164:
84:
The initiative encountered massive resistance from the cryptographic community, and eventually the US government abandoned the effort. The main reasons for this resistance were concerns about
Skipjack's design, which was
220:
35:
123:
201:
225:
134:
149:
31:
230:
63:
194:
39:
23:
86:
187:
55:
171:
214:
71:
59:
27:
78:
90:
163:
75:
30:
standards for public and government use. Capstone was authorized by the
51:
112:
62:
that included the
Skipjack algorithm, a digital signature algorithm,
81:. All Capstone components were designed to provide 80-bit security.
67:
50:
The initiative involved four standard algorithms: a data
175:
74:
protocol. Capstone's first implementation was in the
36:National Institute of Standards and Technology
195:
8:
221:National Security Agency encryption devices
202:
188:
135:RSA Laboratories FAQ on Cryptography entry
170:This cryptography-related article is a
108:
106:
102:
16:US government standardization project
7:
160:
158:
174:. You can help Knowledge (XXG) by
42:(NSA); the project began in 1993.
14:
162:
1:
32:Computer Security Act of 1987
26:long-term project to develop
64:Digital Signature Algorithm
247:
157:
150:EFF archives on Capstone
66:(DSA), a hash function,
40:National Security Agency
24:United States government
226:History of cryptography
93:in the Clipper chip.
124:Original press release
113:RSA FAQ on Capstone
231:Cryptography stubs
183:
182:
89:, and the use of
58:, along with the
54:algorithm called
238:
204:
197:
190:
166:
159:
137:
132:
126:
121:
115:
110:
34:, driven by the
246:
245:
241:
240:
239:
237:
236:
235:
211:
210:
209:
208:
155:
146:
141:
140:
133:
129:
122:
118:
111:
104:
99:
48:
38:(NIST) and the
17:
12:
11:
5:
244:
242:
234:
233:
228:
223:
213:
212:
207:
206:
199:
192:
184:
181:
180:
167:
153:
152:
145:
144:External links
142:
139:
138:
127:
116:
101:
100:
98:
95:
47:
44:
15:
13:
10:
9:
6:
4:
3:
2:
243:
232:
229:
227:
224:
222:
219:
218:
216:
205:
200:
198:
193:
191:
186:
185:
179:
177:
173:
168:
165:
161:
156:
151:
148:
147:
143:
136:
131:
128:
125:
120:
117:
114:
109:
107:
103:
96:
94:
92:
88:
82:
80:
77:
73:
69:
65:
61:
57:
53:
45:
43:
41:
37:
33:
29:
25:
21:
176:expanding it
169:
154:
130:
119:
83:
72:key exchange
60:Clipper chip
49:
28:cryptography
19:
18:
79:PCMCIA card
215:Categories
97:References
91:key escrow
87:classified
52:encryption
76:Fortezza
70:, and a
56:Skipjack
20:Capstone
46:Project
68:SHA-1
22:is a
172:stub
217::
105:^
203:e
196:t
189:v
178:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.