Hubbry Logo
Colossus computerColossus computerMain
Open search
Colossus computer
Community hub
Colossus computer
logo
8 pages, 0 posts
0 subscribers
Be the first to start a discussion here.
Be the first to start a discussion here.
Contribute something
Colossus computer
Colossus computer
from Wikipedia

Colossus computer
A Colossus Mark 2 computer being operated by Wrens.[a] The slanted control panel on the left was used to set the "pin" (or "cam") patterns of the Lorenz. The "bedstead" paper tape transport is on the right.
DeveloperTommy Flowers, assisted by Sidney Broadhurst, William Chandler and for the Mark 2 machines, Allen Coombs
ManufacturerPost Office Research Station
TypeSpecial-purpose electronic digital programmable computer
GenerationFirst-generation computer
Release date
  • Mk 1: December 1943 (1943-12)
  • Mk 2: 1 June 1944 (1944-06-01)
Discontinued1960
Units shipped12
Media
CPUCustom circuits using thermionic valves and thyratrons. A total of 1,600 in Mk 1 and 2,400 in Mk 2. Also relays and stepping switches
MemoryNone (no RAM)
DisplayIndicator lamp panel
InputPaper tape of up to 20,000 × 5-bit characters in a continuous loop
Power8.5 kW[b]

Colossus was a set of computers developed by British codebreakers in the years 1943–1945[1] to help in the cryptanalysis of the Lorenz cipher. Colossus used thermionic valves (vacuum tubes) to perform Boolean and counting operations. Colossus is regarded[2] as the world's first programmable, electronic, digital computer (the first electromechanical being Konrad Zuse's Z3 completed in Berlin in 1941), although it was programmed by switches and plugs and not by a stored program.[3]

Colossus was designed by General Post Office (GPO) research telephone engineer Tommy Flowers[1] based on plans developed by mathematician Max Newman at the Government Code and Cypher School at Bletchley Park.

Alan Turing's use of probability in cryptanalysis (see Banburismus) contributed to its design. It has sometimes been erroneously stated that Turing designed Colossus to aid the cryptanalysis of the Enigma.[4] (Turing's machine that helped decode Enigma was the electromechanical Bombe, not Colossus.)[5]

The prototype, Colossus Mark 1, was shown to be working in December 1943 and was in use at Bletchley Park by early 1944.[1] An improved Colossus Mark 2 that used shift registers to run five times faster first worked on 1 June 1944, just in time for the Normandy landings on D-Day.[6] Ten Colossi were in use by the end of the war and an eleventh was being commissioned.[6] Bletchley Park's use of these machines allowed the Allies to obtain a vast amount of high-level military intelligence from intercepted radiotelegraphy messages between the German High Command (OKW) and their army commands throughout occupied Europe.

The existence of the Colossus machines was kept secret until the mid-1970s.[7][8] All but two machines were dismantled into such small parts that their use could not be inferred. The two retained machines were eventually dismantled in the 1960s. In January 2024, new photos were released by GCHQ that showed re-engineered Colossus in a very different environment from the Bletchley Park buildings, presumably at GCHQ Cheltenham.[9] A functioning reconstruction of a Mark 2 Colossus was completed in 2008 by Tony Sale and a team of volunteers; it is on display in The National Museum of Computing at Bletchley Park.[10][11][12]

Purpose and origins

[edit]
A Lorenz SZ42 cipher machine with its covers removed at The National Museum of Computing on Bletchley Park
The Lorenz SZ machines had 12 wheels, each with a different number of cams (or "pins").
Wheel number 1 2 3 4 5 6 7 8 9 10 11 12
BP wheel name[13] ψ1 ψ2 ψ3 ψ4 ψ5 μ37 μ61 χ1 χ2 χ3 χ4 χ5
Number of cams (pins) 43 47 51 53 59 37 61 41 31 29 26 23

The Colossus computers were used to help decipher intercepted radio teleprinter messages that had been encrypted using an unknown device. Intelligence information revealed that the Germans called the wireless teleprinter transmission systems "Sägefisch" (sawfish). This led the British to call encrypted German teleprinter traffic "Fish",[14] and the unknown machine and its intercepted messages "Tunny" (tunafish).[15]

Before the Germans increased the security of their operating procedures, British cryptanalysts diagnosed how the unseen machine functioned and built an imitation of it called "British Tunny".[16]

It was deduced that the machine had twelve wheels and used a Vernam ciphering technique on message characters in the standard 5-bit ITA2 telegraph code. It did this by combining the plaintext characters with a stream of key characters using the XOR Boolean function to produce the ciphertext.[citation needed]

In August 1941, a blunder by German operators led to the transmission of two versions of the same message with identical machine settings. These were intercepted and worked on at Bletchley Park. First, John Tiltman, a very talented GC&CS cryptanalyst, derived a keystream of almost 4000 characters.[17] Then Bill Tutte, a newly arrived member of the Research Section, used this keystream to work out the logical structure of the Lorenz machine. He deduced that the twelve wheels consisted of two groups of five, which he named the χ (chi) and ψ (psi) wheels, the remaining two he called μ (mu) or "motor" wheels. The chi wheels stepped regularly with each letter that was encrypted, while the psi wheels stepped irregularly, under the control of the motor wheels.[18]

Cams on wheels 9 and 10 showing their raised (active) and lowered (inactive) positions. An active cam reversed the value of a bit (0→1 and 1→0).

