STU-III System Level Description and Network Applications

Total Page:16

File Type:pdf, Size:1020Kb

STU-III System Level Description and Network Applications DEFENSE COMMUNICATIONS ENGINEERING CENTER STU-III SYSTEM LEVEL DESCRIPTION 00 j2 ""AND I -NETWORK APPLICATIONS " NOVEMBER 1986 * REVISED JUNE 1988 DTIC ELECTE f .JU U 2 71988 H o APPROVED FOR PUBLIC RELEASE: DISTRIBUTION UNUMITED IN '. REPORT DOCUMENTATION PAGE 1. REPORT SECURITY CLASSIFICATION 1b. RESTRICTIVE MARKINGS UNCLASSIFIED 2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABILITY OF REPORT DD 254 Approved for Public Release: Distribution 2b. DECLASSIFICATION/DOWNGRADING SCHEDULE Unlimited a. PERFORMING ORGANIZATION REPORT NUMBER(S) S. MONITORING ORGANIZATION REPORT NUMBERIS) 6a NAME OF PERFORMING ORGANIZATION b1.OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION (If opplicbil. Defense Communications Engineering Center Computer Sciences Corporation CSC (DCEC) 6c. ADDRESS (City. State and ZIP Codei 7b. ADDRESS (City. State and ZIP Code) 6565 Arlington Boulevard 1860 Wiehle Avenue Falls Church, VA 22046 Reston, VA 22090 84 NAME OF FUNDING/ISPONSORING So. OFFICE SYMBOL 9. PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (it applicable DCEC R630 DCAI00-87-C-0013 8k ADDRESS (City. State and ZIP Code) 10. SOURCE OF FUNDING NOS. PROGRAM PROJECT TASK WORK UNIT Reston, VA ELEMENT NO. NO. NO. NO. 87-18A 11. TITLE Il ciude S curit> ChaJssbcatiOni STU-III System Level Description and Network Applications 12. PERSONAL AUTHORIS; Wilmot, Roger 138& TYPE OF REPORT 13b. TIME COVERED 14. DATE OF REPORT fYr., Mo., Day) 15. PAGE COUNT Technical FROM 1988 TO 880630 35 16 SUPPLEMENTARY NOTATION 17 COSATI CODES 18. SUBJECT TERMS lCorit'nur on reverse if neceuary' and identify by block numberi FIELDO GROUP SUB GR STU-III, RED Switch, TRI-TAC, Radio Wireline Interface, IVSN, DSN, Conferencing 19 ABSTRACT rContinue on reverse if ncessary and identify by block numberI 3 This paper serves as the system level description of the Secure Terminal Unit Type III (STU-III) and its interfaces in a variety of DoD switched voice network appl'cations. The STU-III terminal is being developed by the National Security Agenc:r7NA-6nd is intended to replace several thousand existing analog clear voice telephone instruments in the DoD. Its operation and interface to the switched networks is essentially the same as for existing or planned clear voice telephones. The STU-III family of terminals includes two types of Low Cost Terminals (LCT-l and LCT-2), a STU-II compatible terminal (STU-III/A) and a ruggedized mobile/portable terminal (STU-III/MPT). The LCT-l is intended to be the primary DoD secure voice terminal, whereas the STU-III/A and STU-III/ MPT will be used for special applications, e.g., for interoperability with the NATO STU-II terminals and tactical operations requirements. 20 DISTR, BUTION/AVAILABI LITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION UNCLASSIFIED/UNLIMITED 7 SAME AS RPT. 9' DTIC USERS 0 UNCLASSIFIED 22s NaME OF RESPONSIBLE INDIVIDUAL 22b. TELEPHONE NUMBER 22c. OFFICE SYMBOL (include Arra Code) Mr. Bobby Donald (703) 437-2150 R630 DCS SWITCHED NETWORKS SYSTEMS ENGINEERING AND TECHNICAL ASSISTANCE STU-III SYSTEM LEVEL DESCRIPTION AND NETWORK APPLICATION9 REVISED *- JUNE 1988 Prepared for: DEFENSE COMMUNICATIONS AGENCY DEFENSE COMMUNICATIONS ENGINEERING CENTER 1860 WIEHLE AVENUE RESTON, VIRGINIA 22090 Under Contract No. DCA100-87-C-0013 Prepared by: Computer Sciences Corporation - 3160 Fairview Park Drive * Falls Church, Virginia 22042 '-." . r TABLE OF CONTENTS Page Section 1- Introduction......................................... 1 Section 2 - STU-III Physical Description and Basic Features. 2 2.1 Physical Description................................... 2 2.2 STU-III Features and options........................... 