Encryption





encrypted Internet Data
- the New York Times: LINK ¤ the NEW YORK TIMES

_________________________________________

 

  • "documents from the NSA - described encrypted Internet data !"

 

 

 

 

_________________________________________

  • "much of the simpler encryption - that guards commerce - and banking systems !"

 

 

 

 

 

_________________________________________

  • "sensitive data - like trade secrets - and medical records !"

 

 

 

 

_________________________________________

  • "and automatically secures - the e-mails !"

 

 

 

 

 

_________________________________________

  • "Web searches - Internet chats - and phone calls !"

 

 

 

 

 

 

_________________________________________

  • "the documents described - protected information !"

 

 

 

 

_________________________________________

  • "as among its most closely guarded secrets - restricted to those !"

 

 

 

 

 

_________________________________________
  • "cleared for a highly classified program - code-named "Bullrun"  !"

 

 

 

 

 

_________________________________________

  • "the documents described - a clandestine campaign !"

 

 

 

 

_________________________________________

  • "billions of dollars - on encryption tools !"

 

 

 

 

 

_________________________________________

  • "custom-built computers - against codes !"

 

 

 

 

_________________________________________

  • "and collaborated with - technology companies ! - ( back door ! )"

 

 

 

 

 

 

_________________________________________

  • "in some cases - companies said they - had to collaborate !"

 

 

 

 

_________________________________________
  • "their master encryption keys - or a back door !"

 

 

 

 

 

_________________________________________

  • "or they tried to influence - the international encryption standards ! - ( followed by hardware - and software developers ! )"

 

 

 

 

 

_________________________________________

  • "the documents described - a multipronged effort !"

 

 

 

 

_________________________________________

  • "on widely used Internet - encryption technologies !"

 

 

 

 

 

_________________________________________

  • "the documents described - in detail - efforts !"

 

 

 

 

_________________________________________

  • "on encrypted Internet data - including Secure Sockets Layer - or SSL !"

 

 

 

 

 

_________________________________________
  • "virtual private networks - or VPNs !"

 

 

 


_________________________________________

  • "and the protection - used on fourth-generation - or 4G - smartphones !"

 

 

 

 

 

 

_________________________________________

  • "because strong encryption - is so effective !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "a classified document described - depended on Internet companies !"

 

 

 

 

 

_________________________________________
  • "at first they tried to get - voluntary collaboration !"

 

 

 

 

_________________________________________

  • "then forced - with court orders !"

 

 

 

 

 

_________________________________________

  • "if this did not work - they took the encryption key ! - ( altered software - or hardware ! )"

 

 

 

 

 

 

_________________________________________

  • "the documents described - US$ 250 million - on "sigint enabling project"  !"

 

 

 


_________________________________________

  • "which engaged the - IT companies !"

 

 

 

 

 

_________________________________________

  • "covertly influenced the design - of a commercial product !"

 

 

 

 

 

_________________________________________

  • "the documents described - the goal - in a budget !"

 

 

 

 

_________________________________________

  • "influenced policies - standards !"

 

 

 

 

 

_________________________________________

  • "and specifications - for commercial public key technologies !"

 

 

 

 

 

 

_________________________________________
  • "Matthew D. Green - a cryptography researcher at Johns Hopkins University - said !"

 

 

 


_________________________________________

  • "the risk was - that if built a back door - into a system !"

 

 

 

 

 

_________________________________________

  • "you would not be - the only one !"

 

 

 

 

 

_________________________________________

  • "( that could also be used - by a foreign actor ! )"

 

 

 


_________________________________________
  • "(( an intelligence official - asked not to publish - this article ! ))"

 

 

 

 

 

 

 

 

 

______________________________________________________________________________

Online Protocols - the Guardian:
LINK ¤ the GUARDIAN

_________________________________________

 

  • "documents from the NSA - described capabilities !"

 

 

 

 

_________________________________________

  • "on widely used - online protocols !"

 

 

 

 

 

_________________________________________

  • "such as HTTPS - voice-over-IP - and Secure Sockets Layer - SSL !"

 

 

 

 

_________________________________________

  • "used to protect - online shopping - and banking !"

 

 

 

 

 

_________________________________________

  • "partnerships with companies - and modified products !"

 

 

 

 

 

_________________________________________

  • "the documents described - analysts !"

 

 

 

 

_________________________________________

  • "two facts must be - top secret !"

 

 

 

 

 

_________________________________________

  • "modifications - to commercial encryption - software !"

 

 

 

 

_________________________________________

  • "and altered - devices !"

 

 

 

 

 

_________________________________________
  • "the documents were scattered - with warnings over the importance - of absolute secrecy !"

 

 

 

 

_________________________________________

  • "around decryption - capabilities !"

 

 

 

 

 

 

 

 

 

 

 

 

 

 

______________________________________________________________________________

ENCRYPTION - Wikipedia EN: LINK ¤ ENCRYPTION

_________________________________________

 

  • "encryption is the process - of encoding information - ideally !!!!!!!!!!!!"

