1 / 20

Once upon a time…. Not so far away

Once upon a time…. Not so far away. This is a story of four people. These people were not aware of it – but they were all meant to be connected through one key aspect…. Jeremiah. Meet Jeremiah AKA the "Weeping prophet“ authoring the Book of Jeremiah,  Kings 1, Kings 2

india
Download Presentation

Once upon a time…. Not so far away

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Once upon a time…. Not so far away • This is a story of four people. • These people were not aware of it – but they were all meant to be connected through one key aspect…

  2. Jeremiah • Meet Jeremiah • AKA the "Weeping prophet“ • authoring the Book of Jeremiah, Kings 1, Kings 2 • Jeremiah likes walks on the beach, cursing his enemies and breaking earthenware bottles.

  3. Adolf • Meet Adolf • Adolf is a painter • Adolf weeps himself to sleep at night (it has nothing to do with all the Jews he killed, though….) • Known for his attempt of trying to take over the world

  4. Adolf • Also known for his attempts of collaborations with the following:

  5. Snir & Amir • Snir & Amir are students at the ECE School at BGU. • They like TV, hangouts and spending time with their girlfriends. • They wept once a week this semester, at Sunday morning.

  6. Data Encryption And Code cracking

  7. Encryption timeline - Old age cryptography - New age cryptography - Cryptography until the mid 20th century - Modern cryptography

  8. OLD AGE CRYPTOGRAPHY • The earliest use of cryptography found in hieroglyphsfrom the Old Kingdom of Egypt circa 1900 BC. • Jeremiah made use ofsubstitution ciphers (such as the Atbash cipher) around 500 to 600 BC. • Amir also uses Atbash cipher for his grocery list, which makes Sivan, his girlfriend, abuse him physically once a week.

  9. NEW AGE CRYPTOGRAPHY • Anagrams were used by the pope and scientist like Galileo to hide secrets or to prove ownership on discoveries. • The Scottish queen Mary was executed after the code she used to communicate with novels who wanted toexpel queen Elizabeth was cracked.

  10. NEW AGE CRYPTOGRAPHY • These days were also the time when decoding encryptionhas begun. • In the 9th century an Iraqi man named Al Kandy developed a decoding method based on the analysis of frequencies in order to locate the common letters in an encrypted text and in that way to guess the rest of the words. • In the 21st century an Iraqi man named ShlomoHava went on Sabbatical

  11. Cryptography until the mid 20th century • Charles Babbage'swork on mathematical cryptanalysis of polyalphabeticciphers • The only unbreakable cipher, the One Time Pad • Adolf made heavy use, in several variants, of an electromechanical rotor machine known as Enigma

  12. Modern Cryptography – Data Encryption : Computers • Wifiis widely used with encryption algorithms • Snir & Amir made a vast use of the above during this semester. • The longer the key is, the more difficult it is to crack the code • Introduction of the public-key • Data Encryption Standard (DES), a symmetric-key cipher • Advanced Encryption Standard (AES) • Brute Force • Brutus, one of Jeremiah’s enemies, tried cracking Atbash using brute force

  13. Modern Cryptography – Data Encryption : Computers • Secure Socket Layer, or SSL • Claude E. Shannon is considered by many to be the father of mathematical cryptography • “Unbreakability” of a cipher • Hashing is a common technique used in cryptography to encode information quickly using typical algorithms

  14. Modern Cryptography – Data Encryption • Calculation Challenge • Bottle-necks: • Subjective to Decipher algorithms • Mainly occurs onadministrative tasks,no so much at calclations • Uniqueness: • Subjective to Encryptiontype used

  15. Modern Cryptography – Data Encryption • Calculation Challenge – Parallel scheme

  16. Modern Cryptography – Data Encryption : Solution Techniques • MPI • Multi-process • shared or distributed memory • process has its own local variables • openMP • Multi-process • easier to program and debug • gradual parallelization • Condor • Multi-core

  17. What If… • Brutus would have used openMP • Jeremiah’s Atbash code deciphering • Speedup ~ Process num up to 22 • Speedup max at 22 procs • Efficiency ~ Amountof CPU’s that Brutuslifts

  18. What If… • Snir & Amir were not to use parallel schemes • Speeddown ~ exp(num’ of cores) • Deficiency – We do not recommend serial schemes

  19. What If… • The Allied Forces were to use Condor • Adolf’s plans were to be sabotaged earlier • Speedup ~ num’ of Enimga Machine wheels • Efficiency – Irrelevant to the Allied Forces

  20. Bibliography • http://research.cs.wisc.edu/htcondor/ • Clay Breshears - The Art of Concurrency: A Thread Monkey's Guide to Writing Parallel Applications • William Gropp - Using MPI - 2nd Edition: Portable Parallel Programming with the Message Passing Interface • http://tel-zur.net/teaching/bgu/pp/index2014A.html • http://www.dartmouth.edu/~rc/classes/intro_mpi/ • https://computing.llnl.gov/tutorials/parallel_comp/ • http://en.wikipedia.org/wiki/History_of_cryptography • http://en.wikipedia.org/wiki/Jeremiah • http://en.wikipedia.org/wiki/Hitler • http://en.wikipedia.org/wiki/Anagram

More Related