Lucas-Lehmer Primality Tester Presentation 1: Proposal Team: Nathan Stohs Joe Hurley Brian Johnson Marques Johnson.

Slides:



Advertisements
Similar presentations
A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
Advertisements

(ex) Consider a plant with
WS Algorithmentheorie 03 – Randomized Algorithms (Primality Testing) Prof. Dr. Th. Ottmann.
Agrawal-Kayal-Saxena Presented by: Xiaosi Zhou
Planning under Uncertainty
1cs542g-term Notes  Assignment 1 due tonight ( me by tomorrow morning)
Author: David He, Astghik Babayan, Andrew Kusiak By: Carl Haehl Date: 11/18/09.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
1 Lucas-Lehmer Primality Tester Presentation 8 March 22nd 2006 Team: W-4 Nathan Stohs W4-1 Brian Johnson W4-2 Joe Hurley W4-3 Marques Johnson W4-4 Design.
1 Lucas-Lehmer Primality Tester Team: W-4 Nathan Stohs W4-1 Brian Johnson W4-2 Joe Hurley W4-3 Marques Johnson W4-4 Design Manager: Prateek Goenka.
1 Lucas-Lehmer Primality Tester Team: W-4 Nathan Stohs W4-1 Brian Johnson W4-2 Joe Hurley W4-3 Marques Johnson W4-4 Design Manager: Prateek Goenka.
1 Lucas-Lehmer Primality Tester Presentation 6 March 1st 2006 Team: W-4 Nathan Stohs W4-1 Brian Johnson W4-2 Joe Hurley W4-3 Marques Johnson W4-4 Design.
CSC 2300 Data Structures & Algorithms February 27, 2007 Chapter 5. Hashing.
Pseudorandom Number Generators
Lucas-Lehmer Primality Tester Presentation 2: Architecture Proposal February 1, 2006 Team: W-4 Nathan Stohs W4-1 Brian Johnson W4-2 Joe Hurley W4-3 Marques.
Lucas-Lehmer Primality Tester Presentation 4 February 15, 2006 Team: W-4 Nathan Stohs W4-1 Brian Johnson W4-2 Joe Hurley W4-3 Marques Johnson W4-4 Design.
Lucas-Lehmer Primality Tester Presentation 5 February 22, 2006 Team: W-4 Nathan Stohs W4-1 Brian Johnson W4-2 Joe Hurley W4-3 Marques Johnson W4-4 Design.
1 Lucas-Lehmer Primality Tester Presentation 6 March 1st 2006 Team: W-4 Nathan Stohs W4-1 Brian Johnson W4-2 Joe Hurley W4-3 Marques Johnson W4-4 Design.
1 Lucas-Lehmer Primality Tester Presentation 9 March 29, 2006 Team: W-4 Nathan Stohs W4-1 Brian Johnson W4-2 Joe Hurley W4-3 Marques Johnson W4-4 Design.
1 Lucas-Lehmer Primality Tester Presentation 11 April 24th 2006 Team: W-4 Nathan Stohs W4-1 Brian Johnson W4-2 Joe Hurley W4-3 Marques Johnson W4-4 Design.
1 Lucas-Lehmer Primality Tester Presentation 8 March 22nd 2006 Team: W-4 Nathan Stohs W4-1 Brian Johnson W4-2 Joe Hurley W4-3 Marques Johnson W4-4 Design.
implementations in a functional language
1 CSE 417: Algorithms and Computational Complexity Winter 2001 Instructor: Paul Beame TA: Gidon Shavit.
Linear Programming – Max Flow – Min Cut Orgad Keller.
K-means Clustering. What is clustering? Why would we want to cluster? How would you determine clusters? How can you do this efficiently?
ECE 510 Brendan Crowley Paper Review October 31, 2006.
Lucas-Lehmer Primality Tester Presentation 2: Architecture Proposal February 1, 2006 Team: W-4 Nathan Stohs W4-1 Brian Johnson W4-2 Joe Hurley W4-3 Marques.
1 Integers and Division CS/APMA 202 Rosen section 2.4 Aaron Bloomfield.
The Pentium: A CISC Architecture Shalvin Maharaj CS Umesh Maharaj:
Doubling & Halving with Multiplication. Doubling and halving works because of the relationship between multiplication and division. Since multiplication.
Efficient Pseudo-Random Number Generation for Monte-Carlo Simulations Using GPU Siddhant Mohanty, Subho Shankar Banerjee, Dushyant Goyal, Ajit Mohanty.
1 Growth of Functions CS 202 Epp, section ??? Aaron Bloomfield.
200/MAPLD 2004 Craven1 Super-Sized Multiplies: How Do FPGAs Fare in Extended Digit Multipliers? Stephen Craven Cameron Patterson Peter Athanas Configurable.
Vladyslav Kolbasin Stable Clustering. Clustering data Clustering is part of exploratory process Standard definition:  Clustering - grouping a set of.
Random Terrain Generation By Cliff DeKoker. About my project ● Incremental development ● Focus on creating height maps that mimic real terrain ● Allow.
The Fast Optimal Voltage Partitioning Algorithm For Peak Power Density Minimization Jia Wang, Shiyan Hu Department of Electrical and Computer Engineering.
Accelerating Statistical Static Timing Analysis Using Graphics Processing Units Kanupriya Gulati and Sunil P. Khatri Department of ECE, Texas A&M University,
An Efficient Algorithm for Enumerating Pseudo Cliques Dec/18/2007 ISAAC, Sendai Takeaki Uno National Institute of Informatics & The Graduate University.
1 Algorithms CS/APMA 202 Rosen section 2.1 Aaron Bloomfield.
1 Algorithms CS 202 Epp section ??? Aaron Bloomfield.
Ihab Mohammed and Safaa Alwajidi. Introduction Hash tables are dictionary structure that store objects with keys and provide very fast access. Hash table.
Ted Pedersen – CS 3011 – Chapter 10 1 A brief history of computer architectures CISC – complex instruction set computing –Intel x86, VAX –Evolved from.
T. Messelis, S. Haspeslagh, P. De Causmaecker B. Bilgin, G. Vanden Berghe.
 Introduction to SUN SPARC  What is CISC?  History: CISC  Advantages of CISC  Disadvantages of CISC  RISC vs CISC  Features of SUN SPARC  Architecture.
More on Correctness. Prime Factorization Problem: Write a program that computes all the prime factors of a given number Solution (Idea): Factors are less.
COSC 2007 Data Structures II Chapter 13 Advanced Implementation of Tables IV.
Announcements Finish up Network Flow today Then Review for Final on Monday ◦ HW#5 is due on Monday, let me or the TA’s know if you have trouble starting.
Implementation Issues for Public Key Algorithms
Implementation of Public Key Encryption Algorithms
From Use Cases to Implementation 1. Structural and Behavioral Aspects of Collaborations  Two aspects of Collaborations Structural – specifies the static.
1 Potential for Parallel Computation Chapter 2 – Part 2 Jordan & Alaghband.
Global topology optimization of truss structures Dmitrij Šešok Rimantas Belevičius Department of Engineering Mechanics. Vilnius Gediminas Technical University.
From Use Cases to Implementation 1. Mapping Requirements Directly to Design and Code  For many, if not most, of our requirements it is relatively easy.
Solving Weakened Cryptanalysis Problems for the Bivium Keystream Generator in the Volunteer Computing Project Oleg Zaikin, Alexander Semenov,
A Collapsed Variational Bayesian Inference Algorithm for Latent Dirichlet Allocation Yee W. Teh, David Newman and Max Welling Published on NIPS 2006 Discussion.
CSE 20: Discrete Mathematics for Computer Science Prof. Shachar Lovett.
Week 9 - Monday CS 113.
Oleg Zaikin, Alexander Semenov, Mikhail Posypkin
Prime and Relatively Prime Numbers
The Largest Known Prime Number
Factoring RSA Moduli: Current State of the Art J
Computer Hardware Optimization
International Data Encryption Algorithm
Algorithms.
SAT/SMT seminar 18/02/2018 Computing multiple MUSes (Minimal Unsatisfiable Subformulas) and MSISes (Minimal Safe Inductive Subsets) Alexander Ivrii IBM.
From Use Cases to Implementation
Presentation transcript:

