[16131] in cryptography@c2.net mail archive
Re: references on traffic analysis?
daemon@ATHENA.MIT.EDU (james hughes)
Fri Sep 10 11:12:05 2004
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
In-Reply-To: <20040908031203.5295E1AE89@berkshire.research.att.com>
Cc: james hughes <hughejp@mac.com>, cryptography@metzdowd.com
From: james hughes <hughejp@mac.com>
Date: Thu, 9 Sep 2004 09:21:01 -0400
To: Steve Bellovin <smb@research.att.com>
On Sep 7, 2004, at 11:12 PM, Steve Bellovin wrote:
> What are some of the classic, must-read, references on traffic
> analysis?
> (I'm familiar with the Zendian problem, of course.)
In looking through my library, I came across two references (I would
not say 'must read' though).
"Code Breakers" (David Kahn) has several short real world examples. It
is not a treatise per-se, but is interesting.
"The Hut Six Story, Breaking the Enigma Codes" (Gordon Welchman)
describes many of the aspects of traffic analysis as a precursor to an
actual cryptanalysis attack.
I don't know any study texts on this subject.
Thanks
jim
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com