• Cover Image

A History of U. S. Communications Security (Volumes I and Ii);1973

By: David G. Boak

...ral channels of voice with the same key generator. But just as in~ ..C881!_O!.~Je~ter secu­ rity devices. there was a need to move ciphony equipment o... ...on systems. you will recall, the move was into the communications center where all the ancillary devices and communications terminal equipment and pun... ...s called the TSEC/KY-l. The most striking feature it had. in contrast to its predecessor ciphony devices. was that it was neatly packaged in a single ... ...erceptorsfrom getting close enough todetectspace radiaticm easily). or 2. Operate.t least 10 TTY devices simultllDeoualy (the id. of m.. kiDg; putting... ... 1bc link was "secured" by a weak operations code; the messages were stereotyped, tbus oft'ering cryptanalytic opponunities, and their varying lengths... ...little change in numerical strength since its inception, dominated by liberal artists ellCCpt iq cryptanalytic work, tryin. to cope with tecbnoloBies ... ... four 5pecial Project,6ffic:es (5PO's}.t8ch with Division level stalUS. At the same time, the 51 cryptanalytic organization was ,pilt out to femn the ... ...out preliminary~tiCS - ~iSCovery of bow it works. ... . S bib / / . • . yste~ w c .have no known cryptanalYtic vulnerabilities may/still be explpited ... ...classification inhibits system use. ~ optimum attack on any cryptosystem (if you can back it) is cryptanalytic - you aeed only operate on cipher text;...

Read More