General Report on Tunny


Page 2

-----------------------------------
PART 1 - INTRODUCTION
-----------------------------------

    11 GERMAN TUNNY
 
    11A Fish Machines
    11B The Tunny Cipher Machine
    11C Wheel Patterns
    11D How Tunny is used
    11E The Tunny Network
 
    12 CRYPTOGRAPHIC ASPECTS
 
    12A The Problem
    12B Modern Strategy
    12C Chi-breaking and Setting
    12D Motor and Psi-breaking and Setting
    12E Methods involving Key
 
    13 MACHINES
 
    13A Explanation of the Categories
    13B Counting and Stepping Machines
    13C Copying Machines
    13D Miscellaneous Simple Machines
 
    14 ORGANISATION
 
    14A Expansion and Growth
    14B The Two Sections in 1945
    14C Circulation
 
    15 SOME HISTORICAL NOTES
 
    15A First Stages in Machine Development
    15B Early Organisation and Difficulties
    15C The Period of Expansion



< previous

next >