Mod 11 Flashcards
Concept of spread spectrum
the narrowband signal is manipulated (scrambled) prior to transmission in such a way that the signal occupies a much larger part of the RF spectrum then strictly needed
using a spread spectrum technique can make your signal what?
More robust against interference and jamming
The manipulation of spread spectrum requires?
a pseudo random noise code
Two techniques to spread the spectrum
Direct Sequence Spread Spectrum (DSSS)
Frequency hopping (FHSS)
Direct Sequence Spread Spectrum (DSSS)
multiplication of the original data signal with a much faster pseudo random noise code
Results of DSSS
a scrambled signal with a much wider spectrum. Improves protection against interfering signals, especially narrowband interference.
The use of DSSS for multiple access is called
Code Division Multiple Access (CDMA), and is used e.g. in the 3rd generation mobile communications
Frequency Hopping Spread Spectrum (FHSS)
makes the narrow band signal jump in random narrow bands within a larger bandwidth
In Frequency Hopping, the RF frequency of the narrowband transmission is quickly changed within a certain range, according to
a pseudo random noise code
Like DSSS, FH also provides a multiple access capability by
using orthogonal hopping codes for different (logical) communication channels.
JTIDS/MIDS is
It provides secure, flexible, and
jam-resistant information transfer in real time among the dispersed and mobile units, characteristic of modern armed forces.
JTIDS/MIDS combines characteristics designed to overcome many of the limitations common to existing systems by providing
increased system capacity
and coverage, improved connectivity, survivability, jamming resistance, and reduced danger of data loss and data obsolescence.
JTIDS/MIDS terminals operate on the principal of
Time Division Multiple Access (TDMA)
The JTIDS/MIDS system operates in what frequency band
960 - 1215 MHz
Which spread spectrum technique does JTIDS/MIDS use?
both frequency hopping and direct sequence spread spectrum
EPLRS is
a joint service secure, jam-resistance data link that is primarily used by ground forces (US Army) for blue-force tracking (friendly troop position information) and digital data dissemination
SADL provides
fighter-to-fighter, air-to-ground, and ground-to-air data communications that are robust, secure, jam-resistant, and contention-free, air-to-ground combat identification
EPLRS/SADL is limited to
LOS
EPLRS/SADL soldier range (vehicle to vehicle
5-8 miles
EPLRS/SADL Ground to air range
dependent on the altitude of the airborne platform but can easily exceed 100 miles
The biggest change found on the JBC-P compared to BFT2
the addition of communications security (COMSEC) devices
the graphics and user operability are far superior
JBC-P COMSEC is loaded by
KGV-72
What equipment was utilized by the FBCB2?
DAGR GPS, Upgraded MT-2025
JBC-P uses what equipment?
MFoCS systems
What is Tactical Data Links (TDLs)
Joint Chiefs of Staff (JCS)-approved standardized communication link suitable for transmitting machine-readable, digital information
The TDL program facilitates information exchange between the US and Allied commands
What are the 3 TDLs
Link 11, Link 11B, Link 16
Link 11
Formerly known as TADIL A
a secure digital point-to-point legacy data link
Air Force has migrated to Link 16 and only uses Link 11 when interoperating with countries or platforms that do not yet have LINK 16
half-duplex
Data rate of link 11
up to 2400 bits per second (bps)
Channel size of Link 11 in UHF and HF
UHF : 25khz
HF: 6khz
Link 11B
Formerly known as TADIL B
secure, full-duplex, point-to-point digital data link that uses serial transmission.
Its circuit may be established across satellite, microwave, terrestrial cable, and so forth. Its usage is generally limited to providing connectivity between ground-based units.
Difference between Link 11 and Link 11 B
link11B is not associated with RF transmissions and does not use a modulated waveform. It is a circuit, usually combined with other circuits in a multiplexer, and is transmitted as data.
