HOME
*





VINSON
VINSON is a family of voice encryption devices used by U.S. and allied military and law enforcement, based on the NSA's classified Suite A SAVILLE encryption algorithm and 16 kbit/s CVSD audio compression. It replaces the Vietnam War-era NESTOR (KY-8/KY-28, 28/KY-38, 38) family. These devices provide tactical secure voice on UHF and VHF line of sight (LOS), UHF SATCOM communication and tactical phone systems. These terminals are unclassified Controlled Cryptographic Items (CCI) when unkeyed and classified to the keymat of the key when going secure. VINSON devices include: * KY-57 * KY-58 * KY-68 * KY-99a (MINTERM) * KY-100 (AIRTERM) * KYV-2 * FASCINATOR A fascinator is a formal headpiece, a style of millinery. Since the 1990s, the term has referred to a type of formal headwear worn as an alternative to the hat; it is usually a large decorative design attached to a band or clip. In contrast to ... VINSON is embedded into many modern military radios, such ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


ANDVT
The Advanced Narrowband Digital Voice Terminal (ANDVT) is a secure voice terminal for low bandwidth secure voice communications throughout the U.S. Department of Defense. Devices in the ANDVT family include the AN/USC-43 Tactical Terminal (TACTERM), the KY-99A Miniaturized Terminal (MINTERM), and the KY-100 Airborne Terminal (AIRTERM). ANDVT uses LPC-10 voice compression. The functions of the MINTERM are similar to those of the TACTERM; its updated design includes an improved modular architecture, and it has been reduced in size. The MINTERM is lightweight, low-power, single channel, half-duplex, narrowband/wideband/wireline terminal providing secure voice and data communications with full key distribution and remote rekey capabilities. The MINTERM is certified to secure traffic up to TOP SECRET. The MINTERM improvements include the following: *Concurrent voice and data modes enable the users to connect both data equipment and voice handsets. *VINSON (KY-57/58) mode of operation a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


KY-58
The VINSON KY-58 is a secure voice module primarily used to encrypt radio communication to and from military aircraft and other tactical vehicles. It is employed by U.S. Military Joint Services, NATO and some law enforcement agencies. It is designed to operate over bandwidth-restricted circuits such as UHF and VHF satellite access and wideband switched telephone systems. It uses the 16 kbit/s continuously variable slope delta modulation (CVSD). The system was initially fielded as a replacement for the KG-36 and KG-34. The unit fits in a five-inch cube and weighs about 5 pounds. Production ended in 1993. See also * KY-68 TSEC/KY-68 DSVT, commonly known as Digital Subscriber Voice Terminal, is a US military ruggedized, full- or half-duplex tactical telephone system with a built-in encryption/ decryption module for secure Secure may refer to: * Security, being ... References External links KY-58 (Vinson)by Jerry Proc National Security Agency encryption devices ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

