KY-58
   HOME
*





KY-58
The VINSON KY-58 is a secure voice module primarily used to encrypt radio communication to and from military aircraft and other tactical vehicles. It is employed by U.S. Military Joint Services, NATO and some law enforcement agencies. It is designed to operate over bandwidth-restricted circuits such as UHF and VHF satellite access and wideband switched telephone systems. It uses the 16 kbit/s continuously variable slope delta modulation (CVSD). The system was initially fielded as a replacement for the KG-36 and KG-34. The unit fits in a five-inch cube and weighs about 5 pounds. Production ended in 1993. See also * KY-68 TSEC/KY-68 DSVT, commonly known as Digital Subscriber Voice Terminal, is a US military ruggedized, full- or half-duplex tactical telephone system with a built-in encryption/decryption module for secure traffic. It transmits voice and data at 1 ... References External links KY-58 (Vinson)by Jerry Proc National Security Agency encryption devices ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


KY-58 VINSON, Airborne Or Shipborne - National Cryptologic Museum - DSC08023
The VINSON KY-58 is a secure voice module primarily used to encryption, encrypt radio communication to and from military aircraft and other tactical vehicles. It is employed by U.S. Military Joint Services, NATO and some law enforcement agencies. It is designed to operate over bandwidth-restricted circuits such as Ultra High Frequency, UHF and Very High Frequency, VHF satellite access and wideband switched telephone systems. It uses the 16 kbit/s continuously variable slope delta modulation (CVSD). The system was initially fielded as a replacement for the KG-36 and KG-34. The unit fits in a five-inch cube and weighs about 5 pounds. Production ended in 1993. See also * KY-68 References External links KY-58 (Vinson)by Jerry Proc
National Security Agency encryption devices {{crypto-stub ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


VINSON
VINSON is a family of voice encryption devices used by U.S. and allied military and law enforcement, based on the National Security Agency, NSA's classified NSA Suite A Cryptography, Suite A Saville (cipher), SAVILLE encryption algorithm and 16 kbit/s Continuously variable slope delta modulation, CVSD audio compression (data), audio compression. It replaces the Vietnam War-era NESTOR (encryption), NESTOR (KY-8/KY-28, 28/KY-38, 38) family. These devices provide :wikt:tactical, tactical secure voice on Ultra High Frequency, UHF and Very High Frequency, VHF Line-of-sight propagation, line of sight (LOS), UHF SATCOM communication and tactical phone systems. These terminals are unclassified Controlled Cryptographic Items (CCI) when unkeyed and classified to the keymat of the key when going secure. VINSON devices include: * KY-57 * KY-58 * KY-68 * KY-99a (MINTERM) * KY-100 (AIRTERM) * KYV-2 * FASCINATOR VINSON is embedded into many modern military radios, such as SINCGARS. Many ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

KY-68
TSEC/KY-68 DSVT, commonly known as Digital Subscriber Voice Terminal, is a US military ruggedized, full- or half-duplex tactical telephone system with a built-in encryption/decryption module for secure traffic. It transmits voice and data at 16 or 32 kbit/s, converting voice to a digital signal. The KY-68 can operate via civilian and military switches in either encrypted or un-encrypted mode, or point-to-point (encrypted mode only). Although used primarily for secure communications, the KY-68 can also transmit to a Digital Non-secure Voice Terminal (DNVT). A local switch warns the KY-68 user with a tone signal when initiating communication with a non-secure terminal. The KY-68 is keyed using an Electronic Transfer Device, typically either a KYK-13 or AN/CYZ-10. An almost identical office version (KY-78) features the same electronics as the KY-68, but has an exterior casing composed of lighter materials. The KY-68 and KY-78 are approved for use with SECRET-classified info ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Secure Voice
Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. History The implementation of voice encryption dates back to World War II when secure communication was paramount to the US armed forces. During that time, noise was simply added to a voice signal to prevent enemies from listening to the conversations. Noise was added by playing a record of noise in sync with the voice signal and when the voice signal reached the receiver, the noise signal was subtracted out, leaving the original voice signal. In order to subtract out the noise, the receiver need to have exactly the same noise signal and the noise records were only made in pairs; one for the transmitter and one for the receiver. Having only two copies of records made it impossible for the wrong receiver to decrypt the signal. To implement the system, the army contracted Bell Laboratori ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Encryption
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users. Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often used in military ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Communication
Communication (from la, communicare, meaning "to share" or "to be in relation with") is usually defined as the transmission of information. The term may also refer to the message communicated through such transmissions or the field of inquiry studying them. There are many disagreements about its precise definition. John Peters argues that the difficulty of defining communication emerges from the fact that communication is both a Universality (philosophy), universal phenomenon and a Communication studies, specific discipline of institutional academic study. One definitional strategy involves limiting what can be included in the category of communication (for example, requiring a "conscious intent" to persuade). By this logic, one possible definition of communication is the act of developing Semantics, meaning among Subject (philosophy), entities or Organization, groups through the use of sufficiently mutually understood signs, symbols, and Semiosis, semiotic conventions. An im ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


