MI5 last week gave an object lesson in why data on all parts of the network needs to be protected by strong encryption when one of its agents had a notebook stolen containing sensitive documents concerning the service's activities in Northern Ireland. However, MI5 security chiefs could console themselves with the knowledge that the information was strongly encrypted and unlikely to be cracked. In this week's issue we break the enigma on encryption and reveal how code-making and code-breaking has been a key part of Britain's military machine for years.
MI5 last week gave an object lesson in why data on all parts of the network needs to be protected by strong encryption when one of its agents had a notebook stolen containing sensitive documents co...
To continue reading this article...
Join Computing
- Unlimited access to real-time news, analysis and opinion from the technology industry
- Receive important and breaking news in our daily newsletter
- Be the first to hear about our events and awards programmes
- Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
- Access to the Computing Delta hub providing market intelligence and research
- Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders