I INF 306 Lecture Notes - Lecture 2: 2015 San Bernardino Attack, Plaintext, Wehrmacht
Document Summary
Trust have: technology, like accepted residual risk, there is always some implicit level of trust you must, algorithms, developers, administrators, organizations, peers,b2b, regulators, authorities. Methods of message protection have been used since 1900bc: hardware, scytale, alberti cipher disk, jeffersonian disk, enigma: used by germans in ww2. Adopted by kriegsmarine in 1926, wehrmacht in "29. Http://www. advanced-ict. info/javascript/enigma. html: purple: used by the japanese in ww2. International traffic in arms regulations (itar: following the december 2015 san bernardino shooting, legislatures have looked at limiting personal use of encryption technologies, many international regulations exist. The system must be substantially, if not mathematically, undecipherable. The system must not require secrecy and can be stolen by the enemy without causing trouble. It must be easy to communicate and remember the keys without requiring written notes, and it must be easy to change or modify the keys with different participants. The system ought to be compatible with telegraph communication.