Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security

NSA Cryptography References? 36

tqft asks: "As an amateur crypto freak I am interested in the NSA. I have been following them on and off for years. Having read 'Body of Secrets' by James Bamford while I got a good feel for some of the history particularly ELINT and political maneuverings, I am interested in finding a more thorough book, article(s), links on their cypto work. Anyone know of good references on their crypto work? Yes I know they don't publish per se, but the references to what has been published are out there somewhere."
This discussion has been archived. No new comments can be posted.

NSA Cryptography References?

Comments Filter:
  • by keesh ( 202812 )
    There's lots of information on the NSA...
  • by Anonymous Coward on Monday January 20, 2003 @08:44AM (#5117992)
    http://www.nsa.gov/museum/tour.html
  • They do hold patents (Score:3, Informative)

    by pjcreath ( 513472 ) on Monday January 20, 2003 @08:45AM (#5117993)
    The USPTO lists 105 patents assigned to the NSA [uspto.gov]. They're not all related to cryptography (some have to do with data capture, analysis, etc.) but a number are.
    • Don't forget that the NSA has special preference when it comes to patents. They can keep their discovery or invention secret for an unlimited amount of time, and when it is "discovered", published or patented by the private sector they can assert ownership of the patent for a further 17 or 25 years.

  • I drive past the NSA National Cryptologic Museum [nsa.gov] on the way to work every day.

    Can't say I've actually seen what it has to offer...
  • Applied Cryptography (Score:4, Informative)

    by primal39 ( 409681 ) on Monday January 20, 2003 @09:25AM (#5118115)
    While not NSA centric, Bruce Schneier's Applied Crytography [amazon.com] is a great practical overview of crypto in general, with lots of practical examples and code.
  • Shh! (Score:3, Funny)

    by Hell O'World ( 88678 ) on Monday January 20, 2003 @09:46AM (#5118186)
    Ixnay on the estionsquay! They might ind-outfay about the ecretsay abalcay!

    (Don't hear everything you believe, the ears have walls)
  • ELINT?? (Score:2, Funny)

    by Danse ( 1026 )

    Sounds like a failed dotcom company :)

    • heh, I never thought about that pronunciation before. 'e-lint' as in "elint.com: Your web laundy" :-) as opposed to 'EL-INT', Electronic Intelligence.

      Actually, that would have been a cool dot bomb. Go online, put in your addy, then a truck comes by to pick up your skivvies, and they come back the next day all neatly pressed!

      I smell VENTURE CAPITAL!!! :-D

  • NSA Crypto Museum (Score:2, Informative)

    by marvinx ( 9011 )
    If you're near the NSA, you should go check out the NSA Crypto museum. Not only is the museum really interesting, but they have a wonderful library. The library is full of crypto material of all sorts. It's a public library, so have fun!
  • to work at the NSA. I know I cringe when I see how holywood blows it whenever they put a computer in a movie, and computers are pretty common place and easily understood when compared to the NSA and cryptography. I imagine it must make them nuts to watch someone break the code on the NSA mainframe by connecting their acoustic modem to the doorbell. :)
  • Enlist (Score:4, Funny)

    by ikeleib ( 125180 ) on Monday January 20, 2003 @11:30AM (#5118626) Homepage
    I think to find out the information you are seeking, you need to work at the NSA in one of the higher echelon positions.
  • at least i can't come through...

    nsa homepage [nsa.gov]
  • Books (Score:3, Informative)

    by rwash ( 16296 ) on Monday January 20, 2003 @12:38PM (#5119026) Homepage
    The book on the history of cryptography is David Kahn's The Codebreakers. If you haven't read it, you should.

    You can't forget Bamford's first book, Puzzle Palace either. The earlier history of the NSA.
    • There is also "The Code Book" by Simon Singh which obviously covers largely the exact same thing since there is a fixed amount of history for them to discuss.
      Both are good - but the Kahn book is much larger.

      Singh offered a contest with prizes that lasted a few years and many of the relatively big names in crypto (the ones that aren't at the NSA or some company where they have to stay quiet about what they do) worked on it and broke all the various levels.
  • by abulafia ( 7826 ) on Monday January 20, 2003 @12:51PM (#5119109)
    For starters, check out

    http://cypherpunks.venona.com/

    Most material is second hand, but as you read, you get a good feel of things.

    There's also a huge amount of garbage there.

    I've been a subscriber, most of the time, since 1994, although it usually isn't a good idea to post unless you have a lot of time to fight with a bunch of nuts.That said, it is a very good source of opinions, and once in a great while something very interesting happens (RC4 was disclosed anonymously a log time ago, for instance).
  • Not a whole lot (Score:5, Informative)

    by randombit ( 87792 ) on Monday January 20, 2003 @01:12PM (#5119299) Homepage
    Obviously, 99% of the stuff NSA does is not published publicly. However, there are a few things you can look at. First, as others have noted, NSA has a lot of patents. Secondly, there are a few NSA designed algorithms which have become well known publicly, including: DES, Skipjack, DSA, SHA-1, SHA-256, and SHA-512 (you can find information about all of these on NIST's web page). However, keep the following things in mind: In all cases, the NSA knew that these algorithms would be public, and so they almost certainly didn't use their best tricks in designing the algorithms. Also, to the best that anyone knows, the military still mostly uses stream ciphers. Nobody has ever seen an NSA designed stream cipher.
    • Secondly, there are a few NSA designed algorithms which have become well known publicly, including: DES, Skipjack, DSA, SHA-1, SHA-256, and SHA-512 (you can find information about all of these on NIST's web page).

