Turing's Misconceptions As Depicted In The Movie '

Superior Essays
Problem and Ways
After the successful construction of his machine, Turing names it Christopher. Unfortunately, Christopher cannot determine the German’s Enigma as they reset the communication encryption on a daily basis. Following this failure, Denniston orders the destruction of the machine and lays off Turing. However, the Turing’s cryptographers colleagues threaten to quit if he is laid off. Clarke, Turing’s fiancé plans to leave on the wishes of her parents, but Turing proposes to her of which she accepts. At their reception, Turing confirms his homosexuality to Carncross and warns him to keep it as a secret. At a certain instance, Turing overhears a conversation of a female clerk about the messages she receives, and he correspondingly has an epiphany about decoding the German’s encryptions. He thus realizes that by using certain words that he is familiar with in certain contextual messages, he can potentially program the machine successfully to decode the encryptions. Once he recalibrates the functions of the machine, it is able to decode the first message and the colleagues celebrate. For the purpose of ensuring the Germans are kept in the dark, Turing then
…show more content…
The most important technique and the main focus of the movie is based on the Turing’s machine, Christopher. Turing’s invention has the ability to basically read the coded messages, understand them, and thereby decrypt them. The second technique relies on traditional decryption styles. However, this technique is inefficient owing to the fact that it considers a total number of 159 million possibilities of each encryption. The other two techniques are not mention or described in detail as the first two. However, the techniques are described as the study of algebra as a means to understand and decrypt codes and as the study of independent science which focuses on the understanding the

Related Documents

  • Improved Essays

    “This War is About Information” The practice of perception management was prevalent throughout the Cold War, both on the side of the United States of America and of the Union of Soviet Socialist Republics. As such, both sides had to implement ways in which to hide and process information so that their country could gain an advantage. Stephen Spielberg’s Bridge of Spies is able to clearly and succinctly present the practice of perception management through the characters Rudolf Abel and Francis Gary Powers, as well as through the actions taken by both the United States and the Soviet Union to exchange the two prisoners.…

    • 1308 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The article “Quantum Computer Comes Closer to Cracking RSA Encryption” written by Amy Nordrum, shows that Cryptography needs to be important, because of the fast developing of new technology. In her article Ms. Nordrum tells about computer scientists from the MIT which found a way to crack the RSA (Rivest, Shamir and Adleman)-Code. On the fact, that RSA Encryption is used in all our devices it is quite frightening to know that the government is maybe already using this kind of technology for decipher our messages. Since the invention of the Quantum Computer everybody knew that we have to improve all our security software, but nothing changed. All our privacy in form of messages or passwords for bank accounts are secured by a Code from 1977…

    • 257 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Do you think that the way we grow up has a lasting effect on us? The things we go through and are surrounded by as children will shape our personality and how we deal with things? The underlying theme of these poems is a very deep and difficult subject to talk about, the breakage of a person and of a friendship. The way we deal with our past make us who we are, but how much can a person handle before they break? Stuart broke, Jackson was broken by Stuarts suicide attempt because he didn't know how to react to it, and these poems purpose an idea that we should handle suicide differently because, a suicide effects not only the person but the people around them, it breaks them.…

    • 703 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Who Is Allen Clark

    • 463 Words
    • 2 Pages

    Alen Turing. Criptogropher from Cambridge who is hired to a group of men to break the Nazis enigma code. However he feels team ates will only slow him down, and after taking control of the group he starts by firing two men who he feels are inadequate for the job. His next step is to find new people to fill there positions by putting out a cross word puzzle to fish for canidates. Jone Clark becomes a part of the group along with another man.…

    • 463 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    The metaphor of machinery in Ken Kesey’s novel One Flew Over the Cuckoo’s Nest, shows the mechanization of society which suppresses individuality and free will. Kesey’s clever use of machinery as a metaphor that controls the patients on the ward identifies the problems of American society in the 1950s and 60s. The patients on the ward are victims of a society which demands conformity. The metaphor of machinery points out the rigidity of the system in which everyone should be a “functioning, adjusted component” (Kesey 36) and where there is no room for individuality. Bromden explains that the ward is a factory “for fixing up mistakes made in the neighborhoods and the schools and in the churches” (Kesey 36).…

    • 1016 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Title In “The Man in the Dead Machine” By Donald Hall a WWII pilot is in a battle over New Guinea, the poem is split into two different outcomes. One outcome is negative and one outcome is positive. The pilot fate is determined by his choices. The author Donald Hall uses Allusion, and Imagery to create this poem.…

