Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
0Activity
0 of .
Results for:
No results containing your search query
P. 1
cryptolog_63

cryptolog_63

Ratings: (0)|Views: 1|Likes:
Published by John Ohno
NSA cryptolog
NSA cryptolog

More info:

Published by: John Ohno on Mar 28, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/28/2013

pdf

text

original

 
WlD'ilVffiWlD(1
~l5~mWV'il\?
lD~l5WlB\?
L'0~V
~l5lD~~15
~~
OOl5aJlDl5
f
OOaJ~~(1aJGJlD
f]rn~~U0110~
November
1981
THEPPC
IS
CCMING!
Future
Powerful
Personal
Computers:
FurUR~~T~e~~~~T~frG
t7~)
~~~~~:~~:.:~:::
::
:
::::!
7J.·
....
..
::r::::
~
CRYPTIC
CROSSl.,rORD
(U)
••••••••••••••••••••••••••
-------r:::::
....
14
SAY
WHAT
YOU
MEANC'
(U).
•••••••••••••
.;.
•••••••••••
l~Vjd
WGaddv
..
~
i
·
..
/
•••••••
15
HOW
TO
CREATE
A
U.,ER-UNFRIENDLY
SYS~EM
(U)......
.
•••••••••
17OPELINT
IS
ALtVE
AND
WELL
IN
B
GROUP
(3).......
••••••••
25
REVUJoJ:
'.Jhatdoyou
think?
(U)..................
29
TillS
DOClJi\UlNTCONTAINS
eOBEWORB
MA'fERIAI:J
GL'tSSIFIEElUSA/CSS.,
123-2
REVIS,t
ON
10
New
2Gl11
Declassified
and
ApprovedforRelease
by
NSA
on
'10-'1.2-.20'1.2
pursuanttoE.O.
'135.26.
vl
DR
Case
#
54778
 
DOCID:
4009838
Published
hyP1,Techn
iques
andStandard
s,
for
thO!!
Personnel
of
():>erations
VOL.
IX,
No.
11
PU9LISHFR
90ARD
OF
F.DlTOR~
Editor-in-Chief······I~
~I(R322~)
Production
•.•••••••......
.
1
b369s)
FDITORIAL
The
response
to
our
cry
for
hel
p
in
keepingour
subscription
lists
up
to
date
has
been
hearteninF,.
"Thanks.
me"active"
nalleon
our
list
has
been
out
of
the
?gency
for
severalyears
j
many
others
have
moved.
Along
with
the
resoonses,
we
h1'lve
been
get
tinl2;
questions
alongthe
1
ine
of
"Is
CRYPTOLOG
sUIl
alive?"
(we
think
so)
and
"Is
it
~oing
to
be
merp;ed
with
some
other
puhlication?"
(we
haveno
plans
to
merge
with
any
otherpuhlica
tion,
andnone
has
so
far
expresset"leny
interest
in
mP.l"~
inp;wi
th
us).
We
are
a
DfY)
(Operations)
puhlication,but
it
is
clear
from
our
subscription
1
ist
andour
author
1
ist
that
we
range
outside
thephysicalconfines
of
DOO.
If
we
don't
seem
to
be
publishing
any
art.icles
about
your
area
of
interest,
it
is
either"
because
the
editor
is
biased
against
your
area
of
interest,"
or
becausehe
isn't
getting
any
thing
al'loutyour
area
ofinterest
that
canbe
published.
M:>st
of
thelayout
and
ed
iting
of
CRYPTOLOG
is
now
being
done
onacomputer-
actually
on
severalcanputers.
Using
the
tNrX
syst~,
with
some
help
fromPTNgmER,and
the
PLAT-
FORM
networkbetween
various
host
computers,
the
original
keystrokes
(often
the
author's)
areretained
throughout
the
process.
A
lotof
retyping,as
wellas
cutting
and
pasting
that
characterized
the
earlier
issues
(all
doneona
typewriter)
is
beingavoided.
Q1e
it'!!!l1.r1
I
Ipiece
last
monthonTechnic91
~
port
Catalogs,
was
coordinated
~th
him
in
final
form
just
before
publicationvia
the
network
(Ken
is
now
stationed/in
Germmy).
to·
CRYPTQLOG.
r
or
call1.3369S
To
submit
articles
or
letters
via
PLATFOP.~,
address
to
crypto1g
at
bar1c05
(note:
no
'0'
in
'log')
About
half
of
the
i
t~s
now
being
worked
on
for
this
and
futureiss~s
have
cane
in
over
the
network.
\o(e
are
still
interested
in
receiving
it~s
fran
people
not
on
the
net
v.ork.
We
C\on'tmind
typing.
eventhough
it's
niceto
have
some
items
that
don't
require
it.
V
P.L.
86-36
 
UNCLASSIFIED
mrtJRE
POWERFUL
PERSONALCOMPUTERS:
An