With a sufficiently random keystream, a Vernam cipher removes the natural language property of a plaintext message of having an uneven frequency distribution of the different characters, to produce a uniform distribution in the ciphertext. The Tunny machine did this well. However, the cryptanalysts worked out that by examining the frequency distribution of the character-to-character changes in the ciphertext, instead of the plain characters, there was a departure from uniformity which provided a way into the system. This was achieved by "differencing" in which each bit or character was XOR-ed with its successor.[19] After Germany surrendered, allied forces captured a Tunny machine and discovered that it was the electromechanical Lorenz SZ (Schlüsselzusatzgerät, cipher attachment) in-line cipher machine.[14]

In order to decrypt the transmitted messages, two tasks had to be performed. The first was "wheel breaking", which was the discovery of the cam patterns for all the wheels. These patterns were set up on the Lorenz machine and then used for a fixed period of time for a succession of different messages. Each transmission, which often contained more than one message, was enciphered with a different start position of the wheels. Alan Turing invented a method of wheel-breaking that became known as Turingery.[20] Turing's technique was further developed into "Rectangling", for which Colossus could produce tables for manual analysis. Colossi 2, 4, 6, 7 and 9 had a "gadget" to aid this process.[21]

The second task was "wheel setting", which worked out the start positions of the wheels for a particular message and could only be attempted once the cam patterns were known.[22] It was this task for which Colossus was initially designed. To discover the start position of the chi wheels for a message, Colossus compared two character streams, counting statistics from the evaluation of programmable Boolean functions. The two streams were the ciphertext, which was read at high speed from a paper tape, and the keystream, which was generated internally, in a simulation of the unknown German machine. After a succession of different Colossus runs to discover the likely chi-wheel settings, they were checked by examining the frequency distribution of the characters in the processed ciphertext.[23] Colossus produced these frequency counts.

Decryption processes

[edit]
Notation[24]
plaintext
key – the sequence of characters used in binary XOR with
the plaintext to give the ciphertext
chi component of key
psi component of key
extended psi – the actual sequence of characters added by
the psi wheels, including those when they do not advance[25]
ciphertext
de-chi—the ciphertext with the chi component of the key removed[24]
any of the above XOR'ed with its successor character or bit[19]
the XOR operation[c][26]
Bletchley Park shorthand for telegraphy code space (zero)
Bletchley Park shorthand for telegraphy code mark (one)

By using differencing and knowing that the psi wheels did not advance with each character, Tutte worked out that trying just two differenced bits (impulses) of the chi-stream against the differenced ciphertext would produce a statistic that was non-random. This became known as Tutte's "1+2 break in".[27] It involved calculating the following Boolean function:

and counting the number of times it yielded "false" (zero). If this number exceeded a pre-defined threshold value known as the "set total", it was printed out. The cryptanalyst would examine the printout to determine which of the putative start positions was most likely to be the correct one for the chi-1 and chi-2 wheels.[28]

This technique would then be applied to other pairs of, or single, impulses to determine the likely start position of all five chi wheels. From this, the de-chi (D) of a ciphertext could be obtained, from which the psi component could be removed by manual methods.[29] If the frequency distribution of characters in the de-chi version of the ciphertext was within certain bounds, "wheel setting" of the chi wheels was considered to have been achieved,[23] and the message settings and de-chi were passed to the "Testery". This was the section at Bletchley Park led by Major Ralph Tester where the bulk of the decrypting work was done by manual and linguistic methods.[30]

Colossus could also derive the start position of the psi and motor wheels. The feasibility of utilizing this additional capability regularly was made possible in the last few months of the war when there were plenty of Colossi available and the number of Tunny messages had declined.[31]

Design and construction

[edit]
Valves (vacuum tubes) seen on end in a recreation of the Colossus computer

Colossus was developed for the "Newmanry",[32] the section headed by the mathematician Max Newman that was responsible for machine methods against the twelve-rotor Lorenz SZ40/42 on-line teleprinter cipher machine (code-named Tunny, for tunafish). The Colossus design arose out of a parallel project that produced a less-ambitious counting machine dubbed "Heath Robinson".[9] Although the Heath Robinson machine proved the concept of machine analysis for this part of the process, it had serious limitations. The electro-mechanical parts were relatively slow and it was difficult to synchronise two looped paper tapes, one containing the enciphered message, and the other representing part of the keystream of the Lorenz machine.[33] Also the tapes tended to stretch and break when being read at up to 2000 characters per second.

Stepping switch said to be from an original Colossus, presented by the Director of GCHQ to the Director of the NSA to mark the 40th anniversary of the UKUSA Agreement in 1986[34]

Tommy Flowers MBE[d] was a senior electrical engineer and Head of the Switching Group at the Post Office Research Station at Dollis Hill. Prior to his work on Colossus, he had been involved with GC&CS at Bletchley Park from February 1941 in an attempt to improve the Bombes that were used in the cryptanalysis of the German Enigma cipher machine.[35] He was recommended to Max Newman by Alan Turing, who had been impressed by his work on the Bombes.[36] The main components of the Heath Robinson machine were as follows.

Flowers had been brought in to design the Heath Robinson's combining unit.[37] He was not impressed by the system of a key tape that had to be kept synchronised with the message tape and, on his own initiative, he designed an electronic machine which eliminated the need for the key tape by having an electronic analogue of the Lorenz (Tunny) machine.[38] He presented this design to Max Newman in February 1943, but the idea that the one to two thousand thermionic valves (vacuum tubes and thyratrons) proposed, could work together reliably, was greeted with great scepticism,[39] so more Robinsons were ordered from Dollis Hill. Flowers, however, knew from his pre-war work that most thermionic valve failures occurred as a result of the thermal stresses at power-up, so not powering a machine down reduced failure rates to very low levels.[40] Additionally, if the heaters were started at a low voltage then slowly brought up to full voltage, thermal stress was reduced. The valves themselves could be soldered-in to avoid problems with plug-in bases, which could be unreliable.[citation needed] Flowers persisted with the idea and obtained support from the Director of the Research Station, W Gordon Radley.[41]

Flowers and his team of some fifty people in the switching group[42][43] spent eleven months from early February 1943 designing and building a machine that dispensed with the second tape of the Heath Robinson, by generating the wheel patterns electronically. Flowers used some of his own money for the project.[44][45] This prototype, Mark 1 Colossus, contained 1,600 thermionic valves (tubes).[42] It performed satisfactorily at Dollis Hill on 8 December 1943[46] and was dismantled and shipped to Bletchley Park, where it was delivered on 18 January and re-assembled by Harry Fensom and Don Horwood.[12][47] It was operational in January[48][8] and it successfully attacked its first message on 5 February 1944.[49] It was a large structure and was dubbed 'Colossus'. A memo held in the National Archives written by Max Newman on 18 January 1944 records that "Colossus arrives today".[50]

During the development of the prototype, an improved design had been developed – the Mark 2 Colossus. Four of these were ordered in March 1944 and by the end of April the number on order had been increased to twelve. Dollis Hill was put under pressure to have the first of these working by 1 June.[51] Allen Coombs took over leadership of the production Mark 2 Colossi, the first of which – containing 2,400 valves – became operational at 08:00 on 1 June 1944, just in time for the Allied Invasion of Normandy on D-Day.[52] Subsequently, Colossi were delivered at the rate of about one a month. By the time of V-E Day there were ten Colossi working at Bletchley Park and a start had been made on assembling an eleventh.[51] Seven of the Colossi were used for 'wheel setting' and three for 'wheel breaking'.[53]

Colossus 10 with its extended bedstead in Block H at Bletchley Park in the space now containing the Tunny gallery of The National Museum of Computing

The main units of the Mark 2 design were as follows.[38][54]

  • A tape transport with an 8-photocell reading mechanism.
  • A six character FIFO shift register.
  • Twelve thyratron ring stores that simulated the Lorenz machine generating a bit-stream for each wheel.
  • Panels of switches for specifying the program and the "set total".
  • A set of functional units that performed Boolean operations.
  • A "span counter" that could suspend counting for part of the tape.
  • A master control that handled clocking, start and stop signals, counter readout and printing.
  • Five electronic counters.
  • An electric typewriter.

Most of the design of the electronics was the work of Tommy Flowers, assisted by William Chandler, Sidney Broadhurst and Allen Coombs; with Erie Speight and Arnold Lynch developing the photoelectric reading mechanism.[55] Coombs remembered Flowers, having produced a rough draft of his design, tearing it into pieces that he handed out to his colleagues for them to do the detailed design and get their team to manufacture it.[56] The Mark 2 Colossi were both five times faster and were simpler to operate than the prototype.[e]

Data input to Colossus was by photoelectric reading of a paper tape transcription of the enciphered intercepted message. This was arranged in a continuous loop so that it could be read and re-read multiple times – there being no internal storage for the data. The design overcame the problem of synchronizing the electronics with the speed of the message tape by generating a clock signal from reading its sprocket holes. The speed of operation was thus limited by the mechanics of reading the tape. During development, the tape reader was tested up to 9700 characters per second (53 mph) before the tape disintegrated. So 5000 characters/second (40 ft/s (12.2 m/s; 27.3 mph)) was settled on as the speed for regular use. Flowers designed a 6-character shift register, which was used both for computing the delta function (ΔZ) and for testing five different possible starting points of Tunny's wheels in the five processors.[58][59] This five-way parallelism[f] enabled five simultaneous tests and counts to be performed giving an effective processing speed of 25,000 characters per second.[59] The computation used algorithms devised by W. T. Tutte and colleagues to decrypt a Tunny message.[60][61]

Operation

[edit]
Colossus selection panel showing selections amongst others, of the far tape on the bedstead, and for input to the algorithm: ΔZ, Δ and Δ.

The Newmanry was staffed by cryptanalysts, operators from the Women's Royal Naval Service (WRNS) – known as "Wrens" – and engineers who were permanently on hand for maintenance and repair. By the end of the war the staffing was 272 Wrens and 27 men.[51]

The first job in operating Colossus for a new message was to prepare the paper tape loop. This was performed by the Wrens who stuck the two ends together using Bostik glue, ensuring that there was a 150-character length of blank tape between the end and the start of the message.[62] Using a special hand punch they inserted a start hole between the third and fourth channels 2+12 sprocket holes from the end of the blank section, and a stop hole between the fourth and fifth channels 1+12 sprocket holes from the end of the characters of the message.[63][64] These were read by specially positioned photocells and indicated when the message was about to start and when it ended. The operator would then thread the paper tape through the gate and around the pulleys of the bedstead and adjust the tension. The two-tape bedstead design had been carried on from Heath Robinson so that one tape could be loaded whilst the previous one was being run. A switch on the Selection Panel specified the "near" or the "far" tape.[65]

After performing various resetting and zeroizing tasks, the Wren operators would, under instruction from the cryptanalyst, operate the "set total" decade switches and the K2 panel switches to set the desired algorithm. They would then start the bedstead tape motor and lamp and, when the tape was up to speed, operate the master start switch.[65]

Programming

[edit]
Colossus K2 switch panel showing switches for specifying the algorithm (on the left) and the counters to be selected (on the right)
Colossus 'set total' switch panel

Howard Campaigne, a mathematician and cryptanalyst from the US Navy's OP-20-G, wrote the following in a foreword to Flowers' 1983 paper "The Design of Colossus".

My view of Colossus was that of cryptanalyst-programmer. I told the machine to make certain calculations and counts, and after studying the results, told it to do another job. It did not remember the previous result, nor could it have acted upon it if it did. Colossus and I alternated in an interaction that sometimes achieved an analysis of an unusual German cipher system, called "Geheimschreiber" by the Germans, and "Fish" by the cryptanalysts.[66]

Colossus was not a stored-program computer. The input data for the five parallel processors was read from the looped message paper tape and the electronic pattern generators for the chi, psi and motor wheels.[67] The programs for the processors were set and held on the switches and jack panel connections. Each processor could evaluate a Boolean function and count and display the number of times it yielded the specified value of "false" (0) or "true" (1) for each pass of the message tape.

Input to the processors came from two sources, the shift registers from tape reading and the thyratron rings that emulated the wheels of the Tunny machine.[68] The characters on the paper tape were called Z and the characters from the Tunny emulator were referred to by the Greek letters that Bill Tutte had given them when working out the logical structure of the machine. On the selection panel, switches specified either Z or ΔZ, either or Δ and either or Δ for the data to be passed to the jack field and 'K2 switch panel'. These signals from the wheel simulators could be specified as stepping on with each new pass of the message tape or not.

The K2 switch panel had a group of switches on the left-hand side to specify the algorithm. The switches on the right-hand side selected the counter to which the result was fed. The plugboard allowed less specialized conditions to be imposed. Overall the K2 switch panel switches and the plugboard allowed about five billion different combinations of the selected variables.[62]

As an example: a set of runs for a message tape might initially involve two chi wheels, as in Tutte's 1+2 algorithm. Such a two-wheel run was called a long run, taking on average eight minutes unless the parallelism was utilised to cut the time by a factor of five. The subsequent runs might only involve setting one chi wheel, giving a short run taking about two minutes. Initially, after the initial long run, the choice of the next algorithm to be tried was specified by the cryptanalyst. Experience showed, however, that decision trees for this iterative process could be produced for use by the Wren operators in a proportion of cases.[69]

Influence and fate

[edit]

Although the Colossus was the first of the electronic digital machines with programmability, albeit limited by modern standards,[70] it was not a general-purpose machine, being designed for a range of cryptanalytic tasks, most involving counting the results of evaluating Boolean algorithms.

A Colossus computer was thus not a fully Turing complete machine. However, University of San Francisco professor Benjamin Wells has shown that if all ten Colossus machines made were rearranged in a specific cluster, then the entire set of computers could have simulated a universal Turing machine, and thus be Turing complete.[71]

Colossus and the reasons for its construction were highly secret and remained so for 30 years after the War. Consequently, it was not included in the history of computing hardware for many years, and Flowers and his associates were deprived of the recognition they were due. All but two of the Colossi were dismantled after the war and parts returned to the Post Office. Some parts, sanitised as to their original purpose, were taken to Max Newman's Royal Society Computing Machine Laboratory at Manchester University.[72] Two Colossi, along with two Tunny machines, were retained and moved to GCHQ's new headquarters at Eastcote in April 1946, and then to Cheltenham between 1952 and 1954.[73][9] One of the Colossi, known as Colossus Blue, was dismantled in 1959; the other in the 1960s.[73] Tommy Flowers was ordered to destroy all documentation. He duly burnt them in a furnace and later said of that order:

That was a terrible mistake. I was instructed to destroy all the records, which I did. I took all the drawings and the plans and all the information about Colossus on paper and put it in the boiler fire. And saw it burn.[74]

The Colossi were adapted for other purposes, with varying degrees of success; in their later years they were used for training.[75] Jack Good related how he was the first to use Colossus after the war, persuading the US National Security Agency that it could be used to perform a function for which they were planning to build a special-purpose machine.[73] Colossus was also used to perform character counts on one-time pad tape to test for non-randomness.[73]

A small number of people who were associated with Colossus—and knew that large-scale, reliable, high-speed electronic digital computing devices were feasible—played significant roles in early computer work in the UK and probably in the US. However, being so secret, it had little direct influence on the development of later computers; it was EDVAC that was the seminal computer architecture of the time.[76] In 1972, Herman Goldstine, who was unaware of Colossus and its legacy to the projects of people such as Alan Turing (ACE), Max Newman (Manchester computers) and Harry Huskey (Bendix G-15), wrote that,

Britain had such vitality that it could immediately after the war embark on so many well-conceived and well-executed projects in the computer field.[77]

Professor Brian Randell, who unearthed information about Colossus in the 1970s, commented on this, saying that:

It is my opinion that the COLOSSUS project was an important source of this vitality, one that has been largely unappreciated, as has the significance of its places in the chronology of the invention of the digital computer.[78]

Randell's efforts started to bear fruit in the mid-1970s. The secrecy about Bletchley Park had been broken when Group Captain Winterbotham published his book The Ultra Secret in 1974.[79] Randell was researching the history of computer science in Britain for a conference on the history of computing held at the Los Alamos Scientific Laboratory, New Mexico on 10–15 June 1976, and got permission to present a paper on wartime development of the COLOSSI at the Post Office Research Station, Dollis Hill (in October 1975 the British Government had released a series of captioned photographs from the Public Record Office). The interest in the "revelations" in his paper resulted in a special evening meeting when Randell and Coombs answered further questions. Coombs later wrote that no member of our team could ever forget the fellowship, the sense of purpose and, above all, the breathless excitement of those days. In 1977 Randell published an article The First Electronic Computer in several journals.[g][80]

In October 2000, a 500-page technical report on the Tunny cipher and its cryptanalysis—entitled General Report on Tunny[81]—was released by GCHQ to the national Public Record Office, and it contains a fascinating paean to Colossus by the cryptographers who worked with it:

It is regretted that it is not possible to give an adequate idea of the fascination of a Colossus at work; its sheer bulk and apparent complexity; the fantastic speed of thin paper tape round the glittering pulleys; the childish pleasure of not-not, span, print main header and other gadgets; the wizardry of purely mechanical decoding letter by letter (one novice thought she was being hoaxed); the uncanny action of the typewriter in printing the correct scores without and beyond human aid; the stepping of the display; periods of eager expectation culminating in the sudden appearance of the longed-for score; and the strange rhythms characterizing every type of run: the stately break-in, the erratic short run, the regularity of wheel-breaking, the stolid rectangle interrupted by the wild leaps of the carriage-return, the frantic chatter of a motor run, even the ludicrous frenzy of hosts of bogus scores.[82]

Reconstruction

[edit]
A team led by Tony Sale (right) reconstructed a Colossus Mark II at Bletchley Park. Here, in 2006, Sale supervises the breaking of an enciphered message with the completed machine.

A team led by Tony Sale built a fully functional reconstruction[83][84] of a Colossus Mark 2 between 1993 and 2008.[12][11] In spite of the blueprints and hardware being destroyed, a surprising amount of material had survived, mainly in engineers' notebooks, but a considerable amount of it in the U.S. The optical tape reader might have posed the biggest problem, but Dr. Arnold Lynch, its original designer was able to redesign it to his own original specification. The reconstruction is on display, in the historically correct place for Colossus No. 9, at The National Museum of Computing, in H Block Bletchley Park in Milton Keynes, Buckinghamshire.

In November 2007, to celebrate the project completion and to mark the start of a fundraising initiative for The National Museum of Computing, a Cipher Challenge[85] pitted the rebuilt Colossus against radio amateurs worldwide in being first to receive and decode three messages enciphered using the Lorenz SZ42 and transmitted from radio station DL0HNF in the Heinz Nixdorf MuseumsForum computer museum. The challenge was easily won by radio amateur Joachim Schüth, who had carefully prepared[86] for the event and developed his own signal processing and code-breaking code using Ada.[87] The Colossus team were hampered by their wish to use World War II radio equipment,[88] delaying them by a day because of poor reception conditions. Nevertheless, the victor's 1.4 GHz laptop, running his own code, took less than a minute to find the settings for all 12 wheels. The German codebreaker said: "My laptop digested ciphertext at a speed of 1.2 million characters per second—240 times faster than Colossus. If you scale the CPU frequency by that factor, you get an equivalent clock of 5.8 MHz for Colossus. That is a remarkable speed for a computer built in 1944."[89]

