NSA cryptography
The vast majority of the National Security Agency's work on encryption is classified, but from time to time NSA participates in standards processes or otherwise publishes information about its cryptographic algorithms. The NSA has categorized encryption items into four product types, and algorithms into two suites. The following is a brief and incomplete summary of public knowledge about NSA algorithms and protocols.
Type 1 Product
A Type 1 Product refers to an NSA endorsed classified or controlled cryptographic item for classified or sensitive U.S. government information, including cryptographic equipment, assembly or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed.Name | Type | Specification | Use | Equipment |
R21-TECH-13-00, " 3.0 Specification" | AIM, SafeXcel-3340, PSIAM | |||
AES | Block cipher | FIPS 197 | Numerous | Numerous |
BATON | Block cipher | Various | PKCS#11, CDSA/CSSM, AIM, CYPRIS, APCO Project 25, MYK-85, Fortezza Plus, SecNet-11, Sierra, SafeXcel-3340, PSIAM | |
BAYLESS | CYPRIS | |||
BYTEMAN | CYPRIS | |||
CARDIGAN | CYPRIS | |||
CARDHOLDER | Satellite uplink command encryption | CYPRIS, KI-17, U-AYJ Flight Decrypt Chip, Flight Encrypt Chip, MYK-16, CXS-810, CXS-2000, MCU-100, MCU-600 | ||
CARIBOU | Satellite uplink command encryption | U-TXZ, MYK-15A | ||
CRAYON | AIM, CYPRIS | |||
FASTHASH | Cryptographic hash function | MISSI Type 1 hash | PKCS #11, CDSA/CSSM | |
FIREFLY / Enhanced FIREFLY | EKMS public-key cooperative key generation | AIM, SafeXcel-3340, SecNet54, ViaSat KG-25x, PSIAM | ||
GOODSPEED | Sierra II | |||
HAVE QUICK | Antijam, LPI/LPD airborne voice communication | CYPRIS | ||
JACKNIFE | AIM for IFF Mode 5 | |||
JOSEKI | R21-TECH-0062-92, "JOSEKI-1, A Bootstrap Procedures" | Protection of secret algorithms in firmware | AIM, PSIAM | |
JUNIPER | Block cipher | PKCS #11, CDSA/CSSM | ||
KEESEE | AIM, CYPRIS, PSIAM | |||
Mark XII IFF | IFF secondary radar | AIM | ||
MAYFLY | Asymmetric-key algorithm | PKCS #11, CDSA/CSSM | ||
MEDLEY | R21-TECH-30-01, "MEDLEY Implementation Standard" | AIM, SecNet 54, SafeXcel-3340, ViaSat KG25x, PSIAM | ||
PEGASUS | Satellite telemetry and mission data downlinks | KG-227, KG-228, KI-17, U-BLW Pegasus Space Microcircuit Chip, U-BLX Pegasus Ground Microcircuit Chip, MYK-17, CXS-810, CXS-2000, MCU-100, MCU-600 | ||
PHALANX | AIM, CYPRIS | |||
SAVILLE | Low-bandwidth voice encryption | AIM, CYPRIS, Windster, VINSON | ||
VALLOR | TTY broadcasts to submarines | AIM | ||
WALBURN | High-bandwidth link encryption | AIM, KG-81/94/194/95 | ||
PADSTONE | CYPRIS, Windster, Indictor | |||
WEASEL | SafeXcel-3340 |
Type 2 Product
A Type 2 Product refers to an NSA endorsed unclassified cryptographic equipment, assemblies or components for sensitive but unclassified U.S. government information.Name | Type | Specification | Use | Equipment |
CORDOBA | CYPRIS, Windster, Indictor | |||
KEA | Asymmetric-key algorithm | R21-Tech-23-94, "Key Exchange Algorithm " | Key exchange and digital signature algorithm for Fortezza, etc. | Fortezza, Fortezza Plus, Palladium Secure Modem |
SKIPJACK | Block cipher | R21-Tech-044-91, "SKIPJACK" | Confidentiality algorithm for Fortezza, etc. | Fortezza, Fortezza Plus, Palladium Secure Modem |
Type 3 Product
Unclassified cryptographic equipment, assembly, or component used, when appropriately keyed, for encrypting or decrypting unclassified sensitive U.S. Government or commercial information, and to protect systems requiring protection mechanisms consistent with standard commercial practices. A Type 3 Algorithm refers to NIST endorsed algorithms, registered and FIPS published, for sensitive but unclassified U.S. government and commercial information.Name | Type | Specification | Use | Equipment | |
DES | Data Encryption Standard | Block cipher | FIPS 46-3 | Ubiquitous | Ubiquitous |
AES | Advanced Encryption Standard | Block cipher | FIPS 197 | Numerous | Numerous |
DSA | Digital Signature Algorithm | Digital signature system | FIPS 186 | Numerous | Numerous |
SHA | Secure Hash Algorithm | Cryptographic hash function | FIPS 180-2 | Ubiquitous | Ubiquitous |