CINXE.COM
Ultra (cryptography) - Wikipedia
<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Ultra (cryptography) - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"edbb890a-b902-47cb-92d5-2dc5de382fe8","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Ultra_(cryptography)","wgTitle":"Ultra (cryptography)","wgCurRevisionId":1257514677,"wgRevisionId":1257514677,"wgArticleId":31748,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["CS1 maint: multiple names: authors list","CS1 errors: missing periodical","Articles with short description","Short description is different from Wikidata","Use dmy dates from October 2019","Articles containing German-language text","All articles lacking reliable references","Articles lacking reliable references from April 2016","All articles with unsourced statements","Articles with unsourced statements from May 2011","Telecommunications-related introductions in 1941", "1941 establishments in the United Kingdom","Military intelligence","Signals intelligence of World War II","MI6","Bletchley Park","Cryptography"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Ultra_(cryptography)","wgRelevantArticleId":31748,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":80000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true, "wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q825712","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"} ;RLPAGEMODULES=["ext.cite.ux-enhancements","mediawiki.page.media","ext.scribunto.logs","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&only=styles&skin=vector-2022"> <script async="" src="/w/load.php?lang=en&modules=startup&only=scripts&raw=1&skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&modules=site.styles&only=styles&skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/8/8b/EnigmaMachine_Warzawa.jpg/1200px-EnigmaMachine_Warzawa.jpg"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="900"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/8/8b/EnigmaMachine_Warzawa.jpg/800px-EnigmaMachine_Warzawa.jpg"> <meta property="og:image:width" content="800"> <meta property="og:image:height" content="600"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/8/8b/EnigmaMachine_Warzawa.jpg/640px-EnigmaMachine_Warzawa.jpg"> <meta property="og:image:width" content="640"> <meta property="og:image:height" content="480"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Ultra (cryptography) - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Ultra_(cryptography)"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Ultra_(cryptography)&action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Ultra_(cryptography)"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Ultra_cryptography rootpage-Ultra_cryptography skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page's font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&returnto=Ultra+%28cryptography%29" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&returnto=Ultra+%28cryptography%29" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&returnto=Ultra+%28cryptography%29" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&returnto=Ultra+%28cryptography%29" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-Sources_of_intelligence" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Sources_of_intelligence"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>Sources of intelligence</span> </div> </a> <button aria-controls="toc-Sources_of_intelligence-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Sources of intelligence subsection</span> </button> <ul id="toc-Sources_of_intelligence-sublist" class="vector-toc-list"> <li id="toc-German" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#German"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.1</span> <span>German</span> </div> </a> <ul id="toc-German-sublist" class="vector-toc-list"> <li id="toc-Enigma" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Enigma"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.1.1</span> <span>Enigma</span> </div> </a> <ul id="toc-Enigma-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Lorenz_cipher" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Lorenz_cipher"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.1.2</span> <span>Lorenz cipher</span> </div> </a> <ul id="toc-Lorenz_cipher-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Italian" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Italian"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.2</span> <span>Italian</span> </div> </a> <ul id="toc-Italian-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Japanese" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Japanese"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.3</span> <span>Japanese</span> </div> </a> <ul id="toc-Japanese-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Distribution" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Distribution"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Distribution</span> </div> </a> <button aria-controls="toc-Distribution-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Distribution subsection</span> </button> <ul id="toc-Distribution-sublist" class="vector-toc-list"> <li id="toc-Army_and_Air_Force" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Army_and_Air_Force"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.1</span> <span>Army and Air Force</span> </div> </a> <ul id="toc-Army_and_Air_Force-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Intelligence_agencies" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Intelligence_agencies"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2</span> <span>Intelligence agencies</span> </div> </a> <ul id="toc-Intelligence_agencies-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Radio_and_cryptography" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Radio_and_cryptography"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.3</span> <span>Radio and cryptography</span> </div> </a> <ul id="toc-Radio_and_cryptography-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Lucy" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Lucy"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.4</span> <span>Lucy</span> </div> </a> <ul id="toc-Lucy-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Use_of_intelligence" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Use_of_intelligence"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Use of intelligence</span> </div> </a> <ul id="toc-Use_of_intelligence-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Safeguarding_of_sources" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Safeguarding_of_sources"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Safeguarding of sources</span> </div> </a> <ul id="toc-Safeguarding_of_sources-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Role_of_women_in_Allied_codebreaking" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Role_of_women_in_Allied_codebreaking"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Role of women in Allied codebreaking</span> </div> </a> <ul id="toc-Role_of_women_in_Allied_codebreaking-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Effect_on_the_war" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Effect_on_the_war"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Effect on the war</span> </div> </a> <ul id="toc-Effect_on_the_war-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Postwar_suppression" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Postwar_suppression"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Postwar suppression</span> </div> </a> <ul id="toc-Postwar_suppression-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Postwar_disclosures" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Postwar_disclosures"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>Postwar disclosures</span> </div> </a> <ul id="toc-Postwar_disclosures-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Holocaust_intelligence" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Holocaust_intelligence"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>Holocaust intelligence</span> </div> </a> <ul id="toc-Holocaust_intelligence-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Postwar_consequences" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Postwar_consequences"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>Postwar consequences</span> </div> </a> <ul id="toc-Postwar_consequences-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">11</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Notes" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Notes"> <div class="vector-toc-text"> <span class="vector-toc-numb">12</span> <span>Notes</span> </div> </a> <ul id="toc-Notes-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">13</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Bibliography" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Bibliography"> <div class="vector-toc-text"> <span class="vector-toc-numb">14</span> <span>Bibliography</span> </div> </a> <ul id="toc-Bibliography-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Ultra (cryptography)</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 17 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-17" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">17 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D8%A3%D9%84%D8%AA%D8%B1%D8%A7_(%D8%AA%D8%B9%D9%85%D9%8A%D8%A9)" title="ألترا (تعمية) – Arabic" lang="ar" hreflang="ar" data-title="ألترا (تعمية)" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Ultra_(criptologia)" title="Ultra (criptologia) – Catalan" lang="ca" hreflang="ca" data-title="Ultra (criptologia)" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Ultra_(Kryptologie)" title="Ultra (Kryptologie) – German" lang="de" hreflang="de" data-title="Ultra (Kryptologie)" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/Ultra" title="Ultra – Estonian" lang="et" hreflang="et" data-title="Ultra" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-el mw-list-item"><a href="https://el.wikipedia.org/wiki/%CE%95%CF%80%CE%B9%CF%87%CE%B5%CE%AF%CF%81%CE%B7%CF%83%CE%B7_Ultra" title="Επιχείρηση Ultra – Greek" lang="el" hreflang="el" data-title="Επιχείρηση Ultra" data-language-autonym="Ελληνικά" data-language-local-name="Greek" class="interlanguage-link-target"><span>Ελληνικά</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D8%A7%D9%88%D9%84%D8%AA%D8%B1%D8%A7" title="اولترا – Persian" lang="fa" hreflang="fa" data-title="اولترا" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/Ultra_(nom_de_code)" title="Ultra (nom de code) – French" lang="fr" hreflang="fr" data-title="Ultra (nom de code)" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Ultra" title="Ultra – Indonesian" lang="id" hreflang="id" data-title="Ultra" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Ultra_(crittografia)" title="Ultra (crittografia) – Italian" lang="it" hreflang="it" data-title="Ultra (crittografia)" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%90%D7%95%D7%9C%D7%98%D7%A8%D7%94" title="אולטרה – Hebrew" lang="he" hreflang="he" data-title="אולטרה" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-ms mw-list-item"><a href="https://ms.wikipedia.org/wiki/Ultra" title="Ultra – Malay" lang="ms" hreflang="ms" data-title="Ultra" data-language-autonym="Bahasa Melayu" data-language-local-name="Malay" class="interlanguage-link-target"><span>Bahasa Melayu</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Ultra_(decryptie)" title="Ultra (decryptie) – Dutch" lang="nl" hreflang="nl" data-title="Ultra (decryptie)" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Ultra" title="Ultra – Portuguese" lang="pt" hreflang="pt" data-title="Ultra" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/Ultra_(%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B0%D0%BD%D0%B0%D0%BB%D0%B8%D0%B7)" title="Ultra (криптоанализ) – Russian" lang="ru" hreflang="ru" data-title="Ultra (криптоанализ)" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Ultra" title="Ultra – Simple English" lang="en-simple" hreflang="en-simple" data-title="Ultra" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-sr mw-list-item"><a href="https://sr.wikipedia.org/wiki/%D0%A3%D0%BB%D1%82%D1%80%D0%B0" title="Ултра – Serbian" lang="sr" hreflang="sr" data-title="Ултра" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/Ultra" title="Ultra – Turkish" lang="tr" hreflang="tr" data-title="Ultra" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q825712#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Ultra_(cryptography)" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Ultra_(cryptography)" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Ultra_(cryptography)"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Ultra_(cryptography)&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Ultra_(cryptography)&action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Ultra_(cryptography)"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Ultra_(cryptography)&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Ultra_(cryptography)&action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Ultra_(cryptography)" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Ultra_(cryptography)" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Ultra_(cryptography)&oldid=1257514677" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Ultra_(cryptography)&action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&page=Ultra_%28cryptography%29&id=1257514677&wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FUltra_%28cryptography%29"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FUltra_%28cryptography%29"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&page=Ultra_%28cryptography%29&action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Ultra_(cryptography)&printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q825712" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">British designation for intelligence from decrypted enemy communications</div> <p class="mw-empty-elt"> </p> <style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1246091330">.mw-parser-output .sidebar{width:22em;float:right;clear:right;margin:0.5em 0 1em 1em;background:var(--background-color-neutral-subtle,#f8f9fa);border:1px solid var(--border-color-base,#a2a9b1);padding:0.2em;text-align:center;line-height:1.4em;font-size:88%;border-collapse:collapse;display:table}body.skin-minerva .mw-parser-output .sidebar{display:table!important;float:right!important;margin:0.5em 0 1em 1em!important}.mw-parser-output .sidebar-subgroup{width:100%;margin:0;border-spacing:0}.mw-parser-output .sidebar-left{float:left;clear:left;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-none{float:none;clear:both;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-outer-title{padding:0 0.4em 0.2em;font-size:125%;line-height:1.2em;font-weight:bold}.mw-parser-output .sidebar-top-image{padding:0.4em}.mw-parser-output .sidebar-top-caption,.mw-parser-output .sidebar-pretitle-with-top-image,.mw-parser-output .sidebar-caption{padding:0.2em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-pretitle{padding:0.4em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-title,.mw-parser-output .sidebar-title-with-pretitle{padding:0.2em 0.8em;font-size:145%;line-height:1.2em}.mw-parser-output .sidebar-title-with-pretitle{padding:0.1em 0.4em}.mw-parser-output .sidebar-image{padding:0.2em 0.4em 0.4em}.mw-parser-output .sidebar-heading{padding:0.1em 0.4em}.mw-parser-output .sidebar-content{padding:0 0.5em 0.4em}.mw-parser-output .sidebar-content-with-subgroup{padding:0.1em 0.4em 0.2em}.mw-parser-output .sidebar-above,.mw-parser-output .sidebar-below{padding:0.3em 0.8em;font-weight:bold}.mw-parser-output .sidebar-collapse .sidebar-above,.mw-parser-output .sidebar-collapse .sidebar-below{border-top:1px solid #aaa;border-bottom:1px solid #aaa}.mw-parser-output .sidebar-navbar{text-align:right;font-size:115%;padding:0 0.4em 0.4em}.mw-parser-output .sidebar-list-title{padding:0 0.4em;text-align:left;font-weight:bold;line-height:1.6em;font-size:105%}.mw-parser-output .sidebar-list-title-c{padding:0 0.4em;text-align:center;margin:0 3.3em}@media(max-width:640px){body.mediawiki .mw-parser-output .sidebar{width:100%!important;clear:both;float:none!important;margin-left:0!important;margin-right:0!important}}body.skin--responsive .mw-parser-output .sidebar a>img{max-width:none!important}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media print{body.ns-0 .mw-parser-output .sidebar{display:none!important}}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><table class="sidebar nomobile nowraplinks"><tbody><tr><th class="sidebar-title">The Enigma cipher machine</th></tr><tr><td class="sidebar-image"><span typeof="mw:File"><a href="/wiki/File:Enigma-logo.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/3/37/Enigma-logo.svg/100px-Enigma-logo.svg.png" decoding="async" width="100" height="44" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/3/37/Enigma-logo.svg/150px-Enigma-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/3/37/Enigma-logo.svg/200px-Enigma-logo.svg.png 2x" data-file-width="702" data-file-height="308" /></a></span></td></tr><tr><th class="sidebar-heading"> <a href="/wiki/Enigma_machine" title="Enigma machine">Enigma machine</a></th></tr><tr><td class="sidebar-content"> <div class="hlist"> <ul><li><a href="/wiki/Enigma_rotor_details" title="Enigma rotor details">Enigma rotors</a></li></ul> </div></td> </tr><tr><th class="sidebar-heading"> <a href="/wiki/Cryptanalysis_of_the_Enigma" title="Cryptanalysis of the Enigma">Breaking Enigma</a></th></tr><tr><td class="sidebar-content"> <div class="hlist"> <ul><li><a href="/wiki/Cipher_Bureau_(Poland)" title="Cipher Bureau (Poland)">Polish Cipher Bureau</a> <ul><li><a href="/wiki/Polish_Enigma_double" title="Polish Enigma double">Doubles</a></li> <li><a href="/wiki/Grill_(cryptology)" title="Grill (cryptology)">Grill</a></li> <li><a href="/wiki/Clock_(cryptography)" title="Clock (cryptography)">Clock</a></li> <li><a href="/wiki/Cyclometer" title="Cyclometer">Cyclometer</a></li> <li><a href="/wiki/Bomba_(cryptography)" title="Bomba (cryptography)">Bomba</a></li> <li><a href="/wiki/Zygalski_sheets" title="Zygalski sheets">Zygalski sheets</a></li></ul></li> <li><a href="/wiki/Bletchley_Park" title="Bletchley Park">Bletchley Park</a> <ul><li><a href="/wiki/Banburismus" title="Banburismus">Banburismus</a></li> <li><a href="/wiki/John_Herivel" title="John Herivel">Herivel tip</a></li> <li><a href="/wiki/Known-plaintext_attack" title="Known-plaintext attack">Crib</a></li> <li><a href="/wiki/Bombe" title="Bombe">Bombe</a></li> <li><a href="/wiki/Hut_3" title="Hut 3">Hut 3</a></li> <li><a href="/wiki/Hut_4" title="Hut 4">Hut 4</a></li> <li><a href="/wiki/Hut_6" title="Hut 6">Hut 6</a></li> <li><a href="/wiki/Hut_8" title="Hut 8">Hut 8</a></li></ul></li> <li><a href="/wiki/PC_Bruno" title="PC Bruno">PC Bruno</a></li> <li><a href="/wiki/Cadix" title="Cadix">Cadix</a></li></ul> </div></td> </tr><tr><th class="sidebar-heading"> Related</th></tr><tr><td class="sidebar-content"> <div class="hlist"> <ul><li><a class="mw-selflink selflink">Ultra</a></li></ul> </div></td> </tr><tr><td class="sidebar-navbar"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Enigma_series" title="Template:Enigma series"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Enigma_series" title="Template talk:Enigma series"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Enigma_series" title="Special:EditPage/Template:Enigma series"><abbr title="Edit this template">e</abbr></a></li></ul></div></td></tr></tbody></table> <style data-mw-deduplicate="TemplateStyles:r1237032888/mw-parser-output/.tmulti">.mw-parser-output .tmulti .multiimageinner{display:flex;flex-direction:column}.mw-parser-output .tmulti .trow{display:flex;flex-direction:row;clear:left;flex-wrap:wrap;width:100%;box-sizing:border-box}.mw-parser-output .tmulti .tsingle{margin:1px;float:left}.mw-parser-output .tmulti .theader{clear:both;font-weight:bold;text-align:center;align-self:center;background-color:transparent;width:100%}.mw-parser-output .tmulti .thumbcaption{background-color:transparent}.mw-parser-output .tmulti .text-align-left{text-align:left}.mw-parser-output .tmulti .text-align-right{text-align:right}.mw-parser-output .tmulti .text-align-center{text-align:center}@media all and (max-width:720px){.mw-parser-output .tmulti .thumbinner{width:100%!important;box-sizing:border-box;max-width:none!important;align-items:center}.mw-parser-output .tmulti .trow{justify-content:center}.mw-parser-output .tmulti .tsingle{float:none!important;max-width:100%!important;box-sizing:border-box;text-align:center}.mw-parser-output .tmulti .tsingle .thumbcaption{text-align:left}.mw-parser-output .tmulti .trow>.thumbcaption{text-align:center}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .tmulti .multiimageinner img{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .tmulti .multiimageinner img{background-color:white}}</style><div class="thumb tmulti tright"><div class="thumbinner multiimageinner" style="width:184px;max-width:184px"><div class="trow"><div class="tsingle" style="width:182px;max-width:182px"><div class="thumbimage"><span typeof="mw:File"><a href="/wiki/File:EnigmaMachine_Warzawa.jpg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/8/8b/EnigmaMachine_Warzawa.jpg/180px-EnigmaMachine_Warzawa.jpg" decoding="async" width="180" height="135" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/8/8b/EnigmaMachine_Warzawa.jpg/270px-EnigmaMachine_Warzawa.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/8/8b/EnigmaMachine_Warzawa.jpg/360px-EnigmaMachine_Warzawa.jpg 2x" data-file-width="1600" data-file-height="1200" /></a></span></div><div class="thumbcaption"><a href="/wiki/Enigma_machine" title="Enigma machine">Enigma machine</a> out of its wooden box</div></div></div><div class="trow"><div class="tsingle" style="width:182px;max-width:182px"><div class="thumbimage"><span typeof="mw:File"><a href="/wiki/File:Lorenz-SZ42-2.jpg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/4/4d/Lorenz-SZ42-2.jpg/180px-Lorenz-SZ42-2.jpg" decoding="async" width="180" height="134" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/4d/Lorenz-SZ42-2.jpg/270px-Lorenz-SZ42-2.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/4d/Lorenz-SZ42-2.jpg/360px-Lorenz-SZ42-2.jpg 2x" data-file-width="1141" data-file-height="848" /></a></span></div><div class="thumbcaption"><a href="/wiki/Lorenz_cipher" title="Lorenz cipher">Lorenz SZ42 machine</a> with covers removed</div></div></div><div class="trow"><div class="tsingle" style="width:182px;max-width:182px"><div class="thumbimage"><span typeof="mw:File"><a href="/wiki/File:Purple_code_machine_2.jpg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/5/5a/Purple_code_machine_2.jpg/180px-Purple_code_machine_2.jpg" decoding="async" width="180" height="135" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/5a/Purple_code_machine_2.jpg/270px-Purple_code_machine_2.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/5a/Purple_code_machine_2.jpg/360px-Purple_code_machine_2.jpg 2x" data-file-width="2016" data-file-height="1512" /></a></span></div><div class="thumbcaption">Part of Japanese <a href="/wiki/Purple_(cipher_machine)" class="mw-redirect" title="Purple (cipher machine)">PURPLE machine</a></div></div></div><div class="trow" style="display:flex"><div class="thumbcaption">Three cipher machines that<br />were broken by the Allies to<br />yield Ultra intelligence</div></div></div></div> <p><span class="nowrap"><i><b>Ultra</b></i> was the designation</span> adopted by <a href="/wiki/United_Kingdom" title="United Kingdom">British</a> <a href="/wiki/Military_intelligence" title="Military intelligence">military intelligence</a> in June 1941 for wartime <a href="/wiki/Signals_intelligence" title="Signals intelligence">signals intelligence</a> obtained by breaking high-level <a href="/wiki/Encrypt" class="mw-redirect" title="Encrypt">encrypted</a> enemy <a href="/wiki/Radio" title="Radio">radio</a> and <a href="/wiki/Teleprinter" title="Teleprinter">teleprinter</a> communications at the <a href="/wiki/Government_Communications_Headquarters#Government_Code_and_Cypher_School_(GC&CS)" class="mw-redirect" title="Government Communications Headquarters">Government Code and Cypher School (GC&CS)</a> at <a href="/wiki/Bletchley_Park" title="Bletchley Park">Bletchley Park</a>.<sup id="cite_ref-FOOTNOTEHinsleyStripp1993xx_1-0" class="reference"><a href="#cite_note-FOOTNOTEHinsleyStripp1993xx-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup> <i>Ultra</i> eventually became the standard designation among the western <a href="/wiki/Allies_of_World_War_II" title="Allies of World War II">Allies</a> for all such intelligence. The name arose because the intelligence obtained was considered more important than that designated by the highest British <a href="/wiki/Classified_information" title="Classified information">security classification</a> then used (<i>Most Secret</i>) and so was regarded as being <i>Ultra Secret</i>.<sup id="cite_ref-FOOTNOTELewin200164_2-0" class="reference"><a href="#cite_note-FOOTNOTELewin200164-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup> Several other <a href="/wiki/Cryptonym" class="mw-redirect" title="Cryptonym">cryptonyms</a> had been used for such intelligence. </p><p>The code name <i><b>Boniface</b></i> was used as a cover name for <i>Ultra</i>. In order to ensure that the successful code-breaking did not become apparent to the Germans, British intelligence created a fictional <a href="/wiki/MI6" title="MI6">MI6</a> master spy, Boniface, who controlled a fictional series of agents throughout Germany. Information obtained through code-breaking was often attributed to the <a href="/wiki/Human_intelligence_(espionage)" class="mw-redirect" title="Human intelligence (espionage)">human intelligence</a> from the Boniface network.<sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup> The U.S. used the codename <i><a href="/wiki/Magic_(cryptography)" title="Magic (cryptography)">Magic</a></i> for its decrypts from Japanese sources, including the "<a href="/wiki/Type_B_Cipher_Machine#Purple" title="Type B Cipher Machine">Purple</a>" cipher.<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup> </p><p>Much of the <a href="/wiki/Nazi_Germany" title="Nazi Germany">German</a> cipher traffic was encrypted on the <a href="/wiki/Enigma_machine" title="Enigma machine">Enigma machine</a>. Used properly, the German military Enigma would have been virtually unbreakable; in practice, shortcomings in operation allowed it to be broken. The term "Ultra" has often been used almost synonymously with "<a href="/wiki/Cryptanalysis_of_the_Enigma" title="Cryptanalysis of the Enigma">Enigma decrypts</a>". However, Ultra also encompassed decrypts of the German <a href="/wiki/Lorenz_cipher" title="Lorenz cipher">Lorenz SZ 40/42 machines</a> that were used by the German High Command, and the <a href="/wiki/C-36_(cipher_machine)" title="C-36 (cipher machine)">Hagelin machine</a>.