2 Section 3 - System Overview, Interfaces, and Call Procedures 7 3.1 System Overview......................................... 7 3.2 STU-III Network Interfaces............................. 7 73.2.1 Secure Nonsecure Call Features........................ 12 3.3 STU-III to STU-III Call Procedures.................... 16 3.4 Interface to RED Switches.............................. 16 3.4.1 Trunk Interface Mode ........................ 16 03.4.2 RED Switch Interface Call Descriptions for Trunk Interface Mode..............................17 3.4.3 User Access Line Interface Mode....................... 19 3.5 Interface to DSN STU-III Conference Units............. 19 3.5.1 Interface Description.................................. 20 3.5.2 Conference Call Description........................... 20 3.6 Tactical Radio/Wireline Interfaces (RWI's) to ANDVT/VINSON......................................... 20 3.6.1 Generalized RWI Description........................... 22 3.6.2 RWI Call Description................................... 24 Q.~3.7 STU-III Interface to TRI-TAC (AN/TTC-39).............. 24 3.7.1 STU-III Deployment with TRI-TAC AN/TTC-39............. 24 3.7.2 Manual RED Switch Interface........................... 25 3.8 NATO Interface......................................... 28 .,~.Section 4 - Transmission........................................ 31 Section 5 - Status of STU-III Logistics Support Planning . 32 5.1 Low Cost Terminal (LCT)................................ 32 5.2 STU-III/A and STU-III/MPT.............................. 32 Bibliography..................................................... 33 * Glossary of Terms and Abbreviations............................. 34 D iC TAM~ U1miounce d IN:SPECTEDA Dj stribiltion/ Availatilit,, Code I Avnil and/or' Dist Special w Ii I 0ii If II IIC111 1 1 ,1 1 11 g-w- L=&Nm LIST OF ILLUSTRATIONS Figure Page 1 STU-III Network Applications ............................ 8 2 STU-III Two-Wire Network Interface .................... 10 3 STU-III Four-Wire Network Interface ................... 11 4 RED Switch Interface to Switched Networks ............. 18 5 Current General Purpose STU-III Conference Approach 21 6 Tactical RWI Interoperability .......................... 23 7 STU-III/TTC-39 Interoperability (1)................... 26 8 STU-III/TTC-39 Interoperability (2)................... 27 9 NATO Interoperability .............................. 29 LIST OF TABLES 1 Vendor Data Port Modes (LCT-1) .......................... 4 2 STU-III/LCT-1, STU-III/A and STU-III/MPT Interconnection Matrix ............................... 9 3 STU-III LCT-I Application Configurations .............. 13 4 LCT-l Interface Configurations ......................... 14 C ~iii 4 SECTION 1 - INTRODUCTION This paper serves as the system level description of the Secure Terminal Unit Type III (STU-III) and its interfaces in a variety of DoD switched voice network applications. The STU-III f terminal is being developed by the National Security Agency (NSA) and is intended to replace several thousand existing analog clear ri voice telephone instruments in the DoD. Its operation and interface to the switched networks is essentially the same as for existing or planned clear voice telephones. Installation of a STU-III in the United States can be very simple; normally, installation for a two-wire application consists only of inserting I'. a telephone connector (e.g., RJ11C) and an AC power plug into the appropriate receptacles. The STU-III family of terminals includes two types ot Low Cost Terminals (LCT-1 and LCT-2), a STU-II compatible terminal (STU-III/A), and a ruggedized mobile/portable terminal (STU-III/MPT). The STU-III/LCT-I, STU-III/A, and STU-III/MPT are intended for all levels of government classified traffic. The STU-III/LCT-2 is intended for sensitive unclassified traffic. The LCT-1 and the LCT-2 units will be available in at least three vendor