The Hans Buehler Case and the Crypto AG Case
Backdoors in Cryptography
Article REF: H5875 V1
The Hans Buehler Case and the Crypto AG Case
Backdoors in Cryptography

Author : Eric FILIOL

Publication date: April 10, 2026 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

3. The Hans Buehler Case and the Crypto AG Case

Following the end of World War II, the Anglo-Saxon world, through the “Five Eyes” alliance (the U.S., the U.K., Canada, Australia, and New Zealand), established control over technology with a heightened focus on cryptology. This control was strengthened through collaborations with certain trusted countries, grouped under the “9 Eyes” and “14 Eyes” programs, whose composition varied depending on the alliances and political developments of the member countries (see figure 4 ). These programs, known within government circles since the early 1950s, were revealed to the general public by Edward Snowden’s disclosures in 2013. However, Snowden omitted certain particularly emblematic cases, not only regarding control over cryptography but also...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Security of information systems"

( 89 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details
Contact us