<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">[</span>a<span class="cite-bracket">]</span></a></sup> </p><p>Many observers, at the time and later, regarded Ultra as immensely valuable to the Allies. <a href="/wiki/Winston_Churchill" title="Winston Churchill">Winston Churchill</a> was reported to have told <a href="/wiki/King_George_VI" class="mw-redirect" title="King George VI">King George VI</a>, when presenting to him <a href="/wiki/Stewart_Menzies" title="Stewart Menzies">Stewart Menzies</a> (head of the <a href="/wiki/Secret_Intelligence_Service" class="mw-redirect" title="Secret Intelligence Service">Secret Intelligence Service</a> and the person who controlled distribution of Ultra decrypts to the government): "It is thanks to the secret weapon of General Menzies, put into use on all the fronts, that we won the war!"<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">[</span>b<span class="cite-bracket">]</span></a></sup> <a href="/wiki/F._W._Winterbotham" title="F. W. Winterbotham">F. W. Winterbotham</a> quoted the western Supreme Allied Commander, <a href="/wiki/Dwight_D._Eisenhower" title="Dwight D. Eisenhower">Dwight D. Eisenhower</a>, at war's end describing Ultra as having been "decisive" to Allied victory.<sup id="cite_ref-FOOTNOTEWinterbotham1974154,_191_9-0" class="reference"><a href="#cite_note-FOOTNOTEWinterbotham1974154,_191-9"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Harry_Hinsley" title="Harry Hinsley">Sir Harry Hinsley</a>, Bletchley Park veteran and official historian of British Intelligence in World War II, made a similar assessment of Ultra, saying that while the Allies would have won the war without it,<sup id="cite_ref-FOOTNOTEHinsley199311–13_10-0" class="reference"><a href="#cite_note-FOOTNOTEHinsley199311–13-10"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup> "the war would have been something like two years longer, perhaps three years longer, possibly four years longer than it was."<sup id="cite_ref-FOOTNOTEHinsley1996_11-0" class="reference"><a href="#cite_note-FOOTNOTEHinsley1996-11"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup> However, Hinsley and others have emphasized the difficulties of <a href="/wiki/Counterfactual_history" title="Counterfactual history">counterfactual history</a> in attempting such conclusions, and some historians, such as Keegan, have said the shortening might have been as little as the three months it took the United States to deploy the <a href="/wiki/Atomic_bomb" class="mw-redirect" title="Atomic bomb">atomic bomb</a>.<sup id="cite_ref-FOOTNOTEHinsley199311–13_10-1" class="reference"><a href="#cite_note-FOOTNOTEHinsley199311–13-10"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-richelson_13-0" class="reference"><a href="#cite_note-richelson-13"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup> </p><p>The existence of Ultra was kept secret for many years after the war. Since the Ultra story was widely disseminated by Winterbotham in 1974,<sup id="cite_ref-FOOTNOTEWinterbotham1974_14-0" class="reference"><a href="#cite_note-FOOTNOTEWinterbotham1974-14"><span class="cite-bracket">[</span>12<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-FOOTNOTEDeutsch19771_15-0" class="reference"><a href="#cite_note-FOOTNOTEDeutsch19771-15"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> historians have altered the <a href="/wiki/Historiography_of_World_War_II" title="Historiography of World War II">historiography of World War II</a>. For example, <a href="/wiki/Andrew_Roberts_(historian)" class="mw-redirect" title="Andrew Roberts (historian)">Andrew Roberts</a>, writing in the 21st century, states, "Because he had the invaluable advantage of being able to read Field Marshal <a href="/wiki/Erwin_Rommel" title="Erwin Rommel">Erwin Rommel</a>'s Enigma communications, General <a href="/wiki/Bernard_Montgomery" title="Bernard Montgomery">Bernard Montgomery</a> knew how short the Germans were of men, ammunition, food and above all fuel. When he put Rommel's picture up in his caravan he wanted to be seen to be almost reading his opponent's mind. In fact he was reading his mail."<sup id="cite_ref-FOOTNOTERoberts2009297_16-0" class="reference"><a href="#cite_note-FOOTNOTERoberts2009297-16"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup> Over time, Ultra has become embedded in the public consciousness and Bletchley Park has become a significant visitor attraction.<sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup> As stated by historian <a href="/wiki/Thomas_Haigh" title="Thomas Haigh">Thomas Haigh</a>, "The British code-breaking effort of the Second World War, formerly secret, is now one of the most celebrated aspects of modern British history, an inspiring story in which a free society mobilized its intellectual resources against a terrible enemy."<sup id="cite_ref-haigh_18-0" class="reference"><a href="#cite_note-haigh-18"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup> </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="Sources_of_intelligence">Sources of intelligence</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=1" title="Edit section: Sources of intelligence"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Most Ultra intelligence was derived from reading radio messages that had been encrypted with cipher machines, complemented by material from radio communications using <a href="/wiki/Traffic_analysis" title="Traffic analysis">traffic analysis</a> and <a href="/wiki/Direction_finding" title="Direction finding">direction finding</a>. In the early phases of the war, particularly during the eight-month <a href="/wiki/Phoney_War" title="Phoney War">Phoney War</a>, the Germans could transmit most of their messages using <a href="/wiki/Landline" title="Landline">land lines</a> and so had no need to use radio. This meant that those at Bletchley Park had some time to build up experience of collecting and starting to decrypt messages on the various <a href="/wiki/Radio_network" title="Radio network">radio networks</a>. German Enigma messages were the main source, with those of the <a href="/wiki/Luftwaffe" title="Luftwaffe">Luftwaffe</a> predominating, as they used radio more and their operators were particularly ill-disciplined. </p> <div class="mw-heading mw-heading3"><h3 id="German">German</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=2" title="Edit section: German"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Typical_Bletchley_intercept_sheet.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/d/dc/Typical_Bletchley_intercept_sheet.jpg/220px-Typical_Bletchley_intercept_sheet.jpg" decoding="async" width="220" height="303" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/d/dc/Typical_Bletchley_intercept_sheet.jpg/330px-Typical_Bletchley_intercept_sheet.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/d/dc/Typical_Bletchley_intercept_sheet.jpg/440px-Typical_Bletchley_intercept_sheet.jpg 2x" data-file-width="1308" data-file-height="1800" /></a><figcaption>A typical Bletchley intercept sheet, before decryption and translation</figcaption></figure> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Bletchley_decrypt.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/2/23/Bletchley_decrypt.jpg/220px-Bletchley_decrypt.jpg" decoding="async" width="220" height="349" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/2/23/Bletchley_decrypt.jpg/330px-Bletchley_decrypt.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/2/23/Bletchley_decrypt.jpg/440px-Bletchley_decrypt.jpg 2x" data-file-width="1136" data-file-height="1800" /></a><figcaption>A typical Bletchley intercept sheet, after decryption</figcaption></figure> <div class="mw-heading mw-heading4"><h4 id="Enigma">Enigma</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=3" title="Edit section: Enigma"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Cryptanalysis_of_the_Enigma" title="Cryptanalysis of the Enigma">Cryptanalysis of the Enigma</a></div> <p>"<a href="/wiki/Enigma_machine" title="Enigma machine">Enigma</a>" refers to a family of electro-mechanical <a href="/wiki/Rotor_machine" title="Rotor machine">rotor cipher machines</a>. These produced a <a href="/wiki/Polyalphabetic_cipher" title="Polyalphabetic cipher">polyalphabetic substitution cipher</a> and were widely thought to be unbreakable in the 1920s, when a variant of the commercial Model D was first used by the <a href="/wiki/Reichswehr" title="Reichswehr">Reichswehr</a>. The <a href="/wiki/German_Army_(Wehrmacht)" class="mw-redirect" title="German Army (Wehrmacht)">German Army</a>, <a href="/wiki/Kriegsmarine" title="Kriegsmarine">Navy</a>, <a href="/wiki/Luftwaffe" title="Luftwaffe">Air Force</a>, <a href="/wiki/Nazi_party" class="mw-redirect" title="Nazi party">Nazi party</a>, <a href="/wiki/Gestapo" title="Gestapo">Gestapo</a> and German diplomats used Enigma machines in several variants. <a href="/wiki/Abwehr" title="Abwehr">Abwehr</a> (German military intelligence) used a four-rotor machine without a plugboard and Naval Enigma used different key management from that of the army or air force, making its traffic far more difficult to cryptanalyse; each variant required different cryptanalytic treatment. The commercial versions were not as secure and <a href="/wiki/Alfred_Dillwyn_Knox" class="mw-redirect" title="Alfred Dillwyn Knox">Dilly Knox</a> of GC&CS is said to have broken one before the war. </p><p>German military Enigma was first broken in December 1932 by <a href="/wiki/Marian_Rejewski" title="Marian Rejewski">Marian Rejewski</a> and the <a href="/wiki/Biuro_Szyfr%C3%B3w" class="mw-redirect" title="Biuro Szyfrów">Polish Cipher Bureau</a>, using a combination of brilliant mathematics, the services of a spy in the German office responsible for administering encrypted communications, and good luck.<sup id="cite_ref-FOOTNOTESingh1999145_19-0" class="reference"><a href="#cite_note-FOOTNOTESingh1999145-19"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-FOOTNOTECopeland2004231,_232_20-0" class="reference"><a href="#cite_note-FOOTNOTECopeland2004231,_232-20"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup> The Poles read Enigma to the outbreak of World War II and beyond, in France.<sup id="cite_ref-FOOTNOTEKozaczuk198481–92_21-0" class="reference"><a href="#cite_note-FOOTNOTEKozaczuk198481–92-21"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup> At the turn of 1939, the Germans made the systems ten times more complex, which required a tenfold increase in Polish decryption equipment, which they could not meet.<sup id="cite_ref-FOOTNOTERejewski1984242–43_22-0" class="reference"><a href="#cite_note-FOOTNOTERejewski1984242–43-22"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup> On 25 July 1939, the Polish Cipher Bureau handed <a href="/wiki/Polish_Enigma_doubles" class="mw-redirect" title="Polish Enigma doubles">reconstructed Enigma machines</a> and their techniques for decrypting ciphers to the French and British.<sup id="cite_ref-FOOTNOTECopeland2004234,_235_23-0" class="reference"><a href="#cite_note-FOOTNOTECopeland2004234,_235-23"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Gordon_Welchman" title="Gordon Welchman">Gordon Welchman</a> wrote, </p> <style data-mw-deduplicate="TemplateStyles:r1244412712">.mw-parser-output .templatequote{overflow:hidden;margin:1em 0;padding:0 32px}.mw-parser-output .templatequotecite{line-height:1.5em;text-align:left;margin-top:0}@media(min-width:500px){.mw-parser-output .templatequotecite{padding-left:1.6em}}</style><blockquote class="templatequote"><p>Ultra would never have got off the ground if we had not learned from the Poles, in the nick of time, the details both of the German military Enigma machine, and of the operating procedures that were in use.</p><div class="templatequotecite">— <cite>Gordon Welchman<sup id="cite_ref-FOOTNOTEWelchman1984289_24-0" class="reference"><a href="#cite_note-FOOTNOTEWelchman1984289-24"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup></cite></div></blockquote> <p>At Bletchley Park, some of the key people responsible for success against Enigma included mathematicians <a href="/wiki/Alan_Turing" title="Alan Turing">Alan Turing</a> and <a href="/wiki/Conel_Hugh_O%27Donel_Alexander" title="Conel Hugh O'Donel Alexander">Hugh Alexander</a> and, at the <a href="/wiki/British_Tabulating_Machine_Company" title="British Tabulating Machine Company">British Tabulating Machine Company</a>, chief engineer <a href="/wiki/Harold_Keen" title="Harold Keen">Harold Keen</a>.<sup id="cite_ref-haigh_18-1" class="reference"><a href="#cite_note-haigh-18"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup> After the war, interrogation of German cryptographic personnel led to the conclusion that German cryptanalysts understood that cryptanalytic attacks against Enigma were possible but were thought to require impracticable amounts of effort and investment.<sup id="cite_ref-FOOTNOTEBamford200117_25-0" class="reference"><a href="#cite_note-FOOTNOTEBamford200117-25"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup> The Poles' early start at breaking Enigma and the continuity of their success gave the Allies an advantage when World War II began.<sup id="cite_ref-FOOTNOTEWelchman1984289_24-1" class="reference"><a href="#cite_note-FOOTNOTEWelchman1984289-24"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Lorenz_cipher">Lorenz cipher</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=4" title="Edit section: Lorenz cipher"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Cryptanalysis_of_the_Lorenz_cipher" title="Cryptanalysis of the Lorenz cipher">Cryptanalysis of the Lorenz cipher</a></div> <p>In June 1941, the Germans started to introduce on-line <a href="/wiki/Stream_cipher" title="Stream cipher">stream cipher</a> <a href="/wiki/Teleprinter" title="Teleprinter">teleprinter</a> systems for strategic point-to-point radio links, to which the British gave the code-name <a href="/wiki/Fish_(cryptography)" title="Fish (cryptography)">Fish</a>.<sup id="cite_ref-FOOTNOTEGannon2006103_26-0" class="reference"><a href="#cite_note-FOOTNOTEGannon2006103-26"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup> Several systems were used, principally the <a href="/wiki/Lorenz_cipher" title="Lorenz cipher">Lorenz SZ 40/42</a> (Tunny) and <a href="/wiki/Geheimfernschreiber" class="mw-redirect" title="Geheimfernschreiber">Geheimfernschreiber</a> (<a href="/wiki/Siemens_and_Halske_T52" title="Siemens and Halske T52">Sturgeon</a>). These cipher systems were cryptanalysed, particularly Tunny, which the British thoroughly penetrated. It was eventually attacked using <a href="/wiki/Colossus_computer" title="Colossus computer">Colossus</a> machines, which were the first digital programme-controlled electronic computers. In many respects the Tunny work was more difficult than for the Enigma, since the British codebreakers had no knowledge of the machine producing it and no head-start such as that the Poles had given them against Enigma.<sup id="cite_ref-haigh_18-2" class="reference"><a href="#cite_note-haigh-18"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup> </p><p>Although the volume of intelligence derived from this system was much smaller than that from Enigma, its importance was often far higher because it produced primarily high-level, strategic intelligence that was sent between Wehrmacht High Command (OKW). The eventual bulk decryption of Lorenz-enciphered messages contributed significantly, and perhaps decisively, to the defeat of Nazi Germany.<sup id="cite_ref-Hinsley_1993_8_27-0" class="reference"><a href="#cite_note-Hinsley_1993_8-27"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-Brzezinski_2005_18_28-0" class="reference"><a href="#cite_note-Brzezinski_2005_18-28"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> Nevertheless, the Tunny story has become much less well known among the public than the Enigma one.<sup id="cite_ref-haigh_18-3" class="reference"><a href="#cite_note-haigh-18"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup> At Bletchley Park, some of the key people responsible for success in the Tunny effort included mathematicians <a href="/wiki/W._T._Tutte" title="W. T. Tutte">W. T. "Bill" Tutte</a> and <a href="/wiki/Max_Newman" title="Max Newman">Max Newman</a> and electrical engineer <a href="/wiki/Tommy_Flowers" title="Tommy Flowers">Tommy Flowers</a>.<sup id="cite_ref-haigh_18-4" class="reference"><a href="#cite_note-haigh-18"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Italian">Italian</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=5" title="Edit section: Italian"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In June 1940, the Italians were using book codes for most of their military messages, except for the Italian Navy, which in early 1941 had started using a version of the Hagelin <a href="/wiki/Rotor_machine" title="Rotor machine">rotor-based</a> cipher machine <a href="/wiki/M-209" title="M-209">C-38</a>.<sup id="cite_ref-FOOTNOTEHinsley1993a_29-0" class="reference"><a href="#cite_note-FOOTNOTEHinsley1993a-29"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup> This was broken from June 1941 onwards by the Italian subsection of GC&CS at <a href="/wiki/Bletchley_Park" title="Bletchley Park">Bletchley Park</a>.<sup id="cite_ref-FOOTNOTEWilkinson199361–67_30-0" class="reference"><a href="#cite_note-FOOTNOTEWilkinson199361–67-30"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Japanese">Japanese</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=6" title="Edit section: Japanese"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In the <a href="/wiki/Pacific_Ocean" title="Pacific Ocean">Pacific</a> theatre, a Japanese cipher machine, called "<a href="/wiki/Purple_code" class="mw-redirect" title="Purple code">Purple</a>" by the Americans, was used for highest-level Japanese diplomatic traffic. It produced a polyalphabetic substitution cipher, but unlike Enigma, was not a rotor machine, being built around electrical <a href="/wiki/Stepping_switch" title="Stepping switch">stepping switches</a>. It was broken by the US Army <a href="/wiki/Signal_Intelligence_Service" title="Signal Intelligence Service">Signal Intelligence Service</a> and disseminated as <i><a href="/wiki/Magic_(cryptography)" title="Magic (cryptography)">Magic</a></i>. Detailed reports by the Japanese ambassador to Germany were encrypted on the Purple machine. His reports included reviews of German assessments of the military situation, reviews of strategy and intentions, reports on direct inspections by the ambassador (in one case, of Normandy beach defences), and reports of long interviews with Hitler.<sup id="cite_ref-FOOTNOTEHinsley1993a_29-1" class="reference"><a href="#cite_note-FOOTNOTEHinsley1993a-29"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup> The Japanese are said to have obtained an Enigma machine in 1937, although it is debated whether they were given it by the Germans or bought a commercial version, which, apart from the plugboard and internal wiring, was the German <i>Heer/Luftwaffe</i> machine. Having developed a similar machine, the Japanese did not use the Enigma machine for their most secret communications. </p><p>The chief fleet communications code system used by the Imperial Japanese Navy was called <a href="/wiki/JN-25" class="mw-redirect" title="JN-25">JN-25</a> by the Americans, and by early 1942 the US Navy had made considerable progress in decrypting Japanese naval messages. The US Army also made progress on the <a href="/wiki/Japanese_army_and_diplomatic_codes" title="Japanese army and diplomatic codes">Japanese Army's codes</a> in 1943, including codes used by supply ships, resulting in heavy losses to their shipping. </p> <div class="mw-heading mw-heading2"><h2 id="Distribution">Distribution</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=7" title="Edit section: Distribution"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Ultra_Hut3_Graph.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/0/09/Ultra_Hut3_Graph.png/330px-Ultra_Hut3_Graph.png" decoding="async" width="330" height="200" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/09/Ultra_Hut3_Graph.png/495px-Ultra_Hut3_Graph.png 1.5x, //upload.wikimedia.org/wikipedia/commons/0/09/Ultra_Hut3_Graph.png 2x" data-file-width="562" data-file-height="341" /></a><figcaption>Average numbers of daily Ultra dispatches to field commanders during World War II<sup id="cite_ref-FOOTNOTEBennett1999302_31-0" class="reference"><a href="#cite_note-FOOTNOTEBennett1999302-31"><span class="cite-bracket">[</span>29<span class="cite-bracket">]</span></a></sup></figcaption></figure> <p>Army- and Air Force-related intelligence derived from <a href="/wiki/Signals_intelligence" title="Signals intelligence">signals intelligence</a> (SIGINT) sources—mainly Enigma decrypts in <a href="/wiki/Hut_6" title="Hut 6">Hut 6</a>—was compiled in summaries at GC&CS (<a href="/wiki/Bletchley_Park" title="Bletchley Park">Bletchley Park</a>) Hut 3 and distributed initially under the codeword "BONIFACE",<sup id="cite_ref-FOOTNOTEWest1986136_32-0" class="reference"><a href="#cite_note-FOOTNOTEWest1986136-32"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> implying that it was acquired from a well placed agent in Berlin. The volume of the intelligence reports going out to commanders in the field built up gradually. </p><p>Naval Enigma decrypted in <a href="/wiki/Hut_8" title="Hut 8">Hut 8</a> was forwarded from Hut 4 to the <a href="/wiki/British_Admiralty" class="mw-redirect" title="British Admiralty">Admiralty</a>'s Operational Intelligence Centre (OIC),<sup id="cite_ref-FOOTNOTEBeesly197736_33-0" class="reference"><a href="#cite_note-FOOTNOTEBeesly197736-33"><span class="cite-bracket">[</span>31<span class="cite-bracket">]</span></a></sup> which distributed it initially under the codeword "HYDRO".<sup id="cite_ref-FOOTNOTEWest1986136_32-1" class="reference"><a href="#cite_note-FOOTNOTEWest1986136-32"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> </p><p>The codeword "ULTRA" was adopted in June 1941.<sup id="cite_ref-FOOTNOTEWest1986162_34-0" class="reference"><a href="#cite_note-FOOTNOTEWest1986162-34"><span class="cite-bracket">[</span>32<span class="cite-bracket">]</span></a></sup> This codeword was reportedly suggested by Commander Geoffrey Colpoys, RN, who served in the Royal Navy's OIC. </p> <div class="mw-heading mw-heading3"><h3 id="Army_and_Air_Force">Army and Air Force</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=8" title="Edit section: Army and Air Force"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The distribution of Ultra information to Allied commanders and units in the field involved considerable risk of discovery by the Germans, and great care was taken to control both the information and knowledge of how it was obtained. Liaison officers were appointed for each field command to manage and control dissemination. </p><p>Dissemination of Ultra intelligence to field commanders was carried out by <a href="/wiki/MI6" title="MI6">MI6</a>, which operated Special Liaison Units (SLU) attached to major army and air force commands. The activity was organized and supervised on behalf of MI6 by <a href="/wiki/Group_captain" title="Group captain">Group Captain</a> <a href="/wiki/F._W._Winterbotham" title="F. W. Winterbotham">F. W. Winterbotham</a>. Each SLU included intelligence, communications, and cryptographic elements. It was headed by a British Army or RAF officer, usually a major, known as "Special Liaison Officer". The main function of the liaison officer or his deputy was to pass Ultra intelligence bulletins to the commander of the command he was attached to, or to other indoctrinated staff officers. In order to safeguard Ultra, special precautions were taken. The standard procedure was for the liaison officer to present the intelligence summary to the recipient, stay with him while he studied it, then take it back and destroy it. </p><p>By the end of the war, there were about 40 SLUs serving commands around the world. <sup id="cite_ref-FOOTNOTECalvocoressi200178_35-0" class="reference"><a href="#cite_note-FOOTNOTECalvocoressi200178-35"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> Fixed SLUs existed at the Admiralty, the <a href="/wiki/War_Office" title="War Office">War Office</a>, the <a href="/wiki/Air_Ministry" title="Air Ministry">Air Ministry</a>, <a href="/wiki/RAF_Fighter_Command" title="RAF Fighter Command">RAF Fighter Command</a>, the US Strategic Air Forces in Europe (Wycombe Abbey) and other fixed headquarters in the UK. An SLU was operating at the War HQ in Valletta, Malta.<sup id="cite_ref-FOOTNOTEStephenson200456_36-0" class="reference"><a href="#cite_note-FOOTNOTEStephenson200456-36"><span class="cite-bracket">[</span>34<span class="cite-bracket">]</span></a></sup> These units had permanent teleprinter links to Bletchley Park. </p><p>Mobile SLUs were attached to field army and air force headquarters and depended on radio communications to receive intelligence summaries. The first mobile SLUs appeared during the French campaign of 1940. An SLU supported the <a href="/wiki/British_Expeditionary_Force_(World_War_II)" title="British Expeditionary Force (World War II)">British Expeditionary Force</a> (BEF) headed by <a href="/wiki/John_Vereker,_6th_Viscount_Gort" title="John Vereker, 6th Viscount Gort">General Lord Gort</a>. The first liaison officers were Robert Gore-Browne and Humphrey Plowden.<sup id="cite_ref-FOOTNOTEWest1986138_37-0" class="reference"><a href="#cite_note-FOOTNOTEWest1986138-37"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup> A second SLU of the 1940 period was attached to the <a href="/wiki/RAF_Advanced_Air_Striking_Force" title="RAF Advanced Air Striking Force">RAF Advanced Air Striking Force</a> at <a href="/wiki/Meaux" title="Meaux">Meaux</a> commanded by Air Vice-Marshal <a href="/wiki/Patrick_Playfair" title="Patrick Playfair">P H Lyon Playfair</a>. This SLU was commanded by Squadron Leader F.W. "Tubby" Long. </p> <div class="mw-heading mw-heading3"><h3 id="Intelligence_agencies">Intelligence agencies</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=9" title="Edit section: Intelligence agencies"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 1940, special arrangements were made within the British intelligence services for handling BONIFACE and later Ultra intelligence. The <a href="/wiki/MI5" title="MI5">Security Service</a> started "Special Research Unit B1(b)" under <a href="/wiki/H._L._A._Hart" title="H. L. A. Hart">Herbert Hart</a>. In the <a href="/wiki/MI6" title="MI6">SIS</a> this intelligence was handled by "Section V" based at <a href="/wiki/St_Albans" title="St Albans">St Albans</a>.