ABSTRACT

In this concluding chapter, we shall briefly examine two important security issues. The first is the extent to which news about the successful Swedish cryptanalysis of foreign cryptosystems leaked to unauthorized recipients; the second is the extent to which various foreign powers were able to read Sweden's own signal communications.