KY-57
Encyclopedia
The Speech Security Equipment (VINSON), TSEC/KY-57, is a portable, tactical cryptographic
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties...

 device in the VINSON
VINSON
VINSON is a family of voice encryption devices used by U.S. and allied military and law enforcement, based on the SAVILLE encryption algorithm and 16 kbit/s CVSD audio compression. It replaces the Vietnam War-era NESTOR family....

 family, designed to provide voice encryption for a range of military communication
Communication
Communication is the activity of conveying meaningful information. Communication requires a sender, a message, and an intended recipient, although the receiver need not be present or aware of the sender's intent to communicate at the time of communication; thus communication can occur across vast...

 devices such as radio
Radio
Radio is the transmission of signals through free space by modulation of electromagnetic waves with frequencies below those of visible light. Electromagnetic radiation travels by means of oscillating electromagnetic fields that pass through the air and the vacuum of space...

 or telephone
Telephone
The telephone , colloquially referred to as a phone, is a telecommunications device that transmits and receives sounds, usually the human voice. Telephones are a point-to-point communication system whose most basic function is to allow two people separated by large distances to talk to each other...

.

The KY-57 can accept signal fades of up to 12 seconds without losing synchronization with the transmitting station. There are storage positions for 6 keys
Key (cryptography)
In cryptography, a key is a piece of information that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the particular transformation of plaintext into ciphertext, or vice versa...

. Keys 1 to 5 are traffic encryption keys (TEK). Key 6 is a key encryption key (KEK) used for over the air rekeying (OTAR)
OTAR
OTAR is the common name for the method of changing or updating encryption keys in a two-way radio system over the radio channel...

 of the other 5 keys. Key 6 must be loaded manually using a fill device
Fill device
A fill device is an electronic module used to load cryptographic keys into electronic encryption machines. Fill devices are usually hand held and battery operated....

 such as the AN/CYZ-10
AN/CYZ-10
The AN/CYZ-10 Data Transfer Device, often called a Filler, Crazy 10, ANCD or DTD, is a United States National Security Agency-developed, portable, hand-held fill device, for securely receiving, storing, and transferring data between compatible cryptographic and communications equipment...

.

See also

  • NSA encryption systems
    NSA encryption systems
    The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA-approved systems are still classified, but much more about its early systems has become known and its most modern systems share at least...

  • FNBDT
  • ANDVT
    ANDVT
    The Advanced Narrowband Digital Voice Terminal is a secure voice terminal for low bandwidth secure voice communications throughout the U.S. Department of Defense. Devices in the ANDVT family include the AN/USC-43 Tactical Terminal , the KY-99A Miniaturized Terminal , and the KY-100 Airborne...

  • SINCGARS
    SINCGARS
    SINCGARS is a Combat Net Radio currently used by U.S. and allied military forces. The radios, which handle voice and data communications, are designed to be reliable, secure and easily maintained...

  • AN/PRC-77
    AN/PRC-77 Portable Transceiver
    AN/PRC 77 Radio Set is a manpack, portable VHF FM combat-net radio transceiver manufactured by "Associated Industries" and used to provide short-range, two-way radiotelephone voice communication...


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK