• Thumbnail for Commercial National Security Algorithm Suite
    The Commercial National Security Algorithm Suite (CNSA) is a set of cryptographic algorithms promulgated by the National Security Agency as a replacement...
    10 KB (655 words) - 20:05, 23 June 2025
  • NSA Suite B Cryptography was a set of cryptographic algorithms promulgated by the National Security Agency as part of its Cryptographic Modernization...
    9 KB (929 words) - 15:23, 23 December 2024
  • Commercial National Security Algorithm Suite (now referred to as CNSA 1.0), originally launched in January 2016, to the Commercial National Security Algorithm...
    29 KB (3,225 words) - 14:31, 21 June 2025
  • about its cryptographic algorithms. The NSA has categorized encryption items into four product types, and algorithms into two suites. The following is a brief...
    9 KB (469 words) - 02:34, 21 October 2023
  • National Solidarity Fund for Autonomy Commercial National Security Algorithm Suite, cryptographic algorithms promulgated by the US National Security Agency...
    784 bytes (130 words) - 15:35, 10 June 2024
  • elliptic curve currently specified in Commercial National Security Algorithm Suite for the ECDSA and ECDH algorithms. It is a 384-bit curve over a finite...
    2 KB (156 words) - 17:03, 18 October 2023
  • KM-TG Series - Security Software Signature SILVER LINING - Security Software Signature Commercial National Security Algorithm Suite NSA Suite B Cryptography...
    3 KB (201 words) - 17:15, 6 June 2025
  • 2019-06-04. Retrieved 2020-01-08. Commercial National Security Algorithm Suite and Quantum Computing FAQ U.S. National Security Agency, January 2016. RSA Laboratories...
    39 KB (4,677 words) - 07:29, 27 June 2025
  • The U.S. National Security Agency (NSA) used to rank cryptographic products or algorithms by a certification called product types. Product types were defined...
    5 KB (606 words) - 15:44, 15 April 2025
  • selection in an attempt to downgrade the cipher suite negotiated to use either a weaker symmetric encryption algorithm or a weaker key exchange. A paper presented...
    179 KB (17,586 words) - 04:56, 29 July 2025
  • Thumbnail for National Security Agency
    NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those...
    260 KB (24,833 words) - 13:43, 29 July 2025
  • In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure...
    44 KB (5,337 words) - 05:26, 23 July 2025
  • algorithm GB/T 32905-2016: Information security techniques—SM3 cryptographic hash algorithm ISO/IEC 10118-3:2018—IT Security techniques—Hash-functions—Part 3:...
    4 KB (392 words) - 08:48, 19 July 2025
  • Thumbnail for SM4 (cipher)
    SM4 (cipher) (redirect from SM4 Algorithm)
    2021. The SM4 algorithm was drafted by Data Assurance & Communication Security Center, Chinese Academy of Sciences (CAS), and Commercial Cryptography Testing...
    9 KB (958 words) - 16:44, 2 February 2025
  • included in the NSA Suite B Cryptography and its latest replacement in 2018 Commercial National Security Algorithm (CNSA) suite. GCM mode is used in...
    23 KB (3,051 words) - 16:00, 1 July 2025
  • Thumbnail for Diffie–Hellman key exchange
    dominant public key algorithm. This is largely for historical and commercial reasons,[citation needed] namely that RSA Security created a certificate...
    47 KB (5,306 words) - 22:17, 27 July 2025
  • Thumbnail for Data Encryption Standard
    The Data Encryption Standard (DES /ˌdiːˌiːˈɛs, dɛz/) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56...
    60 KB (6,717 words) - 14:31, 5 July 2025
  • NSA encryption systems (category National Security Agency)
    supporting security for commercial and sensitive but unclassified applications. NSA's certification of the unclassified NIST-selected AES algorithm for classified...
    26 KB (3,315 words) - 06:34, 29 June 2025
  • Thumbnail for RSA Security
    and Leonard Adleman, who developed the RSA encryption algorithm in 1977, founded RSA Data Security in 1982. The company acquired a "worldwide exclusive...
    36 KB (3,685 words) - 01:58, 4 March 2025
  • users to build their own named entity-extractors using a combination of algorithms, targeted normalization lists and regular expressions in the Starlight...
    5 KB (550 words) - 00:45, 15 April 2025
  • Thumbnail for Encryption
    encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but...
    34 KB (3,645 words) - 19:23, 28 July 2025
  • SHA-2 (category National Security Agency cryptography)
    SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published...
    51 KB (4,982 words) - 07:36, 30 July 2025
  • Fishbowl (secure phone) (category National Security Agency encryption devices)
    employ NSA's Suite B encryption and authentication algorithms.[citation needed] The phones are locked down in many ways. While they use commercial wireless...
    3 KB (311 words) - 09:04, 1 June 2025
  • Thumbnail for Digital signature
    produced by the signing algorithm with a private key pass the verification algorithm with the corresponding public key. Security (existential unforgeability...
    42 KB (4,980 words) - 23:52, 1 August 2025
  • Michael Jenkins; Lydia Zieglar (September 28, 2018). "Commercial National Security Algorithm (CNSA) Suite Profile of Certificate Management over CMS". IETF...
    21 KB (2,627 words) - 02:57, 13 March 2025
  • collection of ready-to-use machine learning algorithms written in the C++ language. NLTK (Natural Language Toolkit): A suite of libraries and programs for symbolic...
    46 KB (4,934 words) - 13:04, 18 July 2025
  • SHA-1 (category National Security Agency cryptography)
    designed by the United States National Security Agency, and is a U.S. Federal Information Processing Standard. The algorithm has been cryptographically broken...
    50 KB (5,744 words) - 22:35, 2 July 2025
  • High Assurance Internet Protocol Encryptor (category National Security Agency encryption devices)
    internal Security Policy Database (SPD) to set up new tunnels with the appropriate algorithms and settings. Due to lack of support for modern commercial routing...
    7 KB (763 words) - 00:42, 24 March 2025
  • permutation. The second stage mixes bits between the bytes. The key-scheduling algorithm is relatively simple. Initially, the 128 key bits are loaded into a shift...
    6 KB (749 words) - 15:35, 22 November 2023
  • Algorithm". Retrieved May 28, 2012. Phillip Rogaway. "OCB Mode". Retrieved May 28, 2012. "ISO/IEC 19772:2009 Information technology -- Security techniques...
    8 KB (843 words) - 14:30, 21 July 2025