CRYPTOGRAPHY: Difference between revisions
From osint.info
Jump to navigationJump to search
(23 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
= Articles = | = Articles = | ||
== 2022 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |||
|20220805||blog.cr.yp.to||[https://blog.cr.yp.to/20220805-nsa.html 2022.08.05: NSA, NIST, and post-quantum cryptography: Announcing my second lawsuit against the U.S. government. #nsa #nist #des #dsa #dualec #sigintenablingproject #nistpqc #foia]||[[CRYPTOGRAPHY]] | |||
|- | |||
|} | |||
== 2020 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |||
|20201129||fm4.orf.at||[https://fm4.orf.at/stories/3009643 „Five Eyes“ hinter den Entschlüsselungsplänen des EU-Ministerrats]||[[CRYPTOGRAPHY]] / [[FIVE EYES]] / [[EU]] / [[LEVY, IAN]] / [[DES KERCHOVE, GILLES]] | |||
|- | |||
|20200918||spiegel.de||[https://www.spiegel.de/netzwelt/web/tutanota-staatsanwaltschaft-wollte-zugriff-auf-verschluesselte-e-mails-a-00000000-0002-0001-0000-000173100110 Krypto-Dienst Tutanota Staatsanwaltschaft wollte Zugriff auf verschlüsselte E-Mails]||[[TUTANOTA]] / [[CRYPTOGRAPHY]] | |||
|- | |||
|20200221||nzz.ch||[https://www.nzz.ch/schweiz/welche-laender-fuer-500-millionen-franken-schweizer-krypto-technik-beschafften-trotz-hinweisen-auf-manipulationen-ld.1541135 Welche Länder für 500 Millionen Franken Schweizer Krypto-Technik beschafften – trotz Hinweisen auf Manipulationen]||[[CRYPTOGRAPHY]] / [[CH]] | |||
|- | |||
|} | |||
== 2017 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |||
|20170919||sueddeutsche.de||[http://www.sueddeutsche.de/digital/it-sicherheit-schwerwiegende-it-schwachstellen-koennten-offengelegt-werden-1.3673683 IT-Sicherheit: Regierung könnte ihr Hacker-Wissen offenlegen]||[[CRYPTOGRAPHY]] / [[DE]] | |||
|- | |||
|} | |||
== 2016 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |||
|20161123||blog.lukaszolejnik.com||[https://blog.lukaszolejnik.com/european-union-wants-to-regulate-cryptography/ European Union wants to regulate cryptography?]||[[CRYPTOGRAPHY]] | |||
|- | |||
|20161011||arstechnica.com||[http://arstechnica.com/security/2016/10/how-the-nsa-could-put-undetectable-trapdoors-in-millions-of-crypto-keys/ NSA could put undetectable “trapdoors” in millions of crypto keys - Technique allows attackers to passively decrypt Diffie-Hellman protected data.]||[[BACKDOORS]] / [[NSA]] / [[CRYPTOGRAPHY]] | |||
|- | |||
|20160920||spiegel.de||[http://www.spiegel.de/wissenschaft/technik/forscher-teleportieren-signale-durch-zwei-staedte-a-1113118.html Quantenkryptografie Forscher teleportieren Signale durch Städte]||[[CRYPTOGRAPHY]] | |||
|- | |||
|20160525||heise.de||[http://www.heise.de/newsticker/meldung/Crypto-Wars-3-0-Enisa-und-Europol-gegen-Hintertueren-bei-Verschluesselung-3218566.html Crypto Wars 3.0: Enisa und Europol gegen Hintertüren bei Verschlüsselung]||[[CRYPTOGRAPHY]] | |||
|- | |||
|} | |||
== 2014 == | |||
{|border=1 | {|border=1 | ||
|- | |- | ||
|Date||Source||Title||Tags | |Date||Source||Title||Tags | ||
|- | |||
|20141116||scottaaronson.com||[http://www.scottaaronson.com/blog/?p=2059 What does the NSA think of academic cryptographers? Recently-declassified document provides clues]||[[CRYPTOGRAPHY]] / [[NSA]] | |||
|- | |||
|20141107||medium.com||[https://medium.com/stanford-select/keeping-secrets-84a7697bf89f Keeping Secrets: Four decades ago, university researchers figured out the key to computer privacy, sparking a battle with the National Security Agency that continues today.]||[[CRYPTOGRAPHY]] / [[NSA]] | |||
|- | |||
|} | |||
== 2013 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |||