<sup id="cite_ref-FOOTNOTEWest1986152_38-0" class="reference"><a href="#cite_note-FOOTNOTEWest1986152-38"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Radio_and_cryptography">Radio and cryptography</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=10" title="Edit section: Radio and cryptography"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The communications system was founded by Brigadier Sir <a href="/wiki/Richard_Gambier-Parry" title="Richard Gambier-Parry">Richard Gambier-Parry</a>, who from 1938 to 1946 was head of MI6 Section VIII, based at <a href="/wiki/Whaddon_Hall" title="Whaddon Hall">Whaddon Hall</a> in <a href="/wiki/Buckinghamshire" title="Buckinghamshire">Buckinghamshire</a>, UK.<sup id="cite_ref-FOOTNOTEPidgeon2003_39-0" class="reference"><a href="#cite_note-FOOTNOTEPidgeon2003-39"><span class="cite-bracket">[</span>37<span class="cite-bracket">]</span></a></sup> Ultra summaries from Bletchley Park were sent over landline to the Section VIII radio transmitter at Windy Ridge. From there they were transmitted to the destination SLUs. </p><p>The communications element of each SLU was called a "Special Communications Unit" or SCU. Radio transmitters were constructed at Whaddon Hall workshops, while receivers were the <a href="/wiki/National_HRO" title="National HRO">National HRO</a>, made in the USA. The SCUs were highly mobile and the first such units used civilian <a href="/wiki/Packard" title="Packard">Packard</a> cars. The following SCUs are listed:<sup id="cite_ref-FOOTNOTEPidgeon2003_39-1" class="reference"><a href="#cite_note-FOOTNOTEPidgeon2003-39"><span class="cite-bracket">[</span>37<span class="cite-bracket">]</span></a></sup> SCU1 (Whaddon Hall), SCU2 (France before 1940, India), SCU3 (RSS Hanslope Park), SCU5, SCU6 (possibly Algiers and Italy), SCU7 (training unit in the UK), SCU8 (Europe after D-day), SCU9 (Europe after D-day), SCU11 (Palestine and India), SCU12 (India), SCU13 and SCU14.<sup id="cite_ref-40" class="reference"><a href="#cite_note-40"><span class="cite-bracket">[</span>c<span class="cite-bracket">]</span></a></sup> </p><p>The cryptographic element of each SLU was supplied by the RAF and was based on the <a href="/wiki/Typex" title="Typex">TYPEX</a> cryptographic machine and <a href="/wiki/One-time_pad" title="One-time pad">one-time pad</a> systems. </p><p>RN Ultra messages from the OIC to ships at sea were necessarily transmitted over normal naval radio circuits and were protected by one-time pad encryption.<sup id="cite_ref-FOOTNOTEBeesly1977142_41-0" class="reference"><a href="#cite_note-FOOTNOTEBeesly1977142-41"><span class="cite-bracket">[</span>38<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Lucy">Lucy</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=11" title="Edit section: Lucy"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>An intriguing question concerns the alleged use of Ultra information by the <a href="/wiki/Lucy_spy_ring" title="Lucy spy ring">"Lucy" spy ring</a>,<sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">[</span>39<span class="cite-bracket">]</span></a></sup> headquartered in <a href="/wiki/Switzerland" title="Switzerland">Switzerland</a> and apparently operated by one man, <a href="/wiki/Rudolf_Roessler" title="Rudolf Roessler">Rudolf Roessler</a>. This was an extremely well informed, responsive ring that was able to get information "directly from German General Staff Headquarters"—often on specific request. It has been alleged that "Lucy" was in major part a conduit for the British to feed Ultra intelligence to the Soviets in a way that made it appear to have come from highly placed espionage rather than from <a href="/wiki/Cryptanalysis" title="Cryptanalysis">cryptanalysis</a> of German radio traffic. The Soviets, however, through an agent at Bletchley, <a href="/wiki/John_Cairncross" title="John Cairncross">John Cairncross</a>, knew that Britain had broken Enigma. The "Lucy" ring was initially treated with suspicion by the Soviets. The information it provided was accurate and timely, however, and Soviet agents in Switzerland (including their chief, <a href="/wiki/Alexander_Rad%C3%B3" title="Alexander Radó">Alexander Radó</a>) eventually learned to take it seriously.<sup id="cite_ref-FOOTNOTECrowdy2011307–309_43-0" class="reference"><a href="#cite_note-FOOTNOTECrowdy2011307–309-43"><span class="cite-bracket">[</span>40<span class="cite-bracket">]</span></a></sup> However, the theory that the Lucy ring was a cover for Britain to pass Enigma intelligence to the Soviets has not gained traction. Among others who have rejected the theory, <a href="/wiki/Harry_Hinsley" title="Harry Hinsley">Harry Hinsley</a>, the official historian for the British Secret Services in World War II, stated that "there is no truth in the much-publicized claim that the British authorities made use of the ‘Lucy’ ring ... to forward intelligence to Moscow".<sup id="cite_ref-FOOTNOTETarrant1995170_44-0" class="reference"><a href="#cite_note-FOOTNOTETarrant1995170-44"><span class="cite-bracket">[</span>41<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Use_of_intelligence">Use of intelligence</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=12" title="Edit section: Use of intelligence"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Most deciphered messages, often about relative trivia, were insufficient as intelligence reports for military strategists or field commanders. The organisation, interpretation and distribution of decrypted Enigma message traffic and other sources into usable intelligence was a subtle task. </p><p>At Bletchley Park, extensive indices were kept of the information in the messages decrypted.<sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">[</span>42<span class="cite-bracket">]</span></a></sup> For each message the traffic analysis recorded the radio frequency, the date and time of intercept, and the preamble—which contained the network-identifying discriminant, the time of origin of the message, the callsign of the originating and receiving stations, and the <a href="/wiki/Enigma_machine#Indicator" title="Enigma machine">indicator</a> setting. This allowed cross referencing of a new message with a previous one.<sup id="cite_ref-FOOTNOTEWelchman198456_46-0" class="reference"><a href="#cite_note-FOOTNOTEWelchman198456-46"><span class="cite-bracket">[</span>43<span class="cite-bracket">]</span></a></sup> The indices included message preambles, every person, every ship, every unit, every weapon, every technical term and of repeated phrases such as forms of address and other German military jargon that might be usable as <i><a href="/wiki/Known-plaintext_attack" title="Known-plaintext attack">cribs</a></i>.<sup id="cite_ref-FOOTNOTEBudiansky2000301_47-0" class="reference"><a href="#cite_note-FOOTNOTEBudiansky2000301-47"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup> </p><p>The first decryption of a wartime Enigma message, albeit one that had been transmitted three months earlier, was achieved by the Poles at <a href="/wiki/PC_Bruno" title="PC Bruno">PC Bruno</a> on 17 January 1940. Little had been achieved by the start of the <a href="/wiki/Allied_campaign_in_Norway" class="mw-redirect" title="Allied campaign in Norway">Allied campaign in Norway</a> in April. At the start of the <a href="/wiki/Battle_of_France" title="Battle of France">Battle of France</a> on 10 May 1940, the Germans made a very significant change in the indicator procedures for Enigma messages. However, the Bletchley Park cryptanalysts had anticipated this, and were able—jointly with PC Bruno—to resume breaking messages from 22 May, although often with some delay. The intelligence that these messages yielded was of little operational use in the fast-moving situation of the German advance. </p><p>Decryption of Enigma traffic built up gradually during 1940, with the first two prototype <a href="/wiki/Bombe" title="Bombe">bombes</a> being delivered in March and August. The traffic was almost entirely limited to <i>Luftwaffe</i> messages. By the peak of the <a href="/wiki/Battle_of_the_Mediterranean" title="Battle of the Mediterranean">Battle of the Mediterranean</a> in 1941, however, Bletchley Park was deciphering daily 2,000 Italian Hagelin messages. By the second half of 1941 30,000 Enigma messages a month were being deciphered, rising to 90,000 a month of Enigma and Fish decrypts combined later in the war.<sup id="cite_ref-FOOTNOTEHinsley1993a_29-2" class="reference"><a href="#cite_note-FOOTNOTEHinsley1993a-29"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup> </p><p>Some of the contributions that Ultra intelligence made to the Allied successes are given below. </p> <ul><li>In April 1940, Ultra information provided a detailed picture of the disposition of the German forces, and then their movement orders for the attack on the <a href="/wiki/Low_Countries" title="Low Countries">Low Countries</a> prior to the <a href="/wiki/Battle_of_France" title="Battle of France">Battle of France</a> in May.<sup id="cite_ref-FOOTNOTEWinterbotham197427–31_48-0" class="reference"><a href="#cite_note-FOOTNOTEWinterbotham197427–31-48"><span class="cite-bracket">[</span>45<span class="cite-bracket">]</span></a></sup></li> <li>An Ultra decrypt of June 1940 read <span title="German-language text"><i lang="de"><a href="/wiki/Knickebein" class="mw-redirect" title="Knickebein">KNICKEBEIN</a> KLEVE IST AUF PUNKT 53 GRAD 24 MINUTEN NORD UND EIN GRAD WEST EINGERICHTET</i></span> ("The <a href="/wiki/Cleves" class="mw-redirect" title="Cleves">Cleves</a> <span title="German-language text"><i lang="de">Knickebein</i></span> is directed at position 53 degrees 24 minutes north and 1 degree west"). This was the definitive piece of evidence that <a href="/wiki/Reginald_Victor_Jones" title="Reginald Victor Jones">Dr R. V. Jones</a> of scientific intelligence in the Air Ministry needed to show that the Germans were developing a radio guidance system for their bombers.<sup id="cite_ref-FOOTNOTEJones197892_49-0" class="reference"><a href="#cite_note-FOOTNOTEJones197892-49"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup> Ultra intelligence then continued to play a vital role in the so-called <a href="/wiki/Battle_of_the_Beams" title="Battle of the Beams">Battle of the Beams</a>.</li> <li>During the <a href="/wiki/Battle_of_Britain" title="Battle of Britain">Battle of Britain</a>, Air Chief Marshal <a href="/wiki/Hugh_Dowding,_1st_Baron_Dowding" class="mw-redirect" title="Hugh Dowding, 1st Baron Dowding">Sir Hugh Dowding</a>, Commander-in-Chief of <a href="/wiki/RAF_Fighter_Command" title="RAF Fighter Command">RAF Fighter Command</a>, had a teleprinter link from Bletchley Park to his headquarters at <a href="/wiki/RAF_Bentley_Priory" title="RAF Bentley Priory">RAF Bentley Priory</a>, for Ultra reports. Ultra intelligence kept him informed of German strategy,<sup id="cite_ref-FOOTNOTECalvocoressi200190_50-0" class="reference"><a href="#cite_note-FOOTNOTECalvocoressi200190-50"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> and of the strength and location of various <span title="German-language text"><i lang="de">Luftwaffe</i></span> units, and often provided advance warning of bombing raids (but not of their specific targets).<sup id="cite_ref-FOOTNOTELewin200183_51-0" class="reference"><a href="#cite_note-FOOTNOTELewin200183-51"><span class="cite-bracket">[</span>48<span class="cite-bracket">]</span></a></sup> These contributed to the British success. Dowding was bitterly and sometimes unfairly criticized by others who did not see Ultra, but he did not disclose his source.</li> <li>Decryption of traffic from <span title="German-language text"><i lang="de">Luftwaffe</i></span> radio networks provided a great deal of indirect intelligence about the Germans' planned <a href="/wiki/Operation_Sea_Lion" title="Operation Sea Lion">Operation Sea Lion</a> to invade England in 1940.<sup id="cite_ref-FOOTNOTEJones1978124_52-0" class="reference"><a href="#cite_note-FOOTNOTEJones1978124-52"><span class="cite-bracket">[</span>49<span class="cite-bracket">]</span></a></sup></li> <li>On 17 September 1940 an Ultra message reported that equipment at German airfields in Belgium for loading planes with paratroops and their gear was to be dismantled. This was taken as a clear signal that Sea Lion had been cancelled.<sup id="cite_ref-FOOTNOTEWinterbotham197456–58_53-0" class="reference"><a href="#cite_note-FOOTNOTEWinterbotham197456–58-53"><span class="cite-bracket">[</span>50<span class="cite-bracket">]</span></a></sup></li> <li>Ultra revealed that a major German air raid was planned for the night of 14 November 1940, and indicated three possible targets, including London and Coventry. However, the specific target was not determined until late on the afternoon of 14 November, by detection of the German radio guidance signals. Unfortunately, countermeasures failed to prevent the devastating <a href="/wiki/Coventry_Blitz" title="Coventry Blitz">Coventry Blitz</a>. F. W. Winterbotham claimed that Churchill had advance warning, but intentionally did nothing about the raid, to safeguard Ultra.<sup id="cite_ref-FOOTNOTEWinterbotham197460–61_54-0" class="reference"><a href="#cite_note-FOOTNOTEWinterbotham197460–61-54"><span class="cite-bracket">[</span>51<span class="cite-bracket">]</span></a></sup> This claim has been comprehensively refuted by R. V. Jones,<sup id="cite_ref-FOOTNOTEJones1978146–153_55-0" class="reference"><a href="#cite_note-FOOTNOTEJones1978146–153-55"><span class="cite-bracket">[</span>52<span class="cite-bracket">]</span></a></sup> Sir David Hunt,<sup id="cite_ref-FOOTNOTEHunt1976_56-0" class="reference"><a href="#cite_note-FOOTNOTEHunt1976-56"><span class="cite-bracket">[</span>53<span class="cite-bracket">]</span></a></sup> Ralph Bennett<sup id="cite_ref-FOOTNOTEBennett199964_57-0" class="reference"><a href="#cite_note-FOOTNOTEBennett199964-57"><span class="cite-bracket">[</span>54<span class="cite-bracket">]</span></a></sup> and Peter Calvocoressi.<sup id="cite_ref-FOOTNOTECalvocoressi200194_58-0" class="reference"><a href="#cite_note-FOOTNOTECalvocoressi200194-58"><span class="cite-bracket">[</span>55<span class="cite-bracket">]</span></a></sup> Ultra warned of a raid but did not reveal the target. Churchill, who had been <i>en route</i> to <a href="/wiki/Ditchley" class="mw-redirect" title="Ditchley">Ditchley Park</a>, was told that London might be bombed and returned to <a href="/wiki/10_Downing_Street" title="10 Downing Street">10 Downing Street</a> so that he could observe the raid from the Air Ministry roof.</li> <li>Ultra intelligence considerably aided the British Army's <a href="/wiki/Operation_Compass" title="Operation Compass">Operation Compass</a> victory over the much larger Italian army in <a href="/wiki/Libya" title="Libya">Libya</a> between December 1940 and February 1941.<sup id="cite_ref-59" class="reference"><a href="#cite_note-59"><span class="cite-bracket">[</span>56<span class="cite-bracket">]</span></a></sup></li> <li>Ultra intelligence greatly aided the Royal Navy's victory over the Italian navy in the <a href="/wiki/Battle_of_Cape_Matapan" title="Battle of Cape Matapan">Battle of Cape Matapan</a> in March 1941.<sup id="cite_ref-FOOTNOTEHinsley19933_60-0" class="reference"><a href="#cite_note-FOOTNOTEHinsley19933-60"><span class="cite-bracket">[</span>57<span class="cite-bracket">]</span></a></sup></li> <li>Although the Allies lost the <a href="/wiki/Battle_of_Crete" title="Battle of Crete">Battle of Crete</a> in May 1941, the Ultra intelligence that a parachute landing was planned, and the exact day of the invasion, meant that heavy losses were inflicted on the Germans and that fewer British troops were captured.<sup id="cite_ref-FOOTNOTEWinterbotham197467–69,_187_61-0" class="reference"><a href="#cite_note-FOOTNOTEWinterbotham197467–69,_187-61"><span class="cite-bracket">[</span>58<span class="cite-bracket">]</span></a></sup></li> <li>Ultra intelligence fully revealed the preparations for <a href="/wiki/Operation_Barbarossa" title="Operation Barbarossa">Operation Barbarossa</a>, the German invasion of the USSR. Although this information was passed to the Soviet government, <a href="/wiki/Joseph_Stalin" title="Joseph Stalin">Stalin</a> refused to believe it.<sup id="cite_ref-FOOTNOTELewin2001104_62-0" class="reference"><a href="#cite_note-FOOTNOTELewin2001104-62"><span class="cite-bracket">[</span>59<span class="cite-bracket">]</span></a></sup> The information did, however, help British planning, knowing that substantial German forces were to be deployed to the East.</li> <li>Ultra intelligence made a very significant contribution in the <a href="/wiki/Battle_of_the_Atlantic" title="Battle of the Atlantic">Battle of the Atlantic</a>. Winston Churchill wrote "The only thing that ever really frightened me during the war was the U-boat peril."<sup id="cite_ref-FOOTNOTEChurchill2005529_63-0" class="reference"><a href="#cite_note-FOOTNOTEChurchill2005529-63"><span class="cite-bracket">[</span>60<span class="cite-bracket">]</span></a></sup> The decryption of Enigma signals to the <a href="/wiki/U-boat" title="U-boat">U-boats</a> was much more difficult than those of the <span title="German-language text"><i lang="de">Luftwaffe</i></span>. It was not until June 1941 that Bletchley Park was able to read a significant amount of this traffic contemporaneously.<sup id="cite_ref-FOOTNOTEBudiansky2000341_64-0" class="reference"><a href="#cite_note-FOOTNOTEBudiansky2000341-64"><span class="cite-bracket">[</span>61<span class="cite-bracket">]</span></a></sup> Transatlantic convoys were then diverted away from the U-boat <a href="/wiki/Wolfpack_(naval_tactic)" title="Wolfpack (naval tactic)">"wolfpacks"</a>, and the U-boat supply vessels were sunk. On 1 February 1942, Enigma U-boat traffic became unreadable because of the introduction of a different <a href="/wiki/Cryptanalysis_of_the_Enigma#M4_(German_Navy_4-rotor_Enigma)" title="Cryptanalysis of the Enigma">4-rotor Enigma machine</a>. This situation persisted until December 1942, although other German naval Enigma messages were still being deciphered, such as those of the U-boat training command at Kiel.<sup id="cite_ref-FOOTNOTELewin2001210_65-0" class="reference"><a href="#cite_note-FOOTNOTELewin2001210-65"><span class="cite-bracket">[</span>62<span class="cite-bracket">]</span></a></sup> From December 1942 to the end of the war, Ultra allowed Allied convoys to evade U-boat patrol lines, and guided Allied anti-submarine forces to the location of U-boats at sea.</li> <li>In the <a href="/wiki/Western_Desert_Campaign" class="mw-redirect" title="Western Desert Campaign">Western Desert Campaign</a>, Ultra intelligence helped <a href="/wiki/Archibald_Wavell,_1st_Earl_Wavell" title="Archibald Wavell, 1st Earl Wavell">Wavell</a> and <a href="/wiki/Claude_Auchinleck" title="Claude Auchinleck">Auchinleck</a> to prevent <a href="/wiki/Erwin_Rommel" title="Erwin Rommel">Rommel's</a> forces from reaching Cairo in the autumn of 1941.<sup id="cite_ref-FOOTNOTEWinterbotham1974187_66-0" class="reference"><a href="#cite_note-FOOTNOTEWinterbotham1974187-66"><span class="cite-bracket">[</span>63<span class="cite-bracket">]</span></a></sup></li> <li>Ultra intelligence from Hagelin decrypts, and from <span title="German-language text"><i lang="de">Luftwaffe</i></span> and German naval Enigma decrypts, helped sink about half of the ships supplying the Axis forces in North Africa.<sup id="cite_ref-FOOTNOTEHinsley1993a_29-3" class="reference"><a href="#cite_note-FOOTNOTEHinsley1993a-29"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-mrSmith_67-0" class="reference"><a href="#cite_note-mrSmith-67"><span class="cite-bracket">[</span>64<span class="cite-bracket">]</span></a></sup></li> <li>Ultra intelligence from <span title="German-language text"><i lang="de">Abwehr</i></span> transmissions confirmed that Britain's Security Service (<a href="/wiki/MI5" title="MI5">MI5</a>) had captured all of the German agents in Britain, and that the <span title="German-language text"><i lang="de">Abwehr</i></span> still believed in the many <a href="/wiki/Double_agents" class="mw-redirect" title="Double agents">double agents</a> which MI5 controlled under the <a href="/wiki/Double_Cross_System" class="mw-redirect" title="Double Cross System">Double Cross System</a>.<sup id="cite_ref-FOOTNOTESmith2007129_68-0" class="reference"><a href="#cite_note-FOOTNOTESmith2007129-68"><span class="cite-bracket">[</span>65<span class="cite-bracket">]</span></a></sup> This enabled major deception operations.<sup id="cite_ref-FOOTNOTEBudiansky2000315–316_69-0" class="reference"><a href="#cite_note-FOOTNOTEBudiansky2000315–316-69"><span class="cite-bracket">[</span>66<span class="cite-bracket">]</span></a></sup></li> <li>Deciphered JN-25 messages allowed the U.S. to turn back a Japanese offensive in the <a href="/wiki/Battle_of_the_Coral_Sea" title="Battle of the Coral Sea">Battle of the Coral Sea</a> in April 1942 and set up the decisive American victory at the <a href="/wiki/Battle_of_Midway" title="Battle of Midway">Battle of Midway</a> in June 1942.<sup id="cite_ref-FOOTNOTELewin2001237_70-0" class="reference"><a href="#cite_note-FOOTNOTELewin2001237-70"><span class="cite-bracket">[</span>67<span class="cite-bracket">]</span></a></sup></li> <li>Ultra contributed very significantly to the monitoring of German developments at <a href="/wiki/Peenem%C3%BCnde" title="Peenemünde">Peenemünde</a> and the collection of <a href="/wiki/V-1_and_V-2_intelligence" title="V-1 and V-2 intelligence">V-1 and V-2 intelligence</a> from 1942 onwards.<sup id="cite_ref-FOOTNOTEJones1978336_71-0" class="reference"><a href="#cite_note-FOOTNOTEJones1978336-71"><span class="cite-bracket">[</span>68<span class="cite-bracket">]</span></a></sup></li> <li>Ultra contributed to <a href="/wiki/Bernard_Montgomery,_1st_Viscount_Montgomery_of_Alamein" class="mw-redirect" title="Bernard Montgomery, 1st Viscount Montgomery of Alamein">Montgomery's</a> victory at the <a href="/wiki/Battle_of_Alam_el_Halfa" title="Battle of Alam el Halfa">Battle of Alam el Halfa</a> by providing warning of Rommel's planned attack.<sup id="cite_ref-mrSmith_67-1" class="reference"><a href="#cite_note-mrSmith-67"><span class="cite-bracket">[</span>64<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-72" class="reference"><a href="#cite_note-72"><span class="cite-bracket">[</span>69<span class="cite-bracket">]</span></a></sup></li> <li>Ultra also contributed to the success of Montgomery's offensive in the <a href="/wiki/Second_Battle_of_El_Alamein" title="Second Battle of El Alamein">Second Battle of El Alamein</a>, by providing him (before the battle) with a complete picture of Axis forces, and (during the battle) with Rommel's own action reports to Germany.</li> <li>Ultra provided evidence that the Allied landings in French North Africa (<a href="/wiki/Operation_Torch" title="Operation Torch">Operation Torch</a>) were not anticipated.<sup id="cite_ref-FOOTNOTEWinterbotham1974187–188_73-0" class="reference"><a href="#cite_note-FOOTNOTEWinterbotham1974187–188-73"><span class="cite-bracket">[</span>70<span class="cite-bracket">]</span></a></sup></li> <li>A JN-25 decrypt of 14 April 1943 provided details of Admiral <a href="/wiki/Isoroku_Yamamoto" title="Isoroku Yamamoto">Yamamoto's</a> forthcoming visit to <a href="/wiki/Balalae_Island" title="Balalae Island">Balalae Island</a>, and on 18 April, a year to the day following the <a href="/wiki/Doolittle_Raid" title="Doolittle Raid">Doolittle Raid</a>, <a href="/wiki/Operation_Vengeance" title="Operation Vengeance">his aircraft was shot down</a>, killing this man who was regarded as irreplaceable.<sup id="cite_ref-FOOTNOTEBudiansky2000319_74-0" class="reference"><a href="#cite_note-FOOTNOTEBudiansky2000319-74"><span class="cite-bracket">[</span>71<span class="cite-bracket">]</span></a></sup></li> <li>Ship position reports in the <a href="/wiki/Japanese_army_and_diplomatic_codes" title="Japanese army and diplomatic codes">Japanese Army’s "2468" water transport code</a>, decrypted by the SIS starting in July 1943, helped U.S. submarines and aircraft sink two-thirds of the Japanese merchant marine.<sup id="cite_ref-mundy_75-0" class="reference"><a href="#cite_note-mundy-75"><span class="cite-bracket">[</span>72<span class="cite-bracket">]</span></a></sup><sup class="reference nowrap"><span title="Page / location: pp. 226 ff, 242 ff">: pp. 226 ff, 242 ff </span></sup></li> <li>The part played by Ultra intelligence in the preparation for the <a href="/wiki/Allied_invasion_of_Sicily" title="Allied invasion of Sicily">Allied invasion of Sicily</a> was of unprecedented importance. It provided information as to where the enemy's forces were strongest and that the elaborate strategic deceptions had convinced Hitler and the German high command.<sup id="cite_ref-FOOTNOTELewin2001278_76-0" class="reference"><a href="#cite_note-FOOTNOTELewin2001278-76"><span class="cite-bracket">[</span>73<span class="cite-bracket">]</span></a></sup></li> <li>The success of the <a href="/wiki/Battle_of_North_Cape" class="mw-redirect" title="Battle of North Cape">Battle of North Cape</a>, in which <a href="/wiki/HMS_Duke_of_York_(17)" title="HMS Duke of York (17)">HMS <i>Duke of York</i></a> sank the German battleship <span title="German-language text"><i lang="de"><a href="/wiki/German_battleship_Scharnhorst" title="German battleship Scharnhorst">Scharnhorst</a></i></span>, was entirely built on prompt deciphering of German naval signals.<sup id="cite_ref-FOOTNOTELewin2001227–230_77-0" class="reference"><a href="#cite_note-FOOTNOTELewin2001227–230-77"><span class="cite-bracket">[</span>74<span class="cite-bracket">]</span></a></sup></li> <li>US Army Lieutenant Arthur J. Levenson, who worked on both Enigma and Tunny at Bletchley Park, said in a 1980 interview of intelligence from Tunny:<link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><p>Rommel was appointed Inspector General of the West, and he inspected all the defences along the Normandy beaches and send a very detailed message that I think was 70,000 characters and we decrypted it as a small pamphlet. It was a report of the whole Western defences. How wide the V shaped trenches were to stop tanks, and how much barbed wire. Oh, it was everything and we decrypted it before D-Day.<sup id="cite_ref-FOOTNOTEFarley198039_78-0" class="reference"><a href="#cite_note-FOOTNOTEFarley198039-78"><span class="cite-bracket">[</span>75<span class="cite-bracket">]</span></a></sup> </p></blockquote></li> <li>Both Enigma and Tunny decrypts showed Germany had been taken in by <a href="/wiki/Operation_Bodyguard" title="Operation Bodyguard">Operation Bodyguard</a>, the deception operation to protect <a href="/wiki/Operation_Overlord" title="Operation Overlord">Operation Overlord</a>. They revealed the Germans did not anticipate the <a href="/wiki/Normandy_landings" title="Normandy landings">Normandy landings</a> and even after D-Day still believed Normandy was only a feint, with the main invasion to be in the Pas de Calais.<sup id="cite_ref-FOOTNOTELewin2001292_79-0" class="reference"><a href="#cite_note-FOOTNOTELewin2001292-79"><span class="cite-bracket">[</span>76<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-FOOTNOTEBudiansky2000315_80-0" class="reference"><a href="#cite_note-FOOTNOTEBudiansky2000315-80"><span class="cite-bracket">[</span>77<span class="cite-bracket">]</span></a></sup></li> <li>Information that there was a German <span title="German-language text"><i lang="de"><a href="/wiki/Panzergrenadier" title="Panzergrenadier">Panzergrenadier</a></i></span> division in the planned dropping zone for the US <a href="/wiki/101st_Airborne_Division" title="101st Airborne Division">101st Airborne Division</a> in <a href="/wiki/Operation_Overlord" title="Operation Overlord">Operation Overlord</a> led to a change of location.<sup id="cite_ref-FOOTNOTEFarley198040_81-0" class="reference"><a href="#cite_note-FOOTNOTEFarley198040-81"><span class="cite-bracket">[</span>78<span class="cite-bracket">]</span></a></sup></li> <li>Ultra assisted greatly in <a href="/wiki/Operation_Cobra" title="Operation Cobra">Operation Cobra</a>.</li> <li>Ultra warned of the major German counterattack at Mortain, and allowed the Allies to surround the forces at <a href="/wiki/Falaise_pocket" title="Falaise pocket">Falaise</a>.</li> <li>During the Allied advance to Germany, Ultra often provided detailed tactical information, and showed how Hitler ignored the advice of his generals and insisted on German troops fighting in place "to the last man".<sup id="cite_ref-FOOTNOTEWinterbotham1974180_82-0" class="reference"><a href="#cite_note-FOOTNOTEWinterbotham1974180-82"><span class="cite-bracket">[</span>79<span class="cite-bracket">]</span></a></sup></li> <li><a href="/wiki/Bomber_Harris" class="mw-redirect" title="Bomber Harris">Arthur "Bomber" Harris</a>, officer commanding <a href="/wiki/RAF_Bomber_Command" title="RAF Bomber Command">RAF Bomber Command</a>, was not cleared for Ultra. After D-Day, with the resumption of the strategic bombing campaign over Germany, Harris remained wedded to area bombardment. Historian <a href="/wiki/Frederick_Taylor_(historian)" title="Frederick Taylor (historian)">Frederick Taylor</a> argues that, as Harris was not cleared for access to Ultra, he was given some information gleaned from Enigma but not the information's source. This affected his attitude about post-D-Day directives to target oil installations, since he did not know that senior Allied commanders were using high-level German sources to assess just how much this was hurting the German war effort; thus Harris tended to see the directives to bomb specific oil and munitions targets as a "panacea" (his word) and a distraction from the real task of making the rubble bounce.<sup id="cite_ref-FOOTNOTETaylor2005202_83-0" class="reference"><a href="#cite_note-FOOTNOTETaylor2005202-83"><span class="cite-bracket">[</span>80<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading2"><h2 id="Safeguarding_of_sources">Safeguarding of sources</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=13" title="Edit section: Safeguarding of sources"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The Allies were seriously concerned with the prospect of the Axis command finding out that they had broken into the Enigma traffic. The British were more disciplined about such measures than the Americans, and this difference was a source of friction between them.<sup id="cite_ref-FOOTNOTEWinterbotham197486–91_84-0" class="reference"><a href="#cite_note-FOOTNOTEWinterbotham197486–91-84"><span class="cite-bracket">[</span>81<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-85" class="reference"><a href="#cite_note-85"><span class="cite-bracket">[</span>82<span class="cite-bracket">]</span></a></sup> </p><p>To disguise the source of the intelligence for the Allied attacks on Axis supply ships bound for North Africa, "spotter" submarines and aircraft were sent to search for Axis ships. These searchers or their radio transmissions were observed by the Axis forces, who concluded their ships were being found by conventional reconnaissance. They suspected that there were some 400 Allied submarines in the Mediterranean and a huge fleet of reconnaissance aircraft on <a href="/wiki/Malta" title="Malta">Malta</a>. In fact, there were only 25 submarines and at times as few as three aircraft.<sup id="cite_ref-FOOTNOTEHinsley1993a_29-4" class="reference"><a href="#cite_note-FOOTNOTEHinsley1993a-29"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup> </p><p>This procedure also helped conceal the intelligence source from Allied personnel, who might give away the secret by careless talk, or under interrogation if captured. Along with the search mission that would find the Axis ships, two or three additional search missions would be sent out to other areas, so that crews would not begin to wonder why a single mission found the Axis ships every time. </p><p>Other deceptive means were used. On one occasion, a convoy of five ships sailed from <a href="/wiki/Naples" title="Naples">Naples</a> to North Africa with essential supplies at a critical moment in the North African fighting. There was no time to have the ships properly spotted beforehand. The decision to attack solely on Ultra intelligence went directly to Churchill. The ships were all sunk by an attack "out of the blue", arousing German suspicions of a security breach. To distract the Germans from the idea of a signals breach (such as Ultra), the Allies sent a radio message to a fictitious spy in Naples, congratulating him for this success. According to some sources the Germans decrypted this message and believed it.<sup id="cite_ref-FOOTNOTEMomsen2007_86-0" class="reference"><a href="#cite_note-FOOTNOTEMomsen2007-86"><span class="cite-bracket">[</span>83<span class="cite-bracket">]</span></a></sup> </p><p>In the Battle of the Atlantic, the precautions were taken to the extreme. In most cases where the Allies knew from intercepts the location of a U-boat in mid-Atlantic, the U-boat was not attacked immediately, until a "cover story" could be arranged. For example, a search plane might be "fortunate enough" to sight the U-boat, thus explaining the Allied attack. </p><p>Some Germans had suspicions that all was not right with Enigma. Admiral <a href="/wiki/Karl_D%C3%B6nitz" title="Karl Dönitz">Karl Dönitz</a> received reports of "impossible" encounters between U-boats and enemy vessels which made him suspect some compromise of his communications. In one instance, three U-boats met at a tiny island in the <a href="/wiki/Caribbean_Sea" title="Caribbean Sea">Caribbean Sea</a>, and a British destroyer promptly showed up. The U-boats escaped and reported what had happened. Dönitz immediately asked for a review of Enigma's security. The analysis suggested that the signals problem, if there was one, was not due to the Enigma itself. Dönitz had the settings book changed anyway, blacking out Bletchley Park for a period. However, the evidence was never enough to truly convince him that Naval Enigma was being read by the Allies. The more so, since <i><a href="/wiki/B-Dienst" title="B-Dienst">B-Dienst</a></i>, his own codebreaking group, had partially broken Royal Navy traffic (including its convoy codes early in the war),<sup id="cite_ref-FOOTNOTEMallmann-Showell2003_87-0" class="reference"><a href="#cite_note-FOOTNOTEMallmann-Showell2003-87"><span class="cite-bracket">[</span>84<span class="cite-bracket">]</span></a></sup> and supplied enough information to support the idea that the Allies were unable to read Naval Enigma.<sup id="cite_ref-88" class="reference"><a href="#cite_note-88"><span class="cite-bracket">[</span>d<span class="cite-bracket">]</span></a></sup> </p><p>By 1945, most German Enigma traffic could be decrypted within a day or two, yet the Germans remained confident of its security.<sup id="cite_ref-FOOTNOTEFerris2005165_89-0" class="reference"><a href="#cite_note-FOOTNOTEFerris2005165-89"><span class="cite-bracket">[</span>85<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Role_of_women_in_Allied_codebreaking">Role of women in Allied codebreaking</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=14" title="Edit section: Role of women in Allied codebreaking"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Ann_Caracristi_(right)_at_work_at_SIS.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/0/06/Ann_Caracristi_%28right%29_at_work_at_SIS.png/220px-Ann_Caracristi_%28right%29_at_work_at_SIS.png" decoding="async" width="220" height="176" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/0/06/Ann_Caracristi_%28right%29_at_work_at_SIS.png/330px-Ann_Caracristi_%28right%29_at_work_at_SIS.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/0/06/Ann_Caracristi_%28right%29_at_work_at_SIS.png/440px-Ann_Caracristi_%28right%29_at_work_at_SIS.png 2x" data-file-width="832" data-file-height="664" /></a><figcaption>Women cryptologists at work in the U.S. Army's <a href="/wiki/Arlington_Hall" title="Arlington Hall">Arlington Hall</a></figcaption></figure> <p>After encryption systems were "broken", there was a large volume of cryptologic work needed to recover daily key settings and keep up with changes in enemy security procedures, plus the more mundane work of processing, translating, indexing, analyzing and distributing tens of thousands of intercepted messages daily.<sup id="cite_ref-90" class="reference"><a href="#cite_note-90"><span class="cite-bracket">[</span>86<span class="cite-bracket">]</span></a></sup> The more successful the code breakers were, the more labor was required. Some 8,000 <a href="/wiki/Women_in_Bletchley_Park" title="Women in Bletchley Park">women worked at Bletchley Park</a>, about three quarters of the work force.<sup id="cite_ref-bletchley_park_ref_91-0" class="reference"><a href="#cite_note-bletchley_park_ref-91"><span class="cite-bracket">[</span>87<span class="cite-bracket">]</span></a></sup> Before the attack on Pearl Harbor, the US Navy sent letters to top women's colleges seeking introductions to their best seniors; the Army soon followed suit. By the end of the war, some 7000 workers in the Army Signal Intelligence service, out of a total 10,500, were female. By contrast, the Germans and Japanese had strong ideological objections to women engaging in war work. The Nazis even created a <a href="/wiki/Cross_of_Honour_of_the_German_Mother" title="Cross of Honour of the German Mother">Cross of Honour of the German Mother</a> to encourage women to stay at home and have babies.<sup id="cite_ref-mundy_75-1" class="reference"><a href="#cite_note-mundy-75"><span class="cite-bracket">[</span>72<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Effect_on_the_war">Effect on the war</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=15" title="Edit section: Effect on the war"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The exact influence of Ultra on the course of the war is debated; an oft-repeated assessment is that decryption of German ciphers advanced the <a href="/wiki/Victory_in_Europe_Day" title="Victory in Europe Day">end of the European war</a> by no less than two years.<sup id="cite_ref-FOOTNOTEKahn1997_92-0" class="reference"><a href="#cite_note-FOOTNOTEKahn1997-92"><span class="cite-bracket">[</span>88<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-engima_cryptographic_mathematics_93-0" class="reference"><a href="#cite_note-engima_cryptographic_mathematics-93"><span class="cite-bracket">[</span>89<span class="cite-bracket">]</span></a></sup> Hinsley, who first made this claim, is typically cited as an authority for the two-year estimate.<sup id="cite_ref-94" class="reference"><a href="#cite_note-94"><span class="cite-bracket">[</span>90<span class="cite-bracket">]</span></a></sup> </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><p>Would the Soviets meanwhile have defeated Germany, or Germany the Soviets, or would there have been stalemate on the eastern fronts? What would have been decided about the atom bomb? Not even counter-factual historians can answer such questions. They are questions which do not arise, because the war went as it did. But those historians who are concerned only with the war as it was must ask why it went as it did. And they need venture only a reasonable distance beyond the facts to recognise the extent to which the explanation lies in the influence of Ultra.</p><div class="templatequotecite">— <cite>Hinsley<sup id="cite_ref-FOOTNOTEHinsley199311–13_10-2" class="reference"><a href="#cite_note-FOOTNOTEHinsley199311–13-10"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup></cite></div></blockquote> <p>Winterbotham's quoting of Eisenhower's "decisive" verdict is part of a letter sent by Eisenhower to Menzies after the conclusion of the European war and later found among his papers at the Eisenhower Presidential Library.<sup id="cite_ref-FOOTNOTEWinterbotham19742_95-0" class="reference"><a href="#cite_note-FOOTNOTEWinterbotham19742-95"><span class="cite-bracket">[</span>91<span class="cite-bracket">]</span></a></sup> It allows a contemporary, documentary view of a leader on Ultra's importance: </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><p>July 1945 </p><p>Dear General Menzies: </p><p>I had hoped to be able to pay a visit to Bletchley Park in order to thank you, Sir Edward Travis, and the members of the staff personally for the magnificent service which has been rendered to the Allied cause. </p><p>I am very well aware of the immense amount of work and effort which has been involved in the production of the material with which you supplied us. I fully realize also the numerous setbacks and difficulties with which you have had to contend and how you have always, by your supreme efforts, overcome them. </p><p>The intelligence which has emanated from you before and during this campaign has been of priceless value to me. It has simplified my task as a commander enormously. It has saved thousands of British and American lives and, in no small way, contributed to the speed with which the enemy was routed and eventually forced to surrender. </p><p>I should be very grateful, therefore, if you would express to each and every one of those engaged in this work from me personally my heartfelt admiration and sincere thanks for their very decisive contribution to the Allied war effort. </p><p>Sincerely, </p><p> Dwight D. Eisenhower</p></blockquote> <p>There is wide disagreement about the importance of codebreaking in winning the crucial <a href="/wiki/Battle_of_the_Atlantic" title="Battle of the Atlantic">Battle of the Atlantic</a>. To cite just one example, the historian Max Hastings states that "In 1941 alone, Ultra saved between 1.5 and two million tons of Allied ships from destruction." This would represent a 40 percent to 53 percent reduction, though it is not clear how this extrapolation was made.<sup id="cite_ref-96" class="reference"><a href="#cite_note-96"><span class="cite-bracket">[</span>92<span class="cite-bracket">]</span></a></sup> </p><p>Another view is from a history based on the German naval archives written after the war for the British Admiralty by a former U-boat commander and son-in-law of his commander, Grand Admiral <a href="/wiki/Karl_D%C3%B6nitz" title="Karl Dönitz">Karl Dönitz</a>. His book reports that several times during the war they undertook detailed investigations to see whether their operations were being compromised by broken Enigma ciphers. These investigations were spurred because the Germans had broken the British naval code and found the information useful. Their investigations were negative, and the conclusion was that their defeat "was due firstly to outstanding developments in enemy radar..."<sup id="cite_ref-97" class="reference"><a href="#cite_note-97"><span class="cite-bracket">[</span>93<span class="cite-bracket">]</span></a></sup> The great advance was <a href="/wiki/Centimetric_radar" class="mw-redirect" title="Centimetric radar">centimetric radar</a>, developed in a joint British-American venture, which became operational in the spring of 1943. Earlier radar was unable to distinguish U-boat <a href="/wiki/Conning_tower" title="Conning tower">conning towers</a> from the surface of the sea, so it could not even locate U-boats attacking convoys on the surface on moonless nights; thus the surfaced U-boats were almost invisible, while having the additional advantage of being swifter than their prey. The new higher-frequency radar could spot conning towers, and <a href="/wiki/Periscope" title="Periscope">periscopes</a> could even be detected from airplanes. Some idea of the relative effect of cipher-breaking and radar improvement can be obtained from <a href="/wiki/Battle_of_the_Atlantic" title="Battle of the Atlantic">graphs</a> showing the tonnage of merchantmen sunk and the number of U-boats sunk in each month of the Battle of the Atlantic. The graphs cannot be interpreted unambiguously, because it is challenging to factor in many variables such as improvements in cipher-breaking and the numerous other advances in equipment and techniques used to combat U-boats. Nonetheless, the data seem to favor the view of the former U-boat commander—that radar was crucial. </p><p>While Ultra certainly affected the course of the <a href="/wiki/Western_Front_(World_War_II)" title="Western Front (World War II)">Western Front</a> during the war, two factors often argued against Ultra having shortened the overall war by a measure of years are the relatively small role it played in the <a href="/wiki/Eastern_Front_(World_War_II)" title="Eastern Front (World War II)">Eastern Front conflict between Germany and the Soviet Union</a>, and the completely independent development of the U.S.-led <a href="/wiki/Manhattan_Project" title="Manhattan Project">Manhattan Project</a> to create the <a href="/wiki/Atomic_bomb" class="mw-redirect" title="Atomic bomb">atomic bomb</a>. Author <a href="/wiki/Jeffrey_T._Richelson" title="Jeffrey T. Richelson">Jeffrey T. Richelson</a> mentions Hinsley's estimate of at least two years, and concludes that "It might be more accurate to say that Ultra helped shorten the war by three months – the interval between the actual end of the war in Europe and the time the United States would have been able to drop an atomic bomb on Hamburg or Berlin – and might have shortened the war by as much as two years had the U.S. atomic bomb program been unsuccessful."<sup id="cite_ref-richelson_13-1" class="reference"><a href="#cite_note-richelson-13"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup> Military historian <a href="/wiki/Guy_Hartcup" title="Guy Hartcup">Guy Hartcup</a> analyzes aspects of the question but then simply says, "It is impossible to calculate in terms of months or years how much Ultra shortened the war."<sup id="cite_ref-hartcup_98-0" class="reference"><a href="#cite_note-hartcup-98"><span class="cite-bracket">[</span>94<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Postwar_suppression">Postwar suppression</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=16" title="Edit section: Postwar suppression"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>While it is obvious why Britain and the U.S. went to considerable pains to keep Ultra a secret until the end of the war, it has been a matter of some conjecture why Ultra was kept officially secret for 29 years thereafter, until 1974. During that period, the important contributions to the war effort of a great many people remained unknown, and they were unable to share in the glory of what is now recognised as one of the chief reasons the Allies won the war – or, at least, as quickly as they did. </p><p>At least three explanations exist as to why Ultra was kept secret so long. Each has plausibility, and all may be true. First, as <a href="/wiki/David_Kahn_(writer)" title="David Kahn (writer)">David Kahn</a> pointed out in his 1974 <i>New York Times</i> review of Winterbotham's <i>The Ultra Secret</i>, after the war, surplus Enigmas and Enigma-like machines were sold to <a href="/wiki/Third_World" title="Third World">Third World</a> countries, which remained convinced of the security of the remarkable cipher machines. Their traffic was not as secure as they believed, however, which is one reason the British made the machines available.<sup id="cite_ref-FOOTNOTEKahn19745_99-0" class="reference"><a href="#cite_note-FOOTNOTEKahn19745-99"><span class="cite-bracket">[</span>95<span class="cite-bracket">]</span></a></sup><sup class="noprint Inline-Template noprint noexcerpt Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:NOTRS" class="mw-redirect" title="Wikipedia:NOTRS"><span title="can't tell from source if this is Kahn's conjecture or if he has facts (April 2016)">better source needed</span></a></i>]</sup> </p><p>By the 1970s, newer computer-based ciphers were becoming popular as the world increasingly turned to computerised communications, and the usefulness of Enigma copies (and rotor machines generally) rapidly decreased. Switzerland developed its own version of Enigma, known as <a href="/wiki/NEMA_(machine)" title="NEMA (machine)">NEMA</a>, and used it into the late 1970s, while the United States <a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency</a> (NSA) retired the last of its rotor-based encryption systems, the <a href="/wiki/KL-7" title="KL-7">KL-7</a> series, in the 1980s. </p><p>A second explanation relates to a misadventure of Churchill's between the World Wars, when he publicly disclosed information from decrypted Soviet communications. This had prompted the Soviets to change their ciphers, leading to a blackout.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (May 2011)">citation needed</span></a></i>]</sup> </p><p>The third explanation is given by Winterbotham, who recounts that two weeks after <a href="/wiki/V-E_Day" class="mw-redirect" title="V-E Day">V-E Day</a>, on 25 May 1945, Churchill requested former recipients of Ultra intelligence not to divulge the source or the information that they had received from it, in order that there be neither damage to the future operations of the Secret Service nor any cause for the Axis to blame Ultra for their defeat.<sup id="cite_ref-FOOTNOTEWinterbotham19741_100-0" class="reference"><a href="#cite_note-FOOTNOTEWinterbotham19741-100"><span class="cite-bracket">[</span>96<span class="cite-bracket">]</span></a></sup> </p><p>Since it was British and, later, American message-breaking which had been the most extensive, the importance of Enigma decrypts to the prosecution of the war remained unknown despite revelations by the Poles and the French of their early work on breaking the Enigma cipher. This work, which was carried out in the 1930s and continued into the early part of the war, was necessarily uninformed regarding further breakthroughs achieved by the Allies during the balance of the war. </p> <div class="mw-heading mw-heading2"><h2 id="Postwar_disclosures">Postwar disclosures</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=17" title="Edit section: Postwar disclosures"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 1967, Polish military historian <a href="/wiki/W%C5%82adys%C5%82aw_Kozaczuk" title="Władysław Kozaczuk">Władysław Kozaczuk</a> in his book <i>Bitwa o tajemnice</i> ("Battle for Secrets") first revealed Enigma had been broken by Polish cryptologists before World War II. </p><p>In 1967, David Kahn in <i><a href="/wiki/The_Codebreakers" title="The Codebreakers">The Codebreakers</a></i> described the 1944 capture of a Naval Enigma machine from <a href="/wiki/German_submarine_U-505" title="German submarine U-505"><i>U-505</i></a> and gave the first published hint about the scale, mechanisation and operational importance of the Anglo-American Enigma-breaking operation: </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><p>The Allies now read U-boat operational traffic. For they had, more than a year before the theft, succeeded in solving the difficult U-boat systems, and – in one of the finest cryptanalytic achievements of the war – managed to read the intercepts on a current basis. For this, the cryptanalysts needed the help of a mass of machinery that filled two buildings.<sup id="cite_ref-FOOTNOTEKahn1967506_101-0" class="reference"><a href="#cite_note-FOOTNOTEKahn1967506-101"><span class="cite-bracket">[</span>97<span class="cite-bracket">]</span></a></sup></p></blockquote> <p><a href="/wiki/Ladislas_Farago" title="Ladislas Farago">Ladislas Farago</a>'s 1971 best-seller <i>The Game of the Foxes</i> gave an early garbled version of the myth of the purloined Enigma. According to Farago, it was thanks to a "Polish-Swedish ring [that] the British obtained a working model of the 'Enigma' machine, which the Germans used to encipher their top-secret messages."<sup id="cite_ref-FOOTNOTEFarago1974664_102-0" class="reference"><a href="#cite_note-FOOTNOTEFarago1974664-102"><span class="cite-bracket">[</span>98<span class="cite-bracket">]</span></a></sup> "It was to pick up one of these machines that Commander Denniston went clandestinely to a secluded Polish castle [!] on the eve of the war. Dilly Knox later solved its keying, exposing all Abwehr signals encoded by this system."<sup id="cite_ref-FOOTNOTEFarago1974674_103-0" class="reference"><a href="#cite_note-FOOTNOTEFarago1974674-103"><span class="cite-bracket">[</span>99<span class="cite-bracket">]</span></a></sup> "In 1941 [t]he brilliant cryptologist Dillwyn Knox, working at the Government Code & Cypher School at the Bletchley centre of British code-cracking, solved the keying of the Abwehr's Enigma machine."<sup id="cite_ref-FOOTNOTEFarago1974359_104-0" class="reference"><a href="#cite_note-FOOTNOTEFarago1974359-104"><span class="cite-bracket">[</span>100<span class="cite-bracket">]</span></a></sup> </p><p>Later, the 1973 public disclosure of Enigma decryption in the book <i>Enigma</i> by French intelligence officer <a href="/wiki/Gustave_Bertrand" title="Gustave Bertrand">Gustave Bertrand</a> generated pressure to discuss the rest of the Enigma–Ultra story.