Bletchley Park is one of the world's great historical centers of cryptography and code breaking. Now a museum, Bletchley Park is facing economic crisis. It's worth remembering the work that went on there and the people who made it happen. The United Kingdom’s Bletchley Park is perhaps the world’s best-known museum dedicated to cryptography and code breaking. You cannot read a serious book on the history of cryptography that doesn’t state that Bletchley Park was responsible for saving millions of lives during World War II (both allied and axis citizens and soldiers). Now Bletchley Park needs our help.Bletchley Park, and its historic mansion and grounds, is located in present-day Milton Keynes, England. I had the good fortune to visit it several years ago. Built as a typical mansion estate in the 1870s, Bletchley Park was converted into an international code-breaking center on Aug. 15, 1939, in anticipation of the great effort needed during the war. Enemy-encrypted communications and ciphers from around the world were brought to Bletchley Park for analysis and decrypting. While the visiting Americans concentrated on Japanese ciphers, the British worked on German ciphers, including communications from the state-of-the-art Enigma cipher machines. During the height of the war, some 10,000 highly intelligent people made Bletchley Park their working home away from home.Cryptography, especially Japanese and German cryptography, was entering a phase that could no longer be tackled by the human intellect alone. Private encryption keys became longer and more complex. The early underpinnings of today’s modern electric computers were invented to tackle the complex rounds of equations needed to solve the cipher puzzles. No historic figure was greater than Alan Turing. Turing was a complicated man with a head for mathematics, and he was singularly adept at solving the world’s most complex ciphers. Bletchley Park slowly began to make headway against the Germans’ Enigma ciphers, mostly because of human-induced mistakes into the overall encryption process (such as known repeated words and private keys). At some point, it was determined that it would take millions of calculations to solve the last puzzle step of the Enigma cipher, which at the time seemed impossible to most observers.Turing envisioned and created a one-ton electromechanical computer known as a bombe. Multiple copies of these computers working over many hours could decipher cribbed Engima machine messages quickly enough that knowledge of the message remained useful. Bletchley Park soon held more than 200 Turing bombes. There is conclusive evidence that battles fought with decrypted information led to huge allied victories, while the reverse is also true. In the few instances where the decrypted information was not relied upon or was not available (i.e., Hitler began to distrust the Enigma machines and ordered that they not be used in at least one major battle), the allies lost or had lesser victories.The Allies’ code breaking saved lives on both sides, avoiding what could have been years more of war, with increasingly powerfully destructive weapons being deployed on both sides. The world owes Bletchley Park and Alan Turing gratitude that was never paid. Alan Turing ended his life in wrongful disgrace and Bletchley Park barely made it to museum status. Bletchley Park has struggled for funds from the beginning, and it now faces an economic crisis as bad as any it has faced in the past. I invite you to read and learn about Bletchley Park. Visit it if you’re ever nearby in England. Buy something from the museum shop or consider donating to this worthwhile cause.Bletchley Park is a tribute to the essence and ultimate triumph of the human spirit. When faced with supposedly insurmountable task and overwhelming odds, it stands as a permanent testament to the fact that we can work together to solve the impossible. Related content analysis The 5 types of cyber attack you're most likely to face Don't be distracted by the exploit of the week. Invest your time and money defending against the threats you're apt to confront By Roger Grimes Aug 21, 2017 7 mins Phishing Malware Social Engineering analysis 'Jump boxes' and SAWs improve security, if you set them up right Organizations consistently and reliably using one or both of these approaches have far less risk than those that do not. By Roger Grimes Jul 26, 2017 13 mins Authentication Access Control Data and Information Security analysis Attention, 'red team' hackers: Stay on target You hire elite hackers to break your defenses and expose vulnerabilities -- not to be distracted by the pursuit of obscure flaws By Roger Grimes Dec 08, 2015 4 mins Hacking Data and Information Security Network Security analysis 4 do's and don'ts for safer holiday computing It's the season for scams, hacks, and malware attacks. But contrary to what you've heard, you can avoid being a victim pretty easily By Roger Grimes Dec 01, 2015 4 mins Phishing Malware Patch Management Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe