Security Products
This page is a subsection of the Crypto link farm.
Links to further crypto and security-related information can be found there.
Access Control
- ActivCard Home Page
- Authentication/single sign-on card.
- Argus Products & Services Page
- Extra security measures for Java programs, Orange Book/ITSEC security modules.
- BRICKHouse Secure Web Server
- ACL-based web server security.
- Cambridge Neurodynamics
- Biometric identification systems.
- Capella Electronics - Security Systems
- Access control and security sensors.
- Check Point FireWall-1
- FireWall-1 firewall.
- Cerberus Homepage
- Win 3.1/Win95 access control.
- Core SDI SA
- Network scanners, authentication and security modules.
- Cryptocard Corporation
- User authentication and remote access management tools.
- CyberSafe - Products
- Kerberos and public-key based single sign-on, access control.
- CYCON Labyrinth og CYCON technologies and Cypress Consulting
- The Cycon labyrinth firewall.
- GEZ Microsystems Inc. - Oakville, Ontario, Canada
- Fingerprint verification products.
- e.g. Software
- Auditing, security alerts, password analysis, and security software for Netware.
- Hardcastle Electronics
- Firewalls, security gateways, F-secure.
- identikey
- Java-based access control over SSL.
- Intracept - X-Ray Vision
- Blocks Java, ActiveX, and cookies to web browsers.
- Kalliopi: DELPHI Security - We've got it covered!!
- Access control to Delphi apps.
- Keyware Technologies
- Biometric security products.
- KyberPASS
- Certificate-based access control.
- MARX CRYPTO-BOX Software Copy Protection
- Software and hardware-based copy protection.
- medcom Home Page
- Firewalls, tiger team testing, WWW security.
- Micah Development
- Access control for DOS and Windows.
- New-Tech Systems
- DOS/Windows access control software.
- PCGUARDIAN Home Page
- PC access control and encryption software.
- SAGUS Products Page
- Security gateway, firewall, Winsock interface.
- Schumann Products for Enterprise Security
- Single sign-on, access control management.
- Sealabs
- Watchguard firewall and security management software.
- SecureLogix: Corporate
- Firewall for phone networks.
- SecurePilot
- PalmPilot based challenge-response authentication supporting a variety of popular protocols.
- Secure Storage
- High-security storage facility.
- Sesame
- Euro-Kerberos
- SOL - Security On Line
- Phsyical security items and information.
- Startek Engineering Inc.
- Fingerprint verification products.
- Technical Incursion Countermeasures
- Auditing, consulting, and training for networks, firewalls, security policies, and assurance testing.
- The ULTIMATELY Secure Firewall
- Wingate Lan to Internet Software
- Windows Internet proxy.
Data Encryption
- 3Si Products and Services
- Crypto hardware accelerator cards.
- Aegis Research Corporation
- Windows PGP shell.
- American Stealth Messenger
- Email encryption software which is probably some form of rebadged PGP.
- Ancort
- File, email, disk, voice encryption including IDE data channel encryption hardware. Proprietary algorithms.
- Archsoft Security Software Solutions -Cerberus
- Desktop encryption for Windows using Blowfish.
- ASIC International - Cryptographic Cores and Technologies
- DES, SHA-1, MD5, bignum maths cores.
- AspEncrypt.com - ASP Component for File Encryption, Digital Signatures, Secure Mail and X.509 Certificate Management
- IIS ASP component for encryption and digital signatures.
- Atalla
- Network and internet security processors and solutions.
- Australian Privacy Home Page
- Australian PGP vendor.
- Avalanche Java Cryptography Toolkit
- Encryption, hash functions, and secure random number generation in Java.
- Babylon
- ISDN BRI and PRI online encryption hardware, secure servers, VPN products, all using RSA with triple DES (single DES optional). Frame relay and X.25 encryption using DES or proprietary algorithm.
- Baltimore | Products
- Crypto systems toolkit - DES, IDEA, RSA, DSA, RIPEMD, SHA1, MD2, MD5, X.509/CA toolkit, email security software.
- BBN Security
- SafeKeyper tamperproof hardware key storage.
- BestCrypt family of Data Protection systems
- GOST and DES software/hardware encryption for DOS/Windows.
- BetweenUs: Features
- Secure chat program using CAST128/3DES/Blowfish, written in the free world.
- Bitvise Home Page
- Windows SSH client/server.
- Blowfish Advanced Download Site
- Blowfish file encryption for DOS and Win95.
- Bokler Software's Home Page
- DES and hashing DLL's and OCX's.
- Briggs Softworks: Software
- Directory snoopper/file eraser, file encryption for Windows.
- Brivida, Inc. - Technology for Virtual Private Networks "VPN"
- VPN's using IPSEC DES encryption.
- Brokat X*PRESSO Home Page
- Secure non-US encryption by adding another layer of 128-bit encryption over the top of the US crippled 40-bit version.
- Business Security home page
- Fax, video, voice, and modem encryption.
- Bytefusion Products
- Secure mail relay.
- C & A
- CA and timestamping software, SSL servers and clients.
- carrick Encryption Home Page
- DES and Blowfish file encryption.
- CE Infosys GmbH
- Fast DES hardware, encrypting SCSI controllers, PCMCIA cards, from a non-US source.
- CellCase Key Agile ATM Encryptor
- RSA/triple DES ATM link encryptor.
- Certicom
- Elliptic curve cryptosystem products.
- CES Home Page
- Phone and fax encryption add-on (questionable algorithm).
- Chrysalis ITS - Product Information
- Encryption hardware and crypto accelerators.
- Ciphermax
- Pure ECC-based file encryption.
- Cisco Network Encryption Services
- DSA-signed DH for link and session encryption.
- Citadel Products
- Firewall/VPN, Windows file encryption.
- CodedDrag
- Drag-and-drop DES encryption for Win95/NT.
- Cold Fusion Power Packs
- Encryption/decryption, credit card processing, for Cold Fusion.
- Communication Security Corporation Home Page
- Diffie-Hellman and triple DES speech encryption. No GAK.
- Communication Systems - East Infosec Home Page
- Secure comms gear for government use.
- Computer Development Systems Crypto Page
- Link encryption hardware, file and fax encryption software (unknown algorithm).
- ComScire QNG From Quantum World
- Johnson-noise-based RNG for PC parallel ports.
- Condor - Secure Ubiquitous Portable Interoperable Communications Buzzword Buzzword
- Secure Fortezza-protected voice and data over celluylar links.
