1026:
20:
38:
telephone lines which offer higher speeds of up to 128 kbit/s and are all digital. The greater bandwidth allows higher quality voice and can also be utilized for data and fax transmission through a built-in
97:: The Office STE is the most widely used STE and provides voice and data access to ISDN (Integrated Services Digital Network) and PSTN (Public Switched Telephone Network) telecommunications systems.
113:: The Data STE provides remote access for voice, fax, data and video-conferencing. This model has two serial EIA-530A/EIA-232 BDI ports and allows for data transfers to multiple destinations.
78:
configured Crypto Card is present, secure calls can be placed to other STE phones. STE phones are "releasable" (unlike STU-III sets). All cryptographic algorithms are in the crypto card.
1006:
836:
531:
248:
82:
689:
34:) is the U.S. government's current (as of 2008), encrypted telephone communications system for wired or "landline" communications. STE is designed to use
103:: The Tactical STE is similar to the Office STE but can also access the TRI-TAC (TRI Service TACtical) network and has a serial EIA-530A/EIA-232 BDI (
241:
35:
192:
119:: The C2 STE is similar to the Tactical STE but C2 has modified software for use with its Tactical Terminal Locking Handset mechanism.
682:
168:
55:
885:
234:
1059:
675:
140:
1054:
1001:
956:
769:
880:
130:
996:
627:
85:(SCIP) (formerly Future Narrowband Digital Terminal (FNBDT)). There are upgrade kits available for older units.
986:
976:
831:
311:
75:
536:
54:
STE sets look like ordinary high-end office desk telephones and can place unsecured calls to anywhere on the
981:
971:
774:
734:
727:
717:
712:
612:
336:
331:
271:
722:
473:
1029:
875:
821:
607:
602:
577:
382:
377:
991:
915:
640:
326:
286:
58:(PSTN), as well as secured calls on it via the phone's backwards compatible STU-III mode. There is a
754:
635:
521:
860:
844:
791:
51:
tactical system. STE sets are backwards compatible with STU-III phones, but not with KY-68 sets.
143:(VoIP) capability, available as an upgrade to the current models, or built into some new models.
920:
910:
781:
104:
855:
196:
321:
930:
850:
811:
759:
744:
422:
407:
372:
316:
276:
213:
164:
147:
As of 2007, a typical STE terminal cost about $ 3,100, not including the crypto card.
1048:
1011:
966:
925:
905:
801:
764:
739:
468:
263:
165:"Secure Telephone Unit Third Generation (STU-III) / Secure Terminal Equipment (STE)"
961:
806:
796:
786:
749:
698:
488:
940:
526:
392:
19:
900:
870:
865:
826:
501:
890:
935:
895:
650:
645:
63:
556:
541:
496:
448:
427:
59:
44:
816:
617:
597:
561:
551:
478:
351:
346:
341:
301:
281:
71:
67:
40:
592:
587:
582:
516:
511:
463:
458:
453:
443:
417:
402:
387:
356:
306:
291:
48:
18:
506:
412:
397:
296:
671:
230:
81:
Newer STE sets can communicate with systems that use the
837:
Cryptographically secure pseudorandom number generator
193:"STE: Secure Terminal Equipment: Direct Sale Pricing"
218:
23:
STE desk set. Note slot in front for Crypto PC Card.
949:
705:
626:
570:
487:
436:
365:
262:
83:Secure Communications Interoperability Protocol
74:Enhanced Crypto Card to be inserted. When an
683:
242:
8:
214:The NAVY INFOSEC WebSite on STU-III and STE
43:port. STE is intended to replace the older
690:
676:
668:
249:
235:
227:
223:
219:
156:
7:
187:
185:
125:: Similar to the Data STE, the STE-R
14:
169:Federation of American Scientists
56:public switched telephone network
1025:
1024:
129:provides dial-in access to the
886:Information-theoretic security
62:slot in the STE that allows a
1:
141:Voice over Internet Protocol
1002:Message authentication code
957:Cryptographic hash function
770:Cryptographic hash function
1076:
881:Harvest now, decrypt later
131:Defense Red Switch Network
16:Encrypted telephone system
1020:
997:Post-quantum cryptography
667:
226:
222:
28:Secure Terminal Equipment
987:Quantum key distribution
977:Authenticated encryption
832:Random number generation
107:Digital Interface) port.
982:Public-key cryptography
972:Symmetric-key algorithm
775:Key derivation function
735:Cryptographic primitive
728:Authentication protocol
718:Outline of cryptography
713:History of cryptography
723:Cryptographic protocol
474:Siemens and Halske T52
47:office system and the
24:
876:End-to-end encryption
822:Cryptojacking malware
537:Sectéra Secure Module
22:
1060:Secure communication
992:Quantum cryptography
916:Trusted timestamping
641:Intel SHA extensions
755:Cryptographic nonce
636:AES instruction set
1055:Encryption devices
861:Subliminal channel
845:Pseudorandom noise
792:Key (cryptography)
139:: The STE now has
25:
1042:
1041:
1038:
1037:
921:Key-based routing
911:Trapdoor function
782:Digital signature
663:
662:
659:
658:
628:Computer hardware
373:Bazeries cylinder
70:) Crypto Card or
1067:
1028:
1027:
856:Insecure channel
692:
685:
678:
669:
251:
244:
237:
228:
224:
220:
201:
200:
195:. Archived from
189:
180:
179:
177:
175:
161:
1075:
1074:
1070:
1069:
1068:
1066:
1065:
1064:
1045:
1044:
1043:
1034:
1016:
945:
701:
696:
655:
622:
566:
483:
469:Lorenz SZ 40/42
432:
361:
258:
257:Cipher machines
255:
210:
205:
204:
191:
190:
183:
173:
171:
163:
162:
158:
153:
91:
17:
12:
11:
5:
1073:
1071:
1063:
1062:
1057:
1047:
1046:
1040:
1039:
1036:
1035:
1033:
1032:
1021:
1018:
1017:
1015:
1014:
1009:
1007:Random numbers
1004:
999:
994:
989:
984:
979:
974:
969:
964:
959:
953:
951:
947:
946:
944:
943:
938:
933:
931:Garlic routing
928:
923:
918:
913:
908:
903:
898:
893:
888:
883:
878:
873:
868:
863:
858:
853:
851:Secure channel
848:
842:
841:
840:
829:
824:
819:
814:
812:Key stretching
809:
804:
799:
794:
789:
784:
779:
778:
777:
772:
762:
760:Cryptovirology
757:
752:
747:
745:Cryptocurrency
742:
737:
732:
731:
730:
720:
715:
709:
707:
703:
702:
697:
695:
694:
687:
680:
672:
665:
664:
661:
660:
657:
656:
654:
653:
648:
643:
638:
632:
630:
624:
623:
621:
620:
615:
610:
605:
600:
595:
590:
585:
580:
574:
572:
568:
567:
565:
564:
559:
554:
549:
544:
539:
534:
529:
524:
519:
514:
509:
504:
499:
493:
491:
485:
484:
482:
481:
476:
471:
466:
461:
456:
451:
446:
440:
438:
434:
433:
431:
430:
425:
423:Reihenschieber
420:
415:
410:
408:Jefferson disk
405:
400:
395:
390:
385:
380:
375:
369:
367:
363:
362:
360:
359:
354:
349:
344:
339:
334:
329:
324:
319:
314:
309:
304:
299:
294:
289:
284:
279:
274:
268:
266:
264:Rotor machines
260:
259:
256:
254:
253:
246:
239:
231:
217:
216:
209:
208:External links
206:
203:
202:
199:on 2006-10-15.
