KYK-13 Operation

Total Page:16

File Type:pdf, Size:1020Kb

KYK-13 Operation KYK-13 Homepage Crypto KYK-13 Index Electronic Transfer Device - Wanted item Enigma The KYK-13 is a small electronic transfer device used by the military for the distribution of cryptographic material, commonly refererred to as Transmission Encryption Keys (TEK). It was developed by the US Hagelin National Security Agency (NSA) and uses the DS-102 protocol for key transfer. TheKYK-13 is also Fialka known by its National Stock Number NSN 5810-01-026-9618. Siemens The KYK-13 was very popular because of its KYK-13 key loader simplicity, small size and ease of use. A total of 6 Philips TEK variables can be stored in the internal memory Nema of the KYK-13, making it suitable for a variety of crypto devices, such as the KY-57 (Vinson), KY-99, Racal some SINCGARS radios, KG-84, BID/250 STK (Lamberton) and even the latest KIV-7. Transvertex It was also used with the STU-II/B, KY-68, Spendex-40, Spendex-50 (DBT) and some other Gretag crypto phones. In normal use, the device itself is Telsy filled with cryptographic material from of a key management system (KMS) or another KYK-13. Tadiran There has been some debate in the past as to the maximum length of the keys that can be stored inside USA the KYK-13. In some publications it is stated that it is only suitable for 90-bit keys and that later devices USSR (e.g. the CYZ-10) had to be used for the modern 128-bit keys [1]. This can not be true however, as all crypto phones above use the 128-bit key based SAVILLE algorithm. UK Voice The KYK-13 was first built in the 1980s and has been in service for over 30 years now. It was succeeded by a number of newer key fillers, such as the CYZ-10, the PYQ-10 and the Secure DTD2000 Hand System (SDS), but they all missed the simplicity of the KYK-13. In 2009, the US Army announced the KIK-30 RASKL (Really Simple Key Loader) which is called the modern KYK-13 replacement by its Mixers manufacturer [2]. Despite that, the KYK-13 is still used widely today (2012). The only real drawback is Phones that it only supports DS-102 and not the later DS-101 protocol. Spy sets Burst encoders Intercept Covert Radio Operation PC The KYK-13 is very easy to operate and has only a few controls. There are two rotary switches (mode Telex and address) with a recessed push button in between them (transfer). The device has two U-229 type connectors for connection to a crypto device: a male type (J1) and a female type (P1). These connectors are electrically identical and can also be used for cloning two KYK-13 devices. Donate Kits Shop At the right is the ON/OFF switch (MODE). At the left is the selector for the required crypto key compartment (1-6). The button at the center (Transfer) is used to initiate a transfer. Any activity is News indicated by the red LED. The unit can be ZEROIZED (i.e. all keys destroyed) by setting the key Events compartment selector to Z ALL (ZEROIZE ALL) and turning the MODE switch to Z (ZEROIZE). Wanted The KYK-13 is powered by a single internal 6.5V http://www.cryptomuseum.com/crypto/usa/kyk13/index.htm[29/08/2012 12:03:35] KYK-13 6.5V battery inside the KYK-13 battery that is installed in a small compartment at Contact the rear of the unit. A small aluminium panel with Links two screws gives access to the battery and allows it to be replaced within minutes. The image on the right shows the KYK-13 after the panel has been removed. Initially, the KYK-13 was used with the Mercury- based BA-1372/U battery, which has now been superceeded by the better BA-5372/U Lithium Manganese Dioxide battery. This battery is still available for a variety of sources. The design of the KYK-13 is similar to the MX-18290 Transmission Security Key Fill Device, featuring a similar case, similar controls and identical connectors. The KYK-13 however, is much smaller and can be used for cryptographic keys, whilst the MX-18290 is only suitable for transferring Frequency Hopping tables, also known as Transmission Security Keys (TSK). In use Although the KYK-13 can be connected to any DS-102 compatible device by means of a so-called fill cable, it is constructed in such a way that it can be fitted directly to the FILL connector of most crypto devices. As it has both a male-type and a female-type connector, one will always fit. KY-68 Using the KYK-13 on a KY-68 crypto phone Just as an example, the KYK-13 is shown here on top of the KY-68 military crypto phone that was used in the US Army during the 1990s. It is connected directly to the FILL connector of the KY- 68, and was used for transferring various types of keys. More about the KY-68 Spendex 40 The KYK-13 was also a popular device outside the US Army. The image on the right shows a KYK-13 unit connected to a Philips Spendex-40 military- grade crypto phone. It is used here to load the Traffic Encryption Keys (TEK) into the secure telephone. More about Spendex 40 Over the years, the KYK-13 has arguably become the most popular fill device of all times. In fact it was so popular that it was always in short supply. It is used all over the world with a variety of devices, ranging from crypto phones and other cipher machines, to frequency hopping radios (FH) and GPS http://www.cryptomuseum.com/crypto/usa/kyk13/index.htm[29/08/2012 12:03:35] KYK-13 devices. It is the standard by which all later key fillers are referenced. Interior The KYK-13 is a powerful yet rather simple device. It could be serviced at the depot and can be opened by removing the four bolts at the corners of the front panel. After removing the front panel, the interior becomes visible, revealing the solder side of the main Printed Circuit Board. The Printed Circuit Board (PCB) is held in place by The main PCB removed from the KYK-13 four small cross-head bolts and contains a connector (at the other side) that slots directly into another PCB that contains the controls. After removing the bolts, the PCB and easily be lifted off the lower PCB. The image on the rights shows the main PCB aside the KYK-13, with its component side facing upwards. The double-sided PCB is relatively simple and contains only a handful of components. At the lower half is the black sockets for the lower PCB. The rest of the PCB contains only two critical components: the main controller (ON512432) and a static RAM memory chip (ON202178). Both chips are custom made (OEM) by Harris. The main controller is probably a custom-designed Application Specific Integrated Circuit or ASIC. Judging from the date codes on both chips, the device shown here was made in 1986. Please note that neither the KYK-13 nor its documentation is classified or otherwise restricted. Only when the device is loaded with a valid key, it becomes classified to the level of the key. KYK-13 is approved by the NSA for the distribution of Type-1 cryptographic keys. References 1. Kathleen Hickey, DID modernizes cryptographic device Defense Systems website, 12 November 2009. Retrieved May 2012. 2. Sypris Electronics, RASKL KIK-30 Retrieved May 2012. 3. Enhanced Online News, Sypris Electronics Awarded Multi-Year $200 Million Contract... 11 November 2009. Retrieved May 2012. Further information KYK-13 on Wikipedia KYK-13 on Jerry Proc's website The similar looking MX-18290 fill device Other transfer devices Other American crypto devices http://www.cryptomuseum.com/crypto/usa/kyk13/index.htm[29/08/2012 12:03:35] KYK-13 Main crypto page Any links shown in red are currently unavailable. If you like this website, why not make a donation? © Copyright 2009-2012, Paul Reuvers & Marc Simons. Last changed: Sat,16 Jun 2012.17:20:05 http://www.cryptomuseum.com/crypto/usa/kyk13/index.htm[29/08/2012 12:03:35].
Recommended publications
  • Principal Technical Characteristics of U.S. Marine Corps Communication-Electronics Equipment
    TM 2000-OD/2C U.S. MARINE CORPS TECHNICAL MANUAL PRINCIPAL TECHNICAL CHARACTERISTICS OF U.S. MARINE CORPS COMMUNICATION-ELECTRONICS EQUIPMENT THIS PUBLICATION IS REQUIRED FOR OFFICIAL USE OR FOR ADMINISTRATIVE OR OPERATIONAL PURPOSES. DISTRIBUTION IS LIMITED TO U.S. GOVERNMENT AGENCIES ONLY. OTHER REQUESTS FOR THIS DOCUMENT MUST BE REFERRED TO: COMMANDANT OF THE MARINE CORPS (ARD) WASHINGTON, D.C. 20380-0001. DESTRUCTION NOTICE: FOR UNCLASSIFIED, LIMITED DOCUMENTS, DESTROY BY ANY METHOD THAT WILL PREVENT DISCLOSURE OF CONTENTS OR RECONSTRUCTION OF THE DOCUMENTS. FOR OFFICIAL USE ONLY DECEMBER 2005 PCN 180 002310 00 TM 2000-OD/2C UNITED STATES MARINE CORPS Marine Corps Systems Command Quantico, Virginia 22134-5010 30 December 2005 1. This Technical Manual (TM), authenticated for Marine Corps use and effective upon receipt, provides technical characteristics information for Marine Corps Communication-Electronics Equipment. 2. This manual supersedes TM 2000-15/2B dated April 1993. 3. Submit notice of discrepancies or suggested changes on a NAVMC 10772. The NAVMC may be submitted via the Internet using website https://pubs.ala.usmc.mil/navmc, scrolling down to the NAVMC 10772 Tracking Program and following instructions provided. It may also be submitted by electronic mail to [email protected], or by mailing paper copy NAVMC 10772 in an envelope addressed to Commander, Marine Corps Systems Command, Attn: Assistant Commander Acquisition and Logistics (LOG/TP), 814 Radford Blvd, Suite 20343, Albany, Georgia 31704-0343. BY DIRECTION OF THE COMMANDER MARINE CORPS SYSTEMS COMMAND OFFICIAL: KATRINA G. WAHL JAMES L. RIORDAN Product Group Director, PGD-11 Product Group Director, PGD-12 Marine Corps Systems Command Marine Corps Systems Command DISTRIBUTION: PCN 180 002310 00 1/(2 blank) RECORD OF CHANGES CHANGE DATE TITLE OR BRIEF ENTERED BY NO.
    [Show full text]
  • 0303140N Information Systems Security Program (ISSP)
    UNCLASSIFIED CLASSIFICATION: EXHIBIT R-2, RDT&E Budget Item Justification DATE: February 2006 APPROPRIATION/BUDGET ACTIVITY R-1 ITEM NOMENCLATURE RESEARCH DEVELOPMENT TEST & EVALUATION, NAVY / BA-7 0303140N Information Systems Security Program (ISSP) COST ($ in Millions) FY 2005 FY 2006 FY 2007 FY 2008 FY 2009 FY 2010 FY 2011 Total PE Cost 25.696 21.569 23.037 28.535 33.100 31.316 32.601 0734 Information Systems Security 15.799 18.196 21.038 26.347 30.955 29.119 30.371 0734 Communications Security 2.089 2.073 1.999 2.188 2.145 2.197 2.230 9999 Congressional Plus Up 7.808 1.300 Quantity of RDT&E Articles (U) A. MISSION DESCRIPTION AND BUDGET ITEM JUSTIFICATION: (U) The goal of the Navy Information Systems Security Program (ISSP) is to ensure the continued protection of Navy and Joint information, telecommunications, and information systems from hostile exploitation and attack. The ISSP is the Navy’s implementation of statutory and regulatory requirements specified in Presidential Decision Directive 63, the Computer Security Act of 1987 (Public Law 100-235), Appendix III of Office of Management and Budget (OMB) Circular A-130, and DOD Directive 8500.1. ISSP activities address the triad of Defensive Information Operations defined in Joint Publication 3-13; protection, detection, and reaction. Evolving detection and reaction responsibilities extend far beyond the traditional ISSP role in protection or Information Security (INFOSEC). Focused on FORCEnet supporting the highly mobile forward-deployed subscriber, the US Navy’s implementation of Network-Centric Warfare (NCW) places demands upon the ISSP, as the number of users dramatically increases and the criticality of their use escalates.
    [Show full text]
  • Unclassified// for Official Use Only National Security
    UNCLASSIFIED//FOR OFFICIAL USE ONLY NATIONAL SECURITY AGENCY NAG-16F (U) FIELD GENERATION AND OVER-THE-AIR DISTRIBUTION OF COMSEC KEY IN SUPPORT OF TACTICAL OPERATIONS AND EXERCISES (U) HANDLING INSTRUCTIONS 1. (U) This document is effective upon receipt and supersedes NAG-16E, dated January 1999, which should be destroyed. 2. (U) Changes to this document will be promulgated by printed or message amendments that are to be entered upon receipt. Persons entering such amendments are expected to record entry on the Record of Amendments page. 3. (U) This document in not accountable in the COMSEC Material Control System. It may be reproduced without report, and extracts from it that are marked “UNCLASSIFIED//FOR OFFICIAL USE ONLY” may be made for official purposes. 4. (U) This document and its extracts may be used in aircraft. 5. (U) Foreign release of this document must be approved by the Director, National Security Agency. MAY 2001 UNCLASSIFIED//FORUNCLASSIFIED// OFFICIAL USE ONLY FOR OFFICIAL USE ONLY UNCLASSIFIED NAG-16F RECORD OF AMENDMENTS DATE AMEND NO. BY WHOM ENTERED ENTERED UNCLASSIFIED ORIGINAL UNCLASSIFIED//FOR OFFICIAL USE ONLY NAG-16F (U) FOREWORD 1. (U//FOUO) Where Are We Heading? - A major evolution in communications security (COMSEC) keying technology has begun. Under the Electronic Key Management System (EKMS) program, standards, hardware, and applications are being developed to apply state of the art automation to generate, distribute, load, control, and account for COMSEC key. The program incorporates sufficient backward compatibility to assure that both future, automated key and existing, common electronic key can be handled. EKMS hardware is being fielded, but full development of tailored tactical key generation and distribution programs may take several more years.
