This page is a stub
This page will be used as a hub to the various cryptographic algorithms
used in the equipment described on this website.
Below is a non-exhaustive overview of (secret) encryption algorithms that
have been developed by or for the US
National Security Agency (NSA)
and that are further described on this website.
These algorithms are generally classed as an NSA Type 1 or Type 2
algorithm and are intended for governmental and military use.
For a more complete overview, check out
Secret NSA Type 1 high-speed block cipher algorithm, used in several
products, such as the
Fortezza Plus crypto card and the
Philips GCD-Φ cryptographic processor.
Frequency Hopping System used for ECCM.
Implemented in the Cypris crypto chip.
Used for voice encryption in radio and telephone communication,
in products like AIM,
Cypris (SAVILLE I and II), Windster (SAVILLE I),
INDICTOR (SAVILLE I),
Also used for data in the KG-84
Decicated Loop Encryption Device (DLED).
Joint development of GCHQ (UK)
and the NSA (USA).
Block cipher algorithm used in products like
and the Palladium Secure Modem. It was also used in the ill-fated
Clipper Chip that was featured in products like the
AT&T TSD-3600 telephone encryptor.
The Skipjack algorithm was declassified by the
NSA on 24 June 1998.
High-speed link encryption that uses so-called hairpin registers.
Used in products like
Generally used for Trunk Encryption Devices (TED).
Backdoored NSA algorithms
In 1983, the NSA persuaded Dutch electronics giant
to replace the DES algorithm of the PX-1000 pocket telex,
by an alternative NSA-developed algorithm
that appeared stronger, but could in reality be broken with relative ease
by the NSA.
- SBT Algorithm
In 1984, the NSA persuaded Dutch electronics giant
to replace the DES algorithm of the
Nokia SANLA, also known as the
Short Burst Terminal (SBT), by an NSA-supplied alternative that
appeared stronger but was in fact breakable. The product was released as the
The weakened cipher was internally known as the
Any links shown in red are currently unavailable.
If you like the information on this website, why not make a donation?|
© Crypto Museum. Created: Friday 20 May 2016. Last changed: Tuesday, 06 June 2023 - 16:37 CET.