On Wed, Dec 11, 2013 at 9:00 PM, coderman <coder...@gmail.com> wrote: > On Tue, Dec 10, 2013 at 4:11 PM, <d...@geer.org> wrote: >> > * (TS//SI//REL TO USA, FVEY) Complete enabling for [XXXXXX] >> > encryption chips used in Virtual Private Network and Web encryption >> > devices. [CCP_00009]. >> >> For this to be an explicit line item in that document, it >> has to be special. > > unredacted: > https://peertech.org/dist/nsa-cpp-goals-FY2013-unredact.png That's not good. That's AES-NI, RDARAND, and friends. http://software.intel.com/en-us/articles/introduction-to-intel-aes-ni-and-intel-secure-key-instructions. _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
- Re: [cryptography] Which encryption chips are compromised... John Young
- Re: [cryptography] Which encryption chips are compromised... dan
- Re: [cryptography] Which encryption chips are compro... coderman
- Re: [cryptography] Which encryption chips are compro... coderman
- Re: [cryptography] Which encryption chips are co... coderman
- Re: [cryptography] Which encryption chips are co... Jeffrey Walton
- Re: [cryptography] Which encryption chips are co... Steve Weis
- Re: [cryptography] Which encryption chips ar... coderman
- Re: [cryptography] Which encryption chips ar... Andy Isaacson
- Re: [cryptography] Which encryption chip... coderman
- Re: [cryptography] Which encryption... Marcus Brinkmann
- Re: [cryptography] Which encryption chip... coderman
- Re: [cryptography] Which encryption... coderman
- Re: [cryptography] Which encryption... John Young
- Re: [cryptography] Which encryp... coderman
- Re: [cryptography] Which encryption... Steve Weis