HomepageCyberwarCybersecurityCyberspaceC-SpionageC-SabotageGefährdungKriminalitätComputerKommunikationmod. SystemeDer MenschBeratungBildungFachberichteInformationKryptologieEmissionVerschlüsselungForschungBegriffeRechtTechnikVerschiedenes
losses---- Chiffriertechnik---- Chiffrier- od. Schlüsselmittel---- Kompromittierung----
General remarks
losses
crypto technology
key resources
decryption
compromise
return

A ship will come ...
This line of text of an old German folk could stand on one of the longest slump in time to a cipher.

The event was hotly debated in the end-sixties of the last century. Much has been written about it. But the recent publication written by the US-American journalist Bramford ("NSA"). There they will find described the event. With the representations of the American NSA, as well as the beneficiaries, the former Soviet Union.
Despite this time span of about 42 years, the causes are still relevant today.

The causes of this event is not inherent in cryptology, but within the organization and use of cryptographic methods and means.
The cryptographic strength of the cipher is beyond all criticism.
However, in order to achieve a break-in takes a cipher is an encryption device and the current key resources.

Through the application of the "Pueblo" by North Korean forces them was ever a cipher KW - 7,  KW - 37 and KG - 14 in the hand. Whether this also means these included key, left open in the display. This was the beneficiary of this Chiffriertechnik only of secondary importance, as they pass through a "self-provider," a Mr. Walker, were supplied with current key resources.

This was the Soviet Union over a period of three to four times as long as was how the solution of the "Enigma", supplied with time-to-date information from strategic to tactical level. Because they did not know the current key to determine, they had indeed bereits.br /> In addition, changes to the Chiffriertechnik for they were not a problem, they got them to fix them.

The simple cause of this disaster was only to minimize the risk of losing a cipher system.

Yet they were beneficiaries of such an event during World War II, there was also the same cause. This was just a "code book"!
Maybe they have not noticed, but other "services" at their "information" interested. They also provide information about their "free". Their "PIPS" is full of information, even if they think they have deleted this information. You want to know what "Pips" are, it stands for "portable information system package." It includes all portable systems for communication, processing, storage. Visualization (still image, video) information at the interface between the cybernetic space and the people.
That's why this event was considered under the present conditions.