This article includes a list of general references, but it lacks sufficient corresponding inline citations. (July 2013) |
Peter Frank George Twinn CBE (9 January 1916 – 29 October 2004[1]) was a British mathematician, Second World War codebreaker and entomologist. The first professional mathematician to be recruited to GC&CS.[2] Head of ISK from 1943, the unit responsible for decrypting over 100,000 Abwehr communications.[3]
Peter Frank George Twinn | |
---|---|
Born | Peter Frank George Twinn 9 January 1916 Streatham, South London |
Died | 29 October 2004 | (aged 88)
Nationality | English |
Citizenship | British |
Education | |
Alma mater | Brasenose College, Oxford |
Occupations |
|
Employer |
Early life and education
editBorn in Streatham, South London, Twinn was the son of a senior General Post Office official.[1] After attending Manchester Grammar School and Dulwich College, he graduated in mathematics at Brasenose College, Oxford.[1] He won a scholarship to pursue postgraduate studies in physics.[4]
Cryptography
editTwinn was the first professional mathematician to join GC&CS.[2] In early 1939, he applied after seeing an advertisement, working first in London before moving to Bletchley Park. He worked with Dilly Knox and Alan Turing on German Enigma ciphers. In early 1942, he became the head of the Abwehr Enigma section.
Recruitment to GC&CS
editHe was in the middle of a postgraduate scholarship studying Physics when he saw an advertisement for a job with the government. "I was a bit unsettled," he remembered. "I'd finished my university degree and I didn't quite know what to do." The advertisement indicated that they were looking for mathematicians, but was unclear about what else was involved.
In that unsettled period after the Munich Agreement, international relations between the major European powers were tense and getting tenser.
" They offered me this job at the princely salary of, I think, £275 a year," he said, "which sounded all right to me, and I was taken along on the first day to be introduced to Dilly Knox." He began as an assistant to Alfred Dilwyn ("Dilly") Knox, who headed a team of codebreakers at GC&CS.
An eccentric but brilliant character, Dilly Knox was the first British codebreaker to work on the Enigma cipher. Like most GC&CS experts, he was a classicist. But, as war loomed, GC&CS began employing mathematicians, as well as chess players and crossword experts. Twinn was in fact the first mathematician to join the team.
Knox believed in throwing his new recruits in at the deep end. He gave Twinn a mere five minutes' training before telling him to go and get on with it.
On the eve of war
editTwinn was the first British cryptographer to read a German military Enigma message, having obtained vital information from Polish cryptanalysts in July 1939. Twinn said that "It was a trifling exercise, but I repeat for the umpteenth time, no credit to me."
In July 1939 GC&CS moved from London to Bletchley Park. The mansion in the park was used by the staff, but many other buildings had to be constructed to accommodate the large number of people who worked for GC&CS during the war. These temporary buildings were known as the "huts".
World War II
editEnigma
editThe Enigma machine dated back to 1919, when Hugo Alexander Koch, a Dutchman, patented an invention that he called a secret writing machine. Soon Arthur Scherbius, an engineer, was experimenting with this and similar machines and became enthusiastic about encryption machines that used rotors. He recommended them to Siegfried Turkel, the director of the Institute of Criminology in Vienna, who also became interested in them.
In the meantime, Koch had set up a company with the hope of selling his encryption machine for commercial use; one disadvantage was that numbers had to be spelt out in words. Industry was not interested, but in 1926 the German Navy looked at the Koch machine. Senior officers were impressed with it and ordered a large number. The purchase of the device – called Enigma – was kept strictly secret.
The Enigma machine was complicated, with a keyboard, like the ones used on a typewriter, containing all the letters of the alphabet. Each of the 26 letters was connected electrically to one of three rotors, each provided with a ring. Each ring also held the 26 letters of the alphabet. Further electrical connections led from the rotors to 26 illuminated letters.
When an operator, enciphering a message, pressed a key, an electric current passed through the machine and the rotors turned mechanically, but not in unison. Every time a key was pushed, the first rotor would rotate one letter. This happened 26 times until the first rotor had made a complete revolution. Then the second rotor would start to rotate. And so on.
When a key was pressed, a light came on behind the cipher text letter, always different from the original letter in the plain text. The illuminated letters made up the coded message.
The system worked in reverse. The person decoding a cipher message would use an Enigma with identical settings. When he pressed the cipher text letter, the letter in the original plain text message lit up. The illuminated letters made up the original message.
