• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Tom Clarke RM Coursework Assignment 1: Bletchley Park

Extracts from this document...

Introduction

Tom Clarke RM Coursework Assignment 1: Bletchley Park Why was Bletchley Park able to break the German Enigma codes? Bletchley Park was able to break the German enigma code firstly because the Polish had a spy in the German Army, who provided secret documents describing the keys, settings and instructions for use. This information was used by the Polish to construct a replica enigma machine, and just before Germany invaded Poland in 1939, they gave the British and French a model enigma machine. Secondly, the German operators made it much easier to crack the code because they believed the enigma machine to be unbreakable. So often they did not use the code book and correct procedure to set the machine, instead they used the simpler and quicker way by sending a repeated message allowing the other operators ...read more.

Middle

When he returned to Bletchley Park, he was successful in breaking one of the encoded messages this was due to a German operator not following the rulebook. John Herivel a mathematician tried to put himself in the position of a German operator and thought the operators would not be careful when setting the code in the morning, he thought what if the operators did not bother to reset their machines and the message they sent would not be random. Disappointingly, his idea did not work because their was not enough messages to make use of, but after the German invasion of Denmark and Norway the number of messages increased this made them more likely to find a messages the same. ...read more.

Conclusion

In December 1941, Bletchley Park found out that the German navy did not know that the three-wheeled enigma machine had been cracked and were just trying to make the system more secure by using the four-wheeled machine. The u-boats had the new four-wheeled machine but the shore bases and supply depots did not so they could still break the code. After the battle of the Atlantic had been won Bletchley Park took on the challenge of breaking the code called fish, the code Hitler used to send messages when the code breakers attempted to crack they face the problem of not knowing what the machine looked like, but after two months of hard work they worked this out and made replica of one. This allowed the Bletchley Park to read the messages sent from Berlin to the commander of the German forces. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Computer systems assignment 1

    So far Windows XP was the best system that came out rated by many customers, but that could change with release of Windows 7. Screenshot of a desktop on Windows XP professional- Linux - Linux operating system was designed as open source free software.

  2. Database Coursework – George Youngs Coaches.

    They also need a record of the coaches they keep. This will be linked in with the other databases so they know which coach is doing what and when. Details such as bus registration, bus driver, number of seats and MOT, and tax dates.

  1. supermarket database-computer coursework

    Information can be transferred immediately computer can do most of the jobs. Less workers are employed Old system Computer system Space needed to keep the records more Much less Back up Very difficult Very easy error High possibility Low possibility Search data Very complicated Very convenient mail Slow and expensive

  2. Smart Card System

    When triggered, lock-and-key reconfigures the interface's existing IP access list to permit designated users to reach their designated host(s). Afterwards, lock-and-key reconfigures the interface back to its original state. For a user to gain access to a host through a router with lock-and-key configured, the user must first Telnet to the router.

  1. Why was Bletchley Park able to break the German Enigma codes?

    The last challenge that Bletchley Park faced was that of the code 'fish' Hitler's personal code. To figure out the code, code breakers used the methods that they had used on enigma two years before.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Using a program like Access would mean that it would be fairly simple to produce report outputs for the client using built a built in feature like mail merge. Other features and advantages of using a database over the current system include, * Graphical analysis of statistics * Queries to

  1. Definition-nature of the problem solved - Car Mechanic business

    Q: Would you or your employees need training to use a new computerised system? Some of the people I hire are pretty accustomed to computer systems but for me and especially my wife we would probably need a short introduction into what does what.

  2. Information technology coursework

    The CPU processes information by fetching a program instruction stored in the computer's memory, executing the instruction and proceeding to the next step in the program. The CPU contains (1) a program counter that tells the CPU where it is in the program.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work