Knowledge (XXG)

Secure Terminal Equipment

Source đź“ť

1026: 20: 38:
telephone lines which offer higher speeds of up to 128 kbit/s and are all digital. The greater bandwidth allows higher quality voice and can also be utilized for data and fax transmission through a built-in
97:: The Office STE is the most widely used STE and provides voice and data access to ISDN (Integrated Services Digital Network) and PSTN (Public Switched Telephone Network) telecommunications systems. 113:: The Data STE provides remote access for voice, fax, data and video-conferencing. This model has two serial EIA-530A/EIA-232 BDI ports and allows for data transfers to multiple destinations. 78:
configured Crypto Card is present, secure calls can be placed to other STE phones. STE phones are "releasable" (unlike STU-III sets). All cryptographic algorithms are in the crypto card.
1006: 836: 531: 248: 82: 689: 34:) is the U.S. government's current (as of 2008), encrypted telephone communications system for wired or "landline" communications. STE is designed to use 103:: The Tactical STE is similar to the Office STE but can also access the TRI-TAC (TRI Service TACtical) network and has a serial EIA-530A/EIA-232 BDI ( 241: 35: 192: 119:: The C2 STE is similar to the Tactical STE but C2 has modified software for use with its Tactical Terminal Locking Handset mechanism. 682: 168: 55: 885: 234: 1059: 675: 140: 1054: 1001: 956: 769: 880: 130: 996: 627: 85:(SCIP) (formerly Future Narrowband Digital Terminal (FNBDT)). There are upgrade kits available for older units. 986: 976: 831: 311: 75: 536: 54:
STE sets look like ordinary high-end office desk telephones and can place unsecured calls to anywhere on the
981: 971: 774: 734: 727: 717: 712: 612: 336: 331: 271: 722: 473: 1029: 875: 821: 607: 602: 577: 382: 377: 991: 915: 640: 326: 286: 58:(PSTN), as well as secured calls on it via the phone's backwards compatible STU-III mode. There is a 754: 635: 521: 860: 844: 791: 51:
tactical system. STE sets are backwards compatible with STU-III phones, but not with KY-68 sets.
143:(VoIP) capability, available as an upgrade to the current models, or built into some new models. 920: 910: 781: 104: 855: 196: 321: 930: 850: 811: 759: 744: 422: 407: 372: 316: 276: 213: 164: 147:
As of 2007, a typical STE terminal cost about $ 3,100, not including the crypto card.
1048: 1011: 966: 925: 905: 801: 764: 739: 468: 263: 165:"Secure Telephone Unit Third Generation (STU-III) / Secure Terminal Equipment (STE)" 961: 806: 796: 786: 749: 698: 488: 940: 526: 392: 19: 900: 870: 865: 826: 501: 890: 935: 895: 650: 645: 63: 556: 541: 496: 448: 427: 59: 44: 816: 617: 597: 561: 551: 478: 351: 346: 341: 301: 281: 71: 67: 40: 592: 587: 582: 516: 511: 463: 458: 453: 443: 417: 402: 387: 356: 306: 291: 48: 18: 506: 412: 397: 296: 671: 230: 81:
Newer STE sets can communicate with systems that use the
837:
Cryptographically secure pseudorandom number generator
193:"STE: Secure Terminal Equipment: Direct Sale Pricing" 218: 23:
STE desk set. Note slot in front for Crypto PC Card.
