re: request for leaks: standards for secret (not published)
All I know is that L3-Communications ( Comm.Sys.-East Division ) was at
least one company who built/used
Local Management Device/Key Processor ( LMD/KP ) combo ( LINUX Server ? )
.
Another website of interest is the US Navy SPAWAR Info Assurance site in
Charleston, South Carolina.
Joe Tag
--- you wrote ---
Subject: Re: request for leaks: standards for secret (not published)
true hardware random number generator requirements used by NSA
Message-ID:
... could this be true by tweaking constants and growing key bits? AES ~= MEDLEY ECDSA ~= SHILLELAGH ECDH ~= BATON SHA ~= SAVILLE ADH ~= WALBURN TRNG ~= JOSEKI-1
as linked, there are clues from PKCS interop which tell us about: BATON: block cipher in use since at least 1995. 320-bit key and uses a 128-bit block in most modes, and also supports a 96-bit ECB mode. 160 bits of the key are checksum material. It supports a "shuffle" mode of operation, like the NSA cipher JUNIPER. It may use up to 192 bits as an initialization vector, regardless of the block size. SAVILLE: used for voice? 128-bit key, two modes? and per http://cryptome.org/poet-acm.htm some others? ACCORDION FIREFLY KEESEE MAYFLY SHILLELAGH WEASEL (perhaps that last a stream cipher? ;)
participants (1)
-
Joseph Tag