NSA Suite A Cryptography
This article needs additional citations for verification. (July 2013) |
NSA Suite A Cryptography is NSA cryptography which "contains classified algorithms that will not be released". "Suite A will be used for the protection of some categories of especially sensitive information (a small percentage of the overall national security-related information assurance market)."
Name | Type | Purpose |
---|---|---|
ACCORDION[1] | Encryption | Key encryption. In NGLD-M (circa 2019):[2]
|
BATON[1] | Block cipher | See article |
CDL 1, CDL 2 | ? | ? |
FFC | ? | ? |
FIREFLY and Enhanced FIREFLY[1] | Key exchange | ? |
JOSEKI | ? | ? |
KEESEE[1] | ? | ? |
KM-TG Series | Signature | In NGLD-M: Security-related software[2] |
MAYFLY | ? | ? |
MEDLEY[1] | Symmetric encryption[2] | In NGLD-M: Data at Rest (DAR) and non-crypto software[2] |
MERCATOR | ? | ? |
SAVILLE | Encryption (1960s) | Voice and data over radio, see article |
SHILLELAGH[1] | ? | ? |
SILVER LINING | Signature | In NGLD-M: Security-related software[2] |
SPONDULIX-S | Key Agreement | In NGLD-M: KMI[2] |
WALBURN | ? | ? |
WATARI | Encryption | In NGLD-M: Security-related software[2] |
WEASEL | ? | ? |
See also
[edit]References
[edit]- ^ a b c d e f "POET ACM: Programmable Objective Encryption Technologies Advanced Cryptographic Module (D-POET-08-0316)". General Dynamics Mission Systems. Archived from the original on 8 January 2020. Retrieved 8 January 2020.
- ^ a b c d e f g "Next Generation Load Device – Medium (NGLD-M) - System Requirements Document" (PDF). Federal Government Procurement Public Amazon S3 Bucket. May 2019. Chapters cited include: 3.2.7.1 (U) Algorithms on page 42 (page 48 of PDF file)
- General