Before the Germans increased the security of their operating procedures, British cryptanalysts diagnosed how the unseen machine functioned and built an imitation of it called "British Tunny".
In August 1941, a blunder by German operators led to the transmission of two versions of the same message with identical machine settings. These were intercepted and worked on at Bletchley Park. First, John Tiltman, a very talented GC&CS cryptanalyst, derived a keystream of almost 4000 characters. Then Bill Tutte, a newly arrived member of the Research Section, used this keystream to work out the logical structure of the Lorenz machine. He deduced that the twelve wheels consisted of two groups of five, which he named the χ (chi) and ψ (psi) wheels, the remaining two he called μ (mu) or "motor" wheels. The chi wheels stepped regularly with each letter that was encrypted, while the psi wheels stepped irregularly, under the control of the motor wheels.
With a sufficiently random keystream, a Vernam cipher removes the natural language property of a plaintext message of having an uneven frequency distribution of the different characters, to produce a uniform distribution in the ciphertext. The Tunny machine did this well. However, the cryptanalysts worked out that by examining the frequency distribution of the character-to-character changes in the ciphertext, instead of the plain characters, there was a departure from uniformity which provided a way into the system. This was achieved by "differencing" in which each bit or character was XOR-ed with its successor. After Germany surrendered, allied forces captured a Tunny machine and discovered that it was the electromechanical Lorenz SZ (Schlüsselzusatzgerät, cipher attachment) in-line cipher machine.
In order to decrypt the transmitted messages, two tasks had to be performed. The first was "wheel breaking", which was the discovery of the cam patterns for all the wheels. These patterns were set up on the Lorenz machine and then used for a fixed period of time for a succession of different messages. Each transmission, which often contained more than one message, was enciphered with a different start position of the wheels. Alan Turing invented a method of wheel-breaking that became known as Turingery. Turing's technique was further developed into "Rectangling", for which Colossus could produce tables for manual analysis. Colossi 2, 4, 6, 7 and 9 had a "gadget" to aid this process.
and counting the number of times it yielded "false" (zero). If this number exceeded a pre-defined threshold value known as the "set total", it was printed out. The cryptanalyst would examine the printout to determine which of the putative start positions was most likely to be the correct one for the chi-1 and chi-2 wheels.
This technique would then be applied to other pairs of, or single, impulses to determine the likely start position of all five chi wheels. From this, the de-chi (D) of a ciphertext could be obtained, from which the psi component could be removed by manual methods. If the frequency distribution of characters in the de-chi version of the ciphertext was within certain bounds, "wheel setting" of the chi wheels was considered to have been achieved, and the message settings and de-chi were passed to the "Testery". This was the section at Bletchley Park led by Major Ralph Tester where the bulk of the decrypting work was done by manual and linguistic methods.
Flowers had been brought in to design the Heath Robinson's combining unit. He was not impressed by the system of a key tape that had to be kept synchronised with the message tape and, on his own initiative, he designed an electronic machine which eliminated the need for the key tape by having an electronic analogue of the Lorenz (Tunny) machine. He presented this design to Max Newman in February 1943, but the idea that the one to two thousand thermionic valves (vacuum tubes and thyratrons) proposed, could work together reliably, was greeted with great scepticism, so more Robinsons were ordered from Dollis Hill. Flowers, however, knew from his pre-war work that most thermionic valve failures occurred as a result of the thermal stresses at power-up, so not powering a machine down reduced failure rates to very low levels. Additionally, if the heaters were started at a low voltage then slowly brought up to full voltage, thermal stress was reduced. The valves themselves could be soldered-in to avoid problems with plug-in bases, which could be unreliable. Flowers persisted with the idea and obtained support from the Director of the Research Station, W Gordon Radley.
Flowers and his team of some fifty people in the switching group spent eleven months from early February 1943 designing and building a machine that dispensed with the second tape of the Heath Robinson, by generating the wheel patterns electronically. Flowers used some of his own money for the project. This prototype, Mark 1 Colossus, contained 1,600 thermionic valves (tubes). It performed satisfactorily at Dollis Hill on 8 December 1943 and was dismantled and shipped to Bletchley Park, where it was delivered on 18 January and re-assembled by Harry Fensom and Don Horwood. It was operational in January and it successfully attacked its first message on 5 February 1944. It was a large structure and was dubbed 'Colossus'. A memo held in the National Archives written by Max Newman on 18 January 1944 records that "Colossus arrives today".
During the development of the prototype, an improved design had been developed – the Mark 2 Colossus. Four of these were ordered in March 1944 and by the end of April the number on order had been increased to twelve. Dollis Hill was put under pressure to have the first of these working by 1 June. Allen Coombs took over leadership of the production Mark 2 Colossi, the first of which – containing 2,400 valves – became operational at 08:00 on 1 June 1944, just in time for the Allied Invasion of Normandy on D-Day. Subsequently, Colossi were delivered at the rate of about one a month. By the time of V-E Day there were ten Colossi working at Bletchley Park and a start had been made on assembling an eleventh. Seven of the Colossi were used for 'wheel setting' and three for 'wheel breaking'.
The main units of the Mark 2 design were as follows.
Most of the design of the electronics was the work of Tommy Flowers, assisted by William Chandler, Sidney Broadhurst and Allen Coombs; with Erie Speight and Arnold Lynch developing the photoelectric reading mechanism. Coombs remembered Flowers, having produced a rough draft of his design, tearing it into pieces that he handed out to his colleagues for them to do the detailed design and get their team to manufacture it. The Mark 2 Colossi were both five times faster and were simpler to operate than the prototype.
The first job in operating Colossus for a new message was to prepare the paper tape loop. This was performed by the Wrens who stuck the two ends together using Bostik glue, ensuring that there was a 150-character length of blank tape between the end and the start of the message. Using a special hand punch they inserted a start hole between the third and fourth channels 2+1⁄2 sprocket holes from the end of the blank section, and a stop hole between the fourth and fifth channels 1+1⁄2 sprocket holes from the end of the characters of the message. These were read by specially positioned photocells and indicated when the message was about to start and when it ended. The operator would then thread the paper tape through the gate and around the pulleys of the bedstead and adjust the tension. The two-tape bedstead design had been carried on from Heath Robinson so that one tape could be loaded whilst the previous one was being run. A switch on the Selection Panel specified the "near" or the "far" tape.
After performing various resetting and zeroizing tasks, the Wren operators would, under instruction from the cryptanalyst, operate the "set total" decade switches and the K2 panel switches to set the desired algorithm. They would then start the bedstead tape motor and lamp and, when the tape was up to speed, operate the master start switch.
Input to the processors came from two sources, the shift registers from tape reading and the thyratron rings that emulated the wheels of the Tunny machine. The characters on the paper tape were called Z and the characters from the Tunny emulator were referred to by the Greek letters that Bill Tutte had given them when working out the logical structure of the machine. On the selection panel, switches specified either Z or ΔZ, either
χ
{\displaystyle \chi }
or Δ
χ
{\displaystyle \chi }
and either
ψ
{\displaystyle \psi }
or Δ
ψ
{\displaystyle \psi }
for the data to be passed to the jack field and 'K2 switch panel'. These signals from the wheel simulators could be specified as stepping on with each new pass of the message tape or not.
The K2 switch panel had a group of switches on the left-hand side to specify the algorithm. The switches on the right-hand side selected the counter to which the result was fed. The plugboard allowed less specialized conditions to be imposed. Overall the K2 switch panel switches and the plugboard allowed about five billion different combinations of the selected variables.
Although the Colossus was the first of the electronic digital machines with programmability, albeit limited by modern standards, it was not a general-purpose machine, being designed for a range of cryptanalytic tasks, most involving counting the results of evaluating Boolean algorithms.
Colossus and the reasons for its construction were highly secret and remained so for 30 years after the War. Consequently, it was not included in the history of computing hardware for many years, and Flowers and his associates were deprived of the recognition they were due. All but two of the Colossi were dismantled after the war and parts returned to the Post Office. Some parts, sanitised as to their original purpose, were taken to Max Newman's Royal Society Computing Machine Laboratory at Manchester University. Two Colossi, along with two Tunny machines, were retained and moved to GCHQ's new headquarters at Eastcote in April 1946, and then to Cheltenham between 1952 and 1954. One of the Colossi, known as Colossus Blue, was dismantled in 1959; the other in the 1960s. Tommy Flowers was ordered to destroy all documentation. He duly burnt them in a furnace and later said of that order:
The Colossi were adapted for other purposes, with varying degrees of success; in their later years they were used for training. Jack Good related how he was the first to use Colossus after the war, persuading the US National Security Agency that it could be used to perform a function for which they were planning to build a special-purpose machine. Colossus was also used to perform character counts on one-time pad tape to test for non-randomness.
