88
Description of document: National Security Agency (NSA) report "General and Special-Purpose Computers: a Historical Look and Some Lessons Learned," 1986 Requested date: 15-June-2009 Released date: 29-June-2010 Posted date: 19-October-2010 Source of document: National Security Agency ATTN: FOIA Office (DJP4) 9800 Savage Road STE 6248 Ft. George G. Meade, MD 20755-6248 Fax: 443-479-3612 Online request form The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website.

General and Special-Purpose Computers: a Historical Look and

Embed Size (px)

Citation preview

Description of document: National Security Agency (NSA) report "General and

Special-Purpose Computers: a Historical Look and

Some Lessons Learned," 1986

Requested date: 15-June-2009

Released date: 29-June-2010

Posted date: 19-October-2010

Source of document: National Security Agency

ATTN: FOIA Office (DJP4)

9800 Savage Road STE 6248

Ft. George G. Meade, MD 20755-6248

Fax: 443-479-3612

Online request form

The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials

made available on the site, such as this file, are for reference only. The governmentattic.org web site and its

principals have made every effort to make this information as complete and as accurate as possible, however,

there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and

its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or

damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the

governmentattic.org web site or in this file. The public records published on the site were obtained from

government agencies using proper legal channels. Each document is identified as to the source. Any concerns

about the contents of the site should be directed to the agency originating the document in question.

GovernmentAttic.org is not responsible for the contents of documents published on the website.

NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE

FORT GEORGE G. MEADE, MARYLAND 20755-6000

Serial: MDR-59141 29 June 2010

This responds to your request of 15 June 2009 to have a 1986 report by Douglas Hogan, entitled "General and Special-Purpose Computers: a Historical Look and Some Lessons Learned," reviewed for declassification. The material has been reviewed under the Mandatory Declassification Review (MDR) requirements of Executive Order (E.O.) 12958, as amended and is enclosed. We have determined that some of the information in the material requires protection.

Some portions deleted from the document were found to be currently and properly classified in accordance with E.O. 12958, as amended. The information denied meets the criteria for classification as set forth in Section 1.4 subparagraph (c) and remains classified TOP SECRET, SECRET and CONFIDENTIAL as provided in Section 1.2 of E.O. 12958, as amended.

Section 3.5 (cl of E.O. 12958, as amended, allows for the protection afforded to information under the provisions of law. Therefore, the names of NSA/CSS employees and information that would reveal NSA/CSS functions and activities have been protected in accordance with Section 6, Public Law 86-36 (50 U.S. Code 402 note). In addition, information regarding other individuals has been deleted from the enclosure in accordance with the sixth exemption of the Freedom of Information Act. This exemption protects from disclosure information that would constitute a clearly unwarranted invasion of personal privacy. In balancing the public interest for the information you request against the privacy interests involved, we have determined that the

privacy interests sufficiently satisfy the requirements for the application of the sixth exemption.

Since your request for declassification has been partially denied you are hereby advised of this Agency's appeal procedures. The Initial Denial Authority for NSA is the Deputy Associate Director for Policy and Records, Diane M. Janosek. Any person denied access to information may file an appeal to the NSA/CSS MDR Appeal Authority_ The appeal must be postmarked no later than 60 calendar days after the date of the denial letter. The appeal shall be in writing addressed to the NSA/CSS MDR Appeal Authority (DJP5), National security Agency, 9800 Savage Road, STE 6884, Fort George G. Meade, MD 20755-6884. The appeal shall reference the initial denial of access and shall contain, in sufficient detail and particularity, the grounds upon which the requester believes the release of information is required. The NSA/CSS MDR Appeal Authority will endeavor to respond to the appeal within 60 working days after receipt of the appeal.

Encl: a/s

Sincerely,

~M YJIi. P1/!l~L

KRISTINA M. GREIN Chief

Declassification Services

~p ~"" .. ,. ;\ :: f • :..:....... ~;':a:I ' ..

one 23 May 96 ..::l~ -' "/.k-ru­

,LJ. / .:.(" /

AND SPECIAL PURPOSE COMPUTERS

A HISTORICAL LOOK AND SOME LESSONS LEARNED

1':,.1. 86-36 Ib.-.;·~C L'~IUAIl~«>3B EO 1. 4, (c I /:0,,' Oi!l~_r..=.= ___ _

:SH[t1 I OI'-LlBI,J::1. __ _

1.0 INTRODUCTION

1.1 Purpose

(U) This paper has been written. for the Supercomputing

Research Center of thQ Institute for Qefense Anal y",es. It", .' ."',

purpose is to explore the interaction between NSA's needs as it

pressed the limits of computing technology in the past. This

computing technology was Qmployed in general purpose computers •.

in spacial .... :l .. po ..... :omputing systams, and in c:oro/;:linatior.s of the

two. In the context of this paper the term techn~logy is pri­

marit y that Of archi tecture and hardware I software,. including

operating systems and specialized languages are dei'erred for

another paper.

I The areas addressed in ~------------------------------~

this paper are not intended to provide an exhaustive or detailed

histor,; rather, they have been selected to bring out key idees

and lessons learned which are int~nded to be of value to IDA-SRC

in their mission. F:7ec::Tla~s':"S"'if;'-'ie"'d~a:':n":;d-:a:'::p-::'p:-:ro~v"'e-:t"'J!'dfo-:r-:re~le~a:-:s:-::e~b~Y:'::N""S"'AlI"""'o-n~O"'6-"'J!2~g~-2~O<'!!1')l!O"'p"u"'rs~u"a-n""'tt-"o

\,

fdA.,/.: ~ R 59141.

