STU-I Secure telephone This article is about a secure telephone. For Stu as a common name, see Stuart (disambiguation). For other uses, see STU (disambiguation). STU-I secure telephone desk set. Electronics were housed in a separate cabinet. The STU-I, like its successors sometimes known as a "stew phone", was a secure telephone developed by the U.S. National Security Agency for use by senior U.S. government officials in the 1970s.[1] STU-I cabinet with desk set on top. The person talking is U.N. Ambassador Andrew Young, calling from New York City during the Israel-Egypt peace talks in the Carter administration. STU-I cabinet front door open. See also[edit] KY-3 Navajo I STU-II STU-III SCIP References[edit] ^ "STU-I Secure Phone". www.cryptomuseum.com. Retrieved 2022-09-17. External links[edit] Crypto Museum - STU I Delusion.org - National Cryptologic Museum pictures vteCipher machinesRotor machines CCM Enigma M-125 Fialka Hebern HX-63 KL-7 Lacida M-325 Mercury NEMA OMI RED SG-39 SG-41 SIGABA SIGCUM Singlet Typex Mechanical Bazeries cylinder C-36 C-52 CD-57 Cipher disk HC-9 Kryha Jefferson disk M-94 M-209 Reihenschieber Scytale Teleprinter 5-UCO BID 770 DUDEK KW-26 KW-37 Lorenz SZ 40/42 Siemens and Halske T52 SIGTOT Secure voice BID 150 FASCINATOR KY-3 KY-58 KY-68 NESTOR OMNI SCIP Sectéra Secure Module SIGSALY STE STU-II STU-III VINSON Other JADE KG-84 KL-43 KL-51 Noreen Red Purple Pinwheel Rockex In Computer Hardware AES instruction set Intel SHA extensions IBM 4758 IBM 4764 vteCryptographyGeneral History of cryptography Outline of cryptography Cryptographic protocol Authentication protocol Cryptographic primitive Cryptanalysis Cryptocurrency Cryptosystem Cryptographic nonce Cryptovirology Hash function Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching Keygen Cryptojacking malware Ransomware Random number generation Cryptographically secure pseudorandom number generator (CSPRNG) Pseudorandom noise (PRN) Secure channel Insecure channel Subliminal channel Encryption Decryption End-to-end encryption Harvest now, decrypt later Information-theoretic security Plaintext Codetext Ciphertext Shared secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network Mathematics Cryptographic hash function Block cipher Stream cipher Symmetric-key algorithm Authenticated encryption Public-key cryptography Quantum key distribution Quantum cryptography Post-quantum cryptography Message authentication code Random numbers Steganography Category vteNational Security AgencyLocations Alaska Mission Operations Center Colorado Cryptologic Center Consolidated Intelligence Center CSSG Dorsey Road European Cryptologic Center European Technical Center Fort Meade Friendship Annex Georgia Cryptologic Center Hawaii Cryptologic Center Interagency Training Center Kent Island Misawa Security Operations Center Multiprogram Research Facility Pine Gap RAF Menwith Hill Roaring Creek Room 641A Salt Creek Sugar Grove Texas Cryptologic Center Utah Data Center Pacific Technical Center Leaders Ralph Canine John A. Samford Laurence Hugh Frost Gordon Blake Marshall Carter Noel Gayler Samuel C. Phillips Lew Allen Bobby Ray Inman Lincoln D. Faurer William Eldridge Odom Bill Studeman John Michael McConnell Kenneth Minihan Michael Hayden Keith B. Alexander Michael S. Rogers Paul Nakasone Divisions CSS Information Warfare Support Center ROC Special Collection Service SSO TAO NTOC NSOC Technology ANT catalog FROSTBURG HARVEST Secure Terminal Equipment (STE) STU-I STU-II STU-III WARRIOR PRIDE Controversy Global surveillance disclosures (2013–present) Church Committee Edward Snowden LOVEINT James Bamford NSA warrantless surveillance controversy Pike Committee Russ Tice Thomas Andrews Drake Thomas Tamm Matthew Aid Programs Boundless Informant Dropmire ECHELON Fairview Insider Threat Program MUSCULAR MYSTIC PRISM Real Time Regional Gateway Stellar Wind TRAILBLAZER Turbulence Upstream XKeyscore Epic Shelter Databases DISHFIRE Interquake Main Core MAINWAY MARINA Nymrod PINWALE Other Dundee Society Institute for Defense Analyses National Cryptologic Museum National Cryptologic School National Vigilance Park NSA Hall of Honor VENONA Vulnerabilities Equities Process Zendian Problem This cryptography-related article is a stub. You can help Wikipedia by expanding it.vte This article related to telephony is a stub. You can help Wikipedia by expanding it.vte