IBM 7950 Harvest

Last updated
HARVEST HARVEST.jpg
HARVEST

The IBM 7950, also known as Harvest, was a one-of-a-kind adjunct to the Stretch computer which was installed at the United States National Security Agency (NSA). Built by IBM, it was delivered in 1962 and operated until 1976, when it was decommissioned. Harvest was designed to be used for cryptanalysis.

Contents

Development

In April 1958, the final design for the NSA-customized version of IBM's Stretch computer had been approved, and the machine was installed in February 1962. [1] The design engineer was James H. Pomerene, [2] and it was built by IBM in Poughkeepsie, New York. Its electronics (fabricated of the same kind of discrete transistors used for Stretch) were physically about twice as big as the Stretch to which it was attached. Harvest added a small number of instructions to Stretch, and could not operate independently.

An NSA-conducted evaluation found that Harvest was more powerful than the best commercially available machine by a factor of 50 to 200, depending on the task. [3]

Architecture

A HARVEST tape cartridge. HARVEST-tape.jpg
A HARVEST tape cartridge.

The equipment added to the Stretch computer consisted of the following special peripherals:

With the stream processing unit, Harvest was able to process 3 million characters a second. [3]

The TRACTOR tape system, part of the HARVEST system, was unique for its time. It included six tape drives, which handled 1.75-inch-wide (44 mm) tape in cartridges, along with a library mechanism that could fetch a cartridge from a library, mount it on a drive, and return it to the library. The transfer rates and library mechanism were balanced in performance such that the system could read two streams of data from tape, and write a third, for the entire capacity of the library, without any time wasted for tape handling.

Programming

Harvest's most important mode of operation was called "setup" mode, in which the processor was configured with several hundred bits of information and the processor then operated by streaming data from memory — possibly taking two streams from memory — and writing a separate stream back to memory. The two byte streams could be combined, used to find data in tables, or counted to determine the frequency of various values. A value could be anything from 1 to 16 contiguous bits, without regard to alignment, and the streams could be as simple as data laid out in memory, or data read repeatedly, under the control of multiply-nested "do"-loop descriptors, which were interpreted by the hardware.

Two programming languages, Alpha and Beta (not be confused with Simula-inspired BETA programming language) were designed for programming it, and IBM provided a compiler for the former around the time the machine was delivered.

Usage

One purpose of the machine was to search text for key words from a watchlist. From a single foreign cipher system, Harvest was able to scan over seven million decrypts for any occurrences of over 7,000 key words in under four hours. [3]

The computer was also used for codebreaking, and this was enhanced by an early distributed networking system codenamed Rye, which allowed remote access to Harvest. According to a 1965 NSA report, "RYE has made it possible for the agency to locate many more potentially exploitable cryptographic systems and 'bust' situations. Many messages that would have taken hours or days to read by hand methods, if indeed the process were feasible at all, can now be 'set' and machine decrypted in a matter of minutes". [4] Harvest was also used for decipherment of solved systems; the report goes on to say that, "Decrypting a large batch of messages in a solved system [is] also being routinely handled by this system". [4] The Harvest-RYE system became an influential example for computer security; a 1972 review identified NSA’s RYE as one of two “examples of early attempts at achieving ‘multi-level’ security.” [5]

Harvest remained in use until 1976, having been in operation at the NSA for fourteen years. [6] Part of the reason for its retirement was that some of the mechanical components of TRACTOR had worn beyond use, and there was no practical way to replace them. IBM declined to re-implement the architecture in a more modern technology.

See also

Related Research Articles

<span class="mw-page-title-main">BIOS</span> Firmware for hardware initialization and OS runtime services

In computing, BIOS is firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process. The BIOS firmware comes pre-installed on an IBM PC or IBM PC compatible's system board and exists in some UEFI-based systems to maintain compatibility with operating systems that do not support UEFI native operation. The name originates from the Basic Input/Output System used in the CP/M operating system in 1975. The BIOS originally proprietary to the IBM PC has been reverse engineered by some companies looking to create compatible systems. The interface of that original system serves as a de facto standard.

<span class="mw-page-title-main">Data Encryption Standard</span> Early unclassified symmetric-key block cipher

The Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryptography.

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees.

<span class="mw-page-title-main">IBM System/360</span> IBM mainframe computer family (1964–1977)

The IBM System/360 (S/360) is a family of mainframe computer systems that was announced by IBM on April 7, 1964, and delivered between 1965 and 1978. It was the first family of computers designed to cover both commercial and scientific applications and a complete range of applications from small to large. The design distinguished between architecture and implementation, allowing IBM to release a suite of compatible designs at different prices. All but the only partially compatible Model 44 and the most expensive systems use microcode to implement the instruction set, featuring 8-bit byte addressing and fixed point binary, fixed point decimal and hexadecimal floating-point calculations.

<span class="mw-page-title-main">Tape drive</span> Data storage device

A tape drive is a data storage device that reads and writes data on a magnetic tape. Magnetic-tape data storage is typically used for offline, archival data storage. Tape media generally has a favorable unit cost and a long archival stability.

<span class="mw-page-title-main">Punched tape</span> Data storage device

Punched tape or perforated paper tape is a form of data storage device that consists of a long strip of paper through which small holes are punched. It was developed from and was subsequently used alongside punched cards, the difference being that the tape is continuous.

<span class="mw-page-title-main">Secure cryptoprocessor</span> Device used for encryption

A secure cryptoprocessor is a dedicated computer-on-a-chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. Unlike cryptographic processors that output decrypted data onto a bus in a secure environment, a secure cryptoprocessor does not output decrypted data or decrypted program instructions in an environment where security cannot always be maintained.

<span class="mw-page-title-main">IBM 7030 Stretch</span> First IBM supercomputer using dedicated transistors

The IBM 7030, also known as Stretch, was IBM's first transistorized supercomputer. It was the fastest computer in the world from 1961 until the first CDC 6600 became operational in 1964.

<span class="mw-page-title-main">IBM 701</span> Vacuum-tube computer system

The IBM 701 Electronic Data Processing Machine, known as the Defense Calculator while in development, was IBM’s first commercial scientific computer and its first series production mainframe computer, which was announced to the public on May 21, 1952. It was designed and developed by Jerrier Haddad and Nathaniel Rochester and was based on the IAS machine at Princeton.

In computing, mass storage refers to the storage of large amounts of data in a persisting and machine-readable fashion. In general, the term is used as large in relation to contemporaneous hard disk drives, but it has been used large in relation to primary memory as for example with floppy disks on personal computers.

<span class="mw-page-title-main">IBM 1130</span> 16-bit IBM minicomputer introduced in 1965

The IBM 1130 Computing System, introduced in 1965, was IBM's least expensive computer at that time. A binary 16-bit machine, it was marketed to price-sensitive, computing-intensive technical markets, like education and engineering, succeeding the decimal IBM 1620 in that market segment. Typical installations included a 1 megabyte disk drive that stored the operating system, compilers and object programs, with program source generated and maintained on punched cards. Fortran was the most common programming language used, but several others, including APL, were available.

<span class="mw-page-title-main">IBM 5100</span> Portable computer released by IBM in 1975

The IBM 5100 Portable Computer is one of the first portable computers, introduced in September 1975, six years before the IBM Personal Computer, and eight before the first successful IBM compatible portable computer, the Compaq Portable. It was the evolution of a prototype called the SCAMP that was developed at the IBM Palo Alto Scientific Center in 1973. Whether considered evolutionary from SCAMP or revolutionary, it still needed to be plugged into an electric socket.

<span class="mw-page-title-main">ROM image</span> Data dump from a ROM chip

A ROM image, or ROM file, is a computer file which contains a copy of the data from a read-only memory chip, often from a video game cartridge, or used to contain a computer's firmware, or from an arcade game's main board. The term is frequently used in the context of emulation, whereby older games or firmware are copied to ROM files on modern computers and can, using a piece of software known as an emulator, be run on a different device than which they were designed for. ROM burners are used to copy ROM images to hardware, such as ROM cartridges, or ROM chips, for debugging and QA testing.

In computer storage, a tape library is a physical area that holds magnetic data tapes. In an earlier era, tape libraries were maintained by people known as tape librarians and computer operators and the proper operation of the library was crucial to the running of batch processing jobs. Although tape libraries of this era were not automated, the use of tape management system software could assist in running them.

The IBM 3850 Mass Storage System (MSS) was an online tape library used to hold large amounts of infrequently accessed data. It was one of the earliest examples of nearline storage.

Magnetic-tape data storage is a system for storing digital information on magnetic tape using digital recording.

<span class="mw-page-title-main">IBM 3592</span> Magnetic tape-based data storage format

The IBM 3592 is a series of enterprise-class tape drives and corresponding magnetic tape data storage media formats developed by IBM. The first drive, having the IBM product number 3592, was introduced under the nickname Jaguar. The next drive was the TS1120, also having the nickname Jaguar. As of October 2023, the latest and current drive is the TS1170. The 3592 line of tape drives and media is not compatible with the IBM 3590 series of drives, which it superseded. This series can store up to 50 TB of data (uncompressed) on a cartridge and has a native data transfer rate of up to 400 MB/s. In August 2023 IBM announced the TS1170 tape drive with 50TB cartridges, more than 2.5 times larger than LTO-9 cartridges.

Philco was one of the pioneers of transistorized computers. After the company developed the surface barrier transistor, which was much faster than previous point-contact types, it was awarded contracts for military and government computers. Commercialized derivatives of some of these designs became successful business and scientific computers. The TRANSAC Model S-1000 was released as a scientific computer. The TRANSAC S-2000 mainframe computer system was first produced in 1958, and a family of compatible machines, with increasing performance, was released over the next several years.

References

  1. Bamford, 2001, p. 586
  2. J.A.N. Lee, March in computing history, looking.back, Computer, 29(3), March 1996 (online) Archived 2006-03-07 at the Wayback Machine
  3. 1 2 3 Bamford, 2001, p. 587
  4. 1 2 NSA, "Remote-Access Computer Systems" in Cryptologic Milestones, August 1965, pp. 1–4 (as referenced by Bamford, 2001, pp. 589, 699)
  5. TJ Misa “Computer Security Discourse at RAND, SDC, and NSA (1958–1970),” IEEE Annals of the History of Computing 38 no. 4 (2016): 12-25, quote p. 13.
  6. Bamford, 2001, p. 589

Sources