To make the codes more difficult to break, each of the rotors could be taken out and replaced in a different order. Also, the rings on the rotors could be put in a different order each day – for example, on one day the first rotor could be set at B, the next day at F, and so on. The military version of Enigma was provided with a plug board, like an old telephone switchboard. This allowed an extra switching of the letters, both before they entered the rotors and after leaving them. The plug board had 26 holes. Connections were made with wires and plugs. With three rotors and, say, six pairs of letters connected with the plug board, there would be 105,456 different combinations of the alphabet.
In December 1938 the Germans added additional rotors (up to six) and the number of combinations increased dramatically. The Germans believed that messages sent on their most sophisticated Enigma machines were so well coded that they could not be decoded. But Twinn and his colleagues proved them wrong.
About 10,000 people worked at Bletchley. The core group was the small number of cryptanalysts trying to crack the Enigma machine; at the beginning, this group consisted of no more than ten people, with Knox and Twinn in charge.
The British codebreakers had been working on the commercial version of Enigma, the easier of the two to break, during the 1920s and 1930s, and they had made much progress in breaking the military version. But Twinn and his colleagues were stymied because they could not work out the order in which the Enigma keys were wired up.
In July 1939, a month or so before the war started, Knox and some others travelled to Poland. Polish cryptologists, some of whom were brilliant, handed over to their British colleagues key information about Enigma, including replica machines.
The British discovered that Enigma machines were wired alphabetically: A to the first contact, B to the second, and so on. This was the order given in the diagram attached to the patent application. But Twinn and his colleagues thought it such an obvious thing to do that nobody considered it worth trying.
In early 1940 Twinn made the first break into Enigma. This could have been done much earlier if only they had tried the alphabetical system detailed in the patent application.
The ability to read German encoded military messages was of inestimable help to the Allies in winning the war. It was achieved largely because of the efforts of Twinn, Knox, Alan Turing (who later became the father of artificial intelligence) and others at Bletchley Park. Turing, a brilliant mathematician, developed a machine called the “bombe”, which speeded up the deciphering process by trial and error — a crucial development for the codebreakers.
German Naval Enigma
editTwinn worked with Turing on breaking the German Naval Enigma. Their success helped allied convoys to avoid German U-boats.
Intelligence Services Knox
editIn October 1941, Dilly Knox solved the Abwehr Enigma.[3] Intelligence Services Knox (ISK) was established to decrypt Abwehr communications.[3] In early 1942, with Knox seriously ill, Twinn took change of running ISK[5] and was appointed head after Knox's death.[3] By the end of the war, ISK had decrypted and disseminated 140,800 messages.[3]
Intelligence gained from these Abwehr decrypts played an important part in ensuring the success of Double-Cross operations by MI5 and M16, and in Operation Fortitude, the Allied campaign to deceive the Germans about D-Day.[5]
Post-war career
editTwinn's carried on government work after the war in a number of departments, including, in the late 1960s, as Director of Hovercraft in the Ministry for Technology. Later he became Secretary of the Royal Aircraft Establishment in Farnborough. In the early 1970s, he was the second secretary of the Natural Environment Research Council. He was appointed CBE in the 1980 Birthday Honours.
Twinn became interested in entomology, gaining his doctorate from the University of London in the jumping mechanism of click beetles. He co-authored A Provisional Atlas of the Longhorn Beetle (Coleoptera Cerambycidae) (1999), a study of the distribution of a number of beetle species.
Twinn had an interest in music and played the clarinet and viola. Twinn married Rosamund Case, whom he had met at Bletchley Park through his interest in music, in 1944; they had a son and three daughters.
Publications
edit- Peter F. G. Twinn and P. T. Harding, "Provisional atlas of the longhorn beetles (Coleoptera, Cerambycidae) of Britain", Huntingdon: Biological Records Centre, 1999. ISBN 1-870393-43-0
Notes
edit- ^ a b c Dan van der Vat, "Obituary: Peter Twinn", The Guardian, 20 November 2004
- ^ a b Batey 2009
- ^ a b c d e Batey 2009, p. xi
- ^ "Peter Twinn – Obituary", The Times, 24 November 2004
- ^ a b "Peter Twinn", The Daily Telegraph, 17 November 2004
References
edit- Batey, Mavis (2009). Dilly: The Man Who Broke Enigmas. Dialogue. ISBN 978-1-906447-01-4.
- "Peter Twinn", The Telegraph, London, 17 November 2004, archived from the original on 2 March 2007, retrieved 31 July 2013