Encryption
encrypted Internet Data - the New York Times: LINK ¤ the NEW YORK TIMES
_________________________________________
- "documents from the NSA - described encrypted Internet data !"
_________________________________________
- "much of the simpler encryption - that guards commerce - and banking systems !"
_________________________________________
- "sensitive data - like trade secrets - and medical records !"
_________________________________________
- "and automatically secures - the e-mails !"
_________________________________________
- "Web searches - Internet chats - and phone calls !"
_________________________________________
- "the documents described - protected information !"
_________________________________________
- "as among its most closely guarded secrets - restricted to those !"
- "cleared for a highly classified program - code-named "Bullrun" !"
_________________________________________
- "the documents described - a clandestine campaign !"
_________________________________________
- "billions of dollars - on encryption tools !"
_________________________________________
- "custom-built computers - against codes !"
_________________________________________
- "and collaborated with - technology companies ! - ( back door ! )"
_________________________________________
- "in some cases - companies said they - had to collaborate !"
- "their master encryption keys - or a back door !"
_________________________________________
- "or they tried to influence - the international encryption standards ! - ( followed by hardware - and software developers ! )"
_________________________________________
- "the documents described - a multipronged effort !"
_________________________________________
- "on widely used Internet - encryption technologies !"
_________________________________________
- "the documents described - in detail - efforts !"
_________________________________________
- "on encrypted Internet data - including Secure Sockets Layer - or SSL !"
- "virtual private networks - or VPNs !"
_________________________________________
- "and the protection - used on fourth-generation - or 4G - smartphones !"
_________________________________________
- "because strong encryption - is so effective !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "a classified document described - depended on Internet companies !"
- "at first they tried to get - voluntary collaboration !"
_________________________________________
- "then forced - with court orders !"
_________________________________________
- "if this did not work - they took the encryption key ! - ( altered software - or hardware ! )"
_________________________________________
- "the documents described - US$ 250 million - on "sigint enabling project" !"
_________________________________________
- "which engaged the - IT companies !"
_________________________________________
- "covertly influenced the design - of a commercial product !"
_________________________________________
- "the documents described - the goal - in a budget !"
_________________________________________
- "influenced policies - standards !"
_________________________________________
- "and specifications - for commercial public key technologies !"
- "Matthew D. Green - a cryptography researcher at Johns Hopkins University - said !"
_________________________________________
- "the risk was - that if built a back door - into a system !"
_________________________________________
- "you would not be - the only one !"
_________________________________________
- "( that could also be used - by a foreign actor ! )"
- "(( an intelligence official - asked not to publish - this article ! ))"
Online Protocols - the Guardian: LINK ¤ the GUARDIAN
_________________________________________
- "documents from the NSA - described capabilities !"
_________________________________________
- "on widely used - online protocols !"
_________________________________________
- "such as HTTPS - voice-over-IP - and Secure Sockets Layer - SSL !"
_________________________________________
- "used to protect - online shopping - and banking !"
_________________________________________
- "partnerships with companies - and modified products !"
_________________________________________
- "the documents described - analysts !"
_________________________________________
- "two facts must be - top secret !"
_________________________________________
- "modifications - to commercial encryption - software !"
_________________________________________
- "and altered - devices !"
- "the documents were scattered - with warnings over the importance - of absolute secrecy !"
_________________________________________
- "around decryption - capabilities !"
______________________________________________________________________________
ENCRYPTION - Wikipedia EN: LINK ¤ ENCRYPTION
_________________________________________
- "encryption is the process - of encoding information - ideally !!!!!!!!!!!!"
_________________________________________
- "only authorized parties - can decipher a ciphertext !!!!!!!!!!!!"
_________________________________________
- "back to plaintext - and access the original information !!!!!!!!!!!!"
_________________________________________
- "in symmetric-key schemes - the encryption and decryption keys - are the same !!!!!!!!!!!!"
_________________________________________
- "communicating parties - must have the same key - in order to achieve secure communication !!!!!!!!!!!!"