variations; i.e., AT&T, Motorola, and RCA. The STU-III/A is in the Low Rate Initial Production (LRIP) phase, deliveries are expected by October, 1989 from Motorola. The MPT .p.is currently in the development phase with Motorola. A production - contract is anticipated in early 1989. All STU-III terminals are interoperable at 2.4 kb/s using an enhanced Linear Predictive Coder voice algorithm. The LCT-l is intended to be the primary DoD secure voice terminal, whereas the STU-III/A and STU-III/MPT will be used for special applications (e.g., for interoperability *_ with the NATO STU-II terminals and tactical operations . requirements. 1,1 04 SECTION 2 - STU-III PHYSICAL DESCRIPTION AND BASIC FEATURES 2.1 PHYSICAL DESCRIPTION The STU-III consists of a deskset, handset, and, depending upon the vendor and/or location, a separate AC power adapter. The *approximate range of physical parameters is: 225-900 cubic inches, 8-15 lbs., and 14-30 watts. This range of parameters varies respectively in size, weight, and power depending upon the vendor and the type of terminal provided (i.e., STU-III/LCT, SSTU-III/A, or STU-III/MPT). 2.2 STU-III FEATURES AND OPTIONS The STU-III terminals will incorporate the following features and options: i. STU-III/LCT-1 a. Common Features (1) Clear and secure voice operating modes (2) Digital voice processing based on Linear Predictive Coding, Enhanced (LPC-10e) at 2.4 kb/s for the secure mode (3) Full-duplex operation over two-wire access lines, with internal echo cancellation (4) Half-duplex operation (VOX) over two-wire access * lines J r (5) Secure data capability at 2.4 kb/s, synchronous. (6) EMI/TEMPEST protection * (7) Crypto keying using the FIREFLY II algorithm (8) Precedence tone dialing for two- and four-wire applications 2 0, * r* .V. *.. W.. (9) Preempt tone recognition (10) Secure dialing mode, which allows address information to be passed securely to a distant interface, e.g., conference bridge or RED switch. b. Common Options (1) Foreign
Recommended publications
  • Secure Terminal Equipment)
    STE (Secure Terminal Equipment) GENERAL Secure Terminal Equipment (STE) is the next generation STU-III being designed to provide services far beyond the present STU-III devices. The STE offers backward compatibility with STU-III, while taking advantage of digital communications protocols like ISDN and future ATM. The initial release of STE will be an ISDN terminal. STE is designed to take advantage of the key and privilege management infrastructure developed under the Multi-level Information Systems Security Initiative (MISSI) Fortezza Plus Cards. The cryptographics for STE will be located on a removable Personal Computer Memory Card International Associate (PCMCIA) card. This card will be procured separately. SECURE TERMINAL EQUIPMENT (STE) TACTICAL This tactical terminal, manufactured by L-3 Communications, (a division of Lockheed Martin) currently provides secure digital communication for military operational environments. The design is based on an open modular architecture common with the L-3 STE-Office. STE-Tactical is compatible with the Portable Uninterruptable Power Supply System (PUP). The terminal offers backward compatibility with STU-III and DNVT and provides connectivity to ISDN, PSTN, TRI-TAC/MSE and RS-530A ( eg. MILSTAR) networks. Cryptography for the STE is provided by a removable PCMCIA ( Fortezza Plus) based card. The STE as it appeared in 1994. (Photo courtesy Lockheed Martin, now L-3 Communications) SPECIFICATIONS Security Features: Information Protected by PCMCIA Crypto Card . U.S.. Government FORTEZZA Plus, Top Secret to Protected . Secure Access Control System (SACS) - Access Control List (ACL) - Maximum and Minimum Security Levels . Alphanumeric Display for Identification and Authentication . Tempest Design Integrity . Telephone Security Group (TSG) Qualified .
