I • •• I WUlfflEJIIltin 1 Vl JWV lill WWlill Iii Wl lilllll llloJWfl 01111 1 CBCB lltr0Jl10J 1Tl CBWC l£DW 1J0i1 EO 3 3b 3 EO 3 3b 6 PL 86-36 50 USC 3605 1 Non - Responsive THE l_ _ _ fSYSTEM ••• • • • • Howard Cohen •• • • 1 WHAT IS CIPHER TEXT • • •• • Alice Dibben • • ••• • • 3 6 7 13 PIii • In• I• IIUIIJdlll 1188'1 IILS ILIA± M INI S 0 • I I •e ••·••• fllBlJBIBII• IS rt 8N1Nm•f IC JI 5J 9 fl ts I •s au Pig Declassified and Approved for Re l ease by NSA on 03-03-2021 pursuant to E O 13526 MDR-109414 I EO 3 3b 3 EO 3 3b 6 PL 86-36 50 8111111111 • ' ' SYSTEM r C665- • • • • - - - _ _ _ _ _ _ _-all •• • $f I IntJ-odJiotion --------------- Many anicles pubiished in CRY P'l'oLOG deal with collection • om articles ue oriented toward anal si • such u c atulr Analysis of -- - --1 C S r t nh er 19 4 Others such as UNNA _ _ _ _ _ _ _ _ January 1975 deal with one type o co ect on system In today's WOTld of ever-increasina tec hnoloar the field of satellite c ications and the intelliaence uced b that JNdi to e and Februal' ' 76 CRYPTOLOG Paae 1 II LI I I Bil use 3605 EO 3 3b 3 EO 3 3b 6 PL 86-36 50 USC 3605 • ing and message processing equip111ent-control information and tasking priority data nz ki5 BOl'twa N The data base consists of three files These files contain TEXTA-type infonution processing parameters for both sipal process- I Conti mud on pags 1JI February 76 CRYPTOLOG • Page 2 il9Blll p p • I 179• ii ---• • -• · - · - -·· I F II l EO 3 3b 3 PL 86-36 50 use 3605 WHAT IS CIPHER TEXT ALICE Dl BEN G4 The walls of our office have lately echoed many a lively discussion about what exactly is cipher text Since the people in our office deal with cipher -chines the cipher text we tallt about is -inl l' the product of such machines Now soaie cipher machines produce punched paper tape which is then fed into a teleprinter which t-ransmits the data over a TELEX line The transmitted data is received on the other end by a teleprinter punched on papel' tape and then fed into the cipher machine and deciphered What i $ cipher text in this case Is it everything that was orisinally punched on the paper tape or is i t only those characteTs which were enciphered Before I present and defend II ' definition of cipher text let us think about what a cipher machine does It takes so• plain text input enciphers it fol'lllllts it and outputs it1 • This process can be schematically represented as follows ac• ¥ • a e I In a shell th- text is 1- l6 1 The terms tte t plAitt and ne t c iphe 1 are 11y own in the total enciphement process net plain represents the product of a conversion which puts the plain text in the fol'II required for encipherment and net cipher represents the i •mediate product of the encipherment before conversion to the fon required by the transmitting mediUIII Argwaents about the exact definition of ci pher text arise when plain text net plain net cipher and cipher text are froll different char 1A cipher machine also performs the reverse process that is take some cipher text input unformats it deciphers it and outpuu it as j plain text but this decipherment process will not be considered in this article I February 76 • CRYPTOLOG • Page 3 _ •- tion of cinher - - - - - -- ---· ·- •or 0• 0 - IH IIM February 76 • CRYP'IOLOG • Page 4 --· ----------EO 3 3b 3 PL 86-36 50 USC 3605 •or 1• 0 o a1111 EO 3 3b 3 PL 86-36 50 USC 3605 Fobl Uary 76 • CRYPTOLOG • Paao S SOP l • llllir RMRil --- ---- - --·------------ - · --- ·• • J EO 3 3b 3 EO 3 3b 6 1• 1111 PL 86-36 50 USC 3605 ISYSTEM THEI Conu-4 _ - • I • - fl• ll• I 110 ·······- ·········· Februaey 76 CRYl l'OLOG • Page 12 I Non Responsive I l • O• IT WP EPiS I llltlllllll
OCR of the Document
View the Document >>