- Confidentiel : Présentation
- Mac file encryption, approved by the French secret service.
- CoolFish
- Blowfish file encryption.
- CopyTele, Inc.
- Phone and fax communications encryption.
- CoreDesign
- Royalty-free Verilog PKC core.
- CPE Security/PKI
- Swiss resellers of various US security products (Entrust, ActivCard, Datakey), although some require US export permits.
- CPKtec Technology
- Crypto algorithm implementations for embedded systems.
- CRYTEK Communications - Secure Telephone Adaptor
- Key-based subband voice scrambler. Uses Diffie-Hellman key exchange, but a questionable encryption function "based on matrix multiplication".
- Cryptext
- Win95/NT 4 encryption shell extension.
- Crypto AG Switzerland
- Encryption software and hardware of all kinds (but see also the links in the "Crypto Social Issues" section).
- CryptoEx 1.0
- PGP add-on for MS Exchange.
- Cryptomathic homepage
- Encryption and security software and consulting.
- Cryptosystem ME6
- MD5-based file encryption.
- CSM Proxy Server - The Ultimate Gateway to the Internet
- Proxy which includes SSL tunnelling.
- CustomTracks Home Page
- ZixMail mail encryption with 3DES and RSA. Software contains US government backdoors, thus its exportability.
- cv cryptovision
- Smartcard-based ECC implementations.
- Cybanim
- PEM software, bignum maths package.
- Cybernetica - CryptoChip project
- IDEA + RNG + bignum accelerator on a chip. Produced in the free world.
- Cylink Corporation
- Cypris
- Lockheed Martin's crypto processor.
- Data Encryption Key PANDORA
- DES/RC4 file encryption using a USB dongle, unfortunately keys are hardcoded into the dongle.
- DATACRYPT Home Page
- File and file transfer encryption (unknown algorithm).
- DataGuard® - The Software Safe
- IDEA and SEAL file encryption for Win32.
- DataSAFE encryption software by NovaStor
- Pasword-based file encryption using Blowfish.
- DEMCOM: Steganos for Windows 95/98/NT Homepage - The home of steganography
- BMP/DIB/WAV/VOC/text/HTML stego with RC4 encryption.
- Deming Software
- S/MIME software for MS Exchange and Eudora.
- DES
- DES core for FPGA's/ASIC's.
- DES Core
- VHDL DES core.
- Design Automation - CyberLock
- DES-based encryption program. Fairly standard stuff, but the marketing smells of snake oil ("most secure file encryption available", "patented encryption enhancement technology", etc).
- D.I.C.A. ISDN Encryptor
- ISDN link encryption using FEAL 16, IDEA, or DES.
- Digital Delivery
- Secure (encrypted) software and information distribution systems.
- Diskcrypt 95
- Floppy drive encryption for Windows 95.
- docSpace Direct
- Secure data transmission via a web browser and SSL, but intermediate storage is unencrypted on a third-parties sever.
- DubnerCruncher
- Very fast bignum maths card for PC's.
- e-Lock, Security Solution from Frontier Technologies,Home
- Digital signature/encryption software and interfaces (implemented as wrappers around crypto toolkits like BSAFE and CryptoAPI).
- EasyCrypt
- DES file encryption.
- EasyPrivacy
- DOS, Win95, and NT file, drive, and email encryption using IDEA, file wiping,
- EES Family Data Sheet
- Clipper chips.
- EMD Enterprises
- Win95/NT anti-virus and encryption software.
- Encrypt-It Plus
- DLL/VBX/OLE control providing DES and 3 other (unknown) encryption algorithms.
- Encryption Plus
- Encryption for Visual Basic.
- Encrytor
- DES file encryption for Windows.
- Entrust - Home Page
- (Formerly Nortel) Entrust cryptography product family. GAK alert: These products are GAK-ready.
- ERACOM - Encryption Adaptors
- Encryption toolkits, DES encryption hardware for PC's.
- F-Secure Cryptography Products
- Windows/Unix <-> Windows/Unix link encryption with secure telnet, X11, port forwarding, etc. The link is encrypted with algorithms like triple DES or Blowfish, with 1024-bit RSA for key exchange an authentication.
- f5 - Intelligent Building Blocks for a Smarter Web
- SSL accelerators.
- FileVault
- File encryption using 64-bit (?) Blowfish.
- FineCrypt
- File encryption using Blowfish, CAST-128, GOST, IDEA, and RC5.
- Forge - Distributed Environment Solutions
- JCE, SSl in Java.
- Formal Systems
- X.509 certificate viewer, PKI, encryption services and consulting.
- FORTEZZA Developers Home Page
- FORTEZZA PC Cards
- Links and information for Fortezza developers.
- Fortress Technologies
- VPN's.
- Free, secure, reliable, E-mail
- Email encryption using 2Kbit RSA and Blowfish.
- Frontier Technologies e-Lock Home Page
- PKCS/X.509 and S/MIME key management, signing, secure email and browser.
- Fulltime RSA
- RSA speech encryption for PSTN lines.
- fun communications - http://www.fun.de/
- Crypto, SSL, certificate managent software from the free world.
- GDS: Encryption, Authentication, Transaction Security
- Link encryption hardware from ISDN up to T3 speeds.
- Gemini Computers, Incorporated
- Orange Book A1 certified network processor.
- Global Technologies Group, Inc.
- Products based on the German SuperCrypt DES/triple DES chip.
- GTEI-CyberTrust-SafeKeyper-Overview
- Hardware-based key management for CA's.
- GTGI PowerCrypt Web Site
- A HiFn chip on a PCI card.
- Hammercore DES Cores
- FPGA DES cores for Altrea FPGA's.
- Hide Me for Windows
- Windows file encryption, unknown algorithm.
- Highwinds Trading Company Products
- Various crypto-related add-ons to the Mac OS.
- HRB Systems
- Data encryption products (an division of E-Systems)
- IBM cryptography: cryptographic cards home page
- IBM's (really cool) 4758 crypto module.
- IBM SecureWay
- Data encryption, security, consulting.
- iD2
- Smart cards, PKCS #11/CAPI drivers, certificate management, SSL tunneling.
- I.D.E.A Encryption for Windows
- Win95 file encryption.
- IDS - Products
- Disk encryption using Blowfish, PGP-compatible mail encryption using RSA+IDEA, smart cards.
- INFOSEC Products
- Triple DES file encryption for Windows.
- International Cryptography Framework
- HP's international big brother design.
- Internet Solution Security (Pty) Ltd
- Access control, electronic commerce, 128-bit SSL proxy.
- Internet Smartsec
- Internet security technology (knowledge of Swedish useful).
- Interscope BlackBox Homepage
- DES-based file encryption.
- Inventra Soft Cores Current Documentation
- DES cores.
- Invincible Data Systems, Inc.
- PGP - compatible encryption software for e-mail, hard disk encryption, access control hardware tokens.
- IPivot Products
- SSl accelerator boxes (now swallowed by Intel).
- iPower Home Page
- National's PCMCIA crypto card.
- IRE Product Catalog
- Network and link encryption hardware.
- ISC Products
- Email encryption, crypto toolkits, encrypted Zmodem.
- ISDN Encryptor
- iSolv Technologies
- S/MIME with 2Kb RSA, 3DES, crypto toolkit.
- Java Cryptography Extension
- Java crypto extensions (JCE).
- JVDE EBackup
- File encryption/archiving using DES, Blowfish, CAST128.
- Kremlin
- Win95/NT drag-and-drop file encryption.
- Kryptel - File Encryption Software for Windows 95/98
- File encryption using Blowfish, 3DES, IDEA, Twofish.
- Kryptology Home Page
- Snake oil for the masses.
- LAN Crypto Programms
- Document and file encryption and digital signature software using proprietary algorithms.
- Langley System Web Site
- Floppy disk encryption software.
- Lintel Security
- DES and RSA encryption chips and hardware.
- LUC ENcryption Technology (LUCENT) Limited
- Lucas-function based PKC.
- MAILguardian and MAILguardian Enterprise
- Email encryption using DES, 3DES, Blowfish and DH (but will automatically and transparently fall back to sending cleartext - this is listed as a feature of the software).
- Marathon Computer Press Jumpstation
- DES, Blowfish file encryption, disk wiping.
- Markus Hahn's Software Page
- File/data encryption using Blowfish, Twofish, RC4, Cobra128, GOST, triple DES, and CAST.
- Megacrypt/MVS : cryptography made efficient and easy for IBM/MVS mainframes
- DES, 3DES, and Blowfish for MVS.
- Microlink's Solution of the telephone wiretapping,eavesdropping and interception, telecom security solution
- POTS and ISDN phone encryption.
- Motorola Advanced INFOSEC Machine (AIM)
- Motorola crypto processor.
- Motorola SSTG Secure Telecom Products
- Morotola secure phones and fax and data communications products.
- Mykotronx!
- Clipper and Capstone chips and related products.
- nCipher products
- Hardware crypto accelerators.
- NetFortress
- Network link encryption.
- NetLOCK(tm) Network Security
- IPSEC-based VPN security.
- Netseal Product Specifications
- IPSEC/ISAKMP/OAKLEY drives for ODI, NDIS, and Linux.
- Next Wave Software
- DES-based file encryption for the Mac.
- NEXUS Solutions NTrust
- Blowfish encryption for Windows.
- Nokia Clustered IP Solutions - CryptoCluster VPN Gateways
- IPSec boxes.
- NTrust
- Blowfish file encryption.
- Ocean Logic DES
- VHDL/Verilog DES core.
- Okiok Data Security Products
- Crypto processors.
- Opera Software - Bringing speed and fun back into Internet browsing
- Non-US web browser with strong SSL encryption.
- PC-Encrypt Email Security
- Blowfish file encryption (web page smells slightly of snake oil).
- PGP -- Pretty Good Privacy, Inc. Home Page
- PGP Tools from Net Services
- Windows front-end for PGP.
- SSLava
- SSL in Java.
- Phobos SSL Offloading and Accelerating Products
- SSL accelerators.
- PIJNENBURG Beheer N.V.
- Cool RSA/bignum and DES/triple DES encryption hardware.
- PKIMagic
- Entrust-based S/MIME integrated into Lotus Notes. View pages with Java turned off, or just wait for their spam to arrive in your mail.
- Pointsec Mobile Device Security Solutions
- Disk encryption using Blowfish and CAST-128, combined with user authentication using passwords or smart cards.
- PowerCrypt Website
- PEM and S/MIME encryption for the Power Mac.
- Private Data - Protecting your privacy with innovative products
- Disk encryption for Win95 (unknown algorithm).
- PrivateExpress
- Some sort of secure tunnel for email (details are sketchy and the "proof" of security even more so).
- Psypher/EDI+
- DES EDI encryption.
- Racal/Airtech Security
- Various access control and security products.
- Rainbow Technologies Internet Security Group
- CryptoSwift crypto hardware accelerator.
- RAMPART for DOS/Windows
- DES encryption software and other utilities.
- Reflex Magnetics - homepage
- Secure FTP, mail, modem encryption using DES, 3DES, Blowfish, or IDEA.
- RPK Public Key Cryptography
- Crypto SDK and email software utilising a new, fast discrete-log-over-GF(2^k) based PKC.
- RS Cryptographic Development Kit
- Public-key crypto toolkit.
- RSA Data Security, Inc.
- RSA DesignObject
- RSA processor core.
- RSA2048A
- 2Kbit RSA processor RTL Verilog core.
- S to Infinity - Encryption Page
- Windows file/directory encryption using RC4.
- SAFE Folder
- Transparent Win95 file encryption.
- SafeHouse Drive Encryption
- DES disk encryption for Win3.x/Win95 (exportable 56-bit because it's GAK-ready).
- SafeMessage Home Page
- Secure ICQ-type application using Elgamal and Twofish.
- SafePassage Web Proxy
- Full-strength encrypting web proxy which bypasses US export restrictions.
- SandTiger
- File encryption using Blowfish, CAST-128, and Diamond2.
- SAWFTWARE
- Secure archiver (3DES, Twofish, Blowfish).
- Secret!
- Secure PIN/password store for the PalmPilot.
- Sectra Defence Communication Systems
- Secure phones, encrypting routers and encryption cards using proprietary algorithms.
- SECUDE Produkte
- File encryption, S/MIME, CA products, security consulting.
- SecureCRT
- Win32 SSH client.
- Secure Email - 256 bit encryption for web mail
- Server-based secure messaging service.
- SecureFile
- File encryption and signing for Win95/NT
- Secure Link Services Ltd (SLS), DataGuard Family
- Disk and file encryption using IDEA, SEAL, and PKC's). Note that this company is located in the free world (Switzerland), despite the .net address.
