Information Security. Mark Stamp

Читать онлайн книгу.

Information Security - Mark Stamp


Скачать книгу
hoped, the Germans concluded that their codebook had not been compromised and continued to use it for sensitive messages throughout the war.

      2.4.3 Project VENONA

      The so‐called VENONA project [130] provides an interesting example of a real‐world use of the one‐time pad. In the 1930s and 1940s, spies from the Soviet Union who entered the United States brought with them one‐time pad keys. When it was time to report back to their handlers in Moscow, these spies used the one‐time pads to encrypt their messages, which were then sent. These spies were extremely successful, and their messages dealt with the most sensitive U.S. government secrets of the time. In particular, the development of the first atomic bomb was a focus of much of the espionage. The Rosenbergs, Alger Hiss, and many other well‐known traitors—and many who were never identified—figure prominently in VENONA messages.

      The Soviet spies were well trained and never reused the key, yet many of the intercepted ciphertext messages were eventually decrypted by American cryptanalysts. How can that be, given that the one‐time pad is provably secure? In fact, there was a flaw in the method used to generate the pads, so that, in effect, long stretches of the keys were repeated. As a result, many messages were in depth, which allowed for successful cryptanalysis of about 3000 VENONA messages.

[C% Ruth] learned that her husband [v] was called up by the army
but he was not sent to the front. He is a mechanical engineer
and is now working at the ENORMOUS [ENORMOZ] [vi] plant in
SANTA FE, New Mexico.
45 groups unrecoverable]
detain VOLOK [vii] who is working in a plant on ENORMOUS. He is a
FELLOWCOUNTRYMAN [ZEMLYaK] [viii]. Yesterday he learned that
they had dismissed him from his work. His active work in
progressive organizations in the past was cause of his dismissal.
In the FELLOWCOUNTRYMAN line LIBERAL is in touch with CHESTER [ix].
They meet once a month for the payment of dues. CHESTER is
interested in whether we are satisfied with the collaboration and
whether there are not any misunderstandings. He does not inquire
about specific items of work [KONKRETNAYa RABOTA]. In as much
as CHESTER knows about the role of LIBERALś group we beg consent
to ask C. through LIBERAL about leads from among people who are
working on ENOURMOUS and in other technical fields.

      

      Throughout the 20th century, cryptography played an important role in major world events. Late in the 20th century, cryptography became a critical technology for commercial and business communications as well, and it remains so today.

      The Zimmermann Telegram is one of the first examples from the last century of the role that cryptanalysis can play in political and military affairs. In this section, we mention a few other historical highlights from the past century, with an eye towards the modern development of cryptography as a scientific discipline. For more on the history of cryptography, the indispensable source is Kahnś book [61].

      Prior to the Japanese attack of 7 December 1941, the United States had restarted its cryptanalytic programs. The successes of allied cryptanalysts during the World War II era were remarkable, and this period is often seen as the golden age of cryptanalysis. Virtually all significant Axis cryptosystems were broken by the Allies and the value of the intelligence obtained from these systems is difficult to overestimate.

      In the Pacific theater, the so‐called “Purple cipher″ was used for high level Japanese government communication. This cipher was broken by American cryptanalysts before the attack on Pearl Harbor, but the intelligence gained (code named Magic) provided no clear indication of the impending attack. Japanś Imperial Navy used a cipher known as JN‐25, which was also broken by the Americans. The intelligence from JN‐25 was almost certainly decisive in the extended battle of Coral Sea and Midway, where an inferior American force was able to to halt the advance of the Japanese in the Pacific for the first time. The Japanese Imperial Navy was never able to recover from the losses inflicted during this crucial battle.

      In Europe, the German Enigma cipher (code named Ultra) was a major source of intelligence for the Allies during the war. It is often claimed that the Ultra intelligence was so valuable that Churchill decided not to inform the British city of Coventry of an impending attack by the German Luftwaffe, since the primary source of information on the attack came from Enigma decrypts [44]. Churchill was supposedly concerned that a warning might tip off the Germans that their cipher had been broken. That this did not occur has been well documented. Nevertheless, it was a challenge to utilize valuable Ultra intelligence without giving away the fact that the Enigma had been broken [12].

Скачать книгу