(

23 May 86

1.2 ORGANIZATION OF THE PAPER

(U) In aggregating material for this paper it became evident

that there was' no simple, single, or truly logical way in which

to organize the material. A number of different dimensions

needed to be explored, and a heterogeneous organization seemed to

be appropriate. Accordingly the paper is organized as follows;

(TS) Section 2 contains three case studies which are repre-

sentative 9f three kinds of activity. The first, spanning about

20 years from 1950 to 1970, describes what was in effect a con-

ti.luing attempt to to obtain the maximum gene .... .,l purpo.e data

handling abilities. It includes the plans for NOMAD,

which needed a level of technology that ",as not yet

a system 1 available,

and the eventual development of HARVEST, a system which utilized

technology at its maximum limit. The second case study deals

with the series of machine aids that have been brought to bear on

the

These aids have been 1n

the form of both special and general purpose machines; the

reasons why one or the other was chosen are explored. The third

case study traces some of the ways in which networking of

computers has developed from simple remote terminal operat,1'on to

high bandwidth connections among powerful p~ocessors.

(UI Section 3 p .... e«ents material ~oncerning the AgencV's attempts

to push computi ng technology to its 11 mi ts. Bot'h "successes" and

"failures" a~e dis;cussgd.

which the fi~5t instances of true computer innovation« app&a .... to

have cll'i>?n ,M,de at the Ag.,"~y al'"e p~&sented.

.... " .. ," .

P.L. 8636 EO 1.4. (c)

:; . -'

I

( (U) Section 5 is a discussion of the development

purpose processors, their competition with general

P.L. 86~36

EO 1.4. (c)

23 May 86

of special./

purpose pro-

cessors, levels of parallelism, and the effects of automated

design.

(U) Section 6 attempts to draw some useful general and specific

conclusions from the material presented in Sections 2 through 5.

(U) Section 7 presents references for the paper; some of

the references are also singled out as being of general interest

" for those who would like to read farther in the area of this

pap .. r.

two

2,0 CASE STUDIES

lP;'.SlC lOG NUMBER: ;;2.Dz),::::, i , COCr-J-c~df:::;--=-_­SHEET tf cf'..-!O$a...7~ __ ...

9 June 86

(~Sl This chapter presents three diverse case studies lare

intended to illuminate some of NSA's historical interactions with

computers as they attempted tc:

press general purpose computing technology and mold it

toward COMINT processing,

use computing device teChnology to periorm cryptanalysis

provide remote access to machine resources for users i

and to provide interchange among machine resourc:es •..

(lJ) In Section 2.1 there is a discussion of a major / data

handling machine development, NOMAD, which did not come to frui-

tion and the machine which was eventually built, HARVEST~ which

can be viewed as its logical successor.

(TOOW) Section 2.2 trac:es the development of m~chine aids

for cryptanalysis ,

('fS) Sec'tion 2.3 disc:usses the way in which groups of ,

powerful general purpose ar,::! special purpoise machines were

brought together and interC:'::Jnnected on high" speecl· local area

networl,:s.

:-!

, L, 86-36 EO 1.4, Ie)

, ....

2-3

'P.L. 86 c 36 EO 1.4. (e)

(

two

-~-8!ft.N~eLAt-M!:SS~IRf'HE:tlflr- IOA-SRC LOG NUMlIE~ .;llS,s,3i . COPY __ L!O.:OI'1.:a:~~ __ ... SHEET 7 0I';..1..o....7t...-__ _

.L. 86-36 1.4. Ie)

···.9 June 86

These specifications must be considered in terms of the technolo-

gy available at that time. NOMAD was en",i si oned as \a machinll'

\ i n ordE!~ not to L-________________________________ ~

inhibit suggestions of other technologies, only performance SPII'­

c1f1cations were called out. I

2-4

(

-I:lNSI:J1o.SSIREB IDA-SRC LOG NUMBEIi .:;;<oowb , CO~YJot1:(I.:.~ ____ . ,sHEET 8 of·..<SI:;U1:....-__ _ two

'P.L. 86-36 ~q 1.4. Ie)

9 June 86

CU) A-ftel" evaluation o-f mull:ipl", bids: the NOMAD c:ontrac:t ',was:

awarded to Raytheon in 1951. \

(

UNeb<JSIAEB two

I;) .... SRC LOG NUMBfIl ;:2 C'b;3 i COpy l Or(~,?-;:-----. SHEET 9 OF 9:7

". L. 86-36 ';0 1.4. Ie)

9 June 86

(U) The NOMAD effort at Raytheon began to get badly behind

schedule. This is attributable to a number of causes including

C:hanges in senior projec:t staff, I

(

IDA-sac LOG NUMaER ;JOD::;3i two

COPY I otl=~=-=-____ • SHErr..lO OF-I<¢ .. 7'--__ _ 9 June 96

(U) Finally, in June 19~4, the NOMAD proje~t was killed; the

result of too little, too late, and for too mu~h money. I

2.1.2 FARMER-NOMAD

....

·~.L. 86-36 EO 1.4_ (c)

(U) In April 19~4, just prior to NOMAD's demise, a system

called FARMER was proposed; this system was to provide a general

purpose ~omputer with special purpose attachments. It was antl-

~ipated that su~h a ~cmbinaticn cculd talc&! advantagE! of the

efficiency of special purpose prccessors (see Section ~ belowl

and provide .. cap.ability for very powerful and large scale de.t!.a

handling. With the termination of NOMAD a FARMER-NOMAD Speciat ,

Study Group Was established for "the purpo",e of surveying the!.

Agency's needs for large-scale analytic equipment and praparing,

rec:ommendations far design studies" [SNY 64].