The Cipher Challenge verified the successful completion of the rebuilding project. "On the strength of today's performance Colossus is as good as it was six decades ago", commented Tony Sale. "We are delighted to have produced a fitting tribute to the people who worked at Bletchley Park and whose brainpower devised these fantastic machines which broke these ciphers and shortened the war by many months."[90]

Front view of the Colossus reconstruction showing, from right to left: (1) The "bedstead" containing the message tape in its continuous loop and with a second one loaded. (2) The J-rack containing the Selection Panel and Plug Panel. (3) The K-rack with the large "Q" switch panel and sloping patch panel. (4) The double S-rack containing the control panel and, above the image of a postage stamp, five two-line counter displays. (5) The electric typewriter in front of the five sets of four "set total" decade switches in the C-rack.[91]

Other meanings

[edit]

There was a fictional computer named Colossus in the 1970 film Colossus: The Forbin Project which was based on the 1966 novel Colossus by D. F. Jones. This was a coincidence as it pre-dates the public release of information about Colossus, or even its name.

Neal Stephenson's novel Cryptonomicon (1999) also contains a fictional treatment of the historical role played by Turing and Bletchley Park.

See also

[edit]

Footnotes

[edit]

References

[edit]

Further reading

[edit]
[edit]
Revisions and contributorsEdit on WikipediaRead on Wikipedia
from Grokipedia
The Colossus computers were the world's first programmable, electronic, digital computing devices, developed by British codebreakers during World War II specifically to aid in the cryptanalysis of high-level German communications. Designed by engineer Tommy Flowers and his team at the Government Communications Headquarters (GCHQ) precursor organization, the initial Colossus Mark I, completed in December 1943, became operational in early 1944 at Bletchley Park, where it was tasked with deciphering messages encrypted using the Lorenz SZ40/42 cipher machine, codenamed "Tunny" by the Allies. These machines processed encrypted teleprinter traffic between Adolf Hitler and his senior generals, enabling the Allies to gain critical strategic intelligence that contributed to shortening the war in Europe. Built under conditions of utmost secrecy, Colossus represented a technological leap, employing approximately 1,500 to 2,400 thermionic valves (vacuum tubes) per machine for electronic logic operations, along with photoelectric paper tape readers capable of handling 5,000 characters per second. Subsequent models, such as the Mark II introduced in June 1944, were five times faster and more flexible in reprogramming via switches and plugs, with up to ten units operational by war's end to support continuous codebreaking efforts. Although specialized for Boolean operations and statistical analysis rather than general-purpose computing, Colossus laid foundational principles for electronic digital computation and influenced post-war developments in computer technology. After the war, all Colossi were dismantled and their existence classified until the 1970s, underscoring their role in one of the most guarded secrets of the Allied victory. A functional reconstruction of a Mark II Colossus, completed in 2007 at The National Museum of Computing, serves as the sole surviving example and demonstrates the machine's pioneering engineering.

Origins and Development

Purpose and Historical Context

During World War II, the British Government Code and Cypher School (GC&CS), operating from its headquarters at Bletchley Park, faced the urgent challenge of decrypting German communications to gain intelligence advantages for the Allies. As the war intensified, manual codebreaking methods proved insufficiently rapid and scalable to handle the growing volume of intercepted messages, necessitating automated solutions to process encrypted traffic in real time and support strategic decisions. The primary target was the Lorenz cipher, known to the Allies as "Tunny," a sophisticated 12-wheel teleprinter encryption system employed by the German High Command for secure, high-level communications, including messages from Adolf Hitler and his generals. In 1942, mathematician William T. "Bill" Tutte achieved a critical breakthrough by theoretically reconstructing the logical structure of the Lorenz machine's cipher wheels based on analysis of a depth in an intercepted Tunny message, where a long passage of plaintext was repeated due to a transmission error, providing the foundational insights needed for systematic cryptanalysis without physical possession of the device. Initial efforts relied on manual techniques and the electromechanical Heath Robinson machine, developed and installed at Bletchley Park in June 1943, which attempted to correlate message patterns but struggled with synchronization issues and the sheer volume of daily Tunny traffic, often taking weeks to decrypt a single message. These limitations underscored the need for a fully electronic alternative, leading to the Colossus project under engineer Tommy Flowers, which began in early 1943 and resulted in the first machine becoming operational at Bletchley Park by early 1944.

Design and Construction

The design and construction of the Colossus computer were led by Tommy Flowers, a senior engineer and head of the Switching Group at the British General Post Office (GPO) Research Station in Dollis Hill, London. Flowers, drawing on his expertise in electronic telephone exchanges, advocated for an all-electronic machine using thermionic valves despite initial skepticism from key figures at Bletchley Park, including Gordon Welchman, who favored more conventional relay-based designs. This insistence on valves overcame the prevailing doubts about reliability, as Flowers demonstrated their viability through prior experimental work on codebreaking equipment. Design and development of the first machine, known as Colossus Mark I, began in early 1943, with construction starting in June 1943; it was completed in about eleven months overall by late December 1943 at the Dollis Hill facility under intense wartime secrecy. The prototype was then disassembled and secretly transported to Bletchley Park in late December 1943 or early January 1944, where it was reassembled and became operational in early 1944. Flowers' team, comprising about 15 GPO engineers including key contributors Sidney Broadhurst as chief engineer and Allen Coombs as a lead engineer, worked around the clock to meet the accelerated timeline, addressing frequent valve failures through rigorous testing and redesigns. Resource constraints posed significant challenges amid wartime shortages, particularly for the approximately 1,500 thermionic valves required for Mark I and up to 2,400 for subsequent models, which Flowers sourced through GPO channels and innovative reuse of surplus components. Development of the improved Colossus Mark II started in June 1944, leading to the production of ten machines by the end of 1945, all constructed primarily at Dollis Hill before relocation to Bletchley Park's Block H. The assembly process involved collaboration with members of the Women's Royal Naval Service (WRNS), who assisted in wiring and initial setup under Flowers' supervision, highlighting the interdisciplinary effort despite the project's classified nature.