A small number of people who were associated with Colossus—and knew that large-scale, reliable, high-speed electronic digital computing devices were feasible—played significant roles in early computer work in the UK and probably in the US. However, being so secret, it had little direct influence on the development of later computers; it was EDVAC that was the seminal computer architecture of the time. In 1972, Herman Goldstine, who was unaware of Colossus and its legacy to the projects of people such as Alan Turing (ACE), Max Newman (Manchester computers) and Harry Huskey (Bendix G-15), wrote that,
Randell's efforts started to bear fruit in the mid-1970s. The secrecy about Bletchley Park had been broken when Group Captain Winterbotham published his book The Ultra Secret in 1974. Randell was researching the history of computer science in Britain for a conference on the history of computing held at the Los Alamos Scientific Laboratory, New Mexico on 10–15 June 1976, and got permission to present a paper on wartime development of the COLOSSI at the Post Office Research Station, Dollis Hill (in October 1975 the British Government had released a series of captioned photographs from the Public Record Office). The interest in the "revelations" in his paper resulted in a special evening meeting when Randell and Coombs answered further questions. Coombs later wrote that no member of our team could ever forget the fellowship, the sense of purpose and, above all, the breathless excitement of those days. In 1977 Randell published an article The First Electronic Computer in several journals.
In October 2000, a 500-page technical report on the Tunny cipher and its cryptanalysis—entitled General Report on Tunny—was released by GCHQ to the national Public Record Office, and it contains a fascinating paean to Colossus by the cryptographers who worked with it:
A team led by Tony Sale built a fully functional reconstruction of a Colossus Mark 2 between 1993 and 2008. In spite of the blueprints and hardware being destroyed, a surprising amount of material had survived, mainly in engineers' notebooks, but a considerable amount of it in the U.S. The optical tape reader might have posed the biggest problem, but Dr. Arnold Lynch, its original designer was able to redesign it to his own original specification. The reconstruction is on display, in the historically correct place for Colossus No. 9, at The National Museum of Computing, in H Block Bletchley Park in Milton Keynes, Buckinghamshire.
In November 2007, to celebrate the project completion and to mark the start of a fundraising initiative for The National Museum of Computing, a Cipher Challenge pitted the rebuilt Colossus against radio amateurs worldwide in being first to receive and decode three messages enciphered using the Lorenz SZ42 and transmitted from radio station DL0HNF in the Heinz Nixdorf MuseumsForum computer museum. The challenge was easily won by radio amateur Joachim Schüth, who had carefully prepared for the event and developed his own signal processing and code-breaking code using Ada. The Colossus team were hampered by their wish to use World War II radio equipment, delaying them by a day because of poor reception conditions. Nevertheless, the victor's 1.4 GHz laptop, running his own code, took less than a minute to find the settings for all 12 wheels. The German codebreaker said: "My laptop digested ciphertext at a speed of 1.2 million characters per second—240 times faster than Colossus. If you scale the CPU frequency by that factor, you get an equivalent clock of 5.8 MHz for Colossus. That is a remarkable speed for a computer built in 1944."
The Cipher Challenge verified the successful completion of the rebuilding project. "On the strength of today's performance Colossus is as good as it was six decades ago", commented Tony Sale. "We are delighted to have produced a fitting tribute to the people who worked at Bletchley Park and whose brainpower devised these fantastic machines which broke these ciphers and shortened the war by many months."
