Punched tape

form of data storage

Punched tape is a medium for data storage. It is made of a long strip with holes in it. The holes are used to represent information. The principle is the same as that of a punched card, except that the length is variable. Punched tape was widely used in the 1950s and 1960s, but was later replaced by other media. Punched tape was first used to program looms, in the 18th century. Similar looms are still used for weaving Tartans, but the punched tape is made of metal platelets today. Another use of punched tape is in barrel organs.

Five hole and eight hole punched tape.
Punched tape made of Mylar, for industrial applicatons, 1979. Mylar is more robust than paper.

20th century teleprinters also use punched tape. Herman Hollerith used punched tape for a census, in 1890. Gilbert Vernam, a telecommunication engineer developed the Vernam cipher in 1917. This cipher could be used with punched tape. Vernam combined a character of the punched tape, with one of a key, to give the encoded character. Combining the ecoded character with the key again gives the plain text. This is in fact an exclusive disjunction, even though Vernam used a different name. It was an automated one-time pad. The NSA has called this patent "perhaps one of the most important in the history of cryptography."[1]

Formats change

There are different formats for punching tapes. Today, two formats are left, which are mechanically compatible. One is used in Telex and early computing applications. The strip is 17.4 millimetres (0.69 in) wide, and has five positions, plus a row that serves for feeding, and is always punched. The feeding row is between positions three and four. Data positions use a quadratic raster of a width of 2.54 millimetres (0.100 in). The other format is mainly used in computing. The strip is 25.4 millimetres (1.00 in) wide, and has eight positions. Like the other format, the feeding row is between holes three and four. Both formats save ten rows of data (or characters) on a length of 25.4 millimetres (1.00 in). If the 5 position strip is put on top of the 8 position one, the first five holes (and the feeding row) have the same position. Thi means that a reader which is capable of reading 8-position tape can also read 5-position tape. There are devices which can output both formats.

It is possible to encode 256 different characters on an 8 hole tape, the five hole tape can hold 32 different characters. The Baudot code which is used for encoding has two special characters that allow to switch between two halves of a code. This means that the five position punchtape can encode 59 different characters.

Advantages change

Punched tape has some advantages:

  • It is robust. Punched tape can be read decades later, if special paper, or mylar is used. This is not the case of storage relying on magnetism.
  • The hole pattern can be decoded visually, if necessary. There are special devices that can repair torn tape. Editing is possible with a pair of scissors, and some glue to paste or cut holes.
  • Punched tape is not influenced by magnetic fields. This is important in an environment full of electronic devices which all need to work properly.
  • Punched tape is easy to destroy, if made of paper. This is important for cryptography. There is special paper, that is modified so that it burns better.

Disadvantages change

Punched tape had gone out of use by the end of the 20th century, replaced by new technology for these reasons:

  • Reliability: When tape was copied, very often, the copies needed to be compared, hole by hole.
  • Rewinding the tape is difficult, and often caused problems. Some systems used folded paper. This could simply be fed in the other direction to rewind.
  • Low information density: Data that is bigger than a few dozen kilobytes becomes impractical to handle.

References change

  1. Klein, p. 3 "Vernam had invented the unbreakable cipher: "one-time tape" (OTT) for on-line TTY encryption. In 1919 he was granted a patent, perhaps one of the most important in the history of cryptography."
  • Klein, Melville. "Securing Record Communications: The TSEC/KW-26" (PDF). Archived from the original (PDF) on 2012-03-15. Retrieved 2012-04-12.