home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!pmafire!news.dell.com!natinst.com!cs.utexas.edu!usc!zaphod.mps.ohio-state.edu!sample.eng.ohio-state.edu!purdue!mentor.cc.purdue.edu!noose.ecn.purdue.edu!samsung!transfer.stratus.com!ellisun.sw.stratus.com!cme
- From: cme@ellisun.sw.stratus.com (Carl Ellison)
- Newsgroups: sci.crypt
- Subject: Re: New ENcryption - a Challenge
- Message-ID: <1erbtmINN52q@transfer.stratus.com>
- Date: 23 Nov 92 19:37:26 GMT
- References: <n0ef1t@ofa123.fidonet.org> <By2tCs.LIL@cs.dal.ca> <24267@alice.att.com>
- Organization: Stratus Computer, Software Engineering
- Lines: 30
- NNTP-Posting-Host: ellisun.sw.stratus.com
-
- In article <24267@alice.att.com> reeds@alice.att.com (Jim Reeds) writes:
- >Indeed, to an outsider, a challenge problem of form "here is cipher text,
- >please supply plain text and description of crypto algorithm" is eminently
- >reasonable. Is this not what Friedman & company did when faced with
- >their first Purple traffic?
-
-
- That's almost the story. They had plaintext and matching ciphertext.
- They also knew the technology available. They assumed rotor machines
- but soon ruled that out -- stumbled on stepping switches by happy
- accident.
-
- Those incidents make good stories.
-
- Friedman and company were employed, full time, to do this. They spent
- several years at it. They succeeded.
-
- If they had failed, that would not mean that the system was secure.
- It would only mean that they had failed, so far.
-
-
- If they had had a captured machine with operations manual (and maybe some
- old key sheets) and still couldn't break any new traffic, *that* would
- have meant that the system was secure.
-
- --
- -- <<Disclaimer: All opinions expressed are my own, of course.>>
- -- Carl Ellison cme@sw.stratus.com
- -- Stratus Computer Inc. M3-2-BKW TEL: (508)460-2783
- -- 55 Fairbanks Boulevard ; Marlborough MA 01752-1298 FAX: (508)624-7488
-