"Colossus". The National Museum of Computing. Retrieved 25 January 2021. https://www.tnmoc.org/colossus
Copeland "Introduction" 2006, p. 2. - Copeland, B. Jack (2006), Introduction
Sale 2000. - Sale, Tony (2000), "The Colossus of Bletchley Park – The German Cipher System", in Rojas, Raúl; Hashagen, Ulf (eds.), The First Computers: History and Architecture, Cambridge, Massachusetts: The MIT Press, pp. 351–364, ISBN 0-262-18197-5
"Colossus". The National Museum of Computing. Retrieved 25 January 2021. https://www.tnmoc.org/colossus
Golden, Frederic (29 March 1999), "Who Built The First Computer?", Time, vol. 153, no. 12, archived from the original on 6 January 2006 https://web.archive.org/web/20060106193802/http://www.time.com/time/magazine/article/0,9171,990596,00.html
Copeland, Jack, "Colossus: The first large scale electronic computer", Colossus-computer.com, retrieved 21 October 2012 /wiki/Jack_Copeland
"Colossus". The National Museum of Computing. Retrieved 25 January 2021. https://www.tnmoc.org/colossus
Flowers 1983, p. 246. - Flowers, Thomas H. (1983), "The Design of Colossus", Annals of the History of Computing, 5 (3): 239–252, doi:10.1109/MAHC.1983.10079, S2CID 39816473 http://www.ivorcatt.com/47c.htm
Flowers 1983, p. 246. - Flowers, Thomas H. (1983), "The Design of Colossus", Annals of the History of Computing, 5 (3): 239–252, doi:10.1109/MAHC.1983.10079, S2CID 39816473 http://www.ivorcatt.com/47c.htm
Barber, Nicola (21 December 2015). Who Broke the Wartime Codes?. Capstone. ISBN 9781484635599. Retrieved 26 October 2017 – via Google Books. 9781484635599
Preneel, Bart, ed. (2000), "Colossus and the German Lorenz Cipher – Code Breaking in WW II" (PDF), Advances in Cryptology - EUROCRYPT 2000: International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium May 14-18, 2000, Proceedings, Lecture Notes in Computer Science, Springer, p. 417, doi:10.1007/3-540-45539-6_29, ISBN 978-3540675174, archived (PDF) from the original on 20 November 2008 978-3540675174
GCHQ 2024. - "GCHQ Celebrates 80 Years of Colossus". GCHQ. 18 January 2024. Retrieved 21 January 2024. https://www.gchq.gov.uk/news/colossus-80
"coltalk_2". Codesandciphers.org.uk. Retrieved 26 October 2017. https://www.codesandciphers.org.uk/lorenz/pods/coltalk_2.html
Campbell-Kelly, Martin (31 August 2011). "Tony Sale obituary". The Guardian. Retrieved 26 October 2017. https://www.theguardian.com/theguardian/2011/aug/31/tony-sale-obituary
Colossus – The Rebuild Story, The National Museum of Computing, archived from the original on 18 April 2015, retrieved 13 May 2017 https://web.archive.org/web/20150418230306/http://www.tnmoc.org/colossus-rebuild-story
Good, Michie & Timms 1945, 1 Introduction: 11 German Tunny, 11A Fish Machines, (c) The German Ciphered Teleprinter, p. 4. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Hinsley, F. H.; Stripp, Alan (2001). "PART THREE: Fish". Codebreakers: The Inside Story of Bletchley Park. Oxford University Press. ISBN 978-0-19-280132-6. Retrieved 26 October 2017 – via Google Books. 978-0-19-280132-6
Budiansky 2006, pp. 55–56. - Budiansky, Stephen (2006), Colossus, Codebreaking, and the Digital Age, pp. 52–63
Tutte 2006, p. 357. - Tutte, William T. (2006), Appendix 4: My Work at Bletchley Park, pp. 352–369
