[16131] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: references on traffic analysis?

daemon@ATHENA.MIT.EDU (james hughes)
Fri Sep 10 11:12:05 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
In-Reply-To: <20040908031203.5295E1AE89@berkshire.research.att.com>
Cc: james hughes <hughejp@mac.com>, cryptography@metzdowd.com
From: james hughes <hughejp@mac.com>
Date: Thu, 9 Sep 2004 09:21:01 -0400
To: Steve Bellovin <smb@research.att.com>


On Sep 7, 2004, at 11:12 PM, Steve Bellovin wrote:
> What are some of the classic, must-read, references on traffic 
> analysis?
> (I'm familiar with the Zendian problem, of course.)

In looking through my library, I came across two references (I would 
not say 'must read' though).

"Code Breakers" (David Kahn) has several short real world examples. It 
is not a treatise per-se, but is interesting.

"The Hut Six Story, Breaking the Enigma Codes" (Gordon Welchman) 
describes many of the aspects of traffic analysis as a precursor to an 
actual cryptanalysis attack.

I don't know any study texts on this subject.

Thanks

jim

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post