home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: alt.security
- Path: sparky!uunet!hela.iti.org!lokkur!scs
- From: scs@lokkur.dexter.mi.us (Steve Simmons)
- Subject: Re: Tom Clancy, and whitenoise digital encryption
- Message-ID: <1992Nov12.044149.9355@lokkur.dexter.mi.us>
- Organization: Inland Sea
- References: <4142@bcstec.ca.boeing.com> <1992Nov11.171509.14350@unislc.uucp>
- Date: Thu, 12 Nov 92 04:41:49 GMT
- Lines: 24
-
- erc@unislc.uucp (Ed Carp) writes:
-
- [[ various stuff excised, which cause me to write ]]
-
- >: >The series would be broadcast continuously. Whenever a message was to
- >: >be sent, the bits of the message would be xored onto the random bits.
- >: >Recievers were in sync and generated the same sequence. They xored the
- >: >sequence recieved with the generated sequence. The message would
- >: >immediately appear.
-
- >This method was widely used, even back in the 60's, by the military, even over
- >lines considered "tamper-proof" (using such methods as pressurizing the comm
- >cables with nitrogen, then setting an alarm if the pressure dropped). But how
- >would this technique affect your long-distance bills? If the line is connected
- >all the time (leased), it doesn't matter if what's going down it is white noise,
- >no noise, or data.
-
- The person who described the system said it was being done with radio
- broadcast. Given channel availability, probably not many sites were
- doing it. This person was on a flagship getting traffic for the whole
- fleet and was recieve-only.
- --
- "When Dexter's on the Internet, can Hell be far behind?"
- -- Steve Simmons, scs@lokkur.dexter.mi.us
-