2-7

(

J

EO 1.4. (0) P.L. 86-36

:Top S 'flret I;lmb. a IDMRC LOG NUMWi ;:;:u» ~ . CO?Y-LOF:"''l:~~ __ ..

SHeeT I J OF <& 7

~o 1. 4. (c) I?.L. 86-36

two 9 June 86

-

(U) A number of studil;!s were begun within the Office of

Analytic Equipment Development to consider the mix of general and

special purpose sUbsytems. In 1955 IBM approached the Agency ~

about thE! USE! of STRETCH [BLO ~"J,a proposed machine rising out

of their attempt to extend perfo~mance over the IBM 704 I

(

I

two

2.1.3 HARVEST

~o 1.4.{c) P\L. 86-36

9 June 86

(u) The Agency "rejected" STRETCH initially, but awarded 1M

study c:ontrac:ts to IBM for high speed memory research (SILOl, and -fer system design studies for an Agency-oriented system (PLANTA-

TION, later RANCHO). The upshot of these studies was that the

Agency and IBM agreed on the design of system to be called

HARVEST. HARVEST is well documented in a number of places,

especially (SNY 64, SNY 82]. As a result we shall cdnsider only

the principal -features of HAR'JEST that made it a substantial

advance for Agency applications.

2.1.3.1 The HARVEST CPU

E9 1.4, (c) pj.;, 86-36

, '

(!!l After the Agency's initial rejec:tion'of . STRETCH, IBM

went to the Atomic: Energy Commission (AEC) and propcsedto build

one for them. This proposal was accepted by the AECLos A'tamos

National Laboratory

As III. resul t, HAR .... EST.as procured by the Agency had the

features of STRETCH, I

:-9

('

two

2.1.3.2 HARVEST Memories

IDA-S~C leG NUMSER 58 t5iS;3 'b I Copy OF t;l. .' SHEET {oj ~ '73 7

(U) HARVEST had two typss of cors memory\

~;o 1.4. Ie) I'".L. 86-36

9 i.tuns 96

EO 1.4. Ie) P.L. 86-3

(U) The other major memory advance for HARVEST was the

TRACTOR storage systam which used wide (1.75") magnetic tape with" V

16 logical tracks; the tapes were contained in large cartridges ~

and these cartridges were retri~ved bv automatic handlers. I

(

,tip ""'It Qull'l1

two

1':0 1.4. (e) ~.L,. 86-36

f'J June 86

41' 4ft '" I WI HARVEST provided 14 years of service, from 1962 to 1976. /,V/J!W'.

Although, like ~TRETCH, HARVEST was ahead of its time when de­

livered, by the time it was retired the large scale commercial

comput.ers had overtaken it in both performance and reliability,.

(STRETCH itself, never became a commercial machine; IBM's high

end machine of the era wa5 the 7094, in it5 variOU5 versions,\.

which was then superseded by thel ',I

V I~--------------------~ EO 1.4. (e)

P:'L. 86-36 "

2.2 Evohltion of Machine AidSI I

2-1 !

(

EO 1.4. (el

(

2-13

P. L. 86-36 EO.I. 4. (el

(

::-14

P.L. 86 36 EO 1.4. (c)

.........

::-1:;

".L. 86-36 EiO 1.4. Ie)

...

(

P.L. 86 36 ~o 1.4. Ie)

.

(

2--17

P.L. 86-36 ~O 1.4. Ie)

(

two

2.3 Development of Networking

9 June 96

EO<;l.4. Ie) P.L:.86-36

(reue, Ori g1 nall y at the Agency, as 611 sewhere. computers

were operated as stand-alone fa.cilities; users brought their jobs

to the computer or operated the computer themselves. Data. . was

trans~erred between compu~ers by punched cards or paper tape;

these were eventually supersade-:l by magnetic tape. The computer

"pplicationli were generall~1 par~ ·"f an interactive problem solv-

ing process for the user. In thIS section we cliscuss some of the

W.a.Y5 in which such ini:eril.ctior: :...I •• ianhanced. In using computers

as near real-time t'_lrnar::!'.Jnd t:J~l;s which a.re direc"':,'!y avsilabls:-

to individual analysts a.~ th~L- work location. In principle,

2-IE

".

(

'7 Jun. 86

much of this could be accomplished nowadays by stand-alone or by

network.d PCs. At the tims the initial systems discuss.d h.re

were introduced they reprssented both pow.rful (for the tim.'

aids for the user and early institution of remote operation lead-

ing to modern networking.

2.3.1 Early Remote Diagnostic Aids

'11:0 1.4. Ie) P;·L. 86-36

(u) A principal function in cryptan.lyi~I..!5 diagnosis of an

unknown cryptographic system. The analyst iscohfranted with a ~------------~~~--~~----~

quantity of unknown data; 1\. . ..... .

I

(U) The two earliest remotely operat .. d comput.rs .... ,.. ROGUE

and ROB-ROY [SNY 643. ROGUE .. as a commercial computer, the ALWAC

IIle\ I It gave

anal ysts accesS to the us. of standard., "canned", programs' as

well as the ability to program their own specialized requirements.

(U) R06UE was succ.eded by ROB-ROY, a remotely operated\

version of B06ART,/

• I

'.

(

2.3.2 RYE

(U)

'mo 1.4. (c) ~"'L. 86-36

'. \ ........ ". "

The elCpar!.nc. with ROBUE and with R~a""Ro~was

9 June! 86

so

couraging that a large scale remote operation ~as planned. In ...

1963 the first increment of the RYE syste!m I '"~"~11ed. I .....

