2017
DOI: 10.3917/books.084.0049
|View full text |Cite
|
Sign up to set email alerts
|

Les poisons du KGB

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Noskeno, who defected to the United States in 1964, did report that there were 'some successes' in decrypting British communications but he could not remember any specific examples and may not have been referring to machine encrypted diplomatic traffic. 68 It is possible though to examine the ways in which foreign intelligence services (and especially the KGB) might have attacked the ciphers and look for any obvious failings in British cryptographic security. There were three main approaches that an intelligence service could have taken at this time: it could intercept British diplomatic telegrams and seek to solve the cipher through pure cryptanalysis, applying mathematical techniques and linguistic analysis; it could try to obtain the cipher machines and cryptographic materials, such as key lists and key tapes.…”
mentioning
confidence: 99%
“…Noskeno, who defected to the United States in 1964, did report that there were 'some successes' in decrypting British communications but he could not remember any specific examples and may not have been referring to machine encrypted diplomatic traffic. 68 It is possible though to examine the ways in which foreign intelligence services (and especially the KGB) might have attacked the ciphers and look for any obvious failings in British cryptographic security. There were three main approaches that an intelligence service could have taken at this time: it could intercept British diplomatic telegrams and seek to solve the cipher through pure cryptanalysis, applying mathematical techniques and linguistic analysis; it could try to obtain the cipher machines and cryptographic materials, such as key lists and key tapes.…”
mentioning
confidence: 99%