| Document Date: 2011-11-01 01:01:06 Open Document File Size: 2,13 MBShare Result on Facebook
City Orlando / Clipper / / Company the New York Times / AES / AT&T / the Times / / Country United States / / Currency USD / / / Event Natural Disaster / Man-Made Disaster / / Facility Clipper Chip Matt Blaze University of Pennsylvania / R&D facility / / IndustryTerm data wiretapping technology / escrow chip / federal and local law enforcement / communications cryptography / communications security / symmetric-key encryption algorithm / brute-force search / communications technologies / secure communications hardware / escrow systems / communication technologies / cipher algorithms / law enforcement agents / secure telephone / law enforcement recovery / software cryptography / law enforcement wiretap / generation key escrow device / insecure media / mass-market products / voice encryption device / symmetric-key cipher algorithm / escrow devices / interoperable key escrow devices / cryptographic equipment / bit exhaustive search / telephone conversations / encryption algorithms / Information technology / data encryption applications / free encryption software / hardware / Law enforcement / computing / encryption chip / law enforcement agency first / / Organization National Security Agency / University of Pennsylvania / US Government / Department of State / Nixon administration / federal government / / Person Meade / Steve Bellovin / John Markoff / Bob / Alice / / Position classic model for encrypted communication / cryptography and security researcher / author / spy / technology reporter / / Product TSD-3600 Telephone Security Device / / ProvinceOrState Maryland / Pennsylvania / / PublishedMedium the Times / the New York Times / / Technology Capstone chip / DES chip / encryption chip / encryption algorithms / symmetric-key cipher algorithm / NSA-designed symmetric-key encryption algorithm / eavesdrop-thwarting encryption / Information technology / communications technologies / API / traffic encryption / block cipher / unpublished algorithm / Skipjack algorithm / Clipper chips / federally-approved algorithm / SSL / expensive hardware encryption / encryption / cryptography / communication technologies / public key / Encryption technology / Capstone chips / receiving chip / Clipper chip / underlying cipher algorithms / encryption system / digital signature / key escrow chip / data wiretapping technology / two Clipper chips / /
SocialTag |