\

ITS) It had been determined that individual users had wd.t-

ten many versions of (nearly) the same programs.

-

attempts were made to generali:_ programs of common interests and ~

....-------"":'l... "" Sene!ral Utility Programs (SUPs) we!re provided\

' .. -"u ..••• ~ ~.' .... _.

I

/

{

2-21

P.L. 86-36 EO 1.4. (c)

two a..---C~C~i''(S:RJC'Zt: .?®3~

SHEET OF 27 -.5L..'--___ ...

(

Figure 2.3-1

<Tjl;,le 8Ei6RET 51 aw t i ioJ UI'1CLAS51 F 1 bOb}

'i' June 86

EO 1.4. Ie) P.L. 86-36

"

P.L\ 86 36 EO 1.4. (c)

,

(

three SECRET 9 June 86

3.0 PRESSING TECHNOLOGY

(5) In this chapter we examine acme cf the Agency'a at­

tempts tc advance computing technology. I

(rBUB) In Secticn 3.1 some of the developments involving

Agency and computing technology which can be called

"suc:cesses" are desc:ribed .. These include: the LIGHTNING program

and Bome of its consequences; enhancement of memories and speci-

alized uses of memories; introduction of supercomputers; and

deployment of computers into the field.

(FeWQ) In Section 3.2 some of the "failures" are discussed. "1

(FOUD) Section 3.3 provides a br·iaf discussion of some

innovationa in computing technolog'f whid-. "'9 belie':e (-Jere origi­

nated at the. Agency I 'EO 1.4 . Ie) '-.-------_.L. - __ -=_-= ..... -= .... =~~~-.,.., .. , _______ ---' P.L. 86-36

(

three 9 June 96

3 .. 1 II SUCCE!'S&&S:! If

3.1.1 LIGHTNING

(U) LIGHTNING was an attempt, motivated by the first

Director of NSA, General Canine, to advance computing technology

by three orders of magnitude; the goal was stated as. "1000 Hcyde!

computation" (we would now say nanosecond computation). ,...-

Some of

the work is described by Campaigne [CAM 59J and by Wigington

[WIG 63J. A series of reports summarizing the wdrk was prepared

by NSA R~D in 1962 (these reports cannot be located as of the

writing of this paper; two of the reports are in Snyder's "arch-

ives U) .. The LIGHTNING program was a 5 year effort (1958-1963)

with three major contractors, International Business Machines

(IBM), Radio Corporation of America (RCA), and Remington Rand

Univac (RRU); smaller efforts were carried out by PHilco, Ohio

State Uni',ersity, the University of Kansas, and MIT. (/104 ...,.

(Ul IBM's LIGHTNING work concentrated on the JI/~

cryotron, \',.

supercon-Dudley Buck's invention of a magnetic field switchable

ducting device operating at about 4 degrees K [BUC 56J. (The

Agency had tried to use cryotrons earlier - see Section ",

3.2.3

RCA's work concentrated on applications of the tunnel

diode, one of the fastest switching devices known at that time.

RRU concentrated on thin magnetic film devices. «f

(U) A major problem in attac:king such (for the timel e:·:-

tramely high spe'!!d c:ircLlits was that of adequate in$tr'..<ment.tion

few Db"ervi ny the!!:e c:i rcell ts. Th~ development of high speed

i n;; t!'"'_t.TI~n ':..:;.t i on was one of 't.he majc::r ac:c:omp 1 i '2ihm~nts aT the

3-2

(

three CC?Y-L.:-:-~·-.I1'4:-~;:;""-'''''''''-•• sHm~0i':"-'?'!..l-!7~ __ ..... 9 June 86

LIGHTNING program. Other accomplishments of the program were

Ie!!!! evident. The work in magnetic thin films was one of the

most long lived technologies which came out of the program.

Tunnel diodes, although capable of extremely fast switching

speeds, had all of the di~ficulties inherent to a two-terminal

s~Jitching device and were overtaken by advances in transistor

c:iruitry. The cryotron proved not to scale to high speed opera- r'

tion as had been hoped and this topic is discussed mOre exten-

sively in Section 3.2.3 below.

(U) Although some of the points cited in the previous para-

graph do not sound very "successful", the LIGHTNING program as a

whole wa.s deemed to be a. SUCcess a.s it stimulated industry to

press on to higher speed circuits. In a.ddition to the high speed

instrumentation which furthered industrial work, a far better

understanding of the problems associated with pulses transmitted

over lines on circ:uit boards was developed. In addition to

circuit deVelopments the potential of very high speed components

provided some creative ideas in computer architecture. For exam-

pIe, the idea of a very fa.st, although small. "scratc:hpad" memory

was e~plored by RCA. This study ~ore5hadowed the ~ache memory

while considering whether or not the programmer or the system

should control its use.

3 .. 1.2 Memories

3-3'

EO 1.4. Ie) P. 86··36

,

(

three

3.1.2.1 MagnetiC: Tape

(e) The Agenc:y bec:ame an early major usar 01'

EO 1.4. Ie) p;·t. 86-36

9 .. ,June 86 .

\

".

magnetic: tape

'.

and at one time was the major U. S. consumer (over 5010 oq

I In addition the Agency quic:kly bec:ama a major

user of digital tape and established what came to be recogni%ed

~« the premier government tape te«tlng laboratory which was

eventually transfarred to the National Bureau of s~~~rd«. The -extremely high performance tape system of HARVEST was disc:ussed

in Section 2.1.3.2 above. 1;;0 1.4. Ie) ?\ L. 86-36

W) In about 1970 there was an extensive e1'fort to obtain a

"terabi.t" memory. This work was dene in conjunction with A~pex -and was an enhancement!

....

!TABLON .....

-1--'

provided

alterab12 storage. When 1'i l'.'!!s bec:>.me sta.ble they could be

tnlnsferred to TAB LON . s other "'ass 5".:orage sy"t.i!!m •. !L-______ .....I

EO 1.4. Ie) P.L. 86-36

3-5 P.L. 86~36

EO 1.4. Ie)

(

3-0 ·P.L. 86-36 EO 1.4.(c)

P.L. 86-36 ~O 1.4. lei

three!

3.1.3 Superc:omputers

(

....,)o;.~ ~Ii:Q 1. 4. Ie) '£lA-Sr.C LOG NUMBE!j ......:.v':"',C Q , P,. t., 86-3 6

COPY:3l£0F:;;b 'II' "',June 86 SHEET OF 81 - .

3-8

",

.

(

P.L. 86-36 EO 1.4. (c)

. ..•

(

P.L. "b-36 to 1.4. Ie)

(

'P.L. 86-36 J!:o 1.4. (c)

P.L. 86-36 1;;0 1.4. Ie)

1'.1. 86-36 EO 1.4. (c)

....

. ' ..... . . '-. . '

P.L. 86-36 ll;O 1.4. Ie)

three

~"L. 86-36 E01.4.(c)

'9 June 86

'"

(Ul In the mid-1960sthe Josephson Junction (JJ) phe,:,omenon

was discovered. This is another very low temperatu .. e phen'omenon

in which switching am electron tunneling junction between two

states is accomplished by means of a magnetic field. This tech-

nology has been described by Anacker [ANA 79J and in a special

issue of the 1§~ ~9ycnsl gf B~Q CI8M 80l. The pot.ential of \ JJ

technology brought about a .. enewed inte .. est in cryogenic devic'ss

in spit.e of the environmental problems p .. ",,,ented by operating '4

system in liquid helium. The two primary arguments in favor of

JJ computing we .... fast switching speed and minimal energy dissi-'

pation during switching. I

(

3-16

P.L. 86 36 1. 4. Ie)

(

three

IDA·SRC lOG NUMB!It ;;:;r;>O,'31> coPY-J-o~ 1: SHErr.!t':!...OF 'S 7 .'

P,L, 86-36 EO,L4, Ie)

9 June 96

(U) At a later time an attempt was made to consider the usa

of some "macro-modules" being developed at Washington University. -These modules provided general arithmetic functions; the upshot

of the investigation was that the overhead in line drivers and

receivers and requirements for asynchronous operation appeared to

offset the potential advantage of stockpiling. It is interesting

to nota that some of these ideas have recently reappeared (from

the same Washington University group! [BAR 95J). --like many other topics in this paper conform to the

This topic,

"wheel 0-1')

reincarnation" CMYE 68J.

3.2.5 Microprogramming

(UI In 1956 and 1957 interviews were held with a large

number of computer programmers asklng about fea!,t~tres which they

thought would cO,ntribute to Agency processing C(3AF 56, (3AF 57J.

Although a number of speciali:ed instructions were proposed there

was a distinct disinterest in microprogramming. No one thought

i:hat the ani',! '1st or orogr.;;.mmet' w;;,nted to be concerned wi th such '"

3-17

(

iietAt;s1FIEO thrllllll

topic.

3.3 "Innovat!'on$"

·P.L. 86-36 EO.1. 4. (e)

9 JunEii.86

(UI In .this section we describe briefly a few speci'l'ic

innovations in computer architecture which were probably first

invented or implemented at t.he Agency c>r IDA-eRD. They tendel'd .-not to be publicized and most did not get implemented in their

or1g1nal form. It seemed t.o be of interest. to list them here.

3.3.1 Stack and Tagged Architecture

W) Both of these concepts were invented for NOMAD and are .. r •

discussed in Sect.ion 2.1. They certainly predate all other work

(such as that at Rice University and at Burroughs) known to this

author.

3.3.2 77 Instruction

(U) This instruction for the CDC 1604 was proposed by

Mitchell !!... s! ... [MIT .6U at IDA-eRD in 1961. It took advantage

of an unused opcode on that machine to provide a microprogrammed

instruction dealing with logic and counting on registers. T

3-1'2

EO 1.4. (e) P.L. 86-36

("

[iietASSIFIEa IOA-SRC LOG NUMBER ~~ COPY~4~: $HEEr .£P.>OF_ .... '3 .... ''-__ ...

I

9 June SO t.hree

3.3.3 Cache Memory

(U) As not.ed in Section 3.1.1. it. became clear 1n the early

days of project LIGHTNING, that although there could be some very

high speed memory it would be in short supply, and consequently

an effective way of making use of that memory would be needed.

Both stack and cache type memory configurations were proposed.

At the time of writing this paper no reference material for these

architectural features in the LIGHTNING work can be found.

3.3.4 Fast Adders

3-10

......

......

P.L. 86-36 EO 1.4. Ie)

(

'1'0, s .... ·• DUItilII - :v- :::;.-: IDA-SRC lOG NUM8E1l. r;;z!::!:::::./:;>;;:> 11·

four

4.0 ALGORITHMS

4.1 Introduct1on

COPY~OF~t..:t;).,~ __ _

~HEn~ Cf.-IJ'5:.J:1 ____ •

2 June 86

M 1.4. (c) .P .. L. 86-36

( faeWI Advances in computing applications are·made in many

ways. They may be the result of advances in hardware technology,

in software technology and programmer aids; they may also be the

result of better fitting of the problll!m to a computer.. An e,,­

treme case of this latter is one in which an apparently\ complex

andlor very large computational process can be restated or trans-.

formed into a lel!is complex and/or less largecomputation~~ pro-

cess .. Many of these processes are to be found in the

science literature;1

4-1

\ computer

(

4-:;

P.~. 86-36 EO 1.4. (c)

.

