request for leaks: standards for secret (not published)

Joseph Tag joseph.g.tag at gmail.com
Mon Jan 27 09:41:43 PST 2014


All I know is that L3-Communications ( Comm.Sys.-East Division ) was at
least one company who built/used
Local Management Device/Key Processor ( LMD/KP )  combo ( LINUX Server ? )
.

Another website of interest is the US Navy SPAWAR Info Assurance site in
Charleston, South Carolina.

Joe Tag

--- you wrote ---
Subject: Re: request for leaks: standards for secret (not published)
        true hardware random number generator requirements used by NSA
Message-ID:
        <CAJVRA1T755rypnamvrP17YiXDPQP9dd1jpn2QPCJFsHp_SGguw at mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1

On Sun, Jan 19, 2014 at 8:49 PM, coderman <coderman at gmail.com> wrote:
> ... could this be true by tweaking constants and
> growing key bits?
> AES ~= MEDLEY
> ECDSA ~= SHILLELAGH
> ECDH ~= BATON
> SHA ~= SAVILLE
> ADH ~= WALBURN
> TRNG ~= JOSEKI-1


as linked, there are clues from PKCS interop which tell us about:

BATON: block cipher in use since at least 1995. 320-bit key and uses a
128-bit block in most modes, and also supports a 96-bit ECB mode. 160
bits of the key are checksum material. It supports a "shuffle" mode of
operation, like the NSA cipher JUNIPER. It may use up to 192 bits as
an initialization vector, regardless of the block size.

SAVILLE: used for voice? 128-bit key, two modes?


and per http://cryptome.org/poet-acm.htm
 some others?

ACCORDION
FIREFLY
KEESEE
MAYFLY
SHILLELAGH
WEASEL

(perhaps that last a stream cipher? ;)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1937 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20140127/5acec11d/attachment-0001.txt>


More information about the cypherpunks mailing list