X-Nico

10 unusual facts about encryption


Black Code

Black, a diplomatic cypher system used by the U.S. prior to its entry into the Second World War

British Tabulating Machine Company

During World War II, BTM was called upon to design and manufacture a machine to assist breaking the German Enigma machine ciphers.

Duplicati

Duplicati is a backup client that securely stores encrypted, incremental, compressed remote backups of local files on cloud storage services and remote file servers.

Link 1

Link 1 is a point-to-point, duplex, non-encrypted, digital NATO Tactical Data Link (TDL) Standard for the automatic exchange of Track and Strobe data, combined with link and data management messages between ground based ASACS-elements / e.g. CRC and CAOC), specific units (TACCS / MC) and data link buffers (SSSB, CSI).

Multiscale Electrophysiology Format

Subject identifying information in the file header can be encrypted using 128-bit AES encryption in order to comply with HIPAA requirements for patient privacy when transmitting data across an open network.

PDFCreator

Encryption can be either 40-bit, compatible with Adobe Acrobat 3.0 or 4.0, or 128 bits for Acrobat 5.0 or higher.

Robert M. Patterson

Patterson was interested in ciphers and regularly exchanged coded correspondence with Thomas Jefferson.

Simple Network Management Protocol

Confidentiality - Encryption of packets to prevent snooping by an unauthorized source.

STS-27

The crew was forced to use a slow, encrypted transmission method, likely causing the images NASA engineers received to be of poor quality, causing them to think the damage was actually "just lights and shadows".

Websites and phone numbers in the Year Zero alternate reality game

Operation of The Mailstrom consists of two text input boxes, one labeled "Wreckage" and the other labeled "Shard." The Mailstrom is said to be a "decryption field" which, seemingly at random and only rarely, is able to intercept emails being sent through the government-controlled data stream, the Consolidated Mail System.


Adaptive Internet Protocol

256-bit encryption, using the AES encryption algorithm (this is the default security; older clients may use encryption of lesser strength.)

Address Windowing Extensions

An article published in Dr. Dobb's Journal in 2004 noted that memory allocated using Address Windowing Extensions will not be written to the pagefile, and suggested that AWE regions could therefore be used as a way of protecting sensitive application data such as encryption keys.

Alex Fielding

Fielding became CEO of encryption products company Ripcord Networks in 2004 with former Apple CEO, Gil Amelio, CTO, Hancock, and Wozniak on its board.

Astra 2D

Some channels on 2D are encrypted with Videoguard (a proprietary encryption method by the NDS Group) and only Sky Digiboxes with valid cards, or standard hardware with non-approved (with respect to the Sky/NDS end-user contract) "Dragon", or "T-Rex" Conditional Access Modules can decode these channels.

Basic Interoperable Scrambling System

Proprietary encryption methods were determined by encoder manufacturers, and placed major compatibility limitations on the type of satellite receiver (IRD) that could be used for each feed.

BitTorrent protocol encryption

Protocol header encryption (PHE) was conceived by RnySmile and first implemented in BitComet version 0.60 on 8 September 2005.

Broadcast encryption

Luby and Staddon have used a combinatorial approach to study the trade-offs for some general classes of broadcast encryption algorithms.

Broadcast Protection Discussion Group

Content Protection for Recordable Media (CPRM) is an encryption scheme for recordable media which is also meant to prevent media from being played back in devices other than those licensed by the 4C consortium.

Bus encryption

Such bus encryption is used by the Microsoft operating system Windows Vista and newer to protect certificates, BIOS, passwords, and program authenticity.

CrushFTP Server

Encryption is supported for files "at rest" using PGP, as well as for passwords using an MD5 or SHA, SHA512, MD4 non-reversible hash.

DigiCipher 2

The original attempt for a North American digital signal encryption and compression standard was DigiCipher 1, which was used most notably in the now-defunct PrimeStar medium-power direct broadcast satellite (DBS) system during the early 1990s.

EchoMail

EchoMail's core technology originated from VA Shiva Ayyadurai's invention for classifying inbound email for the U.S. White House, which was seeking a reliable encryption and classification system for U.S. President Bill Clinton's email.

Edward Scheidt

After retiring from the CIA, Scheidt helped found an encryption company called TecSec Inc., in 1990 in Vienna, Virginia, where as of 2011 he works as Chief Scientist.

EFF DES cracker

In July 2012, security researchers David Hulton and Moxie Marlinspike unveiled a cloud computing tool for breaking the MSCHAPv2 protocol by recovering the protocol's DES encryption keys by brute force.

Free-to-view

Outside the UK, other public-service broadcasters, for example those of Switzerland, Austria (ORF) and the Netherlands (NPO via CanalDigitaal) run a similar scheme using different encryption methods.

