Difference between revisions 123927141 and 123927143 on dewiki

{{cleanup|date=December 2010}}
{{DISPLAYTITLE:_NSAKEY}}
'''_NSAKEY''' was a [[variable (computer science)|variable]] name discovered in [[Windows NT 4]] [[Windows_NT_4.0#Service_Packs|Service Pack]] 5 (which had been released unstripped of its [[Debug symbol|symbolic debugging]] data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit [[public key]].

== Overview ==
(contracted; show full)ram that replaces the NSA key can be found on Cryptonym's website.<ref>{{cite web |title=Microsoft, the NSA, and You |publisher=Cryptonym |date=1999-08-31 |url=http://www.cryptonym.com/hottopics/msft-nsa/msft-nsa.html  |accessdate=2007-01-07 |archiveurl = http://web.archive.org/web/20001109204800/http://www.cryptonym.com/hottopics/msft-nsa/msft-nsa.html |archivedate = 9 November 2000}} ([[Internet Archive]] / [[Internet Archive#Wayback Machine|Wayback Machine]])</ref> </blockquote>


_NSAKEY ,_KEY2 or other _CTkeys  can be eliminated by using Linux or other [[Free and open source software|free OS]].

== CAPI Signature Public Keys as PGP Keys ==
In September 1999, an anonymous researcher reverse-engineered both the
primary key and the _NSAKEY into PGP-compatible format and published them
to the [[key server (cryptographic)|key server]]s.<ref>{{cite web |title=The reverse-engineered keys |publisher=Cypherspace |date=1999-09-06 |url=http://cypherspace.org/adam/hacks/ms-nsa-key.html |accessdate=2007-01-07}}</ref>

=== Microsoft's Primary (_KEY variable) CAPI Signature Key ===
<pre>
(contracted; show full)[[Category:Microsoft criticisms and controversies]]
[[Category:History of cryptography]]
[[Category:Conspiracy theories]]
[[Category:National Security Agency]]
[[Category:Microsoft Windows security technology]]

[[fr:NSAKEY]]
[[ru:NSAKEY]]