    [Show full text]
  • Non-Proprietary FIPS 140-2 Security Policy: KMF/Wave/Traffic Cryptr
    Non-Proprietary FIPS 140-2 Security Policy: KMF/Wave/Traffic CryptR Document Version: 1.5 Date: January 9, 2020 Copyright Motorola Solutions, Inc. 2020 Version 1.5 Page 1 of 30 Motorola Solutions Public Material – May be reproduced only in its original entirety (without revision). Table of Contents KMF/Wave/Traffic CryptR ...................................................................................................... 1 1 Introduction .................................................................................................................... 4 1.1 Module Description and Cryptographic Boundary ......................................................................6 2 Modes of Operation ........................................................................................................ 8 2.1 Approved Mode Configuration ....................................................................................................8 3 Cryptographic Functionality ............................................................................................. 9 3.1 Critical Security Parameters ...................................................................................................... 11 3.2 Public Keys ................................................................................................................................. 15 4 Roles, Authentication and Services ................................................................................ 16 4.1 Assumption of Roles .................................................................................................................
    [Show full text]
  • Secure Communications Interoperability Protocols (SCIP)
    UNCLASSIFIED/UNLIMITED Secure Communications Interoperability Protocols (SCIP) John S. Collura NATO C3 Agency P.O. Box 174 2501 CD The Hague THE NETHERLANDS [email protected] ABSTRACT The concept of NATO Network Enabled Capabilities, (NNEC) including network-ready communications systems requires a fundamental shift in the paradigms and policies used by NATO and the NATO nations. Enabling these concepts down to the tactical mobile user community will be a challenge. Gone are the days where a single nation brings a combat-ready brigade to a NATO sponsored engagement. Modern brigade-level NATO deployed forces may consist of contributions from many nations. This can be highlighted by the fact that one nation might provide command and control capabilities, another logistics, a third special operations, etc. If communications equipments are purchased from multiple sources in multiple nations, and used in-theatre by the nations contributing to a multinational NATO Response Force formation, (brigade, battalion or corps) there are some inherent issues that require resolution to enable efficient network-ready interoperable communications systems. Adding to these issues are the requirements for secure communications and key management. Which nation or entity will provide the security authority in the deployed segment? Will it be the nation supplying command and control, security, logistics, or some other? Or will it be a NATO entity such as NATO HQ, JFHQ Lisbon, JFC Naples, JFC Brunsum, SHAPE, NAMSA, etc.? Who will be responsible for the in-theatre distribution of cryptographic keying material for the operation? When working with coalitions, how does one define communities of interest such that there is appropriate isolation of operations between different coalitions? Can capabilities be eliminated when a coalition member ceases to be friendly? Efficient net-ready interoperable communications systems are one of the core enabling capabilities for future effective NATO engagements.
    [Show full text]
  • TB 380-41 Final!
    klg DISTRIBUTION RESTRICTION STATEMENT The technical or operational information in this manual is required solely for official use; therefore, distribution is authorized to U.S. Government agencies only. This determination was made on 1 January 1993. For further information, see page i of this document. WARNING: Military or civilian personnel who misuse or disclose to unauthorized persons information marked For Official Use Only (FOUO) may be subject to administrative sanctions brought under UCMJ Article 92, or in accor- dance with AR 690-700, Chapter 751, Table 1-1. Elec- tronic copies made of any publication herein must (1) bear the Four Official Use Only marking, and (2) include this WARNING in its entirety. Protective marking is in accordance with paragraph 3-200, Exemption 3a, AR 25-55. Destroy by any method that will prevent disclosure of contents or reconstruction of the document. Headquarters, Department of the Army Date of this Publication is 1 August 2003. Current as of 1 July 2003. This bulletin supersedes TB 380-41, October 1994 and rescinds the use of DA Forms 2008 and 2009. FOR OFFICIAL USE ONLY TB 380-41 DISTRIBUTION RESTRICTION STATEMENT OUTSIDE THE U.S. GOVERNMENT RELEASE: Requests from outside the U.S. Government for release of this publication under the Foreign Military Sales Program must be made to Commander, U.S. Army Security Assistance Center, ATTN: AMSAC-MI/I, 5002 Eisenhower Ave., Alexandria, VA 22333-0001. Request from outside the U.S. Government for release of this publication under the Freedom of Information Act must be made to the Director, Communications-Electronics Command (CECOM), Communications Security Logistics Activity (CSLA) at ATTN: SELCL-ID-P3, U.S.
