The Commercial National Security Algorithm Suite (CNSA) is a set of cryptographic algorithms promulgated by the National Security Agency as a replacement...
10 KB (655 words) - 20:05, 23 June 2025
NSA Suite B Cryptography was a set of cryptographic algorithms promulgated by the National Security Agency as part of its Cryptographic Modernization...
9 KB (929 words) - 15:23, 23 December 2024
Key size (section Symmetric algorithm key lengths)
Commercial National Security Algorithm Suite (now referred to as CNSA 1.0), originally launched in January 2016, to the Commercial National Security Algorithm...
29 KB (3,225 words) - 14:31, 21 June 2025
NSA cryptography (redirect from NSA encryption algorithms)
about its cryptographic algorithms. The NSA has categorized encryption items into four product types, and algorithms into two suites. The following is a brief...
9 KB (469 words) - 02:34, 21 October 2023
National Solidarity Fund for Autonomy Commercial National Security Algorithm Suite, cryptographic algorithms promulgated by the US National Security Agency...
784 bytes (130 words) - 15:35, 10 June 2024
elliptic curve currently specified in Commercial National Security Algorithm Suite for the ECDSA and ECDH algorithms. It is a 384-bit curve over a finite...
2 KB (156 words) - 17:03, 18 October 2023
KM-TG Series - Security Software Signature SILVER LINING - Security Software Signature Commercial National Security Algorithm Suite NSA Suite B Cryptography...
3 KB (201 words) - 17:15, 6 June 2025
Elliptic-curve cryptography (section Security concerns)
2019-06-04. Retrieved 2020-01-08. Commercial National Security Algorithm Suite and Quantum Computing FAQ U.S. National Security Agency, January 2016. RSA Laboratories...
39 KB (4,677 words) - 07:29, 27 June 2025
NSA product types (redirect from Type 1 algorithm)
The U.S. National Security Agency (NSA) used to rank cryptographic products or algorithms by a certification called product types. Product types were defined...
5 KB (606 words) - 15:44, 15 April 2025
selection in an attempt to downgrade the cipher suite negotiated to use either a weaker symmetric encryption algorithm or a weaker key exchange. A paper presented...
179 KB (17,586 words) - 04:56, 29 July 2025
NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those...
260 KB (24,833 words) - 13:43, 29 July 2025
IPsec (redirect from Encapsulating Security Payload)
In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure...
44 KB (5,337 words) - 05:26, 23 July 2025
SM3 (hash function) (redirect from SM3 algorithm)
algorithm GB/T 32905-2016: Information security techniques—SM3 cryptographic hash algorithm ISO/IEC 10118-3:2018—IT Security techniques—Hash-functions—Part 3:...
4 KB (392 words) - 08:48, 19 July 2025
SM4 (cipher) (redirect from SM4 Algorithm)
2021. The SM4 algorithm was drafted by Data Assurance & Communication Security Center, Chinese Academy of Sciences (CAS), and Commercial Cryptography Testing...
9 KB (958 words) - 16:44, 2 February 2025
Galois/Counter Mode (section Security)
included in the NSA Suite B Cryptography and its latest replacement in 2018 Commercial National Security Algorithm (CNSA) suite. GCM mode is used in...
23 KB (3,051 words) - 16:00, 1 July 2025
dominant public key algorithm. This is largely for historical and commercial reasons,[citation needed] namely that RSA Security created a certificate...
47 KB (5,306 words) - 22:17, 27 July 2025
Data Encryption Standard (redirect from Data Encryption Algorithm)
The Data Encryption Standard (DES /ˌdiːˌiːˈɛs, dɛz/) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56...
60 KB (6,717 words) - 14:31, 5 July 2025
NSA encryption systems (category National Security Agency)
supporting security for commercial and sensitive but unclassified applications. NSA's certification of the unclassified NIST-selected AES algorithm for classified...
26 KB (3,315 words) - 06:34, 29 June 2025
and Leonard Adleman, who developed the RSA encryption algorithm in 1977, founded RSA Data Security in 1982. The company acquired a "worldwide exclusive...
36 KB (3,685 words) - 01:58, 4 March 2025
users to build their own named entity-extractors using a combination of algorithms, targeted normalization lists and regular expressions in the Starlight...
5 KB (550 words) - 00:45, 15 April 2025
Encryption (redirect from Encryption algorithm)
encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but...
34 KB (3,645 words) - 19:23, 28 July 2025
SHA-2 (category National Security Agency cryptography)
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published...
51 KB (4,982 words) - 07:36, 30 July 2025
Fishbowl (secure phone) (category National Security Agency encryption devices)
employ NSA's Suite B encryption and authentication algorithms.[citation needed] The phones are locked down in many ways. While they use commercial wireless...
3 KB (311 words) - 09:04, 1 June 2025
produced by the signing algorithm with a private key pass the verification algorithm with the corresponding public key. Security (existential unforgeability...
42 KB (4,980 words) - 23:52, 1 August 2025
Michael Jenkins; Lydia Zieglar (September 28, 2018). "Commercial National Security Algorithm (CNSA) Suite Profile of Certificate Management over CMS". IETF...
21 KB (2,627 words) - 02:57, 13 March 2025
collection of ready-to-use machine learning algorithms written in the C++ language. NLTK (Natural Language Toolkit): A suite of libraries and programs for symbolic...
46 KB (4,934 words) - 13:04, 18 July 2025
SHA-1 (category National Security Agency cryptography)
designed by the United States National Security Agency, and is a U.S. Federal Information Processing Standard. The algorithm has been cryptographically broken...
50 KB (5,744 words) - 22:35, 2 July 2025
High Assurance Internet Protocol Encryptor (category National Security Agency encryption devices)
internal Security Policy Database (SPD) to set up new tunnels with the appropriate algorithms and settings. Due to lack of support for modern commercial routing...
7 KB (763 words) - 00:42, 24 March 2025
Lucifer (cipher) (redirect from "Lucifer" algorithm)
permutation. The second stage mixes bits between the bytes. The key-scheduling algorithm is relatively simple. Initially, the 128 key bits are loaded into a shift...
6 KB (749 words) - 15:35, 22 November 2023
Algorithm". Retrieved May 28, 2012. Phillip Rogaway. "OCB Mode". Retrieved May 28, 2012. "ISO/IEC 19772:2009 Information technology -- Security techniques...
8 KB (843 words) - 14:30, 21 July 2025