TileMission, or barrel, roof tiles
A tile is a manufactured piece of hard-wearing material such as ceramic, clay, stone, porcelain or even glass. Tiles are generally used for covering roofs, floors, and walls, or other objects such as tabletops. The word is derived from the French word tuile, which is, in turn, from the Latin word tegula, meaning a roof tile composed of baked clay. Less precisely, the modern term can refer to any sort of construction tile or similar object, such as rectangular counters used in playing games (see tile-based game).
Tiles are often used to form wall and floor coverings, and can range from simple square tiles to complex mosaics. Tiles are most often made from ceramic, with a hard glaze finish, but other materials are also commonly used, such as glass, slate, and reformed ceramic slurry, which is cast in a mould and fired.
Roof tilesFancy Japanese roof tiles The largest (6000 m²)
wooden shingle roof
in Europe: Zakopane, Poland
Roof tiles are designed mainly to keep out rain, and are traditionally made from locally available materials such as clay, slate, or wood (wooden tiles are called shingles). Modern materials such as concrete and plastic are also used. Some clay tiles have a waterproof glaze.
Because of their long history, a large number of shapes (or "profiles") of roof tiles have evolved. These include:
Roof tiles are 'hung' from the framework of a roof by fixing them with nails. The tiles are usually hung in parallel rows, with each row overlapping the row below it to exclude rainwater and to cover the nails that hold the row below.
There are also roof tiles for special positions, particularly where the planes of the several pitches meet. They include ridge, hip and valley tiles.
Floor tiles6"x6" porcelain floor tiles
These are commonly made of ceramic, clay, porcelain or stone. Clay tiles may be painted and glazed. Small mosaic tiles may be laid in various patterns. Floor tiles are typically set into mortar consisting of sand, cement and oftentimes a latex additive for extra strength. The spaces between the tiles are nowadays filled with sanded or unsanded floor grout, but traditionally mortar was used.
See Laying tile
Wall tilesTilework on the wall of the Bond Street tube station
While ancient Roman building bricks were broader and thinner than modern ones and are therefore usually called tiles, the term wall tile is normally applied to finishing tiles. These are usually ceramic, but other materials such as mirrored glass or polished metal can be used. Wall tiles are usually glazed, and are often patterned by painting or embossing. Pictorial tiles, consisting of many tiles that the installer assembles like a jigsaw puzzle to form a single large picture, are available.
Modern wall tiles are fixed to a wall using a synthetic bonding agent tile adhesive for dry areas, or a cement-based mortar for areas prone to moisture, such as bath or shower walls. The spaces between the tiles are filled with a fine cement called unsanded grout. The excess grout is scraped off with a hard rubber block called a float immediately after applying; further, the grout is wiped again with a moist sponge before it completely hardens. The sponging provides added moisture to strengthen the grout as it cures. Finally, a cloth is rubbed over the wall tile to remove any haze which may remain from residual grout.
Decorative tileworkAncient mosaic in the British Museum. Typical tilework on buildings in Santarém, Portugal.
Decorative tilework typically takes the form of mosaic upon the walls, floor, or ceiling of a building. Although decorative tilework was known and extensively practiced in the ancient world (as evidenced in the magnificent mosaics of Pompeii and Herculaneum), it perhaps reached its greatest expression during the Islamic period.
Some places, notably Portugal, have a tradition of tilework on buildings that continues today.
In the United States, decorative tiles were in vogue, especially in southern California, in the 1920s and 1930s. Prominent among art tile makers during this period was Ernest A. Batchelder.
Islamic tileworkTilework of Hazrat Masoumeh shrine, Qom. First constructed in the late 8th century.
Perhaps because of the tenets of Moslem law (sharia) which disavow religious icons and images in favor of more abstract and universal representations of the divine, many consider decorative tilework to have reached a pinnacle of expression and detail during the Islamic period. Palaces, public buildings, and mosques were heavily decorated with dense, often massive mosaics and friezes of astonishing complexity. As both the influence and the extent of Islam spread during the Middle Ages this artistic tradition was carried along, finding expression from the gardens and courtyards of Málaga in Moorish Spain to the mosaics of the Hagia Sophia in Constantinople.
The mathematics of tiling
Certain shapes of tiles, most obviously rectangles, can be replicated to cover a surface with no gaps. These shapes are said to tessellate (from the Latin tessera, 'tile'). For detailed information on tilings see the tessellation page.