Good, Michie & Timms 1945, 1 Introduction: 11 German Tunny, 11C Wheel Patterns, (b) Differenced and Undifferenced Wheels, p. 11. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Good, Michie & Timms 1945, 1 Introduction: 11 German Tunny, 11A Fish Machines, (c) The German Ciphered Teleprinter, p. 4. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Copeland "Turingery" 2006, pp. 378–385. - Copeland, B. Jack (2006), Turingery
Good, Michie & Timms 1945, 24 – Rectangling: 24B Making and Entering Rectangles pp. 114–115, 119–120. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Good, Michie & Timms 1945, 1 Introduction: 11 German Tunny, 11E The Tunny Network, (b) Wheel-breaking and Setting, p. 15. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Small 1944, p. 15. - Small, Albert W. (December 1944), The Special Fish Report http://www.codesandciphers.org.uk/documents/small/smallix.htm
Good, Michie & Timms 1945, 1 Introduction: 12 Cryptographic Aspects, 12A The Problem, (a) Formulae and Notation, p. 16. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Good, Michie & Timms 1945, 1 Introduction: 11 German Tunny, 11B The Tunny Cipher Machine, (e) Psi-key, p. 7. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Good, Michie & Timms 1945, 1 Introduction: 12 Cryptographic Aspects, 12A The Problem, (a) Formulae and Notation, p. 16. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Good, Michie & Timms 1945, 1 Introduction: 11 German Tunny, 11C Wheel Patterns, (b) Differenced and Undifferenced Wheels, p. 11. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
The Boolean or "truth" function XOR, also known as Exclusive disjunction and Exclusive or, is the same as binary modulo 2 addition and subtraction. /wiki/Truth_function
Good, Michie & Timms 1945, 1 Introduction: 11 German Tunny, 11B The Tunny Cipher Machine, (a) Addition, p. 5. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Budiansky 2006, pp. 58–59. - Budiansky, Stephen (2006), Colossus, Codebreaking, and the Digital Age, pp. 52–63
Carter 2008, pp. 18–19. - Carter, Frank (2008), Codebreaking with the Colossus Computer, Bletchley Park Reports, vol. 1 (New ed.), Bletchley Park Trust, ISBN 978-1-906723-00-2
Small 1944, p. 65. - Small, Albert W. (December 1944), The Special Fish Report http://www.codesandciphers.org.uk/documents/small/smallix.htm
Small 1944, p. 15. - Small, Albert W. (December 1944), The Special Fish Report http://www.codesandciphers.org.uk/documents/small/smallix.htm
Roberts, Jerry (2009). Capt. Jerry Roberts: My Top Secret Codebreaking at Bletchley Park 1941 to 45: Lecture on 11 March 2009. University College London. 34 minutes in. Archived from the original on 24 November 2021 – via YouTube. /wiki/Jerry_Roberts
Copeland 2006, p. 77. - Copeland, B. Jack, ed. (2006), Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford: Oxford University Press, ISBN 978-0-19-284055-4
Good, Michie & Timms 1945, 3 Organisation: 31 Mr Newman's section, p. 276. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
GCHQ 2024. - "GCHQ Celebrates 80 Years of Colossus". GCHQ. 18 January 2024. Retrieved 21 January 2024. https://www.gchq.gov.uk/news/colossus-80
Anderson 2007, p. 8. - Anderson, David (2007), Was the Manchester Baby conceived at Bletchley Park? (PDF), British Computer Society, archived from the original (PDF) on 23 September 2015, retrieved 25 April 2015 https://web.archive.org/web/20150923192838/http://www.bcs.org/upload/pdf/ewic_tur04_paper3.pdf
Flowers had been appointed MBE in June 1943.
Randell 1980, p. 9. - Randell, Brian (1980), "The Colossus" (PDF), in Metropolis, N.; Howlett, J.; Rota, Gian-Carlo (eds.), A History of Computing in the Twentieth Century, Elsevier Science, pp. 47–92, ISBN 978-0124916500 http://www.cs.ncl.ac.uk/publications/books/papers/133.pdf
Budiansky 2000, p. 314. - Budiansky, Stephen (2000), Battle of wits: The Complete Story of Codebreaking in World War II, Free Press, ISBN 978-0684859323 https://archive.org/details/battleofwitscomp00budi
Good, Michie & Timms 1945, 1 Introduction: 15 Some Historical Notes, 15A First Stages in Machine Development, (c) Heath Robinson, p. 33. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Flowers 2006, p. 96. - Flowers, Thomas H. (2006), Colossus
Flowers 1983, p. 244. - Flowers, Thomas H. (1983), "The Design of Colossus", Annals of the History of Computing, 5 (3): 239–252, doi:10.1109/MAHC.1983.10079, S2CID 39816473 http://www.ivorcatt.com/47c.htm
Copeland "Machine against Machine" 2006, p. 72. - Copeland, B. Jack (2006), Machine against Machine
Copeland "Machine against Machine" 2006, p. 74. - Copeland, B. Jack (2006), Machine against Machine
Flowers 2006, p. 80. - Flowers, Thomas H. (2006), Colossus
Randell 2006, p. 143. - Randell, Brian (2006), Of Men and Machines, pp. 141–149
Boden, Margaret (2000), Mind as Machine: A History of Cognitive Science, Oxford University Press, p. 159, ISBN 978-0199241446 978-0199241446
Atkinson, Paul (2010), Computer (Objekt), Reaktion Books, p. 29, ISBN 978-1861896643 978-1861896643
Flowers 2006, p. 80. - Flowers, Thomas H. (2006), Colossus
Copeland 2010. - Copeland, B. Jack (2010), "Colossus: Breaking the German 'Tunny' Code at Bletchley Park. An Illustrated History", The Rutherford Journal, 3
Colossus – The Rebuild Story, The National Museum of Computing, archived from the original on 18 April 2015, retrieved 13 May 2017 https://web.archive.org/web/20150418230306/http://www.tnmoc.org/colossus-rebuild-story
Fensom, Jim (8 November 2010), "Harry Fensom obituary", The Guardian, London, retrieved 17 October 2012 https://www.theguardian.com/theguardian/2010/nov/08/harry-fensom-obituary
Sterling, Christopher H., ed. (2007), Military Communications: From Ancient Times to the 21st Century, ABC-CLIO, ISBN 978-1851097326 978-1851097326
Preneel, Bart, ed. (2000), "Colossus and the German Lorenz Cipher – Code Breaking in WW II" (PDF), Advances in Cryptology - EUROCRYPT 2000: International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium May 14-18, 2000, Proceedings, Lecture Notes in Computer Science, Springer, p. 417, doi:10.1007/3-540-45539-6_29, ISBN 978-3540675174, archived (PDF) from the original on 20 November 2008 978-3540675174
Copeland "Machine against Machine" 2006, p. 75. - Copeland, B. Jack (2006), Machine against Machine
Gannon 2007, p. 283. - Gannon, Paul (2007), Colossus: Bletchley Park's Greatest Secret, London: Atlantic Books, ISBN 978-1-84354-331-2
Good, Michie & Timms 1945, 1 Introduction: 15 – Some Historical Notes, 15C Period of Expansion, (b) Colossus, p. 35. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Randell, Brian; Fensom, Harry; Milne, Frank A. (15 March 1995), "Obituary: Allen Coombs", The Independent, London, retrieved 18 October 2012 /wiki/Brian_Randell
Good, Michie & Timms 1945, 1 Introduction: 15 – Some Historical Notes, 15C Period of Expansion, (b) Colossus, p. 35. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Kenyon 2019, p. 60. - Kenyon, David (2019). Bletchley Park and D-Day: The Untold Story of How the Battle for Normandy Was Won. New Haven and London: Yale University Press. ISBN 978-0-300-24357-4.
Flowers 2006, p. 96. - Flowers, Thomas H. (2006), Colossus
Flowers 1983, pp. 249–252. - Flowers, Thomas H. (1983), "The Design of Colossus", Annals of the History of Computing, 5 (3): 239–252, doi:10.1109/MAHC.1983.10079, S2CID 39816473 http://www.ivorcatt.com/47c.htm
Flowers 1983, pp. 243, 245. - Flowers, Thomas H. (1983), "The Design of Colossus", Annals of the History of Computing, 5 (3): 239–252, doi:10.1109/MAHC.1983.10079, S2CID 39816473 http://www.ivorcatt.com/47c.htm
Coombs 1983. - Coombs, Allen W. M. (July 1983), "The Making of Colossus", IEEE Annals of the History of Computing, 5 (3): 253–259, doi:10.1109/MAHC.1983.10085, S2CID 597530 http://www.ivorcatt.com/47d.htm
For comparison, later stored-program computers such as the Manchester Mark 1 of 1949 used 4,050 valves,[56] while ENIAC (1946) used 17,468 valves. /wiki/Stored-program_computer
Flowers 1983. - Flowers, Thomas H. (1983), "The Design of Colossus", Annals of the History of Computing, 5 (3): 239–252, doi:10.1109/MAHC.1983.10079, S2CID 39816473 http://www.ivorcatt.com/47c.htm
Flowers 2006, p. 100. - Flowers, Thomas H. (2006), Colossus
This would now be called a systolic array. /wiki/Systolic_array
Flowers 2006, p. 100. - Flowers, Thomas H. (2006), Colossus
Copeland 2011. - Copeland, B. Jack (2011), Colossus and the Dawning of the Computer Age, pp. 305–327
"Biography of Professor Tutte - Combinatorics and Optimization". Uwaterloo.ca. 13 March 2015. Archived from the original on 19 August 2019. Retrieved 26 October 2017. https://web.archive.org/web/20190819115149/https://uwaterloo.ca/combinatorics-and-optimization/about/professor-william-t-tutte/biography-professor-tutte#bletchley
Good, Michie & Timms 1945, 1 Introduction: 15 – Some Historical Notes, 15C Period of Expansion, (b) Colossus, p. 35. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Good, Michie & Timms 1945, 5 Machines: 53 Colossus 53A Introduction, p.333. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Flowers 1983, pp. 241, 242. - Flowers, Thomas H. (1983), "The Design of Colossus", Annals of the History of Computing, 5 (3): 239–252, doi:10.1109/MAHC.1983.10079, S2CID 39816473 http://www.ivorcatt.com/47c.htm
Good, Michie & Timms 1945, 5 Machines: 53 Colossus 53B The Z stream, p.333. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Fensom 2006, p. 303. - Fensom, Harry (2006), How Colossus was Built and Operated – One of its Engineers Reveals its Secrets, pp. 297–303
Fensom 2006, p. 303. - Fensom, Harry (2006), How Colossus was Built and Operated – One of its Engineers Reveals its Secrets, pp. 297–303
Flowers 1983, pp. 239–252. - Flowers, Thomas H. (1983), "The Design of Colossus", Annals of the History of Computing, 5 (3): 239–252, doi:10.1109/MAHC.1983.10079, S2CID 39816473 http://www.ivorcatt.com/47c.htm
Small 1944, p. 108. - Small, Albert W. (December 1944), The Special Fish Report http://www.codesandciphers.org.uk/documents/small/smallix.htm
Good, Michie & Timms 1945, 5 Machines: 53 Colossus, pp. 333–353. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Good, Michie & Timms 1945, 5 Machines: 53 Colossus 53A Introduction, p.333. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Budiansky 2006, p. 62. - Budiansky, Stephen (2006), Colossus, Codebreaking, and the Digital Age, pp. 52–63
"A Brief History of Computing. Jack Copeland, June 2000". Alanturing.net. Retrieved 26 October 2017. http://www.alanturing.net/turing_archive/pages/Reference%20Articles/BriefHistofComp.html#Col
Wells, Benjamin (2009). "Advances in I/O, Speedup, and Universality on Colossus, an Unconventional Computer". Proceedings of the 8th International Conference on Unconventional Computation 2009 (UC09), Ponta Delgada, Portugal. Lecture Notes in Computer Science. Vol. 5175. Berlin, Heidelberg: Springer-Verlag. pp. 247–261. doi:10.1007/978-3-642-03745-0_27. ISBN 978-3-642-03744-3. 978-3-642-03744-3
"A Brief History of Computing". alanturing.net. Retrieved 26 January 2010. http://www.alanturing.net/turing_archive/pages/Reference%20Articles/BriefHistofComp.html#ACE
