RSA Key Generation Vulnerability Affecting Trusted Platform
A vulnerability in a cryptographic library used to generate Rivest-Shamir-Adleman (RSA) encryption keys was recently disclosed. The vulnerability allows recovery of a private key when only possessing a public key. The vulnerable library is included in the firmware of specific...
25 October 2017 1 page(s) pdf
Cryptographic algorithms are specified by the National Institute of Standards and Technology (NIST) and are used by NSA's Information Assurance Directorate (IAD) in solutions approved for protecting National Security Systems (NSS). They include cryptographic algorithms for encryption, key exchange, digital...
15 May 2015
Commercial National Security Algorithm Suite
The Commercial National Security Algorithm Suite (CNSA Suite) will provide new algorithms for those customers who are looking for mitigations to perform, replacing the current Suite B algorithms.
16 December 2015
Algorithms to Support the Evolution of Information Assurance Needs
This document provides background and insight into NSA's intentions for the SIMON & SPECK lightweight block ciphers, and answers frequently asked questions about these designs.
18 November 2016 13 page(s) pdf
Suite B Implementer’s Guide to FIPS 186-3 (ECDSA)
This document specifies the Elliptic Curve Digital Signature Algorithm (ECDSA) from the "Digital Signature Standard" [FIPS186-3] that will be used in future and existing cryptographic protocols for Suite B products. It also includes the Suite B elliptic curve domain parameters,...
03 February 2010 35 page(s) pdf
CNSA Suite and Quantum Computing FAQ
This document provides answers to commonly asked questions regarding the Commercial National Security Algorithm (CNSA) Suite, Quantum Computing and CNSS Advisory Memorandum 02-15.
05 January 2016 11 page(s) pdf
Ransomware: Locky (version 2)
Malware placemats summarize a particular piece of malware based on researched, collected and fused information and analysis. Placemats are intended to inform customers of the past, present, and potential future infections, characteristics, and best practices/mitigations on particular pieces of malware....
11 April 2016 2 page(s) pdf
Mathematical routines for the NIST prime elliptic curves
Described in this document are routines for implementing primitives for elliptic curve cryptography on the NIST elliptic curves P–192, P–224, P–256, P–384, and P–521 given in [FIPS186-2]. Also included are specialized routines for field arithmetic over the relevant prime fields...
05 April 2010 44 page(s) pdf
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015
1-9 of 9 results returned for: "keywords:"Encryption""