      AFAIK, DES was designed by IBM (it was originally called LUCIFER or something) and it was originally 128 bit instead of 56/64 bit like DES. NSA modified IBM's design and released it as DES.

      • http://www.sans.org/rr/encryption/DES2.php
      • http://www.sans.org/rr/encryption/DES.php
      • http://www.rsasecurity.com/rsalabs/faq/3-2-1.htm l
      • http://www.everything2.com/index.pl?node=DES
      • http://www.everything2.com/index.pl?node=Lucifer
  • Bruce Schneier's AC (Score:3, Informative)

    by FreeMath ( 230584 ) on Monday January 20, 2003 @01:45PM (#5119583) Homepage Journal
    Applied Cryptography [counterpane.com] has a couple thousand references. Some are old NSA publications. It's a good book to have anyway.
  • by Anonymous Coward
    For instance, Skipjack and KEA [nist.gov] (don't overlook KEA, it's much more interesting than Skipjack; it's a bit complicated, but you can see some REALLY cool stuff in there).

    If you're interested in more than just security analyses of algorithms, check out some of the stuff the NSA did during the AES selection process, like this [nist.gov].

    You can also check out the cryptological museum run by the NSA near Columbia, Maryland. There are documents on design and implementation of encryption devices all over the place; for instance, SIGSALY, the first digital voice encryption system, used World War II!

    Finally, check out patents! The NSA has the patent secrecy act behind it; they've classified a number of applications, only to declassify them later. Patent applications for the above-mentioned digital voice encryption system were declassified in the 1970s. A patent application on an Enigma-like rotor encryption device was declassified a just few years ago. This should give you an idea of what the NSA might have been working on.
  • > Ixnay on the estionsquay! They might ind-outfay
    > about the ecretsay abalcay!

    Interestingly enough, with the dept. having one of the highest geeks-per-square-meter counts in government, and with many geeks being avid slashdot readers, "they" should really be "we"!

    There will be hundereds of slashdotters in the organisation - not for any dark and shadowy reason, not to spy on Slashdot... but just because they like 'Stuff that Matters'.

    Red.
  • by Anonymous Coward
    The biggest collection of declassified NSA textbooks is at Aegean Park Press [aegeanparkpress.com], a small publisher specializing in encryption and spy texts. Many of them are in the original government typewriter fonts with the original classification marks (crossed off by the Freedom of Information process that released them).

    If you want to meet real NSA cryptographers, you can go to the IEEE Symposium on Security and Privacy [ieee-security.org], colloquially known as the "Oakland conference" because it's held at the beautiful Claremont resort hotel. Here's a review of last year's conference [ieee-security.org].

  • I read a book over the summer, loaned to me by the guy who created the FBI fingerprint database. I don't remember the title; but the first 3/4 was from Mr. Rowlett's own notes and autobiographical content and the remainder was biography taken from his notes. Apparently Mr. Rowlett wrote considerable, detailed notes and was at one point awarded a cash prize for secret and not-so-secret inventions of his in lieu of getting to patent them himself or apply them to a commercial enterprise. You should definitely look that name up.

    I have read the first couple chapters of Applied Cryptography - I don't have $60 for it right now and there are other topics I need to work on before I get to crypto - but heed others' recommendations and get it if you are interested in crypto itself and not just the NSA in general. It's very interesting and at once overwhelming.
  • You might look for issues of Cryptologia, a journal of the history and technology of cryptography. Some of the best articles have been collected and reprinted in book form by Artech House.

    • Machine Cryptography and Modern Cryptanalysis
    • Cryptology: Machines, History, and Methods
    • Selections From Cryptologia: History, People & Technology
    • Cryptology: Yesterday, Today, and Tomorrow
  • by quintessent ( 197518 ) <my usr name on toofgiB [tod] moc> on Tuesday January 21, 2003 @03:23AM (#5125111) Journal
    Here. I'll tell you everything. Hold on a second, while I get my AOFJ:IO#reaKLEnfla;we;qw2ateats.zxcvxc
  • Bamford's new book is pretty good. I worked at NSA for 10 years from the 80s to the 90s and knew many of the people in the book. But even I learned about some things invented by people I worked with (done before my time, tho).

    The "Puzzle Palace" had some major inaccuracies. I think Bamford had better access for the latest book. (I knew some of the people he interviewed.)

    I've been to the Cryptologic museum, and it's pretty humbling to see equipment I used day-to-day as "historical". Makes me feel old.

    BTW, it is pronounced ee-lint. Both my wife and I are certified cryptologic signal analysts (i.e. certified in comint, elint and fisint).

Math is like love -- a simple idea but it can get complicated. -- R. Drabek

Working...