World Library  
Flag as Inappropriate
Email this Article

Colossus computer

Colossus computer
A Colossus Mark 2 computer being operated by Dorothy Du Boisson (left) and Elsie Booker. The slanted control panel on the left was used to set the "pin" (or "cam") patterns of the Lorenz. The "bedstead" paper tape transport is on the right.
Developer Tommy Flowers assisted by Sidney Broadhurst, William Chandler and for the Mark 2 machines, Allen Coombs
Manufacturer Post Office Research Station
Type Special-purpose electronic digital programmable computer
Generation First-generation computer
Release date Mk 1: December 1943 (1943-12);
Mk 2: 1 June 1944 (1944-06-01)
Discontinued 8 June 1945 (1945-06-08)
Units shipped 11
Media Electric typewriter output
Programmed, using switches and plug panels
CPU Custom circuits using thermionic valves and Thyratrons. A total of 1600 in Mk 1 and 2400 in Mk 2. Also relays and stepping switches
Memory None (no RAM)
Display Indicator lamp panel
Input Paper tape of up to 20 000 × 5-bit characters in a continuous loop
Power 7.5 kW

Colossus was the name of a series of computers developed by British codebreakers in 1943-1945 to help in the cryptanalysis of the Lorenz cipher. Colossus used thermionic valves (vacuum tubes) and thyratrons to perform Boolean and counting operations. Colossus is thus regarded[1] as the world's first programmable, electronic, digital computer, although it was programmed by plugs and switches and not by a stored program.

Colossus was designed by the engineer Tommy Flowers to solve a problem posed by mathematician Max Newman at the Government Code and Cypher School (GC&CS) at Bletchley Park. Alan Turing's use of probability in cryptanalysis[2] contributed to its design. It has sometimes been erroneously stated that Turing designed Colossus to aid the cryptanalysis of the Enigma.[3] Turing's machine that helped decode Enigma was the electromechanical Bombe, not Colossus.[4]

The prototype, Colossus Mark 1, was shown to be working in December 1943 and was operational at Bletchley Park on 5 February 1944.[1] An improved Colossus Mark 2 that used shift registers to quintuple the processing speed, first worked on 1 June 1944, just in time for the Normandy Landings on D-Day.[5] Ten Colossi were in use by the end of the war and an eleventh was being commissioned.[5] Bletchley Park's use of these machines allowed the Allies to obtain a vast amount of high-level military intelligence from radiotelegraphy messages between the German High Command (OKW) and their army commands throughout occupied Europe.

The destruction of the Colossus hardware and blueprints, as part of the effort to maintain a project secrecy that was kept up into the 1970s, deprived most of those involved with Colossus of credit for their pioneering advancements in electronic digital computing during their lifetimes. A functioning replica of a Colossus computer was completed in 2007 and is on display at The National Museum of Computing at Bletchley Park.[6]


  • Purpose and origins 1
  • Decryption processes 2
  • Design and construction 3
  • Operation 4
  • Influence and fate 5
  • Reconstruction 6
  • Other meanings 7
  • See also 8
  • Footnotes 9
  • References 10
  • Further reading 11
  • External links 12

Purpose and origins

The Lorenz SZ machines had 12 wheels, each with a different number of cams (or "pins").
Wheel number 1 2 3 4 5 6 7 8 9 10 11 12
BP wheel name[7] \psi1 \psi2 \psi3 \psi4 \psi5 \mu37 \mu61 \chi1 \chi2 \chi3 \chi4 \chi5
Number of cams (pins) 43 47 51 53 59 37 61 41 31 29 26 23
Cams on wheels 9 and 10 showing their raised (active) and lowered (inactive) positions.

The Colossus computers were used to help decipher radio teleprinter messages that used had been encrypted using an unknown device. The British called encrypted German teleprinter traffic "Fish",[8] and the unknown machine and its intercepted messages "Tunny". Before the Germans increased the security of their operating procedures, British cryptanalysts diagnosed how the machine functioned and built a machine that emulated it, (British Tunny).