Technical Design

Architecture and Components

The Colossus computer employed a modular architecture divided into five primary sections: the tape reading unit for input processing, the counters for frequency tallying, the program store for fixed pattern generation, the Boolean functions unit for logical operations, and the output section for result display via typewriter or printer. This design allowed for parallel processing of the five bits of each character from the input tape, enabling efficient handling of encrypted message streams. Central to its operation were 1,500 to 2,400 thermionic valves, including thyratrons for switching and EF36 pentodes for amplification and logic implementation, which formed the electronic gates and circuits. These valves facilitated high-speed computations, achieving approximately 5,000 additions per second through decade counters and integrator circuits. Input was provided via photoelectric paper tape readers capable of scanning 5,000 characters per second, using light beams and photocells to detect punched holes without mechanical contact. Unlike later computers, Colossus lacked random access memory and relied on a fixed program store implemented with 25 ten-bit wheels, providing a total of 2,500 bits to hold Boolean equations and wheel patterns generated electronically via thyratron ring circuits. Data buffering occurred through valve-based shift registers, typically five bits wide, which delayed signals for synchronization. The machine's master clock operated at 5 kHz to coordinate these electronic processes. Colossus consumed about 8 kW of power, weighed approximately 5 tons, with its components mounted on tall racks in bays measuring around 7 feet high by 17 feet wide by 11 feet deep. Among its innovations was the pioneering application of fully electronic counters for frequency analysis, replacing mechanical relays and enabling reliable high-speed digital computation.

Programming Methods

Colossus lacked stored programs in the modern von Neumann architecture sense but achieved programmability through physical reconfiguration of its logic circuits using plugboards, key switches, and jumper cables, enabling the implementation of flexible Boolean functions tailored to cryptanalytic tasks. Operators, often Wrens under the direction of engineers, connected telephone-style jack-plugs and cords into dedicated panels to route signals and define logical operations, while rows of key switches on a dedicated logic switching panel allowed precise control over Boolean expressions. This hardware-based approach permitted the machine to compute complicated Boolean functions involving up to about 100 symbols, such as logical AND, OR, and NOT operations performed via thermionic valve circuits. The setup process required engineers to meticulously plug and switch patterns corresponding to up to dozens of Boolean equations, a labor-intensive task that typically consumed several hours per configuration to ensure accuracy for the intended analysis. Once configured, the machine processed input from paper tape at high speeds, applying the defined logic to compare encrypted messages against simulated key streams generated electronically within thyratron rings, eliminating the need for multiple physical tapes. This method allowed rapid execution of cross-correlation algorithms but demanded careful verification to avoid errors in the wiring. Despite its flexibility for Boolean operations, Colossus's architecture was inherently fixed for specialized cryptanalytic functions, limiting its adaptability without full reprogramming for variations in wheel settings or scoring techniques in the Lorenz cipher. For instance, configurations could target chi-wheel or psi-wheel tests by adjusting plugboard connections to evaluate differences (deltas) between ciphertext and simulated keystreams, identifying likely settings through hit counts. Another example involved setting up "gradient" detectors to score non-random patterns in double deltas, flagging deviations that indicated correct wheel alignments. These setups prioritized efficiency for iterative testing but required manual intervention for changes, contrasting with fully automatic general-purpose machines. Subsequent iterations, particularly the Mark II Colossus introduced in 1944, enhanced programmability with greater parallel processing via expanded five-stage shift registers and additional counters, enabling simultaneous evaluation of multiple Boolean conditions across tape channels for faster reconfiguration and execution. This evolution supported more complex tasks, such as mechanizing Testery operations, while retaining the core plugboard and switch methodology but with improved reliability and speed—up to five times that of the original.

Operation and Applications

Decryption Processes

The decryption processes implemented on the Colossus computer focused on automating the cryptanalysis of the Lorenz cipher, a teleprinter encryption system used by the German High Command for secure communications during World War II. The primary task involved statistical analysis of intercepted ciphertext to determine the starting positions of the cipher's rotating wheels, exploiting non-uniformities in the generated key streams caused by the machine's irregular stepping mechanism. These non-uniformities arose from the psi wheels' unpredictable advancement, which deviated the ciphertext from perfect randomness and allowed statistical tests to identify likely settings. A key initial step was "screwing," the process of aligning the ciphertext tape with a generated key tape derived from trial chi-wheel settings to synchronize the streams and prepare for scoring. Once aligned, Colossus performed frequency counting of character combinations in the putative plaintext, using these counts to compute chi-square scores that measured how closely the output matched expected English letter frequencies. The chi wheels—five in number with lengths of 41, 31, 29, 26, and 23 positions—produced one of 32 possible key characters per letter position due to their binary cam configurations, enabling Colossus to systematically test combinations and identify the correct settings through the lowest chi-square values. Following chi-wheel recovery, the focus shifted to psi-wheel hunting, employing techniques pioneered by cryptanalyst Bill Tutte to address the five psi wheels (lengths 43, 47, 51, 53, and 59 positions) that masked the chi-encrypted plaintext via additional XOR operations. This involved calculating "deltas"—the XOR differences between consecutive characters in the de-chi'd text—to isolate psi influences, followed by delta-scoring to evaluate and refine psi adjustments against statistical expectations. Motor wheel extensions, which controlled the irregular psi stepping (advancing two or three positions based on patterns), were incorporated into the algorithms to simulate the full key stream accurately, accounting for the extended periodicity introduced by these two motor wheels (lengths 37 and 61). The interdependencies between chi and psi wheels were critical: incorrect chi settings propagated errors into psi hunting, necessitating iterative refinement where psi recovery relied on prior chi decryption to reveal underlying plaintext patterns. Once settings were determined, the actual decryption was performed using simpler machines or manual methods. Colossus's Boolean circuitry implemented these processes through optimized logic functions, including the application of De Morgan's laws to simplify gate configurations for operations like delta computation and scoring, ensuring efficient evaluation of the 32 chi patterns and complex psi interrelations without excessive hardware complexity. Overall, these automated techniques dramatically improved efficiency, reducing the time to break wheel settings from weeks of manual computation to mere hours per message, enabling timely decryption of high-level German traffic.

