Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Communications Privacy United States Technology

NSA's History of Communications Security — For Your Eyes, Too 52

Phil Sp. writes "Government Attic, those fine investigative pack rats, have outdone themselves this time. Just posted: a declassified NSA document entitled A History of Communications Security, Volumes I and II: The David G. Boak Lectures [PDF] from 1973 and 1981. This is an absolutely fascinating look into how the NSA viewed (views?) communications security and touches on all sorts of topics, including public key crypto, economics, DES, tamper-resistance, etc. It was seemingly from a collection of lectures to new employees. The first 85 pages are heavily redacted but the remaining 80 or so are largely intact. It even concludes with a cryptogram puzzle for the reader!"
This discussion has been archived. No new comments can be posted.

NSA's History of Communications Security — For Your Eyes, Too

Comments Filter:
  • by gurps_npc ( 621217 ) on Wednesday December 24, 2008 @03:18PM (#26225257) Homepage
    I was so hoping that they turned honest and revealed some errors. Never trust someone that refuses to admit they were wrong. If you can't recognize when you are wrong, you don't know when you are right.
  • Redacted, huh? (Score:3, Insightful)

    by CyberLord Seven ( 525173 ) on Wednesday December 24, 2008 @03:26PM (#26225315)
    Hmmmm. I will have to see if they screwed the pooch and made a mistake that has been so common lately with .PDF redactions.
  • by QuantumRiff ( 120817 ) on Wednesday December 24, 2008 @04:00PM (#26225603)

    You are correct, however, sometimes you don't want to know about bad algorithms.. or more accurately, you don't want your enemies to know that you've cracked their codes.

    Sometimes, things are just politically sensitive.. ie, We cracked the code, realized that country X placed a spy into country Y, we notified country Y, and the spy for country X had a tragic accident...

  • by SpaceLifeForm ( 228190 ) on Wednesday December 24, 2008 @04:25PM (#26225773)

    Yes.

  • by DerekLyons ( 302214 ) <fairwater@@@gmail...com> on Wednesday December 24, 2008 @06:26PM (#26226553) Homepage

    Given that all good security must be based on rigorous unbreakability, not secrecy

    That's commonly held belief of security amateurs. In reality, obscurity is a valuable tool in the arsenal of the security professional - because an attacker cannot be prepared to address a measure that he does know the existence of beforehand. For example - a visible set of VCR's in a place equipped with visible cameras... but they are dummies with the real ones (or a backup set) behind a nondescript door.
     
     

    the analytical powers of many eyes would have been useful

    The analytical power of many experienced and knowledgeable eyes - sure. But those eyes have clearances and access to the document. Just because the general public doesn't see it, doesn't mean that a lot of qualified people haven't.

  • by Vadim Makarov ( 529622 ) <makarov@vad1.com> on Thursday December 25, 2008 @01:02AM (#26228341) Homepage

    Interesting reading. Probably beyond average slashdotter's patience, hence so few comments to the story. I've found the history of TEMPEST being the most fascinating... discovered, forgotten, rediscovered, never fully eliminated but considered adequately handled given the threat level assessment. It left me wondering what the status of TEMPEST is with current electronic computing devices?

    According to the book itself (see p. 128 bottom), this disclosure should not even come close to define the lower bound of NSA's today's capabilities. Umm, impressive then.

Our business in life is not to succeed but to continue to fail in high spirits. -- Robert Louis Stevenson

Working...