It was deduced that the machine had twelve wheels and used a Vernam ciphering technique on message characters in the standard 5-bit ITA2 code. It did this by combining the plaintext characters with a stream of key characters using the XOR Boolean function to produce the ciphertext.

In August 1941, an operating blunder led to the transmission of two versions of the same message with identical machine settings. These were intercepted and worked on at Bletchley Park. First, John Tiltman, a very talented GC&CS cryptanalyst derived a key stream of almost 4000 characters. Then Bill Tutte, a newly arrived member of the Research Section, used this key stream to work out the logical structure of the Lorenz machine. He deduced that the twelve wheels consisted of two groups of five, which he named the χ (chi) and ψ (psi) wheels, the remaining two he called μ (mu) or "motor" wheels. The chi wheels stepped regularly with each letter that was encrypted, while the psi wheels stepped irregularly, under the control of the motor wheels.[9]

With a truly random key stream, a Vernam cipher removes the natural language property of a plaintext message of having an uneven frequency distribution of the different characters, to produce a uniform distribution in the ciphertext. The Tunny machine worked well in this respect, but the cryptanalysts worked out that examining the character-to-character changes of character streams, instead of the frequency distribution of ciphertext characters, showed a departure from uniformity which provided a way into the system. This was achieved by "differencing" in which each bit or character was XOR-ed with its successor.[10] After Germany surrendered, allied forces captured a Tunny machine and discovered that it was the electromechanical Lorenz SZ (Schluesselzusatzgeraet) in-line cipher machine.[8]

In order to decrypt the transmitted messages, two tasks that had to be performed. The first was "wheel breaking", which was the discovery of the cam patterns for all the wheels. These patterns were set up on the Lorenz machine and then used for a fixed period of time for a succession of different messages. Each message was enciphered with a different start position of the wheels. Alan Turing invented a method of wheel-breaking that became known as Turingery.[1] Turing's technique was further developed into "Rectangling" for which Colossus could produce tables for manual analysis. Colossi 2, 4, 6, 7 and 9 had a "gadget" to aid this process.[11]

The second task was "wheel setting", which worked out the start positions of the wheels for a particular message, and could only be attempted once the cam patterns were known.[12] Colossus was initially designed to discover the start position of the chi wheels for a message, not for completely decrypting it. To do this it compared two character streams, counting statistics based on a succession of programmable Boolean functions. The ciphertext was read at high speed from a paper tape. The key stream was generated internally, in a simulation of the Lorenz machine.

Colossus also produced frequency counts of the characters in processed ciphertext, which were essential in checking the settings that had been found.[13]

Decryption processes

P plaintext
K key – the sequence of characters XOR'ed (added) to the plaintext to give the ciphertext
\chi chi component of key
\psi psi component of key
\psi' extended psi – the actual sequence of characters added by the psi wheels,
including those when they do not advance [15]
Z ciphertext
D de-chi—the ciphertext with the chi component of the key removed[14]
Δ any of the above XOR'ed with its successor character or bit[10]
the XOR operation[16][17]

By using differencing and knowing that the psi wheels did not advance with each character, Tutte worked out that trying just two differenced bits (impulses) of the chi-stream against the differenced ciphertext would produce a statistic that was non-random. This became known as Tutte's "1+2 break in".[18] It involved calculating the following function:

∆Z1 ⊕ ∆Z2 ⊕ ∆\chi1 ⊕ ∆\chi2 ⊕ ∆\psi1 ⊕ ∆\psi2

and counting the number of times it yielded "false" (zero). If this number exceeded a defined threshold value known as the "set total", it was printed out. The cryptanalyst would examine the printout to determine which of the putative start positions was most likely to be the correct one.[19] This technique could be applied to any pair of impulses, and so provided the basis of an automated iterative approach to obtaining the de-chi (D) of a ciphertext, from which the psi component could be removed by manual methods. If the frequency distribution of characters in the de-chi version of the ciphertext was within certain bounds, "wheel setting" of the chi wheels had been achieved,[13] and the message settings and de-chi could be passed to the "Testery". This was a section at Bletchley Park led by Major Ralph Tester where the bulk of the decrypting work was done by manual and linguistic methods.[20]

Design and construction

In 1994, a team led by Tony Sale (right) began a reconstruction of a Colossus at Bletchley Park. Here, in 2006, Sale supervises the breaking of an enciphered message with the completed machine.

Colossus was developed for the "[21] the section headed by the mathematician Max Newman that was responsible for machine methods against the Lorenz machine. The Colossus design arose out of a prior project that produced a counting machine dubbed "Heath Robinson". The main problems with Heath Robinson were the relative slowness of electro-mechanical parts and the difficulty of synchronising two paper tapes, one punched with the enciphered message, and the other representing the key stream of the Lorenz machine.[22] Heath Robinson tapes tended to stretch when being read, at some 2000 characters per second, resulting in unreliable answers.

Tommy Flowers was a senior electrical engineer at the Post Office Research Station at Dollis Hill who had been appointed MBE in June 1943. Prior to his work on Colossus, he had been involved with GC&CS at Bletchley Park from February 1941 in an attempt to improve the Bombes that were used in the Cryptanalysis of the German Enigma cipher machine.[23] He was recommended to Max Newman by Alan Turing who had been impressed by his work on the Bombes.[24] The main components of Colossus's predecessor, Heath Robinson were as follows.

Stepping switch from an original Colossus presented by the Director of GCHQ to the Director of the NSA to mark the 40th anniversary of the UKUSA Agreement in 1986[25]

Flowers had been brought in to design the Heath Robinson's combining unit.[26] He was not impressed by the system of a key tape that had to be kept synchronised with the message tape and, on his own initiative, he designed an electronic machine which eliminated the need for the key tape by having an electronic analogue of the Lorenz (Tunny) machine.[27] He presented this design to Max Newman in February 1943, but the idea that the one to two thousand thermionic valves (vacuum tubes and thyratrons) proposed, could work together reliably, was greeted with great scepticism,[28] so more Robinsons were ordered from Dollis Hill. Flowers, however, knew from his pre-war work that most thermionic valve failures occurred as a result of the thermal stresses at power up, so not powering a machine down reduced failure rates very substantially.[1] Flowers persisted with the idea and obtained support from the Director of the Research Station, W Gordon Radley.[1] Flowers and his team of some fifty people in the switching group[27][29] spent eleven months from early February 1943 designing and building a machine that dispensed with the second tape of the Heath Robinson, by generating the wheel patterns electronically.

This prototype, Mark 1 Colossus, performed satisfactorily at Dollis Hill on 8 December 1943[30] and was taken apart and shipped to Bletchley Park, where it was delivered on 18 January and re-assembled by Harry Fensom and Don Horwood.[31][32] It attacked its first message on 5 February 1944.[1] As it was a large structure it was quickly dubbed Colossus by the WRNS operators. This machine contained 1600 thermionic valves (tubes).[27] and was soon followed by an improved production Mark 2 machine.[33] Nine of this version of the machine were constructed, the first being commissioned on 1 June 1944, after which Allen Coombs took over leadership of Colossus production.[34] The original Mark 1 machine was converted into a Mark 2 and an eleventh Colossus was essentially finished when the war in Europe ended.

The main units of Flowers' design were as follows.[27]

  • A tape transport and photo-electric reading mechanism very similar to Heath Robinson's.
  • A coder and adder that simulated the Lorenz machine using thyratron rings.
  • A logic unit that performed Boolean operations.
  • A master control that contained the electronic counters.
  • A printer.

Most of the design of the electronics was the work of Tommy Flowers, assisted by William Chandler, with Sidney Broadhurst working on the auxiliary electromechanical parts.[29] The Mark 2 Colossus was designed while Mark 1 was being constructed. It contained 2400 valves and was both 5 times faster and simpler to operate than the original version.[35]

Flowers overcame the problem of synchronizing the electronics with the message tape by generating a clock signal from the reading of the sprocket holes of the message tape. The speed of operation was thus limited by the mechanics of reading the tape. The tape reader was tested up to 9700 characters per second (53 mph) before the tape disintegrated. So 5000 characters/second (40 ft/s (12.2 m/s; 27.3 mph)) was settled on as the speed for regular use.

