VENONA/Related Articles: Difference between revisions
< VENONA
Jump to navigation
Jump to search
imported>Daniel Mietchen m (Robot: encapsulating subpages template in noinclude tag) |
imported>Housekeeping Bot m (Automated edit: Adding CZ:Workgroups to Category:Bot-created Related Articles subpages) |
||
Line 26: | Line 26: | ||
{{r|Stream cipher}} | {{r|Stream cipher}} | ||
{{Bot-created_related_article_subpage}} | |||
<!-- Remove the section above after copying links to the other sections. --> | <!-- Remove the section above after copying links to the other sections. --> |
Revision as of 20:26, 11 January 2010
- See also changes related to VENONA, or pages that link to VENONA or to this page or whose text contains "VENONA".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/VENONA. Needs checking by a human.
- Clandestine human-source intelligence operational techniques [r]: Add brief definition or description
- Clandestine human-source intelligence [r]: Add brief definition or description
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Economic warfare [r]: Add brief definition or description
- Federal Bureau of Investigation [r]: The principal U.S. Federal police agency, part of the U.S. Department of Justice and the United States intelligence community , who has arrest authority, and is the primary authority for a variety of domestic crimes, civilian counterespionage within the United States, and organized crime [e]
- Moral panic [r]: Add brief definition or description
- National Security Agency [r]: An organization within the United States Department of Defense, with the dual roles of the principal signals intelligence agency in the United States intelligence community , but also having the responsibility for information assurance of military, diplomatic, and other critical communications. [e]
- One-time pad [r]: A cipher system in which the cryptographic key, i.e. the secret used to encrypt and decrypt messages, is a sequence of random values, each one of which is only ever used once, and only to encrypt one particular letter or word. [e]
- SIGINT in the Second World War [r]: Add brief definition or description
- Signals intelligence at the start of the Cold War [r]: Signals intelligence technology and history between 1945 and 1954 [e]
- Stream cipher [r]: A cipher that encrypts data by mixing it with the output of a pseudorandom number generator controlled by a key; to decrypt, run the same generator with the same key to get the same pseudorandom data, then reverse the mixing step. [e]
Categories:
- Subpages
- Related Article Subpages
- Mathematics Related Article Subpages
- Computers Related Article Subpages
- Military Related Article Subpages
- All Content
- Mathematics Content
- Computers Content
- Military Content
- Military tag
- Security tag
- Intelligence tag
- Signals intelligence tag
- Bot-created Related Articles subpages
- Mathematics Bot-created Related Articles subpages
- Computers Bot-created Related Articles subpages
- Military Bot-created Related Articles subpages