answersLogoWhite

0

AllQ&AStudy Guides
Best answer

Tommy Flowers developed Colossus in 1943. This computer was intended to aid British code breakers in World War II with analysis of the Lorenz cipher.

This answer is:
Related answers

Tommy Flowers developed Colossus in 1943. This computer was intended to aid British code breakers in World War II with analysis of the Lorenz cipher.

View page

The Lorenz cipher was developed by C. Lorenz AG company in Berlin. The exact employees responsible for it are unknown. It was implemented in four variants in different machines known as SZ40, SZ42, SZ42A and SZ42B and introduced in 1940 and 1942 respectively.

The British cryptanalysts at Bletchley Park referred to the Lorenz cipher as Tunny and broke it by various hand methods (but too late to be of military value) until the first of 10 Colossus programmable electronic digital computers ran in 1944 (the first militarily useful message broke by the Colossus was on June 5, 1944 reporting that the Panzers were being ordered to leave Normandy and go north to Calais, clearing the way for D-Day on June 6, 1944 without having to worry about any Panzers for long enough to capture the beaches and have moved well inland).

View page

Tony Sale has written:

'The Colossus computer, 1943-1996' -- subject(s): Electronic intelligence, Lorenz cipher system, World War, 1939-1945

View page

Lorenz Lorenz has written:

'Die Nacht des Fehlers'

View page

Turing did not work on the Enigma, it was a German machine.

However he did do some work on the British Bombe machines that were used to crack the Enigma machine cipher.

Later he saw Tommy Flowers' Colossus electronic computer, designed to crack the German Lorenz SZ40/42 machine cipher. This inspired him after the end of the war to begin work on programmable electronic computers.

View page
Featured study guide

Installation is preformed by storing the answers to installation questions in a text file or script that windows 2000 xp calls an answer file

What do you implement to control how much disk space a user can take up

What type of user account must you be using to install a hardware device that is using drivers that are not digitally signed by Microsoft

Which windows registry subtree gets its information from the four registry files Sam security software and system

➡️
See all cards
4.82
11 Reviews
People also asked

What are the character traits for network security analyists?

View results
Search results