|20130919||spiegel.de||[http://www.spiegel.de/netzwelt/web/kryptografie-hintertueren-die-nsa-generalschluessel-fuers-internet-a-922588.html NSA-Skandale: So funktionieren Kryptografie-Hintertüren]||[[CRYPTOGRAPHY]] | |||
|- | |||
|20130918||spiegel.de||[http://www.spiegel.de/netzwelt/gadgets/verschluesselung-forscher-beschreiben-methode-fuer-hintertueren-in-chips-a-922853.html Angriff auf Verschlüsselung: Forscher entdecken Verfahren zur Chip-Sabotage]||[[CRYPTOGRAPHY]] | |||
|- | |||
|201309||umass.edu||[http://people.umass.edu/gbecker/BeckerChes13.pdf Stealthy Dopant-Level Hardware Trojans]||[[CRYPTOGRAPHY]] | |||
|- | |||
|20130916||slate.com||[http://www.slate.com/blogs/future_tense/2013/09/16/cryptographers_attack_nsa_s_secret_effort_to_subvert_internet_security.html Cryptographers Attack NSA's Secret Effort to Subvert Internet Security]||[[CRYPTOGRAPHY]] / [[NSA]] / [[GCHQ]] | |||
|- | |||
|20130916||bristolcrypto.blogspot.co.uk||[http://bristolcrypto.blogspot.co.uk/2013/09/open-letter-from-uk-security-researchers.html Open Letter From UK Security Researchers]||[[CRYPTOGRAPHY]] / [[NSA]] / [[GCHQ]] | |||
|- | |- | ||
|20130916||arstechnica.com||[http://arstechnica.com/security/2013/09/fatal-crypto-flaw-in-some-government-certified-smartcards-makes-forgery-a-snap/ Fatal crypto flaw in some government-certified smartcards makes forgery a snap - With government certifications this broken, the NSA may not need backdoors.]||[[CRYPTOGRAPHY]] | |20130916||arstechnica.com||[http://arstechnica.com/security/2013/09/fatal-crypto-flaw-in-some-government-certified-smartcards-makes-forgery-a-snap/ Fatal crypto flaw in some government-certified smartcards makes forgery a snap - With government certifications this broken, the NSA may not need backdoors.]||[[CRYPTOGRAPHY]] | ||
|- | |||
|20130906||theguardian.com||[http://www.theguardian.com/world/2013/sep/06/nsa-encryption-revelations-roadmap-us NSA decryption revelations 'provide roadmap' to adversaries, US warns - Office of the director of national intelligence also suggests stories published by the Guardian and New York Times are 'not news']||[[CRYPTOGRAPHY]] / [[NSA]] / [[DNI]] | |||
|- | |- | ||
|20130906||mail-archive.com||[http://www.mail-archive.com/cryptography@metzdowd.com/msg12325.html Re: (Cryptography) Opening Discussion: Speculation on "BULLRUN"]||[[CRYPTOGRAPHY]] / [[NSA]] | |20130906||mail-archive.com||[http://www.mail-archive.com/cryptography@metzdowd.com/msg12325.html Re: (Cryptography) Opening Discussion: Speculation on "BULLRUN"]||[[CRYPTOGRAPHY]] / [[NSA]] | ||
Line 30: | Line 106: | ||
|- | |- | ||
|20130709||guardian.co.uk||[http://www.guardian.co.uk/commentisfree/2013/jul/09/cryptography-weapon-fight-empire-states-julian-assange How cryptography is a key weapon in the fight against empire states - What began as a means of retaining individual freedom can now be used by smaller states to fend off the ambitions of larger one]||[[ASSANGE, JULIAN]] / [[CRYPTOGRAPHY]] | |20130709||guardian.co.uk||[http://www.guardian.co.uk/commentisfree/2013/jul/09/cryptography-weapon-fight-empire-states-julian-assange How cryptography is a key weapon in the fight against empire states - What began as a means of retaining individual freedom can now be used by smaller states to fend off the ambitions of larger one]||[[ASSANGE, JULIAN]] / [[CRYPTOGRAPHY]] | ||
|- | |||
|20130416||arxiv.org||[http://arxiv.org/abs/1304.4595 Quantum annealing with more than one hundred qubits]||[[CRYPTOGRAPHY]] | |||
|- | |- | ||
|} | |} | ||
Line 41: | Line 119: | ||
