4. The NSA's compromise of an ISO cryptographic standard
4.1 U.S. intelligence programs targeting cryptography
Since the late 1950s, numerous Five Eyes programs have been dedicated to attacking encryption systems—first government systems, then civilian ones—many of which rely on the concept of a backdoor, whether of a mathematical nature or related to implementation or management. From the Shamrock (domestic surveillance) and Minaret (foreign surveillance) projects to more recent initiatives—some of which were revealed by Edward Snowden in 2013—no fewer than 60 projects have been documented involving interception and cryptanalysis.
Figure 6...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
The NSA's compromise of an ISO cryptographic standard
Article included in this offer
"Security of information systems"
(
89 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
- (1) - FILIOL (E.) - Texte de l'audition devant la commission parlementaire « sécurité numérique et risques : enjeux et chances pour les entreprises ». - Dans Rapport 2541 (Assemblée Nationale)/271 (Sénat) – Tome II. Office Parlementaire d'Évaluation des Choix Scientifiques et Technologiques (OPECST), pp. 181–188 Paris (2015).
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!