1St Issue 1990
Total Page:16
File Type:pdf, Size:1020Kb
SECREt- GJUlUVLDUJUll1 ~15I]l!l[EVU~ Ul(B15UJI]~ (r~(1iV ~l5m(1il]l5 ~ __ 00 l5(iJ lDl5 f OO£D(1i\?I1GJWlD 1st Issue 1990 BRAVE NEW WORLD .•....... Gerald R. You~g; . 1 CRYSCOM '89 RECOMMENDATIONS ... If·· . 3 THE COLUMBUS DAY VIRUS. •.... C3l3. 5 THE CRYPTOLOGIC LINGUIST PROGRAM. If.!L . 9 TO NEW AUTHORS. ...•.... •.••. .10 A NOTE ON THE LINGUIST PROBLEM. :.~ f. /1' .11 THE ROLE OF OPSEC ••.•• ! I .13 DEPUTY DAWG •.•..... .15 KRYPTOS ESSAY COMPETITION • •......• .• .. 17 DAVID HARRIS: IN MEMORIAM. .....•••..18 BULLETIN BOARD. .....• . .......•..20 THE MYSTERIES OF GAMMA. .• • Richard Sylvester .21 SORTING, ORDERING, AND HEAPING ON CRAY. .1 I. .22 TECHNICAL LITERATURE REPORT. ..• .. David Harris !. .24 BOOK REVIEWS: THE CUCKOO'S EGG. .• .. .I I. .25 ....•.• REFLECTIONS ON INTELLIGENCE . Vera Filby.. .29 SOFTWARE REVIEW: MATHEMATICA. ..• . Robert Ward . .31 LETTERS. ............. ...... .. .32 HANDLE VIA GOMIN' CHANNELS ONLY CLASSIFIED BY NSAlCSSM 123 2 -sEGRH- DECLASSIFY ON: Ofi~iFlatiR~ Age~(:l"§ Deterl'T'li~8tio~ Required NOT RELEASABLE TO CONTRACTORS Declassified and Approved for Release by NSA on 10-17-2012 pursuant to E.O. 13526. MDR Case # 54779 DocrD: 4019716 ,\f'P.L. 86-36 Published by Pl, Techniques and Standards A L~~::~~$.&(::AN ARCHEOLOGIST VOL XvII, No.1 : ', , .. ,1st Issue 1990 At ll"r,E!~~~t'~e~n~~/~f archeologists a foremost me;n~rot~lj\lttri¥made some pronouncements that PUBLISHER. ,,,,;,,,,,. :. '" .1 I::8sf9~ii~~:d,fri~Je'il~w prof,essionals: BOARD OF EDITORS{' H:~'::.w~~ld 06* appoint anyone to head a dig who ..... ,' I..-----~1963.'.·-1.1. 03.).••• ,<~.::, 60ul.ci::rio~~rite and communicate with the public; Editor . ,An8rch~ologist who fails to publish (and in good .... / .... / ··/ti~e.).:::-"is a destructive treasure hunter, not a Computer Systems I (963:J103» ~cil" CryptanaIystS· ................1'963'~., '.:52''"... /..' ..'/ sch.,o,·.lar; Cryptolinguistics J 9li3:43S5)/1'Ile one-man-one site philosophy is obsolete. Index 1 96H&14) ..' Information Science r 9637 3;456) .. Language ........... 963-3(57) .Then he announced that he was stepping down as the Mathematics I 963-5566) head of his dig to devote himself to writing up earlier Puzzles. ...... .r 963-643()~/ excavations. Science and Technology .. I 963-4958) Special Research ,,. Vera R. Filby (968-S043) Now this is bound to have a stunning impact on the Traffic Analysis , Robert J. Hanyok (963~4j51) conduct of all archeology, for this man directed the excavation of one of the most glamorous finds of Illustrators , I __---k963-62341 .........: .I 1963:6423) recent times. As well as being one of the most respected archeologists ever and the author of seven books and over 100 articles -- all eminently readable - he has appeared on ·television and is al~ost a To submit ,articles or letters by mail, send to: Editor, CRYPTOLOG. Pl, NORTH 2N018 household name. He could have stayed on, as most others have done, to bask in glory as monarch of a If you used a word processor, please include the mag' prestigious site. card, floppy or diskette along with your hard copy, with a notation as to what equipment, operating system, Instead, he is using his standing to set an 'example for and software you used. others, to write up what he had done as a junior when via PLATFORM mail. send to: he was not in control of his endeavors. cryptlg@bar1cOS (bar-one-c-zero"five) He emphasized that the head of a dig must be able to (note: no '0') communicate, 'both orally and in writing, with the via ALLIANCE, send to: pUblic as well as fellow archeologists, for it is the PLBROWN [note: all caps) public who supports archeology. And it does not do to attn: CRYPTOLOG hoard your findings to write up upon retirement -- you Always include your full name, organization,and secure might die before then (this has happened) -- and In any phone; also building and room numbers. case, the Information you are withholding until perfection is reached may be just what's needed elsewhere, and right now. And you certainly shouldn't For Change of Address spend 40 years refining references and footnotes. mail name and old and new organizations to: Editor, CRYPTOLOG, p!. NORTH 2N018 As for one-man,.one-site-- teamwork is what is needed Please do not phone. by a number of specialists-botanists, anthropologists, epigraphists, geologists, pathologists, and so on. No one person knows it all; Contents of CRYPTOLOG may not be reproduced or disseminated outside the National Security Agency without A good example for us all.' the permission of the Publisher. Inquiries regarding repro- duction a'nd dissemination'should be directed to the Editor. All opinions expressed in CRYPTOLOG are those of the authors. They do not represent the official views of the National Security Agency/Central Security Service. POR OFPIGfAh "fFSB OHb¥ DOCID: 4019716 CO~fI9E~1'ffAL This article