NSA Suite B Cryptography was a set of cryptographic algorithms promulgated by the National Security Agency as part of its Cryptographic Modernization...
9 KB (929 words) - 15:23, 23 December 2024
NSA Suite A Cryptography is NSA cryptography which "contains classified algorithms that will not be released." "Suite A will be used for the protection...
3 KB (201 words) - 17:53, 5 November 2024
Agency as a replacement for NSA Suite B Cryptography until post-quantum cryptography standards are promulgated. In August 2015, NSA announced that it is planning...
9 KB (469 words) - 02:34, 21 October 2023
Algorithm Suite (CNSA) is a set of cryptographic algorithms promulgated by the National Security Agency as a replacement for NSA Suite B Cryptography algorithms...
10 KB (653 words) - 03:06, 9 April 2025
FIPS PUB 186-3, Digital Signature Standard (DSS). "Fact Sheet NSA Suite B Cryptography". U.S. National Security Agency. Archived from the original on...
39 KB (4,676 words) - 10:16, 27 April 2025
Key size (redirect from Cryptography/key length)
2011-10-14. Strong Cryptography The Global Tide of Change, Cato Institute Briefing Paper no. 51, Arnold G. Reinhold, 1999 "NSA Suite B Cryptography". National...
29 KB (3,222 words) - 03:31, 9 April 2025
that NSA has participated in the development of. NSA Suite B Cryptography NSA Suite A Cryptography National Information Assurance Glossary (CNSSI No...
5 KB (606 words) - 15:44, 15 April 2025
Comparison of TLS implementations (category Cryptographic software)
application TLS 1.3 compliance table". Required components for NSA Suite B Cryptography (RFC 6460) are: Advanced Encryption Standard (AES) with key sizes...
135 KB (4,832 words) - 13:14, 18 March 2025
sleeve number • NSA cryptography • NSA encryption systems • NSA in fiction • NSAKEY • NSA Suite A Cryptography • NSA Suite B Cryptography • NT LAN Manager...
67 KB (2,932 words) - 23:20, 16 May 2025
Elliptic-curve Diffie–Hellman (category Elliptic curve cryptography)
1: Elliptic Curve Cryptography, Version 2.0, May 21, 2009. NSA Suite B Cryptography, Suite B Implementers' Guide to NIST SP 800-56A Archived 2016-03-06...
14 KB (2,168 words) - 17:07, 22 April 2025
is included in the NSA Suite B Cryptography and its latest replacement in 2018 Commercial National Security Algorithm (CNSA) suite. GCM mode is used in...
23 KB (3,051 words) - 20:21, 24 March 2025
arXiv:quant-ph/0511020. CiteSeerX 10.1.1.190.2789. doi:10.1137/060670997. "NSA Suite B Cryptography". Archived from the original on 1 January 2016. Retrieved 29 December...
81 KB (9,073 words) - 05:33, 17 April 2025
Diffie–Hellman key exchange (redirect from New Directions in Cryptography)
depending on the cipher suite). The method was followed shortly afterwards by RSA, an implementation of public-key cryptography using asymmetric algorithms...
48 KB (5,437 words) - 16:48, 22 April 2025
Microsoft CryptoAPI (redirect from Cryptography API: Next Generation)
of the National Security Agency (NSA) Suite B. It is also flexible, featuring support for plugging custom cryptographic APIs into the CNG runtime. However...
6 KB (617 words) - 00:38, 2 December 2024
Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
63 KB (6,408 words) - 13:56, 6 May 2025
National Security Agency (redirect from NSA)
Systems The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset...
259 KB (24,746 words) - 07:44, 17 May 2025
March 11, 2015. Retrieved June 22, 2008. 32 CFR 2001.90 "NSA Suite B Cryptography – NSA/CSS". Nsa.gov. Archived from the original on June 18, 2011. Retrieved...
94 KB (10,052 words) - 21:10, 2 May 2025
access from adversaries. The cryptography literature often uses the names "Alice" (or "A") for the sender, "Bob" (or "B") for the intended recipient,...
99 KB (10,975 words) - 11:30, 14 May 2025
SP2. The cryptographic API in .NET Framework 4.6 uses the latest version of Windows CNG cryptography API. As a result, NSA Suite B Cryptography is available...
64 KB (6,766 words) - 15:58, 10 February 2025
In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
13 KB (1,533 words) - 12:18, 19 January 2025
only to the NSA within the reach of a skilled individual, so in practice there are only two levels of cryptographic security, "cryptography that will stop...
22 KB (2,846 words) - 19:45, 6 February 2025
IPsec (category Cryptographic protocols)
RFC 6071: IPsec and IKE Document Roadmap RFC 6379: Suite B Cryptographic Suites for IPsec RFC 6380: Suite B Profile for Internet Protocol Security (IPsec)...
44 KB (5,337 words) - 03:03, 15 May 2025
The Cryptographic Modernization Program is a Department of Defense directed, NSA Information Assurance Directorate led effort to transform and modernize...
4 KB (455 words) - 19:21, 9 April 2023
High Assurance Internet Protocol Encryptor (category Cryptographic protocols)
Interoperability Specification). The cryptography used is Suite A and Suite B, also specified by the NSA as part of the Cryptographic Modernization Program. HAIPE IS...
7 KB (763 words) - 00:42, 24 March 2025
Skipjack (cipher) (category National Security Agency cryptography)
In cryptography, Skipjack is a block cipher—an algorithm for encryption—developed by the U.S. National Security Agency (NSA). Initially classified, it...
12 KB (1,106 words) - 03:22, 29 November 2024
Elliptic Curve Digital Signature Algorithm (category Public-key cryptography)
In cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic-curve...
19 KB (2,833 words) - 08:53, 8 May 2025
RSA cryptosystem (redirect from RSA public key cryptography)
(Mailing list). Johnson, J.; Kaliski, B. (February 2003). Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. Network...
60 KB (7,787 words) - 23:29, 17 May 2025
internal communications, the NSA Clipper chip proposal to extend this key escrow requirement to public use of cryptography was highly controversial. TEMPEST:...
26 KB (3,315 words) - 15:22, 1 January 2025
RC6 (section Possible use in NSA "implants")
"How the NSA hacks PCs, phones, routers, hard disks 'at speed of light': Spy tech catalog leaks". The Register. Retrieved 2015-08-02. "Cryptography - 256...
7 KB (732 words) - 12:34, 30 April 2025