(

4-3

E:.L. 86-36 EO 1.4.(c)

..

(

4-4 ....

P.'L ;86,~3 6 EO 1.4. {ei

(

4-5

t:.L. 86-36 Eq 1.4. (c)

. \.

(

4-6

P.L. 86-36 EO 1.4. Ie)

Tour

4-7

:2 June 86

J:;O\1.4.(c) P. x,. 86-36

fi ve 2 Juns 96

5.0 THE ROLE OF SPECIAL PURPOSE PROCESSORS

5.1 Introduction

P.L. 86-36 EO 1.4. Ie)

(TS) In earlier sections of this report we noted many in-

stances of sp .. cial purpose processors Which have b .... n constructed

and used by the Agency for cryptanalytically oriented purpose ••

These functions, howevsr, . closely follow the gensral trsnd in

commercial communications and will not be discussed her ... This

chapter contains two major sectionsl the first discusses special

purpos .. proc .. ssors and the second discusses "general purpcse/spe-

5.2 Special Purpose Processors

CE! r fo'eCO) In 1977, the National Security Agency Scientific

Advisory Board (NSASAB) established an ad hoc group to prepare a

"Report on Technology for Special Purpose Processors [SAB 7BJ.

This report contains much of the histor-y And rational.. for- th"

use of special pur-pose pr-ocassor-s by the National Secur-ity

Agency; it Is recommended to anyone reading this paper. An

interesting sIdelight is the concern expressed in the NSASAB

report report that "NSA should be pr .. pared to detect and respond

to a slowing of the commercial development of supercomputers",

This slowing, predicted nine years ago, has not happened yet.

5-1

five :2 June 86

5.2 Special Purpose ProcessorS

Cal - The discussion of this section is principally concerned

with the computer sCience/computer architecture issues. It doe~

not ta~:e into account two major topics discussed in tSAB 78J: (1)

the e:<tent to which a special purposE! processor is classified by

its inherent design and the management and cost difficul~iss of

conetructi ng 1 tin-house or under contrilct; and (2) the ciec:' si .:or.

liiii to the lifetime of the prcblem versus the lead time to prcdL,ce

a machine and its ex.pected lifetime.

s.~. 1 General Discussion

(U) Special purpose processors (SPPs) can be very aTfec~ive

~~eol"'et!cally when comp~rsd to classical, vcn Neuman. st=rs~ :r:-

gram computers.

ciency c:an be taken by asking how "busy" each binary element

(both logic and memory) in the system is. In a 5PP many regis­

ters and many data paths can be kept busy at the same time. This

sort of specialization is found in general purpose processors

(GPPs) in pipelined arithmetic: units, in use of multiple arithme­

tic units whiC:h have sim~ltaneous cpe~ation, in overlap o~ in­

struction processing and arithmetic processing, etc. When dis­

cussing keeping binary elements busy we must ~ac:tor in the di~­

ferent cost for m~mory elements versus logic: elements. Memory

element.s are much less e:<pensive, hence it is sometimes possible

to make trade-offs between memory size and logic:; a func:tion can

be performed by logic: or by table look up. Further, a fiKed

function c:an be performed in ROM table look up (it c:an also be

performed with wired or mic:ropr~grammed logic).

5-2

.five

Te~hnclggy DiscussigM

5.2.2 Functignality

3-3

·P.L. 86-36 EOl.4.(c)

".

2 June 86

....

-five

~-4

E.O 1.4. Ie) p • 86-36

:2 June 86

five

:;-5

EO 1.4. Ie) P;·L. 86-36

2 JunE!! 86

-five

EO 1.4. lei P;! .. B6-36

:2 June 86

.

five

5-7

1;;0 1.4. (c) P\L. 86-36

2 June eo

five

PoL. 86-36 EO L4.(c)

2 June 96

.

5.3 "Seneral-Purpose/Special Purpose" Processors

(Ul Again, as noted in (SAB 78J, GPPs have been used in

c::>njc<nction with 5PPs to provide th .. us ..... int .. rfac .. s, th .. lID, i"

scme cases secondary testing cf results, etc.

I A .. a r.,sult we can think of mixed L-______________________ -J

pr.:Jces50r5 which are a combinaticn oo!' SPPs and SPPs. The view.'of

5"tetem/-Functicn .. Is an array prcc5s5cr or its associated c?mpu-

t!!!,. dominant? Addi ti onall y, evel'" since micropl"'egramming/ began

being used in computer implementatien, general pUl"'pose pretesscrs

have been capable of being specialized fer efficiency intlarrower P.L. 86-36

tasks. EO 1.4. Ie)

5.3.1

".

5-8

five

5.4 Summary

It seams

'EO 1.4. Ie) P.L. 86-36

clear that the Agency will continue to

:2 June 86

U!!e !

both

general and special purpose computers in the future as t~ey hav ..

1n the past. General purpoSe computers provide a base w~ich can

run a deSired p~ogram as soon as it is w~ittan. !i

W.. have! le .... ned

lot about matc:hing

idiosyncrasies.

problem

5-9

requirements to

EO 1.4. Ie) P.L. 86-36

domputer I

I

five

5-10

P. L. 86-36 EO 1.4. Ie) 2 June 86

. ,

EQ 1.4. Ie) P.L; 86-36

9 June 86

6.0 LESSONS LEARNED

gy at the same time, especially for a single or a few machines.

The time scale to completion is most likely to stretch out to the

point where the completed machine is no longer cost effective.

There are two major reasOns fo~ this lost of cost effectivenes5:

il> the extra cost of development because of the extended devel-

opment time; (2) the 1055 in expected performance because of the

delay in beginning use vis-a-vis outside developments.

..

!;;J;!!:g!lS!::l£_!

(U) Don't allow technical/political arguments delay planning

af a system. It will result In "tao lit.tle - too ·late".

. ...

. '

j;;gr:gll!!!::l£_~

(U) Dan't let technalogy delay strestch out the development

time or the window of opportunity will be past.

Examplel Josephson Junction (Section 3.2.3)

6-1

EO 1.4. Ie) P.L. 86-36

six 9 June 86

-(TSBW) When should proc:ssSle. be plac:ed on general purpose

mac:hines or special purpose machines? Experimentaticn and analy­

sis are well suired tc SP machines. I

P.L. 86-36 EO 1.4. (c)

6-2

, ".,

"

six

Eo 1.4. Ie) P.L .. 86-36

6-3

'1 Jl.lne 96

six

b!it§!l!QD_!!:

P. L. 86-36 EO).4. Ie) '7 June 96

(T91 Not enough attention i$ given to reprogramming, auto-

matte or otherwise.

6-4

b~~.!ii9!l_§

(TSI Algorithms are imortant

L-______ ----II

9 June 96

1'.1. 86-36 EO 1.4. Ie)

six

6-6

EO 1.4. (el P.L. 86-36

9 June 96

SiK 9 June 86

(U?l Dces reccnfiguraticn merit ccntinued attenticn?

6-7

...

...

P.r... 86-36 EO 1. 4. Ie)

six

6-8

P.L. 86-36 EO 1.4. Ie)

<;I June 96

seven li;O 1.4. (e) P'.J:,. 86-36 2 JLlne 86

7.0 REFERENCES

ALL 81 All en, G. R., A ReconT! gLlrabl e ArchitectLlre for Arrays of Microprogrammable Processors, Chapt.r 8 in §e!!G:.!d!!l \;;emE!.yja§I!::: 8csoUs!OjaYCl!!l1! fec Eiilja:!il!!!:!l ECSS.!l!lli!!ii.oS, K. S. FLI and T. Ichikawa eds., Boca Raton, CRCPress, 1981.

ANA 79 Anacker, Wi 11, CompLlti ng at 4 Degrees Kelvi n, 1~E;5 §e!lls1!:Y!l!... 19, :5 , 26-37 (May 1979). ..

BAG 81 Bagg, Thomas C. and Mary E. Stevens, InformatiOI1 Selection Systems RetrieVing Replica Copies,· NBS·· Technical Note 157, December 31, 1961.

BAR 85 Barney, Clifford, Logic DeSigners Toss OLlt the Clock,. gl€S~!:9Qi.5~. December 9, 1985, 1010 42-45

BLO 59

Bue 56

Bloch, Erich, The Engineering Design cf the Stretch Computer, Pt:gc ... E~CC, 19:59, 48-:59.

_____ , ~ns~ructlon Manual, Vol. 1, August 197~, R324 , SECRET , (S-211,801).

Buck, Duclley A, The Cryotron, A Superconductive Com"'! puter Element, fees ... !B5.:. ~s, 482-493 (1956). !

7-1

P.L. 86-36 EO 1.4. (c)

.

seven

CDC 79

CDC 85

CRO 57

EVA 86

EO 1.4. Ie) P:,.L. 86-36

i.June 86

_____ • AF? Specification, Control Data Corperatipn, InformationSciences Division, December 1, 1979. EO 1.486·~~~

P.L. _____ • An Introduction to the Cyberplu5 Parallel Processing System, Control Data Corperation, 1965. \

" .

. Crowe, J. W., Trapped-Flux Superconducting Memory, l~~ ~OuC· B ~ ~~ 1, 295-303 (October 1957).

Evans, B.D., eooih Sli t.l:!!iI (April 1986).

SYstem/360: A Retrospective ~!&tSlC~ SIt 'gmQY~!!Jg~ ~. 2,

7-2

View .~~ 1. 4. Ie) p 160,P.L. 86-36

f~ 1.4. Ie) P. L. 86-36

I

I

P.L. 86-36 J\'.01.4.(c)

seven 2 June 86

FRE 83

GAF 56

I3AF 57

GEN 71a

GEN 71b

IBM eo

IBM 82

, ,

. '"

Fraund, Commsmts on Supercomputi no. t;1:~g:!;Q1Qg!.!;. 'g!,!!l\C;: ~~~1~~ 6, 1-2, Spring-Summer 1983, 11-21.

l3a-f-fny. Joan M., Report on P ... og .. amm .... Int. .... vi IIIIWII!,'

Dec 1956, SECRET. 9-85,940

l3a-ffny, Joan M., P ... oposedMachine Features, RIl<D, Feb 1957, CONFIDENTIAL. 8-85,942.

Gentile, R. 8., and J. R. Lucas, The TABLON Mass Storage Network, 12Z! §~~~. pp 345-356, AFIP8 P .. ess.

l3entUe, R. B. and R. W. Grove. Mass Storage Utility:; Considration fo .. Shared Storage Applications, Iss§; Ic~os~ 00 ~~gn~tlcs~ ~eG=7, 4, 848-952 (Dec 71).

