KY-68
   HOME
*



picture info

KY-68
TSEC/KY-68 DSVT, commonly known as Digital Subscriber Voice Terminal, is a US military ruggedized, full- or half-duplex tactical telephone system with a built-in encryption/decryption module for secure traffic. It transmits voice and data at 16 or 32 kbit/s, converting voice to a digital signal. The KY-68 can operate via civilian and military switches in either encrypted or un-encrypted mode, or point-to-point (encrypted mode only). Although used primarily for secure communications, the KY-68 can also transmit to a Digital Non-secure Voice Terminal (DNVT). A local switch warns the KY-68 user with a tone signal when initiating communication with a non-secure terminal. The KY-68 is keyed using an Electronic Transfer Device, typically either a KYK-13 or AN/CYZ-10. An almost identical office version (KY-78) features the same electronics as the KY-68, but has an exterior casing composed of lighter materials. The KY-68 and KY-78 are approved for use with SECRET-classified info ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




KY-68
TSEC/KY-68 DSVT, commonly known as Digital Subscriber Voice Terminal, is a US military ruggedized, full- or half-duplex tactical telephone system with a built-in encryption/decryption module for secure traffic. It transmits voice and data at 16 or 32 kbit/s, converting voice to a digital signal. The KY-68 can operate via civilian and military switches in either encrypted or un-encrypted mode, or point-to-point (encrypted mode only). Although used primarily for secure communications, the KY-68 can also transmit to a Digital Non-secure Voice Terminal (DNVT). A local switch warns the KY-68 user with a tone signal when initiating communication with a non-secure terminal. The KY-68 is keyed using an Electronic Transfer Device, typically either a KYK-13 or AN/CYZ-10. An almost identical office version (KY-78) features the same electronics as the KY-68, but has an exterior casing composed of lighter materials. The KY-68 and KY-78 are approved for use with SECRET-classified info ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


KY-58
The VINSON KY-58 is a secure voice module primarily used to encrypt radio communication to and from military aircraft and other tactical vehicles. It is employed by U.S. Military Joint Services, NATO and some law enforcement agencies. It is designed to operate over bandwidth-restricted circuits such as UHF and VHF satellite access and wideband switched telephone systems. It uses the 16 kbit/s continuously variable slope delta modulation (CVSD). The system was initially fielded as a replacement for the KG-36 and KG-34. The unit fits in a five-inch cube and weighs about 5 pounds. Production ended in 1993. See also * KY-68 TSEC/KY-68 DSVT, commonly known as Digital Subscriber Voice Terminal, is a US military ruggedized, full- or half-duplex tactical telephone system with a built-in encryption/decryption module for secure traffic. It transmits voice and data at 1 ... References External links KY-58 (Vinson)by Jerry Proc National Security Agency encryption devices ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Rugged Computer
A rugged computer or ruggedized computer is a computer specifically designed to operate reliably in harsh usage environments and conditions, such as strong vibrations, extreme temperatures and wet or dusty conditions. They are designed from inception for the type of rough use typified by these conditions, not just in the external housing but in the internal components and cooling arrangements as well.What you need to know before purchasing a rugged mobile computer
, ''LXE'', 2004.
Typical environments for rugged laptops, Tablet computer, tablet PCs and Personal digital assistant, PDAs are public safety, field sales, field service, manufacturing, retail, health care, healthcare, construction, transportation/distrib ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Full-duplex
A duplex communication system is a point-to-point system composed of two or more connected parties or devices that can communicate with one another in both directions. Duplex systems are employed in many communications networks, either to allow for simultaneous communication in both directions between two connected parties or to provide a reverse path for the monitoring and remote adjustment of equipment in the field. There are two types of duplex communication systems: full-duplex (FDX) and half-duplex (HDX). In a full-duplex system, both parties can communicate with each other simultaneously. An example of a full-duplex device is plain old telephone service; the parties at both ends of a call can speak and be heard by the other party simultaneously. The earphone reproduces the speech of the remote party as the microphone transmits the speech of the local party. There is a two-way communication channel between them, or more strictly speaking, there are two communication channel ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Half-duplex
A duplex communication system is a point-to-point system composed of two or more connected parties or devices that can communicate with one another in both directions. Duplex systems are employed in many communications networks, either to allow for simultaneous communication in both directions between two connected parties or to provide a reverse path for the monitoring and remote adjustment of equipment in the field. There are two types of duplex communication systems: full-duplex (FDX) and half-duplex (HDX). In a full-duplex system, both parties can communicate with each other simultaneously. An example of a full-duplex device is plain old telephone service; the parties at both ends of a call can speak and be heard by the other party simultaneously. The earphone reproduces the speech of the remote party as the microphone transmits the speech of the local party. There is a two-way communication channel between them, or more strictly speaking, there are two communication channel ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Encryption
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users. Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often used in military ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Decryption
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users. Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often used in military ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Secure Voice
Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. History The implementation of voice encryption dates back to World War II when secure communication was paramount to the US armed forces. During that time, noise was simply added to a voice signal to prevent enemies from listening to the conversations. Noise was added by playing a record of noise in sync with the voice signal and when the voice signal reached the receiver, the noise signal was subtracted out, leaving the original voice signal. In order to subtract out the noise, the receiver need to have exactly the same noise signal and the noise records were only made in pairs; one for the transmitter and one for the receiver. Having only two copies of records made it impossible for the wrong receiver to decrypt the signal. To implement the system, the army contracted Bell Laboratori ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


US Military KY-68 Phone
The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territories, nine Minor Outlying Islands, and 326 Indian reservations. The United States is also in free association with three Pacific Island sovereign states: the Federated States of Micronesia, the Marshall Islands, and the Republic of Palau. It is the world's third-largest country by both land and total area. It shares land borders with Canada to its north and with Mexico to its south and has maritime borders with the Bahamas, Cuba, Russia, and other nations. With a population of over 333 million, it is the most populous country in the Americas and the third most populous in the world. The national capital of the United States is Washington, D.C. and its most populous city and principal financial center is New York City. Paleo-America ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Point-to-point (telecommunications)
In telecommunications, a point-to-point connection refers to a communications connection between two communication endpoints or nodes. An example is a telephone call, in which one telephone is connected with one other, and what is said by one caller can only be heard by the other. This is contrasted with a ''point-to-multipoint'' or ''broadcast'' connection, in which many nodes can receive information transmitted by one node. Other examples of point-to-point communications links are leased lines and microwave radio relay. The term is also used in computer networking and computer architecture to refer to a wire or other connection that links only two computers or circuits, as opposed to other network topologies such as buses or crossbar switches which can connect many communications devices. ''Point-to-point'' is sometimes abbreviated as ''P2P''. This usage of ''P2P'' is distinct from ''P2P'' meaning ''peer-to-peer'' in the context of file sharing networks or other data-sh ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Key (cryptography)
A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be different sizes and varieties, but in all cases, the strength of the encryption relies on the security of the key being maintained. A key’s security strength is dependent on its algorithm, the size of the key, the generation of the key, and the process of key exchange. Scope The key is what is used to encrypt data from plaintext to ciphertext. There are different methods for utilizing keys and encryption. Symmetric cryptography Symmetric cryptography refers to the practice of the same key being used for both encryption and decryption. Asymmetric cryptography Asymmetric cryptography has separate keys for encrypting and decrypting. These keys are known as the public and private keys, respectively. Purpose Since the key pro ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]