NATO
The North Atlantic Treaty Organization (NATO, ; french: Organisation du traité de l'Atlantique nord, ), also called the North Atlantic Alliance, is an intergovernmental military alliance between 30 member states – 28 European and two North American. Established in the aftermath of World War II, the organization implemented the North Atlantic Treaty, signed in Washington, D.C., on 4 April 1949. NATO is a collective security system: its independent member states agree to defend each other against attacks by third parties. During the Cold War, NATO operated as a check on the perceived threat posed by the Soviet Union. The alliance remained in place after the dissolution of the Soviet Union and has been involved in military operations in the Balkans, the Middle East, South Asia, and Africa. The organization's motto is ''animus in consulendo liber'' (Latin for "a mind unfettered in deliberation"). NATO's main headquarters are located in Brussels, Belgium, while NATO ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Ultra High Frequency
Ultra high frequency (UHF) is the ITU designation for radio frequency, radio frequencies in the range between 300 megahertz (MHz) and 3 gigahertz (GHz), also known as the decimetre band as the wavelengths range from one meter to one tenth of a meter (one decimeter). Radio waves with frequencies above the UHF band fall into the super-high frequency (SHF) or microwave frequency range. Lower frequency signals fall into the VHF (very high frequency) or lower bands. UHF radio waves propagate mainly by Line-of-sight propagation, line of sight; they are blocked by hills and large buildings although the transmission through building walls is strong enough for indoor reception. They are used for UHF television broadcasting, television broadcasting, cell phones, satellite communication including GPS, personal radio services including Wi-Fi and Bluetooth, walkie-talkies, cordless phones, satellite phones, and numerous other applications. The Institute of Electrical and Electronics ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Very High Frequency
Very high frequency (VHF) is the ITU designation for the range of radio frequency electromagnetic waves ( radio waves) from 30 to 300 megahertz (MHz), with corresponding wavelengths of ten meters to one meter. Frequencies immediately below VHF are denoted high frequency (HF), and the next higher frequencies are known as ultra high frequency (UHF). VHF radio waves propagate mainly by line-of-sight, so they are blocked by hills and mountains, although due to refraction they can travel somewhat beyond the visual horizon out to about 160 km (100 miles). Common uses for radio waves in the VHF band are Digital Audio Broadcasting (DAB) and FM radio broadcasting, television broadcasting, two-way land mobile radio systems (emergency, business, private use and military), long range data communication up to several tens of kilometers with radio modems, amateur radio, and marine communications. Air traffic control communications and air navigation systems (e.g. VOR and ILS) wo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Continuously Variable Slope Delta Modulation
Continuously variable slope delta modulation (CVSD or CVSDM) is a voice coding method. It is a delta modulation with variable step size (i.e., special case of adaptive delta modulation), first proposed by Greefkes and Riemens in 1970. CVSD encodes at 1 bit per sample, so that audio sampled at 16 kHz is encoded at 16 kbit/s. The encoder maintains a reference sample and a step size. Each input sample is compared to the reference sample. If the input sample is larger, the encoder emits a ''1'' bit and adds the step size to the reference sample. If the input sample is smaller, the encoder emits a ''0'' bit and subtracts the step size from the reference sample. The encoder also keeps the previous ''N'' bits of output (''N'' = 3 or ''N'' = 4 are very common) to determine adjustments to the step size; if the previous ''N'' bits are all 1s or 0s, the step size is increased. Otherwise, the step size is decreased (usually in an exponential manner, with \tau being in the range ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]