- SECURE...Encryption and Security for all
- DES and IDEA encryption software for Windows.
- SecureOffice
- Triple DES encryption add-on for MS Office.
- SecureStore Homepage
- File encryption using DES, triple DES< Blowfish, CAST-128, Diamond2, RC4.
- SecureWin
- Win95/NT file encryption using RSA and the BSAFE conventional algorithms, other security tools (eg secure delete, secure shutdown).
- Security Domain: electronic message security
- Public-key file encryption, CA software.
- Security Encryption Software for SQL Server,MSDE,MS Access,File Encryption
- Database encryption using 3DES and Blowfish.
- SICAN DesignObject (TM): DES Data Encryption System
- ASIC DES core.
- Sioux: Sophisticated & Secure
- Apache-based secure web server.
- SKIP Information
- Simple Key management for Internet Protocols - papers, information, implementations (US only).
- SKIP in Russia
- As above, without the export restrictions.
- SMARTCrypt by WetStone
- ActiveX interface to PKCS #11 modules.
- Snapshield
- Encrypted phone/fax/telecoms using Elgamal and DES.
- Soft Concepts
- Ncrypt file archiving, compression, and encryption utilities.
- Software Design - Crypto for Windows by Gregory Braun
- "Braun pretends to use the BlowFish algorithm to provide secure encryption in his
- SoftWings Enterprises Inc
- DES/triple DES protected OS/2 data transfer.
- SoftWinter - Shade page
- Disk encryption for Windows NT.
- SoundCode, Inc.
- Crypto libraries and software.
- sshCE
- SSH client for the Pocket PC.
- SSL HTTP Security Solution
- 128-bit SSL proxy - turns crippled SSL browsers into full-strength encryption ones.
- SSL Plus (Product)
- SSL Plus SSL integration suite.
- SSLP Reference Implementation Project
- An SSL reference implementation (still under development).
- SSRSSL
- Secure sockets relay - full-strength SSL proxying.
- Stealth Drive
- Encrypted virtual disk volumes (the standards compliance section looks a bit odd).
- Stealth Encryptor for Windows
- Windows file/directory encryption using DES or Blowfish.
- Stronghold Homepage
- Apache-based secure web server.
- SynCrypt
- File and email encryption using Elgamal, Blowfish, IDEA, and triple DES.
- tbCrypt
- Win95/NT, OS/2, DOS file encryption using DES, IDEA, Blowfish, NewDES, and Lucifer.
- TCC: Encryption products and solutions for Data, Phone, Voice, and FAX NETWORKS
- Link encryption, phone and fax encryption.
- TeamWARE Crypto
- ICL's Windows file encryption software.
- TecApro Internacional - Home page
- Win95 file encryption.
- Technology Nexus AB - Välkommen!
- Encryption, digital signature, CA toolkits.
- Templar Software and Services
- Secure EDI over the Internet.
- ThunderStore Product Overview
- File, email encryption using Blowfish.
- TimeStep - The Network Security Standard
- VPN encryption systems using DES encryption and X.509 certificates and digital signatures for authentication.
- TorDisk HomePage
- NT disk encryption for hard drives, CDROM's, networks, using DES, triple DES, Safer, Blowfish, CAST-128.
- Transcrypt Product Overview
- Phone encryption devices and add-ons.
- TrustedWeb
- Intranet ACL-based security and encryption using RSA and triple DES.
- Trust Services-Online Trust Center
- S/MIME email plugin and CA.
- TrustWorks products - Delivering information security products that you trust
- SKIP-based VPN using pluggable encryption algorithms.
- TSS OfficeLock - Data Security for Microsoft Office
- Strong encryption for MS Office documents.
- Tumbleweed : Solutions : Products
- Secure mail, mail gateways, message, archiving products.
- UCrypt
- DES, triple DES, GOST, Blowfish, 3-Way, RC5, TEA, Safer, Shark, Diamond-2, and others.
- Utimaco Safeware AG
- DOS, OS/2, Windows encryption software, encryption hardware.
- V-Disk Official site
- Win95 drive encryption using Blowfish, with smart card support.
- Vieka - Pocket PC
- AES file encryption for the Pocket PC.
- Virtually Online
- SEMS email encryption using the RPK algorithm.
- VPNet: Products
- WAN VPN encryption products using DES and triple DES with SKIP key management.
- WeOnlyDo! Components
- SSH/SFTP client/server libraries for Windows.
- Western DataCom Home Page - Data Security
- Fortezza, DES encrypting modems, link encryptors.
- Win Magic: SecureDoc
- Triple DES disk encryption for Win95/NT.
- Worldtalk Worldsecure
- S/MIME encryption software.
- Wormhole technologies
- PKC-based email encryption software.
- Xcert Software
- Access control, X.509-related software.
- X_DES Core Page
- Verilog DES core.
- XF-DES: Data Encryption Standard Engine Core
- Xilinx DES core.
- Zaxus
- Crypto hardware modules, link encryption, smart cards.
- Zergo WWW Site - Information Security Specialists
- Crypto and CA products. They'll also design GAK protocols for backdoor access to your medical records if required.
Interception and Monitoring
- Hardware and software for intercepting and monitoring information, and stopping of the same.
- Applied Signal Technology Product Summary Introduction
- Signals interception and monitoring gear.
- Candes Systems Inc. - TEMPEST Computers and Peripherals
- TEMPEST-shielded computer gear.
- Cellular Monitoring Interface (via Electronic Countermeasures Inc)
- Computer interface for intercepting cellphone traffic.
- Computer Aided Technologies
- Scanner software.
- Covert Keyboard Press bug
- Hardware keyboard sniffer.
- Datascan TEMPEST monitoring system
- Dynamic Sciences International: Emissions and Surveillence Equipment
- Assorted Tempest toys.
- Electroconductive Concrete ELFINCO
- Makes for great TEMPEST shielding.
- Fastscan
- Win95/NT port scanner.
- Fax Analyzer
- PC fax interception card.
- Force-Ten Online Catalog
- Surveillance, wiretaps, spying equipment.
- GENESIS Group online
- Assorted bugs, transmitters, receivers, cellphone tracking and interception, fax interception, and other bugging and interception gear.
- GCOM Technologies
- GSM, cellphone, computer, and fax interception and monitoring equipment (the GSM interception unit features real-time, off-air interception of up to 1000 voice/data/fax transmissions, traffic targetting and screening, and call tracking, all with a friendly Windows interface).