Deployment and Operation

The first Colossus machine was delivered on December 8, 1943, to Bletchley Park's Block H, where it was assembled after shipment in parts from the Post Office Research Station at Dollis Hill, and became operational on February 5, 1944. By May 1945, the installation had expanded to ten machines—two Mark I models and eight improved Mark II versions—all dedicated to breaking Lorenz ciphers used in high-level German communications. These machines operated continuously, typically 18 to 24 hours per day, to maximize output under the intense demands of wartime codebreaking. Operation relied heavily on a workforce of Women's Royal Naval Service (WRNS) personnel, with around 250 women serving as primary operators who managed tape splicing, monitored machine performance, and performed basic maintenance tasks. Engineers handled more complex reprogramming via plugboards and switches, while operators worked in rotating shifts under strict secrecy oaths, often in 24/7 cycles to ensure uninterrupted processing. The WRNS team, drawn from naval reserves, brought essential skills in handling punched paper tapes and mechanical systems, contributing to the machines' reliability despite their experimental nature. Colossus machines analyzed data at speeds of up to 5,000 characters per second per unit to determine cipher settings; by war's end, they contributed to decrypting over 63 million characters from German high command traffic. This decrypt output proved pivotal in Allied strategy, with Tunny breaks influencing key events such as the D-Day landings in Normandy by revealing German command intentions and deceptions. Similarly, insights from Colossus-aided decrypts aided responses during the Battle of the Bulge in late 1944, providing intelligence on German troop movements and logistics that helped stabilize the Western Front. Daily operations faced significant challenges, including frequent tape jams from the high-speed paper tape readers and valve failures in the vacuum tube arrays, which required replacement every few days to maintain functionality. These issues demanded vigilant monitoring by operators, who worked in a highly secure environment where even minor breakdowns could delay critical intelligence delivery to Allied commanders. Despite such hurdles, the machines' robustness—bolstered by parallel circuitry and redundant components—ensured they met the relentless pace of wartime needs.

Legacy and Aftermath

Influence on Computing

Colossus represented a pioneering achievement in computing as the world's first large-scale programmable electronic digital computer, operational from December 1943 and utilizing approximately 1,500 to 2,400 vacuum tubes (valves) for logic operations. Unlike prior electromechanical devices reliant on relays, which were slower and prone to mechanical failure, Colossus demonstrated the feasibility and superior reliability of all-electronic valve-based digital logic circuits, operating continuously without power cycling to maintain stability and achieving speeds of up to 5,000 characters per second. This design validated electronic computing on a practical scale, proving that thousands of valves could function reliably in a single system when properly engineered, a critical insight that shifted perceptions from relay dominance to electronic viability. The innovations from Tommy Flowers and his team at the General Post Office directly influenced early post-war British computing efforts. Flowers himself contributed to the design of the Automatic Computing Engine (ACE) at the National Physical Laboratory (NPL) in the late 1940s, applying lessons from Colossus's electronic architecture to this general-purpose stored-program computer. Team members and techniques from the Colossus project also informed 1950s UK initiatives, such as the development of electronic systems at institutions like the University of Manchester and the Post Office, where valve-based designs accelerated the transition to transistor-era machines by emphasizing parallel processing and digital signal handling. In broader terms, Colossus preceded the by about two years but was specialized for cryptanalytic tasks, employing parallel processing of multiple and logic operations that foreshadowed elements of general-purpose digital computers. Its reconfiguration through plugboards, switches, and preset counters introduced proto-programming , allowing operators to adapt logic functions without hardware rewiring, which highlighted the potential of modifiable digital systems for diverse applications beyond codebreaking. Due to wartime secrecy, its contributions were initially overshadowed by American developments like ; however, following partial declassifications in the and full disclosure in the , it has been affirmed as the world's first programmable electronic computer, affirming its foundational in .

Post-War Fate and Secrecy

Following the end of in , ordered the destruction of the Colossus machines to maintain the of British codebreaking capabilities. Eight of the ten Colossi were dismantled in early at the site in , where codebreaking operations had been relocated from ; the remaining two were relocated to sites and used for ongoing codebreaking efforts until their dismantling in 1959 and the , respectively. Engineers smashed the thermionic valves and burned all blueprints and to no traces remained. All personnel involved, including operators and engineers like Tommy Flowers, were bound by the Official Secrets Act, prohibiting any discussion of their work under threat of severe penalties. Flowers, who had designed and overseen the construction of Colossus, saw his contributions remain hidden until the 1970s, as the government's emphasis on secrecy prevented recognition or advancement based on his wartime achievements. The first partial public revelation came in 1974 with F.W. Winterbotham's book The Ultra Secret, which disclosed aspects of the broader Ultra intelligence operation, including the role of machines like Colossus in decrypting high-level German communications. More comprehensive details emerged in the 1980s through releases from The National Archives, allowing historians access to declassified documents on the Tunny cipher and Colossus's operations. In the immediate aftermath, some of the salvaged thermionic valves from the dismantled Colossi were repurposed for use in British telephone exchanges, leveraging Flowers' pre-war expertise in telecommunications switching. Flowers returned to his position at the General Post Office (GPO) research station in Dollis Hill, but faced significant career setbacks, including a ban on computer-related work and financial debt from self-funding parts of the project—his £1,000 government award proved insufficient to cover wartime expenses. The human cost of secrecy was profound for the operators, predominantly women who had staffed the machines around the clock; sworn to lifelong silence under the Official Secrets Act, they endured isolation and suspicion from family and colleagues unable to comprehend their wartime roles. Personal stories remained suppressed until the 1990s, when memoirs and interviews began to surface, revealing the psychological strain of decades-long enforced silence, including strained relationships and a sense of unrecognized sacrifice.

Reconstruction and Modern Recognition

In the 1980s, pioneering efforts to document and understand the Colossus computer gained momentum through technical papers presented by original designers, including Tommy Flowers, which provided initial glimpses into its architecture despite ongoing secrecy restrictions. The formal reconstruction project was launched in 1994 under the leadership of engineer Tony Sale, who coordinated a volunteer team at Bletchley Park to rebuild a fully functional Mark II Colossus using surviving original plans, circuit diagrams recovered from declassified documents, and direct input from wartime veterans who had operated the machines. This initiative, supported by the emerging National Museum of Computing (TNMOC), relied on detective work to source over 2,000 vintage thermionic valves and replicate custom components, culminating in the machine's first operational run in 2007 after more than a decade of meticulous assembly. The rebuilt Colossus faithfully reproduces the original's 2,400 valves and parallel processing capabilities, addressing the post-war dismantling of the original machines (eight in 1946 and the remaining two in the late 1950s and 1960s) as part of secrecy measures. Today, the operational replica resides at TNMOC on the Bletchley Park estate, where it serves as a cornerstone exhibit, regularly demonstrating programmable operations and executing reconstructions of historical Tunny cipher tapes to showcase its codebreaking prowess. Ongoing maintenance includes research into the reliability of its aging valves, with TNMOC engineers monitoring failure rates and sourcing spares from period stock to ensure long-term functionality, highlighting the challenges of preserving vacuum-tube technology. A key recognition milestone came in 2014 during TNMOC's 70th anniversary commemoration of Colossus's first deployment, which featured veteran reunions and public demonstrations that underscored its role as the world's first large-scale electronic digital computer. Post-2020 developments have further elevated Colossus's profile, including GCHQ's 2024 80th anniversary celebration, which released declassified images and documents illuminating its wartime contributions to Allied intelligence. In 2025, articles in The Guardian emphasized the collaborative teamwork behind its creation, spotlighting Tommy Flowers' visionary engineering and the often-overlooked roles of women in its operation and maintenance, while TNMOC unveiled updated exhibits tracing electronic computing's origins. Educationally, the machine supports WWII history and early computing curricula through interactive sessions and public demonstrations initiated in 2007, allowing visitors to witness live programming and output generation that bring its historical significance to life.

Other Topics

Other Meanings

The term "Colossus" appears in several contexts distinct from the World War II-era electronic codebreaking computer developed by British engineers at Bletchley Park. In fiction, it prominently features in the 1966 science fiction novel Colossus by D. F. Jones, published by G. P. Putnam's Sons, which portrays a U.S.-built supercomputer that merges with a Soviet counterpart to impose global peace through totalitarian control. The story was adapted into the 1970 film Colossus: The Forbin Project, directed by Joseph Sargent and starring Eric Braeden, emphasizing themes of artificial intelligence gone awry. Historically, "Colossus" refers to the Colossus of Rhodes, a gigantic bronze statue of the sun god Helios erected around 280 BCE on the Greek island of Rhodes to celebrate a military victory; standing approximately 33 meters tall, it was one of the Seven Wonders of the Ancient World and symbolized Hellenistic engineering prowess until its destruction by an earthquake in 226 BCE. The name has occasionally led to confusion with other World War II computing devices, such as the electromechanical Bombe used for Enigma decryption, though the original Colossus was a specialized electronic machine for Lorenz cipher analysis. In modern usage, "Colossus" denotes xAI's supercomputer cluster in Memphis, Tennessee, launched in 2024 with 100,000 NVIDIA H100 GPUs and expanded to 200,000 NVIDIA Hopper GPUs by late 2024 (as of November 2025) for training large language models like Grok, representing a massive scale in AI infrastructure but unrelated in function to its WWII predecessor. In January 2026, xAI announced a $20 billion investment to construct an approximately 810,000 square foot datacenter named Macrohardrr at 2400 Stateline Road in Southaven, Mississippi—adjacent to its Memphis facilities and described as the largest private investment in Mississippi history—which is expected to create hundreds of permanent jobs statewide and, when combined with Colossus 1 and 2, form a nearly 2 GW supercomputer with over 1 million GPUs; Colossus 2 specifically aims to scale to over 1 million NVIDIA GPUs, including hundreds of thousands of GB200 and GB300 series. This WWII codebreaker remains unique as the world's first large-scale programmable electronic digital computer, distinct from general-purpose systems like the 1945 American ENIAC. The Bombe machines, developed by Alan Turing and his team at Bletchley Park, were electromechanical devices specifically designed to determine the daily rotor settings of the German Enigma cipher machine, enabling the decryption of vast amounts of intercepted messages. Over 200 such machines—precisely 211 in total—were constructed and deployed across British sites, operating continuously to break 3- to 10-wheel Enigma configurations each day and supporting the Allied intelligence effort known as Ultra. In contrast to the electronic Colossus, the Bombes relied on mechanical drums mimicking Enigma rotors, connected by electrical circuits to test possible settings rapidly but still limited by physical wear and synchronization challenges. A direct precursor to Colossus was the Heath Robinson machine, an electro-mechanical device built in 1943 by engineers at the General Post Office's Dollis Hill research station under Tommy Flowers' supervision, featuring relay logic and dual photoelectric tape readers to compare message tapes against generated key streams for the Tunny (Lorenz) cipher. This relay-based system, operational from June 1943 in the Newmanry section at Bletchley Park, processed data at up to 2,000 characters per second but suffered from severe reliability issues, including frequent tape tears, synchronization failures between the two paper tapes, and the need for constant manual intervention, limiting it to analyzing just a few messages per week. These mechanical limitations prompted the shift to Colossus's all-electronic design, which eliminated moving parts and achieved far greater speed and stability. Other tools employed by the Government Code and Cypher School (GC&CS) included the Typex cipher machines and the Robinson series (encompassing Heath Robinson and its improved "Super Robinson" variants), which aided manual and semi-automated decryption processes for various ciphers beyond the Lorenz system. Typex devices, rotor-based encryptors compatible with Enigma mechanics, were extensively used at Bletchley Park to decrypt broken Enigma traffic after Bombe-derived settings were applied, printing out plain text at rates up to 50 words per minute in large rooms dedicated to the task. The Robinsons, similarly tape-driven and relay-dependent, supplemented early Tunny efforts but underscored the inefficiencies of electro-mechanical approaches compared to Colossus's electronic breakthrough, which processed 5,000 characters per second without mechanical fragility. In the broader wartime context, the United States developed SIGSALY in 1943 as a secure voice encryption system using vocoder technology and one-time pads, deployed for high-level Allied conferences and operational until 1946, though it focused on protecting speech communications rather than codebreaking like Colossus. Due to the extreme secrecy surrounding Colossus—kept classified until the 1970s—no immediate direct successors emerged during or after World War II, leaving its innovations dormant for decades. Colossus complemented Enigma-breaking efforts by decrypting high-level Tunny messages from Hitler and the German High Command, contributing uniquely to the overall Ultra intelligence that informed Allied strategy across multiple fronts.

References

Add your contribution
Related Hubs
Contribute something
User Avatar
No comments yet.