"Practical Secret Protection" - читать интересную книгу автора (T T T, M M M, O'Toole Laurence)3 Passive Secret ProtectionThe above method depends on Alice's ability to identify (and remove[2]) all threats to security. This is obviously a non-trivial task but there is a subtle way of doing this that requires no direct action by either Alice or Bob. As a precursor to sending the actual secret, Alice sends Bob a message intended to be intercepted by Eve. On attempting to obtain, or upon discovering the contents of the message, Eve will then remove him/herself from the scenario as a result of intense emotional or physical trauma. There is the option of either having good physical security around the transport medium (e.g. electric fences, providing the physical trauma), or careful selection of the message itself (providing the emotional trauma). The latter may have to be a message specific to the eavesdropper (e.g. "I know what you did last summer"), but a well-chosen generic message can achieve the same result. A good generic message may be something along the lines of "I won't bother sending you that Ultra-secret message next week, because the world is going to end Thursday afternoon". This will have sufficient credibility if it includes a signed message by a expert in the appropriate field (black-hole formation within the solar system use Stephen Hawking's secret key, Global Nuclear Warfare use George W. Bush's). To obtain the necessary secret keys we refer the reader to the previous article, [1]. |
|
© 2025 Библиотека RealLib.org
(support [a t] reallib.org) |