History of tiles
Tiles were developed as a product of earthenware pottery, either as an alternative use for fragments of broken pottery (called potsherds) or as an independent invention. Tiles have been used in construction for at least 4000 years, by the Romans, Greeks, Babylonians, Phoenicians and many other cultures.
This page about tiles includes information from a Wikipedia article.
Additional articles about tiles
News stories about tiles
External links for tiles
Videos for tiles
Wikis about tiles
Discussion Groups about tiles
Blogs about tiles
Images of tiles
Tiles have been used in construction for at least 4000 years, by the Romans, Greeks, Babylonians, Phoenicians and many other cultures. Broken Enigma messages are still extremely valuable today, as they provide some of the best surviving direct accounts of the Nazi war effort. Tiles were developed as a product of earthenware pottery, either as an alternative use for fragments of broken pottery (called potsherds) or as an independent invention. Marian Rejewski wrote a number of papers on his 1932 break into Enigma and his subsequent work on the cipher, well into World War II, with his fellow mathematician-cryptologists, Jerzy Różycki and Henryk Zygalski; most of Rejewski's papers appear in Władysław Kozaczuk's 1984 Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two (edited and translated by Christopher Kasparek), which remains the standard reference on the crucial foundations laid by the Poles for World War II Enigma decryption. For detailed information on tilings see the tessellation page. Information on British cryptology appears in the official history of British intelligence in World War II, edited by Sir Harry Hinsley; he also co-edited, with Alan Stripp, a volume of memoirs by participants in the British cryptological effort, Codebreakers: the Inside Story of Bletchley Park (1993). These shapes are said to tessellate (from the Latin tessera, 'tile'). A brief description of the Enigma, as well as other codes/ciphers, can be found in Simon Singh's The Code Book (1999).
Certain shapes of tiles, most obviously rectangles, can be replicated to cover a surface with no gaps. David Kahn's Seizing the Enigma (1991) is essentially about the solution of Naval Enigma, based on seizures of German naval vessels; British success in the endeavor almost certainly saved Britain from defeat in the crucial Battle of the Atlantic and thereby made the United States' entry into the war's European theater possible. As both the influence and the extent of Islam spread during the Middle Ages this artistic tradition was carried along, finding expression from the gardens and courtyards of Málaga in Moorish Spain to the mosaics of the Hagia Sophia in Constantinople. Hugh Sebag-Montefiore's Enigma: the Battle for the Code (2000), which focuses largely on Naval Enigma, includes some previously unknown information—and many photographs of individuals involved; Bletchley Park had been his grandfather's house before it was purchased for GC&CS. Palaces, public buildings, and mosques were heavily decorated with dense, often massive mosaics and friezes of astonishing complexity. A short account of World War II cryptology is Battle of Wits (2000) by Stephen Budiansky; it covers more than just the Enigma story. Perhaps because of the tenets of Moslem law (sharia) which disavow religious icons and images in favor of more abstract and universal representations of the divine, many consider decorative tilework to have reached a pinnacle of expression and detail during the Islamic period. A fictional version of this story is told in the novel Enigma by Robert Harris (ISBN 0099992000), the movie made from the novel—see "Enigma (2001 film)"—and is somewhat covered, also fictionally, in Neal Stephenson's Cryptonomicon (ISBN 0099410672).
Batchelder. It was, in fact, a very narrow shave, and the reader may like to ponder [...] whether [...] we might have won [without] Ultra.". Prominent among art tile makers during this period was Ernest A. "Let no one be fooled," Winterbotham admonishes in chapter 3, "by the spate of television films and propaganda which has made the war seem like some great triumphant epic. In the United States, decorative tiles were in vogue, especially in southern California, in the 1920s and 1930s. Winterbotham, the first author to limn, in his 1974 book The Ultra Secret, the influence of Enigma decryption on the course of World War II, likewise made the earliest contribution to an appreciation of Ultra's postwar influence, which now continues into the 21st century — and not only in the postwar establishment of Britain's GCHQ (Government Communication Headquarters) and the United States' NSA (National Security Agency). Some places, notably Portugal, have a tradition of tilework on buildings that continues today. F.W.
