Secure Volunteer Computing for Distributed Cryptanalysis

Total Page:16

File Type:pdf, Size:1020Kb

Secure Volunteer Computing for Distributed Cryptanalysis ysis SecureVolunteer Computing for Distributed Cryptanal Nils Kopal Secure Volunteer Computing for Distributed Cryptanalysis ISBN 978-3-7376-0426-0 kassel university 9 783737 604260 Nils Kopal press kassel university press ! "# $ %& & &'& #( )&&*+ , #()&- ( ./0 12.3 - 4 # 5 (!!&& & 6&( 7"#&7&12./ 5 -839,:,3:3/,2;1/,2% ' 5 -839,:,3:3/,2;13,3% ,' 05( (!!<& &!.2&.81..!")839:3:3/2;133 "=( (!!, #& !(( (2221,;2;13/ '12.97 # ?@7 & &, & ) ? “With magic, you can turn a frog into a prince. With science, you can turn a frog into a Ph.D. and you still have the frog you started with.” Terry Pratchett Abstract Volunteer computing offers researchers and developers the possibility to distribute their huge computational jobs to the computers of volunteers. So, most of the overall cost for computational power and maintenance is spread across the volunteers. This makes it possible to gain computing resources that otherwise only expensive grids, clusters, or supercomputers offer. Most volunteer computing solutions are based on a client-server model. The server manages the distribution of subjobs to the computers of volunteers, the clients, which in turn compute the subjobs and return the results to the server. The Berkeley Open Infrastructure for Network Computing (BOINC) is the most used middleware for volunteer computing. A drawback of any client-server architecture is the server being the single point of control and failure. To get rid of the single point of failure, we developed different distribution algorithms (epoch distribution algorithm, sliding-window distribution algorithm, and extended epoch distribution algorithm) based on unstructured peer-to-peer networks. These algorithms enable the researchers and developers to create volunteer computing networks without any central server. The thesis is structured into two different parts. The first is the distribution part and discusses the aforementioned new distribution algorithms and their usage for distributed cryptanalysis. The second part is the cheating part which extends our system with solutions for cheat detection in unstructured peer-to-peer networks. In this thesis, we focus on volunteer computing for distributed cryptanalysis. Since the compu- tational effort to break many classical as well as most modern ciphers is very huge, hundreds to thousands of computers are often needed for executing successful attacks. We show in this thesis that our solutions are well-suited for attacking classical as well as modern ciphers. Some of our algorithms have been implemented for distributed cryptanalysis, e.g. brute-force and heuristics, to solve real-world ciphers. Additionally, we evaluated all of our distribution solutions with self- written simulators and with real-world tests over the Internet in CrypTool 2. By combining 50 off-the-shelf computers, we achieved a search speed of about 615 millions AES keys per second. A single of these computers, an Intel i5-3570 with 3.4 GHz and 4 CPU cores, is able to search at a rate between 12 and 13 millions AES keys per second. The distribution is self-organized by our algorithms. Additionally, we achieved a speedup for the cryptanalysis of the classical M-94 cipher of about 6.82, with respect to using only a single computer, enabling us to break original M-94 messages within 2 hours and 56 minutes with 6 standard computers. Cheating is a well-known threat in any volunteer computing project. Cheaters aim at computing less work as demanded by the creator of the project but they try to gain the same reward, i.e. credit points, as non-cheaters deserve. Cheated results are mostly incomplete or wrong, disturb- ing or even destroying the final result of the volunteer computing project. This can make weeks, months, and years of computational work useless. To fight cheaters, detection and prevention v mechanisms are needed. A BOINC server assigns the same subjob to different clients and uses majority voting to determine the correctness of results. Since we base our volunteer computing and our distribution algorithms on unstructured peer- to-peer networks, where all peers are equal in role, majority voting is not possible. No central server is available to assign same subjobs to different peers. Thus, we developed new cheat detection mechanisms for decentralized peer-to-peer networks. We spread the detection of a cheated result over all peers of the network. Each peer has a small probability of detecting a cheated result but the network in sum reaches a high detection rate. In this thesis, we differentiate between two cheat detection approaches: static detection, with each peer performing the same amount of detection effort, and adaptive detection, with each peer dynamically adapting his additional cheat-detection effort to the growing and shrinking size of the peer-to-peer network. Both approaches work but the static does not scale while the adaptive scales well. We show that we can achieve detection rates above 99.8% with both, the static cheat detection approach as well as the adaptive cheat detection approach. With the adaptive cheat detection approach the needed detection effort is constant throughout the network when increasing the amount of connected nodes. Acknowledgments I would like to thank my supervisor, Prof. Dr. Arno Wacker, for giving me the opportunity to work on my thesis, for his ongoing help, and for his support over the last eight years from when I first met him during my studies in Duisburg, introducing me to IT security and cryptology, till me being his employee and PhD student in Kassel today. I would also like to thank Prof. Bernhard