Entries Tagged "history of cryptography"

Page 8 of 11

NSA and the National Cryptologic Museum

Most people might not be aware of it, but there’s a National Cryptologic Museum at Ft. Meade, at NSA Headquarters. It’s hard to know its exact relationship with the NSA. Is it part of the NSA, or is it a separate organization? Can the NSA reclassify things in its archives? David Kahn has given his papers to the museum; is that a good idea?

A “Memorandum of Understanding (MOU) between The National Security Agency (NSA) and the National Cryptologic Museum Foundation” was recently released. It’s pretty boring, really, but it sheds some light on the relationshp between the museum and the agency.

Posted on August 5, 2010 at 6:36 AMView Comments

The Chaocipher

The Chaocipher is a mechanical encryption algorithm invented in 1918. No one was able to reverse-engineer the algorithm, given sets of plaintexts and ciphertexts—at least, nobody publicly. On the other hand, I don’t know how many people tried, or even knew about the algorithm. I’d never heard of it before now. Anyway, for the first time, the algorithm has been revealed. Of course, it’s not able to stand up to computer cryptanalysis.

Posted on July 13, 2010 at 7:21 AMView Comments

Bletchley Park Archives to Go Online

This is good:

Simon Greenish, chief executive officer of the Bletchley Park Trust, said the plan was for the centre’s entire archive to be digitised.

[…]

He said since the archive is so big nobody knows exactly what each individual document stored there contains.

However, the information they expect to dig out will definitely include communication transcripts, communiques, memoranda, photographs, maps and other material relating to key events that took place during the war.

He said: “We have many boxes full of index cards, which have lots of different messages on them. But this will be our chance to follow a trail and put the messages together so we can find out what they really mean.

It’ll be years before any documents actually get online, but it’s still a good thing.

Another article.

The Bletchley Park Museum really needs donations, if you’re so inclined.

Posted on June 8, 2010 at 6:30 AMView Comments

The History of One-Time Pads and the Origins of SIGABA

Blog post from Steve Bellovin:

It is vital that the keystream values (a) be truly random and (b) never be reused. The Soviets got that wrong in the 1940s; as a result, the U.S. Army’s Signal Intelligence Service was able to read their spies’ traffic in the Venona program. The randomness requirement means that the values cannot be generated by any algorithm; they really have to be random, and created by a physical process, not a mathematical one.

A consequence of these requirements is that the key stream must be as long as the data to be encrypted. If you want to encrypt a 1 megabyte file, you need 1 megabyte of key stream that you somehow have to share securely with the recipient. The recipient, in turn, has to store this data securely. Furthermore, both the sender and the recipient must ensure that they never, ever reuse the key stream. The net result is that, as I’ve often commented, “one-time pads are theoretically unbreakable, but practically very weak. By contrast, conventional ciphers are theoretically breakable, but practically strong.” They’re useful for things like communicating with high-value spies. The Moscow-Washington hotline used them, too. For ordinary computer usage, they’re not particularly practical.

I wrote about one-time pads, and their practical insecurity, in 2002:

What a one-time pad system does is take a difficult message security problem—that’s why you need encryption in the first place—and turn it into a just-as-difficult key distribution problem. It’s a “solution” that doesn’t scale well, doesn’t lend itself to mass-market distribution, is singularly ill-suited to computer networks, and just plain doesn’t work.

[…]

One-time pads may be theoretically secure, but they are not secure in a practical sense. They replace a cryptographic problem that we know a lot about solving—how to design secure algorithms—with an implementation problem we have very little hope of solving.

Posted on September 3, 2009 at 5:36 AMView Comments

Sidebar photo of Bruce Schneier by Joe MacInnis.