Although decorative tilework was known and extensively practiced in the ancient world (as evidenced in the magnificent mosaics of Pompeii and Herculaneum), it perhaps reached its greatest expression during the Islamic period. This directly effected his attitude to the effectiveness of the post D-Day 1944 directives (orders) to target oil installations as he did not know that it was high level German sources which was being used by the Allied high command to assess just how much it was hurting the German war effort; so Harris tended to see the directives to bomb specific oil and munitions targets as a high level command "panacea" (his word), and as a distraction from the real task of making the rubble bounce in every large German city.. Decorative tilework typically takes the form of mosaic upon the walls, floor, or ceiling of a building. The historian Frederick Taylor argues that as Harris was not cleared to know about ULTRA, he was given some information gleaned from ENIGMA, but not where it had come from. Finally, a cloth is rubbed over the wall tile to remove any haze which may remain from residual grout. After D-Day with the resumption of the strategic bomber campaign over Germany, Harris remained wedded to area bombardment. The sponging provides added moisture to strengthen the grout as it cures. The destruction of city centres not only destroyed factories, houses, and railways, but damaged and degrade the telephone network, which as the war progressed forced the German armed forces to rely ever more heavily on encrypted radio traffic, which of course the Allies were able to read.
The excess grout is scraped off with a hard rubber block called a float immediately after applying; further, the grout is wiped again with a moist sponge before it completely hardens. From February 1942 when Air Marshal Arthur Harris became Commander-in-Chief of RAF Bomber Command, the RAF implemented large scale night area bombardment of German cities. The spaces between the tiles are filled with a fine cement called unsanded grout. Improvements to ASDIC (sonar), coupled with Hedgehog depth charges, improved the likelihood of a surface attack sinking a U-boat. Modern wall tiles are fixed to a wall using a synthetic bonding agent tile adhesive for dry areas, or a cement-based mortar for areas prone to moisture, such as bath or shower walls. Improvements to Huff-Duff (radio-triangulation equipment used as part of ELINT) meant that a U-boat's location could be found even if the messages they were sending could not be read. Pictorial tiles, consisting of many tiles that the installer assembles like a jigsaw puzzle to form a single large picture, are available. As the air gap over the North Atlantic closed and convoys received escort-carrier protection, airborne anti-submarine aircraft became extremely efficient hunter-killers with the use of centimetric radar and airborne depth charges.
Wall tiles are usually glazed, and are often patterned by painting or embossing. However there were other technologies, equipment and tactics which moved the Battle of the Atlantic in the Allies' favour. These are usually ceramic, but other materials such as mirrored glass or polished metal can be used. He would later write, in Their Finest Hour (1949): "The only thing that ever really frightened me during the war was the U-boat peril." A major factor that averted Britain's defeat in the Battle of the Atlantic was her regained mastery of Naval-Enigma decryption. While ancient Roman building bricks were broader and thinner than modern ones and are therefore usually called tiles, the term wall tile is normally applied to finishing tiles. An exhibit in 2003 on "Secret War" at the Imperial War Museum, in London, quoted British Prime Minister Winston Churchill telling King George VI: "It was thanks to Ultra that we won the war." Churchill's greatest fear, even after Hitler had suspended Operation Sealion and invaded the Soviet Union, was that the German submarine wolf packs would succeed in strangling sea-locked Britain. See Laying tile
The spaces between the tiles are nowadays filled with sanded or unsanded floor grout, but traditionally mortar was used. There has been controversy about the influence of Allied Enigma decryption on the course of World War II. Floor tiles are typically set into mortar consisting of sand, cement and oftentimes a latex additive for extra strength. As with other history, but more than for most, the history of cryptology, especially its recent history, should be read carefully, due to its complexity and to possibly confusing or misleading agendas. Small mosaic tiles may be laid in various patterns. This can be traced to a number of causes:. Clay tiles may be painted and glazed. Several are unreliable in many respects.
These are commonly made of ceramic, clay, porcelain or stone. Many accounts of the Enigma-decryption story, and of other World War II cryptological happenings, have been published. They include ridge, hip and valley tiles. The National Security Agency retired the last of its rotor-based encryption systems, the KL-7 series, in the 1980s. There are also roof tiles for special positions, particularly where the planes of the several pitches meet. It was decided at this point to let the cat out of the bag, and revelations about some of Bletchley Park's operations were permitted in 1974. The tiles are usually hung in parallel rows, with each row overlapping the row below it to exclude rainwater and to cover the nails that hold the row below. By 1970 newer, computer-based ciphers were becoming popular as the world increasingly turned to computerised communications, and the usefulness of Enigma copies (and rotor machines generally) rapidly decreased.
