Search results
Jump to navigation
Jump to search
- '''Firefly''' is a U.S. [[National Security Agency]] [[public-key cryptography|public-key]] [[key exchange]] protocol, used in [[EKMS]], the [[STU-III]] s ...//www.fas.org/irp/doddir/army/usareur_pam380-40/380-40F.HTM Communications Security Custodian Guide], USAREUR Pamphlet 380-40 ...531 bytes (65 words) - 23:14, 9 July 2024
- ...Institute of Standards and Technology]] (NIST) and the [[National Security Agency]] (NSA); the project began in 1993.<ref name=Note1/> ...] [[PCMCIA card]]. All Capstone components were designed to provide 80-bit security.<ref name=Note4/> ...2 KB (267 words) - 08:42, 2 November 2024
- ...pecially sensitive information (a small percentage of the overall national security-related information assurance market)." * KM-TG Series - Security Software Signature ...3 KB (293 words) - 17:15, 6 June 2025
- ...[secure voice|secure telephone]] developed by the U.S. [[National Security Agency]]. It permitted up to six users to have secure communications, on a time-sh ...ond to digitize voice, and the "Key Distribution Center" (KDC) for [[key (cryptography)|key]] management. The display also stated that the STU-II B is the standar ...2 KB (257 words) - 16:10, 9 July 2024
- ...urity Agency]]. According to information on display in 2002 at the NSA's [[National Cryptologic Museum]], 110 units were built in the 1980s for use by senior g {{Cryptography navbox | machines}} ...1,012 bytes (134 words) - 05:20, 26 April 2022
- ...[secure voice|secure telephone]] developed by the U.S. [[National Security Agency]] for use by senior U.S. government officials in the 1970s.<ref>{{Cite web ...www.delusion.org/pix/trips/was-dc/200210/nsa_crypto_museum/ Delusion.org - National Cryptologic Museum pictures] ...2 KB (214 words) - 04:04, 16 October 2023
- ...omponent or other hardware item which performs a critical [[communications security]] (COMSEC) function. Items so designated may be unclassified but are subjec ...ms such as [[Classified information|classified]] and CCI equipment, [[key (cryptography)|keying material]], and maintenance manuals. Some military departments have ...2 KB (342 words) - 15:45, 1 June 2022
- ...tml |title=Decoder Ring — How a ragged band broke the government's hold on cryptography |work=The New York Times |date=January 14, 2001}}</ref> * [[Books on cryptography]] ...2 KB (279 words) - 02:12, 4 January 2025
- {{Short description|Classified National Security Agency Type 1 encryption algorithm}} ...Communications Headquarters (GCHQ)]] in the UK and the [[National Security Agency (NSA)]] in the US.<ref name=":0">{{Cite web|url=http://www.cryptomuseum.com ...3 KB (347 words) - 05:21, 9 January 2024
- ...connector is also used by the [[National Security Agency]] to load [[key (cryptography)|cryptographic keys]] into [[encryption]] equipment from a [[fill device]]. [[Category:National Security Agency encryption devices]] ...1 KB (192 words) - 13:43, 27 November 2023
- ...v/files/NCSC/documents/nittf/CNSSI-4009_National_Information_Assurance.pdf National Information Assurance Glossary] (CNSSI No. 4009, 2010)</ref> The definitio A '''Type 1 product''' was a device or system certified by NSA for use in [[cryptography|cryptographically]] securing [[classified information|classified]] U.S. Gov ...5 KB (694 words) - 15:44, 15 April 2025
- *[[RED/BLACK concept|Blacking (cryptography)]] In [[National Security Agency|NSA]] jargon, encryption devices are often called blackers, because they co ...699 bytes (84 words) - 07:41, 30 October 2024
- ...is a US [[National Security Agency]]-approved [[PC card]] which provides [[cryptography|encryption]] functions and key storage to [[Secure Terminal Equipment]] and |author = Information Technology Department of the National Nuclear Security Administration ...2 KB (217 words) - 13:28, 22 February 2023
- ..., based on the [[National Security Agency|NSA's]] classified [[NSA Suite A Cryptography|Suite A]] [[Saville (cipher)|SAVILLE]] [[encryption algorithm]] and 16  {{Cryptography navbox | machines}} ...2 KB (258 words) - 23:22, 28 May 2025
- [[Image:KL-51.nsa.jpg|thumb|KL-51 on display at the [[National Cryptologic Museum]] in 2005]] U.S. [[National Security Agency]] bought it in the 1980s to replace the earlier [[KL-7]]. As of 2006, the U ...2 KB (223 words) - 23:15, 27 March 2024
- ...services to enable developers to secure Windows-based applications using [[cryptography]]. It is a set of [[Dynamic-link library|dynamically linked libraries]] tha ...ey cryptography|public-key]] and [[Symmetric key algorithm|symmetric key]] cryptography, though persistent symmetric keys are not supported. It includes functional ...6 KB (819 words) - 08:17, 27 June 2025
- [[File:Ky-3.jpg|thumb|Two stacked KY-3s at the NSA's [[National Cryptologic Museum]]]] ...> The "TSEC" prefix to the model number indicates NSA's Telecommunications Security [[Joint Electronics Type Designation System|nomenclature system]]. ...2 KB (305 words) - 10:38, 5 February 2025
- ...dee Society''' was a society of graduates of CA-400, a [[National Security Agency]] course in [[cryptology]] devised by [[Lambros D. Callimahos]], which incl ...rse name or the [[No such agency|underlying government agency's name]] for security reasons, he spotted the ceramic Dundee jar and decided to use "The Dundee S ...3 KB (397 words) - 18:48, 16 February 2023
- ...ic Item]] (CCI) and is [[Classified information|unclassified]] when [[key (cryptography)|unkeyed]]. Keyed KG-84 equipment assumes the classification level equal to {{Cryptography navbox | machines}} ...2 KB (308 words) - 03:49, 9 May 2025
- {{Short description|Information security system}} {{about|Fortezza the security system|town in [[Italy]]|Franzensfeste}} ...5 KB (692 words) - 04:20, 26 April 2022