Hans Hermes

At the end of the war he moved to Toplitzsee, where he was tasked with working on new encryption methods.

Hexagonal sampling

Some of the advantages of processing signals in the digital domain include flexibility via programmable DSP operations, signal storage without the loss of fidelity, opportunity for encryption in communication, lower sensitivity to hardware tolerances.

High-capacity data radio

There is also an export version that incorporates Advanced Encryption Standard (AES) encryption rather than UK Government Type 1 Crypto.

IBM 3624

The PIN functions, with an early commercial encryption using the DES algorithm, were implemented in two modules - BQKPERS and BQKCIPH - and their export controlled under the US export munitions rules.

International Data Encryption Algorithm

In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in 1991.

IText

iText provides support for most advanced PDF features such as PKI-based signatures, 40-bit and 128-bit encryption, color correction, Tagged PDF, PDF forms (AcroForms), PDF/X, color management via ICC profiles and barcodes.

JSTV

Later on 3 June 1990, it started using transponder 24 on Astra 1B, at frequency 11.567 MHz for 11 hours a day, using the Videocrypt II encryption (time-sharing with The Children's Channel and later with CMT Europe).

Macrium Reflect

Data is compressed and encrypted in real time using Abraham Lempel LZ based compression and AES encryption algorithms.

MagicVortex

Notifications are sent via email, but all data transmission is protected using SSL encryption.

Newegg

Whitfield Diffie and Ron Rivest, the inventors of public-key cryptography and RC4 encryption respectively, testified for Newegg.

NHS.net

# Nokia devices: All Nokia devices with an Exchange client are able to connect, however most models do not support encryption and therefore their use breaches NHSmail security policies.

ORF eins

In certain regions of Germany, e.g. Bavaria ORF can be received terrestrial without encryption.

OSI model

Roughly speaking, tunneling protocols operate at the transport layer, such as carrying non-IP protocols such as IBM's SNA or Novell's IPX over an IP network, or end-to-end encryption with IPsec.

PKCS

Jean-Sébastien Coron, Marc Joye, David Naccache, and Pascal Paillier, New Attacks on PKCS #1 v1.5 Encryption, EUROCRYPT 2000, pp.

PlayStation 2 technical specifications

The standard PlayStation 2 memory card has an 8 MB capacity and uses Sony's MagicGate encryption.

Point-to-Point Tunneling Protocol

However, the most common PPTP implementation shipping with the Microsoft Windows product families implements various levels of authentication and encryption natively as standard features of the Windows PPTP stack.

PrivateCore

The company’s attestation and memory encryption technology fills a gap that exists between “data in motion” encryption (TLS, email encryption) and “data at rest” encryption (disk encryption, tape encryption) by protecting “data in use” (random access memory).

Reverse DNS lookup

For example, encryption keys may be placed there for IPsec (RFC 4025), SSH (RFC 4255) and IKE (RFC 4322).

Ronald Cramer

He is best known for his work with Victor Shoup on chosen ciphertext secure encryption in the standard model, in particular the Cramer–Shoup encryption scheme.

Satellite television by region

The technologically more advanced BSB D-MAC/EuroCypher system was gradually replaced with Sky's VideoCrypt video encryption system.

SCADA

-- citations as support of the statements are fine --> In electric and gas utility SCADA systems, the vulnerability of the large installed base of wired and wireless serial communications links is addressed in some cases by applying bump-in-the-wire devices that employ authentication and Advanced Encryption Standard encryption rather than replacing all existing nodes.

Scrambler

It was the need to synchronize the scramblers that suggested to James H. Ellis the idea for non-secret encryption which ultimately led to the invention of both the RSA encryption algorithm and Diffie-Hellman key exchange well before either was reinvented publicly by Rivest, Shamir, and Adleman, or by Diffie and Hellman.

Sonos

Multiple elements in a single household will connect to each other on a proprietary peer-to-peer synchronous mesh network using AES encryption.

Source code

One of the first court cases regarding the nature of source code as free speech involved University of California mathematics professor Dan Bernstein, who had published on the Internet the source code for an encryption program that he created.

TeamViewer

TeamViewer uses RSA private/public key exchange (2048-bit) and AES (256-bit) session encryption.

TnFOX

TnFOX optionally includes copies of the OpenSSL library and the SQLite library in order to implement its strong encryption and its default SQL database implementation respectively.

VoIP VPN

The recent publication of new VoIP encryption standards built into the protocol, such as ZRTP and SRTP, allow the VoIP client to run without the VPN overhead, integrating with standard features of VoIP PBX without having to manage both the VPN gateway and the PBX.

Xtraview Encryption System

Xtraview Video Encryption System refers to the now-defunct patented "encryption" system used on Xtraview and a number of other Top Up TV services, including Setanta Sports, Television X and Red Hot TV.