• responsibility for all US government encryption systems when it was formed in 1952. The technical details of most NSA-approved systems are still classified, but...
    26 KB (3,315 words) - 06:34, 29 June 2025
  • NSA encryption systems, for a historically oriented list of NSA encryption products (most of them Type 1). NSA cryptography for algorithms that NSA has...
    5 KB (606 words) - 15:44, 15 April 2025
  • majority of the National Security Agency's work on encryption is classified, but from time to time NSA participates in standards processes or otherwise...
    9 KB (469 words) - 02:34, 21 October 2023
  • Thumbnail for Secure voice
    SCIP Secure telephone Secure Terminal Equipment VINSON VoIP VPN NSA encryption systems ZRTP Fishbowl (secure phone) Owens, F. J. (1993). Signal Processing...
    12 KB (1,687 words) - 00:30, 11 November 2024
  • Thumbnail for National Security Agency
    National Security Agency (redirect from NSA)
    Dedicated Data Encryption/Decryption STU-III secure telephone unit, phased out by the STE The NSA oversees encryption in the following systems that are in...
    260 KB (24,833 words) - 15:35, 3 August 2025
  • key material for all NSA encryption systems whose keys are loaded using standard fill devices, and directs the distribution of NSA produced key material...
    8 KB (959 words) - 13:33, 21 August 2023
  • Thumbnail for Data Encryption Standard
    Standard (FIPS) for the United States in 1977. The publication of an NSA-approved encryption standard led to its quick international adoption and widespread...
    60 KB (6,704 words) - 20:26, 3 August 2025
  • Thumbnail for Fill device
    Soviet Union's Fialka used punched cards for this purpose. Later NSA encryption systems incorporated a serial port fill connector and developed several...
    6 KB (724 words) - 22:13, 25 December 2024
  • Secure Communications Interoperability Protocol (category National Security Agency encryption devices)
    Security Agency and is intended to solve problems with earlier NSA encryption systems for voice, including STU-III and Secure Terminal Equipment (STE)...
    9 KB (1,280 words) - 23:47, 9 March 2025
  • Thumbnail for Glossary of cryptographic keys
    message authentication code, or HMAC. Benign key - (NSA) a key that has been protected by encryption or other means so that it can be distributed without...
    9 KB (1,187 words) - 00:41, 29 April 2025
  • In 2018, NSA replaced Suite B with the Commercial National Security Algorithm Suite (CNSA). Suite B's components were: Advanced Encryption Standard (AES)...
    9 KB (929 words) - 15:23, 23 December 2024
  • As part of Bullrun, NSA has also been actively working to "insert vulnerabilities into commercial encryption systems, IT systems, networks, and endpoint...
    37 KB (4,043 words) - 20:17, 10 July 2025
  • Thumbnail for Advanced Encryption Standard
    used in an NSA approved cryptographic module. The Advanced Encryption Standard (AES) is defined in each of: FIPS PUB 197: Advanced Encryption Standard (AES)...
    50 KB (5,679 words) - 04:23, 27 July 2025
  • historical codes and ciphers Encryption by date Japanese cryptology from the 1500s to Meiji List of cryptographers NSA encryption systems Steganography Timeline...
    53 KB (6,893 words) - 22:53, 28 July 2025
  • Thumbnail for Communications security
    Communications security (category Encryption devices)
    security Information warfare List of telecommunications encryption terms NSA encryption systems NSA product types Operations security Secure communication...
    9 KB (1,011 words) - 02:05, 13 December 2024
  • Thumbnail for NESTOR (encryption)
     pp. 4, 10  NSA encryption systems A History of U.S. Communications Security; the David G. Boak Lectures, National Security Agency (NSA), Volumes I,...
    8 KB (986 words) - 07:00, 14 April 2025
  • Thumbnail for KG-84
    KG-84 (category National Security Agency encryption devices)
    The KG-84A and KG-84C are encryption devices developed by the U.S. National Security Agency (NSA) to ensure secure transmission of digital data. The KG-84C...
    2 KB (265 words) - 03:49, 9 May 2025
  • Thumbnail for End-to-end encryption
    End-to-end encryption (E2EE) is a method of implementing a secure communication system where only communicating users can participate. No one else, including...
    42 KB (4,090 words) - 22:23, 22 July 2025
  • Thumbnail for KL-7
    KL-7 (category National Security Agency encryption devices)
    KL-51, an off-line, paper tape encryption system that used digital electronics instead of rotors. NSA encryption systems Typex Enigma ^ Britannica (2005)...
    11 KB (1,306 words) - 15:28, 7 April 2025
  • Clipper chip (category National Security Agency encryption devices)
    developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured "voice and data messages" with a built-in backdoor...
    18 KB (1,902 words) - 19:09, 25 April 2025
  • In cryptography, the ElGamal encryption system is a public-key encryption algorithm based on the Diffie–Hellman key exchange. It was described by Taher...
    10 KB (1,467 words) - 01:36, 20 July 2025
  • NSA Suite B Cryptography "POET ACM: Programmable Objective Encryption Technologies Advanced Cryptographic Module". General Dynamics Mission Systems....
    3 KB (201 words) - 17:15, 6 June 2025
  • Key size (redirect from 128 bit encryption)
    attacker. Encryption systems are often grouped into families. Common families include symmetric systems (e.g. AES) and asymmetric systems (e.g. RSA and...
    29 KB (3,241 words) - 22:31, 5 August 2025
  • Thumbnail for Tempest (codename)
    currents and therefore radiated far less. It was incorporated in newer NSA encryption systems. However, many users needed the higher signal levels to drive teleprinters...
    35 KB (4,249 words) - 21:30, 2 August 2025
  • Thumbnail for Bullrun (decryption program)
    Bullrun (decryption program) (category Encryption debate)
    classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA). The British Government...
    17 KB (1,769 words) - 16:09, 1 October 2024
  • Thumbnail for Vocoder
    vocoder systems use lower data rates, but below 5 kbit/s voice quality begins to drop rapidly.[citation needed] Several vocoder systems are used in NSA encryption...
    34 KB (3,526 words) - 16:34, 22 June 2025
  • Thumbnail for Tails (operating system)
    Das Erste reported that the US National Security Agency (NSA)'s XKeyscore surveillance system sets threat definitions for people who search for Tails using...
    20 KB (1,664 words) - 01:25, 16 July 2025
  • actively working to "Insert vulnerabilities into commercial encryption systems, IT systems, networks, and endpoint communications devices used by targets"...
    44 KB (5,339 words) - 02:48, 5 August 2025
  • as cascade encryption, cascade ciphering, multiple encryption, and superencipherment. Superencryption refers to the outer-level encryption of a multiple...
    9 KB (1,144 words) - 03:29, 1 July 2025
  • Thumbnail for PRISM
    PRISM (redirect from NSA Prism leak)
    Prism collects this data prior to encryption." Also according to The Guardian's Glenn Greenwald even low-level NSA analysts are allowed to search and...
    187 KB (17,252 words) - 17:34, 7 July 2025