responsibility for all US government encryption systems when it was formed in 1952. The technical details of most NSA-approved systems are still classified, but...
26 KB (3,315 words) - 06:34, 29 June 2025
NSA encryption systems, for a historically oriented list of NSA encryption products (most of them Type 1). NSA cryptography for algorithms that NSA has...
5 KB (606 words) - 15:44, 15 April 2025
majority of the National Security Agency's work on encryption is classified, but from time to time NSA participates in standards processes or otherwise...
9 KB (469 words) - 02:34, 21 October 2023
Secure voice (redirect from Voice encryption)
SCIP Secure telephone Secure Terminal Equipment VINSON VoIP VPN NSA encryption systems ZRTP Fishbowl (secure phone) Owens, F. J. (1993). Signal Processing...
12 KB (1,687 words) - 00:30, 11 November 2024
National Security Agency (redirect from NSA)
Dedicated Data Encryption/Decryption STU-III secure telephone unit, phased out by the STE The NSA oversees encryption in the following systems that are in...
260 KB (24,833 words) - 15:35, 3 August 2025
key material for all NSA encryption systems whose keys are loaded using standard fill devices, and directs the distribution of NSA produced key material...
8 KB (959 words) - 13:33, 21 August 2023
Standard (FIPS) for the United States in 1977. The publication of an NSA-approved encryption standard led to its quick international adoption and widespread...
60 KB (6,704 words) - 20:26, 3 August 2025
Fill device (redirect from Secure DTD2000 System)
Soviet Union's Fialka used punched cards for this purpose. Later NSA encryption systems incorporated a serial port fill connector and developed several...
6 KB (724 words) - 22:13, 25 December 2024
Secure Communications Interoperability Protocol (category National Security Agency encryption devices)
Security Agency and is intended to solve problems with earlier NSA encryption systems for voice, including STU-III and Secure Terminal Equipment (STE)...
9 KB (1,280 words) - 23:47, 9 March 2025
Glossary of cryptographic keys (redirect from Key Encryption Key)
message authentication code, or HMAC. Benign key - (NSA) a key that has been protected by encryption or other means so that it can be distributed without...
9 KB (1,187 words) - 00:41, 29 April 2025
In 2018, NSA replaced Suite B with the Commercial National Security Algorithm Suite (CNSA). Suite B's components were: Advanced Encryption Standard (AES)...
9 KB (929 words) - 15:23, 23 December 2024
Crypto Wars (redirect from Responsible encryption)
As part of Bullrun, NSA has also been actively working to "insert vulnerabilities into commercial encryption systems, IT systems, networks, and endpoint...
37 KB (4,043 words) - 20:17, 10 July 2025
used in an NSA approved cryptographic module. The Advanced Encryption Standard (AES) is defined in each of: FIPS PUB 197: Advanced Encryption Standard (AES)...
50 KB (5,679 words) - 04:23, 27 July 2025
History of cryptography (redirect from History of encryption)
historical codes and ciphers Encryption by date Japanese cryptology from the 1500s to Meiji List of cryptographers NSA encryption systems Steganography Timeline...
53 KB (6,893 words) - 22:53, 28 July 2025
Communications security (category Encryption devices)
security Information warfare List of telecommunications encryption terms NSA encryption systems NSA product types Operations security Secure communication...
9 KB (1,011 words) - 02:05, 13 December 2024
pp. 4, 10 NSA encryption systems A History of U.S. Communications Security; the David G. Boak Lectures, National Security Agency (NSA), Volumes I,...
8 KB (986 words) - 07:00, 14 April 2025
KG-84 (category National Security Agency encryption devices)
The KG-84A and KG-84C are encryption devices developed by the U.S. National Security Agency (NSA) to ensure secure transmission of digital data. The KG-84C...
2 KB (265 words) - 03:49, 9 May 2025
End-to-end encryption (E2EE) is a method of implementing a secure communication system where only communicating users can participate. No one else, including...
42 KB (4,090 words) - 22:23, 22 July 2025
KL-7 (category National Security Agency encryption devices)
KL-51, an off-line, paper tape encryption system that used digital electronics instead of rotors. NSA encryption systems Typex Enigma ^ Britannica (2005)...
11 KB (1,306 words) - 15:28, 7 April 2025
Clipper chip (category National Security Agency encryption devices)
developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured "voice and data messages" with a built-in backdoor...
18 KB (1,902 words) - 19:09, 25 April 2025
In cryptography, the ElGamal encryption system is a public-key encryption algorithm based on the Diffie–Hellman key exchange. It was described by Taher...
10 KB (1,467 words) - 01:36, 20 July 2025
NSA Suite B Cryptography "POET ACM: Programmable Objective Encryption Technologies Advanced Cryptographic Module". General Dynamics Mission Systems....
3 KB (201 words) - 17:15, 6 June 2025
Key size (redirect from 128 bit encryption)
attacker. Encryption systems are often grouped into families. Common families include symmetric systems (e.g. AES) and asymmetric systems (e.g. RSA and...
29 KB (3,241 words) - 22:31, 5 August 2025
currents and therefore radiated far less. It was incorporated in newer NSA encryption systems. However, many users needed the higher signal levels to drive teleprinters...
35 KB (4,249 words) - 21:30, 2 August 2025
Bullrun (decryption program) (category Encryption debate)
classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA). The British Government...
17 KB (1,769 words) - 16:09, 1 October 2024
vocoder systems use lower data rates, but below 5 kbit/s voice quality begins to drop rapidly.[citation needed] Several vocoder systems are used in NSA encryption...
34 KB (3,526 words) - 16:34, 22 June 2025
Das Erste reported that the US National Security Agency (NSA)'s XKeyscore surveillance system sets threat definitions for people who search for Tails using...
20 KB (1,664 words) - 01:25, 16 July 2025
IPsec (section Alleged NSA interference)
actively working to "Insert vulnerabilities into commercial encryption systems, IT systems, networks, and endpoint communications devices used by targets"...
44 KB (5,339 words) - 02:48, 5 August 2025
as cascade encryption, cascade ciphering, multiple encryption, and superencipherment. Superencryption refers to the outer-level encryption of a multiple...
9 KB (1,144 words) - 03:29, 1 July 2025
PRISM (redirect from NSA Prism leak)
Prism collects this data prior to encryption." Also according to The Guardian's Glenn Greenwald even low-level NSA analysts are allowed to search and...
187 KB (17,252 words) - 17:34, 7 July 2025