[6464] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: How old is TEMPEST? (was Re: New Encryption Regulations have

daemon@ATHENA.MIT.EDU (Antonomasia)
Mon Jan 24 14:14:34 2000

Date: Mon, 24 Jan 2000 14:15:04 GMT
From: Antonomasia <ant@notatla.demon.co.uk>
Message-Id: <200001241415.OAA18824@notatla.demon.co.uk>
To: cryptography@c2.net, reinhold@world.std.com

"Arnold G. Reinhold" <reinhold@world.std.com>:

quoting David Kahn's "The Codebreakers" (1967):

> "... the department budgeted $221,400 in 1964 for 650 KW-7's. ... The
> per-item cost of $4,500 may be due in part to refinements to prevent
> inductive or galvanic interaction between the key pulses and the
> plaintext pulses, which wire tappers could detect in the line pulse
> and use to break the unbreakable system through its back door. "
> 
> This would be the electro-mechanical equivalent of TEMPEST and
> suggests that NSA was well aware of the compromising potential of
> incidental emanations long before the computer communications era.

This seems to refer to the problem of sending key and/or plaintext
alomg the communications channel intended to carry only ciphertext.
I seem to remember reading that this allowed allied reading of East German
cable messages tapped in the 1950s (operation Prince ? Karlshorst tunnel ?).

A quick web search turns up this,  which may be what I'm thinking of.
http://www.fas.org/irp/facility/cia_germany.htm

--
##############################################################
# Antonomasia   ant@notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
##############################################################


home help back first fref pref prev next nref lref last post