CRYPTOGRAPHY: Difference between revisions

From osint.info
Jump to navigationJump to search
A (talk | contribs)
A (talk | contribs)
 
(24 intermediate revisions by the same user not shown)
Line 1: Line 1:
= Articles =
= Articles =
== 2022 ==
{|border=1
|-
|Date||Source||Title||Tags
|-
|20220805||blog.cr.yp.to||[https://blog.cr.yp.to/20220805-nsa.html 2022.08.05: NSA, NIST, and post-quantum cryptography: Announcing my second lawsuit against the U.S. government. #nsa #nist #des #dsa #dualec #sigintenablingproject #nistpqc #foia]||[[CRYPTOGRAPHY]]
|-
|}
== 2020 ==
{|border=1
|-
|Date||Source||Title||Tags
|-
|20201129||fm4.orf.at||[https://fm4.orf.at/stories/3009643 „Five Eyes“ hinter den Entschlüsselungsplänen des EU-Ministerrats]||[[CRYPTOGRAPHY]] / [[FIVE EYES]] / [[EU]] / [[LEVY, IAN]] / [[DES KERCHOVE, GILLES]]
|-
|20200918||spiegel.de||[https://www.spiegel.de/netzwelt/web/tutanota-staatsanwaltschaft-wollte-zugriff-auf-verschluesselte-e-mails-a-00000000-0002-0001-0000-000173100110 Krypto-Dienst Tutanota Staatsanwaltschaft wollte Zugriff auf verschlüsselte E-Mails]||[[TUTANOTA]] / [[CRYPTOGRAPHY]]
|-
|20200221||nzz.ch||[https://www.nzz.ch/schweiz/welche-laender-fuer-500-millionen-franken-schweizer-krypto-technik-beschafften-trotz-hinweisen-auf-manipulationen-ld.1541135 Welche Länder für 500 Millionen Franken  Schweizer Krypto-Technik beschafften – trotz Hinweisen auf Manipulationen]||[[CRYPTOGRAPHY]] / [[CH]]
|-
|}
== 2017 ==
{|border=1
|-
|Date||Source||Title||Tags
|-
|20170919||sueddeutsche.de||[http://www.sueddeutsche.de/digital/it-sicherheit-schwerwiegende-it-schwachstellen-koennten-offengelegt-werden-1.3673683 IT-Sicherheit: Regierung könnte ihr Hacker-Wissen offenlegen]||[[CRYPTOGRAPHY]] / [[DE]]
|-
|}
== 2016 ==


{|border=1
{|border=1
|-
|-
|Date||Source||Title||Tags
|Date||Source||Title||Tags
|-
|20161123||blog.lukaszolejnik.com||[https://blog.lukaszolejnik.com/european-union-wants-to-regulate-cryptography/ European Union wants to regulate cryptography?]||[[CRYPTOGRAPHY]]
|-
|20161011||arstechnica.com||[http://arstechnica.com/security/2016/10/how-the-nsa-could-put-undetectable-trapdoors-in-millions-of-crypto-keys/ NSA could put undetectable “trapdoors” in millions of crypto keys - Technique allows attackers to passively decrypt Diffie-Hellman protected data.]||[[BACKDOORS]] / [[NSA]] / [[CRYPTOGRAPHY]]
|-
|20160920||spiegel.de||[http://www.spiegel.de/wissenschaft/technik/forscher-teleportieren-signale-durch-zwei-staedte-a-1113118.html Quantenkryptografie Forscher teleportieren Signale durch Städte]||[[CRYPTOGRAPHY]]
|-
|20160525||heise.de||[http://www.heise.de/newsticker/meldung/Crypto-Wars-3-0-Enisa-und-Europol-gegen-Hintertueren-bei-Verschluesselung-3218566.html Crypto Wars 3.0: Enisa und Europol gegen Hintertüren bei Verschlüsselung]||[[CRYPTOGRAPHY]]
|-
|}
== 2014 ==
{|border=1
|-
|Date||Source||Title||Tags
|-
|20141116||scottaaronson.com||[http://www.scottaaronson.com/blog/?p=2059 What does the NSA think of academic cryptographers? Recently-declassified document provides clues]||[[CRYPTOGRAPHY]] / [[NSA]]
|-
|20141107||medium.com||[https://medium.com/stanford-select/keeping-secrets-84a7697bf89f Keeping Secrets: Four decades ago, university researchers figured out the key to computer privacy, sparking a battle with the National Security Agency that continues today.]||[[CRYPTOGRAPHY]] / [[NSA]]
|-
|}
== 2013 ==
{|border=1
|-
|Date||Source||Title||Tags
|-
|20130919||spiegel.de||[http://www.spiegel.de/netzwelt/web/kryptografie-hintertueren-die-nsa-generalschluessel-fuers-internet-a-922588.html NSA-Skandale: So funktionieren Kryptografie-Hintertüren]||[[CRYPTOGRAPHY]]
|-
|20130918||spiegel.de||[http://www.spiegel.de/netzwelt/gadgets/verschluesselung-forscher-beschreiben-methode-fuer-hintertueren-in-chips-a-922853.html Angriff auf Verschlüsselung: Forscher entdecken Verfahren zur Chip-Sabotage]||[[CRYPTOGRAPHY]]
|-
|201309||umass.edu||[http://people.umass.edu/gbecker/BeckerChes13.pdf Stealthy Dopant-Level Hardware Trojans]||[[CRYPTOGRAPHY]]
|-
|20130916||slate.com||[http://www.slate.com/blogs/future_tense/2013/09/16/cryptographers_attack_nsa_s_secret_effort_to_subvert_internet_security.html Cryptographers Attack NSA's Secret Effort to Subvert Internet Security]||[[CRYPTOGRAPHY]] / [[NSA]] / [[GCHQ]]
|-
|20130916||bristolcrypto.blogspot.co.uk||[http://bristolcrypto.blogspot.co.uk/2013/09/open-letter-from-uk-security-researchers.html Open Letter From UK Security Researchers]||[[CRYPTOGRAPHY]] / [[NSA]] / [[GCHQ]]
|-
|20130916||arstechnica.com||[http://arstechnica.com/security/2013/09/fatal-crypto-flaw-in-some-government-certified-smartcards-makes-forgery-a-snap/ Fatal crypto flaw in some government-certified smartcards makes forgery a snap - With government certifications this broken, the NSA may not need backdoors.]||[[CRYPTOGRAPHY]]
|-
|20130906||theguardian.com||[http://www.theguardian.com/world/2013/sep/06/nsa-encryption-revelations-roadmap-us NSA decryption revelations 'provide roadmap' to adversaries, US warns - Office of the director of national intelligence also suggests stories published by the Guardian and New York Times are 'not news']||[[CRYPTOGRAPHY]] / [[NSA]] / [[DNI]]
|-
|-
|20130906||mail-archive.com||[http://www.mail-archive.com/cryptography@metzdowd.com/msg12325.html Re: (Cryptography) Opening Discussion: Speculation on "BULLRUN"]||[[CRYPTOGRAPHY]] / [[NSA]]
|20130906||mail-archive.com||[http://www.mail-archive.com/cryptography@metzdowd.com/msg12325.html Re: (Cryptography) Opening Discussion: Speculation on "BULLRUN"]||[[CRYPTOGRAPHY]] / [[NSA]]
Line 28: Line 106:
|-
|-
|20130709||guardian.co.uk||[http://www.guardian.co.uk/commentisfree/2013/jul/09/cryptography-weapon-fight-empire-states-julian-assange How cryptography is a key weapon in the fight against empire states - What began as a means of retaining individual freedom can now be used by smaller states to fend off the ambitions of larger one]||[[ASSANGE, JULIAN]] / [[CRYPTOGRAPHY]]
|20130709||guardian.co.uk||[http://www.guardian.co.uk/commentisfree/2013/jul/09/cryptography-weapon-fight-empire-states-julian-assange How cryptography is a key weapon in the fight against empire states - What began as a means of retaining individual freedom can now be used by smaller states to fend off the ambitions of larger one]||[[ASSANGE, JULIAN]] / [[CRYPTOGRAPHY]]
|-
|20130416||arxiv.org||[http://arxiv.org/abs/1304.4595 Quantum annealing with more than one hundred qubits]||[[CRYPTOGRAPHY]]
|-
|-
|}
|}
Line 39: Line 119:
|SCHNEIER, BRUCE||||Secret & Lies||||||[[CRYPTOGRAPHY]] 
|SCHNEIER, BRUCE||||Secret & Lies||||||[[CRYPTOGRAPHY]] 
|-
|-
|STREHLER, RES ||Werd Verlag||Verschlüsselt. Der Fall Hans Bühler.||||3-859-32141-2||[[CRYPTOGRAPHY]] / [[CRYPTO AG]]
|STREHLER, RES||Werd Verlag||Verschlüsselt. Der Fall Hans Bühler.||||3-859-32141-2||[[CRYPTOGRAPHY]] / [[CRYPTO AG]] / [[BUEHLER, HANS]]
|-
|-
|HARRIS, ROBERT||||Enigma||1995||3-453-11593-7||[[CRYPTOGRAPHY]] 
|HARRIS, ROBERT||||Enigma||1995||3-453-11593-7||[[CRYPTOGRAPHY]] 
Line 63: Line 143:
|}
|}