Roof tiles are 'hung' from the framework of a roof by fixing them with nails. The same year, David Kahn in The Codebreakers described the 1945 capture of a Naval Enigma machine from U-505 and mentioned, somewhat in passing, that Enigma messages were already being read by that time, requiring "machines that filled several buildings." In 1971 Ladislas Farago's The Game of the Foxes gave an early published version of the myth of the purloined Enigma that enabled the British (according to Farago, Alfred Dillwyn Knox) to crack the cipher (Farago mentions an Abwehr Enigma). These include:. In 1967 the Polish military historian Władysław Kozaczuk in his book Bitwa o tajemnice (Secret War) first revealed that the German Enigma had been broken by Polish cryptologists before World War II. Because of their long history, a large number of shapes (or "profiles") of roof tiles have evolved. Some information about Enigma decryption did get out earlier, however. Some clay tiles have a waterproof glaze. Switzerland even developed its own version of the Enigma, the NEMA, and used it for decades (at least into the late '70s).
Modern materials such as concrete and plastic are also used. Their traffic was not so secure as they believed, however, which is of course one reason the British and Americans made the machines available. Roof tiles are designed mainly to keep out rain, and are traditionally made from locally available materials such as clay, slate, or wood (wooden tiles are called shingles). As mentioned, after the war, surplus Enigmas and Enigma-like machines were sold to many countries around the world, which remained convinced of the security of the remarkable cipher machines. . There is also a one-volume collection of reminiscences by Ultra veterans, Codebreakers (1993), edited by Hinsley and Alan Stripp.
Tiles are most often made from ceramic, with a hard glaze finish, but other materials are also commonly used, such as glass, slate, and reformed ceramic slurry, which is cast in a mould and fired. The official history of British intelligence in World War II was published in five volumes from 1979 to 1988. Tiles are often used to form wall and floor coverings, and can range from simple square tiles to complex mosaics. He was involved in Bletchley Park's intelligence analysis of decrypts, working between the cryptological operation and Winterbotham's distribution operation. Less precisely, the modern term can refer to any sort of construction tile or similar object, such as rectangular counters used in playing games (see tile-based game). Peter Calvocorressi's book, Top Secret Ultra (1980), is in this regard better written and more responsible. The word is derived from the French word tuile, which is, in turn, from the Latin word tegula, meaning a roof tile composed of baked clay. He worked on the operation to distribute Ultra to end consumers and, based on the evidence of his book, did not understand much about cryptology.
Tiles are generally used for covering roofs, floors, and walls, or other objects such as tabletops. Wintherbotham's book is very interesting, but is in error on many points. A tile is a manufactured piece of hard-wearing material such as ceramic, clay, stone, porcelain or even glass. Winterbotham, published The Ultra Secret. Mission or barrel tiles are semi-cylindrical tiles made by forming clay around a log and laid in alternating columns of convex and concave tiles. The British ban was finally lifted in 1974, the year that a key participant on the distribution side of the Ultra project, F.W. These result in a ridged pattern resembling a ploughed field. Nevertheless it was the public disclosure of Enigma decryption, in the book Enigma (1973) by French Intelligence officer Gustave Bertrand, that generated pressure to discuss the rest of the Enigma/Ultra story.
Pantiles - with an S-shaped profile, allowing adjacent tiles to interlock. Discussion by either the Polish or the French of Enigma breaks carried out early in the war would have been uninformed regarding breaks carried out during the balance of the war. Roman tiles - flat in the middle, with a concave curve at one end at a convex curve at the other, to allow interlocking. Since it was British and, later, American message-breaking which had been the most extensive, this meant that the importance of Enigma decrypts to the prosecution of the war remained unknown. This profile is suitable for stone and wooden tiles, and most recently, solar cells. The third explanation is given by Winterbotham (The Ultra Secret, introduction), who recounts that two weeks after V-E Day Churchill requested that former recipients of Ultra intelligence be asked not to divulge the source or the information they had received from it, in order that there might be neither damage to the future operations of the Secret Service nor any cause for the Allies' enemies to blame it for their defeat. Flat tiles - the simplest type, which are laid in regular overlapping rows. A second explanation relates to a misadventure of Winston Churchill's between the World Wars, when he publicly disclosed information obtained by decrypting Russian secret communications; this had prompted the Russians to change their cryptography, leading to a cryptological blackout.
