IBM 7950 Harvest

HARVEST

The IBM 7950, also known as Harvest, was a one-of-a-kind adjunct to the Stretch computer which was installed at the United States National Security Agency (NSA). Built by IBM, it was delivered in 1962 and operated until 1976, when it was decommissioned. Harvest was designed to be used for cryptanalysis.

Development

In April 1958, the final design for the NSA-customized version of IBM's Stretch computer had been approved, and the machine was installed in February 1962.[1] The design engineer was James H. Pomerene,[2] and it was built by IBM in Poughkeepsie, New York. Its electronics (fabricated of the same kind of discrete transistors used for Stretch) were physically about twice as big as the Stretch to which it was attached. Harvest added a small number of instructions to Stretch, and could not operate independently.

An NSA-conducted evaluation found that Harvest was more powerful than the best commercially available machine by a factor of 50 to 200, depending on the task.[3]

Architecture

A HARVEST tape cartridge.

The equipment added to the Stretch computer consisted of the following special peripherals:

With the stream processing unit, Harvest was able to process 3 million characters a second.[3]

The TRACTOR tape system, part of the HARVEST system, was unique for its time. It included six tape drives, which handled 1.75-inch-wide (44 mm) tape in cartridges, along with a library mechanism that could fetch a cartridge from a library, mount it on a drive, and return it to the library. The transfer rates and library mechanism were balanced in performance such that the system could read two streams of data from tape, and write a third, for the entire capacity of the library, without any time wasted for tape handling.

Programming

Harvest's most important mode of operation was called "setup" mode, in which the processor was configured with several hundred bits of information and the processor then operated by streaming data from memory — possibly taking two streams from memory — and writing a separate stream back to memory. The two byte streams could be combined, used to find data in tables, or counted to determine the frequency of various values. A value could be anything from 1 to 16 contiguous bits, without regard to alignment, and the streams could be as simple as data laid out in memory, or data read repeatedly, under the control of multiply-nested "do"-loop descriptors, which were interpreted by the hardware.

Two programming languages, Alpha and Beta (not be confused with Simula-inspired BETA programming language) were designed for programming it, and IBM provided a compiler for the former around the time the machine was delivered.

Usage

One purpose of the machine was to search text for key words from a watchlist. From a single foreign cipher system, Harvest was able to scan over seven million decrypts for any occurrences of over 7,000 key words in under four hours.[3]

The computer was also used for codebreaking, and this was enhanced by a system codenamed Rye, which allowed remote access to Harvest. According to a 1965 NSA report, "RYE has made it possible for the agency to locate many more potentially exploitable cryptographic systems and 'bust' situations. Many messages that would have taken hours or days to read by hand methods, if indeed the process were feasible at all, can now be 'set' and machine decrypted in a matter of minutes".[4] Harvest was also used for decipherment of solved systems; the report goes on to say that, "Decrypting a large batch of messages in a solved system [is] also being routinely handled by this system".[4]

Harvest remained in use until 1976, having been in operation at the NSA for fourteen years.[5] Part of the reason for its retirement was that some of the mechanical components of TRACTOR had worn beyond use, and there was no practical way to replace them. IBM declined to re-implement the architecture in a more modern technology.

See also

References

  1. Bamford, 2001, p. 586
  2. J.A.N. Lee, March in computing history, looking.back, Computer, 29(3), March 1996 (online)
  3. 1 2 3 Bamford, 2001, p. 587
  4. 1 2 NSA, "Remote-Access Computer Systems" in Cryptologic Milestones, August 1965, pp. 1–4 (as referenced by Bamford, 2001, pp. 589, 699)
  5. Bamford, 2001, p. 589

Sources

External links

This article is issued from Wikipedia - version of the Saturday, June 07, 2014. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.