Cryptographic Modernization Program

Cryptographic Modernization Program

The Cryptographic Modernization Program is a Department of Defense directed, NSA Information Assurance Directorate led effort to transform and modernize Information Assurance capabilities for the 21st century. It has three phases:
Replacement- All at risk devices to be replaced.
Modernization- Integrate modular (programmable/ embedded) crypto solutions.
Transformation- Be compliant to GIG/ NetCentric requirements.

The CM is a joint initiative to upgrade the DoD crypto inventory. Of the 1.3 million cryptographic devices in the U.S. inventory, 73 percent will be replaced over the next 10 to 15 years by ongoing and planned C4ISR systems programs, Information Technology modernization initiatives and advanced weapons platforms.[citation needed]

All command and control, communications, computer, intelligence, surveillance, reconnaissance, information technology and weapons systems that rely upon cryptography for the provision of assured confidentiality, integrity, and authentication services will become a part of this long-term undertaking. The Cryptographic Modernization program is a tightly integrated partnership between the NSA, the military departments, operational commands, defense agencies, the Joint Staff, federal government entities and industry.

The program is a multi-billion dollar, multi-year undertaking that will transform cryptographic security capabilities for national security systems at all echelons and points of use. It will exploit new and emerging technologies, provide advanced enabling infrastructure capabilities, and at the same time, modernize legacy devices that are now operationally employed.

The program also directly supports the DoD vision of the Global Information Grid. The security configuration features enable new cryptosystems to provide secure information delivery anywhere on the global grid while using the grid itself for security configuration and provisioning—total seamless integration.[1]

Contents

Technology

Cryptography

Most modernized devices will include both Suite A (US only) and Suite B support. This allows for protection of sensitive government data as well as interoperability with coalition parters, such as NATO.[1][2] The program includes the DOD's Key Management Initiative which is designed to replace cumbersome special purpose channels for distribution of cryptographic keys with a network-based approach by 2015. [3]

Interoperability

The NSA has also led the effort to create standards for devices to prevent vendor lock in.[2]

Devices

The modernized devices that are being built usually include the ability to add to or replace the current algorithms as firmware updates as newer ones become available.[1]

References

  1. ^ a b c Leveraging Cybersecurity - Interview with Daniel G. Wolf - Military Information Technology
  2. ^ a b Security Guide: Operationalizing the IA Component of the GIG - Richard C. Schaeffer Jr. - Military Information Technology
  3. ^ Allen Walton "Army Key Management System 2007 update". Army Communicator. Fall 2007. FindArticles.com. 21 Aug. 2008.

Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • NSA encryption systems — The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA approved systems are still classified, but much more about its early systems has become …   Wikipedia

  • NSA Suite B Cryptography — Suite B is a set of cryptographic algorithms promulgated by the National Security Agency as part of its Cryptographic Modernization Program. It is to serve as an interoperable cryptographic base for both unclassified information and most… …   Wikipedia

  • HAIPE — A HAIPE (High Assurance Internet Protocol Encryptor) is a Type 1 encryption device that complies with the National Security Agency s HAIPE IS (formerly the HAIPIS, the High Assurance Internet Protocol Interoperability Specification). The… …   Wikipedia

  • Liaison 16 — La Liaison 16 (L16) est un standard de liaison de données tactiques de l OTAN pour l échange d informations tactiques entre des unités militaires. Le contenu de sa messagerie et le protocole d émission sont définis par le STANAG[acro 1] 5516 pour …   Wikipédia en Français

  • international relations — a branch of political science dealing with the relations between nations. [1970 75] * * * Study of the relations of states with each other and with international organizations and certain subnational entities (e.g., bureaucracies and political… …   Universalium

  • Japanese cryptology from the 1500s to Meiji — The cipher system that Uesugi used is basically a simple substitution usually known as a Polybius square or “checkerboard.” The i ro ha alphabet contains forty eight letters, so a seven by seven square is used, with one of the cells left blank.… …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Natural scientific research in Canada — This article outlines the history of natural scientific research in Canada, including mathematics, physics, astronomy, space science, geology, oceanography, chemistry, biology, medical research and psychology. The social sciences are not treated… …   Wikipedia

  • Managed Trusted Internet Protocol Service — MTIPS architectural design, demonstrating the MTIPS transport and agency trusted domain Managed Trusted Internet Protocol Service (MTIPS) was developed by the US General Services Administration (GSA) to allow US Federal agencies to physically and …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”