Добавить в цитаты Настройки чтения

Страница 6 из 62



“Excellent.”

Gideon depressed the key and turned to the receptionist. “Sorry to bother you,” he said, handing her the receiver. “Everything’s straightened out.” He walked briskly out of the building to the waiting car.

Thirty minutes later he was back in his motel room, stretched out on the bed, laptop co

Hopkins had explained—​unwittingly, of course—​​that the INSCOM archive could only send documents to previously authorized IP addresses, and unfortunately most of those were also inside classified perimeters…except for one: the National Security Archives at George Washington University. This private archive, the largest in the world outside the Library of Congress, collected vast amounts of government documents, including virtually everything being routinely declassified as part of the Mandatory Declassification Review: the government’s program for declassifying documents under several laws requiring them to do so. A veritable Amazon of information flowed into this archive on a daily basis.

Via the GSA computer, Gideon sent an automated request to the INSCOM secure archive at George Washington via port 6151, directing that a PDF file of a certain classified document be transmitted out through the same port, authorized via General Shorthouse’s passphrase, to be added to a routine dump of Cold War declassified documents headed for the National Security Archives daily batch files. The file was duly transmitted; it passed through the firewall at the sole authorized port, where the passphrase was examined and approved; and the document was subsequently routed to George Washington University and stored with millions of others in one of the archive databases.

Thus, Gideon had successfully arranged for the erroneous declassification of a classified document and hid it within a huge stream of data leaving the secure government perimeter. Now all that remained was to retrieve the document.

The next morning, at around eleven, a certain rumpled yet undeniably charming visiting professor by the name of Irwin Beauchamp, dressed in tweeds, mismatched corduroys, beaten-up wing tips, and a knitted tie (thirty-two dollars; Salvation Army) entered the Gelman Library at George Washington University and requested a slew of documents. His identity was not yet in the system and he had lost his temporary library card, but a kindly secretary took pity on the scatterbrained fellow and allowed him access to the system. Half an hour later, Beauchamp departed the building with a slender manila folder under his arm.

Back in the motel, Gideon Crew spread out the papers from the folder with a trembling hand. The moment of truth had arrived — the truth that would make him either free, or merely more miserable.

6

A Critique of the Thresher Discrete Logarithm Encryption Standard EVP-4: A Theoretical Back-Door Cryptanalysis Attack Strategy Using a Group of φ-Torsion Points of an Elliptic Curve in Characteristic φ.

Gideon Crew had studied plenty of advanced mathematics in college and, later, at MIT, but the math in this paper was still way over his head. Nevertheless, he understood enough to realize what he had in his hands was the smoking gun. This was the memo his father had written to critique Thresher, the memo his mother said had been destroyed. Yet it hadn’t been. Most likely, the bastard responsible — believing it too difficult or risky to destroy the document outright — had stuck it into an archive he believed would never be declassified. After all, what American general in the era of the Berlin Wall would have believed the Cold War could ever end?

He continued reading, heart racing, until, finally, he came to the final paragraphs. They were written in the dry language of science-speak, but what they said was pure dynamite.

In conclusion, it is the author’s opinion that the proposed Thresher Encryption Standard EVP-4, based on the theory of discrete logarithms, is flawed. The author has demonstrated that there exists a potential class of algorithms, based on the theory of elliptic functions defined over the complex numbers, which can solve certain discrete logarithm functions in real-time computing parameters. While the author has been as yet unable to identify specific algorithms, he has demonstrated herein that it is possible to do so.

The proposed Thresher standard is therefore vulnerable. If this standard is adopted, the author believes that, given the high quality of Soviet mathematical research, codes developed from this standard could be broken within a relatively short period of time.

The author strongly recommends that Thresher Encryption Standard EVP-4 not be adopted in its current form.

That was it. Proof that his father had been framed. And then murdered. Gideon Crew already knew all about the man who had done it: Lieutenant General (ret.) Chamblee S. Tucker, currently CEO of Tucker and Associates, one of the high-profile defense industry lobbying firms on K Street. They represented many of the country’s largest defense contractors, and Tucker had leveraged himself to the hilt in order to finance the firm. He was raking in huge bucks, but they managed to go right back out the door thanks to his extravagant lifestyle.

By itself, this document meant little. Gideon knew that anything could be counterfeited — or be claimed to have been counterfeited. The document wasn’t an endpoint; it was a starting point for the little surprise he had pla

Using the remote computer he had previously hijacked at the General Services Administration, Gideon stripped the document of its classification watermarks and sent it to a dozen large computer databases worldwide. Having thus secured the document from destruction, he sent an e-mail directly from his own computer to [email protected] /* */ with the document as an attachment. The covering e-mail read:

General Tucker:



I know what you did. I know why you did it. I know how you did it.

On Monday, I’m sending the attached file to various correspondents at the Post, Times, AP, and network news cha

Have a nice weekend.

Gideon Crew

7

Chamblee S. Tucker sat behind an enormous desk in the oak-paneled study of his house in McLean, Virginia, thoughtfully hefting a four-pound Murano glass paperweight in one hand. At seventy years old, he was fit for his age and proud of it.

He shifted the paperweight to the other hand, pressed it a few times.

A knock came at the door.

“Come in.” He set the paperweight down with exquisite care.

Charles Dajkovic entered the study. He was in civilian clothes, but his bearing and physique shouted military: whitewall haircut, massive neck, ramrod posture, steely blue eyes. A grizzled, close-clipped mustache was his only concession to civilian life.

“Good morning, General,” he said.

“Good morning, Charlie. Sit down. Have a cup of coffee.”

“Thank you.” The man eased his frame into the proffered chair. Tucker indicated a silver salver on a nearby side table with coffeepot, sugar, cream, and cups. Dajkovic helped himself.

“Let’s see now…” The general paused. “You’ve been with Tucker and Associates for, what, ten years?”

“That’s about right, sir.”

“But you and I, we go way back.”

“Yes, sir.”

“We have a history. Operation Urgent Fury. That’s why I hired you: because the trust built on the battlefield is the finest trust that exists in this crazy world. Men who haven’t fought together in battle don’t even know the full meaning of the words trust and loyalty.”