<sup id="cite_ref-FOOTNOTEBertrand1973_105-0" class="reference"><a href="#cite_note-FOOTNOTEBertrand1973-105"><span class="cite-bracket">[</span>101<span class="cite-bracket">]</span></a></sup> </p><p>The British ban was finally lifted in 1974, the year that a key participant on the distribution side of the Ultra project, F. W. Winterbotham, published <i>The Ultra Secret</i>. </p><p>A succession of books by former participants and others followed. The official history of British intelligence in World War II was published in five volumes from 1979 to 1988, and included further details from official sources concerning the availability and employment of Ultra intelligence. It was chiefly edited by Harry Hinsley, with one volume by Michael Howard. There is also a one-volume collection of reminiscences by Ultra veterans, <i>Codebreakers</i> (1993), edited by Hinsley and Alan Stripp. </p><p>A 2012 London <a href="/wiki/Science_Museum_(London)" class="mw-redirect" title="Science Museum (London)">Science Museum</a> exhibit, "Code Breaker: Alan Turing's Life and Legacy",<sup id="cite_ref-106" class="reference"><a href="#cite_note-106"><span class="cite-bracket">[</span>102<span class="cite-bracket">]</span></a></sup> marking the <a href="/wiki/Centenary" class="mw-redirect" title="Centenary">centenary</a> of his birth, includes a short film of statements by half a dozen participants and historians of the World War II <a href="/wiki/Bletchley_Park" title="Bletchley Park">Bletchley Park</a> Ultra operations. John Agar, a historian of science and technology, states that by war's end 8,995 people worked at Bletchley Park. Iain Standen, Chief Executive of the Bletchley Park Trust, says of the work done there: "It was crucial to the survival of Britain, and indeed of the West." The Departmental Historian at <a href="/wiki/GCHQ" title="GCHQ">GCHQ</a> (the Government Communications Headquarters), who identifies himself only as "Tony" but seems to speak authoritatively, says that Ultra was a "major force multiplier. It was the first time that quantities of real-time intelligence became available to the British military." He further states that it is only in 2012 that Alan Turing's last two papers on Enigma decryption have been released to Britain's <a href="/wiki/The_National_Archives_(United_Kingdom)" title="The National Archives (United Kingdom)">National Archives</a>; the seven decades' delay had been due to their "continuing sensitivity... It wouldn't have been safe to release [them earlier]." </p> <div class="mw-heading mw-heading2"><h2 id="Holocaust_intelligence">Holocaust intelligence</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=18" title="Edit section: Holocaust intelligence"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Historians and <a href="/wiki/Holocaust_studies" title="Holocaust studies">Holocaust researchers</a> have tried to establish when the Allies realized the full extent of Nazi-era extermination of Jews, and specifically, the extermination-camp system. In 1999, the U.S. Government passed the Nazi War Crimes Disclosure Act (<a href="/wiki/Act_of_Congress" title="Act of Congress">P.L.</a> 105-246), making it policy to declassify all Nazi war crime documents in their files; this was later amended to include the Japanese Imperial Government.<sup id="cite_ref-107" class="reference"><a href="#cite_note-107"><span class="cite-bracket">[</span>103<span class="cite-bracket">]</span></a></sup> As a result, more than 600 decrypts and translations of intercepted messages were disclosed; <a href="/wiki/National_Security_Administration" class="mw-redirect" title="National Security Administration">NSA</a> historian Robert Hanyok would conclude that Allied communications intelligence, "by itself, could not have provided an early warning to Allied leaders regarding the nature and scope of the Holocaust."<sup id="cite_ref-108" class="reference"><a href="#cite_note-108"><span class="cite-bracket">[</span>104<span class="cite-bracket">]</span></a></sup> </p><p>Following <a href="/wiki/Operation_Barbarossa" title="Operation Barbarossa">Operation Barbarossa</a>, decrypts in August 1941 alerted British authorities to the many massacres in occupied zones of the <a href="/wiki/Soviet_Union" title="Soviet Union">Soviet Union</a>, including those of Jews, but specifics were not made public for security reasons.<sup id="cite_ref-109" class="reference"><a href="#cite_note-109"><span class="cite-bracket">[</span>105<span class="cite-bracket">]</span></a></sup> Revelations about the concentration camps were gleaned from other sources, and were publicly reported by the <a href="/wiki/Polish_government-in-exile" title="Polish government-in-exile">Polish government-in-exile</a>, <a href="/wiki/Jan_Karski" title="Jan Karski">Jan Karski</a> and the <a href="/wiki/World_Jewish_Congress" title="World Jewish Congress">WJC</a> offices in Switzerland a year or more later.<sup id="cite_ref-110" class="reference"><a href="#cite_note-110"><span class="cite-bracket">[</span>106<span class="cite-bracket">]</span></a></sup> A decrypted message referring to "<a href="/wiki/Einsatz_Reinhard" class="mw-redirect" title="Einsatz Reinhard">Einsatz Reinhard</a>" (the <a href="/wiki/H%C3%B6fle_telegram" title="Höfle telegram">Höfle telegram</a>), from 11 January 1943 may have outlined the system and listed the number of Jews and others gassed at four death camps the previous year, but codebreakers did not understand the meaning of the message.<sup id="cite_ref-111" class="reference"><a href="#cite_note-111"><span class="cite-bracket">[</span>107<span class="cite-bracket">]</span></a></sup> In summer 1944, <a href="/wiki/Arthur_M._Schlesinger_Jr." title="Arthur M. Schlesinger Jr.">Arthur Schlesinger</a>, an <a href="/wiki/Office_of_Strategic_Services" title="Office of Strategic Services">OSS</a> analyst, interpreted the intelligence as an "incremental increase in persecution rather than ... extermination".<sup id="cite_ref-112" class="reference"><a href="#cite_note-112"><span class="cite-bracket">[</span>108<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Postwar_consequences">Postwar consequences</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=19" title="Edit section: Postwar consequences"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>There has been controversy about the influence of Allied Enigma decryption on the course of World War II. It has also been suggested that the question should be broadened to include Ultra's influence not only on the war itself, but also on the post-war period. </p><p><a href="/wiki/F._W._Winterbotham" title="F. W. Winterbotham">F. W. Winterbotham</a>, the first author to outline the influence of Enigma decryption on the course of World War II, likewise made the earliest contribution to an appreciation of Ultra's <i>postwar</i> influence, which now continues into the 21st century—and not only in the postwar establishment of Britain's <a href="/wiki/GCHQ" title="GCHQ">GCHQ</a> (Government Communication Headquarters) and the United States' NSA. "Let no one be fooled", Winterbotham admonishes in chapter 3, "by the spate of television films and propaganda which has made the war seem like some great triumphant epic. It was, in fact, a very narrow shave, and the reader may like to ponder [...] whether [...] we might have won [without] Ultra."<sup id="cite_ref-FOOTNOTEWinterbotham197425_113-0" class="reference"><a href="#cite_note-FOOTNOTEWinterbotham197425-113"><span class="cite-bracket">[</span>109<span class="cite-bracket">]</span></a></sup> </p><p>Debate continues on whether, had postwar political and military leaders been aware of Ultra's role in Allied victory in World War II, these leaders might have been less optimistic about post-World War II military involvements.<sup id="cite_ref-114" class="reference"><a href="#cite_note-114"><span class="cite-bracket">[</span>e<span class="cite-bracket">]</span></a></sup> </p><p><a href="/wiki/Phillip_Knightley" title="Phillip Knightley">Knightley</a> suggests that Ultra may have contributed to the development of the <a href="/wiki/Cold_War" title="Cold War">Cold War</a>.<sup id="cite_ref-FOOTNOTEKnightley1986173–175_115-0" class="reference"><a href="#cite_note-FOOTNOTEKnightley1986173–175-115"><span class="cite-bracket">[</span>110<span class="cite-bracket">]</span></a></sup> The Soviets received disguised Ultra information, but the existence of Ultra itself was not disclosed by the western Allies. The Soviets, who had clues to Ultra's existence, possibly through <a href="/wiki/Kim_Philby" title="Kim Philby">Kim Philby</a>, <a href="/wiki/John_Cairncross" title="John Cairncross">John Cairncross</a> and <a href="/wiki/Anthony_Blunt" title="Anthony Blunt">Anthony Blunt</a>,<sup id="cite_ref-FOOTNOTEKnightley1986173–175_115-1" class="reference"><a href="#cite_note-FOOTNOTEKnightley1986173–175-115"><span class="cite-bracket">[</span>110<span class="cite-bracket">]</span></a></sup> may thus have felt still more distrustful of their <a href="/wiki/Allies_of_World_War_II" title="Allies of World War II">wartime partners</a>. </p><p>The mystery surrounding the discovery of the sunk <a href="/wiki/German_submarine_U-869" title="German submarine U-869">German submarine <i>U-869</i></a> off the coast of <a href="/wiki/New_Jersey" title="New Jersey">New Jersey</a> by divers <a href="/wiki/Richie_Kohler" title="Richie Kohler">Richie Kohler</a> and <a href="/wiki/John_Chatterton" title="John Chatterton">John Chatterton</a> was unravelled in part through the analysis of Ultra intercepts, which demonstrated that, although <i>U-869</i> had been ordered by U-boat Command to change course and proceed to North Africa, near Rabat, the submarine had missed the messages changing her assignment and had continued to the eastern coast of the U.S., her original destination. </p><p>In 1953, the CIA's <a href="/wiki/Project_ARTICHOKE" class="mw-redirect" title="Project ARTICHOKE">Project ARTICHOKE</a>, a series of experiments on human subjects to develop drugs for use in interrogations, was renamed <a href="/wiki/Project_MKUltra" class="mw-redirect" title="Project MKUltra">Project MKUltra</a>. MK was the CIA's designation for its Technical Services Division and Ultra was in reference to the Ultra project.<sup id="cite_ref-116" class="reference"><a href="#cite_note-116"><span class="cite-bracket">[</span>111<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-117" class="reference"><a href="#cite_note-117"><span class="cite-bracket">[</span>112<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=20" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Hut_6" title="Hut 6">Hut 6</a></li> <li><a href="/wiki/Hut_8" title="Hut 8">Hut 8</a></li> <li><a href="/wiki/Magic_(cryptography)" title="Magic (cryptography)">Magic (cryptography)</a></li> <li><a href="/wiki/Military_intelligence" title="Military intelligence">Military intelligence</a></li> <li><a href="/wiki/Signals_intelligence_in_modern_history" title="Signals intelligence in modern history">Signals intelligence in modern history</a></li> <li><i><a href="/wiki/The_Imitation_Game" title="The Imitation Game">The Imitation Game</a></i></li></ul> <div class="mw-heading mw-heading2"><h2 id="Notes">Notes</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=21" title="Edit section: Notes"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-lower-alpha"> <div class="mw-references-wrap"><ol class="references"> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text">The Hagelin C-38m (a development of the C-36) was the model used by the Italian Navy,<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup> and other Italian and Japanese ciphers and codes such as <a href="/wiki/PURPLE" class="mw-redirect" title="PURPLE">PURPLE</a> and <a href="/wiki/JN-25" class="mw-redirect" title="JN-25">JN-25</a>.<sup id="cite_ref-FOOTNOTEHinsleyStripp1993xx_1-1" class="reference"><a href="#cite_note-FOOTNOTEHinsleyStripp1993xx-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text">The original source for this quote is from Gustave Bertrand's book <i>Enigma ou la plus grande énigme de la guerre 1939–1945</i>, p. 256, at the end of a short passage asserting the importance of Enigma-derived intelligence for Allied victory. The text there is: "Sans parler de cette entrevue historique, la guerre finie, où Sir Winston Churchill, présentant à S.M. George VI le Chef de l'I.S., prononça ces paroles; <i>qui m'ont été rapportées par le général Menziès lui-même:</i> « C'est grâce à l'Arme Secrète du général Menziès, mise en œuvre sur tous les Fronts, que nous avons gagné la Guerre! » " This can be translated as: "Not to mention this historic meeting, after the war, in which Sir Winston Churchill, presenting to H.M. George VI the Chief of the I.S., stated these words, <i>that were reported to me by General Menzies himself</i>: 'It is thanks to the secret weapon of General Menzies, put into use on all the fronts, that we won the war!'" It is not clear when, or on what occasion, Churchill made this statement or when Menzies later related it to Bertrand, who published this in 1973. In his 1987 book <i>"C": The Secret Life of Sir Stewart Graham Menzies</i>, Anthony Cave Brown rendered this as "Churchill told King George VI in Menzies's presence that 'it was thanks to Ultra that we won the war.'" (p. 671) He sourced this (p. 812n) to the same page of the Bertrand book. Subsequent English-language publications have picked up and repeated Brown's formulation, but the quote related by Menzies and Bertrand was longer and Churchill did not use the term 'Ultra' to the King, who may not have been familiar with it.</span> </li> <li id="cite_note-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-40">^</a></b></span> <span class="reference-text">In addition, there were SCU3 and SCU4, which supported <i>Y Service</i> radio intercepting and direction finding facilities. These units were formed from assets of the former <a href="/wiki/MI8" title="MI8">Radio Security Service</a>, after it was reassigned to MI6 and they were not involved in Ultra dissemination.</span> </li> <li id="cite_note-88"><span class="mw-cite-backlink"><b><a href="#cite_ref-88">^</a></b></span> <span class="reference-text">Coincidentally, German success in this respect almost exactly matched in time an Allied blackout from Naval Enigma.</span> </li> <li id="cite_note-114"><span class="mw-cite-backlink"><b><a href="#cite_ref-114">^</a></b></span> <span class="reference-text"><a href="/wiki/Christopher_Kasparek" title="Christopher Kasparek">Christopher Kasparek</a> writes: "Had the... postwar governments of major powers realized ... how Allied victory in World War II had hung by a slender thread first spun by three mathematicians [Rejewski, Różycki, Zygalski] working on Enigma decryption for the general staff of a seemingly negligible power [Poland], they might have been more cautious in picking their own wars." (Review of <a href="/wiki/Michael_Alfred_Peszke" title="Michael Alfred Peszke">Michael Alfred Peszke</a>, <i>The Polish Underground Army, the Western Allies, and the Failure of Strategic Unity in World War II</i>, 2005, in <i><a href="/wiki/The_Polish_Review" title="The Polish Review">The Polish Review</a></i>, vol. L, no. 2, 2005, p. 241). A kindred point concerning postwar American triumphalism is made by British historian <a href="/wiki/Max_Hastings" title="Max Hastings">Max Hastings</a>, author of <i><a href="/wiki/All_Hell_Let_Loose" title="All Hell Let Loose">Inferno: The World at War, 1939–1945</a></i>, in a <a href="/wiki/C-SPAN2" class="mw-redirect" title="C-SPAN2">C-SPAN2</a> "After WORDS" interview with <a href="/wiki/Toby_Harnden" title="Toby Harnden">Toby Harnden</a>, U.S. editor of London's <i><a href="/wiki/Daily_Telegraph" class="mw-redirect" title="Daily Telegraph">Daily Telegraph</a></i>, broadcast 4 December 2011.</span> </li> </ol></div></div> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=22" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239543626"><div class="reflist reflist-columns references-column-width" style="column-width: 30em;"> <ol class="references"> <li id="cite_note-FOOTNOTEHinsleyStripp1993xx-1"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEHinsleyStripp1993xx_1-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEHinsleyStripp1993xx_1-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFHinsleyStripp1993">Hinsley & Stripp 1993</a>, p. xx.</span> </li> <li id="cite_note-FOOTNOTELewin200164-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELewin200164_2-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLewin2001">Lewin 2001</a>, p. 64.</span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFCox2014" class="citation web cs1">Cox, David (28 November 2014). <a rel="nofollow" class="external text" href="https://www.theguardian.com/science/blog/2014/nov/28/imitation-game-alan-turing-us-intelligence-ian-fleming">"The Imitation Game: how Alan Turing played dumb to fool US intelligence - David Cox"</a>. <i>The Guardian</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Guardian&rft.atitle=The+Imitation+Game%3A+how+Alan+Turing+played+dumb+to+fool+US+intelligence+-+David+Cox&rft.date=2014-11-28&rft.aulast=Cox&rft.aufirst=David&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fscience%2Fblog%2F2014%2Fnov%2F28%2Fimitation-game-alan-turing-us-intelligence-ian-fleming&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSmith2011" class="citation book cs1">Smith, Michael (31 October 2011). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=z_CtAwAAQBAJ&q=bletchley+boniface&pg=PT56"><i>The Secrets of Station X: How the Bletchley Park codebreakers helped win the war</i></a>. Biteback Publishing. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9781849542623" title="Special:BookSources/9781849542623"><bdi>9781849542623</bdi></a> – via Google Books.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Secrets+of+Station+X%3A+How+the+Bletchley+Park+codebreakers+helped+win+the+war&rft.pub=Biteback+Publishing&rft.date=2011-10-31&rft.isbn=9781849542623&rft.aulast=Smith&rft.aufirst=Michael&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3Dz_CtAwAAQBAJ%26q%3Dbletchley%2Bboniface%26pg%3DPT56&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBudiansky2018" class="citation book cs1">Budiansky, Stephen (27 June 2018). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=uccLlgJDk4gC&q=code+breaking+WW+II+code+name+magic&pg=PA6"><i>Battle of Wits: The Complete Story of Codebreaking in World War II</i></a>. Simon and Schuster. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9780684859323" title="Special:BookSources/9780684859323"><bdi>9780684859323</bdi></a> – via Google Books.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Battle+of+Wits%3A+The+Complete+Story+of+Codebreaking+in+World+War+II&rft.pub=Simon+and+Schuster&rft.date=2018-06-27&rft.isbn=9780684859323&rft.aulast=Budiansky&rft.aufirst=Stephen&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DuccLlgJDk4gC%26q%3Dcode%2Bbreaking%2BWW%2BII%2Bcode%2Bname%2Bmagic%26pg%3DPA6&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text">see: <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="http://www.cryptomuseum.com/crypto/hagelin/index.htm"><i>Crypto AG: Hagelin cipher machines</i></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Crypto+AG%3A+Hagelin+cipher+machines&rft_id=http%3A%2F%2Fwww.cryptomuseum.com%2Fcrypto%2Fhagelin%2Findex.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEWinterbotham1974154,_191-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWinterbotham1974154,_191_9-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWinterbotham1974">Winterbotham 1974</a>, pp. 154, 191.</span> </li> <li id="cite_note-FOOTNOTEHinsley199311–13-10"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEHinsley199311–13_10-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEHinsley199311–13_10-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-FOOTNOTEHinsley199311–13_10-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFHinsley1993">Hinsley 1993</a>, pp. 11–13.</span> </li> <li id="cite_note-FOOTNOTEHinsley1996-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEHinsley1996_11-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFHinsley1996">Hinsley 1996</a>.</span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKeegan2003" class="citation book cs1">Keegan, John, Sir (2003). <i>Intelligence in Warfare</i>. New York: Alfred A. Knopf.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Intelligence+in+Warfare&rft.place=New+York&rft.pub=Alfred+A.+Knopf&rft.date=2003&rft.aulast=Keegan&rft.aufirst=John%2C+Sir&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_book" title="Template:Cite book">cite book</a>}}</code>: CS1 maint: multiple names: authors list (<a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">link</a>)</span></span> </li> <li id="cite_note-richelson-13"><span class="mw-cite-backlink">^ <a href="#cite_ref-richelson_13-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-richelson_13-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRichelson1997" class="citation book cs1"><a href="/wiki/Jeffrey_T._Richelson" title="Jeffrey T. Richelson">Richelson, Jeffery T.</a> (1997). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=HohPaIyc5G0C&pg=PA196"><i>A Century of Spies: Intelligence in the Twentieth Century</i></a>. New York: Oxford University Press. p. 296. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9780195113907" title="Special:BookSources/9780195113907"><bdi>9780195113907</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=A+Century+of+Spies%3A+Intelligence+in+the+Twentieth+Century&rft.place=New+York&rft.pages=296&rft.pub=Oxford+University+Press&rft.date=1997&rft.isbn=9780195113907&rft.aulast=Richelson&rft.aufirst=Jeffery+T.&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DHohPaIyc5G0C%26pg%3DPA196&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEWinterbotham1974-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWinterbotham1974_14-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWinterbotham1974">Winterbotham 1974</a>.</span> </li> <li id="cite_note-FOOTNOTEDeutsch19771-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEDeutsch19771_15-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFDeutsch1977">Deutsch 1977</a>, p. 1.</span> </li> <li id="cite_note-FOOTNOTERoberts2009297-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTERoberts2009297_16-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFRoberts2009">Roberts 2009</a>, p. 297.</span> </li> <li id="cite_note-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-17">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20170202043901/https://www.bletchleypark.org.uk/news/v.rhtm/Bletchley_Park_welcomes_2015s_200000th_visitor-908901.html">"Bletchley Park Welcomes 2015'S 200,000th Visitor"</a>. Bletchley Park. 26 August 2015. Archived from <a rel="nofollow" class="external text" href="https://www.bletchleypark.org.uk/news/v.rhtm/Bletchley_Park_welcomes_2015s_200000th_visitor-908901.html">the original</a> on 2 February 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">25 January</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Bletchley+Park+Welcomes+2015%27S+200%2C000th+Visitor&rft.pub=Bletchley+Park&rft.date=2015-08-26&rft_id=https%3A%2F%2Fwww.bletchleypark.org.uk%2Fnews%2Fv.rhtm%2FBletchley_Park_welcomes_2015s_200000th_visitor-908901.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-haigh-18"><span class="mw-cite-backlink">^ <a href="#cite_ref-haigh_18-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-haigh_18-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-haigh_18-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-haigh_18-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-haigh_18-4"><sup><i><b>e</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHaigh2017" class="citation journal cs1">Haigh, Thomas (January 2017). <a rel="nofollow" class="external text" href="http://cacm.acm.org/magazines/2017/1/211102-colossal-genius/fulltext">"Colossal Genius: Tutte, Flowers, and a Bad Imitation of Turing"</a>. <i><a href="/wiki/Communications_of_the_ACM" title="Communications of the ACM">Communications of the ACM</a></i>. <b>60</b> (1): 29–35. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F3018994">10.1145/3018994</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:41650745">41650745</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Communications+of+the+ACM&rft.atitle=Colossal+Genius%3A+Tutte%2C+Flowers%2C+and+a+Bad+Imitation+of+Turing&rft.volume=60&rft.issue=1&rft.pages=29-35&rft.date=2017-01&rft_id=info%3Adoi%2F10.1145%2F3018994&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A41650745%23id-name%3DS2CID&rft.aulast=Haigh&rft.aufirst=Thomas&rft_id=http%3A%2F%2Fcacm.acm.org%2Fmagazines%2F2017%2F1%2F211102-colossal-genius%2Ffulltext&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTESingh1999145-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESingh1999145_19-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSingh1999">Singh 1999</a>, p. 145.</span> </li> <li id="cite_note-FOOTNOTECopeland2004231,_232-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTECopeland2004231,_232_20-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFCopeland2004">Copeland 2004</a>, pp. 231, 232.</span> </li> <li id="cite_note-FOOTNOTEKozaczuk198481–92-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEKozaczuk198481–92_21-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFKozaczuk1984">Kozaczuk 1984</a>, pp. 81–92.</span> </li> <li id="cite_note-FOOTNOTERejewski1984242–43-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTERejewski1984242–43_22-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFRejewski1984">Rejewski 1984</a>, pp. 242–43.</span> </li> <li id="cite_note-FOOTNOTECopeland2004234,_235-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTECopeland2004234,_235_23-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFCopeland2004">Copeland 2004</a>, pp. 234, 235.</span> </li> <li id="cite_note-FOOTNOTEWelchman1984289-24"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEWelchman1984289_24-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEWelchman1984289_24-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFWelchman1984">Welchman 1984</a>, p. 289.</span> </li> <li id="cite_note-FOOTNOTEBamford200117-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBamford200117_25-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBamford2001">Bamford 2001</a>, p. 17.</span> </li> <li id="cite_note-FOOTNOTEGannon2006103-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEGannon2006103_26-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFGannon2006">Gannon 2006</a>, p. 103.</span> </li> <li id="cite_note-Hinsley_1993_8-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-Hinsley_1993_8_27-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFHinsley1993a">Hinsley 1993a</a>, p. 8</span> </li> <li id="cite_note-Brzezinski_2005_18-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-Brzezinski_2005_18_28-0">^</a></b></span> <span class="reference-text">(<a href="#CITEREFBrzezinski2005">Brzezinski 2005</a>, p. 18)</span> </li> <li id="cite_note-FOOTNOTEHinsley1993a-29"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEHinsley1993a_29-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEHinsley1993a_29-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-FOOTNOTEHinsley1993a_29-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-FOOTNOTEHinsley1993a_29-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-FOOTNOTEHinsley1993a_29-4"><sup><i><b>e</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFHinsley1993a">Hinsley 1993a</a>.