794:
255:
77:
140:
36:
893:
854:
353:: The protection resulting from all measures taken to deny unauthorized persons information of value that might be derived from communications systems and cryptographic equipment intercepts and the interception and analysis of compromising emanations from cryptographic equipment, information systems, and telecommunications systems.
566:
CT3 with DTD software is in a fielded, ruggedized hand-held device that handles, views, stores, and loads SOI, Key, and electronic protection data. DTD provides an improved net-control device to automate crypto-net control operations for communications networks employing electronically keyed COMSEC
579:
KMI is intended to replace the legacy
Electronic Key Management System to provide a means for securely ordering, generating, producing, distributing, managing, and auditing cryptographic products (e.g., asymmetric keys, symmetric keys, manual cryptographic systems, and cryptographic applications).
545:(NSA) established the EKMS program to supply electronic key to COMSEC devices in securely and timely manner, and to provide COMSEC managers with an automated system capable of ordering, generation, production, distribution, storage, security accounting, and access control.
897:
858:
903:
563:
portion of AKMS. ACES has been designated by the
Military Communications Electronics Board as the joint standard for use by all services in development of frequency management and crypto-net planning.
672:
362:: The component of communications security that results from the application of measures designed to protect transmissions from interception and exploitation by means other than
518:
Crypto-ancillary equipment: Equipment designed specifically to facilitate efficient or reliable operation of crypto-equipment, without performing cryptographic functions itself.
661:
87:
886:
548:
The Army's platform in the four-tiered EKMS, AKMS, automates frequency management and COMSEC management operations. It eliminates paper keying material, hardcopy
609:
594:
773:
157:
49:
556:
LCMS provides automation for the detailed accounting required for every COMSEC account, and electronic key generation and distribution capability.
742:
815:
934:
908:
538:
945:
916:
283:
204:
313:
networks, including voice, video, and data. It is used for both analog and digital applications, and both wired and wireless links.
837:
676:
241:
223:
176:
121:
63:
580:
This system is currently being fielded by Major
Commands and variants will be required for non-DoD Agencies with a COMSEC Mission.
982:
534:
987:
869:
183:
951:
863:
291:
258:
161:
549:
476:
408:
190:
99:
55:
992:
808:
802:
103:
172:
150:
500:
321:
819:
542:
310:
286:
culture, including United States
Department of Defense culture, it is often referred to by the abbreviation
614:
302:
270:
719:
977:
446:
357:
570:
SKL is a hand-held PDA that handles, views, stores, and loads SOI, Key, and electronic protection data.
515:
logic or performs one or more cryptographic functions (key generation, encryption, and authentication).
634:
629:
599:
488:
197:
946:
https://web.archive.org/web/20121002192433/http://www.dtic.mil/whs/directives/corres/pdf/466002p.pdf
472:
TSEC โ Telecommunications
Security (sometimes referred to in error transmission security or TRANSEC)
624:
604:
560:
749:
348:
276:
340:: The component of communications security that results from the provision of technically sound
552:(SOI) and saves the time and resources required for courier distribution. It has 4 components:
938:
767:
619:
381:
367:
295:
639:
262:
923:
254:
589:
371:
320:
has become the de facto standard for securing voice communication, replacing the need for
662:"AIR FORCE AIR INTELLIGENCE, SURVEILLANCE AND RECONNAISSANCE AGENCY INSTRUCTION 33-203"
385:
344:
and their proper use. This includes ensuring message confidentiality and authenticity.
541:(DoD) key management, COMSEC material distribution, and logistics support system. The
971:
512:
363:
279:
in an intelligible form, while still delivering content to the intended recipients.
955:
917:"INFORMATION SECURITY GUIDELINES FOR THE DEPLOYMENT OF DEPLOYABLE SWITCHED SYSTEMS"
873:
341:
306:
879:
139:
521:
Crypto-production equipment: Equipment used to produce or load keying material
427:
482:
418:
325:
384:
necessary to safeguard classified equipment, material, and documents from
937:. U.S. ARMY SIGNAL CENTER AND FORT GORDON. April 17, 2000. Archived from
275:
is the discipline of preventing unauthorized interceptors from accessing
962:
493:
17:
460:
454:
317:
253:
380:: The component of communications security that results from all
423:
ICOM โ Integrated COMSEC, e.g. a radio with built in encryption
787:
673:
Air Force
Intelligence, Surveillance and Reconnaissance Agency
669:
The Air Force ISR Agency
Tempest and Emission Security Program
133:
70:
29:
86:
deal primarily with the United States and do not represent a
433:
TED โ Trunk
Encryption Device such as the WALBURN/KG family
720:"FY20 DOD PROGRAMS โ Key Management Infrastructure (KMI)"
388:
thereto or observation thereof by unauthorized persons.
95:
954:. Project Manager NETOPS Current Force. Archived from
935:"Communications Security (COMSEC) awareness training"
414:
298:
of COMSEC equipment and associated keying material.
164:. Unsourced material may be challenged and removed.
