Unit 1b Flashcards
1
Q
INTRODUCTION
A
- The practice of encryption ensures messages, be it voice or data, are transmitted and received by only the intended parties.
- The goal of Communications Security (COMSEC) is to ensure information pertaining to national security stays out of the wrong hands.
2
Q
COMMUNICATIONS SECURITY
( C O M S E C )
A
- COMSEC is a Cybersecurity discipline identified in AFI 17-130 Cybersecurity Program Management with the purpose of implementing appropriate measures to protect all Air Force Information System (IS) resources and sensitive or classified information.
- Ensure the employment of measures and controls taken to deny unauthorized personnel information derived from ISs of the United States Government related to national security and to ensure the authenticity of such ISs. Encrypting information is one method of protecting information from adversaries.
- Applying security measures (e.g. cryptographic solutions, transmission security, and emission security) to communications and information systems related to classified or sensitive government information, prevents the possibility of loss, which could adversely affect national security interests. It also includes applying physical security measures to COMSEC information or materials.
3
Q
The National Security Agency (NSA)
A
- The National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses both signals intelligence (SIGINT) and cybersecurity.
- Tasked with preventing foreign adversaries from gaining access to classified national security information.
- Formed in 1952, the National Security Agency (NSA) took over responsibility for all U.S. Government encryption systems. Nowadays, all military encryption is standardized by the NSA guidance.
4
Q
Classifying Crypto
A
- The NSA ranks cryptographic products or algorithms by a certification called product types. Each Type Product requires a Type Key at the appropriate level to encrypt the information. The CNSSI No. 4009 National Information Assurance Glossary defines the Type 1, 2, 3, and 4 products.
- Type 1: For encrypting and decrypting classified and sensitive national security information.
- Type 2: For encrypting or decrypting sensitive national security information.
- Type 3: For encrypting or decrypting unclassified sensitive U.S. Government or commercial information, and to protect systems requiring protection mechanisms consistent with standard commercial practices.
- Type 4: For unevaluated commercial cryptographic equipment that are neither NSA nor NIST certified for any Government usage. These products may contain either vendor proprietary algorithms, algorithms registered by NIST, or algorithms registered by NIST and published in a Federal Information Processing Standard (FIPS).
5
Q
(P.2) Classifying Crypto
A
- Classifications of encryption-device types are further broken down into two releasable categories:
- Suite A: (Confidential through Top Secret) A specific set of classified cryptographic algorithms used for the protection of some categories of restricted mission critical information.
- Suite B: (Confidential through Secret) A specific set of cryptographic algorithms suitable for protecting both classified and unclassified national security systems and information throughout the US government and to support interoperability with allies and coalition partners.
6
Q
Cryptography
A
- The art and science of making and breaking codes and ciphers.
- NSA/CSS is responsible for creating the systems that protect U.S. communications and for analyzing systems and communications used by foreign powers.
- Making a code or cipher system is called cryptography. Those who try to “break” a cryptosystem are practicing cryptanalysis.
- Encryption is the process of converting information to a disguised form in order to send it across a potentially unsafe channel.
- Decryption is the reverse process, providing a means of revealing the information.
- Strong encryption techniques protect sensitive, valuable information against organized criminals, malicious hackers, or spies from a foreign military power.
- the advent of the information age, the value of cryptography in everyday life such as privacy, trust, electronic payments, and access control has become evident.
7
Q
Encryption Methods
A
- In cryptographic terminology, plaintext is the un-encoded or unsecure message; cipher text is the encrypted message.
- Encryption encodes the contents of the message in such a way that hides its contents from outsiders.
- Decryption is the process of retrieving the plaintext from the cipher text.
8
Q
Data Encryption
A
- Encryption and decryption methods make use of a key and a coding algorithm (aka. Scheme), so that you can only perform the decryption by possessing the proper key.
- Modern encryption schemes utilize the concepts of symmetric-keys and public-keys (aka. asymmetric keys).
- Symmetric Key: In symmetric-key schemes, the encryption and decryption keys are the same. Communicating parties must have the same key in order to achieve secure communication.
- Public Key: In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key that enables messages to be read.
9
Q
Advanced Encryption Standard
A
- one of the standard’s most used today is the symmetric-key algorithm Advanced Encryption Standard (AES), also known as “Rijndael”.
- The U.S. Government adopted this standard in 2001, moving away from the former Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES).
- DES had been the standard since 1977, but when tested in 1997, the coding could easily be broken within a day. In 1998, 3DES was implemented, using a method that encrypted the message three-times over.