</span> </li> <li id="cite_note-FOOTNOTEWilkinson199361–67-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWilkinson199361–67_30-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWilkinson1993">Wilkinson 1993</a>, pp. 61–67.</span> </li> <li id="cite_note-FOOTNOTEBennett1999302-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBennett1999302_31-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBennett1999">Bennett 1999</a>, p. 302.</span> </li> <li id="cite_note-FOOTNOTEWest1986136-32"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEWest1986136_32-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEWest1986136_32-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFWest1986">West 1986</a>, p. 136.</span> </li> <li id="cite_note-FOOTNOTEBeesly197736-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBeesly197736_33-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBeesly1977">Beesly 1977</a>, p. 36.</span> </li> <li id="cite_note-FOOTNOTEWest1986162-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWest1986162_34-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWest1986">West 1986</a>, p. 162.</span> </li> <li id="cite_note-FOOTNOTECalvocoressi200178-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTECalvocoressi200178_35-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFCalvocoressi2001">Calvocoressi 2001</a>, pp. 78.</span> </li> <li id="cite_note-FOOTNOTEStephenson200456-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEStephenson200456_36-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFStephenson2004">Stephenson 2004</a>, p. 56.</span> </li> <li id="cite_note-FOOTNOTEWest1986138-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWest1986138_37-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWest1986">West 1986</a>, p. 138.</span> </li> <li id="cite_note-FOOTNOTEWest1986152-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWest1986152_38-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWest1986">West 1986</a>, p. 152.</span> </li> <li id="cite_note-FOOTNOTEPidgeon2003-39"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEPidgeon2003_39-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEPidgeon2003_39-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFPidgeon2003">Pidgeon 2003</a>.</span> </li> <li id="cite_note-FOOTNOTEBeesly1977142-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBeesly1977142_41-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBeesly1977">Beesly 1977</a>, p. 142.</span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPiekalkiewicz1987" class="citation news cs1">Piekalkiewicz, Janusz (9 August 1987). <a rel="nofollow" class="external text" href="https://www.latimes.com/archives/la-xpm-1987-08-09-bk-198-story.html">"Operation 'Citadel'—Kursk and Orel: The Greatest Tank Battle of the Second World War by Janusz Piekalkiewicz; translated by Michaela Nierhaus; (Presidio: $25; 288 pp., illustrated)"</a>. <i>Los Angeles Times</i> (book review)<span class="reference-accessdate">. Retrieved <span class="nowrap">8 June</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Los+Angeles+Times&rft.atitle=Operation+%27Citadel%27%E2%80%94Kursk+and+Orel%3A+The+Greatest+Tank+Battle+of+the+Second+World+War+by+Janusz+Piekalkiewicz%3B+translated+by+Michaela+Nierhaus%3B+%28Presidio%3A+%2425%3B+288+pp.%2C+illustrated%29&rft.date=1987-08-09&rft.aulast=Piekalkiewicz&rft.aufirst=Janusz&rft_id=https%3A%2F%2Fwww.latimes.com%2Farchives%2Fla-xpm-1987-08-09-bk-198-story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTECrowdy2011307–309-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTECrowdy2011307–309_43-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFCrowdy2011">Crowdy 2011</a>, pp. 307–309.</span> </li> <li id="cite_note-FOOTNOTETarrant1995170-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTETarrant1995170_44-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFTarrant1995">Tarrant 1995</a>, p. 170.</span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20110429032943/http://www.bletchleypark.org.uk/edu/archives/gccscoll.rhtm">"Bletchley Park Archives: Government Code & Cypher School Card Indices"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.bletchleypark.org.uk/edu/archives/gccscoll.rhtm">the original</a> on 29 April 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">8 July</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Bletchley+Park+Archives%3A+Government+Code+%26+Cypher+School+Card+Indices&rft_id=http%3A%2F%2Fwww.bletchleypark.org.uk%2Fedu%2Farchives%2Fgccscoll.rhtm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEWelchman198456-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWelchman198456_46-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWelchman1984">Welchman 1984</a>, p. 56.</span> </li> <li id="cite_note-FOOTNOTEBudiansky2000301-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBudiansky2000301_47-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBudiansky2000">Budiansky 2000</a>, p. 301.</span> </li> <li id="cite_note-FOOTNOTEWinterbotham197427–31-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWinterbotham197427–31_48-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWinterbotham1974">Winterbotham 1974</a>, pp. 27–31.</span> </li> <li id="cite_note-FOOTNOTEJones197892-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEJones197892_49-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFJones1978">Jones 1978</a>, p. 92.</span> </li> <li id="cite_note-FOOTNOTECalvocoressi200190-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTECalvocoressi200190_50-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFCalvocoressi2001">Calvocoressi 2001</a>, p. 90.</span> </li> <li id="cite_note-FOOTNOTELewin200183-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELewin200183_51-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLewin2001">Lewin 2001</a>, p. 83.</span> </li> <li id="cite_note-FOOTNOTEJones1978124-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEJones1978124_52-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFJones1978">Jones 1978</a>, p. 124.</span> </li> <li id="cite_note-FOOTNOTEWinterbotham197456–58-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWinterbotham197456–58_53-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWinterbotham1974">Winterbotham 1974</a>, pp. 56–58.</span> </li> <li id="cite_note-FOOTNOTEWinterbotham197460–61-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWinterbotham197460–61_54-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWinterbotham1974">Winterbotham 1974</a>, pp. 60–61.</span> </li> <li id="cite_note-FOOTNOTEJones1978146–153-55"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEJones1978146–153_55-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFJones1978">Jones 1978</a>, pp. 146–153.</span> </li> <li id="cite_note-FOOTNOTEHunt1976-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEHunt1976_56-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFHunt1976">Hunt 1976</a>.</span> </li> <li id="cite_note-FOOTNOTEBennett199964-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBennett199964_57-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBennett1999">Bennett 1999</a>, p. 64.</span> </li> <li id="cite_note-FOOTNOTECalvocoressi200194-58"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTECalvocoressi200194_58-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFCalvocoressi2001">Calvocoressi 2001</a>, p. 94.</span> </li> <li id="cite_note-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-59">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20110429032938/http://www.bletchleypark.org.uk/content/archive/index/december1940.rhtm">"Seventy Years Ago This Month at Bletchley Park: December 1940"</a>. Bletchley Park National Codes Centre. Archived from <a rel="nofollow" class="external text" href="http://www.bletchleypark.org.uk/content/archive/index/december1940.rhtm">the original</a> on 29 April 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">16 December</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Seventy+Years+Ago+This+Month+at+Bletchley+Park%3A+December+1940&rft.pub=Bletchley+Park+National+Codes+Centre&rft_id=http%3A%2F%2Fwww.bletchleypark.org.uk%2Fcontent%2Farchive%2Findex%2Fdecember1940.rhtm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEHinsley19933-60"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEHinsley19933_60-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFHinsley1993">Hinsley 1993</a>, p. 3.</span> </li> <li id="cite_note-FOOTNOTEWinterbotham197467–69,_187-61"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWinterbotham197467–69,_187_61-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWinterbotham1974">Winterbotham 1974</a>, pp. 67–69, 187.</span> </li> <li id="cite_note-FOOTNOTELewin2001104-62"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELewin2001104_62-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLewin2001">Lewin 2001</a>, p. 104.</span> </li> <li id="cite_note-FOOTNOTEChurchill2005529-63"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEChurchill2005529_63-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFChurchill2005">Churchill 2005</a>, p. 529.</span> </li> <li id="cite_note-FOOTNOTEBudiansky2000341-64"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBudiansky2000341_64-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBudiansky2000">Budiansky 2000</a>, p. 341.</span> </li> <li id="cite_note-FOOTNOTELewin2001210-65"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELewin2001210_65-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLewin2001">Lewin 2001</a>, p. 210.</span> </li> <li id="cite_note-FOOTNOTEWinterbotham1974187-66"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWinterbotham1974187_66-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWinterbotham1974">Winterbotham 1974</a>, p. 187.</span> </li> <li id="cite_note-mrSmith-67"><span class="mw-cite-backlink">^ <a href="#cite_ref-mrSmith_67-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-mrSmith_67-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSmith2002" class="citation web cs1">Smith, Kevin D. (July–August 2002). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=b1rsIQMC-1QC">"The contribution of Intelligence at the Battle of Alam Halfa"</a>. <a href="/wiki/Military_Review" class="mw-redirect" title="Military Review">Military Review</a>. pp. 74–77. <q>Only a few days before the battle, Ultra confirmed that Montgomery's estimate of Rommel's intentions was correct.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+contribution+of+Intelligence+at+the+Battle+of+Alam+Halfa&rft.pages=74-77&rft.pub=Military+Review&rft.date=2002-07%2F2002-08&rft.aulast=Smith&rft.aufirst=Kevin+D.&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3Db1rsIQMC-1QC&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTESmith2007129-68"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTESmith2007129_68-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFSmith2007">Smith 2007</a>, p. 129.</span> </li> <li id="cite_note-FOOTNOTEBudiansky2000315–316-69"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBudiansky2000315–316_69-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBudiansky2000">Budiansky 2000</a>, pp. 315–316.</span> </li> <li id="cite_note-FOOTNOTELewin2001237-70"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELewin2001237_70-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLewin2001">Lewin 2001</a>, p. 237.</span> </li> <li id="cite_note-FOOTNOTEJones1978336-71"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEJones1978336_71-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFJones1978">Jones 1978</a>, p. 336.</span> </li> <li id="cite_note-72"><span class="mw-cite-backlink"><b><a href="#cite_ref-72">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHarper2017" class="citation book cs1">Harper, Glyn (2017). <i>The battle for North Africa: El Alamein and the turning point for World War II</i>. Indiana University Press. p. 95. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9780253031433" title="Special:BookSources/9780253031433"><bdi>9780253031433</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+battle+for+North+Africa%3A+El+Alamein+and+the+turning+point+for+World+War+II&rft.pages=95&rft.pub=Indiana+University+Press&rft.date=2017&rft.isbn=9780253031433&rft.aulast=Harper&rft.aufirst=Glyn&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEWinterbotham1974187–188-73"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWinterbotham1974187–188_73-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWinterbotham1974">Winterbotham 1974</a>, pp. 187–188.</span> </li> <li id="cite_note-FOOTNOTEBudiansky2000319-74"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBudiansky2000319_74-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBudiansky2000">Budiansky 2000</a>, p. 319.</span> </li> <li id="cite_note-mundy-75"><span class="mw-cite-backlink">^ <a href="#cite_ref-mundy_75-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-mundy_75-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMundy2017" class="citation book cs1">Mundy, Liza (2017). <i>Code Girls: The Untold Story of the American Women Code Breakers of World War II</i>. New York, Boston: Hachette. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-316-35253-6" title="Special:BookSources/978-0-316-35253-6"><bdi>978-0-316-35253-6</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Code+Girls%3A+The+Untold+Story+of+the+American+Women+Code+Breakers+of+World+War+II&rft.place=New+York%2C+Boston&rft.pub=Hachette&rft.date=2017&rft.isbn=978-0-316-35253-6&rft.aulast=Mundy&rft.aufirst=Liza&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTELewin2001278-76"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELewin2001278_76-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLewin2001">Lewin 2001</a>, p. 278.</span> </li> <li id="cite_note-FOOTNOTELewin2001227–230-77"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELewin2001227–230_77-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLewin2001">Lewin 2001</a>, pp. 227–230.</span> </li> <li id="cite_note-FOOTNOTEFarley198039-78"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFarley198039_78-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFarley1980">Farley 1980</a>, p. 39.</span> </li> <li id="cite_note-FOOTNOTELewin2001292-79"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTELewin2001292_79-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFLewin2001">Lewin 2001</a>, p. 292.</span> </li> <li id="cite_note-FOOTNOTEBudiansky2000315-80"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBudiansky2000315_80-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBudiansky2000">Budiansky 2000</a>, p. 315.</span> </li> <li id="cite_note-FOOTNOTEFarley198040-81"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFarley198040_81-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFarley1980">Farley 1980</a>, p. 40.</span> </li> <li id="cite_note-FOOTNOTEWinterbotham1974180-82"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWinterbotham1974180_82-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWinterbotham1974">Winterbotham 1974</a>, p. 180.</span> </li> <li id="cite_note-FOOTNOTETaylor2005202-83"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTETaylor2005202_83-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFTaylor2005">Taylor 2005</a>, p. 202.</span> </li> <li id="cite_note-FOOTNOTEWinterbotham197486–91-84"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWinterbotham197486–91_84-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWinterbotham1974">Winterbotham 1974</a>, pp. 86–91.</span> </li> <li id="cite_note-85"><span class="mw-cite-backlink"><b><a href="#cite_ref-85">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130402205420/http://www.bletchleypark.org.uk/content/archive/oct1943.rhtm"><i>Bletchley park archives: October 1943 : Not all our own way</i></a>, archived from <a rel="nofollow" class="external text" href="http://www.bletchleypark.org.uk/content/archive/oct1943.rhtm">the original</a> on 2 April 2013<span class="reference-accessdate">, retrieved <span class="nowrap">9 February</span> 2011</span></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Bletchley+park+archives%3A+October+1943+%3A+Not+all+our+own+way&rft_id=http%3A%2F%2Fwww.bletchleypark.org.uk%2Fcontent%2Farchive%2Foct1943.rhtm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEMomsen2007-86"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEMomsen2007_86-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFMomsen2007">Momsen 2007</a>.</span> </li> <li id="cite_note-FOOTNOTEMallmann-Showell2003-87"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEMallmann-Showell2003_87-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFMallmann-Showell2003">Mallmann-Showell 2003</a>.</span> </li> <li id="cite_note-FOOTNOTEFerris2005165-89"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFerris2005165_89-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFerris2005">Ferris 2005</a>, p. 165.</span> </li> <li id="cite_note-90"><span class="mw-cite-backlink"><b><a href="#cite_ref-90">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.nsa.gov/Portals/70/documents/about/cryptologic-heritage/historical-figures-publications/publications/wwii/sharing_the_burden.pdf">Sharing the Burden—Women in Cryptology During World War II</a>, Jennifer Wilcox, Center for Cryptologic History, 1998</span> </li> <li id="cite_note-bletchley_park_ref-91"><span class="mw-cite-backlink"><b><a href="#cite_ref-bletchley_park_ref_91-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.bletchleyparkresearch.co.uk/research-notes/women-codebreakers/">"Women Codebreakers"</a>. <i>Bletchley Park Research</i><span class="reference-accessdate">. Retrieved <span class="nowrap">3 November</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Bletchley+Park+Research&rft.atitle=Women+Codebreakers&rft_id=http%3A%2F%2Fwww.bletchleyparkresearch.co.uk%2Fresearch-notes%2Fwomen-codebreakers%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEKahn1997-92"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEKahn1997_92-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFKahn1997">Kahn 1997</a>.</span> </li> <li id="cite_note-engima_cryptographic_mathematics-93"><span class="mw-cite-backlink"><b><a href="#cite_ref-engima_cryptographic_mathematics_93-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMiller2001" class="citation journal cs1">Miller, A. Ray (2001). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20090117030740/http://www.nsa.gov/about/_files/cryptologic_heritage/publications/wwii/engima_cryptographic_mathematics.pdf">"The Cryptographic Mathematics of Enigma"</a> <span class="cs1-format">(PDF)</span>. National Security Agency. Archived from <a rel="nofollow" class="external text" href="http://www.nsa.gov/about/_files/cryptologic_heritage/publications/wwii/engima_cryptographic_mathematics.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 17 January 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">14 January</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Cryptographic+Mathematics+of+Enigma&rft.date=2001&rft.aulast=Miller&rft.aufirst=A.+Ray&rft_id=http%3A%2F%2Fwww.nsa.gov%2Fabout%2F_files%2Fcryptologic_heritage%2Fpublications%2Fwwii%2Fengima_cryptographic_mathematics.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span> <span class="cs1-visible-error citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_journal" title="Template:Cite journal">cite journal</a>}}</code>: </span><span class="cs1-visible-error citation-comment">Cite journal requires <code class="cs1-code">|journal=</code> (<a href="/wiki/Help:CS1_errors#missing_periodical" title="Help:CS1 errors">help</a>)</span></span> </li> <li id="cite_note-94"><span class="mw-cite-backlink"><b><a href="#cite_ref-94">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHinsley" class="citation web cs1">Hinsley, F.H. <a rel="nofollow" class="external text" href="http://www.cix.co.uk/~klockstone/hinsley.htm">"The Influence of ULTRA in the Second World War"</a>. <i>Keith Lockstone's home page</i><span class="reference-accessdate">. Retrieved <span class="nowrap">13 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Keith+Lockstone%27s+home+page&rft.atitle=The+Influence+of+ULTRA+in+the+Second+World+War&rft.aulast=Hinsley&rft.aufirst=F.H.&rft_id=http%3A%2F%2Fwww.cix.co.uk%2F~klockstone%2Fhinsley.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEWinterbotham19742-95"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWinterbotham19742_95-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWinterbotham1974">Winterbotham 1974</a>, p. 2.</span> </li> <li id="cite_note-96"><span class="mw-cite-backlink"><b><a href="#cite_ref-96">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHastings2011" class="citation book cs1">Hastings, Max (2011). <i>All Hell Let Loose: The World at War, 1939–45</i>. London: HarperPress. pp. 275–276.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=All+Hell+Let+Loose%3A+The+World+at+War%2C+1939%E2%80%9345&rft.place=London&rft.pages=275-276&rft.pub=HarperPress&rft.date=2011&rft.aulast=Hastings&rft.aufirst=Max&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-97"><span class="mw-cite-backlink"><b><a href="#cite_ref-97">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHessler1989" class="citation book cs1">Hessler, Günther (1989). <i>The U-Boat war in the Atlantic, 1939–1945</i>. London: Her Majesty's Stationery Office.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+U-Boat+war+in+the+Atlantic%2C+1939%E2%80%931945&rft.place=London&rft.pub=Her+Majesty%27s+Stationery+Office&rft.date=1989&rft.aulast=Hessler&rft.aufirst=G%C3%BCnther&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span><b>2</b>, p. 26.</span> </li> <li id="cite_note-hartcup-98"><span class="mw-cite-backlink"><b><a href="#cite_ref-hartcup_98-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHartcup2000" class="citation book cs1"><a href="/wiki/Guy_Hartcup" title="Guy Hartcup">Hartcup, Guy</a> (2000). <i>The Effect of Science on the Second World War</i>. Basingstoke, Hampshire: Macmillan Press. pp. 96–99.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Effect+of+Science+on+the+Second+World+War&rft.place=Basingstoke%2C+Hampshire&rft.pages=96-99&rft.pub=Macmillan+Press&rft.date=2000&rft.aulast=Hartcup&rft.aufirst=Guy&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-FOOTNOTEKahn19745-99"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEKahn19745_99-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFKahn1974">Kahn 1974</a>, p. 5.</span> </li> <li id="cite_note-FOOTNOTEWinterbotham19741-100"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWinterbotham19741_100-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWinterbotham1974">Winterbotham 1974</a>, p. 1.</span> </li> <li id="cite_note-FOOTNOTEKahn1967506-101"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEKahn1967506_101-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFKahn1967">Kahn 1967</a>, p. 506.</span> </li> <li id="cite_note-FOOTNOTEFarago1974664-102"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFarago1974664_102-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFarago1974">Farago 1974</a>, p. 664.</span> </li> <li id="cite_note-FOOTNOTEFarago1974674-103"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFarago1974674_103-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFarago1974">Farago 1974</a>, p. 674.</span> </li> <li id="cite_note-FOOTNOTEFarago1974359-104"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEFarago1974359_104-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFFarago1974">Farago 1974</a>, p. 359.</span> </li> <li id="cite_note-FOOTNOTEBertrand1973-105"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEBertrand1973_105-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFBertrand1973">Bertrand 1973</a>.</span> </li> <li id="cite_note-106"><span class="mw-cite-backlink"><b><a href="#cite_ref-106">^</a></b></span> <span class="reference-text">A 16-page pamphlet of that title, summarizing Turing's life and work, is available free at the <a href="/wiki/Science_Museum_(London)" class="mw-redirect" title="Science Museum (London)">Science Museum</a>.</span> </li> <li id="cite_note-107"><span class="mw-cite-backlink"><b><a href="#cite_ref-107">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20160203010047/http://thomas.loc.gov/cgi-bin/cpquery/?&dbname=cp106&sid=cp106uUzJ1&refer=&r_n=hr969.106&item=&&&sel=TOC_161095&">"Nazi War Crimes and Japanese Imperial Government Disclosure Act of 2000"</a>. Archived from <a rel="nofollow" class="external text" href="http://thomas.loc.gov/cgi-bin/cpquery/?&dbname=cp106&sid=cp106uUzJ1&refer=&r_n=hr969.106&item=&&&sel=TOC_161095&">the original</a> on 3 February 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">8 September</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Nazi+War+Crimes+and+Japanese+Imperial+Government+Disclosure+Act+of+2000&rft_id=http%3A%2F%2Fthomas.loc.gov%2Fcgi-bin%2Fcpquery%2F%3F%26dbname%3Dcp106%26sid%3Dcp106uUzJ1%26refer%3D%26r_n%3Dhr969.106%26item%3D%26%26%26sel%3DTOC_161095%26&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-108"><span class="mw-cite-backlink"><b><a href="#cite_ref-108">^</a></b></span> <span class="reference-text"><a href="#CITEREFHanyok2004">Hanyok 2004</a>, p. 126</span> </li> <li id="cite_note-109"><span class="mw-cite-backlink"><b><a href="#cite_ref-109">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.jewishgen.org/yizkor/poland/pol001.html">"Poland and her Jews 1941 - 1944"</a>. <i>www.jewishgen.org</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.jewishgen.org&rft.atitle=Poland+and+her+Jews+1941+-+1944&rft_id=http%3A%2F%2Fwww.jewishgen.org%2Fyizkor%2Fpoland%2Fpol001.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-110"><span class="mw-cite-backlink"><b><a href="#cite_ref-110">^</a></b></span> <span class="reference-text">See: <a href="/wiki/Riegner_Telegram" class="mw-redirect" title="Riegner Telegram">Riegner Telegram</a></span> </li> <li id="cite_note-111"><span class="mw-cite-backlink"><b><a href="#cite_ref-111">^</a></b></span> <span class="reference-text"><a href="#CITEREFHanyok2004">Hanyok 2004</a>, p. 124</span> </li> <li id="cite_note-112"><span class="mw-cite-backlink"><b><a href="#cite_ref-112">^</a></b></span> <span class="reference-text"><a href="#CITEREFSchlesinger1992">Schlesinger 1992</a>, pp. 66–67</span> </li> <li id="cite_note-FOOTNOTEWinterbotham197425-113"><span class="mw-cite-backlink"><b><a href="#cite_ref-FOOTNOTEWinterbotham197425_113-0">^</a></b></span> <span class="reference-text"><a href="#CITEREFWinterbotham1974">Winterbotham 1974</a>, p. 25.</span> </li> <li id="cite_note-FOOTNOTEKnightley1986173–175-115"><span class="mw-cite-backlink">^ <a href="#cite_ref-FOOTNOTEKnightley1986173–175_115-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FOOTNOTEKnightley1986173–175_115-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a href="#CITEREFKnightley1986">Knightley 1986</a>, pp. 173–175.