INTRODUCTION
COMMUNICATIONS SECURITY
( C O M S E C )
The National Security Agency (NSA)
Classifying Crypto
(P.2) Classifying Crypto
Cryptography
Encryption Methods
Data Encryption
Advanced Encryption Standard
High Assurance Internet Protocol Encryption
Secure Voice
Secure Communications Interoperability Protocol
Voice Over Internet Protocol
Trunk Encryption
CRYPTOGRAPHIC EQUIPMENT
KG-175D
lightweight, ruggedized, encryption device that is ideal for both tactical and strategic environments. It provides end-to-end encryption for IPv4/IPv6 networks such as NIPR/SIPR/VoIP/VoSIP using HAIPE keying and providing 200 Mb/s throughput.
KIV-7/M
KY-99A
Fill Devices
PYQ-10
KIK-30
The KIK-30 Really Simple Key Loader (RASKL) is a user-friendly, ruggedized, handheld fill device approved by the NSA for the distribution of Type 1 cryptographic keys. It can store and transfer related communications security material, including control data (“load sets”) for frequency hopping radios, such as SINCGARS and Have Quick. It replaces legacy fill devices (i.e KIK-13), is small, lightweight, and can store up to 40 cryptographic keys. Most all NSA devices can use the KIK-30.
KVL
The Key Variable Loader (KVL) 3000 Plus (Figure 1-18) is a device for loading cryptographic material (key variables) into a series of Motorola brand two-way radios, commonly referred to as Land Mobile Radios (LMRs). The system uses a variety of cryptographic algorithms and is compatible with a variety of radios. The KVL generally uses a proprietary data protocol for transferring keys to the radio. Additionally, the device is equipped with a matrix display (bitmap), allowing icons and graphics to be displayed. It has the capability to store up to 1024 keys.
SUMMARY
Knowing how to properly load and operate crypto equipment will be an important part of getting communications up and running whether you are maintaining a mission at home-station or deployed. These examples of voice, data, and trunk methods and equipment give a little more insight into what is becoming an integral part of the role you play in cyberspace support.