|
|
|
|
This page is a stub
This page will be used as a hub to the various cryptographic algorithms
used in the equipment described on this website.
|
Below is a non-exhaustive overview of (secret) encryption algorithms that
have been developed by or for the US
National Security Agency (NSA)
and that are further described on this website.
These algorithms are generally classed as an NSA Type 1 or Type 2
algorithm and are intended for governmental and military use.
For a more complete overview, check out
this page.
|
- BATON
Secret NSA
Type 1
high-speed block cipher algorithm, used in several
products, such as the
Fortezza Plus crypto card and the
Philips GCD-Φ cryptographic processor.
- HAVEQUICK I/II
High-speed Frequency Hopping (FH) system used as an
Electronic Counter-Counter Measure (ECCM).
Implemented in the Cypris crypto chip.
- SAVILLE I/II
NSA
Type 1
encryption algorithm for voice and data traffic, jointly
developed by GCHQ (UK) and NSA (USA).
Used in products like AIM,
Cypris, Windster, INDICTOR,
KY-57 (VINSON),
KY-99 (ANDVT),
Spendex 40,
Cougar and
KG-84.
➤ More
- SKIPJACK
Block cipher algorithm, developed by NSA for used in key-escrow
applications, such as the ill-fated Clipper Chip.
It was also implemented as one of the algorithms in
Fortezza,
Fortezza Plus
and Palladium.
Skipjack was declassified by NSA on 24 June 1998.
➤ More
- WALBURN
NSA
Type 1
encryption algorithm for bulk encryptors,
characterized by the use of so-called hairpin registers.
Used in high-speed Trunk Encryption Devices (TED), like
KG-81,
KG-94,
KG-194,
KG-95 and
AIM (2004).
➤ More
|
|
Backdoored NSA algorithms
|
|
|
- PX-1000Cr
In 1983, the NSA persuaded Dutch electronics giant
Philips
to replace the DES algorithm of its PX-1000 pocket telex,
by an alternative NSA-developed algorithm
that appeared stronger, but could in reality be broken with relative ease
by NSA.
- SBT Algorithm
In 1984, the NSA persuaded Dutch electronics giant
Philips
to replace the DES algorithm of the
Nokia SANLA, also known as the
Short Burst Terminal (SBT), by an NSA-supplied alternative that
appeared stronger but was in fact breakable. The product was released as the
Philips UA-8295.
The weakened cipher was internally known as the
SBT algorithm.
|
|
|
Any links shown in red are currently unavailable.
If you like the information on this website, why not make a donation?
© Crypto Museum. Created: Friday 20 May 2016. Last changed: Saturday, 11 May 2024 - 15:21 CET.
|
|
|
|
|