|SCHNEIER, BRUCE||||Secret & Lies||||||[[CRYPTOGRAPHY]] | |SCHNEIER, BRUCE||||Secret & Lies||||||[[CRYPTOGRAPHY]] | ||
|- | |- | ||
|STREHLER, RES ||Werd Verlag||Verschlüsselt. Der Fall Hans Bühler.||||3-859-32141-2||[[CRYPTOGRAPHY]] | |STREHLER, RES||Werd Verlag||Verschlüsselt. Der Fall Hans Bühler.||||3-859-32141-2||[[CRYPTOGRAPHY]] / [[CRYPTO AG]] / [[BUEHLER, HANS]] | ||
|- | |- | ||
|HARRIS, ROBERT||||Enigma||1995||3-453-11593-7||[[CRYPTOGRAPHY]] | |HARRIS, ROBERT||||Enigma||1995||3-453-11593-7||[[CRYPTOGRAPHY]] | ||
Line 65: | Line 143: | ||
|} | |} | ||
= Talks = | |||
* Phil Rogaway - IACR Distinguised Lecture 2015 / The moral character of cryptographic work | |||
* https://www.youtube.com/watch?v=F-XebcVSyJw | |||
* https://www.iacr.org/publications/dl/ann2015.html | |||
[[Category:Technologies]] | [[Category:Technologies]] |
Latest revision as of 17:39, 6 August 2022
Articles
2022
2020
Date | Source | Title | Tags |
20201129 | fm4.orf.at | „Five Eyes“ hinter den Entschlüsselungsplänen des EU-Ministerrats | CRYPTOGRAPHY / FIVE EYES / EU / LEVY, IAN / DES KERCHOVE, GILLES |
20200918 | spiegel.de | Krypto-Dienst Tutanota Staatsanwaltschaft wollte Zugriff auf verschlüsselte E-Mails | TUTANOTA / CRYPTOGRAPHY |
20200221 | nzz.ch | Welche Länder für 500 Millionen Franken Schweizer Krypto-Technik beschafften – trotz Hinweisen auf Manipulationen | CRYPTOGRAPHY / CH |
2017
Date | Source | Title | Tags |
20170919 | sueddeutsche.de | IT-Sicherheit: Regierung könnte ihr Hacker-Wissen offenlegen | CRYPTOGRAPHY / DE |
2016
Date | Source | Title | Tags |
20161123 | blog.lukaszolejnik.com | European Union wants to regulate cryptography? | CRYPTOGRAPHY |
20161011 | arstechnica.com | NSA could put undetectable “trapdoors” in millions of crypto keys - Technique allows attackers to passively decrypt Diffie-Hellman protected data. | BACKDOORS / NSA / CRYPTOGRAPHY |
20160920 | spiegel.de | Quantenkryptografie Forscher teleportieren Signale durch Städte | CRYPTOGRAPHY |
20160525 | heise.de | Crypto Wars 3.0: Enisa und Europol gegen Hintertüren bei Verschlüsselung | CRYPTOGRAPHY |
2014
Date | Source | Title | Tags |
20141116 | scottaaronson.com | What does the NSA think of academic cryptographers? Recently-declassified document provides clues | CRYPTOGRAPHY / NSA |
20141107 | medium.com | Keeping Secrets: Four decades ago, university researchers figured out the key to computer privacy, sparking a battle with the National Security Agency that continues today. | CRYPTOGRAPHY / NSA |
2013
Books
Author | Issuer | Title | Published | ISBN | Tags |
SCHNEIER, BRUCE | Secret & Lies | CRYPTOGRAPHY | |||
STREHLER, RES | Werd Verlag | Verschlüsselt. Der Fall Hans Bühler. | 3-859-32141-2 | CRYPTOGRAPHY / CRYPTO AG / BUEHLER, HANS | |
HARRIS, ROBERT | Enigma | 1995 | 3-453-11593-7 | CRYPTOGRAPHY |
Resources
Source | Title | Tags |
scz.bplaced.net | MfS Abt. N: Chiffrierwesens der Deutschen Demokratischen Republik - Zielgerichtete Koordinierung der Informationsbeschaffung über das Chiffrierwesen des Feindes / Erarbeitung von Dekryptiermethoden etc. | DECRYPTION / CRYPTOGRAPHY / MFS |
scz.bplaced.net | T-311 SELEN Bündelchiffriergerät für PCM-30 | CRYPTOGRAPHY / MFS |
scz.bplaced.net | Chiffrierordnung des MfS 1956 - 1989 | CRYPTOGRAPHY / MFS |
scz.bplaced.net | Kompromittierung von Chiffrierverfahren durch MfS / KGB | CRYPTOGRAPHY / MFS |
scz.bplaced.net | http://scz.bplaced.net/m.html [Manuelle Chiffrierverfahren] | CRYPTOGRAPHY / MFS |
Talks
- Phil Rogaway - IACR Distinguised Lecture 2015 / The moral character of cryptographic work
- https://www.youtube.com/watch?v=F-XebcVSyJw
- https://www.iacr.org/publications/dl/ann2015.html