NESTOR (encryption)
NESTOR was a family of compatible, tactical, wideband secure voice systems developed by the U.S. National Security Agency and widely deployed during the Vietnam War through the late Cold War period of the 1980s. NESTOR consists of three systems. The KY-8 was used in vehicular and afloat applications; the KY-28 was the airborne version; and the KY-38 was the portable or man-pack model. About 30,000 NESTOR equipments were produced prior to their replacement by the VINSON secure voice family.A History of U.S. Communications Security; the David G. Boak Lectures
National Security Agency (NSA), Volumes I, 1973, Volumes II 1981, partially released 2008, additional portions declassified October 14, 2015
Keying was accomplished by setting each switch ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Secure Voice
Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. History The implementation of voice encryption dates back to World War II when secure communication was paramount to the US armed forces. During that time, noise was simply added to a voice signal to prevent enemies from listening to the conversations. Noise was added by playing a record of noise in sync with the voice signal and when the voice signal reached the receiver, the noise signal was subtracted out, leaving the original voice signal. In order to subtract out the noise, the receiver need to have exactly the same noise signal and the noise records were only made in pairs; one for the transmitter and one for the receiver. Having only two copies of records made it impossible for the wrong receiver to decrypt the signal. To implement the system, the army contracted Bell Laborator ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees. Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Saville (cipher)
SAVILLE is a classified NSA Type 1 encryption algorithm, developed in the late 1960s, jointly by the Government Communications Headquarters (GCHQ) in the UK and the National Security Agency (NSA) in the US. It is used broadly, often for voice encryption, and implemented in many encryption devices. Little is known publicly about the algorithm itself due to its classified nature and inclusion in the NSA's Suite A. Some documentation related to the KYK-13 fill device and statements made by military officials confirm that SAVILLE has a 128-bit key, which consists of 120 key bits and an 8-bit checksum. Furthermore, it is known that SAVILLE has two modes of operation: Autonomous Mode (also known as Key-Auto-KEY or KAK) and Autoclave Mode (also known as Cipher-Text Auto Key or CTAK). On the AIM microchip, it runs at 4% of the clock rate (compare DES at 76% and BATON at 129%). The Cypris chip mentions two modes; specifications for Windster and Indictor specify that they provide S ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Audio Compression (data)
Audio most commonly refers to sound, as it is transmitted in signal form. It may also refer to: Sound *Audio signal, an electrical representation of sound *Audio frequency, a frequency in the audio spectrum * Digital audio, representation of sound in a form processed and/or stored by computers or digital electronics *Audio, audible content (media) in audio production and publishing *Semantic audio, extraction of symbols or meaning from audio *Stereophonic audio, method of sound reproduction that creates an illusion of multi-directional audible perspective *Audio equipment Entertainment *AUDIO (group), an American R&B band of 5 brothers formerly known as TNT Boyz and as B5 * ''Audio'' (album), an album by the Blue Man Group * ''Audio'' (magazine), a magazine published from 1947 to 2000 *Audio (musician), British drum and bass artist * "Audio" (song), a song by LSD Computing *, an HTML element, see HTML5 audio See also *Acoustic (other) *Audible (other) *Au ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Controlled Cryptographic Item
Controlled Cryptographic Item (CCI) is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated cryptographic component or other hardware item which performs a critical communications security (COMSEC) function. Items so designated may be unclassified but are subject to special accounting controls and required markings. Part of the physical security protection given to COMSEC equipment and material is afforded by its special handling and accounting. CCI equipment must be controlled in a manner that affords protection at least equal to other high value equipment, such as money, computers, and Privacy Act-controlled. There are two separate channels used for the handling of such equipment and materials: "the COMSEC channel" and "the administrative channel." The COMSEC channel, called the COMSEC Material Control System, is used to distribute accountable COMSEC items such as classified and CCI equipment, keying material, and main ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

SINCGARS
Single Channel Ground and Airborne Radio System (SINCGARS) is a Combat-net radio (CNR) used by U.S. and allied military forces. The CNR network is designed around three systems: SINCGARS, the high frequency (HF) radio, and the SC tactical satellite (TACSAT). Each system has different capabilities and transmission characteristics. SINCGARS is a family of user-owned and operated, very high frequency-frequency modulation (VHF-FM) CNRs. In the CNR network, the SINCGARS’ primary role is voice transmission for command and control (C2) between surface and airborne C2 assets. SINCGARS can transmit and receive secure data and facsimile transmissions through simple connections with various data terminal equipment. SINCGARS features provide communications interoperability for the Army, Marine, Navy, and Air Force, thus contributing to successful combat operations. It is also consistent with North Atlantic Treaty Organization interoperability requirements. The radios, which is han ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

FASCINATOR
A fascinator is a formal headpiece, a style of millinery. Since the 1990s, the term has referred to a type of formal headwear worn as an alternative to the hat; it is usually a large decorative design attached to a band or clip. In contrast to a hat, its function is purely ornamental: it covers very little of the head, and offers little or no protection from the weather. An intermediate form, incorporating a more substantial base to resemble a hat, is sometimes called a hatinator. Etymology The word "fascinator" is derived from the Latin verb ''fascinare'' ("to fascinate"), and simply means a thing or person that is enthralling or extremely interesting. Historically, the term was also applied to a person or animal with the (perhaps magical) power of rendering others unable to move or escape. History Earlier decorative headpieces It was customary for Christian women in Europe to wear some sort of headcovering. The European fashion of decorating the head with a hat can be ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]