-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Does anyone have any knowledge of academic papers focused on methods
of detecting whether a crypto scheme has been compromised in situ or
on how to utilize intelligence gleaned from compromised cipher texts
without giving away that compromise to the enemy?

I'm thinking in terms of scenarios like how could the Nazis have
methodologically shown Enigma's compromise in a systematic manner; the
converse as well though: has there been research into scenarios
similar to the Allies and Enigma (i.e. how to not give the game away),
or has it all just been highly intuitive guesswork? It doesn't have to
be period sensitive, anything from Caesar to the recent would be helpful.

Regards,

Landon Hurley
- -- 
Violence is the last refuge of the incompetent.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBCgAGBQJPdmqgAAoJEDeph/0fVJWsfJIP/R91ImnBAngFTY/GuGZczPf+
oEktqqjhgH8CjCALj2rexzlQO9+B61tTt9PZwpwVihpKtWBwpz9VnIIhoNfDsVYO
XXLPF/o+w5TOmCB+gSVufn7Ui6B6WGlkeLLCudRG48S5/bHvJW/qGjuchJnMoWz7
JiFJBvleIzUYn0lEwlx88ZvmuKSLrUOYos5wV+eIj8fL/Ff1g2xjhOJXytFVastk
X8tQWvSOA7tOxfF+1qLh7289rGfML/0ybdcxfAl7jLylMKqN4VGydrZeDUWJhuIc
fflEpMHSZNvlQYRpxRFLCdLqMO/r5wiX4+hpFKI1KXYhA3doQYcuVDwK1VpZ5Vxg
wG9x64qIWtY0wtf4nY1JNBJMMLHyWIyfPHfaoG+w402P3UuPX2wTV3tcpztg+20W
Ob8i4Sgym9HML5NgOG5YFWVWFnRdi/eSfImURGL7rCCmt51OJRf42sBfPHez3MOe
3SwG8xffAOolG/MYI7zpuIPOuHV/gQUuC9tb+zpVejESt1NbnK4l3MrNo0ykF2cg
tO5uZttEN/8fN4xYyibRPw+USYQlxq2QfRxbeAVWx4mRT9SBqcDRwnkbP9tN1agN
psMDPG8LYeDIvPf+T0nrDVBownqKKmZkdoJwGwuwohn+eClWr5cvfWSFhaGgXuaM
B4McgutpVvqhYgNP+dQ3
=268b
-----END PGP SIGNATURE-----
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to