History of Control: The Mechanisms
Backdoors in Cryptography
Article REF: H5875 V1
History of Control: The Mechanisms
Backdoors in Cryptography

Author : Eric FILIOL

Publication date: April 10, 2026 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

2. History of Control: The Mechanisms

Since World War II and the lessons learned from the difficult process of decrypting the Enigma and Purple machines, the Anglo-Saxon world has decided to establish controls over information technology, particularly cryptology. The so-called "Five Eyes" alliance (UKUSA Agreement ) was established in 1941 for this purpose.

Four overlapping phases were thus gradually implemented to maintain this oversight over time and adapt to both...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Security of information systems"

( 89 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details
Contact us