- While DES and 3DES would cypher using 56-bit encryption, AES proved to be a much-needed upgrade, providing encryption using three different key lengths: 128, 192, and 256 bits.
- Confidential and Secret information requires AES of 128-bit key lengths or higher.
- Top Secret requires AES 192 or 256- bit key length.
- AES is the most popular encryption standard in both the commercial and government sectors today.
10
Q
High Assurance Internet Protocol Encryption
A
- High Assurance Internet Protocol Encryption (HAIPE) provides a secure gateway that allows two enclaves to exchange data over an untrusted or lower-classification network, such as commercial internet.
- HAIPE provides a tactical advantage to military radio communications by introducing the ability to establish secure mobile ad hoc networking (MANET) capabilities for users.
- HAIPE is also being inserted into client devices that provide both wired and wireless capabilities.
11
Q
Secure Voice
A
- refers to the encryption of voice communications over a range of systems such as radio, telephone or internet protocol (IP).
- From the introduction of voice encryption during World War II to today, encryption techniques have evolved drastically.
- Digital technology has effectively replaced old analog methods of voice encryption. By using complex algorithms, voice encryption has become much more secure and efficient.
12
Q
Secure Communications Interoperability Protocol
A
- The Secure Communications Interoperability Protocol (SCIP) is a standard for secure voice and data communication.
- The protocol is platform-independent, meaning as it makes no assumptions about the underlying hardware.
- SCIP supports different modes of operation, including national (US) and multi-national modes with different types of encryptions.
- SCIP can be used over a variety of communication systems, such as public switched telephone network (PSTN), Integrated Services Digital Network (ISDN), radio links, satellites, cellular phones and internet (Voice over IP, or VoIP).
- The only requirement is a minimum bandwidth of 2400 Hz. Once a SCIP device connects to another SCIP device, they first negotiate the parameters and then choose the best possible mode of operation.
- The Secure Terminal Equipment (STE) is an example of a SCIP-compatible system using ISDN and PSTN phone lines to provide secure voice and data transfer.
13
Q
Voice Over Internet Protocol
A
- Voice over IP is a technology used to transmit voice communication over a data network using Internet Protocol.
- Secure Voice over IP (SVoIP) is when secure phones are used to protect information sent over the VoIP network.
- The vIPer Universal Secure Phone is an example of an SVoIP device, providing end-to-end encryption over commercial wired networks.
- Voice over Secure IP (VoSIP) is the same as SVoIP in that they are technologies used to securely transmit voice communications, but with VoSIP, the security is provided by separate encryption devices in the network rather than the secure phones themselves.
14
Q
Trunk Encryption
A
- Optical fiber, coaxial cable, microwave relay, and communication satellites transmit wideband data-stream signals that modern communication systems multiplex together. These wide-band circuits require very fast encryption systems.
- Trunk encryption, (aka. bulk encryption) provides a secure connection for multiple users in a network by encrypting a multiplexed line, which combines multiple data and/or voice lines into a single output.
- This type of encryption typically supports large amounts of data. The use of these devices allows for interoperability. The bulk-encryption method supports many end instruments within a network and is commonly placed on truncated circuits.
- The KG-84 (Figure 1-12) originated in the early 1980s as a dedicated loop encryption device for digital data. Measuring at 38 x 19.5 x 19 cm and weighing approximately 10 kg., the KG-84 (A/C) had a wide range of configuration options.
- In asynchronous mode, it can handle data rates between 50 – 9600 baud. In synchronous mode – using the internal clock – it can handle data up to 32,000 baud, and with an external clock connected it can even go up to 64,000 baud.
- Furthermore, the KG-84 is suitable for full-duplex, half-duplex and simplex communication. Over time, the device was replaced by the smaller, more versatile KIV-7 which contained an embedded KG-84 module.
15
Q
CRYPTOGRAPHIC EQUIPMENT
A
- Encryption protects information by converting it into a code (encoding) before transmission, then reconverting the code into readable intelligence (decoding) after reception.
- When an encryption device is correctly configured with the proper codes, it is considered “keyed.” The absence of the code renders the device useless; and it is then considered “un-keyed”.
- A keyed encryption device assumes the same security classification as the key that is inputted.
- Depending on the classification level, the device must be handled and secured in the same manner as other COMSEC items at that level.
- Un-keyed encryption devices are classified differently. When the device is empty and free of codes, COMSEC hardware is categorized as a “controlled cryptographic item” (CCI), and it is considered UNCLASSIFIED.