Knowledge (XXG)

Communications security

Source ๐Ÿ“

794: 255: 77: 140: 36: 893: 854: 353:: The protection resulting from all measures taken to deny unauthorized persons information of value that might be derived from communications systems and cryptographic equipment intercepts and the interception and analysis of compromising emanations from cryptographic equipment, information systems, and telecommunications systems. 566:
CT3 with DTD software is in a fielded, ruggedized hand-held device that handles, views, stores, and loads SOI, Key, and electronic protection data. DTD provides an improved net-control device to automate crypto-net control operations for communications networks employing electronically keyed COMSEC
579:
KMI is intended to replace the legacy Electronic Key Management System to provide a means for securely ordering, generating, producing, distributing, managing, and auditing cryptographic products (e.g., asymmetric keys, symmetric keys, manual cryptographic systems, and cryptographic applications).
545:(NSA) established the EKMS program to supply electronic key to COMSEC devices in securely and timely manner, and to provide COMSEC managers with an automated system capable of ordering, generation, production, distribution, storage, security accounting, and access control. 897: 858: 903: 563:
portion of AKMS. ACES has been designated by the Military Communications Electronics Board as the joint standard for use by all services in development of frequency management and crypto-net planning.
672: 362:: The component of communications security that results from the application of measures designed to protect transmissions from interception and exploitation by means other than 518:
Crypto-ancillary equipment: Equipment designed specifically to facilitate efficient or reliable operation of crypto-equipment, without performing cryptographic functions itself.
661: 87: 886: 548:
The Army's platform in the four-tiered EKMS, AKMS, automates frequency management and COMSEC management operations. It eliminates paper keying material, hardcopy
609: 594: 773: 157: 49: 556:
LCMS provides automation for the detailed accounting required for every COMSEC account, and electronic key generation and distribution capability.
742: 815: 934: 908: 538: 945: 916: 283: 204: 313:
networks, including voice, video, and data. It is used for both analog and digital applications, and both wired and wireless links.
837: 676: 241: 223: 176: 121: 63: 580:
This system is currently being fielded by Major Commands and variants will be required for non-DoD Agencies with a COMSEC Mission.
982: 534: 987: 869: 183: 951: 863: 291: 258: 161: 549: 476: 408: 190: 99: 55: 992: 808: 802: 103: 172: 150: 500: 321: 819: 542: 310: 286:
culture, including United States Department of Defense culture, it is often referred to by the abbreviation
614: 302: 270: 719: 977: 446: 357: 570:
SKL is a hand-held PDA that handles, views, stores, and loads SOI, Key, and electronic protection data.
515:
logic or performs one or more cryptographic functions (key generation, encryption, and authentication).
634: 629: 599: 488: 197: 946:
https://web.archive.org/web/20121002192433/http://www.dtic.mil/whs/directives/corres/pdf/466002p.pdf
472:
TSEC โ€“ Telecommunications Security (sometimes referred to in error transmission security or TRANSEC)
624: 604: 560: 749: 348: 276: 340:: The component of communications security that results from the provision of technically sound 552:(SOI) and saves the time and resources required for courier distribution. It has 4 components: 938: 767: 619: 381: 367: 295: 639: 262: 923: 254: 589: 371: 320:
