CRYPTOGRAPHY: Difference between revisions
From osint.info
Jump to navigationJump to search
(13 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
= Articles = | = Articles = | ||
== 2022 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |||
|20220805||blog.cr.yp.to||[https://blog.cr.yp.to/20220805-nsa.html 2022.08.05: NSA, NIST, and post-quantum cryptography: Announcing my second lawsuit against the U.S. government. #nsa #nist #des #dsa #dualec #sigintenablingproject #nistpqc #foia]||[[CRYPTOGRAPHY]] | |||
|- | |||
|} | |||
== 2020 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |||
|20201129||fm4.orf.at||[https://fm4.orf.at/stories/3009643 „Five Eyes“ hinter den Entschlüsselungsplänen des EU-Ministerrats]||[[CRYPTOGRAPHY]] / [[FIVE EYES]] / [[EU]] / [[LEVY, IAN]] / [[DES KERCHOVE, GILLES]] | |||
|- | |||
|20200918||spiegel.de||[https://www.spiegel.de/netzwelt/web/tutanota-staatsanwaltschaft-wollte-zugriff-auf-verschluesselte-e-mails-a-00000000-0002-0001-0000-000173100110 Krypto-Dienst Tutanota Staatsanwaltschaft wollte Zugriff auf verschlüsselte E-Mails]||[[TUTANOTA]] / [[CRYPTOGRAPHY]] | |||
|- | |||
|20200221||nzz.ch||[https://www.nzz.ch/schweiz/welche-laender-fuer-500-millionen-franken-schweizer-krypto-technik-beschafften-trotz-hinweisen-auf-manipulationen-ld.1541135 Welche Länder für 500 Millionen Franken Schweizer Krypto-Technik beschafften – trotz Hinweisen auf Manipulationen]||[[CRYPTOGRAPHY]] / [[CH]] | |||
|- | |||
|} | |||
== 2017 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |||
|20170919||sueddeutsche.de||[http://www.sueddeutsche.de/digital/it-sicherheit-schwerwiegende-it-schwachstellen-koennten-offengelegt-werden-1.3673683 IT-Sicherheit: Regierung könnte ihr Hacker-Wissen offenlegen]||[[CRYPTOGRAPHY]] / [[DE]] | |||
|- | |||
|} | |||
== 2016 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |||
|20161123||blog.lukaszolejnik.com||[https://blog.lukaszolejnik.com/european-union-wants-to-regulate-cryptography/ European Union wants to regulate cryptography?]||[[CRYPTOGRAPHY]] | |||
|- | |||
|20161011||arstechnica.com||[http://arstechnica.com/security/2016/10/how-the-nsa-could-put-undetectable-trapdoors-in-millions-of-crypto-keys/ NSA could put undetectable “trapdoors” in millions of crypto keys - Technique allows attackers to passively decrypt Diffie-Hellman protected data.]||[[BACKDOORS]] / [[NSA]] / [[CRYPTOGRAPHY]] | |||
|- | |||
|20160920||spiegel.de||[http://www.spiegel.de/wissenschaft/technik/forscher-teleportieren-signale-durch-zwei-staedte-a-1113118.html Quantenkryptografie Forscher teleportieren Signale durch Städte]||[[CRYPTOGRAPHY]] | |||
|- | |||
|20160525||heise.de||[http://www.heise.de/newsticker/meldung/Crypto-Wars-3-0-Enisa-und-Europol-gegen-Hintertueren-bei-Verschluesselung-3218566.html Crypto Wars 3.0: Enisa und Europol gegen Hintertüren bei Verschlüsselung]||[[CRYPTOGRAPHY]] | |||
|- | |||
|} | |||
== 2014 == | |||
{|border=1 | {|border=1 | ||
Line 8: | Line 60: | ||
|- | |- | ||
|20141107||medium.com||[https://medium.com/stanford-select/keeping-secrets-84a7697bf89f Keeping Secrets: Four decades ago, university researchers figured out the key to computer privacy, sparking a battle with the National Security Agency that continues today.]||[[CRYPTOGRAPHY]] / [[NSA]] | |20141107||medium.com||[https://medium.com/stanford-select/keeping-secrets-84a7697bf89f Keeping Secrets: Four decades ago, university researchers figured out the key to computer privacy, sparking a battle with the National Security Agency that continues today.]||[[CRYPTOGRAPHY]] / [[NSA]] | ||
|- | |||
|} | |||
== 2013 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |- | ||
|20130919||spiegel.de||[http://www.spiegel.de/netzwelt/web/kryptografie-hintertueren-die-nsa-generalschluessel-fuers-internet-a-922588.html NSA-Skandale: So funktionieren Kryptografie-Hintertüren]||[[CRYPTOGRAPHY]] | |20130919||spiegel.de||[http://www.spiegel.de/netzwelt/web/kryptografie-hintertueren-die-nsa-generalschluessel-fuers-internet-a-922588.html NSA-Skandale: So funktionieren Kryptografie-Hintertüren]||[[CRYPTOGRAPHY]] | ||
Line 59: | Line 119: | ||
|SCHNEIER, BRUCE||||Secret & Lies||||||[[CRYPTOGRAPHY]] | |SCHNEIER, BRUCE||||Secret & Lies||||||[[CRYPTOGRAPHY]] | ||
|- | |- | ||
|STREHLER, RES ||Werd Verlag||Verschlüsselt. Der Fall Hans Bühler.||||3-859-32141-2||[[CRYPTOGRAPHY]] | |STREHLER, RES||Werd Verlag||Verschlüsselt. Der Fall Hans Bühler.||||3-859-32141-2||[[CRYPTOGRAPHY]] / [[CRYPTO AG]] / [[BUEHLER, HANS]] | ||
|- | |- | ||
|HARRIS, ROBERT||||Enigma||1995||3-453-11593-7||[[CRYPTOGRAPHY]] | |HARRIS, ROBERT||||Enigma||1995||3-453-11593-7||[[CRYPTOGRAPHY]] | ||
Line 83: | Line 143: | ||
|} | |} | ||
= Talks = | |||
* Phil Rogaway - IACR Distinguised Lecture 2015 / The moral character of cryptographic work | |||
* https://www.youtube.com/watch?v=F-XebcVSyJw | |||
* https://www.iacr.org/publications/dl/ann2015.html | |||
[[Category:Technologies]] | [[Category:Technologies]] |
Latest revision as of 17:39, 6 August 2022
Articles
2022
2020
Date | Source | Title | Tags |
20201129 | fm4.orf.at | „Five Eyes“ hinter den Entschlüsselungsplänen des EU-Ministerrats | CRYPTOGRAPHY / FIVE EYES / EU / LEVY, IAN / DES KERCHOVE, GILLES |
20200918 | spiegel.de | Krypto-Dienst Tutanota Staatsanwaltschaft wollte Zugriff auf verschlüsselte E-Mails | TUTANOTA / CRYPTOGRAPHY |
20200221 | nzz.ch | Welche Länder für 500 Millionen Franken Schweizer Krypto-Technik beschafften – trotz Hinweisen auf Manipulationen | CRYPTOGRAPHY / CH |
2017
Date | Source | Title | Tags |
20170919 | sueddeutsche.de | IT-Sicherheit: Regierung könnte ihr Hacker-Wissen offenlegen | CRYPTOGRAPHY / DE |
2016
Date | Source | Title | Tags |
20161123 | blog.lukaszolejnik.com | European Union wants to regulate cryptography? | CRYPTOGRAPHY |
20161011 | arstechnica.com | NSA could put undetectable “trapdoors” in millions of crypto keys - Technique allows attackers to passively decrypt Diffie-Hellman protected data. | BACKDOORS / NSA / CRYPTOGRAPHY |
20160920 | spiegel.de | Quantenkryptografie Forscher teleportieren Signale durch Städte | CRYPTOGRAPHY |
20160525 | heise.de | Crypto Wars 3.0: Enisa und Europol gegen Hintertüren bei Verschlüsselung | CRYPTOGRAPHY |
2014
Date | Source | Title | Tags |
20141116 | scottaaronson.com | What does the NSA think of academic cryptographers? Recently-declassified document provides clues | CRYPTOGRAPHY / NSA |
20141107 | medium.com | Keeping Secrets: Four decades ago, university researchers figured out the key to computer privacy, sparking a battle with the National Security Agency that continues today. | CRYPTOGRAPHY / NSA |
2013
Books
Author | Issuer | Title | Published | ISBN | Tags |
SCHNEIER, BRUCE | Secret & Lies | CRYPTOGRAPHY | |||
STREHLER, RES | Werd Verlag | Verschlüsselt. Der Fall Hans Bühler. | 3-859-32141-2 | CRYPTOGRAPHY / CRYPTO AG / BUEHLER, HANS | |
HARRIS, ROBERT | Enigma | 1995 | 3-453-11593-7 | CRYPTOGRAPHY |
Resources
Source | Title | Tags |
scz.bplaced.net | MfS Abt. N: Chiffrierwesens der Deutschen Demokratischen Republik - Zielgerichtete Koordinierung der Informationsbeschaffung über das Chiffrierwesen des Feindes / Erarbeitung von Dekryptiermethoden etc. | DECRYPTION / CRYPTOGRAPHY / MFS |
scz.bplaced.net | T-311 SELEN Bündelchiffriergerät für PCM-30 | CRYPTOGRAPHY / MFS |
scz.bplaced.net | Chiffrierordnung des MfS 1956 - 1989 | CRYPTOGRAPHY / MFS |
scz.bplaced.net | Kompromittierung von Chiffrierverfahren durch MfS / KGB | CRYPTOGRAPHY / MFS |
scz.bplaced.net | http://scz.bplaced.net/m.html [Manuelle Chiffrierverfahren] | CRYPTOGRAPHY / MFS |
Talks
- Phil Rogaway - IACR Distinguised Lecture 2015 / The moral character of cryptographic work
- https://www.youtube.com/watch?v=F-XebcVSyJw
- https://www.iacr.org/publications/dl/ann2015.html