Esslinger, for initiating the CrypTool project and the MysteryTwister C3 project and for his valuable advice and support over the last years. Working on CrypTool 2 and MysteryTwister C3 was very inspiring since it brought me closer to the fascinating topic of both, modern and classical cryptology. I am very grateful to my colleagues Olga Kieselmann and Henner Heck from our research group “Applied Information Security” for their ongoing support, help, and the work spent together on several papers and projects. I would also like to thank my other co-authors: George Lasry, for his incredible work on the cryptanalysis of classical ciphers where I had the honor to work together with him on six brilliant publications. Dr. Angelo Liguori, for the three wonderful years he spent as guest researcher at our research group and bringing his fascinating topics multi-level security and side channels with him, allowing us to work together on two exciting publications. Dr. Matthaus¨ Wander for his great support and work on our publication about the adaptive cheat detection. Then, I am very proud of all of my students that I had the opportunity to supervise their bach- elor’s and master’s projects and theses over the last five years at the University of Kassel. Es- pecially, I would like to thank the students that directly worked for me on topics supporting the work presented in this thesis: Christopher Konze, for the work on VoluntLib in his bachelor’s thesis and the work on CrypCloud in his master’s project. Dimitrij Borisov for the work on our peer-to-peer simulator SimPeerfect in his master’s project and thesis. Bastian Heuser and Nils Rehwald for the work on VoluntCloud in their master’s project. And finally, Roman Dinkel for his work on extending VoluntLib with cheat detection mechanisms in his bachelor’s thesis. Last but not least, I would like to thank my parents Sunhild and Werner Kopal for supporting me in my education, studies, and my idea in going to Kassel for doing a PhD as well as my loving partner Janina Koprionik supporting me in everything I do. vii Contents Abstract v Acknowledgments vii Contents ix List of Figures xiii List of Tables xvii List of Listings xix I Foundations 1 1 Introduction 3 1.1 Challenges ..................................... 5 1.2 Contributions ................................... 6 1.3 Structure of Thesis ................................ 6 2 Cryptology 9 2.1 Cryptography ................................... 11 2.2 Cryptanalysis ................................... 24 2.3 CrypTool 2 .................................... 30 3 Distributed Computing 33 3.1 Overview ..................................... 33 3.2 Peer-to-Peer Computing ............................. 34 3.3 Volunteer Computing ............................... 37 3.4 Cloud Computing ................................. 39 3.5 Security and Cheating ............................... 39 3.6 Distributable Problems – A Datasize-Driven Taxonomy ............. 40 II Distribution 43 4 System Model 45 4.1 General Network Structure ............................ 45 4.2 Jobs, Subjobs, and Slices ............................. 47 ix Contents x 4.3 User Model .................................... 48 5 Design Rationale 49 5.1 Decision Graph .................................. 49 5.2 From Cryptanalysis to Unstructured Peer-to-Peer Overlays ........... 49 5.3 From Unstructured Overlays to New Distribution Algorithms .......... 52 5.4 Implementation .................................. 54 5.5 Evaluation ..................................... 55 6 Implementation 57 6.1 General System Architecture ........................... 57 6.2 Our new Distribution Algorithms ......................... 59 6.3 Management Protocol ............................... 67 6.4 Decentralized Reservation
Recommended publications
  • Efficient Implementation of an Optimized Attack on a Reconfigurable Hardware Cluster
    Breaking ecc2-113: Efficient Implementation of an Optimized Attack on a Reconfigurable Hardware Cluster Susanne Engels Master’s Thesis. February 22, 2014. Chair for Embedded Security – Prof. Dr.-Ing. Christof Paar Advisor: Ralf Zimmermann EMSEC Abstract Elliptic curves have become widespread in cryptographic applications since they offer the same cryptographic functionality as public-key cryptosystems designed over integer rings while needing a much shorter bitlength. The resulting speedup in computation as well as the smaller storage needed for the keys, are reasons to favor elliptic curves. Nowadays, elliptic curves are employed in scenarios which affect the majority of people, such as protecting sensitive data on passports or securing the network communication used, for example, in online banking applications. This works analyzes the security of elliptic curves by practically attacking the very basis of its mathematical security — the Elliptic Curve Discrete Logarithm Problem (ECDLP) — of a binary field curve with a bitlength of 113. As our implementation platform, we choose the RIVYERA hardware consisting of multiple Field Programmable Gate Arrays (FPGAs) which will be united in order to perform the strongest attack known in literature to defeat generic curves: the parallel Pollard’s rho algorithm. Each FPGA will individually perform a what is called additive random walk until two of the walks collide, enabling us to recover the solution of the ECDLP in practice. We detail on our optimized VHDL implementation of dedicated parallel Pollard’s rho processing units with which we equip the individual FPGAs of our hardware cluster. The basic design criterion is to build a compact implementation where the amount of idling units — which deplete resources of the FPGA but contribute in only a fraction of the computations — is reduced to a minimum.
