Difference between revisions of "CRYPTANALYTICS"

From Buggedplanet.info
Jump to navigationJump to search
 
(44 intermediate revisions by the same user not shown)
Line 9: Line 9:
 
|20141229||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/snowden-dokumente-nsa-attacken-auf-ssl-vpn-ssh-tor-a-1010553.html NSA-Attacken auf SSL, VPN, SSH, Tor etc.: Das sind die Snowden-Dokumente]||[[NSA]] / [[CRYPTANALYTICS]]
 
|20141229||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/snowden-dokumente-nsa-attacken-auf-ssl-vpn-ssh-tor-a-1010553.html NSA-Attacken auf SSL, VPN, SSH, Tor etc.: Das sind die Snowden-Dokumente]||[[NSA]] / [[CRYPTANALYTICS]]
 
|-
 
|-
|20141229||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/snowden-dokument-so-unterminiert-die-nsa-die-sicherheit-des-internets-a-1010588.html Snowden-Dokumente: Was die NSA knacken kann - und was nicht]||[[NSA]] / [[CRYPTANALYTICS]]
+
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35531.pdf GCHQ Document: BULLRUN Col - Briefing Sheet]||[[GCHQ]] / [[BULLRUN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35532.pdf GCHQ Document: BULLRUN]||[[GCHQ]] / [[BULLRUN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35530.pdf NSA Document: User´s Guide for PRISM Skype Collection]||[[NSA]] / [[US-984XN]] / [[S3531]] / [[SKYPE]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35533.pdf NSA Document: LONGHAUL end-to-end attack orchestration and key recovery service]||[[NSA]] / [[LONGHAUL]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35536.pdf NSA Document: SCARLETFEVER ]||[[NSA]] / [[TURMOIL]] / [[WEALTHYCLUSTER]] / [[TEe]] / [[SCARLETFEVER]] / [[SSL/TLS]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35537.pdf NSA Document: VoIP NSA alias]||[[NSA]] / [[VPN]] / [[VOIP]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35534.pdf NSA Document: Net Defense from Encrypted Communications]||[[NSA]] / [[TURMOIL]] / [[BLUESNORT]] / [[GALLANTWAVE]] / [[XKEYSCORE]] / [[LONGHAUL]] / [[NETFLOW]] / [[FULL SNORT]] / [[POPQUIZ]] / [[TUTELAGE]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35535.pdf NSA Document: SIGDEV Conference 2012 - (U) Making Things Measureable: Technology trending Challenges and Approaches]||[[NSA]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35510.pdf CSEC Document: TLS Trends: A roundatable discussion on current usage and future directions (CSEC Document)]||[[CSEC]] / [[SSL/TLS]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35509.pdf GCHQ Document: Innov8 Experiment Profile Cryptanalytic Services]||[[GCHQ]] / [[SSL/TLS]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35511.pdf NSA Document: Secure Sockets Layer (SSL) / Transport Layer Security (TLS)]||[[NSA]] / [[SCARLETFEVER]] / [[SSL/TLS]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35512.pdf GCHQ Document: TLS trends at GCHQ]||[[GCHQ]] / [[FLYINGPIG]] / [[SSL/TLS]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35513.pdf NSA Document: TURMOIL/APEX/APEX High Level Describtion Document]||[[NSA]] / [[APEX]] / [[TURMOIL]] / [[FASHIONCLEFT]] / [[HAMMERMILL]] / [[HAMMERSTEIN]] / [[HAMMERCHANT]] / [[IPSEC]] / [[VPN]] / [[VOIP]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35516.pdf NSA Document: Analytic Challenges from Active-Passive Integration]||[[NSA]] / [[S324]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35519.pdf NSA Document: POISENNUT Virtual Private Network Attack Orchestrator (VAO)]||[[NSA]] / [[WEALTHYCLUSTER]] / [[POISENNUT]] / [[TURMOIL]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35520.pdf NSA Document: VPN SigDev Basics]||[[NSA]] / [[VPN]] / [[CRYPTANALYTICS]] / [[DISCOROUTE]] / [[TOYGRIPPE]] / [[MARINA]] / [[MASTERSHAKE]] / [[NKB]] / [[PINWALE]] / [[RENOIR]] / [[TREASUREMAP]] / [[TUNINGFORK]] / [[XKEYSCORE]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35521.pdf GCHQ Document: Profiling SSL and Attributing Private Networks]||[[GCHQ]] / [[FLYINGPIG]] / [[HUSH PUPPY]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35523.pdf NSA Document: Virtual Private Network Transform Engine Emulator (TEe)]||[[NSA]] / [[TEe]] / [[CRYPTANALYTICS]] / [[VPN]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35524.pdf NSA Document: POISENNUT Product]||[[NSA]] / [[POISENNUT]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35525.pdf NSA Document: TURMOIL GALLANTWAVE]||[[NSA]] / [[TURMOIL]] / [[GALLANTWAVE]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35526.pdf NSA Document: TURMOIL VPN PROCESSING]||[[NSA]] / [[TURMOIL]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35527.pdf NSA Document: VALIANTSURF Data Network Cipher (DNC) exploitation]||[[NSA]] / [[VALIANTSURF]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35514.pdf NSA Document: GALLANTWAVE@scale / GALANTWAVE @volume]||[[NSA]] / [[GALLANTWAVE]] / [[LONGHAUL]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35517.pdf NSA Document: VALIANTSURF (VS) Capabilities]||[[NSA]] / [[TURMOIL]] / [[VALIANTSURF]] / [[CRYPTANALYTICS]] / [[VPN]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35518.pdf NSA Document: VS MALIBU IKE and ESP Metadata Flows]||[[NSA]] / [[MALIBU]] / [[TURMOIL]] / [[VALIANTSURF]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35528.pdf NSA Document: SPIN 15 VPN Story]||[[NSA]] / [[TURMOIL]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35526.pdf NSA Document: TURMOIL IPSEC VPN Sessionization]||[[NSA]] / [[TURMOIL]] / [[IPSEC]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35529.pdf NSA Document: Fielded Capability: End-to-End VPN SPIN 9 Design Review]||[[NSA]] / [[TURBULENCE]] / [[TURMOIL]] / [[PRESSUREWAVE]] / [[TOYGRIPPE]] / [[KEYCARD]] / [[XKEYSCORE]] / [[TUBE]] / [[IPSEC]] / [[VPN]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35515.pdf NSA Document: Intro to the VPN Exploitation Process]||[[NSA]] / [[PINWALE]] / [[TOYGRIPPE]] / [[XKEYSCORE]] / [[FOURSCORE]] / [[VULCANDEATHGRIP]] / [[IPSEC]] / [[PPTP]] / [[SSL/TLS]] / [[VPN]] / [[SSH]] / [[CRYPTANALYTICS]] / [[S31176]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35550.pdf NSA Document: NIRAL EDGE Newsletter September 2008 Editiion]||[[NSA]] / [[AES]] / [[TUNDRA]] / [[TAU]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35547.pdf GCHQ Document: Crypt Ops Data Store User Guide]||[[GCHQ]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35544.pdf NSA Document: SIGINT Strategy Threads 4 and 7 (from SID Today)]||[[NSA]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35546.pdf NSA Document: Classification Guide for Cryptanalysis]||[[NSA]] / [[CRYPTANALYTICS]]
 +
|-
 +
|201401228||spiegel.de||[http://www.spiegel.de/media/media-35545.pdf NSA Document: Intercept with PGP encrypted message]||
 +
[[NSA]] / [[PGP]] / [[GPG]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35548.pdf NSA Document: Crypt Discovery Joint Collaboration Activity]||[[NSA]] / [[GCHQ]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35549.pdf NSA Document: Cryptographic Modernization (CryptoMod) Classification Guide 3-9]||[[NSA]] / [[CRYPTANALYTICS]]
 
|-
 
|-
 
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35551.pdf NSA Document: What Your Mother Never Told You About SIGDEV Analysis]||[[NSA]] / [[CRYPTANALYTICS]]
 
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35551.pdf NSA Document: What Your Mother Never Told You About SIGDEV Analysis]||[[NSA]] / [[CRYPTANALYTICS]]
 
|-
 
|-
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35540.pdf NSA Document: Internet Anonymity 2011]||[[CRYPTANALYTICS]] / [[TOR]] / [[VPN]]
+
|201401228||spiegel.de||[http://www.spiegel.de/media/media-35540.pdf NSA Document: Internet Anonymity 2011]||[[NSA]] / [[CRYPTANALYTICS]] / [[TOR]] / [[VPN]]
 +
|-
 +
|201401228||spiegel.de||[http://www.spiegel.de/media/media-35538.pdf NSA Document: A potential technique to deanonymise users of the TOR network]||[[NSA]] / [[TOR]] / [[CRYPTANALYTICS]]
 +
|-
 +
|201401228||spiegel.de||[http://www.spiegel.de/media/media-35539.pdf NSA Document: Tor Hidden Services - How Hidden is ´Hidden´ ?]||[[NSA]] / [[TOR]] / [[CRYPTANALYTICS]]
 +
|-
 +
|201401228||spiegel.de||[http://www.spiegel.de/media/media-35543.pdf NSA Document: A potential technique to deanonymise users of the TOR network]||[[NSA]] / [[TOR]] / [[CRYPTANALYTICS]]
 
