated to generate power from a mechanical process (generator) or used to power a mechanical effect (motor). Electrical engineering in this context also encompasses electronics engineering.

Nazi Germany is the common English name for Germany between 1933 and 1945, when Adolf Hitler and his Nazi Party (NSDAP) controlled the country through a dictatorship. Under Hitler's rule, Germany was transformed into a totalitarian state that controlled nearly all aspects of life via the Gleichschaltung legal process. The official name of the state was Deutsches Reich until 1943 and Großdeutsches Reich from 1943 to 1945. Nazi Germany is also known as the Third Reich, meaning "Third Realm" or "Third Empire", the first two being the Holy Roman Empire (800–1806) and the German Empire (1871–1918). The Nazi regime ended after the Allies defeated Germany in May 1945, ending World War II in Europe.

## Contents

The British bombe was a development from a device that had been designed in Poland at the Biuro Szyfrów (Cipher Bureau) by cryptologist Marian Rejewski, known as the "bomba" (Polish : bomba kryptologiczna) who had been breaking German Enigma messages for the previous seven years using it and earlier machines. The initial design of the British bombe was produced in 1939 at the UK Government Code and Cypher School (GC&CS) at Bletchley Park by Alan Turing, [4] with an important refinement devised in 1940 by Gordon Welchman. [5] The engineering design and construction was the work of Harold Keen of the British Tabulating Machine Company. The first bombe, code-named Victory, was installed in March 1940 [6] while the second version, Agnus Dei or Agnes, incorporating Welchman's new design, was working by August 1940. [7]

The Biuro Szyfrów was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography and cryptanalysis.

Marian Adam Rejewski was a Polish mathematician and cryptologist who reconstructed the Nazi German military Enigma cipher machine sight-unseen in 1932. The cryptologic achievements of Rejewski and colleagues Jerzy Różycki and Henryk Zygalski enabled the British to begin reading German Enigma-encrypted messages at the start of World War II, seven years after Rejewski's original reconstruction of the machine. The intelligence that was gained by the British from Enigma decrypts formed part of what was code-named Ultra and contributed—perhaps decisively—to the defeat of Germany.

The bomba, or bomba kryptologiczna, was a special-purpose machine designed about October 1938 by Polish Cipher Bureau cryptologist Marian Rejewski to break German Enigma-machine ciphers.

The bombe was designed to discover some of the daily settings of the Enigma machines on the various German military networks: specifically, the set of rotors in use and their positions in the machine; the rotor core start positions for the message—the message key—and one of the wirings of the plugboard. [8] [9] [10]

A telecommunications network is a collection of terminal nodes in which links are connected so as to enable telecommunication between the terminals. The transmission links connect the nodes together. The nodes use circuit switching, message switching or packet switching to pass the signal through the correct links and nodes to reach the correct destination terminal. Each terminal in the network usually has a unique address so messages or connections can be routed to the correct recipients. The collection of addresses in the network is called the address space. Examples of telecommunications networks are:

In cryptography, a key is a piece of information that determines the functional output of a cryptographic algorithm. For encryption algorithms, a key specifies the transformation of plaintext into ciphertext, and vice versa for decryption algorithms. Keys also specify transformations in other cryptographic algorithms, such as digital signature schemes and message authentication codes.

## The Enigma machine

The Enigma is an electro-mechanical rotor machine used for the encryption and decryption of secret messages. It was developed in Germany in the 1920s. The repeated changes of the electrical pathway from the keyboard to the lampboard implement a polyalphabetic substitution cipher, which turns plaintext into ciphertext and back again. The Enigma's scrambler contains rotors with 26 electrical contacts on each side, whose wiring diverts the current to a different position on the two sides. On depressing a key on the keyboard, an electric current flows through an entry drum at the right-hand end of the scrambler, then through the set of rotors to a reflecting drum (or reflector) which turns it back through the rotors and entry drum, and out to cause one lamp on the lampboard to be illuminated. [11]

In cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting secret messages. Rotor machines were the cryptographic state-of-the-art for a prominent period of history; they were in widespread use in the 1920s–1970s. The most famous example is the German Enigma machine, whose messages were deciphered by the Allies during World War II, producing intelligence code-named Ultra.

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor. In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an encryption algorithm – a cipher – generating ciphertext that can be read only if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users.

A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case. The Enigma machine is more complex but is still fundamentally a polyalphabetic substitution cipher.

At each key depression, the right-hand or "fast" rotor advances one position, which causes the encipherment to change. In addition, at a certain point, the right-hand rotor causes the middle rotor to advance; in a similar way, the middle rotor might cause the left-hand (or "slow") rotor to advance. Each rotor causes the "turnover" of the rotor to its left after a full rotation. The Enigma operator could rotate the wheels by hand to change the letter of the alphabet showing through a window, to set the start position of the rotors for enciphering a message. This three-letter sequence is the "message key". There are 26 × 26 × 26 = 17,576 possible positions of the set of three rotors, and hence different message keys. By opening the lid of the machine and releasing a compression bar, the set of three rotors on their spindle could be removed from the machine and their sequence (called the "wheel order" at Bletchley Park) could be altered. Multiplying 17,576 by the six possible wheel orders gives 105,456 different ways that the scrambler could be set up.[ citation needed ]

Although 105,456 is a large number [12] , it does not guarantee security. A brute-force attack is possible: one could imagine using 100 code clerks who each tried to decode a message using 1000 distinct rotor settings. The Poles developed card catalogs so they could easily find rotor positions; Britain built "EINS" (a common German word) catalogs. Less intensive methods were also possible. If all message traffic for a day used the same rotor starting position, then frequency analysis for each position could recover the polyalphabetic substitutions. If different rotor starting positions were used, then overlapping portions of a message could be found using the index of coincidence [13] . Many major powers (including the Germans) could break Enigma traffic if they knew the rotor wiring. The German military knew the Enigma was weak. [14]

In cryptography, coincidence counting is the technique of putting two texts side-by-side and counting the number of times that identical letters appear in the same position in both texts. This count, either as a ratio of the total or normalized by dividing by the expected count for a random source model, is known as the index of coincidence, or IC for short.

In 1930, the German army introduced an additional security feature, a plugboard (Steckerbrett in German; each plug is a Stecker) that further scrambled the letters. The Enigma encryption is a self inverse: it swapped letters in pairs: if A is transformed into R then R is transformed into A. The plugboard maintained the self inverse, but the plugboard transformation, unlike the rotor transformation, does not change during the encryption. This regularity was exploited by Welchman's "diagonal board" enhancement to the bombe, which vastly increased its efficiency. [15] With six plug leads in use (leaving 14 letters "unsteckered") this gives 100,391,791,500 possible ways of setting up the plugboard. [16]

An important feature of the machine from a cryptanalyst's point of view, and indeed Enigma's Achilles' heel, was that the reflector in the scrambler meant that a letter was never enciphered as itself. Any putative solution that gave, for any location, the same letter in the proposed plaintext and the ciphertext could therefore be eliminated. [17]

In the lead up to World War II, the Germans made successive improvements to their military Enigma machines. By January 1939, additional rotors had been introduced so that there was a choice of three from five (i.e. 60 wheel orders) for the army and airforce Enigmas, and three out of eight (336 wheel orders) for the navy machines. In addition, ten leads were used on the plugboard leaving only six letters unsteckered. This meant that the airforce and army Enigmas could be set up 1.5×1019 ways. In 1941 the German navy introduced a version of Enigma with rotatable reflector (the M4 or Four-rotor Enigma) for communicating with its U-boats. This could be set up in 1.8×1020 different ways. [16]

### Four-rotor Enigma

By late 1941 a change in German Navy fortunes in the Battle of the Atlantic, combined with intelligence reports, convinced Admiral Karl Dönitz that the Allies could read German Navy coded communications, and a fourth rotor with unknown wiring was added to German Navy Enigmas used for U-boat communications, producing the Triton system,[ dubious ] known at Bletchley Park as Shark. This was coupled with a thinner reflector design to make room for the extra rotor. The Triton was designed in such a way that it remained compatible with three-rotor machines when necessary. One of the extra 'fourth' rotors, the 'beta', was designed so that when it was paired with the thin 'B' reflector and rotor and ring were set to 'A', the pair acted as a standard three-rotor wide 'B' reflector. As before, the unknown wiring would prevent unauthorized reading of messages. Fortunately for the Allies, in December 1941, before the machine went into official service, a submarine accidentally sent a message with the fourth rotor in the wrong position. It then retransmitted the message with the rotor in the correct (three-rotor emulating) position. In February 1942 the change in the number of rotors used became official, and the Allies' ability to read German submarines' messages ceased until a snatch from a captured U-boat revealed not only the four-rotor machine's ability to emulate a three-rotor machine, but also that the fourth rotor did not move during a message. This along with the aforementioned mistake allowed the code breakers to eventually figure out the wiring of both the 'beta' and 'gamma' fourth rotors.[ citation needed ]

The first half of 1942 was the "Second Happy Time" for the German U-boats, with renewed success in attacking Allied shipping. This was due to the security of the new Enigma, and their ability to read Allied convoy messages sent in Naval Cipher No. 3. Between January and March 1942, German submarines sank 216 ships off the US east coast. In May 1942 the US began using the convoy system and requiring a blackout of coastal cities so that ships would not be silhouetted against their lights, but this yielded only slightly improved security for Allied shipping. The Allies' failure to change the cipher for three months plus the fact that Allied messages never contained any raw Enigma decrypts (or even mentioned that they were decrypting messages), helped convince the Germans that their messages were secure. Conversely, the Allies learned that the Germans had broken the naval cipher almost immediately from Enigma decrypts, but lost many ships due to the delay in changing the cipher.[ citation needed ]

## The principle of the bombe

The following settings of the Enigma machine must be discovered to decipher German military Enigma messages. Once these are known, all the messages for that network for that day (or pair of days in the case of the German navy) could be decrypted.

Internal settings (that required the lid of the Enigma machine to be opened)

• The selection of rotors in use in the Enigma's scrambler, and their positions on the spindle (Walzenlage or "wheel order"). Possible wheel orders numbered 60 (three rotors from a choice of five) for army and air force networks and 336 (three rotors from a choice of eight) for the naval networks.
• The positions of the alphabet ring's turnover notch in relation to the core of each rotor in use (Ringstellung or "ring settings"). There are 26 possible ring-settings for each rotor.

External settings (that could be changed without opening the Enigma machine)

• The plugboard connections (Steckerverbindungen or "stecker values"). The ten leads could be arranged in ${\displaystyle {\frac {{26 \choose 2}\cdot {24 \choose 2}\cdot {22 \choose 2}\cdot ...\cdot {8 \choose 2}}{10!}}=150,738,274,937,250}$ different combinations (approximately 151 trillion). [19]
• The scrambler rotor positions at the start of enciphering the message key (the Grundstellung or "indicator-setting") — up to May 1940; or thereafter the initial positions of each rotor at the start of enciphering the message (the "message key") from which the indicator-setting could be derived. There are 17,576 possible three-letter keys.

The bombe identified possible initial positions of the rotor cores and the stecker partner of a specified letter for a set of wheel orders. Manual techniques were then used to complete the decryption process. [20] In the words of Gordon Welchman, "... the task of the bombe was simply to reduce the assumptions of wheel order and scrambler positions that required 'further analysis' to a manageable number". [21]

### Structure

The bombe was an electro-mechanical device that replicated the action of several Enigma machines wired together. A standard German Enigma employed, at any one time, a set of three rotors, each of which could be set in any of 26 positions. The standard British bombe contained 36 Enigma equivalents, each with three drums wired to produce the same scrambling effect as the Enigma rotors. A bombe could run two or three jobs simultaneously. Each job would have a menu that had to be run against a number of different wheel orders. If the menu contained 12 or fewer letters, three different wheel orders could be run on one bombe; if more than 12 letters, only two.

In order to simulate Enigma rotors, each rotor drum of the bombe had two complete sets of contacts, one for input towards the reflector and the other for output from the reflector, so that the reflected signal could pass back through a separate set of contacts. Each drum had 104 wire brushes, which made contact with the plate onto which they were loaded. The brushes and the corresponding set of contacts on the plate were arranged in four concentric circles of 26. The outer pair of circles (input and output) were equivalent to the current in an Enigma passing in one direction through the scrambler, and the inner pair equivalent to the current flowing in the opposite direction.

The interconnections within the drums between the two sets of input and output contacts were both identical to those of the relevant Enigma rotor. There was permanent wiring between the inner two sets of contacts of the three input/output plates. From there, the circuit continued to a plugboard located on the left-hand end panel, which was wired to imitate an Enigma reflector and then back through the outer pair of contacts. At each end of the "double-ended Enigma", there were sockets on the back of the machine, into which 26-way cables could be plugged.

The bombe drums were arranged with the top one of the three simulating the left-hand rotor of the Enigma scrambler, the middle one the middle rotor, and the bottom one the right-hand rotor. The top drums were all driven in synchrony by an electric motor. For each full rotation of the top drums, the middle drums were incremented by one position, and likewise for the middle and bottom drums, giving the total of 26 × 26 × 26 = 17,576 positions of the 3-rotor Enigma scrambler. [22] [23]

The drums were colour-coded according to which Enigma rotor they emulated: I Red; II Maroon; III Green; IV Yellow; V Brown; VI Cobalt (Blue); VII Jet (Black); VIII Silver. [24]

At each position of the rotors, an electric current would or would not flow in each of the 26 wires, and this would be tested in the bombe's comparator unit. For a large number of positions, the test would lead to a logical contradiction, ruling out that setting. If the test did not lead to a contradiction, the machine would stop.

The operator would record the candidate solution by reading the positions of the indicator drums and the indicator unit on the Bombe's right-hand end panel. The operator then restarted the run. The candidate solutions, stops as they were called, were processed further to eliminate as many false stops as possible. Typically, there were many false bombe stops before the correct one was found.

The candidate solutions for the set of wheel orders were subject to extensive further cryptanalytical work. This progressively eliminated the false stops, built up the set of plugboard connections and established the positions of the rotor alphabet rings. [25] Eventually, the result would be tested on a Typex machine that had been modified to replicate an Enigma, to see whether that decryption produced German language. [26]

A bombe run involved a cryptanalyst first obtaining a crib — a section of plaintext that was thought to correspond to the ciphertext. Finding cribs was not at all straightforward; it required considerable familiarity with German military jargon and the communication habits of the operators. However, the codebreakers were aided by the fact that the Enigma would never encrypt a letter to itself. This helped in testing a possible crib against the ciphertext, as it could rule out a number of cribs and positions, where the same letter occurred in the same position in both the plaintext and the ciphertext. This was termed a crash at Bletchley Park.

Once a suitable crib had been decided upon, the cryptanalyst would produce a menu for wiring up the bombe to test the crib against the ciphertext. The following is a simplified explanation of the process of constructing a menu. Suppose that the crib is ATTACKATDAWN to be tested against a certain stretch of ciphertext, say, WSNPNLKLSTCS. The letters of the crib and the ciphertext were compared to establish pairings between the ciphertext and the crib plaintext. These were then graphed as in the diagram. It should be borne in mind that the relationships are reciprocal so that A in the plaintext associated with W in the ciphertext is the same as W in the plaintext associated with A in the ciphertext. At position 1 of the plaintext-ciphertext comparison, the letter A is associated with W, but A is also associated with P at position 4, K at position 7 and T at position 10. Building up these relationships into such a diagram provided the menu from which the bombe connections and drum start positions would be set up.

 Ciphertext Plaintext "crib" Message position Upper drum setting Middle drum setting Lower drum setting W S N P N L K L S T C S A T T A C K A T D A W N 1 2 3 4 5 6 7 8 9 10 11 12 Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z A B C D E F G H I J K L

In the illustration, there are three sequences of letters which form loops (or cycles or closures), ATLK, TNS and TAWCN. The more loops in the menu, the more candidate rotor settings the bombe could reject, and hence the fewer false stops.

Alan Turing conducted a very substantial analysis (without any electronic aids) to estimate how many bombe stops would be expected according to the number of letters in the menu and the number of loops. Some of his results are given in the following table. [27] Recent bombe simulations have shown similar results.

Estimated number of bombe stops per rotor order
Number of letters on the menu
Loops8910111213141516
32.21.10.420.140.04<0.01<0.01<0.01<0.01
25828113.81.20.300.06<0.01<0.01
11500720280100317.71.60.280.04
040,00019,00073002700820200437.31.0

### Stecker values

The German military Enigma included a plugboard (Steckerbrett in German) which swapped letters (indicated here by P) before and after the main scrambler's change (indicated by S). The plugboard connections were known to the cryptanalysts as Stecker values. If there had been no plugboard, it would have been relatively straightforward to test a rotor setting; a Typex machine modified to replicate Enigma could be set up and the crib letter A encrypted on it, and compared with the ciphertext, W. If they matched, the next letter would be tried, checking that T encrypted to S and so on for the entire length of the crib. If at any point the letters failed to match, the initial rotor setting would be rejected; most incorrect settings would be ruled out after testing just two letters. This test could be readily mechanised and applied to all 17,576 settings of the rotors.

However, with the plugboard, it was much harder to perform trial encryptions because it was unknown what the crib and ciphertext letters were transformed to by the plugboard. For example, in the first position, P(A) and P(W) were unknown because the plugboard settings were unknown.

Turing's solution to working out the stecker values (plugboard connections) was to note that, even though the values for, say, P(A) or P(W), were unknown, the crib still provided known relationships amongst these values; that is, the values after the plugboard transformation. Using these relationships, a cryptanalyst could reason from one to another and, potentially, derive a logical contradiction, in which case the rotor setting under consideration could be ruled out.

A worked example of such reasoning might go as follows: a cryptanalyst might suppose that P(A) = Y. Looking at position 10 of the crib:ciphertext comparison, we observe that A encrypts to T, or, expressed as a formula:

T = P(S10(P(A)))

Due to the function P being its own inverse, we can apply it to both sides of the equation and obtain the following:

P(T) = S10(P(A))

This gives us a relationship between P(A) and P(T). If P(A) = Y, and for the rotor setting under consideration S10(Y) = Q (say), we can deduce that

P(T) = S10(P(A)) = S10(Y) = Q

While the crib does not allow us to determine what the values after the plugboard are, it does provide a constraint between them. In this case, it shows how P(T) is completely determined if P(A) is known.

Likewise, we can also observe that T encrypts to L at position 8. Using S8, we can deduce the steckered value for L as well using a similar argument, to get, say,

P(L) = S8(P(T)) = S8(Q) = G

Similarly, in position 6, K encrypts to L. As the Enigma machine is self-reciprocal, this means that at the same position L would also encrypt to K. Knowing this, we can apply the argument once more to deduce a value for P(K), which might be:

P(K) = S6(P(L)) = S6(G) = F

And again, the same sort of reasoning applies at position 7 to get:

P(A) = S7(P(K)) = S7(F) = N

However, in this case, we have derived a contradiction, since, by hypothesis, we assumed that P(A) = Y at the outset. This means that the initial assumption must have been incorrect, and so that (for this rotor setting) P(A)Y (this type of argument is termed reductio ad absurdum or "proof by contradiction").

The cryptanalyst hypothesised one plugboard interconnection for the bombe to test. The other stecker values and the ring settings were worked out by hand methods.

### Automated deduction

To automate these logical deductions, the bombe took the form of an electrical circuit. Current flowed around the circuit near-instantaneously, and represented all the possible logical deductions which could be made at that position. To form this circuit, the bombe used several sets of Enigma rotor stacks wired up together according to the instructions given on a menu, derived from a crib. Because each Enigma machine had 26 inputs and outputs, the replica Enigma stacks are connected to each other using 26-way cables. In addition, each Enigma stack rotor setting is offset a number of places as determined by its position in the crib; for example, an Enigma stack corresponding to the fifth letter in the crib would be four places further on than that corresponding to the first letter.

### In practice

Practical bombes used several stacks of rotors spinning together to test multiple hypotheses about possible setups of the Enigma machine, such as the order of the rotors in the stack.

While Turing's bombe worked in theory, it required impractically long cribs to rule out sufficiently large numbers of settings. Gordon Welchman came up with a way of using the symmetry of the Enigma stecker to increase the power of the bombe. His suggestion was an attachment called the diagonal board that further improved the bombe's effectiveness. [5]

## The British Bombe

Alan Turing designed the British bombe on a more general principle, the assumption of the presence of text, called a crib, that cryptanalysts could predict was likely to be present at a defined point in the message. This technique is termed a known plaintext attack and had been used to a limited extent by the Poles, e.g., the Germans' use of "ANX" — "AN", German for "To," followed by "X" as a spacer.

Bletchley Park's commanding officer Edward Travis acquired a £100,000 budget for the construction of Turing's machine, and the contract to build the bombes was awarded to the British Tabulating Machine Company (BTM) at Letchworth. [28] BTM placed the project under the direction of Harold 'Doc' Keen. Each machine was about 7 feet (2.1 m) wide, 6 feet 6 inches (1.98 m) tall, 2 feet (0.61 m) deep and weighed about a ton. [29] On the front of each bombe were 108 places where drums could be mounted. The drums were in three groups of 12 triplets. Each triplet, arranged vertically, corresponded to the three rotors of an Enigma scrambler. The bombe drums' input and output contacts went to cable connectors, allowing the bombe to be wired up according to the menu. The 'fast' drum rotated at a speed of 50.4 rpm in the first models [30] and 120 rpm in later ones, [31] when the time to set up and run through all 17,576 possible positions for one rotor order was about 20 minutes. [32]

The first bombe was named "Victory". It was installed in "Hut 1" at Bletchley Park on 18 March 1940. It was based on Turing's original design and so lacked a diagonal board. [33] On 26 April 1940, HMS Griffin captured a German trawler (Schiff 26, the Polares) flying a Dutch flag; included in the capture were some Enigma keys for 23 to 26 April. [34] Bletchley retrospectively attacked some messages sent during this period using the captured material and an ingenious Bombe menu where the Enigma fast rotors were all in the same position. [35] In May and June 1940, Bletchley succeeded in breaking six days of naval traffic, 22–27 April 1940. [36] Those messages were the first breaks of Kriegsmarine messages of the war, "[b]ut though this success expanded Naval Section's knowledge of the Kriegsmarines's signals organization, it neither affected naval operations nor made further naval Enigma solutions possible." [37] The second bombe, named "Agnus dei", later shortened to "Agnes", or "Aggie", was equipped with Welchman's diagonal board, and was installed on 8 August 1940; "Victory" was later returned to Letchworth to have a diagonal board fitted. [38] The bombes were later moved from "Hut 1" to "Hut 11". The bombe was referred to by Group Captain Winterbotham as a "Bronze Goddess" because of its colour. [39] The devices were more prosaically described by operators as being "like great big metal bookcases". [40]

During 1940, 178 messages were broken on the two machines, nearly all successfully. Because of the danger of bombes at Bletchley Park being lost if there were to be a bombing raid, bombe outstations [41] were established, at Adstock, Gayhurst and Wavendon, all in Buckinghamshire. [42] In June–August 1941 there were 4 to 6 bombes at Bletchley Park, and when Wavendon was completed, Bletchley, Adstock and Wavenden had a total of 24 to 30 bombes. When Gayhurst became operational there were a total of 40 to 46 bombes, and it was expected that the total would increase to about 70 bombes run by some 700 Wrens (Women's Royal Naval Service). But in 1942 with the introduction of the naval four-rotor Enigma, "far more than seventy bombes" would be needed. New outstations were established at Stanmore and Eastcote, and the Wavendon and Adstock bombes were moved to them, though the Gayhurst site was retained. The few bombes left at Bletchley Park were used for demonstration and training purposes only. [43]

Main British (BTM) bombe types [44] [45]
TypeNumber of Enigma-equivalentsMechanismNumber built
Original standard36 (30 in pre-production)3-rotor Enigma-equivalents73
Jumbo363-rotor Enigma-equivalents plus an additional mechanism to check each stop and print the results (dubbed the "machine gun" because of the noise its uniselectors made)14
Mammoth364-rotor Enigma-equivalents with high-speed relays to sense stops57
Cobra364-rotor Enigma-equivalents with an electronic sensing unit designed by C. E. Wynn-Williams and Tommy Flowers' team at the GPO Research Station [46] (this machine was unreliable)12
'New' [47] standard363-rotor Enigma-equivalents (with high-speed Siemens-type sense relays)68

Production of bombes by BTM at Letchworth in wartime conditions was nowhere near as rapid as the Americans later achieved at NCR in Dayton, Ohio.

Number of 3-rotor bombes available [48]
YearMonthNumber
1941December12
1942December40
1943June72
1943December87
1944December152
1945May155

Sergeant Jones was given the overall responsibility for Bombe maintenance by Edward Travis. Later Squadron Leader and not to be confused with Eric Jones, he was one of the original bombe maintenance engineers, and experienced in BTM techniques. Welchman said that later in the war when other people tried to maintain them, they realised how lucky they were to have him. About 15 million delicate wire brushes on the drums had to make reliable contact with the terminals on the template. There were 104 brushes per drum, 720 drums per bombe, and ultimately around 200 bombes. [49]

After World War II, some fifty bombes were retained at RAF Eastcote, while the rest were destroyed. The surviving bombes were put to work, possibly on Eastern bloc ciphers. Smith cites the official history of the bombe as saying that "some of these machines were to be stored away but others were required to run new jobs and sixteen machines were kept comparatively busy on menus." and "It is interesting to note that most of the jobs came up and the operating, checking and other times maintained were faster than the best times during the war periods." [50]

## Response to the four-rotor Enigma

A program was initiated by Bletchley Park to design much faster bombes that could decrypt the four-rotor system in a reasonable time. There were two streams of development. One, code-named Cobra, with an electronic sensing unit, was produced by Charles Wynn-Williams of the Telecommunications Research Establishment (TRE) at Malvern and Tommy Flowers of the General Post Office (GPO). [51] The other, code-named Mammoth, was designed by Harold Keen at BTM, Letchworth. Initial delivery was scheduled for August or September 1942. [44] The dual development projects created considerable tension between the two teams, both of which cast doubts on the viability of the opposing team's machine. After considerable internal rivalry and dispute, Gordon Welchman (by then, Bletchley Park's Assistant Director for mechanisation) was forced to step in to resolve the situation. Ultimately, Cobra proved unreliable and Mammoth went into full-scale production. [52]

Unlike the situation at Bletchley Park, the United States armed services did not share a combined cryptanalytical service. Indeed, there was considerable rivalry between the US Army's facility, the Signals Intelligence Service (SIS), and that of the US Navy known as OP-20-G. [53] Before the US joined the war, there was collaboration with Britain, albeit with a considerable amount of caution on Britain's side because of the extreme importance of Germany and her allies not learning that its codes were being broken. Despite some worthwhile collaboration amongst the cryptanalysts, their superiors took some time to achieve a trusting relationship in which both British and American bombes were used to mutual benefit.

In February 1941, Captain Abe Sinkov and Lieutenant Leo Rosen of the US Army, and US Naval Lieutenants Robert Weeks and Prescott Currier, arrived at Bletchley Park bringing, amongst other things, a replica of the 'Purple' cipher machine for the Bletchley Park's Japanese section in Hut 7. [54] The four returned to America after ten weeks, with a naval radio direction finding unit and many documents [55] including a 'paper Enigma'. [56]

Currier later wrote:

There was complete cooperation. We went everywhere, including Hut 6. We watched the entire operation and had all the techniques explained in great detail. We were thoroughly briefed on the latest techniques in the solution of Enigma and the operations of the bombes. We had ample opportunity to take as many notes as we wanted and to watch first hand all operations involved. [57]

The main response to the Four-rotor Enigma was the US Navy bombe, which was manufactured in much less constrained facilities than were available in wartime Britain.

Number of 4-rotor bombes available (UK and US) [48]
YearMonthNumber
1943June4
1943December95
1944December160
1945May180

### US Navy Bombe

Colonel John Tiltman, who later became Deputy Director at Bletchley Park, visited the US Navy cryptanalysis office (OP-20-G) in April 1942 and recognised America's vital interest in deciphering U-boat traffic. The urgent need, doubts about the British engineering workload and slow progress, prompted the US to start investigating designs for a Navy bombe, based on the full blueprints and wiring diagrams received by US Naval Lieutenants Robert Ely and Joseph Eachus at Bletchley Park in July 1942. [58] [15] [59] Funding for a full, \$2 million, navy development effort was requested on 3 September 1942 and approved the following day.

Commander Edward Travis, Deputy Director and Frank Birch, Head of the German Naval Section travelled from Bletchley Park to Washington in September 1942. With Carl Frederick Holden, US Director of Naval Communications they established, on 2 October 1942, a UK:US accord which may have "a stronger claim than BRUSA to being the forerunner of the UKUSA Agreement," being the first agreement "to establish the special Sigint relationship between the two countries," and "it set the pattern for UKUSA, in that the United States was very much the senior partner in the alliance." [61] It established a relationship of "full collaboration" between Bletchley Park and OP-20-G. [15]

An all electronic solution to the problem of a fast bombe was considered, [15] but rejected for pragmatic reasons, and a contract was let with the National Cash Register Corporation (NCR) in Dayton, Ohio. This established the United States Naval Computing Machine Laboratory. [3] Engineering development was led by NCR's Joseph Desch.

Alan Turing, who had written a memorandum to OP-20-G (probably in 1941), [62] was seconded to the British Joint Staff Mission in Washington in December 1942, because of his exceptionally wide knowledge about the bombes and the methods of their use. He was asked to look at the bombes that were being built by NCR and at the security of certain speech cipher equipment under development at Bell Labs. [63] He visited OP-20-G, and went to NCR in Dayton on 21 December. He was able to show that it was not necessary to build 336 Bombes, one for each possible rotor order, by utilising techniques such as Banburismus. [15] The initial order was scaled down to 96 machines.

The US Navy bombes used drums for the Enigma rotors in much the same way as the British bombes. They had eight Enigma-equivalents on the front and eight on the back. The fast drum rotated at 1,725 rpm, 34 times the speed of the early British bombes. 'Stops' were detected electronically using thermionic valves (vacuum tubes)mostly thyratrons for the high-speed circuits. When a 'stop' was found [64] the machine over-ran as it slowed, reversed to the position found and printed it out before restarting. The running time for a 4-rotor run was about 20 minutes, and for a 3-rotor run, about 50 seconds. [65] Each machine was 10 feet (3.0 m) wide, 7 feet (2.1 m) high, 2 feet (0.61 m) deep and weighed 2.5 tons.

The first machine was completed and tested on 3 May 1943. By 22 June, the first two machines, called 'Adam' and 'Eve' broke a particularly difficult German naval cipher, the Offizier settings for 9 and 10 June. [66] A P Mahon, who had joined the Naval Section in Hut 8 in 1941, reported in his official 1945 "History of Hut Eight 1939-1945":

The American bombe was in its essentials the same as the English bombe though it functioned rather better as they were not handicapped by having to make it, as Keen was forced to do owing to production difficulties, on the framework of a 3 wheel machine. By late autumn [1943] new American machines were coming into action at the rate of about 2 a week, the ultimate total being in the region of 125. [67]

These bombes were faster, and soon more available, than the British bombes at Bletchley Park and its outstations. Consequently, they were put to use for Hut 6 as well as Hut 8 work. [68] In Alexander's "Cryptographic History of Work on German Naval Enigma", he wrote as follows.

When the Americans began to turn out bombes in large numbers there was a constant interchange of signal - cribs, keys, message texts, cryptographic chat and so on. This all went by cable being first encyphered on the combined Anglo-American cypher machine, C.C.M. Most of the cribs being of operational urgency rapid and efficient communication was essential and a high standard was reached on this; an emergency priority signal consisting of a long crib with crib and message text repeated as a safeguard against corruption would take under an hour from the time we began to write the signal out in Hut 8 to the completion of its decyphering in Op. 20 G. As a result of this we were able to use the Op. 20 G bombes almost as conveniently as if they had been at one of our outstations 20 or 30 miles away. [69] Ch. VIII para. 11

Production was stopped in September 1944 after 121 bombes had been made. [65] The last-manufactured US Navy bombe is on display at the US National Cryptologic Museum. Jack Ingram, former Curator of the museum, describes being told of the existence of a second bombe and searching for it but not finding it whole. Whether it remains in storage in pieces, waiting to be discovered, or no longer exists, is unknown.

### US Army Bombe

The US Army Bombe was physically very different from the British and US Navy bombes. A contract was signed with Bell Labs on 30 September 1942. [70] The machine was designed to analyse 3-rotor, not 4-rotor traffic. It was known as "003" or "Madame X". [71] [72] It did not use drums to represent the Enigma rotors, using instead telephone-type relays. It could, however, handle one problem that the bombes with drums could not. [65] [68] The set of ten bombes consisted of a total of 144 Enigma-equivalents, each mounted on a rack approximately 7 feet (2.1 m) long 8 feet (2.4 m) high and 6 inches (150 mm) wide. There were 12 control stations which could allocate any of the Enigma-equivalents into the desired configuration by means of plugboards. Rotor order changes did not require the mechanical process of changing drums, but was achieved in about half a minute by means of push buttons. [64] A 3-rotor run took about 10 minutes. [65]

## Bombe rebuild

In 1994 a group led by John Harper of the BCS Computer Conservation Society started a project to build a working replica of a bombe. [73] The project required detailed research, and took 13 years of effort before the replica was completed, which was then put on display at the Bletchley Park museum. In March 2009 it won an Engineering Heritage Award. [74] The Bombe rebuild was relocated to The National Museum of Computing on Bletchley Park in May 2018 [75] , the new gallery officially re-opening on the 23rd of June 2018 [76]

## Notes

1. Welchman 2005, pp. 138–145.
2. Wilcox 2001, p. 33.
3. Smith 2007, p. 60.
4. Welchman 2005, p. 77.
5. John Fitzgerald, Peter Gorm Larsen, Paul Mukherjee, Nico Plat, Marcel Verhoef (6 December 2005). Validated Designs for Object-oriented Systems. ISBN   9781846281075.CS1 maint: Multiple names: authors list (link)
6. Simon Singh (26 January 2011). The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. ISBN   9780307787842.
7. Budiansky 2000, p. 195.
8. Sebag-Montefiore 2004, p. 375.
9. Carter, p. 1.
10. Kahn 1991 , p. 40 states that early Enigma used 3 rotors in the machine, but 5 rotors were available. That would produce about 1 million possible starting positions. Instead of 26 positions, the early naval Enigma had 29 because it included 3 characters with umlauts.
11. Kahn 1991 , p. 40 describes German concerns about superimposition attack.
12. Kahn (1991 , p. 43), stating, "In particular, it accepted the uncomfortable conclusions of a study by Lieutenant Henno Lucan, second radio officer of the battleship Elsass, that in neither physical nor cryptologic security did the Enigma meet modern requirements."
13. Budiansky 2000, pp. 238–242.
14. Sale, Tony, A quick revision of the Enigma machine, its physical and operational characteristics , retrieved 9 June 2011
15. Sale, Tony, "The Principle of the Enigma", The Enigma cipher machine , retrieved 4 February 2010
16. Sale, Tony, Military Use of the Enigma: The complexity of the Enigma machine , retrieved 4 January 2014
17. Mahon 1945, p. 24.
18. Welchman 2005, p. 120.
19. Sale, Tony, Virtual Wartime Bletchley Park: Alan Turing, the Enigma and the Bombe , retrieved 28 February 2010
20. Sale, Tony, The Turing/Welchman Bombe, Remember that the top, fast, drum on the Bombe corresponds to the slow left hand drum on the Enigma machine.
21. US Army 6812th Signal Security Detachment (1945), US 6812 Bombe Report (PDF), retrieved 4 February 2010
22. Carter, p. 4.
23. Sale, Tony, Virtual Wartime Bletchley Park: The Bombe and the Ringstellung problem , retrieved 30 June 2011
24. Carter, p. 3.
25. Ellsbury 1988, Ch. 2 Description of the Bombe.
26. Wilcox 2001, p. 12.
27. Ellsbury 1988, Ch. 4 How the Bombe Worked.
28. Alexander c. 1945, Ch. I para. 44.
29. Hinsley, Ransom & Knight 1988, p. 954.
30. Kahn 1991, p. 116117.
31. Erskine, Ralph. "Allied Breaking of Naval Enigma". uboat.net. Retrieved 6 February 2017.
32. Kahn 1991, pp. 117118.
33. "Outstations - A Brief History", Bletchley Park Jewels , retrieved 1 May 2010
34. Winterbotham 2001, p. 15.
35. Mary Stewart, 'Bombe' Operator, interviewed in "The Men Who Cracked Enigma", UKTV History Channel documentary series "Heroes of World War II", 2003
36. "Outstations from the Park", Bletchley Park Jewels , retrieved 16 April 2010
37. Toms, Susan (2005), Enigma and the Eastcote connection, archived from the original on 4 December 2008, retrieved 16 April 2010
38. Welchman 2005, pp. 139, 141.
39. Budiansky 2000, pp. 359–360.
40. Harper, John, ed. (2007), "Bombe Types", The British Bombe CANTAB
41. Copeland, B. Jack, ed. (2006), Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, p. 285, ISBN   978-0-19-284055-4
42. Harper, John, ed. (2007), "Definitiions", The British Bombe CANTAB
43. Alexander c. 1945, Ch. V para. 3.
44. Welchman 2005 , p. 147
45. Smith 2007, p. 206.
46. Smith 2014, p. 213.
47. Smith 2014, pp. 213–214.
48. Budiansky 2000, p. 87.
49. Budiansky 2000, p. 176.
50. Budiansky 2000, p. 179.
51. Jacobsen, Philip H. (2000), British provision of German naval Enigma information, archived from the original on 11 July 2011, retrieved 26 March 2010
52. Smith 2007, p. 134.
53. DeBrosse & Burke 2004, p. 74.
54. Wilcox 2001, p. 21.
55. DeBrosse, Jim (2015), Film snubs Ohioans' role breaking Enigma, Cincinnati.com: part of the USA Today network
56. Erskine, Ralph (Summer 1999), "The Holden Agreement on Naval Sigint: The First BRUSA?", Intelligence and National Security, 14 (2): 187–197, doi:10.1080/02684529908432545
57. Turing, Alan (c. 1941), "Memorandum to OP-20-G on Naval Enigma", in Copeland, B. Jack, The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma, Oxford: Oxford University Press, pp. 341–352, ISBN   0-19-825080-0
58. Copeland, B. Jack (2012), Turing: Pioneer of the Information Age, Oxford: Oxford University Press, pp. 81–84, ISBN   978-0-19-963979-3
59. Wenger 1945, p. 51.
60. Wenger 1945, p. 52.
61. Budiansky 2000, pp. 294–295.
62. Mahon 1945, p. 89.
63. Welchman 2005, p. 135.
64. Sebag-Montefiore 2004, p. 254.
65. Farley 1990, p. 12.
66. Burke 2002, p. 136.
67. "The Bombe tops engineers' poll". Computer Conservation Society . Retrieved 6 February 2017.
68. British Computer Society (2009), BCS bombe team receives award (published 31 March 2009), retrieved 2009-05-22
69. "The Bombe arrives". The National Museum of Computing. 2018-05-01. Retrieved 2018-06-22.
70. "Bombe Gallery opens 23 June". The National Museum of Computing. 2018-06-07. Retrieved 2018-06-22.

## Related Research Articles

Colossus was a set of computers developed by British codebreakers in the years 1943–1945 to help in the cryptanalysis of the Lorenz cipher. Colossus used thermionic valves to perform Boolean and counting operations. Colossus is thus regarded as the world's first programmable, electronic, digital computer, although it was programmed by switches and plugs and not by a stored program.

The Enigma machines are a series of electro-mechanical rotor cipher machines, mainly developed and used in the early- to mid-20th century to protect commercial, diplomatic and military communication. Enigma was invented by the German engineer Arthur Scherbius at the end of World War I. Early models were used commercially from the early 1920s, and adopted by military and government services of several countries, most notably Nazi Germany before and during World War II. Several different Enigma models were produced, but the German military models, having a plugboard, were the most complex. Japanese and Italian models were also in use.

Ultra was the designation adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the Government Code and Cypher School (GC&CS) at Bletchley Park. Ultra eventually became the standard designation among the western Allies for all such intelligence. The name arose because the intelligence thus obtained was considered more important than that designated by the highest British security classification then used and so was regarded as being Ultra secret. Several other cryptonyms had been used for such intelligence.

In the history of cryptography, the ECM Mark II was a cipher machine used by the United States for message encryption from World War II until the 1950s. The machine was also known as the SIGABA or Converter M-134 by the Army, or CSP-888/889 by the Navy, and a modified Navy version was termed the CSP-2900.

The known-plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has access to both the plaintext, and its encrypted version (ciphertext). These can be used to reveal further secret information such as secret keys and code books. The term "crib" originated at Bletchley Park, the British World War II decryption operation.

Cryptanalysis of the Enigma ciphering system enabled the western Allies in World War II to read substantial amounts of Morse-coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from other decrypted Axis radio and teleprinter transmissions, was given the codename Ultra. This was considered by western Supreme Allied Commander Dwight D. Eisenhower to have been "decisive" to the Allied victory.

The method of Zygalski sheets was a cryptologic technique used by the Polish Cipher Bureau before and during World War II, and during the war also by British cryptologists at Bletchley Park, to decrypt messages enciphered on German Enigma machines.

Harold Hall "Doc" Keen (1894–1973) was a British engineer who produced the engineering design, and oversaw the construction of, the British bombe, a codebreaking machine used in World War II to read German messages sent using the Enigma machine. He was known as "Doc" Keen because of his habit of carrying tools and paperwork in a case resembling a doctor's bag. After the war he was awarded the O.B.E..

Banburismus was a cryptanalytic process developed by Alan Turing at Bletchley Park in Britain during the Second World War. It was used by Bletchley Park's Hut 8 to help break German Kriegsmarine (naval) messages enciphered on Enigma machines. The process used sequential conditional probability to infer information about the likely settings of the Enigma machine. It gave rise to Turing's invention of the ban as a measure of the weight of evidence in favour of a hypothesis. This concept was later applied in Turingery and all the other methods used for breaking the Lorenz cipher.

William Gordon Welchman was an English mathematician, university professor, Second World War codebreaker at Bletchley Park and author. After the war he moved to the US, and later took American citizenship.

The cyclometer was a cryptologic device designed, "probably in 1934 or 1935," by Marian Rejewski of the Polish Cipher Bureau's German section (BS-4) to facilitate decryption of German Enigma ciphertext.

In cryptography, the clock was a method devised by Polish mathematician-cryptologist Jerzy Różycki, at the Polish General Staff's Cipher Bureau, to facilitate decrypting German Enigma ciphers. The method determined the rightmost rotor in the German Enigma by exploiting the different turnover positions. For the Poles, learning the rightmost rotor reduced the rotor-order search space by a factor of 3. The British improved the method, and it allowed them to use their limited number of bombes more effectively.

John William Jamieson Herivel was a British science historian and former World War II codebreaker at Bletchley Park.

Turingery or Turing's Method was a hand codebreaking method devised in July 1942 by the mathematician and cryptanalyst Alan Turing at the British Government Code and Cypher School at Bletchley Park during World War II. It was for use in cryptanalysis of the Lorenz cipher produced by the SZ40 and SZ42 teleprinter rotor stream cipher machines, one of the Germans' Geheimschreiber machines. The British codenamed non-Morse traffic "Fish", and that from this machine "Tunny".

The Short Weather Cipher, also known as the weather short signal book, was a cipher, presented as a codebook, that was used by the radio telegraphists aboard U-boats of the German Navy (Kriegsmarine) during World War II. It was used to condense weather reports into a short 7-letter message, which was enciphered by using the naval Enigma and transmitted by radiomen to intercept stations on shore, where it was deciphered by Enigma and the 7-letter weather report was reconstructed.

Wahlwort is a cryptographic term used particularly in connection with the Wehrmacht, which used wahlworts on their Enigma rotor machine in the encryption of their communication in World War II. The term describes a randomly selected word which was inserted at the beginning or end of the radiogram plaintext. The wahlwort was intended to hinder the enemy’s cryptanalysis and prevent the decryption of the ciphertext.