DocumentCode :
23975
Title :
Wave attack [Electronics EMC]
Author :
Edwards, Chris
Volume :
10
Issue :
1
fYear :
2015
fDate :
Feb. 2015
Firstpage :
50
Lastpage :
53
Abstract :
In the middle of the Second World War, the US Army Signal Corp suddenly realised they had a problem with their encrypted communications. The Bell Telephone machine, used to encode signals using the army´s rotor-based key generator, would create a spike on an osciloscope in a remote part of the lab every time the machine changed its output. Worse, the spikes depended on the signal passing through, making it possible to recover the plain text being fed to the encryption machine. Officers were at first hesitant to halt the use of the system. But they allowed an experiment that placed Bell engineers 25m away, on the other side of the street in New York from the office that housed one of the Signal Corp´s cryptocentres. They listened for an hour and, within four hours, demonstrated they were able to recover three-quarters of the messages being sent out. Bell spent the next six months fixing the machinery to stop it spewing out high levels of electromagnetic interference (EMI).
Keywords :
cryptography; electromagnetic interference; encoding; military communication; oscilloscopes; Bell engineer; Bell telephone machine; EMI; New York; Signal Corp cryptocentre; US Army Signal Corp; army; electromagnetic interference; encrypted communication; encryption machine; message recovery; oscilloscope; rotor-based key generator; second world war; signal encoding; signal spike; wave attack;
fLanguage :
English
Journal_Title :
Engineering & Technology
Publisher :
iet
ISSN :
1750-9637
Type :
jour
DOI :
10.1049/et.2015.0105
Filename :
7084547
Link To Document :
بازگشت