25:
259:
158:
It is particularly vital in military and government communication systems, where the security of transmitted data is critical to prevent adversaries from gathering intelligence or disrupting operations. TRANSEC is often implemented alongside COMSEC (Communications
Security) to form a comprehensive approach to communication security.
157:
This involves securing communication links from being compromised by techniques like jamming, eavesdropping, and signal interception. TRANSEC includes the use of frequency hopping, spread spectrum, encryption, and the physical protection of communication links to obscure the patterns of transmission.
42:
296:
128:) that results from the application of measures designed to protect transmissions from interception and exploitation by means other than
150:
232:
2012 6th
Advanced Satellite Multimedia Systems Conference (ASMS) and 12th Signal Processing for Space Communications Workshop (SPSC)
108:
89:
61:
320:
68:
46:
136:
75:
325:
57:
35:
289:
315:
282:
82:
206:
178:
162:
266:
235:
166:
309:
174:
146:
129:
227:
239:
170:
226:
Rodriguez
Bejarano, Juan Manuel; Yun, Ana; De La Cuesta, Borja (September 2012).
24:
194:
228:"Security in IP satellite networks: COMSEC and TRANSEC integration aspects"
258:
190:
125:
186:
18:
270:
161:
Methods used to achieve transmission security include
49:. Unsourced material may be challenged and removed.
290:
124:is the component of communications security (
8:
297:
283:
132:. Goals of transmission security include:
109:Learn how and when to remove this message
265:This cryptography-related article is a
218:
173:sequence generation is controlled by a
7:
255:
253:
47:adding citations to reliable sources
16:Component of communications security
269:. You can help Knowledge (XXG) by
142:Low probability of detection (LPD)
14:
257:
189:TRANSEC-equipped radios include
183:transmission security keys (TSK)
23:
137:Low probability of interception
122:Transmission security (TRANSEC)
34:needs additional citations for
240:10.1109/asms-spsc.2012.6333089
145:Antijam — resistance to
1:
342:
252:
181:. Such keys are known as
321:Military communications
58:"Transmission security"
43:improve this article
169:where the required
326:Cryptography stubs
207:Electronic warfare
185:. Modern U.S. and
278:
277:
234:. IEEE: 281–288.
163:frequency hopping
119:
118:
111:
93:
333:
299:
292:
285:
261:
254:
244:
243:
223:
114:
107:
103:
100:
94:
92:
51:
27:
19:
341:
340:
336:
335:
334:
332:
331:
330:
306:
305:
304:
303:
250:
248:
247:
225:
224:
220:
215:
203:
167:spread spectrum
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
339:
337:
329:
328:
323:
318:
308:
307:
302:
301:
294:
287:
279:
276:
275:
262:
246:
245:
217:
216:
214:
211:
210:
209:
202:
199:
177:algorithm and
155:
154:
143:
140:
117:
116:
99:September 2024
31:
29:
22:
15:
13:
10:
9:
6:
4:
3:
2:
338:
327:
324:
322:
319:
317:
314:
313:
311:
300:
295:
293:
288:
286:
281:
280:
274:
272:
268:
263:
260:
256:
251:
241:
237:
233:
229:
222:
219:
212:
208:
205:
204:
200:
198:
196:
192:
188:
184:
180:
176:
175:cryptographic
172:
168:
164:
159:
152:
148:
144:
141:
138:
135:
134:
133:
131:
130:cryptanalysis
127:
123:
113:
110:
102:
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
316:Cryptography
271:expanding it
264:
249:
231:
221:
182:
171:pseudorandom
160:
156:
121:
120:
105:
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
310:Categories
213:References
195:HAVE QUICK
69:newspapers
201:See also
191:SINCGARS
149:(EPM or
147:jamming
83:scholar
126:COMSEC
85:
78:
71:
64:
56:
139:(LPI)
90:JSTOR
76:books
267:stub
193:and
187:NATO
165:and
151:ECCM
62:news
236:doi
179:key
45:by
312::
230:.
197:.
298:e
291:t
284:v
273:.
242:.
238::
153:)
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.