 

_________________________________________

  • "only authorized parties - can decipher a ciphertext !!!!!!!!!!!!"

 

_________________________________________

  • "back to plaintext - and access the original information !!!!!!!!!!!!"

 

_________________________________________

  • "in symmetric-key schemes - the encryption and decryption keys - are the same !!!!!!!!!!!!"

 

_________________________________________

  • "communicating parties - must have the same key - in order to achieve secure communication !!!!!!!!!!!!"

 

_________________________________________

  • "in public-key schemes - the encryption key - is published for anyone to use !!!!!!!!!!!!"

 

_________________________________________

  • "and encrypt messages - however - only the receiving party !!!!!!!!!!!!"

 

_________________________________________

  • "has access to the decryption key - that enables messages to be read !!!!!!!!!!!!"

 

______________________________________________________________________________

______________________________________________________________________________



Verschlüsselung im Internet - Spiegel online
: LINK ¤ SPIEGEL ONLINE

_________________________________________

 

  • "Dokumente der NSA beschrieben - die einfacheren !"

 

 

_________________________________________

  • "Verschlüsselungen - im Internet !"

 

 

 

_________________________________________

  • "Computer - technische Tricks - Gerichtsbeschluss !"

 

 

_________________________________________

  • "oder einige Überzeugungsarbeit - bei IT-Unternehmen !"

 

 

 

_________________________________________

  • "die Dokumente beschrieben - Verschlüsselungssysteme !"

 

 

_________________________________________
  • "viel genutzte Online-Protokolle - wie HTTPS - Voice-over-IP - und SSL !"

 

 

 

_________________________________________

  • "oftmals steht oben - in der Adresszeile des Browsers - das Kürzel - HTTPS !"

 

 

_________________________________________

  • "beispielsweise beim Eingeben eines - Passwortes !"

 

 

 

 

_________________________________________

  • "die Dokumente beschrieben - unterschiedliche Wege !"

 

 

_________________________________________
  • "manchmal auch unter Mithilfe - von Firmen selbst !"

 

 

 

_________________________________________

  • "diese versuchte Einfluss auf den - internationalen Verschlüsselungsstandard - zu nehmen !"

 

 

 

_________________________________________

  • "die Dokumente beschrieben ein - "commercial solutions center"  !"

 

 

_________________________________________

  • "vordergründig eine Stelle - wo Technologie-Unternehmen !"

 

 

 

_________________________________________

  • "ihre Produkte - bewerten lassen - und vorstellen können !"

 

 

_________________________________________

  • "aber Änderungen - in Sicherheitsprodukten ! - ( Hintertür ! )"

 

 

 

_________________________________________

  • "laut Sicherheitsexperten - wäre eine Hintertür - in einem Produkt !"

 

 

_________________________________________

  • "vor allem deshalb so außerordentlich - bedenklich !"

 

 

 

_________________________________________

  • "da diese auch für andere - zugänglich sein würde !"

 


_________________________________________

  • "( ein Geheimdienstmitarbeiter - hatte die Medien gebeten - den Artikel nicht zu veröffentlichen ! )"

 

 

 

 

 

 

 

______________________________________________________________________________

VERSCHLÜSSELUNG - Wikipedia DE: LINK ¤ VERSCHLÜSSELUNG

_________________________________________

 

  • "Verschlüsselung ist die von einem Schlüssel - abhängige Umwandlung von einem "Klartext"  !!!!!!!!!!!!"

 

_________________________________________

  • "in einen "Geheimtext" - so dass der Klartext aus dem Geheimtext - nur unter Verwendung !!!!!!!!!!!!"

 

_________________________________________

  • "eines geheimen Schlüssels - wiedergewonnen werden kann !!!!!!!!!!!!"

 

_________________________________________

  • "Verschlüsselung dient zur - Geheimhaltung von Nachrichten - beispielsweise um Daten !!!!!!!!!!!!"

 

_________________________________________

  • "gegen unbefugten Zugriff abzusichern - oder um Nachrichten - vertraulich zu übermitteln !!!!!!!!!!!!"

 

_________________________________________

  • "symmetrische Verschlüsselungsverfahren - verwenden zur Ver- und Entschlüsselung - den gleichen Schlüssel !!!!!!!!!!!!"

 

_________________________________________

  • "diese werden - vor Beginn der Kommunikation - sicher ausgetauscht !!!!!!!!!!!!"

 

_________________________________________

  • "bei der asymmetrischen Verschlüsselung - wird zur Verschlüsselung - ein völlig anderer Schlüssel !!!!!!!!!!!!"

 

_________________________________________

  • "als zur Entschlüsselung benutzt - es gibt einen "öffentlichen Schlüssel"  !!!!!!!!!!!!"

 

_________________________________________

  • "der zum Verschlüsseln benutzt wird - und den "privaten Schlüssel" - zum Entschlüsseln des Geheimtextes !!!!!!!!!!!!"

 

______________________________________________________________________________




encryption - 14330EC
designed by Free CSS Templates | powerd by pluck | hosted by akis