has become the de facto standard for securing voice communication, replacing the need for
662:"AIR FORCE AIR INTELLIGENCE, SURVEILLANCE AND RECONNAISSANCE AGENCY INSTRUCTION 33-203" 385: 344:
and their proper use. This includes ensuring message confidentiality and authenticity.
541:(DoD) key management, COMSEC material distribution, and logistics support system. The 971: 512: 363: 279:
in an intelligible form, while still delivering content to the intended recipients.
955: 917:"INFORMATION SECURITY GUIDELINES FOR THE DEPLOYMENT OF DEPLOYABLE SWITCHED SYSTEMS" 873: 341: 306: 879: 139: 521:
Crypto-production equipment: Equipment used to produce or load keying material
427: 482: 418: 325: 384:
necessary to safeguard classified equipment, material, and documents from
937:. U.S. ARMY SIGNAL CENTER AND FORT GORDON. April 17, 2000. Archived from 275:
is the discipline of preventing unauthorized interceptors from accessing
962: 493: 17: 460: 454: 317: 253: 380:: The component of communications security that results from all 423:
ICOM โ€“ Integrated COMSEC, e.g. a radio with built in encryption
787: 673:
Air Force Intelligence, Surveillance and Reconnaissance Agency
669:
The Air Force ISR Agency Tempest and Emission Security Program
133: 70: 29: 86:
deal primarily with the United States and do not represent a
433:
TED โ€“ Trunk Encryption Device such as the WALBURN/KG family
720:"FY20 DOD PROGRAMS โ€“ Key Management Infrastructure (KMI)" 388:
thereto or observation thereof by unauthorized persons.
95: 954:. Project Manager NETOPS Current Force. Archived from 935:"Communications Security (COMSEC) awareness training" 414:
ACES โ€“ Automated Communications Engineering Software
298:
of COMSEC equipment and associated keying material.
164:. Unsourced material may be challenged and removed. 411:- equipment which contains COMSEC embedded devices 922:. Joint Staff. February 1, 2001. Archived from 887:National Information Systems Security Glossary 511:Crypto equipment: Any equipment that embodies 290:. The field includes cryptographic security, 84:The examples and perspective in this article 8: 324:(STE) in much of NATO, including the U.S.A. 904:Dictionary of Military and Associated Terms 610:List of telecommunications encryption terms 595:Electronics technician (United States Navy) 575:Key Management Infrastructure (KMI) Program 64:Learn how and when to remove these messages 496:โ€“ (obsolete secure phone, replaced by STE) 838:Learn how and when to remove this message 242:Learn how and when to remove this message 224:Learn how and when to remove this message 122:Learn how and when to remove this message 801:This article includes a list of general 650: 451:LCMS โ€“ Local COMSEC Management Software 772:: CS1 maint: archived copy as title ( 765: 398:AKMS โ€“ the Army Key Management System 7: 952:"Army Key Management Systems (AKMS)" 656: 654: 529:DoD Electronic Key Management System 316:Voice over secure internet protocol 162:adding citations to reliable sources 909:United States Department of Defense 539:United States Department of Defense 466:KYX-15 โ€“ Electronic Transfer Device 807:it lacks sufficient corresponding 469:KG-30 โ€“ family of COMSEC equipment 284:North Atlantic Treaty Organization 25: 328:moved entirely to VOSIP in 2008. 45:This article has multiple issues. 896: This article incorporates 891: 857: This article incorporates 852: 792: 535:Electronic Key Management System 401:AEK โ€“ Algorithmic Encryption Key 138: 75: 34: 27:Discipline of telecommunications 870:General Services Administration 301:COMSEC is used to protect both 149:needs additional citations for 53:or discuss these issues on the 675:. May 25, 2011. Archived from 1: 550:Signal operating instructions 477:Signal operating instructions 463:โ€“ Tape Reader General Purpose 409:Controlled Cryptographic Item 457:โ€“ Electronic Transfer Device 507:Types of COMSEC equipment: 98:, discuss the issue on the 1009: 524:Authentication equipment: 501:Secure Terminal Equipment 322:Secure Terminal Equipment 294:, emissions security and 173:"Communications security" 543:National Security Agency 439:KPK โ€“ Key production key 436:KEK โ€“ Key Encryption Key 983:Military communications 822:more precise citations. 442:OWK โ€“ Over the Wire Key 311:military communications 988:Military radio systems 958:on September 30, 2010. 929:on September 16, 2012. 898:public domain material 865:Federal Standard 1037C 859:public domain material 700:USCENTCOM PL 117-02-1. 615:NSA encryption systems 338:Cryptographic security 266: 963:Cryptography machines 878: (in support of 447:Over the Air Rekeying 358:Transmission security 292:transmission security 257: 635:Signals intelligence 630:Secure communication 600:Information security 561:frequency management 489:Two person integrity 419:Data Transfer Device 158:improve this article 104:create a new article 96:improve this article 682:on October 20, 2013 625:Operations security 605:Information warfare 404:CT3 โ€“ Common Tier 3 993:Encryption devices 941:on March 30, 2009. 277:telecommunications 267: 848: 847: 840: 620:NSA product types 483:Simple Key Loader 382:physical measures 378:Physical security 368:frequency hopping 349:Emission security 296:physical security 252: 251: 244: 234: 233: 226: 208: 132: 131: 124: 106:, as appropriate. 68: 16:(Redirected from 1000: 959: 942: 930: 928: 921: 912: 895: 894: 883: 877: 872:. Archived from 856: 855: 843: 836: 832: 829: 823: 818:this article by 809:inline citations 796: 795: 788: 778: 777: 771: 763: 761: 760: 754: 748:. Archived from 747: 739: 733: 732: 730: 729: 724: 716: 710: 707: 701: 698: 692: 691: 689: 687: 681: 666: 658: 640:Traffic analysis 263:voice encryption 259:PRC-77 VHF radio 247: 240: 229: 222: 218: 215: 209: 207: 166: 142: 134: 127: 120: 116: 113: 107: 79: 78: 71: 60: 38: 37: 30: 21: 1008: 1007: 1003: 1002: 1001: 999: 998: 997: 968: 967: 950: 933: 926: 919: 915: 901: 892: 862: 853: 851: 844: 833: 827: 824: 814:Please help to 813: 797: 793: 786: 781: 764: 758: 756: 752: 745: 743:"Archived copy" 741: 740: 736: 727: 725: 722: 718: 717: 713: 708: 704: 699: 695: 685: 683: 679: 664: 660: 659: 652: 648: 590:Dynamic secrets 586: 577: 531: 395: 372:spread spectrum 334: 248: 237: 236: 235: 230: 219: 213: 210: 167: 165: 155: 143: 128: 117: 111: 108: 93: 80: 76: 39: 35: 28: 23: 22: 15: 12: 11: 5: 1006: 1004: 996: 995: 990: 985: 980: 970: 969: 966: 965: 960: 948: 943: 931: 913: 889: 884: 876:on 2022-01-22. 846: 845: 800: 798: 791: 785: 784:External links 782: 780: 779: 734: 711: 702: 693: 649: 647: 644: 643: 642: 637: 632: 627: 622: 617: 612: 607: 602: 597: 592: 585: 582: 576: 573: 572: 571: 568: 564: 557: 530: 527: 526: 525: 522: 519: 516: 505: 504: 503:(secure phone) 497: 491: 485: 479: 473: 470: 467: 464: 458: 452: 449: 443: 440: 437: 434: 431: 426:TEK โ€“ Traffic 424: 421: 415: 412: 405: 402: 399: 394: 391: 390: 389: 375: 354: 345: 333: 330: 271:Communications 250: 249: 232: 231: 146: 144: 137: 130: 129: 90:of the subject 88:worldwide view 83: 81: 