Winterbotham's The Ultra Secret, after World War II the British gathered up all the Enigma machines they could find and sold them to Third World countries, confident that they could continue reading the messages of the machines' new owners. First, as David Kahn pointed out in his 1974 New York Times review of F.W. All may be true. Each has plausibility.
At least three versions exist as to why Ultra was kept secret so long. During that period the important contributions to the war effort of a great many people remained unknown, and they were unable to share in the glory of what is likely one of the chief reasons the Allies won the war — or, at least, as quickly as they did. While it is obvious why Britain and the United States went to considerable pains to keep Ultra a secret until the end of the war, it has been a matter of some conjecture why Ultra was kept officially secret for 29 years thereafter, until 1974. The Japanese are said to have obtained an Enigma machine as early as 1937, although it is debated whether they were given it by their German ally or bought a commercial version which, except for plugboard and actual rotor wirings, was essentially the German Army / Air Force machine.
These reports included reviews of German strategy and intentions, reports on direct inspections (in one case, of Normandy beach defenses) by the ambassador, and reports of long interviews with Hitler. Some Purple decrypts proved useful elsewhere, for instance detailed reports by Japan's ambassador to Germany which were encrypted on the Purple machine. It was also cracked, by the US Army's Signal Intelligence Service. In the Pacific theater, the Japanese cipher machine dubbed "Purple" by the Americans, and unrelated to the Enigmas, was used for highest-level Japanese diplomatic traffic.
The information it provided was accurate and timely, and Soviet agents in Switzerland (including Alexander Rado, the director) eventually took it quite seriously. The Lucy ring was operated, apparently, by one man, Rudolf Roessler, and was initially treated with considerable suspicion by the Soviets. It has been alleged that "Lucy" was, in major part, a way for the British to feed Ultra intelligence to the Soviets in a way that made it appear to have come from highly-placed espionage and not from cryptanalysis of German radio traffic. This was an extremely well informed, and rapidly responsive, ring which was able to get information "directly from the German General Staff Headquarters" — often on specific request.
An intriguing question concerns alleged use of Ultra information by the "Lucy" spy ring. (See Bamford's Body of Secrets in regard to the TICOM missions immediately after the war.). They just found it impossible to imagine anyone going to the immense effort required. Among the things they learned was that German cryptographers, at least, understood very well that Enigma messages might be read; they knew Enigma was not unbreakable.
After the War, American TICOM project teams found and detained a considerable number of German cryptographic personnel. Likewise, Ultra traffic suggested an attack in the Ardennes in 1944, but the Battle of the Bulge was a surprise to the Allies because the information was disregarded. Rommel's intentions just prior to the Battle of the Kasserine Pass in North Africa in 1942 had been suggested by Ultra, but this was not taken into account by the Americans. However, Ultra information was also at times misused or ignored.
The Germans considered Enigma traffic so secure that they openly discussed their plans and movements, handing the Allies huge amounts of information. Had they been better informed, they could have changed systems, forcing Allied cryptologists to start over. By 1945 almost all German Enigma traffic (Wehrmacht, Navy, Luftwaffe, Abwehr, SD, etc.) could be decrypted within a day or two, yet the Germans remained confident of its security. Intelligence from signals between Adolf Hitler and General Günther von Kluge was of considerable help during the campaign in France just after the Allied D-Day landings, particularly in regard to estimates of when German reserves might be committed to battle.
Ultra information was of considerable assistance to the British (Montgomery being "in the know" about Ultra) at El Alamein in Western Egypt in the long-running battle with the Afrika Korps under Rommel. British Admiral Cunningham also did some fancy footwork at a hotel in Egypt to prevent Axis agents from taking note of his movements and deducing that a major operation was planned. Breaking of some messages (not in German Enigma) led to the defeat of the Italian Navy at Capa Matapan, and was preceded by another "fortuitous" search-plane sighting. It is commonly claimed that the breaks into Naval Enigma resulted in the war being a year shorter, but given its effects on the Second Battle of the Atlantic alone, that might be an underestimate.
Its traffic was routinely readable. The U-boat network which used the four-rotor machine was known as Triton, codenamed Shark by the Allies. Realizing the error, the U-boat retransmitted the same message using the 3-rotor Enigma, giving the British sufficient clues to break the new machine soon after it became operational on February 1, 1942. Fortunately for the Allies, in December a U-boat mistakenly transmitted a message using the four-rotor machine before it was due to be inaugurated.
