Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

NSA cryptography

Index NSA cryptography

The vast majority of the National Security Agency's work on encryption is classified, but from time to time NSA participates in standards processes or otherwise publishes information about its cryptographic algorithms. [1]

37 relations: Advanced Encryption Standard, Ars Technica, BATON, Block cipher, Classified information, Cryptographic hash function, Cryptography, CYPRIS (microchip), Data Encryption Standard, Digital signature, Digital Signature Algorithm, Electronic Key Management System, Elliptic-curve cryptography, Firefly (key exchange protocol), Firmware, Fortezza, HAVE QUICK, Identification friend or foe, Key exchange, KOV-14, National Information Assurance Glossary, National Security Agency, NSA encryption systems, PEGASUS, PKCS, PKCS 11, Project 25, Public-key cryptography, Quantum computing, Radar, SAVILLE, Secure Hash Algorithms, Simon (cipher), Skipjack (cipher), Speck (cipher), Standardization, VINSON.

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

New!!: NSA cryptography and Advanced Encryption Standard · See more »

Ars Technica

Ars Technica (a Latin-derived term that the site translates as the "art of technology") is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998.

New!!: NSA cryptography and Ars Technica · See more »

BATON

BATON is a Type 1 block cipher in use since at least 1995 by the United States government to secure classified information.

New!!: NSA cryptography and BATON · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: NSA cryptography and Block cipher · See more »

Classified information

Classified information is material that a government body deems to be sensitive information that must be protected.

New!!: NSA cryptography and Classified information · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: NSA cryptography and Cryptographic hash function · See more »

Cryptography

Cryptography or cryptology (from κρυπτός|translit.

New!!: NSA cryptography and Cryptography · See more »

CYPRIS (microchip)

CYPRIS (cryptographic RISC microprocessor) was a cryptographic module developed by the Lockheed Martin Advanced Technology Laboratories.

New!!: NSA cryptography and CYPRIS (microchip) · See more »

Data Encryption Standard

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.

New!!: NSA cryptography and Data Encryption Standard · See more »

Digital signature

A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.

New!!: NSA cryptography and Digital signature · See more »

Digital Signature Algorithm

The Digital Signature Algorithm (DSA) is a Federal Information Processing Standard for digital signatures.

New!!: NSA cryptography and Digital Signature Algorithm · See more »

Electronic Key Management System

The Electronic Key Management System (EKMS) system is a United States National Security Agency led program responsible for Communications Security (COMSEC) key management, accounting, and distribution.

New!!: NSA cryptography and Electronic Key Management System · See more »

Elliptic-curve cryptography

Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.

New!!: NSA cryptography and Elliptic-curve cryptography · See more »

Firefly (key exchange protocol)

Firefly is a U.S. National Security Agency public-key key exchange protocol, used in EKMS, the STU-III secure telephone, and several other U.S. cryptographic systems.

New!!: NSA cryptography and Firefly (key exchange protocol) · See more »

Firmware

In electronic systems and computing, firmware is a specific class of computer software that provides the low-level control for the device's specific hardware.

New!!: NSA cryptography and Firmware · See more »

Fortezza

Fortezza is an information security system that uses the Fortezza Crypto Card, a PC Card-based security token.

New!!: NSA cryptography and Fortezza · See more »

HAVE QUICK

HAVE QUICK (also HAVEQUICK, short HQ) is a ECM resistant / frequency-hopping system used to protect military Aeronautical mobile (OR) radio traffic.

New!!: NSA cryptography and HAVE QUICK · See more »

Identification friend or foe

Identification, friend or foe (IFF) is an identification system designed for command and control.

New!!: NSA cryptography and Identification friend or foe · See more »

Key exchange

Key exchange (also key establishment) is any method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.

New!!: NSA cryptography and Key exchange · See more »

KOV-14

The KOV-14 Fortezza Plus is a US National Security Agency-approved PC card which provides encryption functions and key storage to the Secure Terminal Equipment and other devices.

New!!: NSA cryptography and KOV-14 · See more »

National Information Assurance Glossary

Committee on National Security Systems Instruction No.

New!!: NSA cryptography and National Information Assurance Glossary · See more »

National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.

New!!: NSA cryptography and National Security Agency · See more »

NSA encryption systems

The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952.

New!!: NSA cryptography and NSA encryption systems · See more »

PEGASUS

PEGASUS is an encryption algorithm used for satellite telemetry, command link and mission data transfers.

New!!: NSA cryptography and PEGASUS · See more »

PKCS

In cryptography, PKCS stands for "Public Key Cryptography Standards".

New!!: NSA cryptography and PKCS · See more »

PKCS 11

In cryptography, PKCS #11 is one of the Public-Key Cryptography Standards, and also refers to the programming interface to create and manipulate cryptographic tokens.

New!!: NSA cryptography and PKCS 11 · See more »

Project 25

Project 25 (P25 or APCO-25) is a suite of standards for digital mobile radio communications designed for use by public safety organizations in North America.

New!!: NSA cryptography and Project 25 · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: NSA cryptography and Public-key cryptography · See more »

Quantum computing

Quantum computing is computing using quantum-mechanical phenomena, such as superposition and entanglement.

New!!: NSA cryptography and Quantum computing · See more »

Radar

Radar is an object-detection system that uses radio waves to determine the range, angle, or velocity of objects.

New!!: NSA cryptography and Radar · See more »

SAVILLE

SAVILLE is a classified NSA Type 1 encryption algorithm, developed in the late 1960s, jointly by the Government Communications Headquarters (GCHQ) in the UK and the National Security Agency (NSA) in the US.

New!!: NSA cryptography and SAVILLE · See more »

Secure Hash Algorithms

The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), including.

New!!: NSA cryptography and Secure Hash Algorithms · See more »

Simon (cipher)

Simon is a family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013.

New!!: NSA cryptography and Simon (cipher) · See more »

Skipjack (cipher)

In cryptography, Skipjack is a block cipher—an algorithm for encryption—developed by the U.S. National Security Agency (NSA).

New!!: NSA cryptography and Skipjack (cipher) · See more »

Speck (cipher)

Speck is a family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013.

New!!: NSA cryptography and Speck (cipher) · See more »

Standardization

Standardization or standardisation is the process of implementing and developing technical standards based on the consensus of different parties that include firms, users, interest groups, standards organizations and governments Standardization can help to maximize compatibility, interoperability, safety, repeatability, or quality.

New!!: NSA cryptography and Standardization · See more »

VINSON

VINSON is a family of voice encryption devices used by U.S. and allied military and law enforcement, based on the NSA's classified Suite A SAVILLE encryption algorithm and 16 kbit/s CVSD audio compression.

New!!: NSA cryptography and VINSON · See more »

Redirects here:

NSA Cryptography, NSA encryption algorithms.

References

[1] https://en.wikipedia.org/wiki/NSA_cryptography

OutgoingIncoming
Hey! We are on Facebook now! »