Welcome to European Tribune. It's gone a bit quiet around here these days, but it's still going.
Display:
I was thinking more about the virus, though I admit that was not very clear.

Sweden's finest (and perhaps only) collaborative, leftist e-newspaper Synapze.se
by A swedish kind of death on Tue Nov 29th, 2011 at 03:50:12 PM EST
[ Parent ]
Protecting a communications channel from being hacked is a simple process IF you implement hardware security and adequate software handshaking protocols, e.g., 'offset' the data within the binary word by some number of bits and AND off the NULL ones.

(Naturally you'll have to know assembler language to do this ... which you young uns generally don't :-p)

(lol)


She believed in nothing; only her skepticism kept her from being an atheist. -- Jean-Paul Sartre

by ATinNM on Tue Nov 29th, 2011 at 04:21:19 PM EST
[ Parent ]
Won't (always) work if your hacker has identical hardware and knows your algorithms.

Absolute security is a Very Hard Problem. Real security is always an affordable trade-off between absolute security and cash.

And didja know that some IBM (and likely other) mainframes include built-in encryption hardware?

by ThatBritGuy (thatbritguy (at) googlemail.com) on Tue Nov 29th, 2011 at 05:53:07 PM EST
[ Parent ]
The hardware can be protected if they are kept physically safe and the schematics and assembly procedures are burned after the production run.

There's all kinds of games you can play with the software: data binary word length, binary word placement, algorithm cycling, synch/desynch on the transmissions, burst/stream transmissions, wide band/narrow band, etc. etc. etc.  

I wouldn't trust any generally available encryption programs.  If they are a usual part of the IBM software then they can be cracked if enough resources are thrown at the problem.  

Despite everything, above, One Time Pads are the only way to go if you want to ensure security.


She believed in nothing; only her skepticism kept her from being an atheist. -- Jean-Paul Sartre

by ATinNM on Tue Nov 29th, 2011 at 06:22:01 PM EST
[ Parent ]
Assuming no one steals your OTP...
by ThatBritGuy (thatbritguy (at) googlemail.com) on Tue Nov 29th, 2011 at 06:25:58 PM EST
[ Parent ]
They'd have to steal them, copy them and reinsert them into your logistics before you notice they're gone.

Possible, in theory, but if the other guys can pull that stunt then your organisation is either so hopelessly compromised or crushingly incompetent that somebody stealing your bombs mid-flight is not the greatest of your concerns.

- Jake

Friends come and go. Enemies accumulate.

by JakeS (JangoSierra 'at' gmail 'dot' com) on Tue Nov 29th, 2011 at 06:55:21 PM EST
[ Parent ]
Keeping stuff physically safe is pretty hard in a combat environment. See how the Soviets got hold of the Sidewinder technology...

Un roi sans divertissement est un homme plein de misères
by linca (antonin POINT lucas AROBASE gmail.com) on Wed Nov 30th, 2011 at 05:04:18 AM EST
[ Parent ]
Meteor Scatter Telemetry is harder to intercept, works even if satcoms get busted, and is way way cheaper.

You can't be me, I'm taken
by Sven Triloqvist on Thu Dec 1st, 2011 at 01:32:49 AM EST
[ Parent ]

Display:

Top Diaries

Occasional Series