= Talks =
* Phil Rogaway - IACR Distinguised Lecture 2015  / The moral character of cryptographic work
* https://www.youtube.com/watch?v=F-XebcVSyJw
* https://www.iacr.org/publications/dl/ann2015.html


[[Category:Technologies]]
[[Category:Technologies]]

Latest revision as of 17:39, 6 August 2022

Articles

2022

Date Source Title Tags
20220805 blog.cr.yp.to 2022.08.05: NSA, NIST, and post-quantum cryptography: Announcing my second lawsuit against the U.S. government. #nsa #nist #des #dsa #dualec #sigintenablingproject #nistpqc #foia CRYPTOGRAPHY

2020

Date Source Title Tags
20201129 fm4.orf.at „Five Eyes“ hinter den Entschlüsselungsplänen des EU-Ministerrats CRYPTOGRAPHY / FIVE EYES / EU / LEVY, IAN / DES KERCHOVE, GILLES
20200918 spiegel.de Krypto-Dienst Tutanota Staatsanwaltschaft wollte Zugriff auf verschlüsselte E-Mails TUTANOTA / CRYPTOGRAPHY
20200221 nzz.ch Welche Länder für 500 Millionen Franken Schweizer Krypto-Technik beschafften – trotz Hinweisen auf Manipulationen CRYPTOGRAPHY / CH

2017

Date Source Title Tags
20170919 sueddeutsche.de IT-Sicherheit: Regierung könnte ihr Hacker-Wissen offenlegen CRYPTOGRAPHY / DE

2016

Date Source Title Tags
20161123 blog.lukaszolejnik.com European Union wants to regulate cryptography? CRYPTOGRAPHY
20161011 arstechnica.com NSA could put undetectable “trapdoors” in millions of crypto keys - Technique allows attackers to passively decrypt Diffie-Hellman protected data. BACKDOORS / NSA / CRYPTOGRAPHY
20160920 spiegel.de Quantenkryptografie Forscher teleportieren Signale durch Städte CRYPTOGRAPHY
20160525 heise.de Crypto Wars 3.0: Enisa und Europol gegen Hintertüren bei Verschlüsselung CRYPTOGRAPHY

2014

Date Source Title Tags
20141116 scottaaronson.com What does the NSA think of academic cryptographers? Recently-declassified document provides clues CRYPTOGRAPHY / NSA
20141107 medium.com Keeping Secrets: Four decades ago, university researchers figured out the key to computer privacy, sparking a battle with the National Security Agency that continues today. CRYPTOGRAPHY / NSA

