Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Colossus computer
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Programming== [[File:Colossus computer Q panel.png|right|upright=1.35 |thumbnail |Colossus K2 switch panel showing switches for specifying the algorithm (on the left) and the counters to be selected (on the right)]] [[File:Picture111Shopped.jpg|upright=1.35|thumb|Colossus 'set total' switch panel]] Howard Campaigne, a mathematician and cryptanalyst from the US Navy's [[OP-20-G]], wrote the following in a foreword to Flowers' 1983 paper "The Design of Colossus".{{Blockquote|My view of Colossus was that of cryptanalyst-programmer. I told the machine to make certain calculations and counts, and after studying the results, told it to do another job. It did not remember the previous result, nor could it have acted upon it if it did. Colossus and I alternated in an interaction that sometimes achieved an analysis of an unusual German cipher system, called "Geheimschreiber" by the Germans, and "Fish" by the cryptanalysts.{{sfn|Flowers|1983|pp=239β252}} }} Colossus was not a [[stored-program computer]]. The input data for the five parallel processors was read from the looped message paper tape and the electronic pattern generators for the ''chi'', ''psi'' and motor wheels.{{sfn|Small|1944|p=108}} The programs for the processors were set and held on the switches and jack panel connections. Each processor could evaluate a Boolean function and count and display the number of times it yielded the specified value of "false" (0) or "true" (1) for each pass of the message tape. Input to the processors came from two sources, the shift registers from tape reading and the thyratron rings that emulated the wheels of the Tunny machine.{{sfn|Good|Michie|Timms|1945|loc = 5 Machines: 53 Colossus, pp. 333β353}} The characters on the paper tape were called '''Z''' and the characters from the Tunny emulator were referred to by the Greek letters that Bill Tutte had given them when working out the logical structure of the machine. On the selection panel, switches specified either '''Z''' or '''ΞZ''', either <math>\chi</math> or '''Ξ'''<math>\chi</math> and either <math>\psi</math> or '''Ξ'''<math>\psi</math> for the data to be passed to the jack field and 'K2 switch panel'. These signals from the wheel simulators could be specified as stepping on with each new pass of the message tape or not. The K2 switch panel had a group of switches on the left-hand side to specify the algorithm. The switches on the right-hand side selected the counter to which the result was fed. The plugboard allowed less specialized conditions to be imposed. Overall the K2 switch panel switches and the plugboard allowed about five billion different combinations of the selected variables.{{sfn|Good|Michie|Timms|1945|loc = 5 Machines: 53 Colossus 53A Introduction, p.333}} As an example: a set of runs for a message tape might initially involve two ''chi'' wheels, as in Tutte's 1+2 algorithm. Such a two-wheel run was called a long run, taking on average eight minutes unless the parallelism was utilised to cut the time by a factor of five. The subsequent runs might only involve setting one ''chi'' wheel, giving a short run taking about two minutes. Initially, after the initial long run, the choice of the next algorithm to be tried was specified by the cryptanalyst. Experience showed, however, that decision trees for this iterative process could be produced for use by the Wren operators in a proportion of cases.{{sfn|Budiansky|2006|p=62}}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)