_____ , Special Issue on Josephson Computer Technology, l~~ ~gyC~ gf B ~ g~ §!. 2, (Mar 1980),

__ ~ __ , Josephson Junction Applications Study, Final Report, Contract MDA 904-81-C-0425, IBM Federal Systems Division, Gaithersburg, MD, March 1982. (UNCLASSIFIED Report w)th SECRET Appendi~)

7-3

seven

. IBM 93

KEY 85

KRD 76

LEI 72

LUC 104

MAT 60

MCE 77

MCW 78

MIT 61

:2 June S6

_____ , Josephson Junction Applications Study, Phasa II, Final Report, Contract MDA 904-81-C-()42:, IBM Faderal Systems Division, Gaithersburg, MD, November 198~. {UNCLASSIFIED report with SECRET Appendix}

Keyserling, Charles, SPD Impact on Supercomputer Needs. RS, 1985, TOP SECRET CODEWORD.

Kronlage, Carl R., FLEMING Completion Report, NeA R32St

·

February 1976, TOP SECRET CODEWORD. (5-213,554)

Leibler, Ric~ard A., Mathematics and Computers in Cryptanalysis, ~§aI~ Special CLO Issue on Changing Frontiers in Comouter Cryptology, 1973, 15-22. TOP SECRET CODEWORD.

Lucas, Joseph R •• Jr., CAM II, ~eeI~~ 1~, 2, 27-7~, FOUO.

Matthews, Chcr!Q$ W~, Qui~k R~~eranca Memory. T.c~ni­cal Memorandum 352-7~~1/17, 26 oc~ober 1960, Fa~o, (S-1:25-~38)

McEliece, R., Ib@g~~ g£ lQfg~matigQ &Og bggi09L e ~atb@matl'al Eg~ngetlgQ ig~ ~gmm~Qi'mtigQ, Addison­Wesley, 1977.

MCWilliams, J. F. and N. J. Sloane, rOg !b@g~~ gf E~ro~ ~gCC!~11Qg god@~, Elsevier,1978.

Mitchell, G. J., Rice, R. A •• and E. Stoffel, A Des~ cription of a 77 order for the CDC 1604. IDA-eRD . . Working Paper No. 20, April 1961, (S-134,709).

I 'P.L. 86-36 EO 1.4. (c)

7-4

sevem

MOO 61

MYE 68

NEV 64

NEW 59

OME 74

W,\)1.~. Ie) pi". 86~36.

, "". -'"

2 June 86:

Moore, O. P. a.nd J. 0 SwH t\. Note o~Sorti ng R@peats, SCAMP Working Pa.per No. 1~/61., IDA, 4 August 1961;

Myers, T. H. and I. E. Sutherlanc;t, Dnt;he Design 0 ..

Display Process;:),.", Gl2!!!!!!!! ...... at :!;t\.§! a!;;!:! ... z 6, 410;"414 (June 1968). NOTE: also discussed in SIE 92.

Nevins, W. D., The REDMAN Program, t!!§eIlZ ... I!, 1, Winter 1964, 97-195, UNCLASSIFIED.

Newhouse, V. L., and J. W.Sreme,., High-Speed Super­conductive Switching Element Suitable for Two-Dimen':;' sional Fabrication, ~gy~~ eggli~g En¥~i~~~ ~Q, 14~e-1459 (19~9).

_____ , The OMEN Processor, AppendiK Kin !:!H!:!:tla!:e~!!!l!!:: l!!9!:l!! sol:! fi'!~sll§!! f~gs;!:!!!!Og, P. Enslow ed., Wi1 ey, 1974.

.

7-5

I

..,

seven

srE 92

SLA 56

VAT 37

!P·.L. 86-36 EO 1. 4. Ie)

Siewor-ek, D. P., C. G. Bell, and A. Newell, (eels.'), !;Qmr;ty!.§!: §t.!:y!;;t.!J!:§lli ... E:ci.O!;;iQl!i!lli 5!O!:! t;;l$.5!1l!e.l§!. 1'1c::I3 ... aw­Hi 11, 1'182.

Slade, AI, A Cr-yotr-cn Catalog Memor-y ~yCC, Dec::ember- 1'156.

Yates, F., Design and Analysis OT Factor-!al Exper-i­menta, Harpenden, Imper-ial Bureau oT Social SCience, 1937.

7-6

c:la!5ref

CLASSIFIED REFERENCES

1

23 May 96

EO 1.4. Ie) P,.L. 86-36

...

clasre-f

IBM 80

'P.L. 86-36 EO 1.4.(0)

23 May 96

_____ • Special Issue on Josephson Co~puter Technology, !~~ ~QYr~ gf B ~ ~~ ~~, 2, (Mar 1980).

2

cla5ref

IBM 82

IBM 83

l<.L. 86-36 EO 1.4. Ie)

23 May 86

--___ • Josephson Junction Applications Study. Final Report, Contract MOA 904-81-C-0425, IBM Federal Systems Dlvi5ion, Gaithersburg, MD, Marth 1982. SECRET Appendix

-----, Josephson Junction Applicat''l.pns Study, Phase II, Final Report, Contract MDA 904-el-C~0425, IBM Federal Systems Division, Gaithersburg, MD, November 1983. SECRET A"lDendi Ie

c::la.sre-f

4

EO 1.4. (c) POL. 86-36

..•

23 May E6

. ..

cl a!5I'"E!-f

5

EO 1.4. (c) P.t, 86-36

23 May 66

A-l

P.L. 86-36 EO .. 1.4. Ie)

A-2

P. L. 86-36 EO. 1. 4. I c)

A-3

P.L. 86-36 EO.1.4. (c)

A-4

];>.L. 86~36

EQ 1.4. Ie)

....

A-!5

l?·1. 86-36 EO .1..4. (cl