From: Phil Karn <karn@qualcomm.com>
To: ravage@bga.com
Message Hash: dc2feb0d7b8a7ed6dd3d7f49af90d9faa817611f501c1ad64a10f782932288e7
Message ID: <199406220214.TAA00451@servo.qualcomm.com>
Reply To: <199406191451.JAA01206@zoom.bga.com>
UTC Datetime: 1994-06-22 02:14:38 UTC
Raw Date: Tue, 21 Jun 94 19:14:38 PDT
From: Phil Karn <karn@qualcomm.com>
Date: Tue, 21 Jun 94 19:14:38 PDT
To: ravage@bga.com
Subject: Re: your mail
In-Reply-To: <199406191451.JAA01206@zoom.bga.com>
Message-ID: <199406220214.TAA00451@servo.qualcomm.com>
MIME-Version: 1.0
Content-Type: text/plain
>> Hmm. And if an attacker discovers you're using this method, and
>> decides to send out a signal on the same frequency? You might find
>> your "random" numbers are suddenly all zeros...
>Band hop. Build a variable modulo counter and use its output to reset its
>modulo and hop the band around pseudo-randomly. Unless they know or stumble
>on the particular design you are using it will be very difficult to track.
An even better idea: disconnect the antenna. Most of the noise comes
from the front end amplifier, not the galactic and cosmic background,
at least in your average consumer grade receiver. And this is a quantum
process that someone else definitely can't predict or copy.
Phil
Return to June 1994
Return to “Phil Karn <karn@qualcomm.com>”