home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: alt.security
- Path: sparky!uunet!charon.amdahl.com!pacbell.com!sgiblab!zaphod.mps.ohio-state.edu!usc!hela.iti.org!lokkur!scs
- From: scs@lokkur.dexter.mi.us (Steve Simmons)
- Subject: Re: Tom Clancy, and whitenoise digital encryption
- Message-ID: <1992Nov6.175051.3401@lokkur.dexter.mi.us>
- Organization: Inland Sea
- References: <kdm1.720687667@Ra.MsState.Edu>
- Date: Fri, 6 Nov 92 17:50:51 GMT
- Lines: 23
-
- kdm1@Ra.MsState.Edu (Kenneth D. Mitchell) writes:
-
- >In the book _Sum of All Fears_ by Tom Clancy he mentions the CIA
- >using a cd containing random noise to encrypt data, I know this
- >is a good method to use, and I know Tom Clancy keeps his
- >details accurate but I was wondering if the CIA really uses this method.
-
- Something like this was used in military stuff sometime in the 70s.
- The general idea was to generate a series of pseudo-random bits. The
- series would not "repeat" or become less random for several days, and
- was restarted with a new key every day.
-
- The series would be broadcast continuously. Whenever a message was to
- be sent, the bits of the message would be xored onto the random bits.
- Recievers were in sync and generated the same sequence. They xored the
- sequence recieved with the generated sequence. The message would
- immediately appear.
-
- Advance apologies for inaccuracies; I heard this stuff over a lot of beer
- in a Navy bar back in the 70s.
- --
- "When Dexter's on the Internet, can Hell be far behind?"
- -- Steve Simmons, scs@lokkur.dexter.mi.us
-