• NSA Suite B Cryptography was a set of cryptographic algorithms promulgated by the National Security Agency as part of its Cryptographic Modernization...
    9 KB (929 words) - 15:23, 23 December 2024
  • NSA Suite A Cryptography is NSA cryptography which "contains classified algorithms that will not be released." "Suite A will be used for the protection...
    3 KB (201 words) - 17:53, 5 November 2024
  • Agency as a replacement for NSA Suite B Cryptography until post-quantum cryptography standards are promulgated. In August 2015, NSA announced that it is planning...
    9 KB (469 words) - 02:34, 21 October 2023
  • Thumbnail for Commercial National Security Algorithm Suite
    Algorithm Suite (CNSA) is a set of cryptographic algorithms promulgated by the National Security Agency as a replacement for NSA Suite B Cryptography algorithms...
    10 KB (653 words) - 03:06, 9 April 2025
  • FIPS PUB 186-3, Digital Signature Standard (DSS). "Fact Sheet NSA Suite B Cryptography". U.S. National Security Agency. Archived from the original on...
    39 KB (4,676 words) - 10:16, 27 April 2025
  • 2011-10-14. Strong Cryptography The Global Tide of Change, Cato Institute Briefing Paper no. 51, Arnold G. Reinhold, 1999 "NSA Suite B Cryptography". National...
    29 KB (3,222 words) - 03:31, 9 April 2025
  • that NSA has participated in the development of. NSA Suite B Cryptography NSA Suite A Cryptography National Information Assurance Glossary (CNSSI No...
    5 KB (606 words) - 15:44, 15 April 2025
  • Comparison of TLS implementations (category Cryptographic software)
    application TLS 1.3 compliance table". Required components for NSA Suite B Cryptography (RFC 6460) are: Advanced Encryption Standard (AES) with key sizes...
    135 KB (4,832 words) - 13:14, 18 March 2025
  • sleeve number • NSA cryptographyNSA encryption systems • NSA in fiction • NSAKEY • NSA Suite A CryptographyNSA Suite B Cryptography • NT LAN Manager...
    67 KB (2,932 words) - 23:20, 16 May 2025
  • Elliptic-curve Diffie–Hellman (category Elliptic curve cryptography)
    1: Elliptic Curve Cryptography, Version 2.0, May 21, 2009. NSA Suite B Cryptography, Suite B Implementers' Guide to NIST SP 800-56A Archived 2016-03-06...
    14 KB (2,168 words) - 17:07, 22 April 2025
  • is included in the NSA Suite B Cryptography and its latest replacement in 2018 Commercial National Security Algorithm (CNSA) suite. GCM mode is used in...
    23 KB (3,051 words) - 20:21, 24 March 2025
  • arXiv:quant-ph/0511020. CiteSeerX 10.1.1.190.2789. doi:10.1137/060670997. "NSA Suite B Cryptography". Archived from the original on 1 January 2016. Retrieved 29 December...
    81 KB (9,073 words) - 05:33, 17 April 2025
  • Thumbnail for Diffie–Hellman key exchange
    depending on the cipher suite). The method was followed shortly afterwards by RSA, an implementation of public-key cryptography using asymmetric algorithms...
    48 KB (5,437 words) - 16:48, 22 April 2025
  • of the National Security Agency (NSA) Suite B. It is also flexible, featuring support for plugging custom cryptographic APIs into the CNG runtime. However...
    6 KB (617 words) - 00:38, 2 December 2024
  • Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
    63 KB (6,408 words) - 13:56, 6 May 2025
  • Thumbnail for National Security Agency
    National Security Agency (redirect from NSA)
    Systems The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset...
    259 KB (24,746 words) - 07:44, 17 May 2025
  • March 11, 2015. Retrieved June 22, 2008. 32 CFR 2001.90 "NSA Suite B CryptographyNSA/CSS". Nsa.gov. Archived from the original on June 18, 2011. Retrieved...
    94 KB (10,052 words) - 21:10, 2 May 2025
  • Thumbnail for Cryptography
    access from adversaries. The cryptography literature often uses the names "Alice" (or "A") for the sender, "Bob" (or "B") for the intended recipient,...
    99 KB (10,975 words) - 11:30, 14 May 2025
  • Thumbnail for .NET Framework version history
    SP2. The cryptographic API in .NET Framework 4.6 uses the latest version of Windows CNG cryptography API. As a result, NSA Suite B Cryptography is available...
    64 KB (6,766 words) - 15:58, 10 February 2025
  • In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
    13 KB (1,533 words) - 12:18, 19 January 2025
  • only to the NSA within the reach of a skilled individual, so in practice there are only two levels of cryptographic security, "cryptography that will stop...
    22 KB (2,846 words) - 19:45, 6 February 2025
  • IPsec (category Cryptographic protocols)
    RFC 6071: IPsec and IKE Document Roadmap RFC 6379: Suite B Cryptographic Suites for IPsec RFC 6380: Suite B Profile for Internet Protocol Security (IPsec)...
    44 KB (5,337 words) - 03:03, 15 May 2025
  • The Cryptographic Modernization Program is a Department of Defense directed, NSA Information Assurance Directorate led effort to transform and modernize...
    4 KB (455 words) - 19:21, 9 April 2023
  • High Assurance Internet Protocol Encryptor (category Cryptographic protocols)
    Interoperability Specification). The cryptography used is Suite A and Suite B, also specified by the NSA as part of the Cryptographic Modernization Program. HAIPE IS...
    7 KB (763 words) - 00:42, 24 March 2025
  • Skipjack (cipher) (category National Security Agency cryptography)
    In cryptography, Skipjack is a block cipher—an algorithm for encryption—developed by the U.S. National Security Agency (NSA). Initially classified, it...
    12 KB (1,106 words) - 03:22, 29 November 2024
  • NSAKEY (redirect from NSA key)
    the technical review authority for U.S. cryptography export controls. Microsoft requires all cryptography suites that interoperate with Microsoft Windows...
    14 KB (1,480 words) - 10:05, 17 May 2025
  • Elliptic Curve Digital Signature Algorithm (category Public-key cryptography)
    In cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic-curve...
    19 KB (2,833 words) - 08:53, 8 May 2025
  • (Mailing list). Johnson, J.; Kaliski, B. (February 2003). Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. Network...
    60 KB (7,787 words) - 23:29, 17 May 2025
  • internal communications, the NSA Clipper chip proposal to extend this key escrow requirement to public use of cryptography was highly controversial. TEMPEST:...
    26 KB (3,315 words) - 15:22, 1 January 2025
  • Thumbnail for RC6
    "How the NSA hacks PCs, phones, routers, hard disks 'at speed of light': Spy tech catalog leaks". The Register. Retrieved 2015-08-02. "Cryptography - 256...
    7 KB (732 words) - 12:34, 30 April 2025