- GSM Monitoring - GSTA-1400
- Complete GSM monitoring/interception system with call and target tracking and location features.
- Kansmen Corporation
- LittleBrother Internet monitoring call.
- Keyboard Keystroke Logger for PC : KeyGhost : record or monitor keyboard keystrokes on PC
- Hardware keystroke monitoring.
- mobifinder
- Mobile phone scanner and locator.
- NDG Software Products
- Various network monitoring and snopping tools.
- NetWatcher
- Monitor and intercept TCP/IP sessions.
- Pager Decoding Interface (via Electronic Countermeasures Inc)
- Computer interface for intercepting pager traffic.
- PCProtect
- Win95/98/NT keystroke logger.
- Radte KG - Spytec
- Bugs, speech and telephone interception gear, information on industrial espionage.
- Spies:Law Enforcement
- Cellular, GSM, and fax interception and monitoring equipment.
- SPY Electronics, Communication and Surveillance Systems
- Cellphone, fax interception gear.
- SPY - Networkspy / -agent / -analysator
- Sophisticated network sniffer which can extract files and data sent via FTP, HTTP, NNTP, SMTP, POP3, NetBIOS, search the data stream for keywords, and log usernames and passwords.
- SpyZone Tools and Techniques
- Industrial espionage and surveillance tools and techniques, security equipment, secure communications systems, disaster recovery, bug sweeps.
- The Codex Privacy Site
- Surveillance, stalking, privacy invasion, eavesdropping, and anything else related to these categories.
- The Watcher Network Monitoring Program
- Monitor and control any IP connection on a network.
- TIRIS Products & Technology
- RF identification and tracking devices.
- TSCM.COM Counterintelligence Home Page
- Technical Surveillance Countermeasures - bugs and wiretapping, detecting bugs, intelligence agencies, and counterintelligence.
- Virtual ISA Proto Board
- Xilinx 5210/4013E card.
Investigative Tools
- Tools for investigating the security aspects of various things.
- APS Powerful, yet Affordable EDA Tools
- Developmemt boards from as low as $199.
- Chip Express Corporation
- Fast turn-around ASICs.
- Chipworks
- IC reverse engineering.
- Code Classifier
- Classify encrypted data by likelihood of encryption system used ("especially recommended for cipher generated outside North America where DES and private-key systems are not as dominant").
- Convar Systeme Deutschland - Service Center
- Disk data recovery.
- Digital Instruments
- Scanning probe microscopy (used to investigate magnetic media).
- DoD Computer Forensics Laboratory
- Carpe Machina!
- ESS Data Recovery Inc.
- Recovery of damaged disk data.
- FPGA, CPLD: OptiMagic's Programmable Logic Jump Station
- Starting point for hardware crypt-breaking information and tools.
- Hack Watch News
- Satellite and terrestrial TV scrambling systems.
- IBAS Laboratories - Professional Data Recovery
- Recovery of data from damaged or overwritten/erased magnetic media.
- Investigating the Suspect Computer
- DOS forensic software for recovering evidence from PC's.
- IsoBuster, Ultimate CD and DVD Data Recovery tool (www.cdrecovery.net)
- MUSIC Semiconductors
- Various content-addressable memories, useful for investigating encryption algorithms.
- Neuroptics Technologies, Inc.
- Neural network hardware.
- NTI Home Page
- Computer forensic training, consulting, and tools.
- Picosecond Imaging Circuit Analysis
- IBM technique for imaging signals in chips.
- Programmable Logic Jump Station ( FPGA, CPLD )
- More investigative tools for encryption keys.
- Technology Pathways LLC - Computer Forensics, Digital Discovery, Audits, Lockdown, ProDiscover DFT
- Disk forensics tool.
- Xilinx Product Information
- Perfect for investigating currently unknown DES and RC4 keys.
Misc
- APM - EMI Shielding Products
- EMI shielding, useful for TEMPEST shielding.
- AR Products
- RF interference generators.
- Argus Systems Group, Inc.
- Operating system security add-on products for Solaris and Windows NT.
- Automatic Response Systems
- Document destructions products and services.
- BEMA, Inc
- Portable TEMPEST-shielding enclosures.
- C&A Systems Security: Leaders in Security Risk Analysis, Risk Assessment & Risk Management
- DES toolkits, risk analysis tools.
- Clean Drive: Protect Yourself and Your Life
- Drive cleaner. Sold via spamming, avoid this product.
- Computer Security Update
- Links to security-related bug fixes for MSIE and Windows NT.
- COMSEC Solutions
- Cryptography and biometric countermeasures consulting.
- Consensus Products/Services
- SSL Plus integration suite, RSAREF, IDEA licensing, code security screening.
- CyberScrub Secure File Deletion / Internet Privacy Utility
- Windows file deletion software.
- Digital ID Center
- Web interface to Verisign's digital ID (CA) service.
- Disk Zapper
- Floppy disk bulk eraser.
- Embassy
- DivX for your PC.
- Emcom Products and Services
- TEMPEST PC's, monitors, and comms gear.
- Evidence Eliminator - What evidence is on your hard drive?
- Drive sanitiser for Windows. Advertised through spamming, contains a booby-trap to silently disable itself. Avoid this product.
- Framework Executive Back Orifice removal and protection tool
- Program to remove Back Orifice.
- Hackers Catalog Books
- Various standards for satellite TV scrambling, cellphones, and scrambling-related encryption.
- IBM SecureWay Home Page
- IBM's security hardware and software, consulting, technology, and general information.
- IP Packet Filter
- Highly configurable kernel-level IP packet filters.
- Kilben Business Services
- Computer enclosures and alarms.
- List of FPGA-based Computing Machines
- Fast encryption hardware (with a little programming...).
- NIC Law Enforcement Supply CATALOG - MAIN SITE
- Law enforcement supplies.
- Minatronics Corporation
- Physical security products.
- Proton Engineering Degausser & Declassification Systems
- Magnetic and optical media degaussing and declassification systems.
- SecureWave | SecureNT
- NT kernel mode driver which protects against many buffer overflow attacks.
- Security Engineering Services, Inc
- TEMPEST and COMSEC engineering and consulting.
- SEM - Security Engineered Machinery
- Data destruction equipment and information.
- The Bunker - Britain's ultimate safe house
- Secure web hosting service.
- Tempest Products
- TEMPEST-secure communications and data processing devices.