Data rate of Link 11B
up to 1200 bps
Link 16
language used on JTIDS/MIDS to send messages
Formerly known as TADIL J
secure, frequency hopping (FH), line-of-sight (LOS) data link whose primary purpose is situational awareness and C2.
What frequency band does Link 16 Operate in?
L band (960-1215mhz)
L-Band does not penetrate foliage or man-made structures, nor does it bend around hills
Link 16 has a robust anti-jam mode, which hops over…
51 frequencies that are spaced 3 MHz apart from one another.
Link 16 was designed for
the air-to-air environment and is the primary data link for the USAF.
The goal of Communications Security (COMSEC) is to
ensure information pertaining to national security stays out of the wrong hands.
deny unauthorized personnel information derived from ISs of the United States Government related to national security and to ensure the authenticity of such ISs
COMSEC is a Cybersecurity discipline identified in what AFI?
AFI 17-130 Cybersecurity Program Management
NSA/CSS is tasked with preventing
foreign adversaries from gaining access to classified national security information
all military encryption is standardized by the NSA guidance.
NSA product Types
ranks cryptographic products or algorithms by a certification
The CNSSI No. 4009 National Information Assurance Glossary defines the Type 1, 2, 3, and 4 products.
Type 1
For encrypting and decrypting classified and sensitive national security information.
Type 2
For encrypting or decrypting sensitive national security information
Type 3
For encrypting or decrypting unclassified sensitive U.S. Government or commercial information, and to protect systems requiring protection mechanisms consistent with standard commercial practices.
Type 4
For unevaluated commercial cryptographic equipment that are neither NSA nor NIST certified for any Government usage. These products may contain either vendor proprietary algorithms, algorithms registered by NIST, or algorithms registered by NIST and published in a Federal Information Processing Standard (FIPS).
Suite A and B
Classifications of encryption-device types
Suite A
(Confidential through Top Secret) A specific set of classified cryptographic algorithms used for the protection of some categories of restricted mission critical information.
Suite B
(Confidential through Secret) A specific set of cryptographic algorithms suitable for protecting both classified and unclassified national security systems and information throughout the US government and to support interoperability with allies and coalition partners.
What is Cryptography
is the art and science of making and breaking codes and ciphers
Encryption is the process of
converting information to a disguised form in order to send it across a potentially unsafe channel.
Modern encryption schemes utilize the concepts of
symmetric-keys and public-keys
Symmetric Key
the encryption and decryption keys are the same. Communicating parties must have the same key in order to achieve secure communication.
Public key
the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key that enables messages to be read.
Advanced Encryption Standard
symmetric-key algorithm
proved to be a much-needed upgrade, providing encryption using three different key lengths: 128, 192, and 256 bits.
Confidential and Secret information requires
AES of 128-bit key lengths or higher
Top Secret requires
AES 192 or 256- bit key length
High Assurance Internet Protocol Encryption (HAIPE)
provides a secure gateway that allows two enclaves to exchange data over an untrusted or lower-classification network, such as commercial internet
HAIPE provides a tactical advantage to military radio communications by
ability to establish secure mobile ad hoc networking (MANET) capabilities for users
SCIP
Secure Communications Interoperability Protocol
standard for secure voice and data communication
SCIP supports national (US) and multi-national modes
only requirement is a minimum bandwidth of 2400 Hz.
Voice over IP
technology used to transmit voice communication over a data network using Internet Protocol
Secure Voice over IP (SVoIP
is when secure phones are used to protect information sent over the VoIP network.
Voice over Secure IP (VoSIP)
is the same as SVoIP in that they are technologies used to securely transmit voice communications, but with VoSIP, the security is provided by separate encryption devices in the network rather than the secure phones themselves.
When the device is empty and free of codes, COMSEC hardware is categorized as ?
controlled cryptographic item” (CCI)
It is considered UNCLASSIFIED.
Transmission Encryption Keys (TEK)
a key used to encrypt messages
Transmission Security Keys (TSK
used to secure the link by which the message will travel.
Fill devices often use a standard data protocol such as
DS-101 or DS-102