From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-0.1 required=5.0 tests=BAYES_00,FORGED_GMAIL_RCVD, FREEMAIL_FROM,PP_MIME_FAKE_ASCII_TEXT autolearn=no autolearn_force=no version=3.4.4 X-Google-Thread: a07f3367d7,1e5a2ccbf7bf6d0c X-Google-Attributes: gida07f3367d7,public,usenet X-Google-NewGroupId: yes X-Google-Language: ENGLISH,ASCII Path: g2news1.google.com!news1.google.com!npeer01.iad.highwinds-media.com!news.highwinds-media.com!feed-me.highwinds-media.com!nntp.club.cc.cmu.edu!feeder.erje.net!eternal-september.org!.POSTED!not-for-mail From: Warren Newsgroups: comp.lang.ada Subject: Re: Ada, Concurrency and Cryptography. Date: Mon, 21 Jun 2010 14:46:29 +0000 (UTC) Organization: A noiseless patient Spider Message-ID: References: Injection-Date: Mon, 21 Jun 2010 14:46:29 +0000 (UTC) Injection-Info: mx02.eternal-september.org; posting-host="9f8M0iN5t54V+4DF/iqO8g"; logging-data="7989"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18mZjx4IN1Dss5W0XAQoof7k0OZelFyU9k=" User-Agent: Xnews/5.04.25 X-Face: &6@]C2>ZS=NM|HE-^zWuryN#Z/2_.s9E|G&~DRi|sav9{E}XQJb*\_>=a5"q]\%A;5}LKP][1mA{gZ,Q!j Cancel-Lock: sha1:DfnkTnir6K9ijjqX7Fx74R+2MtM= Xref: g2news1.google.com comp.lang.ada:11856 Date: 2010-06-21T14:46:29+00:00 List-Id: adacrypt expounded in news:ab879ba9-12fb-4329-977e-248b7e856131 @u26g2000yqu.googlegroups.com: > I don�t profess to be very knowledgeable on the finer points of Ada�s > advantages so I will ask my question of more informed people and > hopefully get some guidance from some person. > > In the cryptography that I have invented my encryption program and > corresponding decryption program both work in much the same way so its > only necessary to describe one in order to ask my question. > > The encryption program (this will do) reads in a character from an > external batch file and encrypts it in between reading the next > character in the next pass of the same loop. ... > Question: If the encryption work was done in a separate CPU in another > location immediately after the character is read in would this speed > up the process very much. Google or read about Ada "tasks" (or "tasking"). There you will find out about the Ada support for concurrency ("threads"). Warren