A Cryptome DVD is offered by Cryptome. Donate $25 for a DVD of the Cryptome 11-years archives of 41,000 files from June 1996 to June 2007 (~4.4 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost.

29 September 2007. NSA has released four additional NSE documents:

http://cryptome.org/nsa-nse-02/nsa-nse-02.htm


3 March 2007. Add appeal to NSA to release withheld information.

1 March 2007


The National Security Agency has released under FOIA nine crypto papers in response to a request for informaton on Non-Secret Encryption filed in October 1999. Three of the papers were formerly classified Top Secret Codeword, one was formerly classified Secret and were declassified for this request.

For a description of Non-Secret Encryption see "The Story of Non-Secret Encryption," J. H. Ellis.

NSA wrote that this is an initial release and additional documents may be provided later. The documents were received on 28 February 2007, scanned and converted to PDF.

All nine PDFs: http://cryptome.org/nsa-nse/nsa-nse-01.zip (3.6MB)

Duncan Campbell on the CESG non-secret encryption papers and Whitfield Diffie (April 1999):

http://cryptome.org/dc-nse.htm

According to Bruce Schneier, a leading open cryptographer, "the Ellis case is a useful tool to examine the interplay between the idea of a "secret" mathematics inside the walls of the spooks, and the open maths outside. I have heard many anecdotes about how the walls seem to have had to been breached, both ways, as key ideas in number theory moved forward on one side or the other. The Ellis/Diffie case becomes a special case with a highly applied and relevant result".

Schneier asks "If the British found public-key encryption in the late 1960s sixties, as well as essentially the RSA algorithm a few years later, the question arises - did they keep it to themselves, perhaps delaying the end of the Cold War?"

Related British CESG papers:

"The History of Non-Secret Encryption," by J. H. Ellis, 1987 (made public in December 1997)

http://www.cesg.gov.uk/site/publications/media/ellis.pdf (HTML version with CESG introduction in December 1997)

"A Note on Non-Secret Encryption'," by C. C. Cocks, 20 November 1973

http://www.cesg.gov.uk/site/publications/media/notense.pdf

"Non-Secret Encryption Using a Finite Field," by M J Williamson, 21 January 1974

http://www.cesg.gov.uk/site/publications/media/secenc.pdf

Thoughts on Cheaper Non-Secret Encryption," M J Williamson, 10 August 1976

http://www.cesg.gov.uk/site/publications/media/cheapnse.pdf

Related:

http://cryptome.org/ukpk-diffie.htm (Whitfield Diffie message and others, with Cryptome's initial FOIA to NSA)
http://jya.com/nsam-160.htm (message on Whitfield Diffie and the origin of NSE and public key cryptography)

NSA
Document ID Number
Former
Classification
Title Author Date Number
of Pages
PDF
File
Size
- - NSA Letter to Cryptome Louis Giles 13 February 2007 3 159KB
3097960 TOP SECRET//COMINT-UMBRA/NOFORN/X1 ELLIPTIC CURVE CRYPTOSYSTEM (ECC) - - 3 131KB
3097962 SECRET THE AUTHENTICATION PROBLEM J H ELLIS 21 December 1977 7 286KB
3097964 - [An HTML version of this document is available online, with bibliography] THE STORY OF NON-SECRET ENCRYPTION J H ELLIS [1987] 5 333KB
3097965 CONFIDENTIAL An Identity Based Public Key System Clifford Cocks 2 April 1998 5 204KB
3097966 CONFIDENTIAL//MR Modular PKI Status Report - 9 September 1997 24 1.2MB
3097967 - A Digital Signature Scheme Constructed with Error-Correcting Codes LI Yuanxing
and
LIANG Chuanjia
30 March 1993 12 383KB
3097968 For Official Use Only A New Public-Key Cryptosystem base on kth-power Residues CAO Zhen-Fu June 1991 11 430KB
3098063 TOP SECRET UMBRA LACONIC NOCON Appendix VII: Public Key Systems - - 5 377KB
3101775 TOP SECRET UMBRA A Proposal for Unclassified Public Key Signature and Key Exchange Standards - 20 October 1989 9 258KB


CRYPTOME          251 WEST 89TH ST              SUITE 6E            NEW YORK NY 10024        212-873-8700

___________________________________________________________________

March 3, 2007                By mail and fax to: (301) 688-4762

NSA/CSS FOIA Appeal Authority (DC34)
National Security Agency
9800 Savage Road, Suite 6248
Ft. George G. Meade, MD 20755-6248

Re FOIA Case: 19136D

This is an appeal of a denial of access by Louis F. Giles, Director of Policy, dated February 13, 2007, for information deleted from documents provided and nine documents (163 pages) withheld in their entirety on the topic of non-secret encryption, better known as public key cryptography (PKC). The material provided by Mr. Giles has been published on the website Cryptome.org.

Public key cryptography is likely the most widespread technology for information security today, as asserted in one of the documents provided. NSA information on the technology not yet in the public domain would be exceptionally important to advance PKC technology by cryptographers to assure its reliability in the face of attacks which are growing as the technology's use increases.

It is now 37 years since the invention of public key encryption and few cryptosystems remain invulnerable for such a period, particularly one that is in widespread use with a plethora of variable-quality implementations, and thus an attractively lucrative target for cryptanalysis. There may be vulnerabilities in PKC technology not publicized in order to exploit ignorance while sustaining confidence in the technology, a deceptive practice well known in the field of cryptography.

Or there may be strengths which are not publicly known but if revealed would enhance public confidence in the cryptosystem, and even lead to further strengthening by the burgeoning cryptographic profession against equally burgeoning cryptanalytic attacks.

Thank you very much for considering and granting this appeal.

Sincerely,

John Young
E-mail: jya[at]pipeline.com
Fax: 212-787-6102