swell是什么牌子| 心肌炎是什么症状| 包皮什么年龄割最好| 热得直什么| 4个月念什么字| 尔尔是什么意思| 贵妇是什么意思| 吃灵芝有什么好处| 刻薄是什么意思| 水是什么生肖| 眼睛肿疼是什么原因引起的| 慢性心肌炎有什么症状| 来月经小腹痛是什么原因| 母亲节要送什么礼物| 传统是什么意思| 流鼻血是什么原因| 婴幼儿吃什么奶粉好| 什么叫疝气| pt950是什么材质| 让球是什么意思| 乘风破浪什么意思| 港币长什么样| 颈椎应该挂什么科| 中耳炎去药店买什么药| 肾阳虚是什么意思| 什么什么的田野| 什么奶粉比较好| 什么样的包皮需要做手术| 长智齿说明了什么原因| 离宅是什么意思| 63岁属什么生肖| 甲抗是什么原因引起的| 霉菌性炎症用什么药效果最好| 先下手为强是什么意思| 多愁善感的动物是什么生肖| 心脏大是什么原因| 濯清涟而不妖的濯是什么意思| 粘胶纤维是什么面料| 乳腺纤维瘤和乳腺结节有什么区别| 早上屁多是什么原因造成的| 阴阳两虚吃什么食物| 气血不足吃什么好| 六月二十九日是什么星座| 伤口增生是什么原因造成的| 胎儿胆囊偏大有什么影响| 脑供血不足吃什么药好| 经常放响屁是什么原因| 属蛇适合佩戴什么饰品| 脂肪是什么颜色| 年上年下是什么意思| 总恶心是什么原因| 尿酸检查什么项目| ck是什么| 雪燕是什么东西| lino是什么面料| 辛弃疾字什么| 星星为什么会眨眼睛| 油菜花是什么颜色| 广东有什么烟| 什么食物可以降血糖| 脸色暗沉发黑什么原因| 肺与大肠相表里是什么意思| 阴道润滑剂什么牌子好| 头脑简单是什么生肖| 狡黠什么意思| 勃艮第红是什么颜色| 肺气肿有什么症状| 西瓜禁忌和什么一起吃| 大公鸡是什么牌子| acth是什么激素| 胃烧心吃什么食物好| 喝蒲公英根有什么好处| 愚孝什么意思| 普乐安片治什么病| 耳机戴久了有什么危害| 紧张吃什么药| 化妆水是干什么用的| 五月掉床有什么说法| 什么食物对眼睛视力好| 什么气组词| d是什么单位| 晚上吃什么有助于睡眠| 两边白头发多是什么原因造成的| 缓刑什么意思| 1号来月经什么时候是排卵期| 什么是肌酐| 推介会是什么意思| 欲盖弥彰是什么意思| 人心惶惶是什么意思| 儿童感冒吃什么药| 为什么现在| 小孩子发烧吃什么药| 什么导航好用又准确| 夏天哈尔滨有什么好玩的地方| 晨起嘴苦是什么原因| 今天穿什么| 纽带是什么意思| 百香果是什么季节的| 夏天脚底出汗是什么原因| 兔子怕什么| 梦见西红柿是什么预兆| 处cp是什么意思| 一个月大的小狗吃什么| 一阵什么| ppi是什么药| 马蜂吃什么| 收尾是什么意思| 吃茶叶蛋有什么好处和坏处| sss是什么意思| 穿刺是什么手术| 筋膜提升术是什么| 什么是肉刺图片大全| cac是什么意思| 冬天喝什么茶| 春茶是什么茶| 劳您费心了什么意思| 血栓弹力图是查什么的| 淋球菌培养是检查什么| 乱花渐欲迷人眼是什么意思| 96年出生的属什么| 为什么医生说直肠炎不用吃药| 梦见佛像是什么意思| 兆是什么意思| 图片px是什么意思| 芭乐是什么| 什么是寓言故事| 左肾轻度积水是什么意思| 吃什么尿酸高| 17年是什么年| 副镇长是什么级别| 蚂蚁代表什么风水| 鼻子出血挂什么科| 四肢厥逆是什么意思| 