he following table can help customers migrate from legacy ciphers to current or more secure ciphers. The table explains each cryptographic algorithm that is available, the operations that each algorithm supports, and whether an algorithm is Cisco’s best recommendation. Customers should pay particular attention to algorithms designated as Avoid or Legacy. The status labels are explained following the table.
Archiv: the SHA-256 hash encryption situation
sha256 SPKI pinset: 2WFzfO2/56HpeR+v/l25NPf5dacfxLrudH5yZbWCfdo=
Common Name des Zertifikats (tls_auth_name): dns3.digitalcourage.de
Aussteller des Zertifikats: Let’s Encrypt
National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems
(May 04, 2022)
A classified annex to this memorandum addresses sensitive national security issues.
Section 1. Policy. (a) Quantum computers hold the potential to drive innovations across the American economy, from fields as diverse as materials science and pharmaceuticals to finance and energy. While the full range of applications of quantum computers is still unknown, it is nevertheless clear that America’s continued technological and scientific leadership will depend, at least in part, on the Nation’s ability to maintain a competitive advantage in quantum computing and QIS.
(b) Yet alongside its potential benefits, quantum computing also poses significant risks to the economic and national security of the United States. Most notably, a quantum computer of sufficient size and sophistication — also known as a cryptanalytically relevant quantum computer (CRQC) — will be capable of breaking much of the public-key cryptography used on digital systems across the United States and around the world. When it becomes available, a CRQC could jeopardize civilian and military communications, undermine supervisory and control systems for critical infrastructure, and defeat security protocols for most Internet-based financial transactions.
Does the certificate offer a SHA-2 signature?
Let’s Encrypt uses SHA-256 hashe in it’s certificates and SHA-256 is one of the SHA-2 hash family variants
HOW TO MAKE A MINT: THE CRYPTOGRAPHY OF ANONYMOUS ELECTRONIC CASH*
* This research Essay was prepared by NSA employees in furtherance of the study of
cryptography. The contents of the report do not necessarily represent the position or policies of the U.S. Government, the Department of Defense, or the National Security Agency. The authors are mathematical cryptographers at the National Security Agency’s Office of Information Security Research and Technology.
Bitcoins – Secured by NSA designed Encryption or Backdoored ?
(Sep 13, 2013)
The integrity of Bitcoin depends on a hash function called SHA-256, which was designed by the NSA and published by the National Institute for Standards and Technology (NIST).
Is it hard to believe that could the intelligence community have a secret exploit for Bitcoin?
Bitcoin: Evidence Points To The NSA As Its Original Engineer
( December 13, 2017)
I’m going to assume the readers who make it to this article are well informed enough that I don’t have to go into the history of the global money changers and their desire for a one world currency. (If you don’t yet understand the goal of the globalist banking empire and the coming engineered collapse of the fiat currency system, you’re already about 5,000 posts behind the curve.)
With that as a starting point, it’s now becoming increasingly evident that Bitcoin may be a creation of the NSA and was rolled out as a “normalization” experiment to get the public familiar with digital currency. Once this is established, the world’s fiat currencies will be obliterated in an engineered debt collapse (see below for the sequence of events), then replaced with a government approved cryptocurrency with tracking of all transactions and digital wallets by the world’s western governments.