TITLE

A spy's guide to chaos

AUTHOR(S)
Lesurf, J.
PUB. DATE
February 1992
SOURCE
New Scientist;2/1/92, Vol. 133 Issue 1806, p29
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Discusses how random noise has been used to send encode messages during the 20th century and a new technique that will give spies a new and more powerful tool. The system that has been used; The method of encryption algorithm; Disadvantages to these methods; Description of the technique that uses chaotic electrical circuits. INSET: 1: Unpredictability and the meaning of noise.;2: Perfect boxes....
ACCESSION #
9202175108

 

Related Articles

  • Secret signals. Bandrapalli, Suman // Christian Science Monitor;1/7/97, Vol. 89 Issue 29, p16 

    Presents information on the origins of secret messages. Examination of `pig Latin'; Messages as codes; Citing of cipher codes; History of message codes. INSETS: Flag messages date back to ancient times.;Make your own code wheel..

  • Codemaster. Miller, Marvin // Boys' Life;Jul2003, Vol. 93 Issue 7, p52 

    Presents a step-by-step instruction for making secret messages.

  • THE VANISHING MESSAGE.  // Boys' Life;Jul2003, Vol. 93 Issue 7, p52 

    Presents a step-by-step instruction for making secret messages.

  • Route to royalties.  // Aviation Week & Space Technology;7/6/1992, Vol. 137 Issue 1, p13 

    Says the Air Force is seeking its first ever international patent for its narrowband digital multi-speaker conferencing system, that was developed by Rome Laboratory, Hanscom AFB, Mass. Funded by Intelligence Communications Cryptologic Support Center, Kelly AFB, Texas, the system uses digital...

  • POCSAG messages.  // Popular Electronics;Mar97, Vol. 14 Issue 3, p60 

    Discusses the POCSAG way of transmitting messages that is always preceded by a preamble to accommodate battery-saving functions in pagers. Three types of data codeword; Capcode; Use of codeword for receiving messages; Use of BCH code; Different methods to be used for correcting erroneous bits.

  • Beating the code breakers. Ekert, Artur // Nature;7/2/1992, Vol. 358 Issue 6381, p14 

    Discusses the work of Charles Bennett of IBM Research which shows how interference of very dim light pulses can be used in practice for what cryptologists call key distribution. Quantum cryptography; Details of Bennett's proposed apparatus; Unbreakable ciphers called one-time pads; Quantum...

  • DINGBAT CIPHER.  // Thema;Summer2013, Vol. 25 Issue 2, p118 

    A quiz related to cipher, symbols and alphabets is presented.

  • Key Terms in Cryptography. Marshall, Donis // Database & Network Journal;Aug2003, Vol. 33 Issue 4, p6 

    Provides some key terms and phrases in cryptography. Symmetric and asymmetric keys; Initialization vector; Cipher text; Key length; Steps for creating and sending a digital signature with a message.

  • Top secret. Costello, M. // Highlights;Sep89, Vol. 44 Issue 8, p34 

    Gives instructions for creating secret codes.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics