FASCINATOR
Encyclopedia
FASCINATOR is a series of Type 1  encryption
Encryption
In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

 modules designed in the late-1980s to be installed in Motorola
Motorola
Motorola, Inc. was an American multinational telecommunications company based in Schaumburg, Illinois, which was eventually divided into two independent public companies, Motorola Mobility and Motorola Solutions on January 4, 2011, after losing $4.3 billion from 2007 to 2009...

 digital-capable voice radios. These radios were originally built to accept a DES
Data Encryption Standard
The Data Encryption Standard is a block cipher that uses shared secret encryption. It was selected by the National Bureau of Standards as an official Federal Information Processing Standard for the United States in 1976 and which has subsequently enjoyed widespread use internationally. It is...

-based encryption module that was not approved by NSA for classified communications. The FASCINATOR modules replaced the DES units and can be used for classified conversations at all levels when used with appropriately classified keys. FASCINATOR operates at 12 kbit/s for encryption and decryption. It is not compatible with DES-based voice systems.

NSA originally supplied keys
Key (cryptography)
In cryptography, a key is a piece of information that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the particular transformation of plaintext into ciphertext, or vice versa...

 for FASCINATOR on paper tape for loading using KOI-18
KOI-18
The KOI-18 is a hand-held paper tape reader developed by the U.S. National Security Agency as a fill device for loading cryptographic keys, or "crypto variables," into security devices, such as encryption systems. It can read 8-level paper or PET tape, which is manually pulled through the reader...

 or KYK-13
KYK-13
The KYK-13 Electronic Transfer Device is a common fill device designed by the United States National Security Agency for the transfer and loading of cryptographic keys with their corresponding check word....

 fill device
Fill device
A fill device is an electronic module used to load cryptographic keys into electronic encryption machines. Fill devices are usually hand held and battery operated....

s and a special adaptor box and cable. The standard cryptoperiod
Cryptoperiod
A cryptoperiod is the time span during which a specific cryptographic key is authorized for use. Common government guidelines range from 1 to 3 years for asymmetric cryptography, and 1 day to 7 days for symmetric cipher traffic keys....

 was 7 days, i.e. keys had to be changed weekly.

FASCINATOR was adopted by the U.S government as Federal Standard 1023, which establishes interoperability requirements regarding the analog to digital conversion, encryption (with related synchronization),
and modulation of encrypted voice associated with frequency modulation (FM) radio systems employing 25 kHz channels and operating above 30 MHz. Voice is digitized using 12 kbit/s continuously variable slope delta modulation
Continuously variable slope delta modulation
Continuously variable slope delta modulation is a voice coding method. It is a delta modulation with variable step size Continuously variable slope delta modulation (CVSD or CVSDM) is a voice coding method. It is a delta modulation with variable step size Continuously variable slope delta...

 (CVSD) and then encrypted using a National Security Agency
National Security Agency
The National Security Agency/Central Security Service is a cryptologic intelligence agency of the United States Department of Defense responsible for the collection and analysis of foreign communications and foreign signals intelligence, as well as protecting U.S...

 (NSA) Commercial COMSEC Endorsement Program (CCEP) Type 1 encryption algorithm based on the KY-57
KY-57
The Speech Security Equipment , TSEC/KY-57, is a portable, tactical cryptographic device in the VINSON family, designed to provide voice encryption for a range of military communication devices such as radio or telephone....

/58.

Sources

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK