• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Why was BletchleyPark able to break the Enigma codes?

Extracts from this document...


Why was Bletchley Park able to break the Enigma codes? In 1940 the people at Bletchley Park broke the enigma code. Contributing to their success were six main points. They cracked the enigma code with the help of previous work that had been carried out by in November by Hans Thilo Schmidt who got his French spymasters, Rodolphe Lemoine and Gustave Bertrand, to photograph the enigma operating manuals, which Schmidt had 'borrowed' from a safe in the German Defense Ministry Cipher Office. In December 1932 the polish Cryptographer Marian Rejewski worked out the wiring for inside the Enigma cipher machine thanks to the documents supplied by Hans Thilo Schmidt. The Poles tell the French and British that they had already been monitoring the German messages and had built an enigma machine and were reading the messages and had been doing so between 1933 till 1938. They admit that they are not reading the Enigma messages anymore but it can be read again if the perforated sheets are produced. ...read more.


In March 1943 the code breakers manage to break into shark once again using the short signal codebook, which had been captured of U-559 on 30th of October 1942, to help them identify the cribs. The German high command made some very important mistakes during World War 2; these mistakes advanced the work being done at Bletchley Park a huge way. Between 3-21st of May 1940 the Germans analyzed the damage that was done by the disappearance of the Polares and decided that their codes were not likely to have been compromised, as there were only settings until 1st of June 1940 so they can reestablish cipher security after that. On 28 September the British submarine 'Clyde' attempts to ambush three U boats; when all three U-Boats escape, D�nitz (a German admiral) notes in his war diary that the most likely explanation is that the cipher has been compromised. Between 18-24 October the German Navy's Communications Service analyze the cipher system and declare that the code hasn't been compromised even due to the ambush in September. ...read more.


On 8-9 November 1942 the Polish cryptographers were evacuated from the code breaking centre after the invasion of North Africa as a German invasion of southern France is certain. On 12th of February 1943 Gustave Bertrand received a message form Antoni Palluth, who was one of the engineers that worked on the replica enigma machine, stating that he had been arrested by the Germans. Also on the 17th of February Rudolphe Lemoine, the French spymaster who knows about Hans Thilo Schmidt and the Enigma manuals, is arrested by the Germans in the south of France. On the 3rd of June 1944 Paul Paille , the French Counter Intelligence chief, Reads Bertrands report on how he escaped from the Germans and is asked by Sir Stewart Mezies, the head of British Secret Intelligence service, to interrogate Bertrand to discover if he told the Germans that the Allies had broken the enigma code because then he could also have told them about the Allied invasion, But it was concluded that Bertrand hadn't told the Germans anything, Bertrand is detained for a few day until the Allied invasion just in case. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Smart Card System

    In this study, the team has listed out the factors that need to be taken into serious consideration. All these factors are: * The end user who is going to use this system has the required technical expertise to handle it or not?

  2. Flexible Architectures in Communication Security Application

    We detail the design and implementation of the CryptoManiac processor and analyze its performance using architectural and physical design models. My research contribution to this work was the design, implementation, and evaluation of the CryptoManaic co-processor; this work was published in [42].

  1. Bar codes

    not be working due to technical problems and may give the wrong information or it may not be working at all. 5. The list that would be given to a student for his after school job would be on a handheld device so that he would walk round and find out what needs to be re-stocked.

  2. Stace & Dunphy (2001) identify five dilemmas of change

    Even cultural norms that dictate behaviour, opinions style and attitudes, etc., can be brought to the surface, discussed and altered by cultural change initiatives. Experience of corporate consulting work, has revealed it helpful to have all group members (generally in a cultural change workshop setting)

  1. The Enigma machine.

    Herival had an ingenious idea, his theory was that the German operators would not be too careful when they sent there first messages nor would they reset the machines and did not send random messages, he suggested that they would simply choose the three letters that they could see when the lid of the Enigma machine was closed.

  2. Bletchley Park

    The location also helped with secrecy. Question 2 The Germans believed the Enigma codes were unbreakable. This is understandable as it had 159, million, million, million possibilities. This why the Enigma was used to send messages by the German Army, Navy and Air force. The Enigma was invented in 1919.

  1. Describe the organisation and work of the people at Bletchley Park

    to break Enigma the Germans were tighten up their procedures even more so. This first wave of arrivals fell into two categories; the code breakers, these were mostly middle-aged academics from oxford and Cambridge universities and had often studied classics; the other category was administrative staff, mostly young girls between eighteen and twenty-two.

  2. The Von Neumann Machine

    � Flags register is used to record the effect of the last ALU operation � Instruction register is used to hold the instruction that is currently being executed. When an item of data is identified as an instruction, it is transferred to the IR prior to being decoded and executed.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work