re: request for leaks: standards for secret (not published)
All I know is that L3-Communications ( Comm.Sys.-East Division ) was at least one company who built/used Local Management Device/Key Processor ( LMD/KP ) combo ( LINUX Server ? ) . Another website of interest is the US Navy SPAWAR Info Assurance site in Charleston, South Carolina. Joe Tag --- you wrote --- Subject: Re: request for leaks: standards for secret (not published) true hardware random number generator requirements used by NSA Message-ID: <CAJVRA1T755rypnamvrP17YiXDPQP9dd1jpn2QPCJFsHp_SGguw@mail.gmail.com> Content-Type: text/plain; charset=ISO-8859-1 On Sun, Jan 19, 2014 at 8:49 PM, coderman <coderman@gmail.com> wrote:
... could this be true by tweaking constants and growing key bits? AES ~= MEDLEY ECDSA ~= SHILLELAGH ECDH ~= BATON SHA ~= SAVILLE ADH ~= WALBURN TRNG ~= JOSEKI-1
as linked, there are clues from PKCS interop which tell us about: BATON: block cipher in use since at least 1995. 320-bit key and uses a 128-bit block in most modes, and also supports a 96-bit ECB mode. 160 bits of the key are checksum material. It supports a "shuffle" mode of operation, like the NSA cipher JUNIPER. It may use up to 192 bits as an initialization vector, regardless of the block size. SAVILLE: used for voice? 128-bit key, two modes? and per http://cryptome.org/poet-acm.htm some others? ACCORDION FIREFLY KEESEE MAYFLY SHILLELAGH WEASEL (perhaps that last a stream cipher? ;)
participants (1)
-
Joseph Tag