is classified Se.JFIQi.I:rUU.. In its entirety l3f1f1lJE IlEW W[)f'lllJ Historically, the need for computers to do ,----------------,I This article is based on the keynote I I address delivered at the CRYSCO '89 I cryptanalysis has been well recognized, and as a Conference, 19 June 1989 consequence, the cryptanalytic community has L ~ continually encouraged the computer industry to produce ever faster machines with more computa CRYSCO-89 is the sixth annual Cryptanalytic tional power. We have also asked for increasingly Software Conference, Its theme is "Brave New "user-friendly" systems with ease ofaccess and World," This represents one ofour more data transfer. In fact, for some previous genera important efforts to exploit the potential of a new tions ofcomputing machines, NSA needs have been computer environment for cryptanalytic work, the primary driving force for development. Very early on, we used punched cards and paper tape But before I speak about computing, let me first for both program code and data media. This was say a few words about the importance of followed by the use ofdumb terminals for pro cryptanalysis to this Agency, gramming and magnetic tape for data, and now Since becoming Deputy Director, I have spent a we have progressed to smart terminals and elec considerable amount of time working with the tronic links for moving data from machine to cryptanalytic community as Chairman ofthe machine. Each change brought an improvement Cryptanalysis Council. I echo and applaud Vice in some aspect 'of our computer resources - some Admiral Studeman's characterizations of the times in the form ofbetter response time, some disciplines ofcryptanalysis and cryptomathe times in the form ofa more flexible input"output matics, along with their primary support scenario. discipline ofcomputer science, as the bedrock of I th t 'th te hn lIt' 1 ' 1 n e pas , WI c 0 ogy re a Ive y SImp e this Agency's mission. I further believe that the d to t d ' t d d dId compare 0 ay s s an ar s, we eve ope way we in the CA community meet the challenge of 1 I. our own operat'mg system, spec'fica11y working in this "Brave New World" is critical to L-----th.... .... alyt... · h 11 1 .....1 ' ,. to meet e crypwin . IC C a enge. L.-__~"";" thIS mISSIOn, has proVl'dedou ts tand'Ing....ed't' .lIng and 1st Issue 1990· CRYPTOLOG· page 1 CONFtBEf('f'fAL P.L. 86-36 P.L. 86-36 DOCID: 4019716 EO 1.4. (c) C8P1FHUiNU/..b computational capabilities since its inception in sources are currently diverted temporarily from 970. traditional cryptanalysis to learning the C programming language and the UNIX operating L IThe differ- system and to converting applications programs. ences caused great difficulties in software exchange I realize that this is a cumbersome process. But and maintenance, and for years we had an environ- I encourage you to look to the advantages that ment in which this exchange was very complicated the new environment offers, and to devise ways and sometimes impossible to implement. So with to exploit its potential. the arrival ofCray machines, a conscious decision You are already beginning to do some CA work was made to keep the NSA an~ I systems compatible. The formal accord stated that on the High Performance Workstations, and the two Agencies should jointly develop the operat special boards are being deployed to do even ing system and utility software. more complex tasks on the SUNs. As you gain UNIX experience, ifyou see inefficiencies or deficiencies, point them out to your manage I believe that the success "---':"'"':"''''''---T'''::-":''''''' of the ffort is a prime example of skilled ment and work with the T organization to people working together~operatively toward a correct them. Together, we should be able to common goal. P.L.86-36 meet this challenge and refine the system to do an even hetter job than we have in the past The introduction of stand-alone personal computers removed the need to access mainframes for word With.the variety ofcomputer resources available processing tasks, but cryptanalytic work on the PCs to you, I challenge you to find appropriate uses ea~h was less successful owing to an inability to load data for ofthe capabilities, to identify the right easily and to access data bases. However, PCs did machines for a particular task, and to maximize point the way forward, demonstrating facilities such the use ofthis vital, versatHc wealth of com as graphics displays, color displays, and local quality puter po",er. To that end, I fully support the printing. goals ofthe Cryptanalytic Software Conference, together with the year-round work ofits spon Now let me move to on the present challenge. soring org~ization, the Cryptanalytic Software Committee. We can no longer afford the manpower resources to modify and maintain our own operating system for I also see that the conference agenda includes a each individual computer type.