The Mark 2 Colossus included the first ever use of what would now be called shift registers[27] one for each of the five channels of the punched tape. There were five parallel processing units each involving up to 100 Boolean operations – although in normal operation fewer channels were examined in most runs. This five-way parallelism[36] enabled five simultaneous tests and counts to be performed. For each circuit of the tape, the shift register stored successive bits from each of the tape channels and delivered five successive characters to the processors, giving an effective processing speed of 25,000 characters per second. [27]


Colossus used state-of-the-art vacuum tubes (thermionic valves), thyratrons and photomultipliers to optically read a paper tape and then applied programmable logical functions to the bits of the key and ciphertext characters, counting how often the function returned "false".

Colossus was designed to perform the task of "Wheel Setting", that is determining the start point of the stream of key characters in relation to the characters of the enciphered message on the paper tape loop. Initially it was only the χ (chi) wheels that were examined. To keep the size of the task manageable, only two bits of the chi-stream were examined in the first run,[37] then progressively the other bits.[38] Success at this stage allowed the production of a version of the ciphertext from which the chi component of the key had been removed, the so-called "de-chi". This transformation allowed manual methods to be used to work out the settings of the ψ (psi) and μ mu "motor" wheels.

Later, methods were devised for using Colossus to determine the settings of the psi wheels. All of this required that "wheel breaking", the discovery of the cam patterns for all the wheels, had been successfully achieved. Later Mark 2 Colossi were equipped with a special unit to achieve this as well. Programming Colossus was by setting switches and plugging appropriate units together. Sometimes, two or more Colossus computers tried different possibilities simultaneously in what is now called parallel computing, speeding the decoding process by perhaps as much as double the rate of comparison.

Influence and fate

Colossus was the first of the electronic digital machines with programmability, albeit limited by modern standards.[39]

  • It had no internally stored programs. To set it up for a new task, the operator had to set up plugs and switches to alter the wiring.
  • Colossus was not a general-purpose machine, being designed for a specific cryptanalytic task involving counting and Boolean operations.

A Colossus computer was thus not a fully general Konrad Zuse). The notion of a computer as a general purpose machine—that is, as more than a calculator devoted to solving difficult but specific problems—did not become prominent until after World War II.

Colossus was preceded by several computers, many of them first in some category. Atanasoff–Berry Computer was electronic and binary (digital) but not programmable. Assorted analog computers were semi-programmable; some of these much predated the 1930s (e.g., Vannevar Bush). Babbage's Analytical Engine design predated all these (in the mid-19th century), it was a decimal, programmable, entirely mechanical construction—but was only partially built and never functioned during Babbage's lifetime. Colossus was the first combining digital, (partially) programmable, and electronic. The first fully programmable digital electronic computer was the ENIAC which was completed in 1946.

The use to which the Colossus computers were put was of the highest secrecy, and the Colossus itself was highly secret, and remained so for many years after the War. Thus, it could not be included in the history of computing hardware for many years, and Flowers and his associates were deprived of the recognition they were due.

Being not widely known, Colossus had little direct influence on the development of later computers; it was EDVAC that was the early design which had the most influence on subsequent computer architecture. However, the technology of Colossus, and the knowledge that reliable high-speed electronic digital computing devices were feasible, did have a significant influence on the development of some early computers in the United Kingdom and probably in the US. A number of people who were associated with the project and knew all about Colossus played significant roles in early computer work in the UK. In 1972, Herman Goldstine wrote that:

Britain had such vitality that it could immediately after the war embark on so many well-conceived and well-executed projects in the computer field.[41]

In writing that, Goldstine was unaware of Colossus, and its legacy to those projects of people such as Alan Turing (with the Pilot ACE and ACE), and Max Newman and I. J. Good (with the Manchester Mark 1 and other early Manchester computers). Brian Randell later wrote that:

the COLOSSUS project was an important source of this vitality, one that has been largely unappreciated, as has the significance of its places in the chronology of the invention of the digital computer.[42]
Colossus documentation and hardware were classified from the moment of their creation and remained so after the War. Tommy Flowers was ordered to destroy all documentation and burnt them in a furnace at Dollis Hill. He later said of that order:
That was a terrible mistake. I was instructed to destroy all the records, which I did. I took all the drawings and the plans and all the information about Colossus on paper and put it in the boiler fire. And saw it burn.[43]
Some parts, sanitised as to their original use, were taken to Newman's Royal Society Computing Machine Laboratory at Manchester University.[44] Most of the Colossus computers were dismantled and parts returned to the Post Office. Two, along with two replica Tunny machines, were retained, moving to GCHQ's new headquarters at Eastcote in April 1946, and moving again with GCHQ to Cheltenham between 1952 and 1954.[45] One of the Colossi, known as Colossus Blue, was dismantled in 1959; the other in 1960.[45] There had been attempts to adapt them to other purposes, with varying success; in their later years they had been used for training.[46] Jack Good relates how he was the first to use it after the war, persuading the NSA that Colossus could be used to perform a function for which they were planning to build a special-purpose machine.[45] Colossus was also used to perform character counts on one-time pad tape to test for non-randomness.[45]

For nearly three decades after the war Colossus remained secret, long after any of its technical details were of any importance. The need for such secrecy ebbed away as communications moved to digital transmission and all-digital encryption systems became common in the 1960s. Information about Colossus began to emerge publicly in the 1970s, after the secrecy imposed was broken when Group Captain Winterbotham published his 1974 book The Ultra Secret. More recently, a 500-page technical report on the Tunny cipher and its cryptanalysis – entitled General Report on Tunny – was released by GCHQ to the national Public Record Office in October 2000; the complete report is available online,[47] and it contains a fascinating paean to Colossus by the cryptographers who worked with it:

It is regretted that it is not possible to give an adequate idea of the fascination of a Colossus at work; its sheer bulk and apparent complexity; the fantastic speed of thin paper tape round the glittering pulleys; the childish pleasure of not-not, span, print main header and other gadgets; the wizardry of purely mechanical decoding letter by letter (one novice thought she was being hoaxed); the uncanny action of the typewriter in printing the correct scores without and beyond human aid; the stepping of the display; periods of eager expectation culminating in the sudden appearance of the longed-for score; and the strange rhythms characterizing every type of run: the stately break-in, the erratic short run, the regularity of wheel-breaking, the stolid rectangle interrupted by the wild leaps of the carriage-return, the frantic chatter of a motor run, even the ludicrous frenzy of hosts of bogus scores.[48]


Front view of the Colossus rebuild showing, from right to left (1) The "bedstead" containing the message tape in its continuous loop and with a second one loaded. (2) The J-rack containing the master control panel and jack field. (3) The K-rack with the large "Q" switch panel and sloping patch panel. (4) The double S-rack containing relays and, above the image of a postage stamp, five two-line counter displays. (5) The electric typewriter in front of the five sets of four "set total" decade switches in the C-rack.[49]
Rear view of the two bays of the Colossus rebuild, showing many of the 2400 vacuum tubes and thyratrons used.

Construction of a fully functional replica[50][51] of a Colossus Mark 2 was undertaken by a team led by Tony Sale.[52] In spite of the blueprints and hardware being destroyed, a surprising amount of material survived, mainly in engineers' notebooks, but a considerable amount of it in the U.S. The optical tape reader might have posed the biggest problem, but Dr. Arnold Lynch, its original designer, was able to redesign it to his own original specification. The reconstruction is on display, in the historically correct place for Colossus No. 9, at The National Museum of Computing, in H Block Bletchley Park in Milton Keynes, Buckinghamshire.

In November 2007, to celebrate the project completion and to mark the start of a fundraising initiative for The National Museum of Computing, a Cipher Challenge[53] pitted the rebuilt Colossus against radio amateurs worldwide in being first to receive and decode three messages enciphered using the Lorenz SZ42 and transmitted from radio station DL0HNF in the Heinz Nixdorf MuseumsForum computer museum. The challenge was easily won by radio amateur Joachim Schüth, who had carefully prepared[54] for the event and developed his own signal processing and code-breaking code using Ada.[55] The Colossus team were hampered by their wish to use World War II radio equipment,[56] delaying them by a day because of poor reception conditions. Nevertheless, the victor's 1.4 GHz laptop, running his own code, took less than a minute to find the settings for all 12 wheels. The German codebreaker said: "My laptop digested ciphertext at a speed of 1.2 million characters per second—240 times faster than Colossus. If you scale the CPU frequency by that factor, you get an equivalent clock of 5.8 MHz for Colossus. That is a remarkable speed for a computer built in 1944."[57]

The Cipher Challenge verified the successful completion of the rebuild project. "On the strength of today's performance Colossus is as good as it was six decades ago", commented Tony Sale. "We are delighted to have produced a fitting tribute to the people who worked at Bletchley Park and whose brainpower devised these fantastic machines which broke these ciphers and shortened the war by many months."[58]

Other meanings

There was a fictional computer named Colossus in the 1970 movie Colossus: The Forbin Project. This was sheer coincidence as it pre-dates the public release of information about Colossus, or even its name.

Neal Stephenson's novel Cryptonomicon (1999) also contains a fictional treatment of the historical role played by Turing and Bletchley Park.

See also


  1. ^ a b c d e f Copeland 2006, Copeland, Jack, Introduction p. 2.
  2. ^ See Banburismus
  3. ^
  4. ^
  5. ^ a b Flowers 1983, p. 246.
  6. ^
  7. ^ Good, Michie & Timms 1945, 1 Introduction: 11 German Tunny, 11B The Tunny Cipher Machine, p. 6.
  8. ^ a b Good, Michie & Timms 1945, 1 Introduction: 11 German Tunny, 11A Fish Machines, (c) The German Ciphered Teleprinter, p. 4.
  9. ^ Copeland 2006, Tutte, William T. My Work at Bletchley Park p. 357.
  10. ^ a b Good, Michie & Timms 1945, 1 Introduction: 11 German Tunny, 11C Wheel Patterns, (b) Differenced and Undifferenced Wheels, p. 11.
  11. ^ Good, Michie & Timms 1945, 24 - Rectangling: 24B Making and Entering Rectangles pp. 114-115, 119-120.
  12. ^ Good, Michie & Timms 1945, 1 Introduction: 11 German Tunny, 11E The Tunny Network, (b) Wheel-breaking and Setting, p. 15.
  13. ^ a b Small 1944, p. 15.
  14. ^ a b Good, Michie & Timms 1945, 1 Introduction: 12 Cryptographic Aspects, 12A The Problem, (a) Formulae and Notation, p. 16.
  15. ^ Good, Michie & Timms 1945, 1 Introduction: 11 German Tunny, 11B The Tunny Cipher Machine, (e) Psi-key, p. 7.
  16. ^ The Boolean or "truth" function XOR, also known as Exclusive disjunction and Exclusive or, is the same as binary modulo 2 addition and subtraction
  17. ^ Good, Michie & Timms 1945, 1 Introduction: 11 German Tunny, 11B The Tunny Cipher Machine, (a) Addition, p. 5.
  18. ^ Copeland 2006, Budiansky, Stephen, Colossus, Codebreaking, and the Digital Age pp. 58–59.
  19. ^ Carter 2004, pp. 4–6.
  20. ^ Roberts 2009, 34 minutes in.
  21. ^ Good, Michie & Timms 1945, 3 Organisation: 31 Mr Newman's section, p. 276.
  22. ^ Anderson 2007, p. 8.
  23. ^ Randell 1980, p. 9.
  24. ^ Budiansky 2000, p. 314.
  25. ^ Exhibit in the National Cryptologic Museum, Fort Meade, Maryland, USA
  26. ^ Good, Michie & Timms 1945, 1 Introduction: 15 Some Historical Notes, 15A First Stages in Machine Development, (c) Heath Robinson, p. 33.
  27. ^ a b c d e f Copeland 2006, Flowers, Thomas H. Colossus p. 96.
  28. ^ Flowers 1983, p. 244.
  29. ^ a b Copeland 2006, Randell, Brian Of Men and Machines p. 143.
  30. ^ Copeland 2010.
  31. ^ The Colossus Rebuild
  32. ^ Fensom 2010.
  33. ^ Good, Michie & Timms 1945, 1 Introduction: 15 - Some Historical Notes, 15C Period of Expansion, (b) Colossus, p. 35.
  34. ^
  35. ^ For comparison, later stored-program computers such as the Manchester Mark 1 of 1949 used 4050 valves, while ENIAC (1946) used 17,468 valves.
  36. ^ This would now be called a systolic array
  37. ^ Small1944, p. 19.
  38. ^ Small 1944, p. 20.
  39. ^ A Brief History of Computing. Jack Copeland, June 2000
  40. ^
  41. ^ Goldstine 1980, p. 321.
  42. ^ Randell 1980, p. 87.
  43. ^ McKay 2010, pp. 270–271.
  44. ^
  45. ^ a b c d Copeland 2006, Copeland, Jack, et al. Mr Newman's section pp. 173–175.
  46. ^ Horwood 1973.
  47. ^ Good, Michie & Timms 1945.
  48. ^ Good, Michie & Timms 1945, 5 Machines
    51 Introductory, (j) Impressions of Colossus, p. 327.
  49. ^
  50. ^
  51. ^ Retrieved 30 October 2011
  52. ^
  53. ^
  54. ^
  55. ^
  56. ^
  57. ^
  58. ^


  • in Copeland 2006, pp. 52–63
  • in Erskine & Smith 2011, pp. 305–327
  • Updated and extended version of Action This Day: From Breaking of the Enigma Code to the Birth of the Modern Computer Bantam Press 2001
  • in Copeland 2006, pp. 297–303
  • That version is a facsimile copy, but there is a transcript of much of this document in '.pdf' format at: , and a web transcript of Part 1 at:
  • in Copeland 2006, pp. 141–149
  • describes the operation of Colossus in breaking Tunny messages
  • in Copeland 2006, pp. 352–369
  • in Copeland 2006, pp. 116–140

Further reading

  • A short film made by Google to celebrate Colossus and those who built it, in particular Tommy Flowers.
  • – A detailed description of the cryptanalysis of Tunny, and some details of Colossus (contains some minor errors)
  • – A guided tour of the history and geography of the Park, written by one of the founder members of the Bletchley Park Trust
  • – Comparison of the first computers, with a chapter about Colossus and its reconstruction by Tony Sale.
  • A slender (20 page) booklet, containing the same material as Tony Sale's website (see below)

External links

  • The National Museum of Computing
  • Tony Sale's Codes and Ciphers Contains a great deal of information, including:
    • Colossus, the revolution in code breaking
    • Lorenz Cipher and the Colossus
      • The machine age comes to Fish codebreaking
      • The Colossus Rebuild Project
      • The Colossus Rebuild Project: Evolving to the Colossus Mk 2
      • Walk around Colossus A detailed tour of the replica Colossus – make sure to click on the "More Text" links on each image to see the informative detailed text about that part of Colossus
    • IEEE lecture – Transcript of a lecture Tony Sale gave describing the reconstruction project
  • BBC news article reporting on the replica Colossus
  • BBC news article: "Colossus cracks codes once more"
  • BBC news article: BBC news article: "Bletchley's code-cracking Colossus" with video interviews 2010-02-02
  • Website on Copeland's 2006 book with much information and links to recently declassified information
  • Was the Manchester Baby conceived at Bletchley Park?
  • Walk through video of the Colossus rebuild at Bletchley Park on YouTube
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.