Lucas-Lehmer Primality Tester Presentation 1: Proposal Team: Nathan Stohs Joe Hurley Brian Johnson Marques Johnson

Applications, History Lucas-Lehmer is a test used to search for Mersenne Primes. Mersenne Primes are primes of the form 2^p – 1 Given p, will conclusively determine primality after p-2 iterations of the algorithm. Computationally heavy, but numbers tested independently, so easily distributable. Difficultly lies in choosing an implementation

Applications, contd. A hardware implementation of this algorithm is not going to save any lives. Why important then? Mersenne primes (found with this test) are the largest prime numbers we know of today. A pool of over 70,000 computers currently run an implementation of this algorithm, with aggregate performance peaking at 14 Teraflops. This is not intended to be a commercial product.

Algorithm Somewhat basic. Mp is Prime iff Simple iterative structure, with p iterations Includes modulo, squaring, arithmetic Need for fast squaring

Design Are we going to be able to beat a 4 GHz Pentium 4 implementing this algorithm in hand optimized assembly using FFTs for squaring? No. However, it would use much less power Design is limited by the maximum value of p which we want to test, due to squaring. Design scales quite nicely with max p

Flowchart Squaring operation will dominate the design in layout area Approx 10k-15k transistors Due to math constraints, will not require full blown divison Approx 4k-5k transistors Check for 0 residue on last iteration Arithmetic, registers, other controls Approx 3k transistors

Problems Will never be able to test untested numbers, at best an experiment for future work. A lot will depend on how we implement the squaring, leading too.. May be too easy! Backup plan is to use FancyMath™ to aid performance and make the project more “interesting”. Other ideas considered: Implementation of Blowfish Cipher