Overview
of
the
Teclmology
byl
P.L.
86-36
I
cientific
and
analytic
computing,
'::!'
..
especially
at
NSA,
has
evolved
from
..the.batch.envirol'lllent
of
the
1960's
,
to
the
timeshar
ing
and
mul
tiprocess-
ingenvirol'll1ents
of
the1970's.
In
the
1960's,
typical
progranmers
submitted
'adeck
of
punched
cards
to
thebatch
system
CIld
later
rece1v&a
the
deckanda
listing
of
the
progran
execution.
In
this
envirol'lllent,
both
the
computingpower
and
the
user's
access
to
this
powerwereremote
and
non-interactive.
In
thetimesharing
environnent
of
the
late
1970's
(and
of
today),
the
progranmer
has
direct,
timely,
interactive
access
tohis
or
her
computing
processes
through
a
terminal.
In
this
envirol'll1ent,
the
computingpower
is
still'
remote,
whether
inthenext
room
orfar
away
across
anetW>rk,and
is
shared.
J-bw
ever,the
user's
access
to
this
power
is
potentially
local
and
definitelyinteractive;
hopefully,the
accessterminal
is
on
or
near
the
user's
desk.
What
will
scfentific
and
analytic
computingbe
like
inthe
1980's?
While
it
can
be
argued
that
very
large-scale
super
cClJlputers
like
the
Cray1
willdefinitely
be
needed
for
many
com
plex
problems
(10J,
advances
inseveralareas
of
computer
tecmology
have
spurred
efforts
to
design
and.
produce
extremelypowerful,extremely
compactcomputersystems
for
scien
tific
and
analyticuse.
&Jch
systems
will
be
small
eno~h
and
inexpensive
eno~h
to
be
single-user
systems
located
at
the
user's
desk.
In
a
sense,
these
systems
will
enable
users
to
have
their
0'-11
"VAX"
or
"370"
instead
of
a
terminal.
In
this
envirol'll1ent,
both
the
computingpowerand
the
user's
access
to
it
will
be
local,
personal,
and
highly
interac
tive.
The
purpose
ofthis
paper
is
to
discuss
capabilities
being
proposed
for
suchacomput
ing
system,
how
it
may
be
realized,
and
Io'hat
its
impact
on
NSA
scientific
and
analytic
com
puting
might
be.
J-bw
should
this
future
systembe
described?
Some
papers
on
the
sub
jectcall
it
a
personal
computer
(4,
12J.While
it
will
be
personal,
this
label
conjures
up
images
of
the
TRS-80
or
the
Apple
II
-a
totally
inappropriate
image.
other
papers
[13)
refer
to
it
as
an
intelligent
terminal.
At
NSA,
this
term
fits
the
Delta
Data7000,
for
it
is
a
terminal
with
its
0'-11
microproces
sor.
The
powerful
future
system
is
M)T
a
ter
minal;
it
is
'IHE
computingsystem
and
may
bemorepowerful
than
systems
to
Io'hich
we
inter
face
intelligent
terminals
today!For
lack
of
anothernane,
this
paper
will
refer
to
this
system
as
aPowerful
Personal
Computer(PPC).
The
PPC
hasthe
potential
to
revolutionize
scientific
and
analytic
computing
at
NSA.
Even
with
the
GTSS
and
other
timesharing
sys
tems
of
today,
analysts
use'
terminals
to
gain
access
to
remote,shared
computingpower
and
data
over
relatively
low-speed
connections
(Io'hethernetw>rk
or
communications
lines).
The
PPC
will
givethe
analyst
access
to
significantlocal,
individual
computingpower
and
data.
Netw>rksandcommunications
lines
today
are
used
to
gain
access
to
all
computingpower
,all
data,
and
personal
comml.l1ications.In
the
PPC
envirol'll1ent,
hig~speed
netw>rks
will
beused
foraccess
to
very
large
data
bases
andshared
resources
and
for
electronic
personal
comml.l1ications.
This
will
bea
dras
tic
changefromour
present
netW>Y'king
philo
sophy.
Nov
81
CRYPI'OLOG
Page
UNCLASSIFIED

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->