Copeland et al. 2006, pp. 173–175. - Copeland, B. Jack; et al. (2006), "Mr Newman's section"
GCHQ 2024. - "GCHQ Celebrates 80 Years of Colossus". GCHQ. 18 January 2024. Retrieved 21 January 2024. https://www.gchq.gov.uk/news/colossus-80
Copeland et al. 2006, pp. 173–175. - Copeland, B. Jack; et al. (2006), "Mr Newman's section"
McKay 2010, pp. 270–271. - McKay, Sinclair (2010), The Secret Life of Bletchley Park: The WWII Codebreaking Centre and the men and women who worked there, London: Aurum Press, ISBN 9781845135393
Horwood, D.C. (1973). A technical description of Colossus I: PRO HW 25/24. Archived from the original on 2 April 2014. Retrieved 16 March 2014 – via YouTube. https://web.archive.org/web/20140402160011/http://www.youtube.com/watch?v=JF48sl15OCg
Copeland et al. 2006, pp. 173–175. - Copeland, B. Jack; et al. (2006), "Mr Newman's section"
Copeland et al. 2006, pp. 173–175. - Copeland, B. Jack; et al. (2006), "Mr Newman's section"
Chodos, Alan (2022). "August 1946: The Moore School Lectures". APS News. 11 (4). Retrieved 25 January 2022. https://www.aps.org/publications/apsnews/200208/history.cfm
Goldstine 1980, p. 321. - Goldstine, Herman H. (1980), The Computer from Pascal to von Neumann, Princeton University Press, ISBN 978-0-691-02367-0
Randell 1980, p. 87. - Randell, Brian (1980), "The Colossus" (PDF), in Metropolis, N.; Howlett, J.; Rota, Gian-Carlo (eds.), A History of Computing in the Twentieth Century, Elsevier Science, pp. 47–92, ISBN 978-0124916500 http://www.cs.ncl.ac.uk/publications/books/papers/133.pdf
Winterbotham, F.W. (2000) [1974], The Ultra secret: the inside story of Operation Ultra, Bletchley Park and Enigma, London: Orion Books Ltd, ISBN 9780752837512, OCLC 222735270 9780752837512
New Scientist, 10 February 1977 & IBM UK News, 4 March 1967
COLOSSUS and the History of Computing: Dollis Hill's Important Contribution by A.W.M. Coombs in The Post Office Electrical Engineers' Journal (POEEJ; Volume70, 1977/78 part 2, July 1977, pages 108-110)
Good, Michie & Timms 1945. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
Good, Michie & Timms 1945, 5 Machines: 51 Introductory, (j) Impressions of Colossus, p. 327. - Good, Jack; Michie, Donald; Timms, Geoffrey (1945), General Report on Tunny: With Emphasis on Statistical Methods, UK Public Record Office HW 25/4 and HW 25/5
"Colossus Rebuild - Tony Sale". Codesandciphers.org.uk. Retrieved 26 October 2017. http://www.codesandciphers.org.uk/lorenz/rebuild.htm
* Sale, Tony (2008). "Video of Tony Sale talking about rebuilt Colossus 2008-6-19". Retrieved 13 May 2017. /wiki/Tony_Sale
Colossus – The Rebuild Story, The National Museum of Computing, archived from the original on 18 April 2015, retrieved 13 May 2017 https://web.archive.org/web/20150418230306/http://www.tnmoc.org/colossus-rebuild-story
Campbell-Kelly, Martin (31 August 2011). "Tony Sale obituary". The Guardian. Retrieved 26 October 2017. https://www.theguardian.com/theguardian/2011/aug/31/tony-sale-obituary
"Cipher Challenge". Archived from the original on 1 August 2008. Retrieved 1 February 2012. https://web.archive.org/web/20080801175842/http://www.tnmoc.org/cipher1.htm
"SZ42 codebreaking software". Schlaupelz.de. Retrieved 26 October 2017. http://www.schlaupelz.de/SZ42/SZ42_software.html
"Cracking the Lorenz Code". Ada Answers. AdaCore. Archived from the original on 8 February 2012. Retrieved 26 October 2017. https://web.archive.org/web/20120208010213/http://www.adacore.com/home/ada_answers/lorenz-code/
Ward, Mark (16 November 2007). "Colossus loses code-cracking race". BBC News. Retrieved 2 January 2010. http://news.bbc.co.uk/1/hi/technology/7098005.stm
"German Codebreaker receives Bletchley Park Honours". Bletchley Park National Codes Centre. 27 January 2008. Archived from the original on 2 January 2013. Retrieved 7 April 2012. https://web.archive.org/web/20130102214431/http://www.bletchleypark.org.uk/news/docview.rhtm/487682
"Latest Cipher Challenge News 16.11.2007". TNMoC - Cipher Challenge!. Archived from the original on 18 April 2008. https://web.archive.org/web/20080418084956/http://www.tnmoc.org/cipher7.htm