</span> </li> <li id="cite_note-116"><span class="mw-cite-backlink"><b><a href="#cite_ref-116">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFeeWebb2019" class="citation book cs1">Fee, Christopher R.; Webb, Jeffrey B. (2019). <i>Conspiracies and Conspiracy Theories in American History</i>. Santa Barbara, California: ABC-CLIO. p. 200. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9781440858116" title="Special:BookSources/9781440858116"><bdi>9781440858116</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Conspiracies+and+Conspiracy+Theories+in+American+History&rft.place=Santa+Barbara%2C+California&rft.pages=200&rft.pub=ABC-CLIO&rft.date=2019&rft.isbn=9781440858116&rft.aulast=Fee&rft.aufirst=Christopher+R.&rft.au=Webb%2C+Jeffrey+B.&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> <li id="cite_note-117"><span class="mw-cite-backlink"><b><a href="#cite_ref-117">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBrown2019" class="citation book cs1">Brown, Brian (2019). <i>Someone Is Out to Get Us: A Not So Brief History of Cold War Paranoia and Madness</i> (1st ed.). New York: Twelve. p. 264. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9781538728031" title="Special:BookSources/9781538728031"><bdi>9781538728031</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Someone+Is+Out+to+Get+Us%3A+A+Not+So+Brief+History+of+Cold+War+Paranoia+and+Madness&rft.place=New+York&rft.pages=264&rft.edition=1st&rft.pub=Twelve&rft.date=2019&rft.isbn=9781538728031&rft.aulast=Brown&rft.aufirst=Brian&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></span> </li> </ol></div> <div class="mw-heading mw-heading2"><h2 id="Bibliography">Bibliography</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Ultra_(cryptography)&action=edit&section=23" title="Edit section: Bibliography"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239549316">.mw-parser-output .refbegin{margin-bottom:0.5em}.mw-parser-output .refbegin-hanging-indents>ul{margin-left:0}.mw-parser-output .refbegin-hanging-indents>ul>li{margin-left:0;padding-left:3.2em;text-indent:-3.2em}.mw-parser-output .refbegin-hanging-indents ul,.mw-parser-output .refbegin-hanging-indents ul li{list-style:none}@media(max-width:720px){.mw-parser-output .refbegin-hanging-indents>ul>li{padding-left:1.6em;text-indent:-1.6em}}.mw-parser-output .refbegin-columns{margin-top:0.3em}.mw-parser-output .refbegin-columns ul{margin-top:0}.mw-parser-output .refbegin-columns li{page-break-inside:avoid;break-inside:avoid-column}@media screen{.mw-parser-output .refbegin{font-size:90%}}</style><div class="refbegin refbegin-columns references-column-width" style="column-width: 30em"> <ul><li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBamford2001" class="citation cs2"><a href="/wiki/James_Bamford" title="James Bamford">Bamford, James</a> (2001), <i><a href="/wiki/Body_of_Secrets" title="Body of Secrets">Body of Secrets</a></i>, Doubleday, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/0-385-49907-8" title="Special:BookSources/0-385-49907-8"><bdi>0-385-49907-8</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Body+of+Secrets&rft.pub=Doubleday&rft.date=2001&rft.isbn=0-385-49907-8&rft.aulast=Bamford&rft.aufirst=James&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBennett1999" class="citation cs2">Bennett, Ralph (1999) [1994], <i>Behind the Battle: Intelligence in the War with Germany</i> (Pimlico: New and Enlarged ed.), London: Random House, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/0-7126-6521-8" title="Special:BookSources/0-7126-6521-8"><bdi>0-7126-6521-8</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Behind+the+Battle%3A+Intelligence+in+the+War+with+Germany&rft.place=London&rft.edition=Pimlico%3A+New+and+Enlarged&rft.pub=Random+House&rft.date=1999&rft.isbn=0-7126-6521-8&rft.aulast=Bennett&rft.aufirst=Ralph&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBertrand1973" class="citation cs2"><a href="/wiki/Gustave_Bertrand" title="Gustave Bertrand">Bertrand, Gustave</a> (1973), <i>Enigma ou la plus grande énigme de la guerre 1939–1945 (Enigma: The Greatest Enigma of the War of 1939–1945)</i>, Paris: Librairie Plon</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Enigma+ou+la+plus+grande+%C3%A9nigme+de+la+guerre+1939%E2%80%931945+%28Enigma%3A+The+Greatest+Enigma+of+the+War+of+1939%E2%80%931945%29&rft.place=Paris&rft.pub=Librairie+Plon&rft.date=1973&rft.aulast=Bertrand&rft.aufirst=Gustave&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBeesly1977" class="citation cs2"><a href="/wiki/Patrick_Beesly" title="Patrick Beesly">Beesly, Patrick</a> (1977), <i>Very Special Intelligence: The Story of the Admiralty's Operational Intelligence Centre 1939–1945</i>, Sphere Books Limited, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/0-7221-1539-3" title="Special:BookSources/0-7221-1539-3"><bdi>0-7221-1539-3</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Very+Special+Intelligence%3A+The+Story+of+the+Admiralty%27s+Operational+Intelligence+Centre+1939%E2%80%931945&rft.pub=Sphere+Books+Limited&rft.date=1977&rft.isbn=0-7221-1539-3&rft.aulast=Beesly&rft.aufirst=Patrick&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBudiansky2000" class="citation cs2"><a href="/wiki/Stephen_Budiansky" title="Stephen Budiansky">Budiansky, Stephen</a> (2000), <a rel="nofollow" class="external text" href="https://archive.org/details/battleofwitscomp00budi"><i>Battle of wits: The Complete Story of Codebreaking in World War II</i></a>, Free Press, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-684-85932-3" title="Special:BookSources/978-0-684-85932-3"><bdi>978-0-684-85932-3</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Battle+of+wits%3A+The+Complete+Story+of+Codebreaking+in+World+War+II&rft.pub=Free+Press&rft.date=2000&rft.isbn=978-0-684-85932-3&rft.aulast=Budiansky&rft.aufirst=Stephen&rft_id=https%3A%2F%2Farchive.org%2Fdetails%2Fbattleofwitscomp00budi&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span> A short account of World War II cryptology which covers more than just the Enigma story.</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBrzezinski2005" class="citation news cs1"><a href="/wiki/Matthew_Brzezinski" title="Matthew Brzezinski">Brzezinski, Matthew</a> (24 July 2005). <a rel="nofollow" class="external text" href="https://www.washingtonpost.com/wp-dyn/content/article/2005/07/21/AR2005072101680_5.html">"Giving Hitler Hell"</a>. <i>Washington Post</i><span class="reference-accessdate">. Retrieved <span class="nowrap">16 March</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Washington+Post&rft.atitle=Giving+Hitler+Hell&rft.date=2005-07-24&rft.aulast=Brzezinski&rft.aufirst=Matthew&rft_id=https%3A%2F%2Fwww.washingtonpost.com%2Fwp-dyn%2Fcontent%2Farticle%2F2005%2F07%2F21%2FAR2005072101680_5.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCalvocoressi2001" class="citation cs2"><a href="/wiki/Peter_Calvocoressi" title="Peter Calvocoressi">Calvocoressi, Peter</a> (2001) [1980], <i>Top Secret Ultra</i>, Kidderminster, England: M & MBaldwin, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-947712-41-9" title="Special:BookSources/978-0-947712-41-9"><bdi>978-0-947712-41-9</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Top+Secret+Ultra&rft.place=Kidderminster%2C+England&rft.pub=M+%26+MBaldwin&rft.date=2001&rft.isbn=978-0-947712-41-9&rft.aulast=Calvocoressi&rft.aufirst=Peter&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChurchill2005" class="citation cs2"><a href="/wiki/Winston_Churchill" title="Winston Churchill">Churchill, Winston</a> (2005) [1949], <i>The Second World War, Volume 2: Their Finest Hour</i> (Penguin Classics ed.), p. 529, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-14-144173-3" title="Special:BookSources/978-0-14-144173-3"><bdi>978-0-14-144173-3</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Second+World+War%2C+Volume+2%3A+Their+Finest+Hour&rft.pages=529&rft.edition=Penguin+Classics&rft.date=2005&rft.isbn=978-0-14-144173-3&rft.aulast=Churchill&rft.aufirst=Winston&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFComer2021" class="citation cs2">Comer, Tony (2021), <a rel="nofollow" class="external text" href="https://rusi.org/commentary/poland-decisive-role-cracking-enigma-and-transforming-uk-sigint-operations"><i>Commentary: Poland's Decisive Role in Cracking Enigma and Transforming the UK's SIGINT Operations</i></a>, <a href="/wiki/Royal_United_Services_Institute" title="Royal United Services Institute">Royal United Services Institute</a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Commentary%3A+Poland%27s+Decisive+Role+in+Cracking+Enigma+and+Transforming+the+UK%27s+SIGINT+Operations&rft.pub=Royal+United+Services+Institute&rft.date=2021&rft.aulast=Comer&rft.aufirst=Tony&rft_id=https%3A%2F%2Frusi.org%2Fcommentary%2Fpoland-decisive-role-cracking-enigma-and-transforming-uk-sigint-operations&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCopeland2004" class="citation cs2"><a href="/wiki/Jack_Copeland" title="Jack Copeland">Copeland, Jack</a> (2004), "Enigma", in <a href="/wiki/Jack_Copeland" title="Jack Copeland">Copeland, B. Jack</a> (ed.), <i>The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life </i>plus<i> The Secrets of Enigma</i>, Oxford: Oxford University Press, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/0-19-825080-0" title="Special:BookSources/0-19-825080-0"><bdi>0-19-825080-0</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Enigma&rft.btitle=The+Essential+Turing%3A+Seminal+Writings+in+Computing%2C+Logic%2C+Philosophy%2C+Artificial+Intelligence%2C+and+Artificial+Life+plus+The+Secrets+of+Enigma&rft.place=Oxford&rft.pub=Oxford+University+Press&rft.date=2004&rft.isbn=0-19-825080-0&rft.aulast=Copeland&rft.aufirst=Jack&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCrowdy2011" class="citation book cs1">Crowdy, Terry (2011). <i>The Enemy Within: A History of Spies, Spymasters and Espionage</i>. Bloomsbury Publishing. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9781780962436" title="Special:BookSources/9781780962436"><bdi>9781780962436</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Enemy+Within%3A+A+History+of+Spies%2C+Spymasters+and+Espionage&rft.pub=Bloomsbury+Publishing&rft.date=2011&rft.isbn=9781780962436&rft.aulast=Crowdy&rft.aufirst=Terry&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDeutsch1977" class="citation cs2"><a href="/wiki/Harold_C._Deutsch" title="Harold C. Deutsch">Deutsch, Harold C</a> (1977), <a rel="nofollow" class="external text" href="https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/cryptologic-spectrum/ultra_secret.pdf"><i>The Historical Impact of Revealing the Ultra Secret</i></a> <span class="cs1-format">(PDF)</span>, Parameters, Journal of the U.S. Army War College</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Historical+Impact+of+Revealing+the+Ultra+Secret&rft.pub=Parameters%2C+Journal+of+the+U.S.+Army+War+College&rft.date=1977&rft.aulast=Deutsch&rft.aufirst=Harold+C&rft_id=https%3A%2F%2Fwww.nsa.gov%2FPortals%2F70%2Fdocuments%2Fnews-features%2Fdeclassified-documents%2Fcryptologic-spectrum%2Fultra_secret.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFarago1974" class="citation cs2"><a href="/wiki/Ladislas_Farago" title="Ladislas Farago">Farago, Ladislas</a> (1974) [1971], <i>The game of the foxes: British and German intelligence operations and personalities which changed the course of the Second World War</i>, Pan Books, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-330-23446-7" title="Special:BookSources/978-0-330-23446-7"><bdi>978-0-330-23446-7</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+game+of+the+foxes%3A+British+and+German+intelligence+operations+and+personalities+which+changed+the+course+of+the+Second+World+War&rft.pub=Pan+Books&rft.date=1974&rft.isbn=978-0-330-23446-7&rft.aulast=Farago&rft.aufirst=Ladislas&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span> Has been criticised for inaccuracy and exaggeration</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFarley1980" class="citation cs2">Farley, R. D. (25 November 1980), <a rel="nofollow" class="external text" href="https://www.nsa.gov/news-features/declassified-documents/oral-history-interviews/assets/files/nsa-oh-40-08-levenson.pdf"><i>Oral History Interview NSA-OH-40-80 with Arthur J. Levenson</i></a> <span class="cs1-format">(PDF)</span><span class="reference-accessdate">, retrieved <span class="nowrap">24 September</span> 2016</span></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Oral+History+Interview+NSA-OH-40-80+with+Arthur+J.+Levenson&rft.date=1980-11-25&rft.aulast=Farley&rft.aufirst=R.+D.&rft_id=https%3A%2F%2Fwww.nsa.gov%2Fnews-features%2Fdeclassified-documents%2Foral-history-interviews%2Fassets%2Ffiles%2Fnsa-oh-40-08-levenson.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFerris2005" class="citation cs2">Ferris, John Robert (2005), <i>Intelligence and strategy: selected essays</i> (illustrated ed.), Routledge, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-415-36194-1" title="Special:BookSources/978-0-415-36194-1"><bdi>978-0-415-36194-1</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Intelligence+and+strategy%3A+selected+essays&rft.edition=illustrated&rft.pub=Routledge&rft.date=2005&rft.isbn=978-0-415-36194-1&rft.aulast=Ferris&rft.aufirst=John+Robert&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGannon2006" class="citation cs2">Gannon, Paul (2006), <i>Colossus: Bletchley Park's Greatest Secret</i>, London: Atlantic Books, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-84354-331-2" title="Special:BookSources/978-1-84354-331-2"><bdi>978-1-84354-331-2</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Colossus%3A+Bletchley+Park%27s+Greatest+Secret&rft.place=London&rft.pub=Atlantic+Books&rft.date=2006&rft.isbn=978-1-84354-331-2&rft.aulast=Gannon&rft.aufirst=Paul&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHanyok2004" class="citation cs2">Hanyok, Robert J. (2004), <a rel="nofollow" class="external text" href="https://www.jewishvirtuallibrary.org/jsource/Holocaust/nsarep.pdf"><i>Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and the Holocaust, 1939–1945</i></a> <span class="cs1-format">(PDF)</span>, Center for Cryptographic History, National Security Agency</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Eavesdropping+on+Hell%3A+Historical+Guide+to+Western+Communications+Intelligence+and+the+Holocaust%2C+1939%E2%80%931945&rft.pub=Center+for+Cryptographic+History%2C+National+Security+Agency&rft.date=2004&rft.aulast=Hanyok&rft.aufirst=Robert+J.&rft_id=https%3A%2F%2Fwww.jewishvirtuallibrary.org%2Fjsource%2FHolocaust%2Fnsarep.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHinsleyStripp1993" class="citation cs2"><a href="/wiki/Harry_Hinsley" title="Harry Hinsley">Hinsley, F. H.</a>; Stripp, Alan, eds. (1993), <i>Codebreakers: The inside story of Bletchley Park</i> (OU Press paperback ed.), Oxford: Oxford University Press, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-19-280132-6" title="Special:BookSources/978-0-19-280132-6"><bdi>978-0-19-280132-6</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Codebreakers%3A+The+inside+story+of+Bletchley+Park&rft.place=Oxford&rft.edition=OU+Press+paperback&rft.pub=Oxford+University+Press&rft.date=1993&rft.isbn=978-0-19-280132-6&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><span id="CITEREFHinsley1993" class="citation">Hinsley, F. H. "Introduction: The Influence of Ultra in the Second World War". In <a href="#CITEREFHinsleyStripp1993">Hinsley & Stripp (1993)</a>.</span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHinsley1993a" class="citation cs2"><a href="/wiki/Harry_Hinsley" title="Harry Hinsley">Hinsley, F. H.</a> (1993a), <i>British intelligence in the Second World War</i>, Cambridge: Cambridge University Press, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-521-44304-3" title="Special:BookSources/978-0-521-44304-3"><bdi>978-0-521-44304-3</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=British+intelligence+in+the+Second+World+War&rft.place=Cambridge&rft.pub=Cambridge+University+Press&rft.date=1993&rft.isbn=978-0-521-44304-3&rft.aulast=Hinsley&rft.aufirst=F.+H.&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHinsley1996" class="citation cs2"><a href="/wiki/Harry_Hinsley" title="Harry Hinsley">Hinsley, F. H.</a> (1996) [1993], <a rel="nofollow" class="external text" href="http://www.cdpa.co.uk/UoP/HoC/Lectures/HoC_08e.PDF"><i>The Influence of ULTRA in the Second World War</i></a> <span class="cs1-format">(PDF)</span><span class="reference-accessdate">, retrieved <span class="nowrap">23 July</span> 2012</span></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Influence+of+ULTRA+in+the+Second+World+War&rft.date=1996&rft.aulast=Hinsley&rft.aufirst=F.+H.&rft_id=http%3A%2F%2Fwww.cdpa.co.uk%2FUoP%2FHoC%2FLectures%2FHoC_08e.PDF&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span> Transcript of a lecture given on Tuesday 19 October 1993 at Cambridge University</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHunt1976" class="citation cs2"><a href="/wiki/David_Hunt_(diplomat)" title="David Hunt (diplomat)">Hunt, David</a> (28 August 1976), "The raid on Coventry", <i>The Times</i>, p. 11</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Times&rft.atitle=The+raid+on+Coventry&rft.pages=11&rft.date=1976-08-28&rft.aulast=Hunt&rft.aufirst=David&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJones1978" class="citation cs2"><a href="/wiki/Reginald_Victor_Jones" title="Reginald Victor Jones">Jones, R. V.</a> (1978), <a rel="nofollow" class="external text" href="https://archive.org/details/mostsecretwar0000jone"><i>Most Secret War</i></a>, London: Book Club Associates, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-241-89746-1" title="Special:BookSources/978-0-241-89746-1"><bdi>978-0-241-89746-1</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Most+Secret+War&rft.place=London&rft.pub=Book+Club+Associates&rft.date=1978&rft.isbn=978-0-241-89746-1&rft.aulast=Jones&rft.aufirst=R.+V.&rft_id=https%3A%2F%2Farchive.org%2Fdetails%2Fmostsecretwar0000jone&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKahn1967" class="citation cs2"><a href="/wiki/David_Kahn_(writer)" title="David Kahn (writer)">Kahn, David</a> (1967), <i>The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet</i> (1st ed.), New York: Macmillan, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/0-02-560460-0" title="Special:BookSources/0-02-560460-0"><bdi>0-02-560460-0</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Codebreakers%3A+The+Comprehensive+History+of+Secret+Communication+from+Ancient+Times+to+the+Internet&rft.place=New+York&rft.edition=1st&rft.pub=Macmillan&rft.date=1967&rft.isbn=0-02-560460-0&rft.aulast=Kahn&rft.aufirst=David&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKahn1997" class="citation cs2"><a href="/wiki/David_Kahn_(writer)" title="David Kahn (writer)">Kahn, David</a> (1997) [1967], <i>The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet</i> (2nd Revised ed.), New York: Simon & Schuster, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-684-83130-5" title="Special:BookSources/978-0-684-83130-5"><bdi>978-0-684-83130-5</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Codebreakers%3A+The+Comprehensive+History+of+Secret+Communication+from+Ancient+Times+to+the+Internet&rft.place=New+York&rft.edition=2nd+Revised&rft.pub=Simon+%26+Schuster&rft.date=1997&rft.isbn=978-0-684-83130-5&rft.aulast=Kahn&rft.aufirst=David&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKahn1974" class="citation cs2"><a href="/wiki/David_Kahn_(writer)" title="David Kahn (writer)">Kahn, David</a> (29 December 1974), "Enigma Unwrapped: Review of F. W. Winterbotham's <i>The Ultra Secret</i>", <i>New York Times Book Review</i>, p. 5</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=New+York+Times+Book+Review&rft.atitle=Enigma+Unwrapped%3A+Review+of+F.+W.+Winterbotham%27s+The+Ultra+Secret&rft.pages=5&rft.date=1974-12-29&rft.aulast=Kahn&rft.aufirst=David&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKnightley1986" class="citation cs2"><a href="/wiki/Phillip_Knightley" title="Phillip Knightley">Knightley, Phillip</a> (1986), <a rel="nofollow" class="external text" href="https://archive.org/details/secondoldestprof00knig"><i>The Second Oldest Profession</i></a>, W.W. Norton & Co, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/0-393-02386-9" title="Special:BookSources/0-393-02386-9"><bdi>0-393-02386-9</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Second+Oldest+Profession&rft.pub=W.W.+Norton+%26+Co&rft.date=1986&rft.isbn=0-393-02386-9&rft.aulast=Knightley&rft.aufirst=Phillip&rft_id=https%3A%2F%2Farchive.org%2Fdetails%2Fsecondoldestprof00knig&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKozaczuk1984" class="citation cs2"><a href="/wiki/W%C5%82adys%C5%82aw_Kozaczuk" title="Władysław Kozaczuk">Kozaczuk, Władysław</a> (1984), <i>Enigma: How the German Machine Cipher was Broken, and how it was Read by the Allies in World War Two, </i>edited and translated by Christopher Kasparek [a revised and augmented translation of <i>W kręgu enigmy</i>, Warsaw, Książka i Wiedza, 1979, supplemented with appendices by Marian Rejewski, Frederick, MD<i><span></span></i>, University Publications of America, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-89093-547-7" title="Special:BookSources/978-0-89093-547-7"><bdi>978-0-89093-547-7</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Enigma%3A+How+the+German+Machine+Cipher+was+Broken%2C+and+how+it+was+Read+by+the+Allies+in+World+War+Two%2C+edited+and+translated+by+Christopher+Kasparek+%5Ba+revised+and+augmented+translation+of+W+kr%C4%99gu+enigmy%2C+Warsaw%2C+Ksi%C4%85%C5%BCka+i+Wiedza%2C+1979%2C+supplemented+with+appendices+by+Marian+Rejewski%2C+Frederick%2C+MD&rft.pub=University+Publications+of+America&rft.date=1984&rft.isbn=978-0-89093-547-7&rft.aulast=Kozaczuk&rft.aufirst=W%C5%82adys%C5%82aw&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span> This is the standard reference on the crucial foundations laid by the Poles for World War II Enigma decryption.</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLewin2001" class="citation cs2"><a href="/wiki/Ronald_Lewin" title="Ronald Lewin">Lewin, Ronald</a> (2001) [1978], <i>Ultra goes to War</i> (Penguin Classic Military History ed.), London: Penguin Group, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-14-139042-0" title="Special:BookSources/978-0-14-139042-0"><bdi>978-0-14-139042-0</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Ultra+goes+to+War&rft.place=London&rft.edition=Penguin+Classic+Military+History&rft.pub=Penguin+Group&rft.date=2001&rft.isbn=978-0-14-139042-0&rft.aulast=Lewin&rft.aufirst=Ronald&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span> Focuses on the battle-field exploitation of Ultra material.</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMallmann-Showell2003" class="citation cs2">Mallmann-Showell, J.P. (2003), <i>German Naval Code Breakers</i>, Hersham, Surrey: Ian Allan Publishing, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/0-7110-2888-5" title="Special:BookSources/0-7110-2888-5"><bdi>0-7110-2888-5</bdi></a>, <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/181448256">181448256</a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=German+Naval+Code+Breakers&rft.place=Hersham%2C+Surrey&rft.pub=Ian+Allan+Publishing&rft.date=2003&rft_id=info%3Aoclcnum%2F181448256&rft.isbn=0-7110-2888-5&rft.aulast=Mallmann-Showell&rft.aufirst=J.P.&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMomsen2007" class="citation cs2">Momsen, Bill (2007) [1977], <a rel="nofollow" class="external text" href="https://web.archive.org/web/20010126131700/http://home.earthlink.net/~nbrass1/4enigma.htm"><i>Codebreaking and Secret Weapons in World War II: Chapter IV 1941–42</i></a>, Nautical Brass, archived from <a rel="nofollow" class="external text" href="https://home.earthlink.net/~nbrass1/4enigma.htm">the original</a> on 26 January 2001<span class="reference-accessdate">, retrieved <span class="nowrap">18 February</span> 2008</span></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Codebreaking+and+Secret+Weapons+in+World+War+II%3A+Chapter+IV+1941%E2%80%9342&rft.pub=Nautical+Brass&rft.date=2007&rft.aulast=Momsen&rft.aufirst=Bill&rft_id=http%3A%2F%2Fhome.earthlink.net%2F~nbrass1%2F4enigma.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPidgeon2003" class="citation cs2">Pidgeon, Geoffrey (2003), <i>The Secret Wireless War: The Story of MI6 Communications 1939–1945</i>, St Leonards-on-Sea, East Sussex: UPSO Ltd, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/1-84375-252-2" title="Special:BookSources/1-84375-252-2"><bdi>1-84375-252-2</bdi></a>, <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/56715513">56715513</a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Secret+Wireless+War%3A+The+Story+of+MI6+Communications+1939%E2%80%931945&rft.place=St+Leonards-on-Sea%2C+East+Sussex&rft.pub=UPSO+Ltd&rft.date=2003&rft_id=info%3Aoclcnum%2F56715513&rft.isbn=1-84375-252-2&rft.aulast=Pidgeon&rft.aufirst=Geoffrey&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><a href="/wiki/Marian_Rejewski" title="Marian Rejewski">Rejewski, Marian</a>, wrote a number of papers on his 1932 break into Enigma and his subsequent work on the cipher, well into World War II, with his fellow mathematician-cryptologists, <a href="/wiki/Jerzy_R%C3%B3%C5%BCycki" title="Jerzy Różycki">Jerzy Różycki</a> and <a href="/wiki/Henryk_Zygalski" title="Henryk Zygalski">Henryk Zygalski</a>. Most of Rejewski's papers appear in <a href="#CITEREFKozaczuk1984">Kozaczuk 1984</a></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRejewski1984" class="citation cs2"><a href="/wiki/Marian_Rejewski" title="Marian Rejewski">Rejewski, Marian</a> (1984), "Summary of Our Methods for Reconstructing ENIGMA and Reconstructing Daily Keys, and of German Efforts to Frustrate Those Methods: Appendix C", in <a href="/wiki/W%C5%82adys%C5%82aw_Kozaczuk" title="Władysław Kozaczuk">Kozaczuk, Władysław</a>; <a href="/wiki/Christopher_Kasparek" title="Christopher Kasparek">Kasparek, Christopher</a>; Frederick, MD (eds.), <i>Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two</i> (2 ed.), University Publications of America, pp. 241–45, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-89093-547-7" title="Special:BookSources/978-0-89093-547-7"><bdi>978-0-89093-547-7</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Summary+of+Our+Methods+for+Reconstructing+ENIGMA+and+Reconstructing+Daily+Keys%2C+and+of+German+Efforts+to+Frustrate+Those+Methods%3A+Appendix+C&rft.btitle=Enigma%3A+How+the+German+Machine+Cipher+Was+Broken%2C+and+How+It+Was+Read+by+the+Allies+in+World+War+Two&rft.pages=241-45&rft.edition=2&rft.pub=University+Publications+of+America&rft.date=1984&rft.isbn=978-0-89093-547-7&rft.aulast=Rejewski&rft.aufirst=Marian&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRoberts2009" class="citation book cs1">Roberts, Andrew (2009). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=ZC-IBqQitdsC"><i>The Storm of War: A New History of the Second World War</i></a>. Penguin Books Limited. p. 501. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-14-193886-8" title="Special:BookSources/978-0-14-193886-8"><bdi>978-0-14-193886-8</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Storm+of+War%3A+A+New+History+of+the+Second+World+War&rft.pages=501&rft.pub=Penguin+Books+Limited&rft.date=2009&rft.isbn=978-0-14-193886-8&rft.aulast=Roberts&rft.aufirst=Andrew&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DZC-IBqQitdsC&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSchlesinger1992" class="citation cs2"><a href="/wiki/Arthur_Schlesinger_Jr." class="mw-redirect" title="Arthur Schlesinger Jr.">Schlesinger, Arthur Jr.</a> (1992), "The London Operation: Recollections of a Historian", in Chalou, George C. (ed.), <i>The Secrets War: The Office of Strategic Services in World War II</i>, Washington, DC: Government Printing Office, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-911333-91-6" title="Special:BookSources/978-0-911333-91-6"><bdi>978-0-911333-91-6</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=The+London+Operation%3A+Recollections+of+a+Historian&rft.btitle=The+Secrets+War%3A+The+Office+of+Strategic+Services+in+World+War+II&rft.place=Washington%2C+DC&rft.pub=Government+Printing+Office&rft.date=1992&rft.isbn=978-0-911333-91-6&rft.aulast=Schlesinger&rft.aufirst=Arthur+Jr.&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSingh1999" class="citation cs2"><a href="/wiki/Simon_Singh" title="Simon Singh">Singh, Simon</a> (1999), <i><a href="/wiki/The_Code_Book:_The_Science_of_Secrecy_from_Ancient_Egypt_to_Quantum_Cryptography" class="mw-redirect" title="The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography">The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography</a></i>, London: Fourth Estate, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/1-85702-879-1" title="Special:BookSources/1-85702-879-1"><bdi>1-85702-879-1</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Code+Book%3A+The+Science+of+Secrecy+from+Ancient+Egypt+to+Quantum+Cryptography&rft.place=London&rft.pub=Fourth+Estate&rft.date=1999&rft.isbn=1-85702-879-1&rft.aulast=Singh&rft.aufirst=Simon&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span> This provides a description of the Enigma, other ciphers, and codes.</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSmith2007" class="citation cs2"><a href="/wiki/Michael_Smith_(newspaper_reporter)" title="Michael Smith (newspaper reporter)">Smith, Michael</a> (2007) [1998], <i>Station X: The Codebreakers of Bletchley Park</i>, Pan Grand Strategy Series (Pan Books ed.), London: Pan MacMillan Ltd, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-330-41929-1" title="Special:BookSources/978-0-330-41929-1"><bdi>978-0-330-41929-1</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Station+X%3A+The+Codebreakers+of+Bletchley+Park&rft.place=London&rft.series=Pan+Grand+Strategy+Series&rft.edition=Pan+Books&rft.pub=Pan+MacMillan+Ltd&rft.date=2007&rft.isbn=978-0-330-41929-1&rft.aulast=Smith&rft.aufirst=Michael&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStephenson2004" class="citation book cs1">Stephenson, Charles (2004). <i>The fortifications of Malta 1530–1945</i>. Fortress. Vol. 16. Oxford, UK: Osprey Publishing. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/1-84176-693-3" title="Special:BookSources/1-84176-693-3"><bdi>1-84176-693-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+fortifications+of+Malta+1530%E2%80%931945&rft.place=Oxford%2C+UK&rft.series=Fortress&rft.pub=Osprey+Publishing&rft.date=2004&rft.isbn=1-84176-693-3&rft.aulast=Stephenson&rft.aufirst=Charles&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTaylor2005" class="citation cs2">Taylor, Fredrick (2005), <a rel="nofollow" class="external text" href="https://archive.org/details/unset0000unse_b8e7/page/202"><i>Dresden:Tuesday 13 February 1945</i></a>, London: Bloomsbury, p. <a rel="nofollow" class="external text" href="https://archive.org/details/unset0000unse_b8e7/page/202">202</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/0-7475-7084-1" title="Special:BookSources/0-7475-7084-1"><bdi>0-7475-7084-1</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Dresden%3ATuesday+13+February+1945&rft.place=London&rft.pages=202&rft.pub=Bloomsbury&rft.date=2005&rft.isbn=0-7475-7084-1&rft.aulast=Taylor&rft.aufirst=Fredrick&rft_id=https%3A%2F%2Farchive.org%2Fdetails%2Funset0000unse_b8e7%2Fpage%2F202&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTarrant1995" class="citation book cs1">Tarrant, V.E. (1995). <i>The Red Orchestra</i>. London: Cassel. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/0471134392" title="Special:BookSources/0471134392"><bdi>0471134392</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Red+Orchestra&rft.place=London&rft.pub=Cassel&rft.date=1995&rft.isbn=0471134392&rft.aulast=Tarrant&rft.aufirst=V.E.&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWelchman1984" class="citation cs2"><a href="/wiki/Gordon_Welchman" title="Gordon Welchman">Welchman, Gordon</a> (1984) [1982], <a rel="nofollow" class="external text" href="https://archive.org/details/hutsixstorybreak00welc"><i>The Hut Six story: Breaking the Enigma codes</i></a>, Harmondsworth, England: Penguin Books, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/0-14-00-5305-0" title="Special:BookSources/0-14-00-5305-0"><bdi>0-14-00-5305-0</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Hut+Six+story%3A+Breaking+the+Enigma+codes&rft.place=Harmondsworth%2C+England&rft.pub=Penguin+Books&rft.date=1984&rft.isbn=0-14-00-5305-0&rft.aulast=Welchman&rft.aufirst=Gordon&rft_id=https%3A%2F%2Farchive.org%2Fdetails%2Fhutsixstorybreak00welc&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span> An early publication containing several misapprehensions that are corrected in an <i>addendum</i> in the 1997 edition.</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWest1986" class="citation cs2"><a href="/wiki/Rupert_Allason" title="Rupert Allason">West, Nigel</a> (1986), <i>GCHQ: The Secret Wireless War, 1900–86</i>, London: Weidenfeld and Nicolson, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-297-78717-4" title="Special:BookSources/978-0-297-78717-4"><bdi>978-0-297-78717-4</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=GCHQ%3A+The+Secret+Wireless+War%2C+1900%E2%80%9386&rft.place=London&rft.pub=Weidenfeld+and+Nicolson&rft.date=1986&rft.isbn=978-0-297-78717-4&rft.aulast=West&rft.aufirst=Nigel&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWilkinson1993" class="citation cs2">Wilkinson, Patrick (1993), "Italian naval ciphers", in <a href="/wiki/Harry_Hinsley" title="Harry Hinsley">Hinsley, F.H.</a>; Stripp, Alan (eds.), <i>Codebreakers: The inside story of Bletchley Park</i>, Oxford: Oxford University Press, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-19-280132-6" title="Special:BookSources/978-0-19-280132-6"><bdi>978-0-19-280132-6</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Italian+naval+ciphers&rft.btitle=Codebreakers%3A+The+inside+story+of+Bletchley+Park&rft.place=Oxford&rft.pub=Oxford+University+Press&rft.date=1993&rft.isbn=978-0-19-280132-6&rft.aulast=Wilkinson&rft.aufirst=Patrick&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWinterbotham1974" class="citation cs2"><a href="/wiki/F._W._Winterbotham" title="F. W. Winterbotham">Winterbotham, F. W.</a> (1974), <i>The Ultra Secret</i>, New York: Harper & Row, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/0-06-014678-8" title="Special:BookSources/0-06-014678-8"><bdi>0-06-014678-8</bdi></a></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Ultra+Secret&rft.place=New+York&rft.pub=Harper+%26+Row&rft.date=1974&rft.isbn=0-06-014678-8&rft.aulast=Winterbotham&rft.aufirst=F.+W.&rfr_id=info%3Asid%2Fen.wikipedia.org%3AUltra+%28cryptography%29" class="Z3988"></span> The first published account of the previously secret wartime operation, concentrating mainly on distribution of intelligence. It was written from memory and has been shown by subsequent authors, who had access to official records, to contain some inaccuracies.</li></ul> </div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="United_Kingdom_intelligence_agencies" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:UK_Intelligence_Agencies" title="Template:UK Intelligence Agencies"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:UK_Intelligence_Agencies" title="Template talk:UK Intelligence Agencies"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:UK_Intelligence_Agencies" title="Special:EditPage/Template:UK Intelligence Agencies"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="United_Kingdom_intelligence_agencies" style="font-size:114%;margin:0 4em"><a href="/wiki/British_intelligence_agencies" title="British intelligence agencies">United Kingdom intelligence agencies</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Human_intelligence_(intelligence_gathering)" title="Human intelligence (intelligence gathering)">Domestic<br />intelligence</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/MI5" title="MI5">Security Service</a> (MI5) <ul><li><a href="/wiki/National_Protective_Security_Authority" title="National Protective Security Authority">National Protective Security Authority</a></li></ul></li> <li><a href="/wiki/National_Crime_Agency" title="National Crime Agency">National Crime Agency</a> (NCA)</li> <li><a href="/wiki/National_Ballistics_Intelligence_Service" title="National Ballistics Intelligence Service">National Ballistics Intelligence Service</a> (NBIS)</li> <li><a href="/wiki/National_Fraud_Intelligence_Bureau" title="National Fraud Intelligence Bureau">National Fraud Intelligence Bureau</a></li> <li><a href="/wiki/Metropolitan_Police" title="Metropolitan Police">Metropolitan Police</a> <a href="/wiki/Specialist_Operations" title="Specialist Operations">Specialist Operations</a> <ul><li><a href="/wiki/Counter_Terrorism_Command" title="Counter Terrorism Command">Counter Terrorism Command</a></li> <li><a href="/wiki/National_Domestic_Extremism_and_Disorder_Intelligence_Unit" title="National Domestic Extremism and Disorder Intelligence Unit">National Domestic Extremism and Disorder Intelligence Unit</a></li> <li><a href="/wiki/National_Counter_Terrorism_Policing_Network" class="mw-redirect" title="National Counter Terrorism Policing Network">National Counter Terrorism Policing Network</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Human_intelligence_(intelligence_gathering)" title="Human intelligence (intelligence gathering)">Foreign<br />intelligence</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/MI6" title="MI6">Secret Intelligence Service</a> (MI6)</li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Military_intelligence" title="Military intelligence">Military<br />intelligence</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Defence_Intelligence" title="Defence Intelligence">Defence Intelligence</a> (DI) <ul><li><a href="/wiki/Defence_Intelligence_Fusion_Centre" title="Defence Intelligence Fusion Centre">Defence Intelligence Fusion Centre</a></li> <li><a href="/wiki/Joint_Intelligence_Training_Group" class="mw-redirect" title="Joint Intelligence Training Group">Joint Intelligence Training Group</a></li></ul></li> <li><a href="/wiki/Intelligence_Corps_(United_Kingdom)" title="Intelligence Corps (United Kingdom)">Intelligence Corps</a> <ul><li><a href="/wiki/Joint_Support_Group" title="Joint Support Group">Joint Support Group</a></li></ul></li> <li><a href="/wiki/1st_Intelligence,_Surveillance_and_Reconnaissance_Brigade" class="mw-redirect" title="1st Intelligence, Surveillance and Reconnaissance Brigade">1st Intelligence, Surveillance and Reconnaissance Brigade</a></li> <li><a href="/wiki/RAF_Intelligence" title="RAF Intelligence">RAF Intelligence</a></li> <li><a href="/wiki/30_Commando_Information_Exploitation_Group" title="30 Commando Information Exploitation Group">30 Commando Information Exploitation Group</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Signals_intelligence" title="Signals intelligence">Signals<br />intelligence</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/GCHQ" title="GCHQ">Government Communications Headquarters</a> (GCHQ) <ul><li><a href="/wiki/National_Cyber_Security_Centre_(United_Kingdom)" title="National Cyber Security Centre (United Kingdom)">National Cyber Security Centre</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Intelligence_assessment" title="Intelligence assessment">Intelligence<br />assessment</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Joint_Intelligence_Organisation_(United_Kingdom)" title="Joint Intelligence Organisation (United Kingdom)">Joint Intelligence Organisation</a> (JIO)</li> <li><a href="/wiki/Joint_Terrorism_Analysis_Centre" title="Joint Terrorism Analysis Centre">Joint Terrorism Analysis Centre</a> (JTAC)</li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Policy and<br />Coordination</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Joint_Intelligence_Committee_(United_Kingdom)" title="Joint Intelligence Committee (United Kingdom)">Joint Intelligence Committee</a> (JIC)</li> <li><a href="/wiki/National_Security_Council_(United_Kingdom)" title="National Security Council (United Kingdom)">National Security Council</a></li> <li><a href="/wiki/National_Security_Adviser_(United_Kingdom)" title="National Security Adviser (United Kingdom)">National Security Adviser</a></li> <li><a href="/wiki/Cabinet_Office" title="Cabinet Office">Cabinet Office</a></li> <li><a href="/wiki/Home_Office" title="Home Office">Home Office</a> <ul><li><a href="/wiki/Office_for_Security_and_Counter-Terrorism" class="mw-redirect" title="Office for Security and Counter-Terrorism">Office for Security and Counter-Terrorism</a></li></ul></li> <li><a href="/wiki/Foreign,_Commonwealth_and_Development_Office" title="Foreign, Commonwealth and Development Office">Foreign, Commonwealth and Development Office</a></li> <li><a href="/wiki/Ministry_of_Defence_(United_Kingdom)" title="Ministry of Defence (United Kingdom)">Ministry of Defence</a> <ul><li><a href="/wiki/Chiefs_of_Staff_Committee" title="Chiefs of Staff Committee">Chiefs of Staff Committee</a></li> <li><a href="/wiki/Strategic_Command_(United_Kingdom)" title="Strategic Command (United Kingdom)">Strategic Command</a></li></ul></li> <li><a href="/wiki/Single_Intelligence_Account" class="mw-redirect" title="Single Intelligence Account">Single Intelligence Account</a></li> <li><a href="/wiki/National_Security_Strategy_(United_Kingdom)" title="National Security Strategy (United Kingdom)">National Security Strategy</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Review and<br />Oversight</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Intelligence_and_Security_Committee_of_Parliament" title="Intelligence and Security Committee of Parliament">Intelligence and Security Committee of Parliament</a></li> <li><a href="/wiki/Independent_Reviewer_of_Terrorism_Legislation" title="Independent Reviewer of Terrorism Legislation">Independent Reviewer of Terrorism Legislation</a></li> <li><a href="/wiki/Investigatory_Powers_Tribunal" title="Investigatory Powers Tribunal">Investigatory Powers Tribunal</a></li> <li><a href="/wiki/Investigatory_Powers_Commissioner" title="Investigatory Powers Commissioner">Investigatory Powers Commissioner</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Historical<br />agencies</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Directorate_of_Military_Intelligence_(United_Kingdom)" title="Directorate of Military Intelligence (United Kingdom)">Directorate of Military Intelligence</a> <ul><li><a href="/wiki/MI1" title="MI1">MI1</a></li> <li><a href="/wiki/MI2" title="MI2">MI2</a></li> <li><a href="/wiki/MI3" title="MI3">MI3</a></li> <li><a href="/wiki/MI4" title="MI4">MI4</a></li> <li><a href="/wiki/MI7" title="MI7">MI7</a></li> <li><a href="/wiki/MI8" title="MI8">MI8</a></li> <li><a href="/wiki/MI9" title="MI9">MI9</a></li> <li><a href="/wiki/MI10" title="MI10">MI10</a></li> <li><a href="/wiki/MI11" title="MI11">MI11</a></li> <li>MI12</li> <li><a href="/wiki/MI14" title="MI14">MI14</a></li> <li><a href="/wiki/MI15" title="MI15">MI15</a></li> <li>MI16</li> <li><a href="/wiki/MI17" title="MI17">MI17</a></li> <li><a href="/wiki/MI19" title="MI19">MI19</a></li></ul></li> <li><a href="/wiki/Naval_Intelligence_Department_(United_Kingdom)" title="Naval Intelligence Department (United Kingdom)">Naval Intelligence Department</a></li> <li><a href="/wiki/Naval_Intelligence_Division_(United_Kingdom)" title="Naval Intelligence Division (United Kingdom)">Naval Intelligence Division</a> <ul><li><a href="/wiki/Room_40" title="Room 40">Room 40</a></li> <li><a href="/wiki/No._30_Commando" title="No. 30 Commando">No. 30 Commando</a></li></ul></li> <li><a href="/wiki/Special_Operations_Executive" title="Special Operations Executive">Special Operations Executive</a> (SOE)</li> <li><a href="/wiki/Diplomatic_Wireless_Service" title="Diplomatic Wireless Service">Diplomatic Wireless Service</a></li> <li><a href="/wiki/Far_East_Combined_Bureau" title="Far East Combined Bureau">Far East Combined Bureau</a></li> <li><a href="/wiki/Force_Research_Unit" title="Force Research Unit">Force Research Unit</a></li> <li><a href="/wiki/Special_Reconnaissance_Unit" title="Special Reconnaissance Unit">Special Reconnaissance Unit</a></li> <li><a href="/wiki/Military_Reaction_Force" title="Military Reaction Force">Military Reaction Force</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox authority-control" aria-label="Navbox" style="padding:3px"><table class="nowraplinks hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Help:Authority_control" title="Help:Authority control">Authority control databases</a>: National <span class="mw-valign-text-top noprint" typeof="mw:File/Frameless"><a href="https://www.wikidata.org/wiki/Q825712#identifiers" title="Edit this at Wikidata"><img alt="Edit this at Wikidata" src="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/10px-OOjs_UI_icon_edit-ltr-progressive.svg.png" decoding="async" width="10" height="10" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/15px-OOjs_UI_icon_edit-ltr-progressive.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/20px-OOjs_UI_icon_edit-ltr-progressive.svg.png 2x" data-file-width="20" data-file-height="20" /></a></span></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"><ul><li><span class="uid"><a rel="nofollow" class="external text" href="https://id.loc.gov/authorities/sh2001001785">United States</a></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="http://olduli.nli.org.il/F/?func=find-b&local_base=NLX10&find_code=UID&request=987007530340205171">Israel</a></span></li></ul></div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐f69cdc8f6‐g2ggh Cached time: 20241122140944 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 1.160 seconds Real time usage: 1.373 seconds Preprocessor visited node count: 10530/1000000 Post‐expand include size: 176678/2097152 bytes Template argument size: 17491/2097152 bytes Highest expansion depth: 16/100 Expensive parser function count: 6/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 267698/5000000 bytes Lua time usage: 0.721/10.000 seconds Lua memory usage: 22257139/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1199.678 1 -total 20.70% 248.274 90 Template:Sfn 20.21% 242.481 2 Template:Reflist 13.12% 157.391 40 Template:Citation 9.75% 117.026 10 Template:Lang 8.37% 100.370 9 Template:Cite_web 7.41% 88.941 1 Template:EnigmaSeries 6.97% 83.562 15 Template:Cite_book 5.36% 64.255 1 Template:Short_description 3.29% 39.417 2 Template:Pagetype --> <!-- Saved in parser cache with key enwiki:pcache:idhash:31748-0!canonical and timestamp 20241122140944 and revision id 1257514677. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Ultra_(cryptography)&oldid=1257514677">https://en.wikipedia.org/w/index.php?title=Ultra_(cryptography)&oldid=1257514677</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Telecommunications-related_introductions_in_1941" title="Category:Telecommunications-related introductions in 1941">Telecommunications-related introductions in 1941</a></li><li><a href="/wiki/Category:1941_establishments_in_the_United_Kingdom" title="Category:1941 establishments in the United Kingdom">1941 establishments in the United Kingdom</a></li><li><a href="/wiki/Category:Military_intelligence" title="Category:Military intelligence">Military intelligence</a></li><li><a href="/wiki/Category:Signals_intelligence_of_World_War_II" title="Category:Signals intelligence of World War II">Signals intelligence of World War II</a></li><li><a href="/wiki/Category:MI6" title="Category:MI6">MI6</a></li><li><a href="/wiki/Category:Bletchley_Park" title="Category:Bletchley Park">Bletchley Park</a></li><li><a href="/wiki/Category:Cryptography" title="Category:Cryptography">Cryptography</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">CS1 maint: multiple names: authors list</a></li><li><a href="/wiki/Category:CS1_errors:_missing_periodical" title="Category:CS1 errors: missing periodical">CS1 errors: missing periodical</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:Use_dmy_dates_from_October_2019" title="Category:Use dmy dates from October 2019">Use dmy dates from October 2019</a></li><li><a href="/wiki/Category:Articles_containing_German-language_text" title="Category:Articles containing German-language text">Articles containing German-language text</a></li><li><a href="/wiki/Category:All_articles_lacking_reliable_references" title="Category:All articles lacking reliable references">All articles lacking reliable references</a></li><li><a href="/wiki/Category:Articles_lacking_reliable_references_from_April_2016" title="Category:Articles lacking reliable references from April 2016">Articles lacking reliable references from April 2016</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_May_2011" title="Category:Articles with unsourced statements from May 2011">Articles with unsourced statements from May 2011</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 15 November 2024, at 09:16<span class="anonymous-show"> (UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Ultra_(cryptography)&mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-f69cdc8f6-6qrh4","wgBackendResponseTime":138,"wgPageParseReport":{"limitreport":{"cputime":"1.160","walltime":"1.373","ppvisitednodes":{"value":10530,"limit":1000000},"postexpandincludesize":{"value":176678,"limit":2097152},"templateargumentsize":{"value":17491,"limit":2097152},"expansiondepth":{"value":16,"limit":100},"expensivefunctioncount":{"value":6,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":267698,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 1199.678 1 -total"," 20.70% 248.274 90 Template:Sfn"," 20.21% 242.481 2 Template:Reflist"," 13.12% 157.391 40 Template:Citation"," 9.75% 117.026 10 Template:Lang"," 8.37% 100.370 9 Template:Cite_web"," 7.41% 88.941 1 Template:EnigmaSeries"," 6.97% 83.562 15 Template:Cite_book"," 5.36% 64.255 1 Template:Short_description"," 3.29% 39.417 2 Template:Pagetype"]},"scribunto":{"limitreport-timeusage":{"value":"0.721","limit":"10.000"},"limitreport-memusage":{"value":22257139,"limit":52428800},"limitreport-logs":"anchor_id_list = table#1 {\n [\"CITEREFBamford2001\"] = 1,\n [\"CITEREFBeesly1977\"] = 1,\n [\"CITEREFBennett1999\"] = 1,\n [\"CITEREFBertrand1973\"] = 1,\n [\"CITEREFBrown2019\"] = 1,\n [\"CITEREFBrzezinski2005\"] = 1,\n [\"CITEREFBudiansky2000\"] = 1,\n [\"CITEREFBudiansky2018\"] = 1,\n [\"CITEREFCalvocoressi2001\"] = 1,\n [\"CITEREFChurchill2005\"] = 1,\n [\"CITEREFComer2021\"] = 1,\n [\"CITEREFCopeland2004\"] = 1,\n [\"CITEREFCox2014\"] = 1,\n [\"CITEREFCrowdy2011\"] = 1,\n [\"CITEREFDeutsch1977\"] = 1,\n [\"CITEREFFarago1974\"] = 1,\n [\"CITEREFFarley1980\"] = 1,\n [\"CITEREFFeeWebb2019\"] = 1,\n [\"CITEREFFerris2005\"] = 1,\n [\"CITEREFGannon2006\"] = 1,\n [\"CITEREFHaigh2017\"] = 1,\n [\"CITEREFHanyok2004\"] = 1,\n [\"CITEREFHarper2017\"] = 1,\n [\"CITEREFHartcup2000\"] = 1,\n [\"CITEREFHastings2011\"] = 1,\n [\"CITEREFHessler1989\"] = 1,\n [\"CITEREFHinsley\"] = 1,\n [\"CITEREFHinsley1993\"] = 1,\n [\"CITEREFHinsley1993a\"] = 1,\n [\"CITEREFHinsley1996\"] = 1,\n [\"CITEREFHinsleyStripp1993\"] = 1,\n [\"CITEREFHunt1976\"] = 1,\n [\"CITEREFJones1978\"] = 1,\n [\"CITEREFKahn1967\"] = 1,\n [\"CITEREFKahn1974\"] = 1,\n [\"CITEREFKahn1997\"] = 1,\n [\"CITEREFKeegan2003\"] = 1,\n [\"CITEREFKnightley1986\"] = 1,\n [\"CITEREFKozaczuk1984\"] = 1,\n [\"CITEREFLewin2001\"] = 1,\n [\"CITEREFMallmann-Showell2003\"] = 1,\n [\"CITEREFMiller2001\"] = 1,\n [\"CITEREFMomsen2007\"] = 1,\n [\"CITEREFMundy2017\"] = 1,\n [\"CITEREFPidgeon2003\"] = 1,\n [\"CITEREFPiekalkiewicz1987\"] = 1,\n [\"CITEREFRejewski1984\"] = 1,\n [\"CITEREFRichelson1997\"] = 1,\n [\"CITEREFRoberts2009\"] = 1,\n [\"CITEREFSchlesinger1992\"] = 1,\n [\"CITEREFSingh1999\"] = 1,\n [\"CITEREFSmith2002\"] = 1,\n [\"CITEREFSmith2007\"] = 1,\n [\"CITEREFSmith2011\"] = 1,\n [\"CITEREFStephenson2004\"] = 1,\n [\"CITEREFTarrant1995\"] = 1,\n [\"CITEREFTaylor2005\"] = 1,\n [\"CITEREFWelchman1984\"] = 1,\n [\"CITEREFWest1986\"] = 1,\n [\"CITEREFWilkinson1993\"] = 1,\n [\"CITEREFWinterbotham1974\"] = 1,\n}\ntemplate_list = table#1 {\n [\"Authority control\"] = 1,\n [\"Better source needed\"] = 1,\n [\"Citation\"] = 40,\n [\"Citation needed\"] = 1,\n [\"Cite book\"] = 15,\n [\"Cite journal\"] = 2,\n [\"Cite news\"] = 2,\n [\"Cite web\"] = 9,\n [\"Efn\"] = 5,\n [\"EnigmaSeries\"] = 1,\n [\"GS\"] = 2,\n [\"HMS\"] = 1,\n [\"Harv\"] = 1,\n [\"Harvc\"] = 1,\n [\"Harvnb\"] = 5,\n [\"Lang\"] = 10,\n [\"Main\"] = 2,\n [\"Multiple image\"] = 1,\n [\"Notelist\"] = 1,\n [\"Nowrap\"] = 1,\n [\"Quote\"] = 5,\n [\"Refbegin\"] = 1,\n [\"Refend\"] = 1,\n [\"Reflist\"] = 1,\n [\"Rp\"] = 1,\n [\"Sfn\"] = 90,\n [\"Short description\"] = 1,\n [\"UK Intelligence Agencies\"] = 1,\n [\"Use dmy dates\"] = 1,\n}\narticle_whitelist = table#1 {\n}\n"},"cachereport":{"origin":"mw-web.codfw.main-f69cdc8f6-g2ggh","timestamp":"20241122140944","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Ultra (cryptography)","url":"https:\/\/en.wikipedia.org\/wiki\/Ultra_(cryptography)","sameAs":"http:\/\/www.wikidata.org\/entity\/Q825712","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q825712","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2001-09-14T20:34:49Z","dateModified":"2024-11-15T09:16:13Z","image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/8\/8b\/EnigmaMachine_Warzawa.jpg","headline":"Designation adopted by British for military intelligence from broken enemy codes"}</script> </body> </html>