- Terminus 4... Leave No Traces...
- Secure file deletion for Windows.
- TNO-FEL
- TNO physics and electronics laboratory (information security, electronic warfare, electronic security, sensor and weapons electronics).
- Wang Government Services Secure System's HOME PAGE
- Wang's TEMPEST products and secure services.
- Wireless privacy / security, mobileCloak - mobile Cloak - mCloak
- Portable Faraday cage for wireless devices.
- Zero-Knowledge Systems | Freedom
- Software to provide anonymity on the net.
Online Commerce and Banking
- We do e-commerce because that's where the money and the suckers are.
- Canada Trust
- Online access to account balances, stock quotes, and other banking services.
- CommerceEngine
- A Rainbow crypto card in a PC case.
- Credit Suisse Direct Net
- Full online banking using 128-bit SSL proxies.
- echeck
- Electronic cheques.
- EMJ America
- Internet security and e-commerce products.
- ICVerify Home Page
- Online credit card, debit card, and cheque verification.
- Internet-based digital cash
- Links to various e-cash resources.
- Netbill-related publications
- Various online electronic transaction protocols.
- Payment mechanisms designed for the Internet
- Welcome to Online Banking!
- Wells Fargo online banking.
Smart Cards
- Smart cards? A certain animal cunning, perhaps.
- 3-G International
- Smartcard based desktop security and access control software.
- A safe Internet communication channel with smartcards
- Masters thesis on secure client-server communication using smart cards.
- A8 Corp
- Smart card personalization and card management software.
- Advanced Card Systems, Ltd.
- Smart cards, card readers, development kits.
- ACOLAs Homepage -Communication, Terminal Server and Data Collection Products
- Smart card and RF card products.
- AD-Teknik, Mainpage
- Smart card emulators, PCB's, readers.
- Amazing Smart Card Technologies
- Smart cards, memory cards (up to 1Mbit), readers, development systems.
- AMC Smart Card Reader Products
- Smart card/mag stripe reader/writer.
- American Biometric Company
- Fingerprint readers, combined card/fingerprint readers.
- AMP Smart Card Connectors
- Smart card connectors and reader contacts.
- Analysis of French T2G
- Tech info on second-generation phone cards.
- ASE - The Aladdin Smartcard Environment
- Smartcard development kit.
- Basic programmable smartcard
- Bill's idea of a JavaCard?
- B&C Data Systems
- Smart card reader/writer.
- Card Europe Main Index Page
- Card Technology Web Site
- Card Technology magazine online.
- CardTech/SecurTech:Home
- Smart card and security card conference information.
- Catalyst Serial E2PROMs -- I2C Bus
- Smart card EEPROMs.
- Cavitronic
- Programmers, smart cards, add-ons.
- Chip Application Technologies
- Multiapplication smartcard management software.
- Chip Cards
- Data sheets for various Siemens cards.
- Chipcard, Chipkarten, Chipcards, Smartcards, Programmer für Chipkarten, Pay-TV-Cards,
- Smart cards, programmers, software.
- Chipkarten Technik
- Technical details on various commons cards (phone cards, German KVK).
- CITI Smart Cards
- University of Michigan smart card research project.
- Compelson Labs
- Smart-card based key storage, file encryption, access control.
- CompInfo - Smartcard Technology - Information Sources and Manufacturers
- Links to sources of information on smart cards and card and card reader manufacturers.
- Cop Card Site
- Programming information and keys for COP cards.
- Crownhill Associates Ltd
- Smart cards, PIC programming, code recovery/reverse engineering.
- CryptoCard's Security Products
- Various access-control systems.
- CyberMark > Products & Specs
- Card terminals and card-based vending machines.
- Dallas Semiconductor Corp: Home Page
- Identification and authorization chips, secure microcontrollers.
- Dallas Semiconductor Corp. iButton: Home Page
- Digital credentials/timestamping/crypto in a button.
- Datacard Group
- Card printers, embossers, terminals.
- Datakey Home Page
- Smart card reader/writers, smart cards.
- DataMega I/O Products
- Smart card readers.
- Die branchenübergreifende elektronische Geldbörse
- Overview of smartcard-based payment systems (undergaduate thesis, in German).
- Edgar Online - EdCard
- C-based smartcard API.
- EMV Technical Specifications
- EMV card, terminal, and application specifications for smart card credit and debit applications.
- Encotone Ltd. Home Page
- Smart-card and smart-card-like authentication and security devices.
- eToken: USB-based authentication for networks
- USB-based crypto token. Need to enable Java, autoinstall, and a dozen other security holes for the demo to work.
- Eutron
- USB token with MD5, Blowfish, RSA.
- Fingerprintcards
- Smartcards with built-in fingerprint readers.
- First Access Products
- Contactless smart card authentication systems.
- Fun With Smartcards
- Notes from the HIP'97 Fun with Smartcards session.
- GeldKarte and electronic banking home page
- Information on various smart-card based electronic purse systems.
- Gemplus Smart Card Home Page
- German Smartcard Hacker Org.
- GIS Home Page
- Smart card readers, terminals, and developer kits.
- GNU SmartCard Project
- Smart card info, documentation, software, projects.
- Goran Vlaski's Software Page
- Smart card read/write/emulation software.
- Guru's Lair: Scads of PIC microprocessor web site links
- Links to PIC sites including PIC-based smart cards and card programmers.
- HIP Smartcard Homepage: Cards
- HIP'97 smart cards info.
- How to do it: Private Key Encryption (A method)
- "emulation of the One-time key system using large psuedo-random number generators" (linear congruential generators).
- IBM Smart Card Solutions
- IBM smart card technology and products.
- IBM SmartCard for e-Business
- IBM JavaCard and card toolkits and API's.
- IBM Student Chipcard Innovation Team Homepage
- Dutch student-designed card reader and software.
- IC Card Reader / Writer
- Smart card reader, PINpad, card authorisation terminal.
- IC Card with Combined National ID and Health Insurance Card Functions
- Taiwanese smart card/ID card project.
- Identity Systems Security Inc.
- Smart-card based identification.
- i-Key from Rainbow Technologies: Product Overview
- USB-based smart card-a-like (looks like it does MD5 onboard for challenge-response authentication).
- Implementing Airline Electronic Ticketing Using Integrated Circuit Cards
- Electronic ticketing project using smart cards.
- incard Products
- GSM, crypto, multi-application cards and software.
- Infineon Technologies AG
- Formerly Siemens smart card division.
