X-Nico

unusual facts about cryptographic



BackupHDDVD

The utility circumvents content protection by decrypting video files directly with AES, the underling cryptographic cipher used by AACS.

Bevil Wooding

Wooding was one of seven people in the world entrusted by the Internet Corporation for Assigned Names & Numbers (ICANN) with a special cryptographicsmart-card’ that holds part of a key used to generate the Domain Name Server Security Extensions (DNSSEC) protocol that protects Internet domain names.

Cryptographic log on

Cryptographic log-on (CLO) is a process that uses Common Access Cards (CAC) and embedded Public Key Infrastructure (PKI) certificates to authenticate a user's identification to a workstation and network.

Cryptographic Quarterly

The Cryptographic Quarterly is an internal, classified journal of the U.S. National Security Agency (NSA).

David Chaum

David Lee Chaum (born 1955) is the inventor of many cryptographic protocols, as well as ecash and DigiCash.

Distinguisher

Distinguishing attack, a cryptographic attack that distinguishes a ciphertext from truly random data

Dual EC DRBG

The general cryptographic community was initially not aware of the potential backdoor, until of Dan Shumow and Niels Ferguson 2007 rediscovery, or of Certicom's Daniel R. L. Brown and Scott Vanstone's 2005 patent application describing the backdoor mechanism.

EAX

EAX mode, a mode of operation for cryptographic block ciphers

ECC patents

On May 30, 2007, Certicom filed a lawsuit against Sony in United States District Court for the Eastern District of Texas Marshall office, claiming that Sony's use of ECC in Advanced Access Content System and Digital Transmission Content Protection violates Certicom's patents for that cryptographic method.

Edward Scheidt

Edward M. Scheidt (born 1939) is a retired Chairman of the Central Intelligence Agency (CIA) Cryptographic Center and the designer of the cryptographic systems used in the Kryptos sculpture at CIA Headquarters in Langley, Virginia.

EMV

The use of a PIN and cryptographic algorithms such as DES, Triple-DES, RSA and SHA provide authentication of the card to the processing terminal and the card issuer's host system.

End-to-end auditable voting systems

The ThreeBallot voting protocol, invented by Ron Rivest, was designed to provide some of the benefits of a cryptographic voting system without using cryptography.

FNV

Fowler–Noll–Vo hash function, a non-cryptographic hash function created by Glenn Fowler, Landon Curt Noll, and Phong Vo

Great Cipher

Antoine Rossignol's cryptographic skills became known when in 1626 an encrypted letter was taken from a messenger leaving the city of Réalmont, controlled by the Huguenots and surrounded by the French army.

Hans Heidtmann

A British boarding party, consisting of Lieutenant Francis Anthony Blair Fasson, Able Seaman Colin Grazier, and Canteen Assistant Tommy Brown, from destroyer HMS Petard recovered the cryptographic materials, but the U-boat sank before the Enigma cipher machine could be brought out.

ISO/IEC 18014

Time-stamp services produce time-stamp tokens, which are data structures containing a verifiable cryptographic binding between a data item's representation and a time-value.

Jenkins hash function

The Jenkins hash functions are a collection of (non-cryptographic) hash functions for multi-byte keys designed by Bob Jenkins.

National Cyber Security Hall of Fame

Whitfield Diffie - Developed the world's earliest public key cryptographic system along with Merkle and Hellman

Obfuscation

In white-box cryptography, obfuscation refers to the protection of cryptographic keys from extraction when they are under the control of the adversary, e.g., as part of a DRM scheme.

Password strength

Standard cryptographic hashes, such as the Secure Hash Algorithm series, are very hard to reverse, so an attacker who gets hold of the hash value cannot directly recover the password.

Secure Mobile Architecture

Its central features were the use of the Host Identity Protocol (HIP), cryptographic identities, secure directories, and location to make policy-based information about users and the network available to applications, management systems, and intelligent network components.

SRTP

ZRTP, a cryptographic key-agreement protocol using Secure Real-time Transport Protocol for encryption

TeamDrive

Data transfers between TeamDrive's servers and version ≥3.0 of their client program uses 3072-bit RSA key pairs generated by the OpenSSL cryptographic library.

Victoria Barracks, Melbourne

Eric Nave's Navy cryptographic unit was at Victoria Barracks until it moved to FRUMEL.

VideoCrypt

The system also included a cryptographic element called the Fiat Shamir Zero Knowledge Test.

Yehuda Lindell

Since that time he has also been working as a cryptographic consultant to Safenet, formally Aladdin.


see also