You can help expand this article with text translated from the corresponding article in German. Click [show] for important translation instructions.
Machine translation, like DeepL or Google Translate, is a useful starting point for translations, but translators must revise errors as necessary and confirm that the translation is accurate, rather than simply copy-pasting machine-translated text into the English Wikipedia.
Consider adding a topic to this template: there are already 1,896 articles in the main category, and specifying|topic= will aid in categorization.
Do not translate text that appears unreliable or low-quality. If possible, verify the text with references provided in the foreign-language article.
You must provide copyright attribution in the edit summary accompanying your translation by providing an interlanguage link to the source of your translation. A model attribution edit summary is Content in this edit is translated from the existing German Wikipedia article at [[:de:Rapid Analytical Machine]]; see its history for attribution.
You may also add the template {{Translated|de|Rapid Analytical Machine}} to the talk page.
For more guidance, see Wikipedia:Translation.
This article relies largely or entirely on a single source. Relevant discussion may be found on the talk page. Please help improve this article by introducing citations to additional sources. Find sources: "Cryptanalytic computer" – news · newspapers · books · scholar · JSTOR(April 2024)
A cryptanalytic computer is a computer designed to be used for cryptanalysis, which nowadays involves massive statistical analysis and multiple trial decryptions that since before World War II are possible only with automated equipment. Polish cryptanalysts designed and built automated aids in their work on Enigma traffic. Arguably, the first modern computer (digital, electronic, and somewhat programmable) was built for cryptanalytic work at Bletchley Park (the Colossus) during the war. More modern computers were important after World War II, and some machines (like the Cray-1) are reported[according to whom?] to have had machine instructions hardwired in at the request of NSA.
Computers continue to be important in cryptanalysis well into the 21st century. NSA, in fact, is said to have the largest number of installed computers on the planet. Whether this is true in an age of Google computer farms and such is doubtful but remains publicly unknown.[1]
^Gladwin, Lee A. (2007-10-08). "Bulldozer: A Cribless Rapid Analytical Machine (RAM) Solution to Enigma and its Variations". Cryptologia. 31 (4): 305–315. doi:10.1080/01611190701506022. ISSN 0161-1194. S2CID 45817948.
and 23 Related for: Cryptanalytic computer information
A cryptanalyticcomputer is a computer designed to be used for cryptanalysis, which nowadays involves massive statistical analysis and multiple trial decryptions...
attack. Cryptographic attacks can be characterized in a number of ways: Cryptanalytical attacks can be classified based on what type of information the attacker...
declined to re-implement the architecture in a more modern technology. Cryptanalyticcomputer IBM (May 1, 1957). Preliminary Manual, Harvest System (PDF). IBM...
Energy and the National Nuclear Security Administration IBM 7950: Cryptanalyticcomputer using 7030 as CPU; 1962 (Harvest) IBM 7951: IBM 7950 Stream coprocessor...
FROSTBURG is now on display at the National Cryptologic Museum. HARVEST Cryptanalyticcomputer "Ten of the coolest and most powerful supercomputers of all time"...
Cryptanalysis of the Enigma • Cryptanalysis of the Lorenz cipher • Cryptanalyticcomputer • Cryptex • Cryptico • Crypto AG • Crypto-anarchism • Crypto API...
designed for a range of cryptanalytic tasks, most involving counting the results of evaluating Boolean algorithms. A Colossus computer was thus not a fully...
originated among the Arabs, the first people to systematically document cryptanalytic methods. Al-Khalil (717–786) wrote the Book of Cryptographic Messages...
HEC 1 computer.htm". Our Computer Heritage. Computer Conservation Society. 2 April 2012. Archived from the original on 2 April 2012. "Computer Conservation...
method of mathematical proof Brute-force attack, a cryptanalytic attack Brute-force search, a computer problem-solving technique Brute Force (musician)...
February 1945), "Appendix II: U. S. Army Cryptanalytic Bombe", Solving the Enigma: History of the Cryptanalytic Bombe, a NSA phamphlet, archived from the...
Paul C.; Wiener, Michael J. (1999), "Parallel collision search with cryptanalytic applications", Journal of Cryptology, 12 (1): 1–28, doi:10.1007/PL00003816...
Colossus computer vacuum tube cryptanalytic supercomputer, 1943 1×106: computing power of the Motorola 68000 commercial computer introduced in 1979.[citation...
mechanism (KEM) designed to be resistant to cryptanalytic attacks with future powerful quantum computers. It is used to establish a shared secret between...
security hole in Syskey that indicated that a certain form of offline cryptanalytic attack is possible, making a brute force attack appear to be possible...
choose the key. Side-channel attack - This is not strictly speaking a cryptanalytic attack, and does not depend on the strength of the cipher. It refers...
had been advised that a cryptanalytic attack was the least likely of all security problems.[citation needed] Modern computers can be used to solve Enigma...
violating the Act. Specifying the bombe was the first of five major cryptanalytical advances that Turing made during the war. The others were: deducing...
cryptography research community, since an argument can be made that any cryptanalytic research violates, or might violate, the DMCA. The arrest of Russian...
Banburismus was a cryptanalytic process developed by Alan Turing at Bletchley Park in Britain during the Second World War. It was used by Bletchley Park's...
Turing had been posted to Washington to share with the U.S. Navy's cryptanalytic service the methods used by the British Government Code and Cypher School...
of 55 inner rounds of SHACAL-1. These are the best currently known cryptanalytic results on SHACAL-1 in a single key attack scenario. In the paper "Related-Key...