_________________________________________
- "in public-key schemes - the encryption key - is published for anyone to use !!!!!!!!!!!!"
_________________________________________
- "and encrypt messages - however - only the receiving party !!!!!!!!!!!!"
_________________________________________
- "has access to the decryption key - that enables messages to be read !!!!!!!!!!!!"
______________________________________________________________________________
Verschlüsselung im Internet - Spiegel online: LINK ¤ SPIEGEL ONLINE
_________________________________________
- "Dokumente der NSA beschrieben - die einfacheren !"
_________________________________________
- "Verschlüsselungen - im Internet !"
_________________________________________
- "Computer - technische Tricks - Gerichtsbeschluss !"
_________________________________________
- "oder einige Überzeugungsarbeit - bei IT-Unternehmen !"
_________________________________________
- "die Dokumente beschrieben - Verschlüsselungssysteme !"
- "viel genutzte Online-Protokolle - wie HTTPS - Voice-over-IP - und SSL !"
_________________________________________
- "oftmals steht oben - in der Adresszeile des Browsers - das Kürzel - HTTPS !"
_________________________________________
- "beispielsweise beim Eingeben eines - Passwortes !"
_________________________________________
- "die Dokumente beschrieben - unterschiedliche Wege !"
- "manchmal auch unter Mithilfe - von Firmen selbst !"
_________________________________________
- "diese versuchte Einfluss auf den - internationalen Verschlüsselungsstandard - zu nehmen !"
_________________________________________
- "die Dokumente beschrieben ein - "commercial solutions center" !"
_________________________________________
- "vordergründig eine Stelle - wo Technologie-Unternehmen !"
_________________________________________
- "ihre Produkte - bewerten lassen - und vorstellen können !"
_________________________________________
- "aber Änderungen - in Sicherheitsprodukten ! - ( Hintertür ! )"
_________________________________________
- "laut Sicherheitsexperten - wäre eine Hintertür - in einem Produkt !"
_________________________________________
- "vor allem deshalb so außerordentlich - bedenklich !"
_________________________________________
- "da diese auch für andere - zugänglich sein würde !"
_________________________________________
- "( ein Geheimdienstmitarbeiter - hatte die Medien gebeten - den Artikel nicht zu veröffentlichen ! )"
______________________________________________________________________________
VERSCHLÜSSELUNG - Wikipedia DE: LINK ¤ VERSCHLÜSSELUNG
_________________________________________
- "Verschlüsselung ist die von einem Schlüssel - abhängige Umwandlung von einem "Klartext" !!!!!!!!!!!!"
_________________________________________
- "in einen "Geheimtext" - so dass der Klartext aus dem Geheimtext - nur unter Verwendung !!!!!!!!!!!!"
_________________________________________
- "eines geheimen Schlüssels - wiedergewonnen werden kann !!!!!!!!!!!!"
_________________________________________
- "Verschlüsselung dient zur - Geheimhaltung von Nachrichten - beispielsweise um Daten !!!!!!!!!!!!"
_________________________________________
- "gegen unbefugten Zugriff abzusichern - oder um Nachrichten - vertraulich zu übermitteln !!!!!!!!!!!!"
_________________________________________
- "symmetrische Verschlüsselungsverfahren - verwenden zur Ver- und Entschlüsselung - den gleichen Schlüssel !!!!!!!!!!!!"
_________________________________________
- "diese werden - vor Beginn der Kommunikation - sicher ausgetauscht !!!!!!!!!!!!"
_________________________________________
- "bei der asymmetrischen Verschlüsselung - wird zur Verschlüsselung - ein völlig anderer Schlüssel !!!!!!!!!!!!"
_________________________________________
- "als zur Entschlüsselung benutzt - es gibt einen "öffentlichen Schlüssel" !!!!!!!!!!!!"
_________________________________________
- "der zum Verschlüsseln benutzt wird - und den "privaten Schlüssel" - zum Entschlüsseln des Geheimtextes !!!!!!!!!!!!"