DocumentCode
23975
Title
Wave attack [Electronics EMC]
Author
Edwards, Chris
Volume
10
Issue
1
fYear
2015
fDate
Feb. 2015
Firstpage
50
Lastpage
53
Abstract
In the middle of the Second World War, the US Army Signal Corp suddenly realised they had a problem with their encrypted communications. The Bell Telephone machine, used to encode signals using the army´s rotor-based key generator, would create a spike on an osciloscope in a remote part of the lab every time the machine changed its output. Worse, the spikes depended on the signal passing through, making it possible to recover the plain text being fed to the encryption machine. Officers were at first hesitant to halt the use of the system. But they allowed an experiment that placed Bell engineers 25m away, on the other side of the street in New York from the office that housed one of the Signal Corp´s cryptocentres. They listened for an hour and, within four hours, demonstrated they were able to recover three-quarters of the messages being sent out. Bell spent the next six months fixing the machinery to stop it spewing out high levels of electromagnetic interference (EMI).
Keywords
cryptography; electromagnetic interference; encoding; military communication; oscilloscopes; Bell engineer; Bell telephone machine; EMI; New York; Signal Corp cryptocentre; US Army Signal Corp; army; electromagnetic interference; encrypted communication; encryption machine; message recovery; oscilloscope; rotor-based key generator; second world war; signal encoding; signal spike; wave attack;
fLanguage
English
Journal_Title
Engineering & Technology
Publisher
iet
ISSN
1750-9637
Type
jour
DOI
10.1049/et.2015.0105
Filename
7084547
Link To Document