墙头草是什么意思| 严重失眠挂什么科| 胃疼适合吃什么食物| 一闪一闪的星星像什么| 腋毛上有白色附着物是什么| 武警和特警有什么区别| 男人肾虚吃什么最补| 胸腔疼痛挂什么科| 猫薄荷对猫有什么作用| 鹌鹑吃什么食物| 石女是什么样子的| 无花果叶子有什么功效| 过敏了吃什么药好| 高压和低压差值在什么范围正常| 出家人不打诳语是什么意思| 吃什么长内膜| 17数字代表什么意思| 疣是什么病毒| 陶渊明字什么| 刻舟求剑的寓意是什么| 棉花糖是什么做的| mpa是什么意思呀| 肚脐眼疼是什么原因| 偏光镜什么意思| 宫颈lsil是什么意思| 梦见和老公结婚是什么意思| 喝牛奶为什么拉肚子| 舌苔发黑是什么病的前兆| mu是什么单位| 汗水多吃什么药| 载体是什么意思| 脑门疼是什么原因| 咳嗽肺疼是什么原因| 酷暑的反义词是什么| 没腿毛的男人代表什么| 冷冻和冷藏有什么区别| 6月5号是什么星座| 你在纠结什么| 2017年是什么命| 液氨是什么| 过敏性哮喘吃什么药| 阴历六月十八是什么日子| 什么是总胆固醇| 小孩血糖高有什么症状| 眼角膜是什么| 马兰头是什么菜| 3月20号是什么星座| 大豆是什么| 狼吃什么| 结石挂什么科| 为什么新疆人长得像外国人| 睡觉总醒是什么原因| 电商五行属什么| 吃灵芝孢子粉有什么好处| 1989年属什么的| 处女什么意思| 审阅是什么意思| 打狂犬疫苗后注意什么| 九寨沟在什么地方| 为什么出汗特别多| ltp是什么意思| 老年人屁多是什么原因| 容易早醒是什么原因| 7.6是什么星座| 西林是什么药| 知了是什么| 自言自语是什么病| 为什么血脂会高| 46什么意思| dpo是什么意思| 炖乌鸡汤放什么配料| 脾胃虚是什么症状| 吃什么补充维生素b6| 喉咙发炎吃什么消炎药| 月经一直不干净吃什么药| acs是什么| 心脏彩超fs是什么意思| 什么牌子的洗发水好| 胆的作用和功能是什么| 六月十四号是什么星座| 层出不穷是什么意思| 鱼腥草不能和什么一起吃| 梦见棺材是什么征兆| 矿物质是什么| 牵连是什么意思| 阴茎长水泡是什么原因| 办香港通行证要准备什么材料| 睡莲什么时候开花| 黑白猫是什么品种| llbean是什么牌子| 小孩缺锌吃什么补的快| 拔完智齿第三天可以吃什么| 7月29日什么星座| 花圃是什么意思| 抗核抗体阳性对怀孕有什么影响| 950是什么金| 女装什么牌子好| 男孩学什么技术最好| 血压低容易得什么病| 桓是什么意思| 海底有什么生物| 徘徊什么意思| 橄榄绿是什么颜色| 头总是昏昏沉沉的是什么原因| 95年的属什么生肖| 什么的老虎| 什么是中国| 书字五行属什么的| 肾精亏虚吃什么药| 男孩什么时候开始发育| 胸腔积液是什么意思| 大腿肌肉酸痛是什么病| 11月10号是什么星座| 早搏是什么症状| lava是什么意思| 幼儿反复发烧是什么原因| 螨虫用什么药可以杀死它| 七月份有什么节日| 日常是什么意思| 糖吃多了有什么危害| 吃什么补黄体酮最快| 中药天龙又叫什么| 酮体是什么| 尚书是什么官| 肥达氏反应检查什么病| 七月三号是什么日子| 长期胃胀是什么原因| 为什么最迷人的最危险是什么歌| 岁月如歌下一句是什么| 大蒜不能和什么一起吃| 什么人容易得格林巴利| 百度

2017年云南省事业单位统考各地市公告汇总(实时更新

(Redirected from Lorenz SZ 40/42)
百度 一、研究意义胡主席深刻指出,战略管理是现代军事管理的枢纽。

The Lorenz SZ40, SZ42a and SZ42b were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz AG in Berlin. The model name SZ is derived from Schlüssel-Zusatz, meaning cipher attachment. The instruments implemented a Vernam stream cipher.

The Lorenz SZ42 machine with its covers removed. Bletchley Park museum

British cryptanalysts, who referred to encrypted German teleprinter traffic as Fish, dubbed the machine and its traffic Tunny (meaning tunafish) and deduced its logical structure three years before they saw such a machine.[1]

The SZ machines were in-line attachments to standard teleprinters. An experimental link using SZ40 machines was started in June 1941. The enhanced SZ42 machines were brought into substantial use from mid-1942 onwards for high-level communications between the German High Command in Wünsdorf close to Berlin, and Army Commands throughout occupied Europe.[2] The more advanced SZ42A came into routine use in February 1943 and the SZ42B in June 1944.[3]

Radioteletype (RTTY) rather than land-line circuits was used for this traffic.[4] These audio frequency shift keying non-Morse (NoMo) messages were picked up by Britain's Y-stations at Knockholt in Kent, its outstation at Higher Wincombe[5] in Wiltshire, and at Denmark Hill in south London, and forwarded to the Government Code and Cypher School at Bletchley Park (BP). Some were deciphered using hand methods before the process was partially automated, first with Robinson machines and then with the Colossus computers.[6] The deciphered Lorenz messages made one of the most significant contributions to British Ultra military intelligence and to Allied victory in Europe, due to the high-level strategic nature of the information that was gained from Lorenz decrypts.[7]

History

edit

After the Second World War, a group of British and US cryptanalysts entered Germany with the front-line troops to capture the documents, technology and personnel of the various German signal intelligence organizations before these secrets could be destroyed, looted, or captured by the Soviets. They were called the Target Intelligence Committee: TICOM.[8][9]

From captured German cryptographers Drs Huttenhain and Fricke they learnt of the development of the SZ40 and SZ42 a/b.[10] The design was for a machine that could be attached to any teleprinter. The first machine was referred to as the SZ40 (old type) which had ten rotors with fixed cams. It was recognised that the security of this machine was not great. The definitive SZ40 had twelve rotors with movable cams. The rightmost five rotors were called Spaltenc?sar but named the Chi wheels by Bill Tutte. The leftmost five were named Springc?sar, Psi wheels to Tutte. The middle two Vorgeleger rotors were called Mu or motor wheels by Tutte.

The five data bits of each ITA2-coded telegraph character were processed first by the five chi wheels and then further processed by the five psi wheels. The cams on the wheels reversed the value of a bit if in the raised position, but left it unchanged if in the lowered position.

Vernam cipher

edit

Gilbert Vernam was an AT&T Bell Labs research engineer who, in 1917, invented a cipher system in which the plaintext bitstream is enciphered by combining it with a random or pseudorandom bitstream (the "keystream") to generate the ciphertext. This combination is done using the Boolean "exclusive or" (XOR) function, symbolised by ⊕.[11] This is represented by the following "truth table", where 1 represents "true" and 0 represents "false".

XOR truth table
Input A ⊕ B
A B
0 0 0
0 1 1
1 0 1
1 1 0

Other names for this function are: Not equal (NEQ), modulo 2 addition (without 'carry') and modulo 2 subtraction (without 'borrow').

Vernam's cipher is a symmetric-key algorithm, i.e. the same key is used both to encipher plaintext to produce the ciphertext and to decipher ciphertext to yield the original plaintext:

plaintext ⊕ key = ciphertext

and:

ciphertext ⊕ key = plaintext

This produces the essential reciprocity that allows the same machine with the same settings to be used for both encryption and decryption.

Vernam's idea was to use conventional telegraphy practice with a paper tape of the plaintext combined with a paper tape of the key. Each key tape would have been unique (a one-time tape), but generating and distributing such tapes presented considerable practical difficulties. In the 1920s four men in different countries invented rotor cipher machines to produce a key stream to act instead of a tape.[12] The 1940 Lorenz SZ40/42 was one of these.[13]

Operating Principle

edit

The logical functioning of the Tunny system was worked out well before the Bletchley Park cryptanalysts saw one of the machines—which only happened in 1945, as Germany was surrendering to the Allies.[14]

?
The Lorenz SZ machines had 12 wheels each with a different number of cams (or "pins").
OKW/Chi
wheel name
A B C D E F G H I K L M
BP wheel
name[15]
ψ1 ψ2 ψ3 ψ4 ψ5 μ37 μ61 χ1 χ2 χ3 χ4 χ5
Number of
cams (pins)
43 47 51 53 59 37 61 41 31 29 26 23

The SZ machine served as an in-line attachment to a standard Lorenz teleprinter. It had a metal base 19?in ×?15.5?in (48?cm ×?39?cm) and was 17?in (43?cm) high.[13] The teleprinter characters consisted of five data bits (or "impulses"), encoded in the International Telegraphy Alphabet No. 2 (ITA2). The SZ machine generated a stream of pseudorandom characters as the key that was combined with the plaintext input characters to form the ciphertext output characters. The combination was by means of the XOR (or modulo 2 addition) process.[16]

The key stream consisted of two component parts that were XOR-ed together. These were generated by two sets of five wheels which rotated together. The Bletchley Park cryptanalyst Bill Tutte called these the χ ("chi") wheels, and the ψ ("psi") wheels. Each wheel had a series of cams (or "pins") around their circumference. These cams could be set in a raised (active) or lowered (inactive) position. In the raised position they generated a '1' which reversed the value of a bit, in the lowered position they generated a '0' which left the bit unchanged.[17] The number of cams on each wheel equalled the number of impulses needed to cause them to complete a full rotation. These numbers are all co-prime with each other, giving the longest possible time before the pattern repeated. This is the product of the number of positions of the wheels. For the set of χ wheels it was 41 × 31 × 29 × 26 × 23 = 22,041,682 and for the ψ wheels it was 43 × 47 × 51 × 53 × 59 = 322,303,017. The number of different ways that all twelve wheels could be set was 1.603×1019 i.e. 16 billion billion.

The set of five χ wheels all moved on one position after each character had been enciphered. The five ψ wheels, however, advanced intermittently. Their movement was controlled by the two μ ("mu") or "motor" wheels in series.[18] The SZ40 μ61 motor wheel stepped every time but the μ37 motor wheel stepped only if the first motor wheel was a '1'. The ψ wheels then stepped only if the second motor wheel was a '1'.[19] The SZ42A and SZ42B models added additional complexity to this mechanism, known at Bletchley Park as Limitations. Two of the four different limitations involved characteristics of the plaintext and so were autoclaves.[20]

The key stream generated by the SZ machines thus had a χ component and a ψ component. Symbolically, the key that was combined with the plaintext for enciphering and with the ciphertext for deciphering, can be represented as follows.[18]

key = χ-key ⊕ ψ-key

However to indicate that the ψ component often did not change from character to character, the term extended psi was used, symbolised as: Ψ'. So enciphering can be shown symbolically as:

plaintext ⊕ χ-stream ⊕ ψ'-stream = ciphertext

and deciphering as:

ciphertext ⊕ χ-stream ⊕ ψ'-stream = plaintext.

Operation

edit
?
Cams on wheels 9 and 10 showing their raised (active) and lowered (inactive) positions. An active cam reversed the value of a bit (0→1 and 1→0).

Each "Tunny" link had four SZ machines with a transmitting and a receiving teleprinter at each end. For enciphering and deciphering to work, the transmitting and receiving machines had to be set up identically. There were two components to this; setting the patterns of cams on the wheels and rotating the wheels for the start of enciphering a message. The cam settings were changed less frequently before summer 1944. The ψ wheel cams were initially only changed quarterly, but later monthly, the χ wheels were changed monthly but the motor wheel patterns were changed daily. From 1 August 1944, all wheel patterns were changed daily.[21]

Initially the wheel settings for a message were sent to the receiving end by means of a 12-letter indicator sent un-enciphered, the letters being associated with wheel positions in a book. In October 1942, this was changed to the use of a book of single-use settings in what was known as the QEP book. The last two digits of the QEP book entry were sent for the receiving operator to look up in his copy of the QEP book and set his machine's wheels. Each book contained one hundred or more combinations. Once all the combinations in a QEP book had been used it was replaced by a new one.[22] The message settings should never have been re-used, but on occasion they were, providing a "depth", which could be utilised by a cryptanalyst.[23]

As was normal telegraphy practice, messages of any length were keyed into a teleprinter with a paper tape perforator. The typical sequence of operations would be that the sending operator would punch up the message, make contact with the receiving operator, use the EIN / AUS switch on the SZ machine to connect it into the circuit, and then run the tape through the reader.[13] At the receiving end, the operator would similarly connect his SZ machine into the circuit and the output would be printed up on a continuous sticky tape. Because this was the practice, the plaintext did not contain the characters for "carriage return", "line feed" or the null (blank tape, 00000) character.[4]

Cryptanalysis

edit
?
A rebuilt British Tunny at The National Museum of Computing, Bletchley Park. It emulated the functions of the Lorenz SZ40/42, producing printed cleartext from ciphertext input.

British cryptographers at Bletchley Park had deduced the operation of the machine by January 1942 without ever having seen a Lorenz machine, a feat made possible thanks to mistakes made by German operators.

Interception

edit

Tunny traffic was known by Y Station operators used to listening to Morse code transmission as "new music". Its interception was originally concentrated at the Foreign Office Y Station operated by the Metropolitan Police at Denmark Hill in Camberwell, London. But due to lack of resources at this time (around 1941), it was given a low priority. A new Y Station, Knockholt in Kent, was later constructed specifically to intercept Tunny traffic so that the messages could be efficiently recorded and sent to Bletchley Park.[24] The head of Y station, Harold Kenworthy, moved to head up Knockholt. He was later promoted to head the Foreign Office Research and Development Establishment (F.O.R.D.E).

Code breaking

edit

On 30 August 1941, a message of some 4,000 characters was transmitted from Athens to Vienna. However, the message was not received correctly at the other end. The receiving operator then sent an uncoded request back to the sender asking for the message to be retransmitted. This let the codebreakers know what was happening.

The sender then retransmitted the message but, critically, did not change the key settings from the original "HQIBPEXEZMUG". This was a forbidden practice; using a different key for every different message is critical to any stream cipher's security. This would not have mattered had the two messages been identical, however the second time the operator made a number of small alterations to the message, such as using abbreviations, making the second message somewhat shorter.

From these two related ciphertexts, known to cryptanalysts as a depth, the veteran cryptanalyst Brigadier John Tiltman in the Research Section teased out the two plaintexts and hence the keystream. But even almost 4,000 characters of key was not enough for the team to figure out how the stream was being generated; it was just too complex and seemingly random.

After three months, the Research Section handed the task to mathematician Bill Tutte. He applied a technique that he had been taught in his cryptographic training, of writing out the key by hand and looking for repetitions. Tutte did this with the original teleprinter 5-bit International Telegraph Alphabet No. 2 (ITA2) (which was a development of the Baudot code (ITA1)), which led him to his initial breakthrough of recognising a 41-bit repetition.[14][25] Over the following two months up to January 1942, Tutte and colleagues worked out the complete logical structure of the cipher machine. This remarkable piece of reverse engineering was later described as "one of the greatest intellectual feats of World War II".[14]

After this cracking of Tunny, a special team of code breakers was set up under Ralph Tester, most initially transferred from Alan Turing's Hut 8. The team became known as the Testery. It performed the bulk of the subsequent work in breaking Tunny messages, but was aided by machines in the complementary section under Max Newman known as the Newmanry.[26]

Decryption machines

edit

Several complex machines were built by the British to aid the attack on Tunny. The first was the British Tunny.[27][28] This machine was designed by Bletchley Park, based on the reverse engineering work done by Tiltman's team in the Testery, to emulate the Lorenz Cipher Machine. When the pin wheel settings were found by the Testery, the Tunny machine was set up and run so that the messages could be printed.

A family of machines known as "Robinsons" were built for the Newmanry. These used two paper tapes, along with logic circuitry, to find the settings of the χ pin wheels of the Lorenz machine.[29] The Robinsons had major problems keeping the two paper tapes synchronized and were relatively slow, reading only 2,000 characters per second.

?
A team led by Tony Sale (right) reconstructed a Colossus (Mark II) at Bletchley Park. Here, in 2006, Sale supervises the breaking of an enciphered message with the completed machine.

The most important machine was the Colossus of which ten were in use by the war's end, the first becoming operational in December 1943. Although not fully programmable, they were far more efficient than their predecessors, representing advances in electronic digital computers. The Colossus computers were developed and built by Tommy Flowers, of the Dollis Hill Post Office Research Station, using algorithms developed by Bill Tutte and his team of mathematicians.[30] Colossus proved to be efficient and quick against the twelve-rotor Lorenz SZ42 on-line teleprinter cipher machine.

Some influential figures had doubts about his proposed design for the decryption machine, and Flowers proceeded with the project while partly funding it himself.[31][32] Like the later ENIAC of 1946, Colossus did not have a stored program, and was programmed through plugboards and jumper cables. It was faster, more reliable and more capable than the Robinsons, so speeding up the process of finding the Lorenz χ pin wheel settings. Since Colossus generated the putative keys electronically, it only had to read one tape. It did so with an optical reader which, at 5,000 characters per second, was driven much faster than the Robinsons' and meant that the tape travelled at almost 30 miles per hour (48?km/h).[33] This, and the clocking of the electronics from the optically read paper tape sprocket holes, completely eliminated the Robinsons' synchronisation problems. Bletchley Park management, which had been sceptical of Flowers's ability to make a workable device, immediately began pressuring him to construct another. After the end of the war, Colossus machines were dismantled on the orders of Winston Churchill,[34] but GCHQ retained two of them.[35]

Testery executives and Tunny codebreakers

edit
  • Ralph Tester: linguist and head of Testery
  • Jerry Roberts: shift-leader, linguist and senior codebreaker
  • Peter Ericsson: shift-leader, linguist and senior codebreaker
  • Victor Masters: shift-leader
  • Denis Oswald: linguist and senior codebreaker
  • Peter Hilton: codebreaker and mathematician
  • Peter Benenson: codebreaker
  • Peter Edgerley: codebreaker
  • John Christie: codebreaker
  • John Thompson: codebreaker
  • Roy Jenkins: codebreaker
  • Shaun Wylie: codebreaker
  • Tom Colvill: general manager

By the end of the war, the Testery had grown to nine cryptographers and 24 ATS girls (as the women serving that role were then called), with a total staff of 118, organised in three shifts working round the clock.

Surviving machines

edit
?
A Tunny (Lorenz) machine on display at the National Cryptologic Museum, Fort Meade, Maryland, USA

Lorenz cipher machines were built in small numbers; today only a handful survive in museums.

In Germany, examples may be seen at the Heinz Nixdorf MuseumsForum, a computer museum in Paderborn, and the Deutsches Museum, a science and technology museum in Munich.[36] Two further Lorenz machines are displayed at both Bletchley Park and The National Museum of Computing in the United Kingdom. Another example is on display at the National Cryptologic Museum in Maryland, the United States.

John Whetter and John Pether, volunteers with The National Museum of Computing, bought a Lorenz teleprinter on eBay for £9.50 that had been retrieved from a garden shed in Southend-on-Sea.[37][38] It was found to be the World War II military version, was refurbished and in May 2016 installed next to the SZ42 machine in the museum's "Tunny" gallery.

