179
SCIENCE, RESEARCH, DEVELOPMENT
№25
steganography.
Only the first is closely
related to cryptography. Tech nical forms
of steganography can be outlined quickly:
invisible ink was used since the time of
Pliny. Onion juice and milk have proved
effective and have been popular in the
Length SRI centuries (initially invisible
on paper, they
acquire a brown color by
heat or ultraviolet radiation). Other class
-classical examples – hollow heels and
suitcases with false bottoms.
Among the modern methods of techni-
cal steganography noteworthy – High tele-
graph, transmission volley prepainted ritel-
no recorded
on magnetic tape Morse code
sequence of 20 characters per second, and
the rearrangement of the frequency sub-
bands (“skrem blirovanie”) spectrum of the
speech signal in the case of telephone com-
munication, widely used today for com-
mercial purposes. During the Second
World War research unit
Forschungsstelle
German Reyhspochty headed by Kurt E.
Vetterleynom eavesdrop on supposedly
from March 1942
secret radiotelephone
conversations between Franklin Delano
Roosevelt that, and Winston Churchill,
including a conversation on 29 July 1943,
directly before the truce with Italy. Through
Schellenberg, these conversations were re-
ported to Himmler.
Transmission of confidential written
communications
has revolutionized mi-
crograph:
microdots
the size of a speck of
dirt may contain reap a whole page of
text. Microdots – this extraordinary de-
velopment “ macropoint « Histiaesa
1
),
who shaved the head of his slave, writes a
message on it,
and then waited for the
hair grow back again. Microdots were in-
vented in the 1920s by Emmanuel Gold-
berg. Soviet reconnaissance snip Rudolf
Abel gets in their microdots on the film
for a spectroscope, being able to buy it
without attracting undue attention.
Another Soviet spy,
Gordon Arnold Lon-
sdale, hid his microdots in bound ware-
house invoices. Microdots used German
E in World War II, have a size allowing
them to be used as a point in printed
document.
References
1. M. Abadi and R. Needham, “Prudent En-
gineering Practice
for Cryptographic Pro-
tocols,” Research Report 125, Digital
Equipment Corp Systems Research Cent-
er, Jun 1994.
2. ANSI X9.8, “American National Standard
for Personal Information Number (PIN)
Management and Security, “ American
Bankers Association, 1982.
3. W.G. Barker, Cryptanalysis
of the Hagelin
Cryptograph, Aegean Park Press, 1977.