once upon a time…. not so far away this is a story of four people. these people were not aware...
TRANSCRIPT
![Page 1: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/1.jpg)
Once upon a time…. Not so far away
This is a story of four people. These people were not aware of it – but
they were all meant to be connected through one key aspect…
![Page 2: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/2.jpg)
Jeremiah
Meet Jeremiah AKA the "Weeping
prophet“ authoring the Book of
Jeremiah, Kings 1, Kings 2
Jeremiah likes walks on the beach, cursing his enemies and breaking earthenware bottles.
![Page 3: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/3.jpg)
Adolf
Meet Adolf Adolf is a painter Adolf weeps himself to
sleep at night (it has nothing to do with all the Jews he killed, though….)
Known for his attempt of trying to take over the world
![Page 4: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/4.jpg)
Adolf
Also known for his attempts of collaborations with the following:
![Page 5: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/5.jpg)
Snir & Amir
Snir & Amir are students at the ECE School at BGU.
They like TV, hangouts and spending time with their girlfriends.
They wept once a week this semester, at Sunday morning.
![Page 6: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/6.jpg)
Data Encryption
AndCode
cracking
![Page 7: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/7.jpg)
Encryption timeline
- Old age cryptography
- New age cryptography
- Cryptography until the mid 20th century
- Modern cryptography
![Page 8: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/8.jpg)
OLD AGE CRYPTOGRAPHY
The earliest use of cryptography found in hieroglyphs from the Old Kingdom of Egypt circa 1900 BC.
Jeremiah made use of substitution ciphers (such as the Atbash cipher) around 500 to 600 BC.
Amir also uses Atbash cipher for his grocery list, which makes Sivan, his girlfriend, abuse him physically once a week.
![Page 9: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/9.jpg)
NEW AGE CRYPTOGRAPHY
Anagrams were used by the pope and scientist like Galileo to hide secrets or to prove ownership on discoveries.
The Scottish queen Mary was executed after the code she used to communicate with novels who wanted to expel queen Elizabeth was cracked.
![Page 10: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/10.jpg)
NEW AGE CRYPTOGRAPHY
These days were also the time when decoding encryption has begun.
In the 9th century an Iraqi man named Al Kandy developed a decoding method based on the analysis of frequencies in order to locate the common letters in an encrypted text and in that way to guess the rest of the words.
In the 21st century an Iraqi man named Shlomo Hava went on Sabbatical
![Page 11: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/11.jpg)
Cryptography until the mid 20th century
Charles Babbage's work on mathematical cryptanalysis of polyalphabetic ciphers
The only unbreakable cipher, the One Time Pad
Adolf made heavy use, in several variants, of an electromechanical rotor machine known as Enigma
![Page 12: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/12.jpg)
Modern Cryptography – Data Encryption : Computers
Wifi is widely used with encryption algorithms Snir & Amir made a vast use of the above during this
semester. The longer the key is, the more difficult it is to crack
the code Introduction of the public-key Data Encryption Standard (DES), a symmetric-key
cipher Advanced Encryption Standard (AES) Brute Force Brutus, one of Jeremiah’s enemies,
tried cracking Atbash using brute force
![Page 13: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/13.jpg)
Modern Cryptography – Data Encryption : Computers
Secure Socket Layer, or SSL Claude E. Shannon is considered by many to
be the father of mathematical cryptography “Unbreakability” of a cipher Hashing is a common
technique used incryptography to encodeinformation quickly usingtypical algorithms
![Page 14: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/14.jpg)
Modern Cryptography – Data Encryption
Calculation Challenge Bottle-necks:
Subjective to Decipher algorithms Mainly occurs on
administrative tasks,no so much at calclations
Uniqueness: Subjective to Encryption
type used1 2 3 4 5 6 7 8 9 10
0
200
400
600
800
1000
1200
Unbreakabilty
Seria
l Dec
iphe
ring
time
![Page 15: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/15.jpg)
Modern Cryptography – Data Encryption
Calculation Challenge – Parallel scheme
1 2 3 4 5 6 7 8 9 100
100
200
300
400
500
600
Unbreakability
Par
alle
l Dec
iphe
ring
time
with
var
iant
num
ber
of p
roce
sses
![Page 16: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/16.jpg)
Modern Cryptography – Data Encryption : Solution Techniques
MPI Multi-process shared or distributed memory process has its own local variables
openMP Multi-process easier to program and debug gradual parallelization
Condor Multi-core
![Page 17: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/17.jpg)
What If…
Brutus would have used openMP Jeremiah’s Atbash code
deciphering Speedup ~ Process num up to 22 Speedup max at 22
procs Efficiency ~ Amount
of CPU’s that Brutuslifts
1 2 3 4 5 6 7 8 9 100
0.5
1
1.5
2
2.5x 10
4
Unbreakability
Brutus uses Brute-ForceBrutus uses MPI
![Page 18: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/18.jpg)
What If…
Snir & Amir were not to use parallel schemes
Speeddown ~ exp(num’ of cores) Deficiency – We do not recommend
serial schemes
1 2 3 4 5 6 7 8 9 10-2.5
-2
-1.5
-1
-0.5
0
0.5x 10
4
Unbreakability
DeficiencySerial
![Page 19: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/19.jpg)
What If…
The Allied Forces were to use Condor Adolf’s plans were to be sabotaged
earlier Speedup ~ num’ of Enimga Machine
wheels Efficiency – Irrelevant to the Allied Forces
1 2 3 4 5 6 7 8 9 100
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5x 10
8
Unbreakability
Allied use of regular methodsAllied use of Condor
![Page 20: Once upon a time…. Not so far away This is a story of four people. These people were not aware of it – but they were all meant to be connected through](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649ce45503460f949b0504/html5/thumbnails/20.jpg)
Bibliography
http://research.cs.wisc.edu/htcondor/ Clay Breshears - The Art of Concurrency: A Thread
Monkey's Guide to Writing Parallel Applications William Gropp - Using MPI - 2nd Edition: Portable Parallel
Programming with the Message Passing Interface http://tel-zur.net/teaching/bgu/pp/index2014A.html http://www.dartmouth.edu/~rc/classes/intro_mpi/ https://computing.llnl.gov/tutorials/parallel_comp/ http://en.wikipedia.org/wiki/History_of_cryptography http://en.wikipedia.org/wiki/Jeremiah http://en.wikipedia.org/wiki/Hitler http://en.wikipedia.org/wiki/Anagram