In 1941 British intelligence learned that the German Navy was about to introduce M4, a new version of Enigma with 4 rotors rather than 3. Coincidentally, German success in this respect almost exactly matched in time an Allied blackout from Naval Enigma. The more so, since his counterintelligence B-Dienst group, who had partially broken Royal Navy traffic (including its convoy codes early in the war), supplied enough information to support the idea that the Allies were unable to read Naval Enigma. However, the evidence was never enough to truly convince him that Naval Enigma was being read by the Allies.
Dönitz had the settings book changed anyway, blacking out Bletchley Park for a period. The analysis suggested that the signals problem, if there was one, wasn't due to the Enigma itself. Dönitz immediately asked for a review of Enigma's security. They all escaped and reported what had happened.
In one instance, three U-boats met at a tiny island in the Caribbean, and a British destroyer promptly showed up. Karl Dönitz received reports of "impossible" encounters between U-boats and enemy vessels which made him suspect some compromise of his communications. Some Germans had suspicions that all was not right with Enigma. In order to solve this problem the Allies, especially the US, "went industrial" and produced much larger versions of the Polish bomba that could rapidly test thousands of possible key settings.
The number remaining was still huge, and due to the new rotors that the Germans had added from time to time, that number was much larger than the Poles had faced. However, the new tricks only reduced the number of possible settings for a message. From this point on, Naval Enigma messages were being read constantly, even after changes to the ground settings. was likely to have been broadcast by a weather-reporting boat in the Atlantic, and that meant the message would almost certainly contain these cribs; and similarly for other traffic.
Thus a brief message sent from the west at 6 a.m. But by 1943 so much traffic had been decrypted that Allied cryptologists had an excellent understanding of the messages coming from various locations at various times. Charting decrypted Enigma traffic against British shipping losses for a given month shows a strong pattern of increased losses when Naval Enigma was blacked out, and vice versa. Even these brief periods were enough to markedly affect the course of the war.
This technique was, at Bletchley, called gardening. In the case of mining this or that channel, they expected the word "Minen" to occur in some of the messages. To do this they would drop mines (or take some other action), then listen for messages thus provoked. In other cases, the Allies induced the Germans to provide them with cribs.
More fantastic scenarios were contemplated, such as Ian Fleming's James Bondian suggestion to "crash" captured German bombers into the sea near German shipping, hoping they would be "rescued" by a ship's crew, which would be taken captive by commandos concealed in the plane who would capture the cryptographic material intact. These included U-boats U-505 (1944) and U-559 (1942) and a number of German weather boats and converted trawlers such as the Krebs, captured during a raid on the Lofoten Islands off Norway. Naval Enigma machines or settings books were captured from a total of 7 U-boats and 8 German surface ships. And it was done again shortly afterwards.
On 7 May 1941 the Royal Navy deliberately captured a German weather ship, together with cipher equipment and codes; and 2 days later U-110 was captured, together with an Enigma machine, code book, operating manual and other information that enabled Bletchley Park to break submarine messages until the end of June. Different and far more difficult methods had to be used to break into Naval Enigma traffic, and with the U-boats running freely in the Atlantic after the fall of France, a more direct approach recommended itself. There was no hint at all to the initial settings for the machines, and there was little probable plaintext to use, either. From the beginning, the Naval version of Enigma used a larger selection of rotors than did the Army or Air Force versions, as well as operating procedures that made it much more secure than other Enigma variants.
In the summer of 1940, British cryptanalysts, who were successfully breaking German Air Force Enigma-cypher variants, were able to give Churchill information about the issuing of maps of England and Ireland to the Sealion invasion forces. Liaison officers were appointed for each field command to manage and control dissemination. The distribution of Ultra information to Allied commanders and units in the field involved considerable risk of discovery by the Germans, and great care was taken to control both the information and knowledge of how it was obtained. The British were, it is said, more disciplined about such measures than the Americans, and this difference was a source of friction between them.
Ultra information was used to attack and sink many Afrika Korps supply ships bound for North Africa; but, as in the North Atlantic, every time such information was used, an "innocent" explanation had to be provided: often scout planes were sent on otherwise unnecessary missions, to ensure they were spotted by the Germans. This was taken to the extreme that, for instance, though they knew from intercepts the whereabouts of U-boats lying in wait in mid-Atlantic, the U-boats often were not hunted unless a "cover story" could be arranged — a search plane might be "fortunate enough" to sight the U-boat, thus explaining the Allied attack. The Allies were seriously concerned to conceal from the Axis command that they had broken into Enigma traffic. Usable Ultra information came too late to be of great help during the Battle of Britain.