    [Show full text]
  • Ky-57 Vinson
    KY-57 VINSON Homepage Crypto KY-57 (VINSON) Index Voice encryption unit Enigma The KY-57 was a wide-band voice encryption unit that was developed in the USA during the 1970s as a replacement of the NESTOR cryptographic products, such as the KY-38. It was suitable for use with a Hagelin wide range of military radios and telehone lines. As part of the VINSON family of devices, it was the main Fialka crypto 'workhorse' of the US Army during the 1980s. Even today, many radios and voice encryption devices are still backwards compatible with the KY-57, that is also known as the TSEC/KY-57. The Siemens airborne version of the KY-57 is called the KY-58. Philips The KY-57 uses the NSA-developed Type-1 KY-57 voice encryption unit Nema SAVILLE cryptographic algorithm. When used in combination with a radio transceiver, such as the Racal SINCGARS non-ICOM RT-1439/VRC, the KY-57 STK allows signal fades or losses for up to 12 seconds without losing synchronization. Transvertex The KY-57 was eventually superceeded by the KY- Gretag 99 that offered newer - more advanced - Telsy cryptographic algorithms, but that was still backwards compatible with the KY-57. Later Tadiran SINCGARS ICOM radios, such as the RT-1523, had built-in KY-57 (VINSON) compatibility. USA USSR Both voice and data can be encrypted with the KY-57. Voice data is digitized using Continuous Variable Slope Delta modulation (CVSD), similar to other voice crypto systems of the same era, such as the UK Philips Spendex-10 , the Spendex 50 and the Telsy TS-500.
    [Show full text]
  • KY-58 (Vinson)
    KY-58 (Vinson) The KY-57/58 is a member of the VINSON family. The VINSON family consists of wideband secure voice (WBSV) units developed by the National Security Agency to provide line of sight half-duplex voice and data encryption at 16 Kbps. The KY-57/58 provides security for AM/FM, VHF, UHF, half-duplex PTT combat net radios and tactical wireline systems when used with the HYX-57. Also used by non-tactical users for high-level communications in the local wideband telephone networks and wideband satellite terminals. The KY-57 is the manpack/vehicular model and the KY-58 is the airborne/shipborne version. The KY-57/58 is certified to pass data up to TOP SECRET and accepts key from the family of Common Fill Devices and also incorporates remote keying. KY-57/58 production was completed in 1993. No further production is planned. KY-58 photo by Tim Tyler Tim Tyler comments."The photo above depicts the KY-58 unit inside a USCG HH-65C 'Dolphin' helicopter taken in September 2008. It is currently configured just for use on their 225-400MHz aircraft band radio. Supposedly, they're in the process of upgrading the HH-65 helos into an MH-65 (Special Ops capable) configuration which will have APCO P-25 compliant radios (with AES crypto, for talking to other DHS agencies) as well as ANDVT / KY-100 type crypto for communicating with the military-side of USCG ops". The photo above depicts a KY-58 RCU installation in an A-10 attack aircraft.
    [Show full text]
  • A History of U.S. Communications Security (U)
    A HISTORY OF U.S. COMMUNICATIONS SECURITY (U) THE DAVID G. BOAK LECTURES VOLUME II NATIONAL SECURITY AGENCY FORT GEORGE G. MEADE, MARYLAND 20755 The information contained in this publication will not be disclosed to foreign nationals or their representatives without express approval of the DIRECTOR, NATIONAL SECURITY AGENCY. Approval shall refer specifically to this publication or to specific information contained herein. JULY 1981 CLASSIFIED BY NSA/CSSM 123-2 REVIEW ON 1 JULY 2001 NOT RELEASABLE TO FOREI6N NATIONALS SECRET HA~mLE YIA COMINT CIIA~HJELS O~JLY ORIGINAL (Reverse Blank) ---------- • UNCLASSIFIED • TABLE OF CONTENTS SUBJECT PAGE NO INTRODUCTION _______ - ____ - __ -- ___ -- __ -- ___ -- __ -- ___ -- __ -- __ --- __ - - _ _ _ _ _ _ _ _ _ _ _ _ iii • POSTSCRIPT ON SURPRISE _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ I OPSEC--------------------------------------------------------------------------- 3 ORGANIZATIONAL DYNAMICS ___ -------- --- ___ ---- _______________ ---- _ --- _ ----- _ 7 THREAT IN ASCENDANCY _________________________________ - ___ - - _ -- - _ _ _ _ _ _ _ _ _ _ _ _ 9 • LPI _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ I I SARK-SOME CAUTIONARY HISTORY __ --- _____________ ---- ________ --- ____ ----- _ _ 13 THE CRYPTO-IGNITION KEY __________ --- __ -- _________ - ---- ___ -- ___ - ____ - __ -- _ _ _ 15 • PCSM _ _ _ _ _ _ _ _ _ _ _ _ _ _
    [Show full text]
  • Link 16 Secure Voice J-Voice for the Entire Operations Team
    Product brief: Link 16 secure voice J-Voice for the entire operations team Since its early beginnings in the Vietnam War, Link 16 (L16) has been consistently improved and has subsequently developed into the primary military tactical data link for NATO and selected friendly nations. Commanders are able to employ L16 to exchange vast amounts of mission data between likewise equipped units in real time without fear of cyber attack or being subject to electronic counter measures. One key element of L16 capability is its ability to host secure voice channels – often referred to a J-Voice (Joint Tactical Information Distribution System – JTIDS) – and this is an area where Frequentis can add value. By using the field-proven and certified ground/air and ground/ground secure communications system iSecCOM, Frequentis provides the customer with unparalleled J-Voice connectivity to every iSecCOM position. Key features Link 16 secure voice iSecCOM enables Link 16 secure voice to be available at each operator position. Routed from the workstation via the Link 16 MIDS (multifunctional information distribution system) terminals, both channels A and B, (16kbps & 2.4kbps) are supported. Simplified communications and full control iSecCOM provides full-spectrum communication services, including all radio and telephony services, combined with selected data and Link 16 secure voice full radio remote control services. at a glance Designed by the operators and for the operators • Link 16 Secure Voice connectivity to combat aircraft Frequentis leverages decades of experience working • Embedded electronic-counter-counter- with operators to define the most user-friendly measures in every operator position HMI based on its field-proven, military-grade IT solutions used by multiple forces around the globe.
    [Show full text]
  • Provides for the Procurement of Secure Communications Equipment to Navy Ships, Shore Sites, Aircraft, Marine Corps, and United States Coast Guard
    UNCLASSIFIED BUDGET ITEM JUSTIFICATION SHEET DATE May 2009 APPROPRIATION/BUDGET ACTIVITY P-1 ITEM NOMENCLATURE SUBHEAD OP,N - BA2 COMMUNICATIONS & ELECTRONIC EQUIPMENT 3415 Information Systems Security Program (ISSP) 52DA FY 2008 FY 2009 FY 2010 FY 2011 FY 2012 FY 2013 FY2014 FY2015 TO COMP TOTAL QUANTITY COST (in millions) 121.319 100.855 119.054 Continuing Continuing Spares 0.442 0.425 0.319 PROGRAM COVERAGE: The Information Systems Security Program (ISSP) provides for the procurement of secure communications equipment to Navy ships, shore sites, aircraft, Marine Corps, and United States Coast Guard. ISSP protects information systems from unauthorized access or modification of information, and against the denial of service to authorized users or provision of service to unauthorized users. Information Assurance (IA) is a layered protection strategy, using Commercial Off-The-Shelf (COTS) and Government Off-The-Shelf (GOTS) hardware and software products that collectively provide an effective Network Security Infrastructure (multiple level security mechanisms and ability to detect and react to intrusions). IA is critical in protecting our ability to wage Network Centric Warfare (NCW). The following ISSP specific efforts will be funded under this program: SECURE VOICE: The Secure Voice program procures equipment that provides secure voice communication capabilities. Equipment to be procured in FY10-FY11 includes various secure voice strategic/tactical products (VINSON/Advanced Narrowband and Digital Voice Terminal (VACM), KSV-21, Next Generation Internet Protocol Phones (Next Gen IP Phones), Call Manager, Internet Protocol Tactical Shore Gateway (IP TSG), Navy Certificate Validation Infrastructure (NCVI) cards, and Secure Communication Interoperability Protocol (SCIP) Inter-Working Function (IWF).