    [Show full text]
  • Radio Operator Handbook for Soldiers Assigned, Attached, Or Task-Organized As Radio Operators
    U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only Handling Instructions for CALL Electronic Media and Paper Products Center for Army Lessons Learned (CALL) authorizes official use of this CALL product for operational and institutional purposes that contribute to the overall success of U.S., coalition, and allied efforts. The information contained in this product reflects the actions of units in the field and may not necessarily be approved U.S. Army policy or doctrine. This product is designed for official use by U.S., coalition, and allied personnel and cannot be released to the public without the expressed written consent of CALL. This product has been furnished with the expressed understanding that it will be used for official defense-related purposes only and that it will be afforded the same degree of protection that the U.S. affords information marked “U.S. UNCLASSIFIED, For Official Use Only [FOUO]” in accordance with U.S. Army Regulation (AR) 380-5, section 5-2. Official military and civil service/government personnel, to include all coalition and allied partners may paraphrase; quote; or use sentences, phrases, and paragraphs for integration into official products or research. However, integration of CALL “U.S. UNCLASSIFIED, For Official Use Only [FOUO]” information into official products or research renders them FOUO, and they must be maintained and controlled within official channels and cannot be released to the public without the expressed written consent of CALL. This product may be placed on protected UNCLASSIFIED intranets within military organizations or units, provided that access is restricted through user ID and password or other authentication means to ensure that only properly accredited military and government officials have access to these products.
    [Show full text]
  • NGLD-M) System Requirements Document (SRD)
    UNCLASSIFIED//FOR OFFICIAL USE ONLY System Requirements Document (SRD) Next Generation Load Device – Medium (NGLD -M) Date: Authenticated by: _____________________________________ First Name MI. Last Name Prepared by: Chief or Lead Engineer Day Month Year Product Lead COMSEC (Ex: 01 May 2019) Project Lead, Network Enabler Aberdeen Proving Ground, MD 21005 Approved by: _____________________________________ DISTRIBUTION STATEMENT X: Distribution authorized to U.S. Government agencies and private First Name MI. Last Name individualsNGLD -orM enterprises SRD eligible to obtain export-controlled technical Program Manager 1 dataSource in accordance Selection Information with regulations - See FAR implementing2.101 and 3.104 10 U.S.C.Use 140c. or disclosure of data contained onDay this sheet Month is subject toYear the restriction on the title page of this proposal. Other requests must be referred to SFAE-CCC-MC. UNCLASSIFIED//FOR OFFICIAL(Ex: USE ONLY01 May 2019) UNCLASSIFIED//FOR OFFICIAL USE ONLY Next Generation Load Device – Medium (NGLD-M) System Requirements Document (SRD) CHANGE HISTORY Change Version Date Initial - RFI 1.0 01/10/2019 Draft RFP 2.0 05/20/2019 Draft RFP - Final 3.0 05/29/2019 NGLD-M SRD ii Source Selection Information - See FAR 2.101 and 3.104 Use or disclosure of data contained on this sheet is subject to the restriction on the title page of this proposal. UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY Next Generation Load Device – Medium (NGLD-M) System Requirements Document (SRD) Contents 1. (U) SCOPE.............................................................................................................................. 1 1.1 (U) System Identification ............................................................................................. 1 1.2 (U) System Overview ................................................................................................... 1 1.3 (U) Document Overview .............................................................................................
    [Show full text]