I INF 306 Lecture Notes - Lecture 2: 2015 San Bernardino Attack, Plaintext, Wehrmacht

57 views9 pages

Document Summary

Trust have: technology, like accepted residual risk, there is always some implicit level of trust you must, algorithms, developers, administrators, organizations, peers,b2b, regulators, authorities. Methods of message protection have been used since 1900bc: hardware, scytale, alberti cipher disk, jeffersonian disk, enigma: used by germans in ww2. Adopted by kriegsmarine in 1926, wehrmacht in "29. Http://www. advanced-ict. info/javascript/enigma. html: purple: used by the japanese in ww2. International traffic in arms regulations (itar: following the december 2015 san bernardino shooting, legislatures have looked at limiting personal use of encryption technologies, many international regulations exist. The system must be substantially, if not mathematically, undecipherable. The system must not require secrecy and can be stolen by the enemy without causing trouble. It must be easy to communicate and remember the keys without requiring written notes, and it must be easy to change or modify the keys with different participants. The system ought to be compatible with telegraph communication.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents