X-Nico

unusual facts about Hyper-encryption



Address Windowing Extensions

An article published in Dr. Dobb's Journal in 2004 noted that memory allocated using Address Windowing Extensions will not be written to the pagefile, and suggested that AWE regions could therefore be used as a way of protecting sensitive application data such as encryption keys.

Alex Fielding

Fielding became CEO of encryption products company Ripcord Networks in 2004 with former Apple CEO, Gil Amelio, CTO, Hancock, and Wozniak on its board.

Astra 2D

Some channels on 2D are encrypted with Videoguard (a proprietary encryption method by the NDS Group) and only Sky Digiboxes with valid cards, or standard hardware with non-approved (with respect to the Sky/NDS end-user contract) "Dragon", or "T-Rex" Conditional Access Modules can decode these channels.

Beatmania IIDX 14: Gold

If the player gets three AA's on any difficulty (without use of the Random or Mirror modifiers) and the levels for all the songs add up to either 20 for Hyper or 30 for Another, the player is awarded a chance to play the extra stage, Vanessa by 朱雀 (Suzaku).

BitTorrent protocol encryption

Protocol header encryption (PHE) was conceived by RnySmile and first implemented in BitComet version 0.60 on 8 September 2005.

Bloombase

In 2007, Bloombase announced StoreSafe virtual appliance edition for enterprise storage system security, supporting virtual machine containers including VMware ESX, Citrix Xen, Oracle VirtualBox, Microsoft Hyper-V, IBM PowerVM, and Red Hat Kernel-based Virtual Machine (KVM).

Broadcast encryption

Luby and Staddon have used a combinatorial approach to study the trade-offs for some general classes of broadcast encryption algorithms.

Bus encryption

Such bus encryption is used by the Microsoft operating system Windows Vista and newer to protect certificates, BIOS, passwords, and program authenticity.

CrushFTP Server

Encryption is supported for files "at rest" using PGP, as well as for passwords using an MD5 or SHA, SHA512, MD4 non-reversible hash.

DigiCipher 2

The original attempt for a North American digital signal encryption and compression standard was DigiCipher 1, which was used most notably in the now-defunct PrimeStar medium-power direct broadcast satellite (DBS) system during the early 1990s.

EchoMail

EchoMail's core technology originated from VA Shiva Ayyadurai's invention for classifying inbound email for the U.S. White House, which was seeking a reliable encryption and classification system for U.S. President Bill Clinton's email.

Edward Scheidt

After retiring from the CIA, Scheidt helped found an encryption company called TecSec Inc., in 1990 in Vienna, Virginia, where as of 2011 he works as Chief Scientist.

EFF DES cracker

In July 2012, security researchers David Hulton and Moxie Marlinspike unveiled a cloud computing tool for breaking the MSCHAPv2 protocol by recovering the protocol's DES encryption keys by brute force.

Electron liquid

(b) Integral equation methods, e.g., the CHNC, an acronym for the classical-map hyper-netted-chain method, or the Fermi hyper-netted-chain method.

Hans Hermes

At the end of the war he moved to Toplitzsee, where he was tasked with working on new encryption methods.

High-capacity data radio

There is also an export version that incorporates Advanced Encryption Standard (AES) encryption rather than UK Government Type 1 Crypto.

Hyper IgM syndrome

Hyper-IgM syndrome type 4, which is a defect in class switch recombination downstream of the AICDA gene that does not impair Somatic Hyper Mutation.

Hyper Music/Feeling Good

"Hyper Music" was written by vocalist and guitarist Matthew Bellamy and "Feeling Good" was written by Leslie Bricusse and Anthony Newley for the 1964 musical The Roar of the Greasepaint - The Smell of the Crowd and famously interpreted by jazz/soul singer Nina Simone.

Hyper-IgM syndrome type 4

Hyper-IgM syndrome type 4 is a form of Hyper IgM syndrome which is a defect in class switch recombination downstream of the AICDA gene that does not impair somatic hypermutation.

IBM 3624

The PIN functions, with an early commercial encryption using the DES algorithm, were implemented in two modules - BQKPERS and BQKCIPH - and their export controlled under the US export munitions rules.

International Data Encryption Algorithm

In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in 1991.

IText

iText provides support for most advanced PDF features such as PKI-based signatures, 40-bit and 128-bit encryption, color correction, Tagged PDF, PDF forms (AcroForms), PDF/X, color management via ICC profiles and barcodes.

JSTV

Later on 3 June 1990, it started using transponder 24 on Astra 1B, at frequency 11.567 MHz for 11 hours a day, using the Videocrypt II encryption (time-sharing with The Children's Channel and later with CMT Europe).

Link 1

Link 1 is a point-to-point, duplex, non-encrypted, digital NATO Tactical Data Link (TDL) Standard for the automatic exchange of Track and Strobe data, combined with link and data management messages between ground based ASACS-elements / e.g. CRC and CAOC), specific units (TACCS / MC) and data link buffers (SSSB, CSI).

Macrium Reflect

Data is compressed and encrypted in real time using Abraham Lempel LZ based compression and AES encryption algorithms.

MagicVortex

Notifications are sent via email, but all data transmission is protected using SSL encryption.

Matt Doust

Matthew "Matt" Doust (1984 – 28 August 2013) was an internationally renowned American-born Australian hyper-realistic artist who was a finalist in the 2011 Archibald Prize, for his work on a portrait Australian actress and fashion model Gemma Ward.

Newegg

Whitfield Diffie and Ron Rivest, the inventors of public-key cryptography and RC4 encryption respectively, testified for Newegg.

NHS.net

# Nokia devices: All Nokia devices with an Exchange client are able to connect, however most models do not support encryption and therefore their use breaches NHSmail security policies.

Ol' Time Killin'

The featured rappers, Wio-K and IRS (Korry Deez and Black Cat) from Scarborough's Monolith crew, were chosen by Kardinal, because he used to hang out with them, and musically, they were as hyper as he was.

PC SOFT

High Screen, created in 1986 (and renamed Hyper Screen in 1992): user interface editor for MS-DOS, precursor to WinDev, that could be integrated into any programming language (C, Pascal, ...).

PDFCreator

Encryption can be either 40-bit, compatible with Adobe Acrobat 3.0 or 4.0, or 128 bits for Acrobat 5.0 or higher.

Pentium D

Intel first launched Smithfield on April 16, 2005 in the form of the 3.2 GHz Hyper-threading enabled Pentium Extreme Edition 840.

The processor was based on the dual-core Pentium D branded Smithfield, but with Hyper-threading enabled, thus any operating system saw four logical processors (two physical and two virtual).

PrivateCore

The company’s attestation and memory encryption technology fills a gap that exists between “data in motion” encryption (TLS, email encryption) and “data at rest” encryption (disk encryption, tape encryption) by protecting “data in use” (random access memory).

Reverse DNS lookup

For example, encryption keys may be placed there for IPsec (RFC 4025), SSH (RFC 4255) and IKE (RFC 4322).

Ronald Cramer

He is best known for his work with Victor Shoup on chosen ciphertext secure encryption in the standard model, in particular the Cramer–Shoup encryption scheme.

SCADA

-- citations as support of the statements are fine --> In electric and gas utility SCADA systems, the vulnerability of the large installed base of wired and wireless serial communications links is addressed in some cases by applying bump-in-the-wire devices that employ authentication and Advanced Encryption Standard encryption rather than replacing all existing nodes.

Scrambler

It was the need to synchronize the scramblers that suggested to James H. Ellis the idea for non-secret encryption which ultimately led to the invention of both the RSA encryption algorithm and Diffie-Hellman key exchange well before either was reinvented publicly by Rivest, Shamir, and Adleman, or by Diffie and Hellman.

Simon Hurt

The issue reveals that centuries beforehand Hurt attempted to summon the demon Barbatos, but instead was confronted by the Hyper-Adapter, the hyper-dimensional creature tasked by Darkseid with overseeing Batman's voyage through history after he was struck by the villain's Omega Effect.

Sonos

Multiple elements in a single household will connect to each other on a proprietary peer-to-peer synchronous mesh network using AES encryption.

Source code

One of the first court cases regarding the nature of source code as free speech involved University of California mathematics professor Dan Bernstein, who had published on the Internet the source code for an encryption program that he created.

STS-27

The crew was forced to use a slow, encrypted transmission method, likely causing the images NASA engineers received to be of poor quality, causing them to think the damage was actually "just lights and shadows".

TeamViewer

TeamViewer uses RSA private/public key exchange (2048-bit) and AES (256-bit) session encryption.

TnFOX

TnFOX optionally includes copies of the OpenSSL library and the SQLite library in order to implement its strong encryption and its default SQL database implementation respectively.

VoIP VPN

The recent publication of new VoIP encryption standards built into the protocol, such as ZRTP and SRTP, allow the VoIP client to run without the VPN overhead, integrating with standard features of VoIP PBX without having to manage both the VPN gateway and the PBX.

Websites and phone numbers in the Year Zero alternate reality game

Operation of The Mailstrom consists of two text input boxes, one labeled "Wreckage" and the other labeled "Shard." The Mailstrom is said to be a "decryption field" which, seemingly at random and only rarely, is able to intercept emails being sent through the government-controlled data stream, the Consolidated Mail System.

WinRAR

Since version 3.60 (August 2006), WinRAR includes a multithreaded version of the compression algorithm, which improves compression speed on systems with multiple, dual-core, or Hyper-threading-enabled CPUs.

Xtraview Encryption System

Xtraview Video Encryption System refers to the now-defunct patented "encryption" system used on Xtraview and a number of other Top Up TV services, including Setanta Sports, Television X and Red Hot TV.


see also

Randomized algorithm

The inherent randomness of algorithms such as Hyper-encryption, Bayesian networks, Random neural networks and Probabilistic Cellular Automata was harnessed by Krishna Palem et al. to design highly efficient hardware systems using Probabilistic CMOS or PCMOS technology that were shown to achieve gains that are as high as a multiplicative factor of 560 when compared to a competing energy-efficient CMOS based realizations.