[cryptography] Declassified NSA Tech Journals

lodewijk andré de la porte lodewijkadlp at gmail.com
Sun Nov 27 16:01:55 EST 2011


Personally, I think it's hilarious the "Extraterrestial Intelligence"
parts, about "how would other races try to contact us" haven't changed AT
ALL since then and this actually had some orgininal ideas. Like the
"controlled neutron bursts" for communication, that's actually extra
usefull because they cheat the lightspeed (maybe).

2011/11/27 Eugen Leitl <eugen at leitl.org>

> ----- Forwarded message from Marsh Ray <marsh at extendedsubset.com> -----
>
> From: Marsh Ray <marsh at extendedsubset.com>
> Date: Sun, 27 Nov 2011 13:00:47 -0600
> To: Discussion of cryptography and related <cryptography at randombit.net>
> Subject: [cryptography] Declassified NSA Tech Journals
> User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US;
>        rv:1.9.2.23) Gecko/20110921 Thunderbird/3.1.15
> Reply-To: Crypto discussion list <cryptography at randombit.net>
>
>
> Came across this on Reddit:
>
> Declassified NSA Tech Journals
> http://www.nsa.gov/public_info/declass/tech_journals.shtml
>
> It all looks so interesting it's hard to know where to start.
>
> - Marsh
>
> * Emergency Destruction of Documents - April 1956 - Vol. I, No. 1
> * Development of Automatic Telegraph Switching Systems - July 1957 - Vol.
> II, No. 3
> * Chatter Patterns: A Last Resort - October 1957 - Vol. II, No. 4
> * Introduction to Traffic Analysis - April 1958 - Vol. III, No. 2
> * Signals from Outer Space - April 1958 - Vol. III, No. 2
> * Science and Cryptology - July 1958 - Vol. III, No. 3
> * Net Reconstruction - A Basic Step in Traffic Analysis - July 1958 - Vol.
> III, No. 3
> * Weather; its Role in Communications Intelligence - July 1958 - Vol. III,
> No. 3
> * A New Concept in Computing - December 1958 - Vol. III, No. 4
> * About NSA - January 1959 - Vol. IV, No. 1
> * Antipodal Propagation - January 1959 - Vol. IV, No. 1
> * Data Transmission Over Telephone Circuits - January 1959 - Vol. IV, No. 1
> * Soviet Science and Technology: Present Levels and Future Prospects -
> January 1959 - Vol. IV, No. 1
> * Cryptanalysis in The German Air Force - April 1959 - Vol. IV, No. 2
> * The Special Felix System - April 1959 - Vol. IV, No. 2
> * Intercept of USSR Missile Transmissions - July 1959 - Vol. IV, No. 3
> * A Program for Correcting Spelling Errors - October 1959 - Vol. IV, No. 4
> * COMINT Satellites - A Space Problem- October 1959 - Vol. IV, No. 4
> * The Borders of Cryptology - October 1959 - Vol. IV, No. 4
> * Did Aleksandr Popov Invent Radio? - January 1960 - Vol. V, No. 1
> * Bayes Marches On - January 1960 - Vol. V, No. 1
> * Book Review: Lost Languages - Fall 1960 - Vol. V. Nos. 3 & 4
> * The "Tunny" Machine and Its Solution - Spring 1961 - Vol. VI, No. 2
> * The GEE System I - Fall 1961, Vol. VI, No. 4
> * Book Review: Lincos, Design of a Language for Cosmic Intercourse, Part 1
> -
>      Winter 1962 - Vol. VII, No. 1
> * A Cryptologic Fairy Tale - Spring 1962 - Vol. VII, No. 2
> * Aristocrat - An Intelligence Test for Computers - Spring 1962 - Vol.
> VII, No. 2
> * Why Analog Computation? - Summer 1962 - Vol. VII, No. 3
> * German Agent Systems of World War II - Summer 1962 - Vol. VII, No. 3
> * The GEE System - V - Fall 1962 - Vol. VII, No. 4
