[26991] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Elizabethan traffic analysis

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Thu Jun 1 10:09:24 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Tue, 30 May 2006 22:03:23 -0400
From: "Steven M. Bellovin" <smb@cs.columbia.edu>
To: cryptography@metzdowd.com

We tend to think of traffic analysis as a modern technique, but it's
actually quite old.  Here is a message from a spy, observing the
activities of two of (English Queen) Elizabeth I's courtiers, whom he
suspected of trying to manipulate her successor:

	many secret meetings are made between them, where, after serious
	consults, they dispatch messengers and packets of letters, this
	sometimes twice in a week.

This was in 1602.

		--Steven M. Bellovin, http://www.cs.columbia.edu/~smb

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post