See also

edit

Notes

edit
  1. ^ Hinsley 1993, p.?141
  2. ^ Hinsley 1993, p.?142
  3. ^ Copeland 2006, pp.?38, 39, "The German Tunny Machine".
  4. ^ a b Good, Michie & Timms 1945, p.?4 of German Tunny
  5. ^ "The National Archives: The interception of German Teleprinter Communications at Foreign Office Station Knockholt - Piece details HW 50/79". Retrieved 2025-08-14.
  6. ^ Good 1993, pp.?160–165
  7. ^ "The History of the Lorenz Cipher and the Colossus Machine". Stanford University. Retrieved 2025-08-14.
  8. ^ Parrish 1986, p.?276.
  9. ^ Rezabek 2017, I Introduction: Origin of TICOM.
  10. ^ Huttenhain & Fricke 1945, pp.?16–19.
  11. ^ Klein, p.?2
  12. ^ Klein, p.?3
  13. ^ a b c Good, Michie & Timms 1945, p.?10 of German Tunny
  14. ^ a b c Sale, Tony, The Lorenz Cipher and how Bletchley Park broke it, retrieved 2025-08-14
  15. ^ Good, Michie & Timms 1945, 1 Introduction: 11 German Tunny, 11B The Tunny Cipher Machine, p. 6.
  16. ^ Good, Michie & Timms 1945, p.?6 of German Tunny
  17. ^ Churchhouse 2002, pp.?156, 157.
  18. ^ a b Good, Michie & Timms 1945, p.?7 of German Tunny
  19. ^ Roberts, Eric, The Lorenz Schluesselzusatz SZ40/42, Stanford University
  20. ^ Good, Michie & Timms 1945, p.?8 of German Tunny
  21. ^ Good, Michie & Timms 1945, p.?14 of German Tunny
  22. ^ Copeland 2006, p.?45, "The German Tunny Machine".
  23. ^ Churchhouse 2002, p.?34
  24. ^ Good, Michie & Timms 1945, p.?281 in Knockholt
  25. ^ Tutte 1998, pp.?356, 357
  26. ^ Roberts 2009
  27. ^ Halton 1993
  28. ^ Bletchley Park completes epic Tunny machine The Register, 26 May 2011, Accessed May 2011
  29. ^ Copeland 2006, p.?66, "Machine against Machine".
  30. ^ "Biography of Professor Tutte - Combinatorics and Optimization". 13 March 2015. Archived from the original on 2025-08-14. Retrieved 2025-08-14.
  31. ^ Boden, Margaret Ann (2006). Mind as Machine: A History of Cognitive Science. Oxford: Clarendon Press. p.?159. ISBN?9780199543168.
  32. ^ Atkinson, Paul (2010). Computer. UK: Reaktion Books. p.?29. ISBN?9781861897374.
  33. ^ Flowers 2006, p.?100
  34. ^ Verdict of Peace: Britain Between Her Yesterday and the future, Correlli Barnett, 2002
  35. ^ Copeland 2006, p.?173.
  36. ^ "Cryptology". Deutsches Museum. Retrieved 2025-08-14.
  37. ^ O'Connell, Paddy (29 May 2016). "Secret German WW2 Code Machine Found on eBay". Broadcasting House. BBC News. Retrieved 2025-08-14.
  38. ^ Gayle, Damien; Meikle, James (29 May 2016). "Device Used in Nazi Coding Machine Found for Sale on eBay". The Guardian. London. Retrieved 2025-08-14.

References

edit

Further reading

edit
edit
腰突然疼是什么原因 甚嚣尘上什么意思 微波炉什么牌子好 特性是什么意思 准备要孩子需要注意什么
丝绦是什么意思 dollars是什么意思 脱发严重应该去医院挂什么科 体积是什么 肾上腺挂什么科
与虎谋皮是什么意思 尿素测定是查什么 什么是鬼压床 樱菜是什么菜 身体出油多是什么原因
同人小说是什么 机滤是什么 脚转筋是什么原因引起的 皇帝菜是什么菜 血糖高的人应该吃什么食物最好
盆腔炎吃什么药有效hcv7jop6ns1r.cn 鱼的偏旁部首是什么hcv8jop7ns8r.cn 孕妇拉肚子是什么原因引起的hcv7jop9ns3r.cn 什么汤是清热去火的hcv8jop4ns8r.cn 慢性胰腺炎吃什么药效果最好hcv8jop1ns6r.cn
牙龈肿痛吃什么药hcv8jop9ns7r.cn 为什么会突然打嗝hcv7jop7ns2r.cn 不知不觉是什么意思hcv8jop9ns4r.cn 为什么夏天容易拉肚子aiwuzhiyu.com 57属什么生肖clwhiglsz.com
5.5号是什么星座hcv8jop9ns1r.cn 乔迁送什么花96micro.com 晚上八点到九点是什么时辰hcv8jop7ns2r.cn 2月25日是什么星座hcv9jop0ns1r.cn leu是什么氨基酸hcv9jop1ns4r.cn
迎春花像什么hcv8jop1ns8r.cn 什么非常什么写句子baiqunet.com 荣辱与共是什么生肖hcv9jop1ns0r.cn 娇韵诗属于什么档次hcv8jop8ns8r.cn 坚持是什么意思hcv9jop8ns0r.cn
百度