949: 705: 626: 570: 487: 436: 365: 262: 83:Secure Communications Interoperability Protocol 74:Enhanced Crypto Card to be inserted. When an 683: 242: 8: 214:The NAVY INFOSEC WebSite on STU-III and STE 43:port. STE is intended to replace the older 690: 676: 668: 249: 235: 227: 223: 219: 156: 7: 187: 185: 125:: Similar to the Data STE, the STE-R 14: 169:Federation of American Scientists 56:public switched telephone network 1025: 1024: 129:provides dial-in access to the 886:Information-theoretic security 62:slot in the STE that allows a 1: 141:Voice over Internet Protocol 1002:Message authentication code 957:Cryptographic hash function 770:Cryptographic hash function 1076: 881:Harvest now, decrypt later 131:Defense Red Switch Network 16:Encrypted telephone system 1020: 997:Post-quantum cryptography 667: 226: 222: 28:Secure Terminal Equipment 987:Quantum key distribution 977:Authenticated encryption 832:Random number generation 107:Digital Interface) port. 982:Public-key cryptography 972:Symmetric-key algorithm 775:Key derivation function 735:Cryptographic primitive 728:Authentication protocol 718:Outline of cryptography 713:History of cryptography 723:Cryptographic protocol 474:Siemens and Halske T52 47:office system and the 24: 876:End-to-end encryption 822:Cryptojacking malware 537:Sectéra Secure Module 22: 1060:Secure communication 992:Quantum cryptography 916:Trusted timestamping 641:Intel SHA extensions 755:Cryptographic nonce 636:AES instruction set 1055:Encryption devices 861:Subliminal channel 845:Pseudorandom noise 792:Key (cryptography) 139:: The STE now has 25: 1042: 1041: 1038: 1037: 921:Key-based routing 911:Trapdoor function 782:Digital signature 663: 662: 659: 658: 628:Computer hardware 373:Bazeries cylinder 70:) Crypto Card or 1067: 1028: 1027: 856:Insecure channel 692: 685: 678: 669: 251: 244: 237: 228: 224: 220: 201: 200: 195:. Archived from 189: 180: 179: 177: 175: 161: 1075: 1074: 1070: 1069: 1068: 1066: 1065: 1064: 1045: 1044: 1043: 1034: 1016: 945: 701: 696: 655: 622: 566: 483: 469:Lorenz SZ 40/42 432: 361: 258: 257:Cipher machines 255: 210: 205: 204: 191: 190: 183: 173: 171: 163: 162: 158: 153: 91: 17: 12: 11: 5: 1073: 1071: 1063: 1062: 1057: 1047: 1046: 1040: 1039: 1036: 1035: 1033: 1032: 1021: 1018: 1017: 1015: 1014: 1009: 1007:Random numbers 1004: 999: 994: 989: 984: 979: 974: 969: 964: 959: 953: 951: 947: 946: 944: 943: 938: 933: 931:Garlic routing 928: 923: 918: 913: 908: 903: 898: 893: 888: 883: 878: 873: 868: 863: 858: 853: 851:Secure channel 848: 842: 841: 840: 829: 824: 819: 814: 812:Key stretching 809: 804: 799: 794: 789: 784: 779: 778: 777: 772: 762: 760:Cryptovirology 757: 752: 747: 745:Cryptocurrency 742: 737: 732: 731: 730: 720: 715: 709: 707: 703: 702: 697: 695: 694: 687: 680: 672: 665: 664: 661: 660: 657: 656: 654: 653: 648: 643: 638: 632: 630: 624: 623: 621: 620: 615: 610: 605: 600: 595: 590: 585: 580: 574: 572: 568: 567: 565: 564: 559: 554: 549: 544: 539: 534: 529: 524: 519: 514: 509: 504: 499: 493: 491: 485: 484: 482: 481: 476: 471: 466: 461: 456: 451: 446: 440: 438: 434: 433: 431: 430: 425: 423:Reihenschieber 420: 415: 410: 408:Jefferson disk 405: 400: 395: 390: 385: 380: 375: 369: 367: 363: 362: 360: 359: 354: 349: 344: 339: 334: 329: 324: 319: 314: 309: 304: 299: 294: 289: 284: 279: 274: 268: 266: 264:Rotor machines 260: 259: 256: 254: 253: 246: 239: 231: 217: 216: 209: 208:External links 206: 203: 202: 199:on 2006-10-15. 