In message <003901be4af4$ea5b9a20$[EMAIL PROTECTED]>, "Jitze Couperus"
 writes:
> John Mckay wrote:
> 
> About the "sideways add" or pop-count instruction - indeed
> Seymour Cray's first supercomputer (the Control Data 6600)
> sported such an instruction, as did all subsequent Control
> Data machines until the advent of the 180 series in the mid 
> '80s. 
> 
...
> 
> We always wondered what such an instruction might be useful for - 
> until one of the first of the 180 series (n'th generation successor
> to the 6600) was delivered to such a customer, and cries of 
> anguish erupted that this machine didn't have such an instruction. 
> We scrambled and had to create a very tight code sequence within the 
> instruction stack that could be generated via a Fortran intrinsic 
> function.

For years, I had heard the story about NSA liking that instruction.
But I never understood why, until I started working on plaintext recognizers,
and independently derived the need for it.  See, for example,
http://www.research.att.com/~smb/papers/probtxt.ps.

There are other instruction types that are useful for cryptanalysts.
The CDC Star had a lovely set of vector operations under masks.  And
the Harvest add-on to the IBM 7030 (Stretch), described in a book by
Buchholz ("Planning a Computer System", McGraw-Hill, 1962) was intended
for NSA as well.

Reply via email to