1b - Crypto Principles IAW SCLA HO Flashcards

1
Q

The objective of ___ is to ensure the employment of measures and controls taken to deny unauthorized personnel information derived from ISs of the United States Government related to national security and to ensure the authenticity of such ISs.

A

COMSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ____ leads the U.S. Government in cryptology that encompasses both signals intelligence (SIGINT) and cybersecurity.

A

National Security Agency/Central Security Service (NSA/CSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Nowadays, all military encryption is standardized by
the ___ guidance.

A

NSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

For encrypting and decrypting classified and sensitive national security information.

A

Type 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

For encrypting or decrypting sensitive national security information.

A

Type 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For encrypting or decrypting unclassified sensitive U.S. Government or commercial information, and to protect systems requiring protection mechanisms consistent with standard commercial practices.

A

Type 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

For unevaluated commercial cryptographic equipment that are neither NSA nor NIST certified for any Government usage. These products may contain either vendor proprietary algorithms, algorithms registered by NIST, or algorithms registered by NIST and published in a Federal Information Processing Standard (FIPS).

A

Type 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(Confidential through Top Secret) A specific set of classified cryptographic algorithms used for the protection of some categories of restricted mission critical information.

A

Suite A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(Confidential through Secret) A specific set of cryptographic algorithms suitable for protecting both classified and unclassified national security systems and information throughout the US government and to support interoperability with allies and coalition partners.

A

Suite B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Making a code or cipher system is called ____.

A

cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Those who try to “break” a cryptosystem are practicing ____.

A

cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ is the process of converting information to a disguised form in order to send it across a potentially unsafe channel.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The un-encoded or unsecure message.

A

plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The encrypted message.

A

cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In ____, the encryption and decryption keys are the same. Communicating parties must have the same key in order to achieve secure communication.

A

Symmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In _____, the encryption key is published for
anyone to use and encrypt messages. However, only the receiving party has access to the decryption key that enables messages to be read.

A

Public key

17
Q

What is AES also known as?

A

Rijndael

18
Q

___ provides a secure gateway that allows two enclaves to exchange data over an untrusted or lower-classification network, such as commercial internet.

A

HAIPE

19
Q

refers to the encryption of voice communications over a range of systems such as radio, telephone or internet protocol (IP).

A

Secure voice

20
Q

____ is a standard for secure voice and data communication. The protocol is platform-independent, meaning as it makes no assumptions about the underlying hardware.

A

The Secure Communications Interoperability Protocol
(SCIP)

21
Q

Minimum bandwidth of SCIP?

A

2400 Hz

22
Q

___ is a technology used to transmit voice communication over a data network using Internet Protocol.

A

Voice over IP

23
Q

___ is when secure phones are used to protect information sent over the VoIP network.

A

Secure Voice over IP (SVoIP)

24
Q

____ is the same as SVoIP in that they are technologies used to securely transmit voice communications, but the security is provided by separate encryption devices in the network rather than the secure phones themselves.

A

Voice over Secure IP (VoSIP)

25
Q

____, provides a secure connection for multiple users in a network by encrypting a multiplexed line, which combines multiple data and/or voice lines into a single output.

A

Trunk encryption

26
Q

Trunk encryption is also known as?

A

bulk encryption

27
Q

The ___ is a lightweight, ruggedized, encryption device that is ideal for both tactical and strategic environments. It provides end-to-end encryption for IPv4/IPv6 networks and provides 200 Mb/s throughput. The ____ is certified to protect information classified Top Secret and below.

A

KG–175D

28
Q

The ___ provides traditional bulk encryption for non-IP–based systems, such as the Ground Multiband Terminal (GMT).

A

KIV–7

29
Q

A ____ is an electronic device used primarily by the military for the distribution of cryptographic variables such as Transmission Encryption Keys (TEK) and Transmission Security Keys (TSK).

A

key transfer device

30
Q

A key transfer device is also known as?

A

A fill device

31
Q

A key used to encrypt messages.

A

Transmission Encryption Keys (TEK)

32
Q

Used to secure the link by which the message will travel.

A

Transmission Security Keys (TSK)

33
Q

The ____ , otherwise known as the Simple Key Loader (SKL), is a ruggedized, portable, hand-held fill device for securely receiving, storing, and transferring data between compatible cryptographic and communications equipment.

A

AN/PYQ-10

34
Q

The ___ is backward compatible with existing End Cryptographic Units (ECU) and forward compatible with future security equipment.

A

Simple Key Loader (SKL)

35
Q

The ___ is a user-friendly, ruggedized, handheld fill device approved by the NSA for the distribution of Type 1 cryptographic keys.

A

KIK-30 Really Simple Key Loader (RASKL)

36
Q

The ____ generally uses a proprietary data protocol for transferring keys to the radio.

A

Key Variable Loader (KVL)

37
Q

It has the capability to store up to 1024 keys.

A

KVL

38
Q
A