> * How to Visualize a Matrix - Summer 1963 - Vol. VIII, No. 3
> * Book Review: Pearl Harbor: Warning and Decision - Winter 1963 - Vol.
> VIII, No. 1
> * Soviet Communications Journals as Sources of Intelligence - August 1964 -
> Vol. IX, No. 3
> * Use of Bayes Factors With a Composite Hypothesis - Fall 1964 - Vol. IX,
> No. 4
> * A List of Properties of Bayes-Turing Factors - Spring 1965 - Vol. X, No.
> 2
> * A Boer War Cipher - Summer 1965 - Vol. X, No. 3 and Fall 1965 - Vol. X,
> No. 4
> * Something May Rub Off! - Winter 1965 - Vol. X, No. 1
> * Time Is - Time Was - Time Is Past Computes for Intelligence - Winter
> 1965 - Vol. X, No. 1
> * The Apparent Paradox of Bayes Factors - Winter 1965 - Vol. X, No. 1
> * Extraterrestrial Intelligence - Spring 1966 - Vol. XI, No. 2
> * Some Reminiscences - Summer 1966 - Vol. XI, No. 3
> * Communications with Extraterrestrial Intelligence - Winter 1966 - Vol.
> XI, No. 1
> * The Voynich Manuscript: "The Most Mysterious Manuscript in the World" -
> Summer 1967 - Vol. XII, No. 3
> * Weather or Not - Encrypted? - Fall 1967 - Vol. XII, No. 4
> * The Library and the User - Spring 1968 - Vol. XIII, No. 2
> * Mokusatsu: One Word, Two Lessons - Fall 1968 - Vol. XIII, No. 4
> * Key to The Extraterrestrial Messages - Winter 1969 - Vol. XIV, No. 1
> * Curiosa Scriptorum Sericorum: To Write But Not to Communicate - Summer
> 1971 - Vol. XVI, No. 3
> * Multiple Hypothesis Testing and the Bayes Factor - Summer 1971 - Vol.
> XVI, No. 3
> * The Rosetta Stone and Its Decipherment - Winter 1971 - Vol. XVI, No. 1
> * Writing Efficient FORTRAN - Spring 1972 - Vol. IX, No. 1
> * The Strength of the Bayes Score - Winter 1972 - Vol. XVII, No. 1
> * Q.E.D. - 2 Hours, 41 Minutes - Fall 1973, Vol. XVIII, No. 4
> * Rochford's Cipher: A Discovery in Confederate Cryptography - Fall 1973,
> Vol. XVIII, No. 4
> * Earliest Applications of the Computer at NSA - Winter 1973 - Vol. XVIII,
> No. 1
> * Addendum to "A Cryptologic Fairy Tale" - Winter 1973 - Vol. XVIII, No. 1
> * Some Principles of Cryptographic Security - Summer 1974 - Vol. XIX, No. 3
> * Selected SIGINT Intelligence Highlights - Fall 1974 - Vol. XIX, No. 4
> * Der Fall WICHER: German Knowledge of Polish Success on ENIGMA - Spring
> 1975 - Vol. XX, No. 2
> * A Personal Contribution to the Bombe Story - Fall 1975 - Vol. XX, No. 4
> * Spacecraft Passenger Television from Laika to Gagarin - Spring 1976 -
> Vol. XXI, No. 2
> * The Voynich Manuscript Revisited - Summer 1976 - Vol. XXI, No. 3
> * An Application of Cluster Analysis and Multidimensional Scaling to the
> Question of "Hands" and "Languages" in the Voynich Manuscript - Summer
> 1978 - Vol. XXIII, No. 3
> * An Application of PTAH to the Voynich Manuscript - Spring 1979 - Vol.
> XXIV, No. 2
> * German Radio Intelligence - Fall 1980 - Vol. XXV, No. 4
> _______________________________________________
> cryptography mailing list
> cryptography at randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography
>
> ----- End forwarded message -----
> --
> Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
> ______________________________________________________________
> ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
> 8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20111127/bb9bdac1/attachment.html>


More information about the cryptography mailing list