2013

Date Source Title Tags
20130919 spiegel.de NSA-Skandale: So funktionieren Kryptografie-Hintertüren CRYPTOGRAPHY
20130918 spiegel.de Angriff auf Verschlüsselung: Forscher entdecken Verfahren zur Chip-Sabotage CRYPTOGRAPHY
201309 umass.edu Stealthy Dopant-Level Hardware Trojans CRYPTOGRAPHY
20130916 slate.com Cryptographers Attack NSA's Secret Effort to Subvert Internet Security CRYPTOGRAPHY / NSA / GCHQ
20130916 bristolcrypto.blogspot.co.uk Open Letter From UK Security Researchers CRYPTOGRAPHY / NSA / GCHQ
20130916 arstechnica.com Fatal crypto flaw in some government-certified smartcards makes forgery a snap - With government certifications this broken, the NSA may not need backdoors. CRYPTOGRAPHY
20130906 theguardian.com NSA decryption revelations 'provide roadmap' to adversaries, US warns - Office of the director of national intelligence also suggests stories published by the Guardian and New York Times are 'not news' CRYPTOGRAPHY / NSA / DNI
20130906 mail-archive.com Re: (Cryptography) Opening Discussion: Speculation on "BULLRUN" CRYPTOGRAPHY / NSA
20130906 motherjones.com Snowden Disclosures Finally Hit 12 on a Scale of 1 to 10 SNOWDEN, EDWARD / NSA / CRYPTOGRAPHY / CRYPTANALYSIS
20130906 spiegel.de Internet-Verschlüsselung: Bundesregierung redet Snowden-Enthüllungen klein CRYPTOGRAPHY / DE / NSA
20130906 spiegel.de Neue Snowden-Enthüllungen: Wettlauf um die sicherste Verschlüsselung CRYPTOGRAPHY / NSA / SCHNEIER, BRUCE / WEIS, RUEDIGER
20130906 spiegel.de Neue Snowden-Enthüllungen: NSA knackt systematisch Verschlüsselung im Internet NSA / CRYPTOGRAPHY / SNOWDEN, EDWARD
20130906 badische-zeitung.de ABHÖRSKANDAL - Snowden-Enthüllung: NSA kann verschlüsselte Daten knacken NSA / CRYPTOGRAPHY
20130905 randombit.net [cryptography what has the NSA broken?] CRYPTOGRAPHY / NSA
20130905 cryptographyengineering.com On the NSA CRYPTOGRAPHY / NSA
20130728 tagesschau.de SPD-Chef Gabriel zur Spähaffäre: Datenverschlüsselung als Pflicht GABRIEL, SIGMAR / CRYPTOGRAPHY / NSA / DE
20130725 spiegel.de NSA-Attacke auf Internetverbindungen: Verschlüsseln ist Notwehr CRYPTOGRAPHY
20130720 spiegel.de Ablehnung von Sponsoring: Crypto-Aktivisten verteidigen Neutralität CRYPTOGRAPHY / BITCOM / CCC / CRYPTOPARTY
20130709 guardian.co.uk How cryptography is a key weapon in the fight against empire states - What began as a means of retaining individual freedom can now be used by smaller states to fend off the ambitions of larger one ASSANGE, JULIAN / CRYPTOGRAPHY
20130416 arxiv.org Quantum annealing with more than one hundred qubits CRYPTOGRAPHY

Books

Author Issuer Title Published ISBN Tags
SCHNEIER, BRUCE Secret & Lies CRYPTOGRAPHY 
STREHLER, RES Werd Verlag Verschlüsselt. Der Fall Hans Bühler. 3-859-32141-2 CRYPTOGRAPHY / CRYPTO AG / BUEHLER, HANS
HARRIS, ROBERT Enigma 1995 3-453-11593-7 CRYPTOGRAPHY 

Resources

Source Title Tags
scz.bplaced.net MfS Abt. N: Chiffrierwesens der Deutschen Demokratischen Republik - Zielgerichtete Koordinierung der Informationsbeschaffung über das Chiffrierwesen des Feindes / Erarbeitung von Dekryptiermethoden etc. DECRYPTION / CRYPTOGRAPHY / MFS
scz.bplaced.net T-311 SELEN Bündelchiffriergerät für PCM-30 CRYPTOGRAPHY / MFS
scz.bplaced.net Chiffrierordnung des MfS 1956 - 1989 CRYPTOGRAPHY / MFS
scz.bplaced.net Kompromittierung von Chiffrierverfahren durch MfS / KGB CRYPTOGRAPHY / MFS
scz.bplaced.net http://scz.bplaced.net/m.html [Manuelle Chiffrierverfahren] CRYPTOGRAPHY / MFS

Talks