1994-09-12 - Introduction- Telephone

Header Data

From: hughes@ah.com (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: 1a098ca5f7b7c732d151d848979ba4b2c3c612204f2581212f37b6ef489ca973
Message ID: <9409121550.AA07793@ah.com>
Reply To: <n1432764227.32914@smtp.esl.com>
UTC Datetime: 1994-09-12 16:28:16 UTC
Raw Date: Mon, 12 Sep 94 09:28:16 PDT

Raw message

From: hughes@ah.com (Eric Hughes)
Date: Mon, 12 Sep 94 09:28:16 PDT
To: cypherpunks@toad.com
Subject: Introduction- Telephone
In-Reply-To: <n1432764227.32914@smtp.esl.com>
Message-ID: <9409121550.AA07793@ah.com>
MIME-Version: 1.0
Content-Type: text/plain


   When you have an untappable wire
   between the sender and recipient, then traffic analysis is impossible (and
   crypto unnecessary).

Yet you can create an untappable wire with cryptography!  The device
in question is called a link encryptor.  Take a stream cipher and run
it continuously across the channel in question.  Pad the asynchronous
traffic when it's not flowing and add some synchronization to both the
stream and the data insertion.

You can tap the physical line still, but the interceptions reveal zero
information (computationally--the stream cipher _is_ keyed, after
all).

A good project would be virtual link encryptors for the Internet.

Eric





Thread