    [Show full text]
  • Secure Voip Call on Android Platform
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Global Journal of Computer Science and Technology (GJCST) Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350 Secure Voip Call on Android Platform By Saruchi Kukkar Lovely Professional University Abstract - In the Secure voice call, the human voice shall be digitized by the Android APIs and the VOIP packets will travel over the SIP layer. The digitization process also includes the encryption phase wherein secure call technique is used in order to generate unique keys every time a call handshake is done. During the Secure Call key exchange, the caller party sends a Secure Call hello packet. Once that packet is positively acknowledged by the recipient party the handshake happens successfully and the call packets get encrypted. Using Secure call, digitized voice data is transformed into cipher text form on third generation GSM data or GPRS servers in android platform which results in a better encrypted voice speed and clarity. GJCST-E Classification: C.2.m Secure Voip Call on Android Platform Strictly as per the compliance and regulations of: © 2012 Saruchi Kukkar. This is a research/review paper, distributed under the terms of the Creative Commons Attribution- Noncommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/), permitting all non-commercial use, distribution, and reproduction inany medium, provided the original work is properly cited.
    [Show full text]
  • CSD 3324 SE Secure Telephone, Fax & Data Encryptor
    CSD 3324 SE Secure Telephone, Fax & Data Encryptor Providing integrated voice, fax and data secure communications for mission-critical government applications The CSD 3324 SE is an executive telephone with integrated secure voice, fax and data communications capabilities. The CSD 3324 SE is designed to provide strategic-level security with exceptional voice quality for government office applications. It also interoperates with TCC’s DSP 9000 radio base military encryptor to connect commanders with field forces. Secure Voice Encryption The CSD 3324 SE uses powerful, 128-bit Benefits encryption driving dual, full duplex Teltect-SE data encryption engines. The Strategic-level security DSP-based 9,600 bps vocoder provides Excellent recovered voice excellent voice quality with fallback quality (dual vocoder design) modes to 4,800 bps digital and DSP 9000 analog mode for secure voice Interoperates with DSP 9000 communications over severely degraded radio base military encryptor phone lines and radio channels. Operates over degraded telephone line conditions with Group 3 Fax Encryption auto-fallback Two-wire (RJ-11) Group 3 fax encryption is provided as a standard feature with Easily connects to any Group 3 auto-answer/auto-fax sense, which allows Operational Features fax machine Controlled access — User access to all incoming calls to be screened by the 128-bit encryption (Teltect-SE) telephone. If the call is not a fax call, the secure fax, data and voice communica- telephone rings, giving a user a second tions modes is restricted using user Secret Local Key based — chance to answer incoming voice calls. passwords. 800 keys User-friendly settings allow any incoming User customizable Teltect-SE Menu-based setup — User-friendly menus and outgoing fax call (plain or secure) to crypto algorithm be accepted.
    [Show full text]
  • The First Devices to Secure Transmission of Voice Were Developed Just After World War I
    F, 5 January Cabinet War Rooms SIGSALY The first devices to secure transmission of voice were developed just after World War I. They were substitution devices; they inverted frequencies. High frequencies were substituted for low frequencies and low frequencies were substituted for high frequencies. This was easy to do electronically. But, it was also easy to break. In fact, because much voice is in the middle frequencies and the middle frequencies are not changed much by inversion, it was sometimes possible to get a sense of the message just from the ciphertext. The A-3 scrambler … was based upon 1920s concepts. It divided the voice-frequency band into five subbands, inverted each of them, and then shifted the voice from one subband to another every 20 seconds. David Kahn Cryptology and the origin of spread spectrum In 1941, the United States was not at war although we were supporting the Allies, especially Britain, materially. The United States had a device to secure voice transmission called the A-3 Scrambler. This device used both substitution and transposition to encipher voice. Messages were chopped into small pieces, in each piece substitution was made by inverting frequencies, and the pieces were scrambled. This device was broken by the Germans during Fall 1941. The United States military was aware that the A-3 was not secure. On December 7, 1941, cryptanalysts in Washington, D.C., were in the process of breaking a long ciphertext from Tokyo to the Japanese embassy in Washington, D.C. William Friedman’s SIS team had earlier broken the Japanese diplomatic ciphers, but the naval ciphers had not yet been broken.
    [Show full text]