Instead the Germans every so often added new rotors to the mix, thereby allowing the British to work out the wirings of the newest rotors. However, due to the expense and difficulty of getting new rotors to all ships and units, this was never done. And had German operating practices been more secure, things would have been much more difficult for the British cryptologists. Had the Germans ever replaced every rotor at the same time, the British might not have been able to break back into the system.
Other German operators used "form letters" for daily reports, notably weather reports, so the same crib might be used every day. Analysts were set to finding such messages in the sea of daily intercepts, which winnowed out enough possibilities to allow Bletchley to use other original Polish techniques as well to find the initial daily keys. In other cases, as they had before the war, Enigma operators would constantly use the same settings for their message keys, often their own initials or those of a girlfriend (one apparently had the initials "C.I.L.," so Bletchley Park named such hints "cillies"). A British analyst received from an intercept station a long message containing not a single "T" and immediately realised what had happened.
In one instance, a clerk was asked to send a test message, and hit the T key repeatedly and transmitted the resulting letters. On some occasions, German cipher clerks helped the Allied cryptanalysts. This provided a clue to message keys. With a probable plaintext fragment and the knowledge that no letter could be enciphered as itself, a corresponding ciphertext fragment could often be identified.
Another technique counted on common German phrases, such as "Heil Hitler" or "please respond," which were likely to occur in a given plaintext; a successful guess as to a plaintext was known at Bletchley as a crib. One mode of attack on the Enigma relied on the fact that the reflector (a patented feature of the Enigma machines) guaranteed that no letter could be enciphered as itself, so an A could not be sent as an A. 31, 58.). (Kozaczuk, pp.
Even before the war, it had been a challenge to the Poles; only a portion of Naval Enigma had been read at B.S.-4 (the Cipher Bureau's German section) due to limited Bureau personnel and resources and because knowledge of army and air force traffic had been deemed more important to Poland's defense. (For a discussion of the many identical techniques used by the Poles and the British, see Kozaczuk 1984, appendix F.) A particular challenge would be German Naval Enigma. British attacks on the Enigmas were similar to the original Polish methods, but naturally continued evolving to keep pace with the growing complexity of German equipment and procedures. Such information enabled the Allies to maintain an accurate picture of enemy plans and orders of battle, and when appropriately used was of great value in formulating Allied strategy and tactics.
By 1943, a large proportion of intercepts (over 2,000 daily at the height of operations) were routinely read, including some from Hitler himself. Among the latter was Alan Turing, one of the founders of modern computing. The Bletchley Park workers included a mix of crossword enthusiasts, chess mavens, mathematicians and pioneer computer scientists. Such was the secrecy surrounding reports from "Boniface" that "his" reports were taken directly to Prime Minister Winston Churchill in a locked box to which he personally held the key.
Earlier in the war, the product from Bletchley Park was codenamed "Boniface" to give the impression to the uninitiated that the source was a secret agent. Eventually there would be a very large organization controlling the distribution of the resulting – secret – decrypted information, which in time came to be called "Ultra." Strict rules were established to restrict the number of people who knew about the existence of Ultra in the hope of ensuring that nothing (e.g., leaks, actions) would alert the Axis powers that the Allies were reading their messages. They also set up a large interception network to collect enciphered messages for the cryptologists at Bletchley and at five near-by off-site outstations at Adstock, Gayhurst, Wavendon, Stanmore, and Eastcote. (Work that would be done after the outbreak of World War II in France, at PC Bruno outside Paris, would be strictly the domain of the Polish Cipher Bureau cryptologists who had escaped Poland.) Early in 1939 Britain's secret service had installed its Government Code and Cypher School (GC&CS) at Bletchley Park, 50 miles (80 km) north of London, to work on enemy message traffic.
Armed with this Polish assistance, the British began work on German Enigma traffic. Since neither the French nor the British had succeeded in breaking Enigma traffic, this was a major windfall for Poland's western allies. This happened during the famous meeting at Pyry, in the Kabaty Woods south of Warsaw, on July 25, 1939. Well before 1938, much German Enigma traffic was being routinely decrypted by the Poles; but accelerating changes in German operations (encipherment procedures, frequency of key changes, greater rotor choice) and looming war led the Poles to share their achievements in Enigma decryption with France and England.