- i n f o t e c h n a
- Smart card custom software development.
- Inside Technologies
- Contactless cards and SDK's.
- Java(TM) Card(TM) Technology
- Java kludged to run on a smart card.
- KeyBlitz Project
- Various smart card hacking initiatives, mostly targetting European pay tv systems.
- Keycorp - Smartcards
- Multos/Javacard/OSSCA (Keycorp card OS) cards and products.
- KOBIL Systems GmbH: Chipkartenterminals
- Smart card readers and terminals, smart cards.
- Leapfrog Smart Products
- Smart card development software, encryption software.
- Litronic, Inc.
- Smart cards, card API's, Fortezza cards.
- Magtek Products
- Magnetic card reader/writers.
- Meinen, Ziegel & Co. GmbH: Products
- Card production equipment.
- Microchip Memory Data Sheets
- Includes EEPROM memory for smart cards..
- Micromodule Pte Lte, Singapore
- Smart cards, readers, development kits.
- Mondex Electronic Cash
- Mondex electronic wallet (pretty content-free pages).
- Motorola SmartCards (TM)
- Databooks for Motorola microcontrollers (including smart card micros).
- Motorola Smartcard
- Smartcards for salesdroids - try the other non-Motorola Morotola card links instead.
- Mühlbauer AG
- Smart card manufacturing and assembly.
- Multos - the smartcard gets smarter
- Framework for running multiple applications in a card (pretty light on detail).
- MUSCLE Smartcard Developers
- Development and use of smart card-enabled apps in a Linux environment.
- Nexus Products and Services
- Mag card and smart card readers, PINpads.
- Oberthur Products
- Payment and electronic wallet cards, crypto cards, contactless cards.
- OKI Personal Smart Card Reader
- Electronic wallet balance checker.
- Ordacard Israel
- Mag stripe and smart cards
- OpenCard Framework
- Java smart card middleware.
- OTI - OnTrack Innovations Israel
- Contactless smart cards.
- Paul Maxwell-King
- Smart-card hacking-related hardware.
- PEP Products & Services Page
- Smart card readers, RFID products, crypto and flash cards.
- Philips Smart Card Services
- Philips smart cards.
- pincash
- Smart cards and readers.
- POSH Mfg. Products Page
- Card readers, terminals, development kits.
- Proton World
- Smart-card based electronic wallet.
- PubliCARD
- The Borg of smart cards.
- Reiner SCT
- Smart card readers.
- QI Technologies Corp. - New Products for a Cashless Society
- Smartcard spammers who target newsgroups and email. Avoid their products.
- SCAD toolkit
- Smart card application developer toolkits for Windows.
- SCARD - Smartcard Resources
- Smart card standards, interface software, hardware.
- Schlumberger Universe of Smart Cards
- Smart card readers, tools, SDK's.
- SCM Microsystems - Products
- Smart card readers, writers, and interface products.
- SGS-Thomson Smartcard Products
- Smart card information and data sheets.
- Siemens Smart Card Integrated Circuits
- No technical information, unfortunately.
- SJB Research: Smart card news. As it happens. Every business day.
- Live smart card newsfeed.
- SIM-R/W 2x for GSM SIM Card BackUp
- SIM reader/writer.
- Smart Cards: A Case Study
- IBM Redbook case study on smart cards.
- Smart Card Cyber Show
- Smart card news, trade information, vendors, and projects.
- Smart Card Developer's Kit
- Home page for the book, as well as individual card sales, ATR catalogue, and pointers to smart card info.
- Smart Card Forum Home page
- Nonprofit group promoting smart card use.
- Smart Card Industry Association Website
- Smart card info, product links, news.
- Smart Card News
- Smart card publicatiosn, technology, and information.
- Smart Card Reader/Writer
- Card readers/writers/PINPads.
- Smart Card Resource Center
- Links to chip manufacturers, companies, conferences, mag cards, readers, RF cards, and other smart-card related information.
- Smart Card Web Server
- Web server running on a Cyberflex smart card.
- Smartcard Information Page
- Smart card information, card types, and links to manufacturers.
- Smartcard Security Information Page
- Smartcard security news, standards, attacks, and links.
- Smartcard Technology Ltd.
- Card readers, POS terminals.
- Smart Dynamics, LLC -- Software Products
- Smart card interface tools for various environments and languages.
- Smart Semiconductor Search
- Search engine which links to most major embedded semi vendors.
- Smartcards and other cards
- Links to smart cards, memory cards, smart card readers, mag cards and barcode cards.
- ST - Products
- STMicroelectronics smart card chips.
- Telecard Mapping Home Page
- Info on reading/decoding phone cards.
- The Smart Card Forum
- General information on smart cards.
- Thyron's Products Page
- Smart cards, terminals, security software.
- TOWITOKO homepage
- Smart card readers.
- Tritheim Technologies
- Smart card readers and writers.
- UNIPROG Universalprogrammer
- CCC universal smart card programmer.
- Versatile Card Technology - Products
- Card manufacturers.
- Who?Vision
- Smart cards, keyboards, and card readers with fingerprint readers.
- Xicor Inc.
- EEPROM's, smart cards, flash memories.
- ZeitControl Cardsystems
- Mag and smart cards, card readers, contactless cards.
- Zmit's Telecard Page
- Information on phone cards, readers, interface software.
Snake Oil
- Proprietary guaranteed unbreakable crypto we invented this morning in the shower. Note that many of these links tend to fade away fairly quickly (probably because the companies don't stay in business long), they've been left intact for the amusement value.
- The Seven Warning Signs of Bogus Science
- Article from the Chronicle which is also appropriate for detecting snake oil crypto.
- Advacrypt
- "AdvaCrypt is one of the most powerful encryption technologies" using "non-logical encryption", but it's difficult to assess because "AdvaCrypt has no documents".
- AGS Encryptions Ltd. Security for Non-Specific Threat Scenarios
- Security through, uhh, "At-Will Intractability Up to Plaintext Equivocation Achieved via a Cryptographic Key Made as Small, or as Large as Desired - Without Computational Penalty".
- Arcot Systems, Inc.
- Security product which functions by redefining reality to be what they want it to be, then solving a (somewhat minor) problem based on their reality rather than our one.
- Arithmetica Home Page
- "Our revolutionary discovery of zeta one-way functions and group theory one-way functions redefine the parameters of next generation encryption technology"... "For example, a 1024 bit key based on the product of two 512 digit primes could be broken with 2^32 calculations. The world's fastest computers can now operate at 2^40 calculations per second". The algorithm isn't snake oil, but the web pages go to show why you have anything prepared by marketing people checked before it's released.
- Asier Technology Corporation
- "With existing linear systems the time to compromise data [...]" (apparently 3DES and AES are linear) "Asier has the largest known key-space in the cryptographic industry. Asier is not a block cipher, does not use elliptical curves, does not use prime numbers or factoring, is not deterministic, is not linea "
- ASK ToolKit Home Page
- "not an encryption algorithm, but an accessory that can enhance and simplify any symmetric encryption algorithm". Apparently it's a keyed RNG, and you're expected to pay for this (presumably the extensive use of buzzwords adds value).
- Biopassword Product
- "Uses a patented proprietary algorithm" (make up your mind, which is it?)..."currently there is no competition for BioPassword(tm) due to the proprietary nature of the algorithm"... either they have their dates wrong or this thing has been in beta for over 10 years. From the people who brought you NetNanny censorware.
- Black Leopard Systems of Canada
- "offers the most sophisticated data security encryption system available today"... "371200 bit encryption with up to 140 levels of access, 18 encryption key formats, and up to 10 encryption algorithms"... "this proprietary system delivers a unique solution for each user with a duplicate system occurring only once in every 600,000,000 Black Leopard Encryption systems at this time".
- Bodacion Technologies
- "HYDRA defeats all known network penetration attacks. HYDRA is unhackable and virus-proof [...] and offers advanced security based on biomorphic mathematics".
- Cennoid Encryption
- "provides unique, very efficient, non-algorithmic based encryption".
- Chantilley Products
- "the fastest and strongest cipher of its kind in the world" ... "Professional and Diplomatic Solar Cipher"... "The best Pseudo Random Number Generator ever" (in mid-2001 these guys made a bid to take over Baltimore, which is a bit like the Cook Islands making a bid to take over the USA).
- Ciphile Software
- "Absolute online privacy - Level 3(tm)(c)(patent pending)" - "the best encryption software available today" - "unbreakable".
- Control Communications Systems
- "Absolute security - a morphing encryption rate of at least 20 kilobytes"..."will protect your data from the most sophisticated decryption systems that exist now or are likely to exist for years to come".
- CyberEncode.com Encryption Software and Technology
- "Possibly the world's fastest and most secure encryption algorithms"... "This new encryption is an amazing accomplishment. Cypher Mind had to be re-programmed over 10 times". This site has an entire suite of snake oil algorithms.
- Crypto98 beta
- Proof that you can do snake oil in QuickBasic as well as C ("it works by generating permutations").
- Crypt-o-Text
- Not the usual snake oil, but there's a program available (CrackCot) which breaks it.
- Cryptor Homepage
- Cellular-automata-based OS/2 file encryption.
- Crypto.Com
- "Crypto.Com's cryptology provides the theoretically ultimate encryption security [...] Crypto.com's advanced VYN algorithmic system has been evaluated by leading scientists and mathematicians".
- Cybank
- "Maximum security encryption... we use our own snake oil because public-key encryption has been proven to be insecure".
- CyberAngel EXR - Product Information
- Crypto using Blowfish or DES, but it transmits your password to a monitoring center in the US (this isn't snake oil in the usual sense but... sheesh).
- Cygnaworks - Products
- "offers security through its use of values derived from the installed hardware resident on the computer"..."examines a defined set of hardware on a computer with proprietary algorithms developed by Cygnaworx to create a unique Flexible Digital Signature (FDS)" (makes invalidating your signature as simple as getting a new hard drive or a motherboard upgrade).
- DataCloak
- "Uses a unique encryption process"... "the 4-cycle data stream encryption process".
- Data Protect: DaProMas
- Online banking fully protected by GSM security (that's the same GSM security which was broken in early 1998, and which (when not broken) at best offers you 54-bit crypto broadcast over the air where anyone can get it).
- Data Protect
- Self-proclaimed leading security expert Kimble analyses your security problems.
- DataTech Systems - Home Page
- Software which is "ABSOLUTELY IMPOSSIBLE TO CRACK. This can be proved as never has a file that has been encrypted... been cracked, even with utilising some of the best cryptographers living" [sic].
- DESkey - software protection devices, license management and encryption technology.
- Call your company "Data Encryption Systems" and you get to name your products DESkey, DESlock, etc (any relationship to any other algorithm called DES is purely coincidental).
- E-crypt Encryption
- "*the* revolutionary software package that allows for the secure exchange of email" (uses monoalphabetic substitution).
- Encryption Encryption Encryption
- "Don't be fooled by imitations - - this is the true CRYP program" - you'd want to *imitate* this thing?
- Encryption Plus
- "bitwise exclusive OR encryption" with a password... "virtually impregnable".
- Encryption provides benefits and risks
- "it has been mathematically proven that only a brute-force attack can break encryption"... "a Cray can break a 128-bit key in two days"..."perhaps passing an electric current through a leaf will solve the problem" (or you could smoke it and then write a crypto article).
- Encryption Software - Great Encryption
- The program is fast for its strength encrypting about 5,000 plaintext characters/second on an average PC). [...] The ciphertext produced is an elegant mix of 100 different cipher characters in an unbroken string.
- Encryption Techniques
- "RBackup's archives are virtually impenetrable"..."If someone does manage to crack RBackup's encryption scheme, we will immediately plug in one of six others we have ready to go"..."[a DES-encrypted message] was decoded using two banks of 120 extremely high-speed 32-bit Sparc workstations connected to two supercomputers running 24 hours a day for eight days".
- Encryptor 4.0 The Ultimate in Securing Files On Your Computer
- "uses a revolutionary newly discovered incremental base shift algorithm that makes unauthorised decryption of your files near impossible".
- Enigma-7 Windows Superencryption Software
- "The most powerful Windows encryption software available".
- Enigma 2000
- "Protect your information with a 4.5Mbit key [...] This is not a mathematical algorithm. Enigma 2000 uses an extended polyalphabetic cipher. [...] A further advantage is present in the key exchange process, which is handled by a simple password, allowing an encryption depth of up to 1.536 bits"
- Evolv - Skipjack IC Info & Pricing
- Encryption using "proprietary artificial intelligence engines", "light years beyond the security level offerend by any other encryption method". Incidentally, this Skipjack has nothing in common (apart from the name) with the USG's Skipjack.