Archive-name: cryptography-faq/part09
Last-modified: 94/06/07
This is the ninth of ten parts of the sci.crypt FAQ. The parts are mostly independent, but you should read the first part before the rest. We don't have the time to send out missing parts by mail, so don't ask. Notes such as ``[KAH67]'' refer to the reference list in the last part.
The sections of this FAQ are available via anonymous FTP to rtfm.mit.edu
as /pub/usenet/news.answers/cryptography-faq/part[xx]. The Cryptography
FAQ is posted to the newsgroups sci.crypt, talk.politics.crypto,
sci.answers, and news.answers every 21 days.
Contents:
9.1. What is the National Security Agency (NSA)?
9.2. What are the US export regulations?
9.3. What is TEMPEST?
9.4. What are the Beale Ciphers, and are they a hoax?
9.5. What is the American Cryptogram Association, and how do I get in touch?
9.6. Is RSA patented?
9.7. What about the Voynich manuscript?
9.1. What is the National Security Agency (NSA)?
Bamford's book [BAMFD] gives a history of the people and operations of the NSA. The following quote from Massey [MAS88] highlights the difference between public and private research in cryptography:
``... if one regards cryptology as the prerogative of government, one accepts that most cryptologic research will be conducted behind closed doors. Without doubt, the number of workers engaged today in such secret research in cryptology far exceeds that of those engaged in open research in cryptology. For only about 10 years has there in fact been widespread open research in cryptology. There have been, and will continue to be, conflicts between these two research communities. Open research is common quest for knowledge that depends for its vitality on the open exchange of ideas via conference presentations and publications in scholarly journals. But can a government agency, charged with responsibilities of breaking the ciphers of other nations, countenance the publication of a cipher that it cannot break? Can a researcher in good conscience publish such a cipher that might undermine the effectiveness of his own government's code-breakers? One might argue that publication of a provably-secure cipher would force all governments to behave like Stimson's `gentlemen', but one must be aware that open research in cryptography is fraught with political and ethical considerations of a severity than in most scientific fields. The wonder is not that some conflicts have occurred between government agencies and open researchers in cryptology, but rather that these conflicts (at least those of which we are aware) have been so few and so mild.''
9.2. What are the US export regulations?
The newsgroup misc.legal.computing carries many interesting discussions on the laws surrounding cryptographic export, what people think about those laws, and many other complex issues which go beyond the scope of technical groups like sci.crypt. Make sure to consult your lawyer before doing anything which will get you thrown in jail; if you are lucky, your lawyer might know a lawyer who has at least heard of the ITAR.
9.3. What is TEMPEST?
Needless to say, encryption doesn't do much good if the cleartext is available this way.
9.4. What are the Beale Ciphers, and are they a hoax?
The story in a pamphlet by J. B. Ward (1885) goes: Thomas Jefferson Beale and a party of adventurers accumulated a huge mass of treasure and buried it in Bedford County, Virginia, leaving three ciphers with an innkeeper; the ciphers describe the location, contents, and intended beneficiaries of the treasure. Ward gives a decryption of the second cipher (contents) called B2; it was encrypted as a book cipher using the initial letters of the Declaration of Independence (DOI) as key. B1 and B3 are unsolved; many documents have been tried as the key to B1.
Aficionados can join a group that attempts to solve B1 by various means with an eye toward splitting the treasure:
The Beale Cypher Association
P.O. Box 975
Beaver Falls, PA 15010
You can get the ciphers from the rec.puzzles FAQL by including the line:
send index
in a message to netlib@peregrine.com and following the directions. (There are apparently several different versions of the cipher floating around. The correct version is based on the 1885 pamphlet, says John King <kingj@hpcc01.corp.hp.com>.)
Some believe the story is a hoax. Kruh [KRU88] gives a long list of problems with the story. Gillogly [GIL80] decrypted B1 with the DOI and found some unexpected strings, including ABFDEFGHIIJKLMMNOHPP. Hammer (president of the Beale Cypher Association) agrees that this string couldn't appear by chance, but feels there must be an explanation; Gwyn (sci.crypt expert) is unimpressed with this string.
9.5. What is the American Cryptogram Association, and how do I get in touch?
Dues are $20 per year (6 issues) for new members, $15 thereafter; more outside North America; less for students under 18 and seniors. Send checks to ACA Treasurer, P.O. Box 198, Vernon Hills, IL 60061-0198.
9.6. Is RSA patented?
9.7. What about the Voynich manuscript?
nelson@reed.edu (Nelson Minar) says there is a mailing list on the subject. The address to write to subscribe to the VMS mailing list is: <voynich-request@rand.org>
the ftp archive is: rand.org:/pub/voynich
There's all sorts of information about the manuscript itself, of course. A good bibliography can be found on the ftp site. [KAH67] gives a good introduction.