Difference between revisions of "CRYPTANALYTICS"
From Buggedplanet.info
Jump to navigationJump to search(46 intermediate revisions by the same user not shown) | |||
Line 9: | Line 9: | ||
|20141229||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/snowden-dokumente-nsa-attacken-auf-ssl-vpn-ssh-tor-a-1010553.html NSA-Attacken auf SSL, VPN, SSH, Tor etc.: Das sind die Snowden-Dokumente]||[[NSA]] / [[CRYPTANALYTICS]] | |20141229||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/snowden-dokumente-nsa-attacken-auf-ssl-vpn-ssh-tor-a-1010553.html NSA-Attacken auf SSL, VPN, SSH, Tor etc.: Das sind die Snowden-Dokumente]||[[NSA]] / [[CRYPTANALYTICS]] | ||
|- | |- | ||
− | | | + | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35531.pdf GCHQ Document: BULLRUN Col - Briefing Sheet]||[[GCHQ]] / [[BULLRUN]] / [[CRYPTANALYTICS]] |
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35532.pdf GCHQ Document: BULLRUN]||[[GCHQ]] / [[BULLRUN]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35530.pdf NSA Document: User´s Guide for PRISM Skype Collection]||[[NSA]] / [[US-984XN]] / [[S3531]] / [[SKYPE]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35533.pdf NSA Document: LONGHAUL end-to-end attack orchestration and key recovery service]||[[NSA]] / [[LONGHAUL]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35536.pdf NSA Document: SCARLETFEVER ]||[[NSA]] / [[TURMOIL]] / [[WEALTHYCLUSTER]] / [[TEe]] / [[SCARLETFEVER]] / [[SSL/TLS]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35537.pdf NSA Document: VoIP NSA alias]||[[NSA]] / [[VPN]] / [[VOIP]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35534.pdf NSA Document: Net Defense from Encrypted Communications]||[[NSA]] / [[TURMOIL]] / [[BLUESNORT]] / [[GALLANTWAVE]] / [[XKEYSCORE]] / [[LONGHAUL]] / [[NETFLOW]] / [[FULL SNORT]] / [[POPQUIZ]] / [[TUTELAGE]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35535.pdf NSA Document: SIGDEV Conference 2012 - (U) Making Things Measureable: Technology trending Challenges and Approaches]||[[NSA]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35510.pdf CSEC Document: TLS Trends: A roundatable discussion on current usage and future directions (CSEC Document)]||[[CSEC]] / [[SSL/TLS]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35509.pdf GCHQ Document: Innov8 Experiment Profile Cryptanalytic Services]||[[GCHQ]] / [[SSL/TLS]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35511.pdf NSA Document: Secure Sockets Layer (SSL) / Transport Layer Security (TLS)]||[[NSA]] / [[SCARLETFEVER]] / [[SSL/TLS]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35512.pdf GCHQ Document: TLS trends at GCHQ]||[[GCHQ]] / [[FLYINGPIG]] / [[SSL/TLS]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35513.pdf NSA Document: TURMOIL/APEX/APEX High Level Describtion Document]||[[NSA]] / [[APEX]] / [[TURMOIL]] / [[FASHIONCLEFT]] / [[HAMMERMILL]] / [[HAMMERSTEIN]] / [[HAMMERCHANT]] / [[IPSEC]] / [[VPN]] / [[VOIP]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35516.pdf NSA Document: Analytic Challenges from Active-Passive Integration]||[[NSA]] / [[S324]] / [[VPN]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35519.pdf NSA Document: POISENNUT Virtual Private Network Attack Orchestrator (VAO)]||[[NSA]] / [[WEALTHYCLUSTER]] / [[POISENNUT]] / [[TURMOIL]] / [[VPN]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35520.pdf NSA Document: VPN SigDev Basics]||[[NSA]] / [[VPN]] / [[CRYPTANALYTICS]] / [[DISCOROUTE]] / [[TOYGRIPPE]] / [[MARINA]] / [[MASTERSHAKE]] / [[NKB]] / [[PINWALE]] / [[RENOIR]] / [[TREASUREMAP]] / [[TUNINGFORK]] / [[XKEYSCORE]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35521.pdf GCHQ Document: Profiling SSL and Attributing Private Networks]||[[GCHQ]] / [[FLYINGPIG]] / [[HUSH PUPPY]] / [[VPN]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35523.pdf NSA Document: Virtual Private Network Transform Engine Emulator (TEe)]||[[NSA]] / [[TEe]] / [[CRYPTANALYTICS]] / [[VPN]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35524.pdf NSA Document: POISENNUT Product]||[[NSA]] / [[POISENNUT]] / [[VPN]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35525.pdf NSA Document: TURMOIL GALLANTWAVE]||[[NSA]] / [[TURMOIL]] / [[GALLANTWAVE]] / [[VPN]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35526.pdf NSA Document: TURMOIL VPN PROCESSING]||[[NSA]] / [[TURMOIL]] / [[VPN]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35527.pdf NSA Document: VALIANTSURF Data Network Cipher (DNC) exploitation]||[[NSA]] / [[VALIANTSURF]] / [[VPN]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35514.pdf NSA Document: GALLANTWAVE@scale / GALANTWAVE @volume]||[[NSA]] / [[GALLANTWAVE]] / [[LONGHAUL]] / [[VPN]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35517.pdf NSA Document: VALIANTSURF (VS) Capabilities]||[[NSA]] / [[TURMOIL]] / [[VALIANTSURF]] / [[CRYPTANALYTICS]] / [[VPN]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35518.pdf NSA Document: VS MALIBU IKE and ESP Metadata