Block 3 Flashcards
(114 cards)
What does COMSEC do?
Prevents unauthorized access to sensitive info via encryption and decryption
The process of converting unsecure information into a disguised form is?
Encryption
The process of recovering original intelligence is?
Decryption
Who is the US crypto leader that creates signals intel (SIGINT) and information assurance (IA) products?
NSA
How many types of crypto devices are there?
- Types 1-4
Which crypto devices are approved by the NSA?
Types 1-3
Crypto device type ____ deals with classified or sensitive US govt info and contains NSA approved algorithms that protect systems requiring the most stringent protection mechanisms.
Type 1
Crypto device type ____ deals with national security information and was developed using established NSA business processes containing NSA-approved algorithms exceeding best commercial practices.
Type 2
Crypto device type ____ deals with unclassified sensitive US govt or commercial info and was developed using established commercial standards and contains NIST-approved algorithms.
Type 3
Crypto device type ____ deals with unevaluated commercial encryption that isn’t for govt use and contains either vendor proprietary algorithms, algorithms registered in by NIST, or algorithms registered by NIST and published in a federal information processing standard (FIPS).
Type 4
What are the four encryption methods?
Voice, data, trunk (bulk) and manual
What forms of voice communications can utilize voice encryption?
All forms (radio, telephone and internet protocol (IP))
What are the three common secure voice IPs?
- Voice over secure (VoSIP)
- Secure voice over IP (SVoIP)
- Secure voice over secure IP (SVoSIP)
What is the distinct difference between the voice over IP (VoIP) encryptions?
Whether you apply encryption in the phone, the network or both
What are the two types of data encryption?
Symmetric key (secret key) and asymmetric key (public-key)
What is symmetric key (secret-key) data encryption?
Data encryption method that uses identical key copies
What is asymmetric key (public-key) data encryption?
Data encryption method that uses two different keys (public key and private key)
What is based on a secret key data encryption system, that consists of 64 binary digits and is considered unsecure today?
Data encryption standard (DES)
What uses a three step data encryption process that utilizes one DES key per step and decrypts by reversing the process?
Triple data encryption standard (3DES)
What replaced 3DES and utilizes 128, 192 and 256 bit key-lengths?
Advanced encryption standard (AES)
What converts multiplexed signals into one data stream that requires a very fast encryption system?
Trunk (bulk) encryption
What is a piece of hardware that is free of codes that once a piece of equipment has keys loaded, it assumes the position of the highest loaded key?
Controlled cryptographic item (CCI)
What is a device found in most newer radios that needs the encryption (key) loaded from a fill device?
Internal encryption device
What are three examples of an external encryption device?
- KY-57
- KY-99
- KIV-7M