200 likes | 350 Views
Once upon a time…. Not so far away. This is a story of four people. These people were not aware of it – but they were all meant to be connected through one key aspect…. Jeremiah. Meet Jeremiah AKA the "Weeping prophet“ authoring the Book of Jeremiah, Kings 1, Kings 2
E N D
Once upon a time…. Not so far away • This is a story of four people. • These people were not aware of it – but they were all meant to be connected through one key aspect…
Jeremiah • Meet Jeremiah • AKA the "Weeping prophet“ • authoring the Book of Jeremiah, Kings 1, Kings 2 • Jeremiah likes walks on the beach, cursing his enemies and breaking earthenware bottles.
Adolf • Meet Adolf • Adolf is a painter • Adolf weeps himself to sleep at night (it has nothing to do with all the Jews he killed, though….) • Known for his attempt of trying to take over the world
Adolf • Also known for his attempts of collaborations with the following:
Snir & Amir • Snir & Amir are students at the ECE School at BGU. • They like TV, hangouts and spending time with their girlfriends. • They wept once a week this semester, at Sunday morning.
Data Encryption And Code cracking
Encryption timeline - Old age cryptography - New age cryptography - Cryptography until the mid 20th century - Modern cryptography
OLD AGE CRYPTOGRAPHY • The earliest use of cryptography found in hieroglyphsfrom the Old Kingdom of Egypt circa 1900 BC. • Jeremiah made use ofsubstitution ciphers (such as the Atbash cipher) around 500 to 600 BC. • Amir also uses Atbash cipher for his grocery list, which makes Sivan, his girlfriend, abuse him physically once a week.
NEW AGE CRYPTOGRAPHY • Anagrams were used by the pope and scientist like Galileo to hide secrets or to prove ownership on discoveries. • The Scottish queen Mary was executed after the code she used to communicate with novels who wanted toexpel queen Elizabeth was cracked.
NEW AGE CRYPTOGRAPHY • These days were also the time when decoding encryptionhas begun. • In the 9th century an Iraqi man named Al Kandy developed a decoding method based on the analysis of frequencies in order to locate the common letters in an encrypted text and in that way to guess the rest of the words. • In the 21st century an Iraqi man named ShlomoHava went on Sabbatical
Cryptography until the mid 20th century • Charles Babbage'swork on mathematical cryptanalysis of polyalphabeticciphers • The only unbreakable cipher, the One Time Pad • Adolf made heavy use, in several variants, of an electromechanical rotor machine known as Enigma
Modern Cryptography – Data Encryption : Computers • Wifiis widely used with encryption algorithms • Snir & Amir made a vast use of the above during this semester. • The longer the key is, the more difficult it is to crack the code • Introduction of the public-key • Data Encryption Standard (DES), a symmetric-key cipher • Advanced Encryption Standard (AES) • Brute Force • Brutus, one of Jeremiah’s enemies, tried cracking Atbash using brute force
Modern Cryptography – Data Encryption : Computers • Secure Socket Layer, or SSL • Claude E. Shannon is considered by many to be the father of mathematical cryptography • “Unbreakability” of a cipher • Hashing is a common technique used in cryptography to encode information quickly using typical algorithms
Modern Cryptography – Data Encryption • Calculation Challenge • Bottle-necks: • Subjective to Decipher algorithms • Mainly occurs onadministrative tasks,no so much at calclations • Uniqueness: • Subjective to Encryptiontype used
Modern Cryptography – Data Encryption • Calculation Challenge – Parallel scheme
Modern Cryptography – Data Encryption : Solution Techniques • MPI • Multi-process • shared or distributed memory • process has its own local variables • openMP • Multi-process • easier to program and debug • gradual parallelization • Condor • Multi-core
What If… • Brutus would have used openMP • Jeremiah’s Atbash code deciphering • Speedup ~ Process num up to 22 • Speedup max at 22 procs • Efficiency ~ Amountof CPU’s that Brutuslifts
What If… • Snir & Amir were not to use parallel schemes • Speeddown ~ exp(num’ of cores) • Deficiency – We do not recommend serial schemes
What If… • The Allied Forces were to use Condor • Adolf’s plans were to be sabotaged earlier • Speedup ~ num’ of Enimga Machine wheels • Efficiency – Irrelevant to the Allied Forces
Bibliography • http://research.cs.wisc.edu/htcondor/ • Clay Breshears - The Art of Concurrency: A Thread Monkey's Guide to Writing Parallel Applications • William Gropp - Using MPI - 2nd Edition: Portable Parallel Programming with the Message Passing Interface • http://tel-zur.net/teaching/bgu/pp/index2014A.html • http://www.dartmouth.edu/~rc/classes/intro_mpi/ • https://computing.llnl.gov/tutorials/parallel_comp/ • http://en.wikipedia.org/wiki/History_of_cryptography • http://en.wikipedia.org/wiki/Jeremiah • http://en.wikipedia.org/wiki/Hitler • http://en.wikipedia.org/wiki/Anagram