2000
DOI: 10.1080/02684520008432616
|View full text |Cite
|
Sign up to set email alerts
|

Fighting for relevance: Economic intelligence and special operations executive in Spain, 1943–1945

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Note that each sequence is delineated by a repeated character; there are no conflicts where the same letter appears in the same place in both sequences (this would be a contradiction, implying both zero and non-zero values for the multiplier m); and there are confirmations within the sequences-L in the first sequence occurs at positions corresponding with A in the second. 33 The practice of double-or multiple-stepping of the machine as a security measure is not mentioned in Kryha's 1925 operating instructions, though an example is given of enciphering differing numbers of spacing characters in between words, and indeed of enciphering a spacer before the first word of a message, but without discussing the improved security that would be obtained by stepping the machine some agreed number of times whenever a word-spacer is encountered. The manufacturer's recommendation of the use of such ''letters of influence'' in their 1951 advertising brochure is mentioned in ([10] p. 162), but in fact the technique is mentioned as early as the marketing materials from 1926 [12].…”
Section: Solution From Known Plaintextmentioning
confidence: 96%
See 2 more Smart Citations
“…Note that each sequence is delineated by a repeated character; there are no conflicts where the same letter appears in the same place in both sequences (this would be a contradiction, implying both zero and non-zero values for the multiplier m); and there are confirmations within the sequences-L in the first sequence occurs at positions corresponding with A in the second. 33 The practice of double-or multiple-stepping of the machine as a security measure is not mentioned in Kryha's 1925 operating instructions, though an example is given of enciphering differing numbers of spacing characters in between words, and indeed of enciphering a spacer before the first word of a message, but without discussing the improved security that would be obtained by stepping the machine some agreed number of times whenever a word-spacer is encountered. The manufacturer's recommendation of the use of such ''letters of influence'' in their 1951 advertising brochure is mentioned in ([10] p. 162), but in fact the technique is mentioned as early as the marketing materials from 1926 [12].…”
Section: Solution From Known Plaintextmentioning
confidence: 96%
“…The ability to use isomorphisms as an entry point into this traffic was critical, since the correspondents had by then adopted the autokeying practice of double-stepping the machine when enciphering word-spacing characters, rendering infeasible the attacks described so far. 33 …”
Section: P Marksmentioning
confidence: 97%
See 1 more Smart Citation