181:
155:
154:
152:
149:
145:
144:
134:
120:
114:
108:
98:
90:
87:
15:
13:
10:
9:
6:
4:
3:
2:
1072:
1061:
1058:
1056:
1053:
1052:
1050:
1031:
1023:
1022:
1019:
1013:
1012:Steganography
1010:
1008:
1005:
1003:
1000:
998:
995:
993:
990:
988:
985:
983:
980:
978:
975:
973:
970:
968:
967:Stream cipher
965:
963:
960:
958:
955:
954:
952:
948:
942:
939:
937:
934:
932:
929:
927:
926:Onion routing
924:
922:
919:
917:
914:
912:
909:
907:
906:Shared secret
904:
902:
899:
897:
894:
892:
889:
887:
884:
882:
879:
877:
874:
872:
869:
867:
864:
862:
859:
857:
854:
852:
849:
846:
843:
838:
835:
834:
833:
830:
828:
825:
823:
820:
818:
815:
813:
810:
808:
805:
803:
802:Key generator
800:
798:
795:
793:
790:
788:
785:
783:
780:
776:
773:
771:
768:
767:
766:
765:Hash function
763:
761:
758:
756:
753:
751:
748:
746:
743:
741:
740:Cryptanalysis
738:
736:
733:
729:
726:
725:
724:
721:
719:
716:
714:
711:
710:
708:
704:
700:
693:
688:
686:
681:
679:
674:
673:
670:
666:
652:
649:
647:
644:
642:
639:
637:
634:
633:
631:
629:
625:
619:
616:
614:
611:
609:
606:
604:
601:
599:
596:
594:
591:
589:
586:
584:
581:
579:
576:
575:
573:
569:
563:
560:
558:
555:
553:
550:
548:
545:
543:
540:
538:
535:
533:
530:
528:
525:
523:
520:
518:
515:
513:
510:
508:
505:
503:
500:
498:
495:
494:
492:
490:
486:
480:
477:
475:
472:
470:
467:
465:
462:
460:
457:
455:
452:
450:
447:
445:
442:
441:
439:
435:
429:
426:
424:
421:
419:
416:
414:
411:
409:
406:
404:
401:
399:
396:
394:
391:
389:
386:
384:
381:
379:
376:
374:
371:
370:
368:
364:
358:
355:
353:
350:
348:
345:
343:
340:
338:
335:
333:
330:
328:
325:
323:
320:
318:
315:
313:
310:
308:
305:
303:
300:
298:
295:
293:
290:
288:
285:
283:
280:
278:
275:
273:
270:
269:
267:
265:
261:
252:
247:
245:
240:
238:
233:
232:
229:
225:
221:
215:
212:
211:
207:
198:
194:
188:
186:
182:
170:
166:
160:
157:
150:
148:
142:
138:
135:
132:
128:
124:
121:
118:
115:
112:
109:
106:
102:
99:
96:
93:
92:
88:
86:
84:
79:
77:
73:
69:
65:
61:
57:
52:
50:
46:
42:
37:
33:
29:
21:
962:Block cipher
807:Key schedule
797:Key exchange
787:Kleptography
750:Cryptosystem
699:Cryptography
546:
489:Secure voice
282:M-125 Fialka
197:the original
174:September 2,
172:. Retrieved
159:
146:
136:
126:
122:
116:
110:
100:
94:
80:
53:
31:
27:
26:
950:Mathematics
941:Mix network
437:Teleprinter
393:Cipher disk
1049:Categories
901:Ciphertext
871:Decryption
866:Encryption
827:Ransomware
502:FASCINATOR
366:Mechanical
151:References
891:Plaintext
1030:Category
936:Kademlia
896:Codetext
839:(CSPRNG)
651:IBM 4764
646:IBM 4758
613:Pinwheel
101:Tactical
64:Fortezza
706:General
557:STU-III
542:SIGSALY
497:BID 150
449:BID 770
428:Scytale
352:Singlet
312:Mercury
133:(DRSN).
60:PC Card
45:STU-III
817:Keygen
618:Rockex
608:Purple
598:Noreen
562:VINSON
552:STU-II
522:NESTOR
479:SIGTOT
347:SIGCUM
342:SIGABA
302:Lacida
287:Hebern
277:Enigma
95:Office
89:Models
72:KSV-21
68:KOV-14
66:Plus (
41:RS-232
847:(PRN)
593:KL-51
588:KL-43
583:KG-84
571:Other
517:KY-68
512:KY-58
464:KW-37
459:KW-26
454:DUDEK
444:5-UCO
418:M-209
403:Kryha
388:CD-57
357:Typex
337:SG-41
332:SG-39
307:M-325
292:HX-63
127:emote
123:STE-R
105:Black
49:KY-68
578:JADE
532:SCIP
527:OMNI
507:KY-3
413:M-94
398:HC-9
383:C-52
378:C-36
317:NEMA
297:KL-7
176:2010
137:VoIP
111:Data
36:ISDN
603:Red
547:STE
327:RED
322:OMI
272:CCM
76:NSA
32:STE
1051::
184:^
167:.
117:C2
691:e
684:t
677:v
250:e
243:t
236:v
178:.
30:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.