    [Show full text]
  • To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (1939­1945).
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • Presidents and American Symbols
    KINDERGARTEN Core Knowledge Language Arts® • New York Edition • Listening & Learning™ Strand Presidents and American Symbols American and Presidents Tell It Again!™ Read-Aloud Anthology Read-Aloud Again!™ It Tell Presidents and American Symbols Tell It Again!™ Read-Aloud Anthology Listening & Learning™ Strand KINDERGARTEN Core Knowledge Language Arts® New York Edition Creative Commons Licensing This work is licensed under a Creative Commons Attribution- NonCommercial-ShareAlike 3.0 Unported License. You are free: to Share — to copy, distribute and transmit the work to Remix — to adapt the work Under the following conditions: Attribution — You must attribute the work in the following manner: This work is based on an original work of the Core Knowledge® Foundation made available through licensing under a Creative Commons Attribution- NonCommercial-ShareAlike 3.0 Unported License. This does not in any way imply that the Core Knowledge Foundation endorses this work. Noncommercial — You may not use this work for commercial purposes. Share Alike — If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. With the understanding that: For any reuse or distribution, you must make clear to others the license terms of this work. The best way to do this is with a link to this web page: http://creativecommons.org/licenses/by-nc-sa/3.0/ Copyright © 2013 Core Knowledge Foundation www.coreknowledge.org All Rights Reserved. Core Knowledge Language Arts is a trademark of the Core Knowledge Foundation. Trademarks and trade names are shown in this book strictly for illustrative and educational purposes and are the property of their respective owners.
    [Show full text]
  • BRINGING RESEARCH INTO the CLASSROOM T H E C I T I Z E N S C I E N C E a P P R O a C H I N S C H O O L S a SCIENTIX OBSERVATORY REPORT - APRIL 2019
    BRINGING RESEARCH INTO THE CLASSROOM THE CITIZEN SCIENCE APPROACH IN SCHOOLS A SCIENTIX OBSERVATORY REPORT - APRIL 2019 B R T E C Scientix, the community for science education in Europe, facilitates regular dissemination and sharing of know-how and best practices in science education across the European Union (http://scientix.eu). In order to help the development and dissemination of different science education projects Scientix has set up the Scientix observatory which provides overviews on the state of play of different topics related to science education (http://www.scientix.eu/observatory). Publisher: European Schoolnet Please cite this publication as: Nistor, A. et al. (2019). Bringing Research into the Classroom – The Citizen Science approach in schools. Scientix Observatory report. April 2019, European Schoolnet, Brussels Keywords: Science, Technology, Engineering and Mathematics (STEM); Citizen Science; Participatory Science; School Education Authors: Nistor, A., Clemente-Gallardo, J., Angelopoulos, T., Chodzinska, K., Clemente-Gallardo, M., Gozdzik, A. , Gras-Velazquez, A., Grizelj, A., Kolenberg, K., Mitropoulou, D., Micallef Gatt, A. D., Tasiopoulou, E., Brunello, A., Echard, P., Arvaniti, V., Carroll, S., Cindea, N., Diamantopoulos, N., Duquenne, N. , Edrisy, S., Ferguson, E., Galani, L., Glezou, K., Kameas, A., Kirmaci, H., Koliakou, I., Konomi, E., Kontopidi, E., Kulic, S., Lefkos, I., Nikoletakis, G., Siotou, E., Šimac, A., Sormani, F., Tramonti, M., Tsapara, M., Tsourlidaki, E., Vojinovic, M. Design/DTP: Vanessa James Picture credit: Shutterstock, Pixabay Print run: 500 ISBN: 9789492913852 Published in April 2019. The views expressed in this publication are those of the authors and not necessarily those of EUN Partnership AISBL or the European Commission. The work presented in this document is supported by the European Commission’s Erasmus+ programme – project BRITEC, coordinated by the Institute of Geophysics, PAS and by the European Union’s H2020 research and innovation programme – project Scientix 3 (Grant agreement N.
