home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky uk.misc:3164 alt.conspiracy:14622
- Newsgroups: uk.misc,alt.conspiracy
- Path: sparky!uunet!pipex!warwick!fulcrum!igb
- From: igb@fulcrum.co.uk (Ian G Batten)
- Subject: Re: Camilla-gate
- Message-ID: <C1F646.6wC@fulcrum.co.uk>
- Sender: news@fulcrum.co.uk
- Organization: Fulcrum Communications
- References: <1993Jan22.161524.20250@visionware.co.uk> <1993Jan25.103657.6071@infodev.cam.ac.uk> <JIM.93Jan25163902@hunter.cs.strath.ac.uk>
- Distribution: uk
- Date: Mon, 25 Jan 1993 17:04:54 GMT
- Lines: 16
-
- In article <JIM.93Jan25163902@hunter.cs.strath.ac.uk> jim@cs.strath.ac.uk (Jim Reid) writes:
- > conversation from interception by GCHQ or NSA. It would be reasonable
- > to assume that the resources of these organisations are capable of
- > breaking ANY encryption system available for public use. [If not, what
-
- One Time Pads. All you need is a good source of random bits --- I'm
- told that digitising the inter-station noise from an FM tuner and using
- the bottom bit of each sample is a good bet. Since replacing the bottom
- bit of each sample in an SPDIF bit-stream is not merely easy, but may
- actually IMPROVE the sound (*) you can simply send DAT tapes of
- home-recorded music to transmit the keys, and then later the data.
-
- (*) It would be like dithering, if the bits were random.
-
- ian
-
-