Block 3 Flashcards
What does COMSEC do?
Prevents unauthorized access to sensitive info via encryption and decryption
The process of converting unsecure information into a disguised form is?
Encryption
The process of recovering original intelligence is?
Decryption
Who is the US crypto leader that creates signals intel (SIGINT) and information assurance (IA) products?
NSA
How many types of crypto devices are there?
- Types 1-4
Which crypto devices are approved by the NSA?
Types 1-3
Crypto device type ____ deals with classified or sensitive US govt info and contains NSA approved algorithms that protect systems requiring the most stringent protection mechanisms.
Type 1
Crypto device type ____ deals with national security information and was developed using established NSA business processes containing NSA-approved algorithms exceeding best commercial practices.
Type 2
Crypto device type ____ deals with unclassified sensitive US govt or commercial info and was developed using established commercial standards and contains NIST-approved algorithms.
Type 3
Crypto device type ____ deals with unevaluated commercial encryption that isn’t for govt use and contains either vendor proprietary algorithms, algorithms registered in by NIST, or algorithms registered by NIST and published in a federal information processing standard (FIPS).
Type 4
What are the four encryption methods?
Voice, data, trunk (bulk) and manual
What forms of voice communications can utilize voice encryption?
All forms (radio, telephone and internet protocol (IP))
What are the three common secure voice IPs?
- Voice over secure (VoSIP)
- Secure voice over IP (SVoIP)
- Secure voice over secure IP (SVoSIP)
What is the distinct difference between the voice over IP (VoIP) encryptions?
Whether you apply encryption in the phone, the network or both
What are the two types of data encryption?
Symmetric key (secret key) and asymmetric key (public-key)
What is symmetric key (secret-key) data encryption?
Data encryption method that uses identical key copies
What is asymmetric key (public-key) data encryption?
Data encryption method that uses two different keys (public key and private key)
What is based on a secret key data encryption system, that consists of 64 binary digits and is considered unsecure today?
Data encryption standard (DES)
What uses a three step data encryption process that utilizes one DES key per step and decrypts by reversing the process?
Triple data encryption standard (3DES)
What replaced 3DES and utilizes 128, 192 and 256 bit key-lengths?
Advanced encryption standard (AES)
What converts multiplexed signals into one data stream that requires a very fast encryption system?
Trunk (bulk) encryption
What is a piece of hardware that is free of codes that once a piece of equipment has keys loaded, it assumes the position of the highest loaded key?
Controlled cryptographic item (CCI)
What is a device found in most newer radios that needs the encryption (key) loaded from a fill device?
Internal encryption device
What are three examples of an external encryption device?
- KY-57
- KY-99
- KIV-7M
What are the characteristics of the KY-57 external decryption device?
- Used with VHF and UHF radios
- VINSON (wideband) encryption
- Holds up to six crypto keys
- Can receive a fill from a PYQ-10, KIK-30 or OTAR
What are the characteristics of the KY-99 external decryption device?
- Used with HF, VHF and UHF radios
- VINSON (wideband) or ANDVT (narrowband) encryption
- Holds up to six crypto keys
- Can receive a fill from a PYQ-10, KIK-30 or OTAR
What are the characteristics of the KIV-7M external decryption device?
- Used with digital and voice communications
- Requires at least one traffic encryption key (TEK)
- Requires removable crypto ignition key (CIK)
- Holds up to 10 crypto keys
- Commercial off the shelf
What are three examples of encryption fill devices?
PYQ-10, KIK-30 and KVL-3000+
____ is an encryption fill device that is also known as the simple key loader (SKL), that receives/stores/transfers crypto keys.
PYQ-10
____ is an encryption fill device that is also known as the really simple key loader (RASKL) and stores up to 40 crypto keys.
KIK-30
____ is an encryption fill device that is also known as key variable loader (KVL) that loads crypto keys into land mobile radios (LMRs) and stores up to 1024 crypto keys.
KVL-3000+
What are the components of the AN/PRC-113 man-pack config?
- RT-1319
- Battery case
- Dual VHF/UHF antenna
- Handset or headset
What are the components of the AN/TRC-176 transportable or rack mounted config?
- RT-1319
- Radio set control (remote)
- Audio amplifier
- Chassis assembly
- Dual VHF/UHF antenna
- Handset or headset
What are the components of the AN/VRC-83 high-powered vehicle mounted config?
- RT-1319
- Radio set control (remote)
- Audio amplifier
- Chassis assembly
- RF amplifier (30 watts)
- Dual VHF/UHF antenna
- Handset or headset
What is the method of transmitting radio signals by rapidly switching a carrier among many frequency channels using a pseudorandom sequence known to both transmitter and receiver?
Frequency hopping
What are the three main advantages of spread spectrum communications over a fixed frequency transmission?
- Highly resistant to interference
- Provides protection against jamming
- Difficult to intercept
Frequency hopping operations are secure (T/F)
False
Basic Anti-Jam (AJ) or Single Word of Day (SWOD)
Have Quick I (HQI)
Advanced Anti-Jam or Multiple Word of Day (MWOD)
Have Quick II (HQII)
What are the three things required to operate Have Quick?
- Time of Day (TOD)
- Word of Day (WOD)
- Net Number
What synchronizes each radio during using have quick radios?
Time of day (TOD)
How can TOD be received?
- GPS
- Hard-Wire connection (HWT)
- RF from another radio (OTAR)
How can TOD be emergency started?
By pressing the 3 and ENT key
What programs the frequency hopping pattern and rate?
Word of day (WOD)
WOD uses how many codes and for how many days?
Up to 6 frequency hopping codes (elements) per
day and can store up to 6 days of codes