>But how would a cryptographic integrity check routine distinguish >between enemy action and line noise? Ideally, once strong authentication is deployed, integrity checks will fail only due to line noise because the enemy will be deterred from even trying. He would succeed only in revealing his presence. Ideally. Phil