NESTOR (encryption)
   HOME

TheInfoList



OR:

NESTOR was a family of compatible, tactical, wideband
secure voice Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. History The implementation of voice encryption dat ...
systems developed by the U.S.
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
and widely deployed during the
Vietnam War The Vietnam War (also known by #Names, other names) was a conflict in Vietnam, Laos, and Cambodia from 1 November 1955 to the fall of Saigon on 30 April 1975. It was the second of the Indochina Wars and was officially fought between North Vie ...
through the late
Cold War The Cold War is a term commonly used to refer to a period of geopolitical tension between the United States and the Soviet Union and their respective allies, the Western Bloc and the Eastern Bloc. The term '' cold war'' is used because t ...
period of the 1980s. NESTOR consists of three systems. The KY-8 was used in vehicular and afloat applications; the KY-28 was the airborne version; and the KY-38 was the portable or man-pack model. About 30,000 NESTOR equipments were produced prior to their replacement by the
VINSON VINSON is a family of voice encryption devices used by U.S. and allied military and law enforcement, based on the NSA's classified Suite A SAVILLE encryption algorithm and 16 kbit/s CVSD audio compression. It replaces the Vietnam War-era N ...
secure voice family.A History of U.S. Communications Security; the David G. Boak Lectures
National Security Agency (NSA), Volumes I, 1973, Volumes II 1981, partially released 2008, additional portions declassified October 14, 2015
Keying was accomplished by setting each switch in a matrix of switches to one of several positions. This was done using a separate mechanical key loader (KYK-28) that had a matching matrix of pins that could be set to different heights as instructed by a key list. The key loader was pushed into a matrix of holes, one hole for each switch. The loader also had two larger index pins that also cocked a spring that would return each switch to its initial position when the door covering the hole matrix was reopened, zeroizing the equipment.


Vietnam War experience

NSA gave high priority to deploying NESTOR systems in Vietnam. Equipment was issued to field units in Vietnam beginning in 1965 with the KY-8 for stationary or vehicular use; the KY-8 was fully distributed by the third quarter of the fiscal year 1968. The KY-28 was issued for use in aircraft beginning in 1967, as was the KY-38 for man-pack or mobile use. The KY-38 was fully distributed in 1968.Vietnam Studies—Division-Level Communications 1962-1973
Lieutenant General Charles R. Myer, U.S. Department of the Army, 1982, Chapter 8
NESTOR was successfully used in some situations, but the overall experience was not good. NSA estimates that only about one in ten units were actually used. A variety of problems contributed to this rejection: * Voice quality was poor * NESTOR reduced the range of radios by 10%. While this did not happen in tests with carefully tuned radios, it did in the field. * The roughly 600-millisecond delay before NESTOR enabled radios would synchronize after each "push to talk" was intolerable to pilots in air-to-air combat. * While the KY-28 was easily incorporated in bomber (e.g.,
B-52 The Boeing B-52 Stratofortress is an American long-range, subsonic, jet-powered strategic bomber. The B-52 was designed and built by Boeing, which has continued to provide support and upgrades. It has been operated by the United States Air ...
), attack (e.g.,
AC-119 The Fairchild AC-119G Shadow and AC-119K Stinger were twin-engine piston-powered gunships developed by the United States during the Vietnam War. They replaced the Douglas AC-47 Spooky and operated alongside the early versions of the Lockheed AC ...
,
AC-130 The Lockheed AC-130 gunship is a heavily armed, long-endurance, ground-attack variant of the C-130 Hercules transport, fixed-wing aircraft. It carries a wide array of ground-attack weapons that are integrated with sophisticated sensors, naviga ...
), large reconnaissance (e.g., P-3,
RC-135 The Boeing RC-135 is a family of large reconnaissance aircraft built by Boeing and modified by a number of companies, including General Dynamics, Lockheed, LTV, E-Systems, and L3 Technologies, and used by the United States Air Force and Roya ...
) and command and control (e.g.,
EC-121 The Lockheed EC-121 Warning Star was an American airborne early warning and control radar surveillance aircraft operational in the 1950s in both the United States Navy (USN) and United States Air Force (USAF). The military version of the Lock ...
, E-1, E-2) aircraft during its initial introduction, finding room for the KY-28 in fighter aircraft was difficult. The Navy improvised successfully, for example tucking KY-28s into the nose wheel well of F-4 Phantoms, while the Air Force initiated a formal modification program that took years to complete. * The ground version, KY-8 wouldn't work in the high temperatures common in the country, leading to jury-rigged cooling solutions, like wrapping units in wet burlap, or drilling unauthorized holes in the case. * The human portable version, KY-38, while a marvel of miniaturization for the time, was still heavy. The KY-38 plus AN/PRC-77 radio and spare batteries weighed about 54 pounds (24.5 kg). Experiments with having two Marines carry the separate units with a cable between worked poorly in the jungle. Many units decided that more ammunition was a better use of carrying capacity. * Lack of cables to connect NESTOR equipment to radios proved to be a major problem that was never fully solved due to lack of coordination between three separate organizations responsible for procuring the encryption systems, radios, and cables. One large batch of replacement cables was lost in a cargo plane crash. * NSA doctrine called for limiting the number of radios (250 at first, later 400) on a network with a common key, to limit the risk of key compromise. This meant units could sometimes not communicate with other units in the field in a highly mobile war. NSA eventually had to relax this restriction for air-ground communication since aircraft could go anywhere. Also, ground forces used FM radios, while aircraft used AM, limiting secure cross-communication to units equipped with compatible NESTOR-equipped radios. *Some commanders were concerned about carrying the classified-Confidential NESTOR units into combat, for fear that their military careers might be damaged by the loss of classified material. Some 1001 NESTOR units were lost during the war, mostly in downed aircraft and there was no record of anyone being disciplined for losing a unit "while trying to fight a war with it." Surveys suggested this issue was not a major factor, with fear that captured units might be used by the enemy being a greater concern. But it led to an ongoing controversy within NSA about the desirability of fielding cryptographic equipment that was not classified. * NSA
cryptoperiod A cryptoperiod is the time span during which a specific cryptographic key is authorized for use. Common government guidelines range from 1 to 3 years for asymmetric cryptography, and 1 day to 7 days for symmetric cipher traffic keys. Factors to co ...
doctrine called for keys to be changed every 24 hours. Initially, these key changes took place at midnight, local time, taking all secure radios out of service for several minutes. This timing proved particularly inopportune because most contacts with opposing forces took place at night. The key-change time was later changed to 0600 to avoid this problem. While many in the U.S. military believed that the Viet Cong and NVA would not be able to exploit insecure communications, interrogation of captured communication intelligence units showed they were able to understand the Americans' jargon and informal codes in realtime and were often able to warn their side of impending U.S. actions.


See also

* NSA encryption systems


References


External links

* http://www.nf6x.net/2009/03/ky-38-nestor-voice-encryption-device-demilitarized/ National Security Agency encryption devices Military equipment of the Vietnam War {{crypto-stub