74: 69: 43: 42: 40: 33: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1005: 994: 991: 989: 986: 984: 981: 979: 976: 975: 973: 964: 961: 957: 953: 949: 947: 944: 940: 936: 932: 925: 918: 914: 910: 906: 905: 899: 890: 888: 885: 881: 875: 871: 867: 866: 860: 850: 849: 842: 839: 831: 821: 817: 811: 810: 804: 799: 790: 789: 783: 775: 769: 755:on 2016-09-17 751: 744: 738: 735: 721: 715: 712: 706: 703: 697: 694: 678: 674: 670: 663: 657: 655: 651: 645: 641: 638: 636: 633: 631: 628: 626: 623: 621: 618: 616: 613: 611: 608: 606: 603: 601: 598: 596: 593: 591: 588: 587: 583: 581: 574: 569: 565: 562: 558: 555: 554: 553: 551: 546: 544: 540: 536: 528: 523: 520: 517: 514: 513:cryptographic 510: 509: 508: 502: 498: 495: 492: 490: 486: 484: 480: 478: 474: 471: 468: 465: 462: 459: 456: 453: 450: 448: 444: 441: 438: 435: 432: 429: 425: 422: 420: 416: 413: 410: 406: 403: 400: 397: 396: 393:Related terms 392: 387: 383: 379: 376: 373: 369: 365: 364:cryptanalysis 361: 359: 355: 352: 350: 346: 343: 342:cryptosystems 339: 336: 335: 331: 329: 327: 323: 319: 314: 312: 308: 304: 299: 297: 293: 289: 285: 280: 278: 274: 272: 264: 261:with digital 260: 256: 246: 243: 228: 225: 217: 206: 203: 199: 196: 192: 189: 185: 182: 178: 175: โ€“  174: 170: 169:Find sources: 163: 159: 153: 152: 147:This article 145: 141: 136: 135: 126: 123: 115: 105: 101: 97: 91: 89: 82: 73: 72: 67: 65: 58: 57: 52: 51: 46: 41: 32: 31: 19: 978:Cryptography 956:the original 939:the original 924:the original 902: 874:the original 864: 834: 825: 806: 757:. Retrieved 750:the original 737: 726:. Retrieved 714: 705: 696: 684:. Retrieved 677:the original 668: 578: 559:ACES is the 547: 537:(EKMS) is a 532: 506: 377: 356: 347: 337: 315: 307:unclassified 300: 287: 281: 269: 268: 238: 220: 211: 201: 194: 187: 180: 168: 156:Please help 151:verification 148: 118: 109: 85: 61: 54: 48: 47:Please help 44: 880:MIL-STD-188 820:introducing 332:Specialties 309:traffic on 972:Categories 803:references 759:2016-09-16 728:2023-08-21 709:INFOSEC-99 686:October 3, 646:References 567:equipment. 428:Encryption 303:classified 184:newspapers 112:March 2014 50:improve it 828:July 2010 360:(TRANSEC) 326:USCENTCOM 100:talk page 56:talk page 768:cite web 584:See also 273:security 214:May 2023 94:You may 816:improve 494:STU-III 445:OTAR โ€“ 351:(EMSEC) 282:In the 198:scholar 805:, but 499:STE โ€“ 487:TPI โ€“ 481:SKL โ€“ 475:SOI โ€“ 461:KOI-18 455:KYK-13 417:DTD โ€“ 407:CCI โ€“ 386:access 366:(e.g. 288:COMSEC 265:device 200:  193:  186:  179:  171:  18:COMSEC 927:(PDF) 920:(PDF) 900:from 861:from 753:(PDF) 746:(PDF) 723:(PDF) 680:(PDF) 665:(PDF) 318:VOSIP 205:JSTOR 191:books 102:, or 774:link 688:2015 533:The 370:and 305:and 177:news 430:Key 160:by 974:: 907:. 882:). 868:. 770:}} 766:{{ 671:. 667:. 653:^ 374:). 59:. 911:. 841:) 835:( 830:) 826:( 812:. 776:) 762:. 731:. 690:. 245:) 239:( 227:) 221:( 216:) 212:( 202:ยท 195:ยท 188:ยท 181:ยท 154:. 125:) 119:( 114:) 110:( 92:. 66:) 62:( 20:)

Index

COMSEC
improve it
talk page
Learn how and when to remove these messages
worldwide view
improve this article
talk page
create a new article
Learn how and when to remove this message

verification
improve this article
adding citations to reliable sources
"Communications security"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
Learn how and when to remove this message

PRC-77 VHF radio
voice encryption
Communications
telecommunications
North Atlantic Treaty Organization
transmission security
physical security
classified

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

โ†‘