|-
 
|-
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35543.pdf GCHQ Document: A potential technique to deanonymise users of the TOR network]||[[GCHQ]] / [[TOR]] / [[CRYPTANALYTICS]]
+
|201401228||spiegel.de||[http://www.spiegel.de/media/media-35541.pdf NSA Document: TOR deanonymisation research (MIP)]||[[NSA]] / [[TOR]] / [[CRYPTANALYTICS]]
 
|-
 
|-
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35541.pdf GCHQ Document: TOR deanonymisation research (MIP)]||[[GCHQ]] / [[TOR]] / [[CRYPTANALYTICS]]
+
|201401228||spiegel.de||[http://www.spiegel.de/media/media-35542.pdf NSA Document: Tor: Overview of Existing Techniques]||[[NSA]] / [[TOR]] / [[CRYPTANALYTICS]]
 
|-
 
|-
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35542.pdf NSA Document: Tor: Overview of Existing Techniques]||[[NSA]] / [[TOR]] / [[CRYPTANALYTICS]]
+
|20141229||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/snowden-dokument-so-unterminiert-die-nsa-die-sicherheit-des-internets-a-1010588.html Snowden-Dokumente: Was die NSA knacken kann - und was nicht]||[[NSA]] / [[CRYPTANALYTICS]]
 
|-
 
|-
 
|20141228||spiegel.de||[http://www.spiegel.de/international/world/nsa-documents-attacks-on-vpn-ssl-tls-ssh-tor-a-1010525.html NSA Documents: Attacks on VPN, SSL, TLS, SSH, Tor]||[[NSA]] / [[CRYPTANALYTICS]]
 
|20141228||spiegel.de||[http://www.spiegel.de/international/world/nsa-documents-attacks-on-vpn-ssl-tls-ssh-tor-a-1010525.html NSA Documents: Attacks on VPN, SSL, TLS, SSH, Tor]||[[NSA]] / [[CRYPTANALYTICS]]
 
|-
 
|-
 
|20141228||spiegel.de||[http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html Prying Eyes: Inside the NSA's War on Internet Security]||[[NSA]] / [[CRYPTANALYTICS]]
 
|20141228||spiegel.de||[http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html Prying Eyes: Inside the NSA's War on Internet Security]||[[NSA]] / [[CRYPTANALYTICS]]
 +
|-
 +
|}
 +
 +
= Books =
 +
 +
{|border=1
 +
|-
 +
|Author||Publisher||Title||Year||ISBN||Tags
 +
|-
 +
|SWENSON, CHRISTOPHER||Wiley Publishing||Modern Cryptanalysis||2008||978-0-470-13593-8||[[CRYPTANALYTICS]]
 
|-
 
|-
 
|}
 
|}
  
 
[[Category:Technologies]]
 
[[Category:Technologies]]

