This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "NSA encryption systems" – news · newspapers · books · scholar · JSTOR(March 2007) (Learn how and when to remove this message)
The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA-approved systems are still classified, but much more about its early systems have become known and its most modern systems share at least some features with commercial products.
Rotor machines from the 1940s and 1950s were mechanical marvels. The first generation electronic systems were quirky devices with cantankerous punched card readers for loading keys and failure-prone, tricky-to-maintain vacuum tube circuitry. Late 20th century systems are just black boxes, often literally. In fact they are called blackers in NSA parlance because they convert plaintext classified signals (red) into encrypted unclassified ciphertext signals (black). They typically have electrical connectors for the red signals, the black signals, electrical power, and a port for loading keys. Controls can be limited to selecting between key fill, normal operation, and diagnostic modes and an all important zeroize button that erases classified information including keys and perhaps the encryption algorithms. 21st century systems often contain all the sensitive cryptographic functions on a single, tamper-resistant integrated circuit that supports multiple algorithms and allows over-the-air or network re keying, so that a single hand-held field radio, such as the AN/PRC-148 or AN/PRC-152, can interoperate with most current NSA cryptosystems.
and 23 Related for: NSA encryption systems information
responsibility for all U.S. Government encryptionsystems when it was formed in 1952. The technical details of most NSA-approved systems are still classified, but...
Dedicated Data Encryption/Decryption STU-III secure telephone unit, phased out by the STE The NSA oversees encryption in the following systems that are in...
NSAencryptionsystems, for a historically oriented list of NSAencryption products (most of them Type 1). NSA cryptography for algorithms that NSA has...
majority of the National Security Agency's work on encryption is classified, but from time to time NSA participates in standards processes or otherwise...
key material for all NSAencryptionsystems whose keys are loaded using standard fill devices, and directs the distribution of NSA produced key material...
Standard (FIPS) for the United States in 1977. The publication of an NSA-approved encryption standard led to its quick international adoption and widespread...
Soviet Union's Fialka used punched cards for this purpose. Later NSAencryptionsystems incorporated a serial port fill connector and developed several...
used in an NSA approved cryptographic module. The Advanced Encryption Standard (AES) is defined in each of: FIPS PUB 197: Advanced Encryption Standard (AES)...
As part of Bullrun, NSA has also been actively working to "insert vulnerabilities into commercial encryptionsystems, IT systems, networks, and endpoint...
security Information warfare List of telecommunications encryption terms NSAencryptionsystemsNSA product types Operations security Secure communication...
historical codes and ciphers Encryption by date Japanese cryptology from the 1500s to Meiji List of cryptographers NSAencryptionsystems Steganography Timeline...
SCIP Secure telephone Secure Terminal Equipment VINSON VoIP VPN NSAencryptionsystems ZRTP Fishbowl (secure phone) Owens, F. J. (1993). Signal Processing...
In 2018, NSA replaced Suite B with the Commercial National Security Algorithm Suite (CNSA). Suite B's components were: Advanced Encryption Standard (AES)...
Security Agency and is intended to solve problems with earlier NSAencryptionsystems for voice, including STU-III and Secure Terminal Equipment (STE)...
attacker. Encryptionsystems are often grouped into families. Common families include symmetric systems (e.g. AES) and asymmetric systems (e.g. RSA and...
message authentication code, or HMAC. benign key - (NSA) a key that has been protected by encryption or other means so that it can be distributed without...
Snowden leaks, revealed that the NSA worked to "Insert vulnerabilities into commercial encryptionsystems, IT systems, networks, and endpoint communications...
developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured "voice and data messages" with a built-in backdoor...
On 18 November 2014, Open Whisper Systems announced a partnership with WhatsApp to provide end-to-end encryption by incorporating the Signal Protocol...
of encryption as well. The National Security Agency (NSA) is currently preparing post-quantum encryption standards for the future. Quantum encryption promises...
(COMINT) The NSA considers the NIS to be one of its most reliable partners. Both agencies also cooperate to crack the encryptionsystems of mutual targets...