[8442] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: NONSTOP Crypto Query

daemon@ATHENA.MIT.EDU (Dave Emery)
Sun Jan 14 23:51:16 2001

Date: Sun, 14 Jan 2001 02:03:58 -0500
From: Dave Emery <die@die.com>
To: Ray Dillinger <bear@sonic.net>
Cc: Ben Laurie <ben@algroup.co.uk>, John Young <jya@pipeline.com>,
        cryptography@c2.net
Message-ID: <20010114020358.F2398@die.com>
Reply-To: die@die.com
Mail-Followup-To: Dave Emery <die@die.com>, Ray Dillinger <bear@sonic.net>,
	Ben Laurie <ben@algroup.co.uk>, John Young <jya@pipeline.com>,
	cryptography@c2.net
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Pine.LNX.4.21.0101131154020.13365-100000@bolt.sonic.net>; from bear@sonic.net on Sat, Jan 13, 2001 at 12:11:13PM -0800

On Sat, Jan 13, 2001 at 12:11:13PM -0800, Ray Dillinger wrote:
> 

> 
> We hear low-frequency sounds when we type.  But have we ever checked 
> for high-frequency sounds outside of human hearing range?  I'd bet 
> a keyboard has a number of squeaks and ticks and twangs up there.
> I'd also bet that most of the keys, after a keyboard's broken in, 
> don't sound exactly alike -- wear and tear, typing patterns, etc. 
> You might be able to resolve ambiguities of interferometry by using 
> the sounds of the keys themselves. 
> 
> 				Bear

	For what very little it is worth, I have been told that this was
done quite sucessfully many many years ago with the old model 28
Teletype machines (anyone old enough to remember those ?) that made
quite characteristic noises as the typebox was positioned to print a
character (on a X, Y grid).   One can be sure that reading traffic from
the clatter of TTY machines was easier than a keyboard by interferometry
or key click sound signatures, but then the DSP required to do it was a lot
less readily available back then too...

	Model 28s were widely deployed by the US government by the way,
and often used to print crypto traffic.

> 
> 			
> 

-- 
	Dave Emery N1PRE,  die@die.com  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18



home help back first fref pref prev next nref lref last post