Over-the-air Rekeying
   HOME
*





Over-the-air Rekeying
Over-the-air rekeying (OTAR) refers to transmitting or updating encryption keys (rekeying) in secure information systems by conveying the keys via encrypted electronic communication channels ("over the air"). It is also referred to as over-the-air transfer (OTAT), or over-the-air distribution (OTAD), depending on the specific type, use, and transmission means of the key being changed. Although the acronym refers specifically to radio transmission, the technology is also employed via wire, cable, or optical fiber. As a "paperless encryption key system" OTAR was originally adopted specifically in support of high speed data communications because previously known "paperless key" systems such as supported by Diffie-Hellman key exchange, or Firefly key exchange technology (as used in the now obsolete STU-III "scrambled" telephone) were not capable of handling the high speed transmission volumes required by normal governmental/military communications traffic. Now also adopted for civi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Rekeying (cryptography)
In cryptography, rekeying refers to the process of changing the session key—the encryption key of an ''ongoing'' communication—in order to limit the amount of data encrypted with the same key. Roughly equivalent to the classical procedure of changing codes on a daily basis, the key is changed after a pre-set volume of data has been transmitted or a given period of time has passed. In contemporary systems, rekeying is implemented by forcing a new key exchange, typically through a separate protocol like Internet key exchange (IKE). The procedure is handled transparently to the user. A prominent application is Wi-Fi Protected Access (WPA), the extended security protocol for wireless networks that addresses the shortcomings of its predecessor, WEP, by frequently replacing session keys through the Temporal Key Integrity Protocol (TKIP), thus defeating some well-known key recovery attacks. In public key infrastructure, rekeying (or "re-keying") leads to issuance of new certifi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Johns Hopkins University
Johns Hopkins University (Johns Hopkins, Hopkins, or JHU) is a private university, private research university in Baltimore, Maryland. Founded in 1876, Johns Hopkins is the oldest research university in the United States and in the western hemisphere. It consistently ranks among the most prestigious universities in the United States and the world. The university was named for its first benefactor, the American entrepreneur and Quaker philanthropist Johns Hopkins. Hopkins' $7 million bequest to establish the university was the largest Philanthropy, philanthropic gift in U.S. history up to that time. Daniel Coit Gilman, who was inaugurated as :Presidents of Johns Hopkins University, Johns Hopkins's first president on February 22, 1876, led the university to revolutionize higher education in the U.S. by integrating teaching and research. In 1900, Johns Hopkins became a founding member of the American Association of Universities. The university has led all Higher education in the U ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Applied Physics Laboratory
The Johns Hopkins University Applied Physics Laboratory (Applied Physics Laboratory, or APL) is a not-for-profit University Affiliated Research Center, university-affiliated research center (UARC) in Howard County, Maryland. It is affiliated with Johns Hopkins University and employs 8,000 people (2022). The lab serves as a technical resource for the United States Department of Defense, Department of Defense, NASA, and other government agencies. APL has developed numerous systems and technologies in the areas of air and missile defense, surface and undersea naval warfare, computer security, and space science and spacecraft construction. While APL provides research and engineering services to the government, it is not a traditional defense contractor, as it is a UARC and a division of Johns Hopkins University. APL is a scientific and engineering research and development division, rather than an academic division, of Johns Hopkins. Hopkins' Whiting School of Engineering offers par ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Electronic Key Management System
The Electronic Key Management System (EKMS) is a United States National Security Agency led program responsible for Communications Security ( COMSEC) key management, accounting, and distribution. Specifically, EKMS generates and distributes electronic key material for all NSA encryption system whose keys are loaded using standard fill devices, and directs the distribution of NSA produced key material. Additionally, EKMS performs account registration, privilege management, ordering, distribution, and accounting to direct the management and distribution of physical COMSEC material for the services. The common EKMS components and standards facilitate interoperability and commonality among the armed services and civilian agencies. Reasons for development The primary reason for the development of EKMS centers on the security and logistics problems that plagued the COMSEC Material Control System (CMCS),{{cite web, url=http://apps.dtic.mil/dtic/tr/fulltext/u2/a271771.pdf , archive-url ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


KYK-13
The KYK-13 Electronic Transfer Device is a common fill device designed by the United States National Security Agency for the transfer and loading of cryptographic keys with their corresponding check word. The KYK-13 is battery powered and uses the DS-102 protocol for key transfer. Its National Stock Number A NATO Stock Number, or National Stock Number (NSN) as it is known in the US, is a 13-digit numeric code used by the NATO military alliance, identifying all the 'standardized material items of supply' as they have been recognized by all member s ... is 5810-01-026-9618. Even though the KYK-13 was first introduced in 1976 and was supposed to have been obsoleted by the AN/CYZ-10 Data Transfer Device, it is still widely used because of its simplicity and reliability. A simpler device than the CYZ-10, the KIK-30 "Really Simple Key loader" (RASKL) is now planned to replace the KYK-13s, with up to $200 million budgeted to procure them in quantity. Components * P1 and J1 Connec ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Fill Device
A fill device or key loader is a module used to load cryptographic keys into electronic encryption machines. Fill devices are usually hand held and electronic ones are battery operated. Older mechanical encryption systems, such as rotor machines, were keyed by setting the positions of wheels and plugs from a printed keying list. Electronic systems required some way to load the necessary cryptovariable data. In the 1950s and 1960s, systems such as the U.S. National Security Agency KW-26 and the Soviet Union's Fialka used punched cards for this purpose. Later NSA encryption systems incorporated a serial port fill connector and developed several common fill devices (CFDs) that could be used with multiple systems. A CFD was plugged in when new keys were to be loaded. Newer NSA systems allow " over the air rekeying" (OTAR), but a master key often must still be loaded using a fill device. NSA uses two serial protocols for key fill, DS-101 and DS-102. Both employ the same U-229 6-pi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


KG-84
The KG-84A and KG-84C are encryption devices developed by the U.S. National Security Agency (NSA) to ensure secure transmission of digital data. The KG-84C is a Dedicated Loop Encryption Device (DLED), and both devices are General-Purpose Telegraph Encryption Equipment (GPTEE). The KG-84A is primarily used for point-to-point encrypted communications via landline, microwave, and satellite systems. The KG-84C is an outgrowth of the U.S. Navy high frequency (HF) communications program and supports these needs. The KG-84A and KG-84C are devices that operate in simplex, half-duplex, or full-duplex modes. The KG-84C contains all of the KG-84 and KG-84A modes, plus a variable update counter, improved HF performance, synchronous out-of-sync detection, asynchronous cipher text, plain text, bypass, and European TELEX protocol. The KG-84 (A/C) is certified to handle data at all levels of security. The KG-84 (A/C) is a Controlled Cryptographic Item (CCI) and is unclassified when unkeyed. Keyed ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Diffie–Hellman Key Exchange
Diffie–Hellman key exchangeSynonyms of Diffie–Hellman key exchange include: * Diffie–Hellman–Merkle key exchange * Diffie–Hellman key agreement * Diffie–Hellman key establishment * Diffie–Hellman key negotiation * Exponential key exchange * Diffie–Hellman protocol * Diffie–Hellman handshake is a mathematical method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle and named after Whitfield Diffie and Martin Hellman. DH is one of the earliest practical examples of public key exchange implemented within the field of cryptography. Published in 1976 by Diffie and Hellman, this is the earliest publicly known work that proposed the idea of a private key and a corresponding public key. Traditionally, secure encrypted communication between two parties required that they first exchange keys by some secure physical means, such as paper key lists transported by a trusted courier. The Di ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




KY-58
The VINSON KY-58 is a secure voice module primarily used to encrypt radio communication to and from military aircraft and other tactical vehicles. It is employed by U.S. Military Joint Services, NATO and some law enforcement agencies. It is designed to operate over bandwidth-restricted circuits such as UHF and VHF satellite access and wideband switched telephone systems. It uses the 16 kbit/s continuously variable slope delta modulation (CVSD). The system was initially fielded as a replacement for the KG-36 and KG-34. The unit fits in a five-inch cube and weighs about 5 pounds. Production ended in 1993. See also * KY-68 TSEC/KY-68 DSVT, commonly known as Digital Subscriber Voice Terminal, is a US military ruggedized, full- or half-duplex tactical telephone system with a built-in encryption/decryption module for secure traffic. It transmits voice and data at 1 ... References External links KY-58 (Vinson)by Jerry Proc National Security Agency encryption devices ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


ANDVT
The Advanced Narrowband Digital Voice Terminal (ANDVT) is a secure voice terminal for low bandwidth secure voice communications throughout the U.S. Department of Defense. Devices in the ANDVT family include the AN/USC-43 Tactical Terminal (TACTERM), the KY-99A Miniaturized Terminal (MINTERM), and the KY-100 Airborne Terminal (AIRTERM). ANDVT uses LPC-10 voice compression. The functions of the MINTERM are similar to those of the TACTERM; its updated design includes an improved modular architecture, and it has been reduced in size. The MINTERM is lightweight, low-power, single channel, half-duplex, narrowband/wideband/wireline terminal providing secure voice and data communications with full key distribution and remote rekey capabilities. The MINTERM is certified to secure traffic up to TOP SECRET. The MINTERM improvements include the following: *Concurrent voice and data modes enable the users to connect both data equipment and voice handsets. *VINSON (KY-57/58) mode of operation a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]