    [Show full text]
  • Commandant of the Marine Corps Approved a Change in the Words of the Fourth Line, First Verse, to Read, “In Air, on Land, and Sea.” Former Gunnery Sergeant H
    144278_LE_I_Student_Textbook_Cover .indd Letter V 8/6/19 5:32 AM LE-I TABLE OF CONTENTS Leadership Leadership Defined ....................................................................................................................................... 1 The Leader Within ........................................................................................................................................ 7 Leadership Primary and Secondary Objectives .......................................................................................... 11 Ethics, Morals, Values ................................................................................................................................ 15 Marine Corps’ Core Values ........................................................................................................................ 21 Using Introspection to Develop Leadership Traits ..................................................................................... 27 Military Leadership Traits .......................................................................................................................... 31 The 11 Leadership Principals ...................................................................................................................... 41 Citizenship Defining Patriotism ..................................................................................................................................... 47 Rights, Responsibilities, and Privileges .....................................................................................................
    [Show full text]
  • Cryptography in a Quantum World
    Cryptography in a Quantum World ⋆ Gilles Brassard 1,2 1 D´epartement d’informatique et de recherche op´erationnelle Universit´ede Montr´eal, C.P. 6128, Succursale Centre-ville Montr´eal (QC), H3C 3J7 Canada 2 Canadian Institute for Advanced Research [email protected] http://www.iro.umontreal.ca/~brassard/en/ Abstract. Although practised as an art and science for ages, cryptog- raphy had to wait until the mid-twentieth century before Claude Shannon gave it a strong mathematical foundation. However, Shannon’s approach was rooted is his own information theory, itself inspired by the classical physics of Newton and Einstein. But our world is ruled by the laws of quantum mechanics. When quantum-mechanical phenomena are taken into account, new vistas open up both for codemakers and codebreakers. Is quantum mechanics a blessing or a curse for the protection of privacy? As we shall see, the jury is still out! Keywords: Cryptography, Quantum mechanics, Quantum computa- tion, Post-quantum cryptography, Quantum communication, Quantum key distribution, Edgar Allan Poe 1 Introduction For thousands of years, cryptography has been an ongoing battle between code- makers and codebreakers [1,2], who are more formally called cryptographers and cryptanalysts. Naturally, good and evil are subjective terms to designate code- makers and codebreakers. As a passionate advocate for the right to privacy, my allegiance is clearly on the side of codemakers. I admit that I laughed hyster- ically when I saw the Zona Vigilada warning that awaits visitors of the Pla¸ca de George Orwell near City Hall in Barcelona [3]. Nevertheless, I recognize that codebreakers at Bletchley Park during the Second World War were definitely on the side of good.
    [Show full text]
  • War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946
    Programmed Inequality How Britain Discarded Women Technologists and Lost Its Edge in Computing Marie Hicks HD 6135 H53 2017 The Library Mt. St. Vincent Univ. Halifax, N.S. B3M 2J6 The MIT Press Cambridge, Massachusetts London, England 1 War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946 In recent years, the restoration of Bletchley Park has attracted worldwide attention. The country estate in Milton Keynes, United Kingdom, was the site of the most important codebreaking operations of World War II and home to the first digital, electronic, programmable computer: the Colossus. The British-designed and manufactured Colossus computers, of which there were ten in all by war's end, were critical to the conduct of Allied wartime operations. Unlike their better-known U.S. counter­ part, the ENIAC, the Colossus computers were actually deployed during the war, actively changing its outcome. Kept secret for decades, the full import of the developments at Bletchley has only recently become widely known.1 Yet while popular culture has begun to recognize the importance of Bletchley's wartime operations, misunderstandings persist about the nature of the information work performed there. The 2014 blockbuster The Imitation Game, for instance, cleaves the Colossus computers from the narrative entirely in favor of building a "great man" narrative for a single codebreaker.2 Hidden within the story of Bletchley is a less popular narrative that cannot leverage the appeal of a lone genius and his accomplishments. Thousands of women worked at Bletchley during the war-most in tech­ nical roles.3 Although it is generally accepted that the striking and wide­ ranging roles of the mostly women workers within Bletchley Park give lie to stereotypes about computing as a traditionally masculine field, the contributions of these women have not been analyzed as constitutive of larger trends in the history of computing.