Latest revision as of 09:35, 25 September 2015

Articles

Date Source Title Tags
20141229 spiegel.de NSA, GCHQ und Co.: Die Unsicherheitsbehörden NSA / GCHQ / CRYPTANALYTICS
20141229 spiegel.de NSA-Attacken auf SSL, VPN, SSH, Tor etc.: Das sind die Snowden-Dokumente NSA / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: BULLRUN Col - Briefing Sheet GCHQ / BULLRUN / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: BULLRUN GCHQ / BULLRUN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: User´s Guide for PRISM Skype Collection NSA / US-984XN / S3531 / SKYPE / CRYPTANALYTICS
20141228 spiegel.de NSA Document: LONGHAUL end-to-end attack orchestration and key recovery service NSA / LONGHAUL / CRYPTANALYTICS
20141228 spiegel.de NSA Document: SCARLETFEVER NSA / TURMOIL / WEALTHYCLUSTER / TEe / SCARLETFEVER / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VoIP NSA alias NSA / VPN / VOIP / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Net Defense from Encrypted Communications NSA / TURMOIL / BLUESNORT / GALLANTWAVE / XKEYSCORE / LONGHAUL / NETFLOW / FULL SNORT / POPQUIZ / TUTELAGE / CRYPTANALYTICS
20141228 spiegel.de NSA Document: SIGDEV Conference 2012 - (U) Making Things Measureable: Technology trending Challenges and Approaches NSA / CRYPTANALYTICS
20141228 spiegel.de CSEC Document: TLS Trends: A roundatable discussion on current usage and future directions (CSEC Document) CSEC / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: Innov8 Experiment Profile Cryptanalytic Services GCHQ / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Secure Sockets Layer (SSL) / Transport Layer Security (TLS) NSA / SCARLETFEVER / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: TLS trends at GCHQ GCHQ / FLYINGPIG / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL/APEX/APEX High Level Describtion Document NSA / APEX / TURMOIL / FASHIONCLEFT / HAMMERMILL / HAMMERSTEIN / HAMMERCHANT / IPSEC / VPN / VOIP / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Analytic Challenges from Active-Passive Integration NSA / S324 / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: POISENNUT Virtual Private Network Attack Orchestrator (VAO) NSA / WEALTHYCLUSTER / POISENNUT / TURMOIL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VPN SigDev Basics NSA / VPN / CRYPTANALYTICS / DISCOROUTE / TOYGRIPPE / MARINA / MASTERSHAKE / NKB / PINWALE / RENOIR / TREASUREMAP / TUNINGFORK / XKEYSCORE
20141228 spiegel.de GCHQ Document: Profiling SSL and Attributing Private Networks GCHQ / FLYINGPIG / HUSH PUPPY / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Virtual Private Network Transform Engine Emulator (TEe) NSA / TEe / CRYPTANALYTICS / VPN
20141228 spiegel.de NSA Document: POISENNUT Product NSA / POISENNUT / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL GALLANTWAVE NSA / TURMOIL / GALLANTWAVE / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL VPN PROCESSING NSA / TURMOIL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VALIANTSURF Data Network Cipher (DNC) exploitation NSA / VALIANTSURF / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: GALLANTWAVE@scale / GALANTWAVE @volume NSA / GALLANTWAVE / LONGHAUL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VALIANTSURF (VS) Capabilities NSA / TURMOIL / VALIANTSURF / CRYPTANALYTICS / VPN
20141228 spiegel.de NSA Document: VS MALIBU IKE and ESP Metadata Flows NSA / MALIBU / TURMOIL / VALIANTSURF / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: SPIN 15 VPN Story NSA / TURMOIL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL IPSEC VPN Sessionization NSA / TURMOIL / IPSEC / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Fielded Capability: End-to-End VPN SPIN 9 Design Review NSA / TURBULENCE / TURMOIL / PRESSUREWAVE / TOYGRIPPE / KEYCARD / XKEYSCORE / TUBE / IPSEC / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Intro to the VPN Exploitation Process NSA / PINWALE / TOYGRIPPE / XKEYSCORE / FOURSCORE / VULCANDEATHGRIP / IPSEC / PPTP / SSL/TLS / VPN / SSH / CRYPTANALYTICS / S31176
20141228 spiegel.de NSA Document: NIRAL EDGE Newsletter September 2008 Editiion NSA / AES / TUNDRA / TAU / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: Crypt Ops Data Store User Guide GCHQ / CRYPTANALYTICS
20141228 spiegel.de NSA Document: SIGINT Strategy Threads 4 and 7 (from SID Today) NSA / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Classification Guide for Cryptanalysis NSA / CRYPTANALYTICS
201401228 spiegel.de NSA Document: Intercept with PGP encrypted message

NSA / PGP / GPG / CRYPTANALYTICS

20141228 spiegel.de NSA Document: Crypt Discovery Joint Collaboration Activity NSA / GCHQ / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Cryptographic Modernization (CryptoMod) Classification Guide 3-9 NSA / CRYPTANALYTICS
20141228 spiegel.de NSA Document: What Your Mother Never Told You About SIGDEV Analysis NSA / CRYPTANALYTICS
201401228 spiegel.de NSA Document: Internet Anonymity 2011 NSA / CRYPTANALYTICS / TOR / VPN
201401228 spiegel.de NSA Document: A potential technique to deanonymise users of the TOR network NSA / TOR / CRYPTANALYTICS
201401228 spiegel.de NSA Document: Tor Hidden Services - How Hidden is ´Hidden´ ? NSA / TOR / CRYPTANALYTICS
201401228 spiegel.de NSA Document: A potential technique to deanonymise users of the TOR network NSA / TOR / CRYPTANALYTICS
201401228 spiegel.de NSA Document: TOR deanonymisation research (MIP) NSA / TOR / CRYPTANALYTICS
201401228 spiegel.de NSA Document: Tor: Overview of Existing Techniques NSA / TOR / CRYPTANALYTICS
20141229 spiegel.de Snowden-Dokumente: Was die NSA knacken kann - und was nicht NSA / CRYPTANALYTICS
20141228 spiegel.de NSA Documents: Attacks on VPN, SSL, TLS, SSH, Tor NSA / CRYPTANALYTICS
20141228 spiegel.de Prying Eyes: Inside the NSA's War on Internet Security NSA / CRYPTANALYTICS

Books

Author Publisher Title Year ISBN Tags
SWENSON, CHRISTOPHER Wiley Publishing Modern Cryptanalysis 2008 978-0-470-13593-8 CRYPTANALYTICS