-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Does anyone have any knowledge of academic papers focused on methods of detecting whether a crypto scheme has been compromised in situ or on how to utilize intelligence gleaned from compromised cipher texts without giving away that compromise to the enemy?
I'm thinking in terms of scenarios like how could the Nazis have methodologically shown Enigma's compromise in a systematic manner; the converse as well though: has there been research into scenarios similar to the Allies and Enigma (i.e. how to not give the game away), or has it all just been highly intuitive guesswork? It doesn't have to be period sensitive, anything from Caesar to the recent would be helpful. Regards, Landon Hurley - -- Violence is the last refuge of the incompetent. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCgAGBQJPdmqgAAoJEDeph/0fVJWsfJIP/R91ImnBAngFTY/GuGZczPf+ oEktqqjhgH8CjCALj2rexzlQO9+B61tTt9PZwpwVihpKtWBwpz9VnIIhoNfDsVYO XXLPF/o+w5TOmCB+gSVufn7Ui6B6WGlkeLLCudRG48S5/bHvJW/qGjuchJnMoWz7 JiFJBvleIzUYn0lEwlx88ZvmuKSLrUOYos5wV+eIj8fL/Ff1g2xjhOJXytFVastk X8tQWvSOA7tOxfF+1qLh7289rGfML/0ybdcxfAl7jLylMKqN4VGydrZeDUWJhuIc fflEpMHSZNvlQYRpxRFLCdLqMO/r5wiX4+hpFKI1KXYhA3doQYcuVDwK1VpZ5Vxg wG9x64qIWtY0wtf4nY1JNBJMMLHyWIyfPHfaoG+w402P3UuPX2wTV3tcpztg+20W Ob8i4Sgym9HML5NgOG5YFWVWFnRdi/eSfImURGL7rCCmt51OJRf42sBfPHez3MOe 3SwG8xffAOolG/MYI7zpuIPOuHV/gQUuC9tb+zpVejESt1NbnK4l3MrNo0ykF2cg tO5uZttEN/8fN4xYyibRPw+USYQlxq2QfRxbeAVWx4mRT9SBqcDRwnkbP9tN1agN psMDPG8LYeDIvPf+T0nrDVBownqKKmZkdoJwGwuwohn+eClWr5cvfWSFhaGgXuaM B4McgutpVvqhYgNP+dQ3 =268b -----END PGP SIGNATURE----- _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography