Difference between revisions of "CRYPTANALYTICS"

From Buggedplanet.info
Jump to navigationJump to search
 
Line 101: Line 101:
 
|-
 
|-
 
|20141228||spiegel.de||[http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html Prying Eyes: Inside the NSA's War on Internet Security]||[[NSA]] / [[CRYPTANALYTICS]]
 
|20141228||spiegel.de||[http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html Prying Eyes: Inside the NSA's War on Internet Security]||[[NSA]] / [[CRYPTANALYTICS]]
 +
|-
 +
|}
 +
 +
= Books =
 +
 +
{|border=1
 +
|-
 +
|Author||Publisher||Title||Year||ISBN||Tags
 +
|-
 +
|SWENSON, CHRISTOPHER||Wiley Publishing||Modern Cryptanalysis||2008||978-0-470-13593-8||[[CRYPTANALYTICS]]
 
|-
 
|-
 
|}
 
|}
  
 
[[Category:Technologies]]
 
[[Category:Technologies]]

Latest revision as of 09:35, 25 September 2015

Articles

Date Source Title Tags
20141229 spiegel.de NSA, GCHQ und Co.: Die Unsicherheitsbehörden NSA / GCHQ / CRYPTANALYTICS
20141229 spiegel.de NSA-Attacken auf SSL, VPN, SSH, Tor etc.: Das sind die Snowden-Dokumente NSA / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: BULLRUN Col - Briefing Sheet GCHQ / BULLRUN / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: BULLRUN GCHQ / BULLRUN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: User´s Guide for PRISM Skype Collection NSA / US-984XN / S3531 / SKYPE / CRYPTANALYTICS
20141228 spiegel.de NSA Document: LONGHAUL end-to-end attack orchestration and key recovery service NSA / LONGHAUL / CRYPTANALYTICS
20141228 spiegel.de NSA Document: SCARLETFEVER NSA / TURMOIL / WEALTHYCLUSTER / TEe / SCARLETFEVER / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VoIP NSA alias NSA / VPN / VOIP / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Net Defense from Encrypted Communications NSA / TURMOIL / BLUESNORT / GALLANTWAVE / XKEYSCORE / LONGHAUL / NETFLOW / FULL SNORT / POPQUIZ / TUTELAGE / CRYPTANALYTICS
20141228 spiegel.de NSA Document: SIGDEV Conference 2012 - (U) Making Things Measureable: Technology trending Challenges and Approaches NSA / CRYPTANALYTICS
20141228 spiegel.de CSEC Document: TLS Trends: A roundatable discussion on current usage and future directions (CSEC Document) CSEC / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: Innov8 Experiment Profile Cryptanalytic Services GCHQ / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Secure Sockets Layer (SSL) / Transport Layer Security (TLS) NSA / SCARLETFEVER / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: TLS trends at GCHQ GCHQ / FLYINGPIG / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL/APEX/APEX High Level Describtion Document NSA / APEX / TURMOIL / FASHIONCLEFT / HAMMERMILL / HAMMERSTEIN / HAMMERCHANT / IPSEC / VPN / VOIP / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Analytic Challenges from Active-Passive Integration NSA / S324 / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: POISENNUT Virtual Private Network Attack Orchestrator (VAO) NSA / WEALTHYCLUSTER / POISENNUT / TURMOIL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VPN SigDev Basics NSA / VPN / CRYPTANALYTICS / DISCOROUTE / TOYGRIPPE / MARINA / MASTERSHAKE / NKB / PINWALE / RENOIR / TREASUREMAP / TUNINGFORK / XKEYSCORE
20141228 spiegel.de GCHQ Document: Profiling SSL and Attributing Private Networks GCHQ / FLYINGPIG / HUSH PUPPY / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Virtual Private Network Transform Engine Emulator (TEe) NSA / TEe / CRYPTANALYTICS / VPN
20141228 spiegel.de NSA Document: POISENNUT Product NSA / POISENNUT / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL GALLANTWAVE NSA / TURMOIL / GALLANTWAVE / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL VPN PROCESSING NSA / TURMOIL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VALIANTSURF Data Network Cipher (DNC) exploitation NSA / VALIANTSURF / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: GALLANTWAVE@scale / GALANTWAVE @volume NSA / GALLANTWAVE / LONGHAUL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VALIANTSURF (VS) Capabilities NSA / TURMOIL / VALIANTSURF / CRYPTANALYTICS / VPN
20141228 spiegel.de NSA Document: VS MALIBU IKE and ESP Metadata Flows NSA / MALIBU / TURMOIL / VALIANTSURF / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: SPIN 15 VPN Story NSA / TURMOIL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL IPSEC VPN Sessionization NSA / TURMOIL / IPSEC / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Fielded Capability: End-to-End VPN SPIN 9 Design Review NSA / TURBULENCE / TURMOIL / PRESSUREWAVE / TOYGRIPPE / KEYCARD / XKEYSCORE / TUBE / IPSEC / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Intro to the VPN Exploitation Process NSA / PINWALE / TOYGRIPPE / XKEYSCORE / FOURSCORE / VULCANDEATHGRIP / IPSEC / PPTP / SSL/TLS / VPN / SSH / CRYPTANALYTICS / S31176
20141228 spiegel.de NSA Document: NIRAL EDGE Newsletter September 2008 Editiion NSA / AES / TUNDRA / TAU / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: Crypt Ops Data Store User Guide GCHQ / CRYPTANALYTICS
20141228 spiegel.de NSA Document: SIGINT Strategy Threads 4 and 7 (from SID Today) NSA / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Classification Guide for Cryptanalysis NSA / CRYPTANALYTICS
201401228 spiegel.de NSA Document: Intercept with PGP encrypted message

NSA / PGP / GPG / CRYPTANALYTICS

20141228 spiegel.de NSA Document: Crypt Discovery Joint Collaboration Activity NSA / GCHQ / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Cryptographic Modernization (CryptoMod) Classification Guide 3-9 NSA / CRYPTANALYTICS
20141228 spiegel.de NSA Document: What Your Mother Never Told You About SIGDEV Analysis NSA / CRYPTANALYTICS
201401228 spiegel.de NSA Document: Internet Anonymity 2011 NSA / CRYPTANALYTICS / TOR / VPN
201401228 spiegel.de NSA Document: A potential technique to deanonymise users of the TOR network NSA / TOR / CRYPTANALYTICS
201401228 spiegel.de NSA Document: Tor Hidden Services - How Hidden is ´Hidden´ ? NSA / TOR / CRYPTANALYTICS
201401228 spiegel.de NSA Document: A potential technique to deanonymise users of the TOR network NSA / TOR / CRYPTANALYTICS
201401228 spiegel.de NSA Document: TOR deanonymisation research (MIP) NSA / TOR / CRYPTANALYTICS
201401228 spiegel.de NSA Document: Tor: Overview of Existing Techniques NSA / TOR / CRYPTANALYTICS
20141229 spiegel.de Snowden-Dokumente: Was die NSA knacken kann - und was nicht NSA / CRYPTANALYTICS
20141228 spiegel.de NSA Documents: Attacks on VPN, SSL, TLS, SSH, Tor NSA / CRYPTANALYTICS
20141228 spiegel.de Prying Eyes: Inside the NSA's War on Internet Security NSA / CRYPTANALYTICS

Books

Author Publisher Title Year ISBN Tags
SWENSON, CHRISTOPHER Wiley Publishing Modern Cryptanalysis 2008 978-0-470-13593-8 CRYPTANALYTICS