411:- equipment which contains COMSEC embedded devices
922:. Joint Staff. February 1, 2001. Archived from
887:National Information Systems Security Glossary
511:Crypto equipment: Any equipment that embodies
290:. The field includes cryptographic security,
84:The examples and perspective in this article
8:
324:(STE) in much of NATO, including the U.S.A.
904:Dictionary of Military and Associated Terms
610:List of telecommunications encryption terms
595:Electronics technician (United States Navy)
575:Key Management Infrastructure (KMI) Program
64:Learn how and when to remove these messages
496:โ (obsolete secure phone, replaced by STE)
838:Learn how and when to remove this message
242:Learn how and when to remove this message
224:Learn how and when to remove this message
122:Learn how and when to remove this message
801:This article includes a list of general
650:
451:LCMS โ Local COMSEC Management Software
772:: CS1 maint: archived copy as title (
765:
398:AKMS โ the Army Key Management System
7:
952:"Army Key Management Systems (AKMS)"
656:
654:
529:DoD Electronic Key Management System
316:Voice over secure internet protocol
162:adding citations to reliable sources
909:United States Department of Defense
539:United States Department of Defense
466:KYX-15 โ Electronic Transfer Device
807:it lacks sufficient corresponding
469:KG-30 โ family of COMSEC equipment
284:North Atlantic Treaty Organization
25:
328:moved entirely to VOSIP in 2008.
45:This article has multiple issues.
896: This article incorporates
891:
857: This article incorporates
852:
792:
535:Electronic Key Management System
401:AEK โ Algorithmic Encryption Key
138:
75:
34:
27:Discipline of telecommunications
870:General Services Administration
301:COMSEC is used to protect both
149:needs additional citations for
53:or discuss these issues on the
675:. May 25, 2011. Archived from
1:
550:Signal operating instructions
477:Signal operating instructions
463:โ Tape Reader General Purpose
409:Controlled Cryptographic Item
457:โ Electronic Transfer Device
507:Types of COMSEC equipment:
98:, discuss the issue on the
1009:
524:Authentication equipment:
501:Secure Terminal Equipment
322:Secure Terminal Equipment
294:, emissions security and
173:"Communications security"
543:National Security Agency
439:KPK โ Key production key
436:KEK โ Key Encryption Key
983:Military communications
822:more precise citations.
442:OWK โ Over the Wire Key
311:military communications
988:Military radio systems
958:on September 30, 2010.
929:on September 16, 2012.
898:public domain material
865:Federal Standard 1037C
859:public domain material
700:USCENTCOM PL 117-02-1.
615:NSA encryption systems
338:Cryptographic security
266:
963:Cryptography machines
878: (in support of
447:Over the Air Rekeying
358:Transmission security
292:transmission security
257:
635:Signals intelligence
630:Secure communication
600:Information security
561:frequency management
489:Two person integrity
419:Data Transfer Device
158:improve this article
104:create a new article
96:improve this article
682:on October 20, 2013
625:Operations security
605:Information warfare
404:CT3 โ Common Tier 3
993:Encryption devices
941:on March 30, 2009.
277:telecommunications
267:
848:
847:
840:
620:NSA product types
483:Simple Key Loader
382:physical measures
378:Physical security
368:frequency hopping
349:Emission security
296:physical security
252:
251:
244:
234:
233:
226:
208:
132:
131:
124:
106:, as appropriate.
68:
16:(Redirected from
1000:
959:
942:
930:
928:
921:
912:
895:
894:
883:
877:
872:. Archived from
856:
855:
843:
836:
832:
829:
823:
818:this article by
809:inline citations
796:
795:
788:
778:
777:
771:
763:
761:
760:
754:
748:. Archived from
747:
739:
733:
732:
730:
729:
724:
716:
710:
707:
701:
698:
692:
691:
689:
687:
681:
666:
658:
640:Traffic analysis
263:voice encryption
259:PRC-77 VHF radio
247:
240:
229:
222:
218:
215:
209:
207:
166:
142:
134:
127:
120:
116:
113:
107:
79:
78:
71:
60:
38:
37:
30:
21:
1008:
1007:
1003:
1002:
1001:
999:
998:
997:
968:
967:
950:
933:
926:
919:
915:
901:
892:
862:
853:
851:
844:
833:
827:
824:
814:Please help to
813:
797:
793:
786:
781:
764:
758:
756:
752:
745:
743:"Archived copy"
741:
740:
736:
727:
725:
722:
718:
717:
713:
708:
704:
699:
695:
685:
683:
679:
664:
660:
659:
652:
648:
590:Dynamic secrets
586:
577:
531:
395:
372:spread spectrum
334:
248:
237:
236:
235:
230:
219:
213:
210:
167:
165:
155:
143:
128:
117:
111:
108:
93:
80:
76:
39:
35:
28:
23:
22:
15:
12:
11:
5:
1006:
1004:
996:
995:
990:
985:
980:
970:
969:
966:
965:
960:
948:
943:
931:
913:
889:
884:
876:on 2022-01-22.
846:
845:
800:
798:
791:
785:
784:External links
782:
780:
779:
734:
711:
702:
693:
649:
647:
644:
643:
642:
637:
632:
627:
622:
617:
612:
607:
602:
597:
592:
585:
582:
576:
573:
572:
571:
568:
564:
557:
530:
527:
526:
525:
522:
519:
516:
505:
504:
503:(secure phone)
497:
491:
485:
479:
473:
470:
467:
464:
458:
452:
449:
443:
440:
437:
434:
431:
426:TEK โ Traffic
424:
421:
415:
412:
405:
402:
399:
394:
391:
390:
389:
375:
354:
345:
333:
330:
271:Communications
250:
249:
232:
231:
146:
144:
137:
130:
129:
90:of the subject
88:worldwide view
83:
81:
74:
69:
43:
42:
40:
33:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
1005:
994:
991:
989:
986:
984:
981:
979:
976:
975:
973:
964:
961:
957:
953:
949:
947:
944:
940:
936:
932:
925:
918:
914:
910:
906:
905:
899:
890:
888:
885:
881:
875:
871:
867:
866:
860:
850:
849:
842:
839:
831:
821:
817:
811:
810:
804:
799:
790:
789:
783:
775:
769:
755:on 2016-09-17
751:
744:
738:
735:
721:
715:
712:
706:
703:
697:
694:
678:
674:
670:
663:
657:
655:
651:
645:
641:
638:
636:
633:
631:
628:
626:
623:
621:
618:
616:
613:
611:
608:
606:
603:
601:
598:
596:
593:
591:
588:
587:
583:
581:
574:
569:
565:
562:
558:
555:
554:
553:
551:
546:
544:
540:
536:
528:
523:
520:
517:
514:
513:cryptographic
510:
509:
508:
502:
498:
495:
492:
490:
486:
484:
480:
478:
474:
471:
468:
465:
462:
459:
456:
453:
450:
448:
444:
441:
438:
435:
432:
429:
425:
422:
420:
416:
413:
410:
406:
403:
400:
397:
396:
393:Related terms
392:
387:
383:
379:
376:
373:
369:
365:
364:cryptanalysis
361:
359:
355:
352:
350:
346:
343:
342:cryptosystems
339:
336:
335:
331:
329:
327:
323:
319:
314:
312:
308:
304:
299:
297:
293:
289:
285:
280:
278:
274:
272:
264:
261:with digital
260:
256:
246:
243:
228:
225:
217:
206:
203:
199:
196:
192:
189:
185:
182:
178:
175: โ
174:
170:
169:Find sources:
163:
159:
153:
152:
147:This article
145:
141:
136:
135:
126:
123:
115:
105:
101:
97:
91:
89:
82:
73:
72:
67:
65:
58:
57:
52:
51:
46:
41:
32:
31:
19:
978:Cryptography
956:the original
939:the original
924:the original
902:
874:the original
864:
834:
825:
806:
757:. Retrieved
750:the original
737:
726:. Retrieved
714:
705:
696:
684:. Retrieved
677:the original
668:
578:
559:ACES is the
547:
537:(EKMS) is a
532:
506:
377:
356:
347:
337:
315:
307:unclassified
300:
287:
281:
269:
268:
238:
220:
211:
201:
194:
187:
180:
168:
156:Please help
151:verification
148:
118:
109:
85:
61:
54:
48:
47:Please help
44:
880:MIL-STD-188
820:introducing
332:Specialties
309:traffic on
972:Categories
803:references
759:2016-09-16
728:2023-08-21
709:INFOSEC-99
686:October 3,
646:References
567:equipment.
428:Encryption
303:classified
184:newspapers
112:March 2014
50:improve it
828:July 2010
360:(TRANSEC)
326:USCENTCOM
100:talk page
56:talk page
768:cite web
584:See also
273:security
214:May 2023
94:You may
816:improve
494:STU-III
445:OTAR โ
351:(EMSEC)
282:In the
198:scholar
805:, but
499:STE โ
487:TPI โ
481:SKL โ
475:SOI โ
461:KOI-18
455:KYK-13
417:DTD โ
407:CCI โ
386:access
366:(e.g.
288:COMSEC
265:device
200:
193:
186:
179:
171:
18:COMSEC
927:(PDF)
920:(PDF)
900:from
861:from
753:(PDF)
746:(PDF)
723:(PDF)
680:(PDF)
665:(PDF)
318:VOSIP
205:JSTOR
191:books
102:, or
774:link
688:2015
533:The
370:and
305:and
177:news
430:Key
160:by
974::
907:.
882:).
868:.
770:}}
766:{{
671:.
667:.
653:^
374:).
59:.
911:.
841:)
835:(
830:)
826:(
812:.
776:)
762:.
731:.
690:.
245:)
239:(
227:)
221:(
216:)
212:(
202:ยท
195:ยท
188:ยท
181:ยท
154:.
125:)
119:(
114:)
110:(
92:.
66:)
62:(
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.