Flows]||[[NSA]] / [[MALIBU]] / [[TURMOIL]] / [[VALIANTSURF]] / [[VPN]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35528.pdf NSA Document: SPIN 15 VPN Story]||[[NSA]] / [[TURMOIL]] / [[VPN]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35526.pdf NSA Document: TURMOIL IPSEC VPN Sessionization]||[[NSA]] / [[TURMOIL]] / [[IPSEC]] / [[VPN]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35529.pdf NSA Document: Fielded Capability: End-to-End VPN SPIN 9 Design Review]||[[NSA]] / [[TURBULENCE]] / [[TURMOIL]] / [[PRESSUREWAVE]] / [[TOYGRIPPE]] / [[KEYCARD]] / [[XKEYSCORE]] / [[TUBE]] / [[IPSEC]] / [[VPN]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35515.pdf NSA Document: Intro to the VPN Exploitation Process]||[[NSA]] / [[PINWALE]] / [[TOYGRIPPE]] / [[XKEYSCORE]] / [[FOURSCORE]] / [[VULCANDEATHGRIP]] / [[IPSEC]] / [[PPTP]] / [[SSL/TLS]] / [[VPN]] / [[SSH]] / [[CRYPTANALYTICS]] / [[S31176]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35550.pdf NSA Document: NIRAL EDGE Newsletter September 2008 Editiion]||[[NSA]] / [[AES]] / [[TUNDRA]] / [[TAU]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35547.pdf GCHQ Document: Crypt Ops Data Store User Guide]||[[GCHQ]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35544.pdf NSA Document: SIGINT Strategy Threads 4 and 7 (from SID Today)]||[[NSA]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35546.pdf NSA Document: Classification Guide for Cryptanalysis]||[[NSA]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |201401228||spiegel.de||[http://www.spiegel.de/media/media-35545.pdf NSA Document: Intercept with PGP encrypted message]|| | ||
+ | [[NSA]] / [[PGP]] / [[GPG]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35548.pdf NSA Document: Crypt Discovery Joint Collaboration Activity]||[[NSA]] / [[GCHQ]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35549.pdf NSA Document: Cryptographic Modernization (CryptoMod) Classification Guide 3-9]||[[NSA]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |20141228||spiegel.de||[http://www.spiegel.de/media/media-35551.pdf NSA Document: What Your Mother Never Told You About SIGDEV Analysis]||[[NSA]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |201401228||spiegel.de||[http://www.spiegel.de/media/media-35540.pdf NSA Document: Internet Anonymity 2011]||[[NSA]] / [[CRYPTANALYTICS]] / [[TOR]] / [[VPN]] | ||
+ | |- | ||
+ | |201401228||spiegel.de||[http://www.spiegel.de/media/media-35538.pdf NSA Document: A potential technique to deanonymise users of the TOR network]||[[NSA]] / [[TOR]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |201401228||spiegel.de||[http://www.spiegel.de/media/media-35539.pdf NSA Document: Tor Hidden Services - How Hidden is ´Hidden´ ?]||[[NSA]] / [[TOR]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |201401228||spiegel.de||[http://www.spiegel.de/media/media-35543.pdf NSA Document: A potential technique to deanonymise users of the TOR network]||[[NSA]] / [[TOR]] / [[CRYPTANALYTICS]] | ||
|- | |- | ||
− | | | + | |201401228||spiegel.de||[http://www.spiegel.de/media/media-35541.pdf NSA Document: TOR deanonymisation research (MIP)]||[[NSA]] / [[TOR]] / [[CRYPTANALYTICS]] |
|- | |- | ||
− | | | + | |201401228||spiegel.de||[http://www.spiegel.de/media/media-35542.pdf NSA Document: Tor: Overview of Existing Techniques]||[[NSA]] / [[TOR]] / [[CRYPTANALYTICS]] |
|- | |- | ||
− | | | + | |20141229||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/snowden-dokument-so-unterminiert-die-nsa-die-sicherheit-des-internets-a-1010588.html Snowden-Dokumente: Was die NSA knacken kann - und was nicht]||[[NSA]] / [[CRYPTANALYTICS]] |
|- | |- | ||
|20141228||spiegel.de||[http://www.spiegel.de/international/world/nsa-documents-attacks-on-vpn-ssl-tls-ssh-tor-a-1010525.html NSA Documents: Attacks on VPN, SSL, TLS, SSH, Tor]||[[NSA]] / [[CRYPTANALYTICS]] | |20141228||spiegel.de||[http://www.spiegel.de/international/world/nsa-documents-attacks-on-vpn-ssl-tls-ssh-tor-a-1010525.html NSA Documents: Attacks on VPN, SSL, TLS, SSH, Tor]||[[NSA]] / [[CRYPTANALYTICS]] | ||
|- | |- | ||
|20141228||spiegel.de||[http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html Prying Eyes: Inside the NSA's War on Internet Security]||[[NSA]] / [[CRYPTANALYTICS]] | |20141228||spiegel.de||[http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html Prying Eyes: Inside the NSA's War on Internet Security]||[[NSA]] / [[CRYPTANALYTICS]] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | = Books = | ||
+ | |||
+ | {|border=1 | ||
+ | |- | ||
+ | |Author||Publisher||Title||Year||ISBN||Tags | ||
+ | |- | ||
+ | |SWENSON, CHRISTOPHER||Wiley Publishing||Modern Cryptanalysis||2008||978-0-470-13593-8||[[CRYPTANALYTICS]] | ||
|- | |- | ||
|} | |} | ||
[[Category:Technologies]] | [[Category:Technologies]] |
Latest revision as of 09:35, 25 September 2015
Articles
Books
Author | Publisher | Title | Year | ISBN | Tags |
SWENSON, CHRISTOPHER | Wiley Publishing | Modern Cryptanalysis | 2008 | 978-0-470-13593-8 | CRYPTANALYTICS |