Search results
Jump to navigation
Jump to search
- {{Short description|Family of voice encryption devices}} {{About|the encryption devices||Vinson (disambiguation){{!}}Vinson}} ...2 KB (258 words) - 23:22, 28 May 2025
- {{Short description|Classified National Security Agency Type 1 encryption algorithm}} ...ed broadly, often for voice encryption, and implemented in many encryption devices. ...3 KB (347 words) - 05:21, 9 January 2024
- ...ion]] functions and key storage to [[Secure Terminal Equipment]] and other devices.<ref>{{cite web| ...ographic functionality of the original [[Fortezza]] card plus the [[Type 1 encryption|Type 1]] algorithms/protocols [[BATON]] and [[Firefly (protocol)|Firefly]], ...2 KB (217 words) - 13:28, 22 February 2023
- {{Short description|Keyboard encryption system}} [[Image:KL-51.nsa.jpg|thumb|KL-51 on display at the [[National Cryptologic Museum]] in 2005]] ...2 KB (223 words) - 23:15, 27 March 2024
- {{Short description|Encryption device}} ...LEX protocol. The KG-84 (A/C) is certified to handle data at all levels of security. The KG-84 (A/C) is a [[Controlled Cryptographic Item]] (CCI) and is [[Clas ...2 KB (308 words) - 03:49, 9 May 2025
- ...Security Agency]] to load [[key (cryptography)|cryptographic keys]] into [[encryption]] equipment from a [[fill device]]. [[Category:National Security Agency encryption devices]] ...1 KB (192 words) - 13:43, 27 November 2023
- ...urity Agency]]. According to information on display in 2002 at the NSA's [[National Cryptologic Museum]], 110 units were built in the 1980s for use by senior g [[Category:National Security Agency encryption devices]] ...1,012 bytes (134 words) - 05:20, 26 April 2022
- ...Institute of Standards and Technology]] (NIST) and the [[National Security Agency]] (NSA); the project began in 1993.<ref name=Note1/> ...] [[PCMCIA card]]. All Capstone components were designed to provide 80-bit security.<ref name=Note4/> ...2 KB (267 words) - 08:42, 2 November 2024
- |image =SECTERA-TIMEPORT tri-band GSM cell phone - National Cryptologic Museum - DSC07954.JPG |caption = Sectéra phone with its Security Module ...3 KB (440 words) - 07:49, 19 August 2024
- ...[secure voice|secure telephone]] developed by the U.S. [[National Security Agency]] for use by senior U.S. government officials in the 1970s.<ref>{{Cite web ...www.delusion.org/pix/trips/was-dc/200210/nsa_crypto_museum/ Delusion.org - National Cryptologic Museum pictures] ...2 KB (214 words) - 04:04, 16 October 2023
- [[File:Ky-3.jpg|thumb|Two stacked KY-3s at the NSA's [[National Cryptologic Museum]]]] ...> The "TSEC" prefix to the model number indicates NSA's Telecommunications Security [[Joint Electronics Type Designation System|nomenclature system]]. ...2 KB (305 words) - 10:38, 5 February 2025
- ...ng (cryptography)]] In [[National Security Agency|NSA]] jargon, encryption devices are often called blackers, because they convert red signals to black ...699 bytes (84 words) - 07:41, 30 October 2024
- ...[secure voice|secure telephone]] developed by the U.S. [[National Security Agency]]. It permitted up to six users to have secure communications, on a time-sh According to information on display in 2005 at the NSA's [[National Cryptologic Museum]], the STU-II was in use from the 1980s to the present. ...2 KB (257 words) - 16:10, 9 July 2024
- ...e - National Cryptologic Museum - DSC08023.JPG|thumb|KY-58 VINSON at the [[National Cryptologic Museum]]]] The [[VINSON]] '''KY-58''' is a [[secure voice]] module primarily used to [[encryption|encrypt]] radio [[communication]] to and from military aircraft and other t ...1 KB (190 words) - 14:51, 25 August 2024
- ...v/files/NCSC/documents/nittf/CNSSI-4009_National_Information_Assurance.pdf National Information Assurance Glossary] (CNSSI No. 4009, 2010)</ref> The definitio ...ied by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed. Developed using established NSA busin ...5 KB (694 words) - 15:44, 15 April 2025
- {{Short description|Module used to load cryptographic keys into encryption machines}} ...raphy)|cryptographic keys]] into electronic [[encryption]] machines. Fill devices are usually hand held and electronic ones are battery operated. ...6 KB (861 words) - 22:13, 25 December 2024
- {{Short description|Information security system}} {{about|Fortezza the security system|town in [[Italy]]|Franzensfeste}} ...5 KB (692 words) - 04:20, 26 April 2022
- ...omponent or other hardware item which performs a critical [[communications security]] (COMSEC) function. Items so designated may be unclassified but are subjec Part of the physical security protection given to COMSEC equipment and material is afforded by its specia ...2 KB (342 words) - 15:45, 1 June 2022
- ...e:Ksd-64.jpg|thumb|300px|KSD-64 "Crypto-ignition keys" on display at the [[National Cryptologic Museum]] in 2005]] ...ly it was used in [[key splitting|key-splitting]] applications: either the encryption device or the '''KSD-64''' alone is worthless, but together they can be use ...4 KB (666 words) - 11:13, 10 June 2025
- ...h;15</ref> was an on-line [[one-time pad|one-time tape]] [[Vernam cipher]] encryption system developed by the [[United Kingdom|UK]] during [[World War II]] for u ...directly with commercial circuits. The system also provided [[traffic-flow security]] (TFS). Another feature of the 5-UCO was that the receiving operator could ...2 KB (366 words) - 15:14, 26 January 2024