    [Show full text]
  • Volunteer Computing Different Grids for Different Needs
    From the Web to the Grid How did the Grid start? • Name “Grid” chosen by analogy with electric power grid (Foster and Kesselman 1997) • Vision: plug-in computer for processing power just like plugging in toaster for electricity. • Concept has been around for decades (distributed computing, metacomputing) • Key difference with the Grid is to realise the vision on a global scale. From the Web to the Grid – 2007 HST 2011: Grids and Volunteer Computing Different Grids for different needs There is as yet no unified Grid, like there is a single web. Rather there are many Grids for many applications: • Enterprise Grids link together PCs within one company. • Volunteer computing links together public computers. • Scientific Grids link together major computing centres. • Latest trend federates national Grids into global Grid infrastructure. • High Energy Physics is a driving force for this. HST 2011: Grids and Volunteer Computing The LHC data challenge 1 Megabyte (1MB) • 40 million bunch collisions per second A digital photo 1 Gigabyte (1GB) = 1000MB • After filtering, ~100 collisions of 5GB = A DVD movie interest per second per detector 1 Terabyte (1TB) = 1000GB World annual book production • > 1 Megabyte of data per collision 1 Petabyte (1PB) recording rate > 1 Gigabyte/sec = 1000TB Annual production of one LHC experiment 10 • 10 collisions recorded each year 1 Exabyte (1EB) stored data ~15 Petabytes/year = 1000 PB 3EB = World annual information production …for more than 10 years HST 2011: Grids and Volunteer Computing Data Storage for the LHC Balloon (30 Km) • LHC data correspond to about 20 million CDs each year! CD stack with 1 year LHC data! (~ 20 Km) Concorde Where will the (15 Km) experiments store all of these data? Mt.
    [Show full text]
  • High Performance Computing Zur Technischen Finanzmarktanalyse
    High Performance Computing zur technischen Finanzmarktanalyse Christoph Starke Dissertation zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften (Dr.-Ing.) der Technischen Fakultät der Christian-Albrechts-Universität zu Kiel eingereicht im Jahr 2012 1. Gutachter: Prof. Dr. Manfred Schimmler Christian-Albrechts-Universität zu Kiel 2. Gutachter: Prof. Dr. Andreas Speck Christian-Albrechts-Universität zu Kiel Datum der mündlichen Prüfung: 24.9.2012 ii Zusammenfassung Auf Grundlagen der technischen Finanzmarktanalyse wird ein Algorith- mus für eine sicherheitsorientierte Wertpapierhandelsstrategie entwickelt. Maßgeblich für den Erfolg der Handelsstrategie ist dabei eine mög- lichst optimale Gewichtung mehrerer Indikatoren. Die Ermittlung dieser Gewichte erfolgt in einer sogenannten Kalibrierungsphase, die extrem rechenintensiv ist. Bei einer direkten Implementierung auf einem herkömmlichen High Performance PC würde diese Kalibrierungsphase zigtausend Jahre dauern. Deshalb wird eine parallele Version des Algorithmus entwickelt, die hervorragend für die massiv parallele, FPGA-basierte Rechnerarchitektur der RIVYERA geeignet ist, die am Lehrstuhl für technische Infor- matik der Christian-Albrechts-Universität zu Kiel entwickelt wurde. Durch mathematisch äquivalente Transformationen und Optimierungs- schritte aus verschiedenen Bereichen der Informatik gelingt eine FPGA- Implementierung mit einer im Vergleich zu dem PC mehr als 22.600-fach höheren Performance. Darauf aufbauend wird durch die zusätzliche Ent- wicklung eines
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • Analysis and Predictions of DNA Sequence Transformations on Grids
    Analysis and Predictions of DNA Sequence Transformations on Grids A Thesis Submitted for the Degree of Master of Science (Engineering) in the Faculty of Engineering By Yadnyesh R. Joshi Supercomputer Education and Research Centre INDIAN INSTITUTE OF SCIENCE BANGALORE – 560 012, INDIA August 2007 Acknowledgments First of all I would like to extend my sincere thanks to my research supervisor Dr. Sathish Vadhiyar for his constant guidance and support during the entire period of my post-graduation at IISc. He was always approachable, supportive and ready to help in any sort of problem. I am very thankful to him for being extremely patient and understanding about the silly mistakes that I had made. Under his guidance I learned to approach problems in an organized manner and set realistic goals for my research. I thank him for his extreme patience and excellent technical guidance in writing and presenting research. Finally, he was and continues to be my role model for his hard work and passion for research. I am also thankful to Dr. Nagasuma Chandra, Dr. Debnath Pal from S.E.R.C. and Dr. Narendra Dixit from Chemical Engineering department for their very useful and interesting insights into the biological domain of our research. I am also thankful to all the faculty of S.E.R.C. for always inspiring us with their motivational talks. I would like to mention the names of my colleagues Sandip, Sanjay, Rakhi, Sundari, Antoine and Roshan for making their technical and emotional support. Special thanks to vatyaa kya group members for the adventures and the routines inside and outside the institute.
    [Show full text]