December 1986
Total Page:16
File Type:pdf, Size:1020Kb
eclassified and A [xoved for Release by NSA on 10-17-2012 pursuant to E.O. 13526, MDR Case # WUJ'i]V£!JWUJI1 f515(Bl!JWVU~ £iJlB15W~~ (rI:DWV lB15I:DWlB15 lB~ WlUiJlDl! f W~~~l1U11I1ID [Brn~I1UI]l1l]rn DECEMBER 1986 .L. 86-36 TECHNOLOGY SEEPAGE (U) .. • .1 WHO IS SHE? (U) ••••• .9 CRYSCOM (UJ •.••..• .9 QUOTE WITHOUT COMMENT (U) 10 THE LANGUAGE IDENTIFICATION PROBLEM (U) ~----4~1. 11 PRODUCT vs PROCESS (UJ .....• 18 CHANGING JOBS (U) ...•...• I. 21 ODE TO THE CA INTERN PROGRAM (U). 23 A COMPOSITE CONVERSATION (UJ. L.,.,--.".,.,..,....---......J1 . 24 BOOK REVIEW (UJ •.. • Vera Filby. • 26 CONFERENCE REPORT (UJ . L.I ---II. 29 LETTER (UJ . 31 OPPORTUNITY (U) . 32 BULLETIN BOARD (UJ .. 33 CISI CONFERENCE (U) . 33 THE STORY OF A PRIVATE GERMAN CIPHER (U). .1 f . 34 NSA-CROSTIC No. 63 PLUS (U) ..•...• .I I. 36 IIAtdDlE li'IA (SMitH (I IANtdELS ONLY CLASSIFIED BY r~SA/€SSM 123 2 DEClASSll=Y ON: OFi~inatin~ NOT RELEASABLE TO CONTRACTORS A~eAeY'5 DeterA"liAatieA ReEtl::lirea DOCID: 4033692 Published by PI, Techniques and Standards VOL. XIII, No. 12... '" ................. December 1986 JULIA CHILD, WHERE ARE YOU? (u) PUBLISHER, ..•.......••.. ,.. ",·:::·1,-- ....,.... What this agency needs is a Julia Child to l?@,~ •. 86:- 3 6 BOARD OF EDITORS demystify personal computers. EditOr :>, .... :::.<., ..... ::~I'-- ....l963-11 03) Consider what she did for French haute cuisine: (Oll~ctio"'~ > :: :1 (963-5877) she brought it within the ken ofany American who Cor;,P\JterSy~tems.::.. ..;1 (963-1103) Cryptanatysis. , .::1 (963-5238) could read. Cryptolingtltstics.>, .. ,.: 1 963-1596) Index <: . ':::" J 1963-5292) How? Very simply, she wrote a step-by-step Information$ciefl:(e 1 1(963-1145) InformationSe~t.Jrity:,:, Georae F. Jelen 1859-1211b) handbook with ample illustrations and explanatory Intelligence I'lesear.ch ., .:1 1963-3845) notes, all in an informal, joyous, and encouraging Language ... , .. ,.. , ..1 (963-3057) Mathematics ..\., .\.:, f (963-5566) tone. Now there's a whole generation who never (96~-6430) Puzzles. ..... .. : :., J knew that French haute cuisine was once the Science and Technology \,.1 968-8075) Special Research :, .. : Vera R. Filby (968-8014) exclusive preserve ofa select group ofthe anointed. Traffic Analysis :, :.Robert J. Hanyok (963-5734) What is odd about personal computers is that they . Illustrators ,, "f'".;.;...J.J k963-3490) ....................... L-- ~963-6211) were intended, as the name rather suggests, to be used by anybody. It's not working out that way because the user's manuals are poor. Scan the To submit articles or fetters by mail, send to: business pages of the local newspapers some Editor, CRYPTOLOG, Pl, HQ 8A187 time-you'll see that enterprising people have If you used a word processor, please'include the recognized this and are profiting from it by offering mag card, floppy or diskette along with your live-in seminars and other courses. And at a price! hard copy, with a notation as to what equip mghway robbers! ment, operating system, and software you used. via PLATFORM mail, send to: It would be advantageous to develop a handy-dandy NOTE CHANGE: (r y p t I 9 at barlc05 (bar-one-c-zero-five) . for personal computers and maybe software as well, (note: no 'o's in cry p t I g) to be issued by the PCIC along with the hardware Always include your·full name, organization, and and software. As it is, many terminals are unused secure phone number. (or underused, solely as word processors) for lack of understandable instructions. So, in the interest of productivity-think of those For Change of Address hours spent grumbling as well as trying to cope-it mail name and old and new organizations to: Editor, CRYPTOLOG, PI HQ 8A187 behooves Somebody Up There to commission a I Please do not phone. cookbook-type handbook to personal computers. And when it's published, please send us a copy. Contents of CRYPTOLOG should not be reproduced or disseminated outside the National Security Agency without the permission of the Publisher. Inquiries regarding repro ~~ duction and dissemination should be directed to the Editor. 1"01( OI"I"IGIAI Y~J\ O~L¥ DOCID: 4033692 P .. L. 86-36 _____Ipll P.L. 86-36 December 1986 * CRYPTOLOG * page 1/ SB6IW'P ./ ~.OT RELL'\S,\BLE TO EOPHRAETORS EO 1.4. (c) IIA?WU3 YlkOOMHtf' OII:MHfBLS ONL'l·L. 86-36 DOCID: 4033692 SHORE'f'· / December 1986 * CRYPTOLOG * page 2 P.L. 86-36 SB6R8'P r~OT EO 1.4. (c) RELEASABLE TO COfHRAeTORS HANDLE VIA eOMHff' eIIA~H,ELS ONLY DOCID: 4033692 \ FREQUENCY HOPPING, VARIABLE DWELL',TIr,tlES \-'--Af ......--------.... ~ -,-- -- C3 ;/jI~ tl P.L. 86-36 F EO 1. 