They designed working "doubles" of the Enigmas and developed equipment and techniques which helped in finding the keys needed for decryption (including the "grill," "clock," cyclometer, cryptologic bomb, and perforated sheets). Together with two colleagues at the Polish General Staff's Cipher Bureau (Polish: Biuro Szyfrów), he went on to develop practical methods of decrypting Enigma traffic. The 27-year-old mathematician used advanced mathematics (group theory, particularly permutation theory) for the first time to crack the Enigma system. The fundamental break into the Enigma systems that were to be used by Nazi Germany was made in Poland in 1932, just on the eve of Adolf Hitler's accession to power, by Marian Rejewski.
Dilly Knox, of GC&CS, is said to have broken it during the 1920s. The commercial versions were not so secure. Each variant required different cryptanalytic treatment. The German Army, Navy, Air Force, Nazi party, Gestapo, and German diplomats all used Enigma machines, but there were several variants (eg, the Abwehr used a four-rotor machine without a plugboard, and Naval Enigma used different key management from that of the Army or Air Force, making its traffic far more difficult to cryptanalyze).
These messages were generated on several variants of an electro-mechanical rotor machine called "Enigma." The Enigma machine was widely thought to be in practice unbreakable in the 1920s, when a variant of the commercial Model D was first used by the German Navy. Ultra material largely came from German cipher traffic. . Eisenhower, as at war's end describing Ultra as having been "decisive" to Allied victory in World War II.
Winterbotham, in The Ultra Secret (1974), quotes the western Supreme Allied Commander, Dwight D. F.W. Although the volume of messages read from this system was much smaller than that from the Enigma, they more than made up for it in their importance. It was eventually attacked using the Colossus, considered to be the forerunner of the electronic programmable digital computer.
These also were broken, particularly TUNNY, which the British thoroughly penetrated. Several distinct systems were used, principally the Lorenz SZ 40/42 (initially code-named TUNNY) and Geheimfernschreiber (code-named STURGEON). Later the Germans began to use several stream cipher teleprinter systems for their most important traffic, to which the British gave the generic code-name FISH. For some time thereafter, "Ultra" was used only for intelligence from this channel.
Until the name "Ultra" was adopted, there were several cryptonyms for intelligence from this source, including Boniface. Much of the German cipher traffic was encrypted on the Enigma machine, hence the term "Ultra" has often been used almost synonymously with "Enigma decrypts.". The name arose because the code-breaking success was considered more important than the highest security classification available at the time (Most Secret) and so was regarded as being Ultra Secret. The term eventually became the standard designation in both Britain and the United States for all intelligence from high-level cryptanalytic sources.
Ultra (sometimes capitalised ULTRA) was the name used by the British for intelligence resulting from decryption of German communications in World War II. page 202. ISBN 0747570787. ^ Fredrick Taylor Dresden:Tuesday 13 February 1945, Pub (NY): HarperCollins, ISBN 0060006765, Pub (Lon): Bloomsbury.
Her account appears in Sebag-Montefiore's book. The fate of the German Enigma spy "Asché" was not publicly known till Hugh Sebag-Montefiore tracked down Asché's daughter about 1999. Sixth, many writers have not done their research. The account was claimed to have been written from the unpublished memoirs of an Australian cryptanalyst, but substantive parts of the published version appear to have been simply invented.
At least one incident is known of whole-cloth fabrication regarding British cryptanalytic progress on a particular World War II Japanese Navy cryptosystem. Fifth, several authors have had agendas which took precedence over accuracy in their reports. Fourth, governments have chosen to keep secret or release information to serve their own purposes, not historical accuracy or completeness. In any case, none of them were originally written, nor made available later, with historical clarity in mind; considerable perspective is required to make reasonable use of them.
Those not actually lost have taken decades to be released to the public, and some are, presumably, still to be released. Third, documents have been 'lost' in secret archives. It requires someone with a considerable understanding of cryptanalysis, and of Enigma, to adequately comprehend -- or explain -- how either worked. Second, the cryptanalytic work was tricky and quite technical.
Peter Calvocoressi's book, Top Secret Ultra, contains a sounder account of the episode. The story about Churchill deliberately not interfering with a Luftwaffe bombing of Coventry which was known through Enigma decrypts is one such. Several books have been published by those on the Ultra distribution side at Bletchley Park, but work there was seriously compartmentalised, making it difficult to credit some episodes when they are due only to such a source. First, not all the authors were in a position to know.