    • 308 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    After the British assembled a team of mathematicians at Bletchley Park codebreaking center, British mathematician Alan Turing developed the Bombe. This new machine also contained many enigma rotor wheels which searched for the rotor order, starting position, and plugboard settings. This would take an extremely long amount of time (especially since German changed the code daily), and the men at Bletchley Park discovered two German weaknesses to narrow down the possible key settings and find the correct one faster. The first was that the internal wirings of the enigma…

    • 813 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Primer is a science fiction film based time travel and the inquiries that border traveling through time and space. Can time be altered or can history be revised? If the answer is yes then a statement, proposition, or situation that seems to be absurd or contradictory, may in fact be true, when cause and result do not correlate. For example, if the one that travels through time and space decided to alter history, however after history had been altered that person realizes that there is no longer a need to alter history because what was changed never came to pass. If they realize that if no one changed history, then there is no a reason to change history.…

    • 714 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In most games, one employs the best methods they believe are capable of achieving the best possible result: a win. He mentions that the strongest strategy for the woman in the original game is “to probably give truthful answers” because her goal is to get the interrogator to guess correctly (434). In his essay, Turing wonders what would happen if a machine were to take on the part of A and a man were to take on the part of B in the game. In this role, the machine would be attempting to lead the interrogator to an erroneous conclusion. Throughout the essay, he suggests strategies for the machine such as “[providing] answers that would naturally be given by a man” (435) or “not [attempting] to give the right answers to arithmetic problems,” but instead “deliberately [introducing] mistakes…to confuse the interrogator” (448).…

    • 1676 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    The famous American architect and inventor R. Buckminster Fuller once said “Humanity is acquiring all the right technology for all the wrong reasons.” ( The words of R. Buckminster Fuller are more relevant now than ever before; especially with the invention and use of dangerous technology such as encryption. Encryption works by using complex mathematical algorithms to scramble the contents of a file or message to another form, called ciphertext, which renders it unreadable to outside parties. Various encryption algorithms, many of which are unbreakable, are available for free public use around the world. Unimpeded public access to technology such as encryption gives unethical people the opportunity to abuse its power and commit crimes with…

    • 1007 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    “In the kitchen” is a short story of the author Henry Louis Gates, Jr.’s experience with understanding the significance of “the kitchen”, his family, history, the notion of good and or bad hair and the background on African American products. The understanding of the experience allows him to clearly describe the importance on why he thinks and functions a certain way. Henry expresses two sides of “the kitchen” and “In the kitchen”. “In the kitchen” highlights his mother’s hair at-home business, the discovery of his roots and how his family expresses their view on the notion good and or bad hair, and the wonders of the straightening comb (“hot comb”). “The kitchen” highlights the kinks that lay on the back of your neck and even…

    • 1164 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Steganography Analysis

    • 2146 Words
    • 9 Pages

    What is Cryptography? When a message is encoded so it becomes unreadable while making sure only the intended receiver is capable of decoding it back into its original form is what we commonly known as Cryptography. It is done by means of an encryption and decryption algorithm (often the same implemented in reverse order) and very often using a secret key. Some of the early cryptographic systems kept the algorithm itself secret and did not use a key (Stallings, 2014).…

    • 2146 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    In “Can Computers Think?” John Searle claims that by definition, computers cannot think, nor will they ever, no matter how much technology manages to advance in the future. Searle defends his claim by providing an outline and an interesting thought experiment. His work begins by simply introducing the prevailing views concerning artificial intelligence during the time period. Many individuals thought of human brains and digital computers as analogous due to something known as the Turing Test.…

    • 1054 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Rhetorical Act A commencement address is an opening speech that given to graduating students and their family members when they obtain the degree. The person given such a speech is known as a commencement speaker, who is often a famous and elite person as well as would like to share their life experience, values and advice during the speech. This is a platform for speaker to say amazing and unlimited things to attract audiences. Bill Gates has stated at a positive and inspirational college commencement address at Harvard University while getting his bachelor degree on 2007. Due to the information and technology limitation when he was young, Bill Gates had no chance to get a real awareness of the awful inequities in the world until he left Harvard.…

    • 1553 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    1.1 Overview Cryptography is the science/practice of “writing in secret” (“crypto”= “secret, “graphy” = “writing”). Cryptographic functions are generally defined as algorithms or protocols, rules that govern how data is processed to turn plaintext (unencrypted data) into cipher text (encrypted data) [1]. Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process.…

    • 2898 Words
    • 12 Pages
    Improved Essays