NSA Cryptography References? 36
tqft asks: "As an amateur crypto freak I am interested in the NSA. I have been following them on and off for years. Having read 'Body of Secrets' by James Bamford while I got a good feel for some of the history particularly ELINT and political maneuverings, I am interested in finding a more thorough book, article(s), links on their cypto work. Anyone know of good references on their crypto work? Yes I know they don't publish per se, but the references to what has been published are out there somewhere."
IN SOVIET RUSSIA (Score:1, Offtopic)
Have you tried their museum? (Score:3, Informative)
They do hold patents (Score:3, Informative)
Re:They do hold patents (Score:2)
Don't forget that the NSA has special preference when it comes to patents. They can keep their discovery or invention secret for an unlimited amount of time, and when it is "discovered", published or patented by the private sector they can assert ownership of the patent for a further 17 or 25 years.
Straight from the horses mouth... (Score:2, Informative)
Can't say I've actually seen what it has to offer...
Applied Cryptography (Score:4, Informative)
Shh! (Score:3, Funny)
(Don't hear everything you believe, the ears have walls)
ELINT?? (Score:2, Funny)
Sounds like a failed dotcom company :)
Re:ELINT?? (Score:2)
Actually, that would have been a cool dot bomb. Go online, put in your addy, then a truck comes by to pick up your skivvies, and they come back the next day all neatly pressed!
I smell VENTURE CAPITAL!!! :-D
NSA Crypto Museum (Score:2, Informative)
Re:NSA Crypto Museum (Score:1)
Sean
Must suck... (Score:2)
Enlist (Score:4, Funny)
Hmm, did we just slashdot the nsa? (Score:1)
nsa homepage [nsa.gov]
Books (Score:3, Informative)
You can't forget Bamford's first book, Puzzle Palace either. The earlier history of the NSA.
Re:Books (Score:1)
Both are good - but the Kahn book is much larger.
Singh offered a contest with prizes that lasted a few years and many of the relatively big names in crypto (the ones that aren't at the NSA or some company where they have to stay quiet about what they do) worked on it and broke all the various levels.
Most stuff is second hand (Score:3, Informative)
http://cypherpunks.venona.com/
Most material is second hand, but as you read, you get a good feel of things.
There's also a huge amount of garbage there.
I've been a subscriber, most of the time, since 1994, although it usually isn't a good idea to post unless you have a lot of time to fight with a bunch of nuts.That said, it is a very good source of opinions, and once in a great while something very interesting happens (RC4 was disclosed anonymously a log time ago, for instance).
Not a whole lot (Score:5, Informative)
Re:Not a whole lot (Score:1)
Secondly, there are a few NSA designed algorithms which have become well known publicly, including: DES, Skipjack, DSA, SHA-1, SHA-256, and SHA-512 (you can find information about all of these on NIST's web page).
AFAIK, DES was designed by IBM (it was originally called LUCIFER or something) and it was originally 128 bit instead of 56/64 bit like DES. NSA modified IBM's design and released it as DES.
Bruce Schneier's AC (Score:3, Informative)
See what HAS been published... (Score:2, Informative)
If you're interested in more than just security analyses of algorithms, check out some of the stuff the NSA did during the AES selection process, like this [nist.gov].
You can also check out the cryptological museum run by the NSA near Columbia, Maryland. There are documents on design and implementation of encryption devices all over the place; for instance, SIGSALY, the first digital voice encryption system, used World War II!
Finally, check out patents! The NSA has the patent secrecy act behind it; they've classified a number of applications, only to declassify them later. Patent applications for the above-mentioned digital voice encryption system were declassified in the 1970s. A patent application on an Enigma-like rotor encryption device was declassified a just few years ago. This should give you an idea of what the NSA might have been working on.
They = Us! (was: Re: Ssh!) (Score:2, Insightful)
> about the ecretsay abalcay!
Interestingly enough, with the dept. having one of the highest geeks-per-square-meter counts in government, and with many geeks being avid slashdot readers, "they" should really be "we"!
There will be hundereds of slashdotters in the organisation - not for any dark and shadowy reason, not to spy on Slashdot... but just because they like 'Stuff that Matters'.
Red.
Declassified NSA at Aegean Park Press; Oakland con (Score:1, Informative)
If you want to meet real NSA cryptographers, you can go to the IEEE Symposium on Security and Privacy [ieee-security.org], colloquially known as the "Oakland conference" because it's held at the beautiful Claremont resort hotel. Here's a review of last year's conference [ieee-security.org].
Frank B. Rowlett (Score:2)
I have read the first couple chapters of Applied Cryptography - I don't have $60 for it right now and there are other topics I need to work on before I get to crypto - but heed others' recommendations and get it if you are interested in crypto itself and not just the NSA in general. It's very interesting and at once overwhelming.
Cryptologia (Score:1)
All about the NSA (Score:3, Funny)
Worked there (Score:1)
The "Puzzle Palace" had some major inaccuracies. I think Bamford had better access for the latest book. (I knew some of the people he interviewed.)
I've been to the Cryptologic museum, and it's pretty humbling to see equipment I used day-to-day as "historical". Makes me feel old.
BTW, it is pronounced ee-lint. Both my wife and I are certified cryptologic signal analysts (i.e. certified in comint, elint and fisint).