4 . (c) R E Q (r u E N -------- ~- ,C Y / C3 \1 \ ~- ~ -~,r-· ~ 1111111111111111111111111111111I11111111111111111111111IIIllIIII TIME spreading code used by the' target radio is POLICY ON CONTROLLING RESEARCH known, substantially less power is needed to jam its signal. If the spreading code consists of a relatively short recursive sequence, recovery can be made by exhaustive hypothesis testing techniques. Research to develop exhaustive methods of recovering short spreading codes would be unlikely to uncover sensitive algorithms. Longer sequences, such as those above the R20 level, cannot be recovered quickly today by exhaustive testing. To succeed against them, algorithms that parallel those used in extremely sensitive cryptanalytic (D) There is no policy that requires the attacks would have to be developed, services or other government agencies to ~he services' requirements are genuine and coordinate with us before initiating spread critical to their mission. They do need a spectrum research. Our knowledge of some capability to intercept or to jam spread projects was acquired by chance. We have no spectrum signals in a tactical environment. way of gauging what portion of the total non There are some who question whether Agency spread spectrum research and predictive jammers or non-exhaustive spreading development of a cryptologic nature these code recovery systems are the best - or even projects represent. It would take a gigantic, viable - ways to provide these capabilities. The manpower-intensive effort to uncover and track services, however, assert that such equipments all such projects, and, in the current climate, it are vital to fulfilling their mission. And they would be awkward to do it. have the independence, the will, and the money (D) Fortunately, none of the research that has to pursue development. surfaced to date really qualifies as a "smoking gun." But as the number and sophistication of December 1986 * CRYPTOLOa * page 3 SEeRE~ PWT RELEASABLE TO EOPHRAETORS IIAP'WL6 VIA GOMHff' CHAUUELS 0r4'Pt P.·L. 8636 DOCID: 4033692 EO 1.4. (c) Direct sequence spread spectrum (U) Such a policy statement was drafted and :signals are those for which the carrier is presented to DoD. It was never adop~ed. The :modulated by a digital code sequence prevailing opinion is that our presentation to :whose bit rate is much higher than that of DoD was handled awkwardly. This failure to :the information signal. The application of • "grease the skids" reduced severely the chances :this spreading code spreads the signal across: of the policy being accepted. Some people, :a broad bandwidth. The intended receiver . however, believe that no matter how well it :of the signal knows the spreading code and had been presen.ted, prospects for adoption of :uses that knowledge to collapse the signal • the policy were slim. The military services are :back to its orginal form. To intercept or certain to view such a policy as an attempt to :jam the signal effectively, the spreading invade their domains, and they are zealous and :code must be recovered. The binary streams effective in protecting what they deem to be :used to spread the signal can be generated • their turf. :in a number of ways. The use of shift :registers is a common method of :generating these streams. Frequency hoppers, as the name :suggests, hop from frequency to frequency :within a prescribed set. Hopping rates vary . :from a few hops per minute to many :thousands per second. The hopper usually • :dwells on a frequency for a fixed time but :some hoppers with variable dwell times are . :being produced. A binary stream, generated: :by methods similar to those used for direct :sequence, is used to select the order of :frequency use. A specific hopper, for :example, might use a table of 256 (28) :frequencies. It would employ some device, :perhaps one or more shift registers, to :generate a binary stream. The stream :generated by this device would then be : broken into 8-bit segments and these :segments would be used as pointers into :the frequency table. A wide variety of :frequency hop radios is being produced, :mostly by companies in the U.S., Western : Europe, and Japan. such activities increase, so will the likelihood of serious compromise. December 1986 * CRYPTOLOG * page 4 / SECRI'3't' / r~Of I\Et~A:SA:BLE fO eO'HRAefORS P.L. 86-36 IIA~mLE VIA GOMH-IT GIIAP'IP'IELS OP'fL¥O 1. 4. (c) P.L. 86-36 DOCID: 4033692 EO 1.4. (c) SEeRE~ options. For example, pursuing Option 2 would not preclude some of the research from being done at NSA. If Option 3 were ch'osen, some of the research and development might be contracted by NSA to industry or the academic community. Option 1: Case-by-Case Problem Management (U) This is the option we have pursued so far. When incidents of outside research and development in this area are discovered, the particular circumstances of the case are evaluated and an appropriate course of action is selected. Advantages (D) So far, we have been able to resolve all the cases brought to our attention in a way that is reasonably satisfactory to all concerned.