181: 155: 154: 152: 149: 145: 144: 134: 120: 114: 108: 98: 90: 87: 15: 13: 10: 9: 6: 4: 3: 2: 1072: 1061: 1058: 1056: 1053: 1052: 1050: 1031: 1023: 1022: 1019: 1013: 1012:Steganography 1010: 1008: 1005: 1003: 1000: 998: 995: 993: 990: 988: 985: 983: 980: 978: 975: 973: 970: 968: 967:Stream cipher 965: 963: 960: 958: 955: 954: 952: 948: 942: 939: 937: 934: 932: 929: 927: 926:Onion routing 924: 922: 919: 917: 914: 912: 909: 907: 906:Shared secret 904: 902: 899: 897: 894: 892: 889: 887: 884: 882: 879: 877: 874: 872: 869: 867: 864: 862: 859: 857: 854: 852: 849: 846: 843: 838: 835: 834: 833: 830: 828: 825: 823: 820: 818: 815: 813: 810: 808: 805: 803: 802:Key generator 800: 798: 795: 793: 790: 788: 785: 783: 780: 776: 773: 771: 768: 767: 766: 765:Hash function 763: 761: 758: 756: 753: 751: 748: 746: 743: 741: 740:Cryptanalysis 738: 736: 733: 729: 726: 725: 724: 721: 719: 716: 714: 711: 710: 708: 704: 700: 693: 688: 686: 681: 679: 674: 673: 670: 666: 652: 649: 647: 644: 642: 639: 637: 634: 633: 631: 629: 625: 619: 616: 614: 611: 609: 606: 604: 601: 599: 596: 594: 591: 589: 586: 584: 581: 579: 576: 575: 573: 569: 563: 560: 558: 555: 553: 550: 548: 545: 543: 540: 538: 535: 533: 530: 528: 525: 523: 520: 518: 515: 513: 510: 508: 505: 503: 500: 498: 495: 494: 492: 490: 486: 480: 477: 475: 472: 470: 467: 465: 462: 460: 457: 455: 452: 450: 447: 445: 442: 441: 439: 435: 429: 426: 424: 421: 419: 416: 414: 411: 409: 406: 404: 401: 399: 396: 394: 391: 389: 386: 384: 381: 379: 376: 374: 371: 370: 368: 364: 358: 355: 353: 350: 348: 345: 343: 340: 338: 335: 333: 330: 328: 325: 323: 320: 318: 315: 313: 310: 308: 305: 303: 300: 298: 295: 293: 290: 288: 285: 283: 280: 278: 275: 273: 270: 269: 267: 265: 261: 252: 247: 245: 240: 238: 233: 232: 229: 225: 221: 215: 212: 211: 207: 198: 194: 188: 186: 182: 170: 166: 160: 157: 150: 148: 142: 138: 135: 132: 128: 124: 121: 118: 115: 112: 109: 106: 102: 99: 96: 93: 92: 88: 86: 84: 79: 77: 73: 69: 65: 61: 57: 52: 50: 46: 42: 37: 33: 29: 21: 962:Block cipher 807:Key schedule 797:Key exchange 787:Kleptography 750:Cryptosystem 699:Cryptography 546: 489:Secure voice 282:M-125 Fialka 197:the original 174:September 2, 172:. Retrieved 159: 146: 136: 126: 122: 116: 110: 100: 94: 80: 53: 31: 27: 26: 950:Mathematics 941:Mix network 437:Teleprinter 393:Cipher disk 1049:Categories 901:Ciphertext 871:Decryption 866:Encryption 827:Ransomware 502:FASCINATOR 366:Mechanical 151:References 891:Plaintext 1030:Category 936:Kademlia 896:Codetext 839:(CSPRNG) 651:IBM 4764 646:IBM 4758 613:Pinwheel 101:Tactical 64:Fortezza 706:General 557:STU-III 542:SIGSALY 497:BID 150 449:BID 770 428:Scytale 352:Singlet 312:Mercury 133:(DRSN). 60:PC Card 45:STU-III 817:Keygen 618:Rockex 608:Purple 598:Noreen 562:VINSON 552:STU-II 522:NESTOR 479:SIGTOT 347:SIGCUM 342:SIGABA 302:Lacida 287:Hebern 277:Enigma 95:Office 89:Models 72:KSV-21 68:KOV-14 66:Plus ( 41:RS-232 847:(PRN) 593:KL-51 588:KL-43 583:KG-84 571:Other 517:KY-68 512:KY-58 464:KW-37 459:KW-26 454:DUDEK 444:5-UCO 418:M-209 403:Kryha 388:CD-57 357:Typex 337:SG-41 332:SG-39 307:M-325 292:HX-63 127:emote 123:STE-R 105:Black 49:KY-68 578:JADE 532:SCIP 527:OMNI 507:KY-3 413:M-94 398:HC-9 383:C-52 378:C-36 317:NEMA 297:KL-7 176:2010 137:VoIP 111:Data 36:ISDN 603:Red 547:STE 327:RED 322:OMI 272:CCM 76:NSA 32:STE 1051:: 184:^ 167:. 117:C2 691:e 684:t 677:v 250:e 243:t 236:v 178:. 30:(

Index


ISDN
RS-232
STU-III
KY-68
public switched telephone network
PC Card
Fortezza
KOV-14
KSV-21
NSA
Secure Communications Interoperability Protocol
Black
Defense Red Switch Network
Voice over Internet Protocol
"Secure Telephone Unit Third Generation (STU-III) / Secure Terminal Equipment (STE)"
Federation of American Scientists


"STE: Secure Terminal Equipment: Direct Sale Pricing"
the original
The NAVY INFOSEC WebSite on STU-III and STE
v
t
e
Rotor machines
CCM
Enigma
M-125 Fialka
Hebern

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