Data transfer device an cyz-10 manual




















The other is that it was done to reduce the occurrence of keys that get to the enemy, for example John Walker. A problem with OTAR aka: SARK was that the military had been trained to not leave active keyed equipment unattended or not locked up, so it was common for users of the KY to zeroize the box at the end of each day. That means there must be a nearby key fill device to reload it the next day. So operationally it really didn't pan out. The DAGR is only classified to the level of the key that it's holding so a DAGR without a key is not classified allowing it to be supplied without all the red tape that classification entails.

This appears to be a solution to the OTAR problem since the crypto variables could be remotely erased from a unit that was unaccounted for or was known to be stolen or captured. An analysis of the Black Box showed that this is very possible. This way a stolen receiver could be queried and report it's position, sort of like Lojack Wiki. The use of ESNs in crypto equipment has obvious benefits so I expect it's already being done. Since the cipher text and the crypto systems are in the public domain the Red key needs to be well controlled to protect the information.

There are two major problems associated with protecting Red keys. First, it takes a long logistics chain to supply authorized users with the keys they need. That long logistics chain causes the second reason, the Red keys are prime targest of spies. An example is the Walker Spy Ring Wiki. In addition to the Red key itself there is also how the key is handled in hardware. If the Red key or data can be tapped in the hard ware then it still may be captured.

That plain text could be tapped and recorded allowing someone to then key other like GPS receivers. Black keys can be freely distributed and even transmitted over radio channels.

The use of black keys solves some of the problems of Red keys. My grandmother had a saying "Don't put all your eggs in one basket". The idea is that if the basket is dropped you loose all the eggs. The analogy being if the enemy somehow gets the KEK then all of the Black keys can be turned into Red keys.

But if the crypto equipment converts the black key into a red key or into plain text information then capturing keyed equipment opens the door to getting all the plain text in the system.

If the hardware does not expose the red key or plain text then the use of black keys is much more secure. This allows messages specific to that GPS receiver to be sent. I'm guessing it's similar to an IP address. The problem I see with doing it is there needs to be some way that you know all the receivers being rekeyed are in the possession of authorized personnel. If that's not done then there's a chance you will be rekeying a unit in enemy hands. Also you probably can erase all the currently loaded keys.

The modern crypto equipment no longer used punched cards but the KOI paper tape reader is still the most versatile in terms of supporting various key types since it does not have any built in protocol dependencies. The two serial fill protocols are DS and DS Neither of the specs are in the public domain. DS is based on RS asynchronous, i. DS is based on a negative polarity key fill protocol that uses a data and clock line. An idea would be to use a diode noise source and after amplification drive a PIC micro controller.

The PIC would look at two successive data bits and if they were the same get two more. If the input was 10 a 1 bit would be shifted into a byte, if the input was 01 a 0 bit would be shifted into a byte. When the byte was full it would be stored and after say 8 or 16 bytes were stored they would be sent out an RS data port. By using the noise diode and NOT using an algorithm the numbers would be nearly random. But using the simple algorithim described any bias is removed and the resulting data stream is truly random.

A refinement would be to take the 8 or 16 bytes and pass them through something like the Tiny Encryption algorithm to really mix them up. But it's not clear that this really buys anything when compared to the simple way. An algorithm is how you get from plain test to the cipher text. They are catagorized by how secure they are with Type 1 being the best. NSA encryption algorithms Wiki A protocol has to do with the layers below the algorithm down to the physical layer. These include classified algorithms.

List of cryptographic key types Wiki. AC Power Cord. Fig Fig 13 8-level tape Wiki is 1" wide. Fig 14 Note grouped as 3-space The space is where the sprocket holes are. Fig 15 The rod with the blue tape seems to be made of carbon and is the common ground for the wire fingers that sense the 8 data holes. Note there is no sensor for the sprocket holes. Fig 0. Fig 1. Inside the battery compartment is a plastic frame that can hold the three 3V batteries, producing a total voltage of 9V.

This voltage is also used to retain the crypto keys stored in the unit's static RAM. The battery holder has two standard 9V battery clips at one side, allowing a common 9V block battery to be used as an alternative in case you run out of standard batteries. The image on the right shows the battery holder once it is removed from the CYZ In order to protect the unit against reverse polarity, a diode and a glass-fuse are mounted inside the holder. When in standby, the unit consumes less than 0.

According to the manual, the batteries should be replaced every month. In practice however, then can be used much longer if the unit is used less than one hour each day.

When the CYZ is stored for a longer period of time, it is recommended to remove the batteries. Without batteries, the keys are lost after 2 minutes. Over units were produced in the first year, with a more dan double estimate for the following year. Close to people are employed at Tobyhanna, which is located in the Pocono Mountains of Pennsylvania. It is the largest center for repair, overhaul and fabrication of the US Army [6]. Unfortunately, we can not show the interior of the CYZ The unit featured in the photographs was only briefly available to us and the case can not be opened without permanent damage.

This is because the two case-shells are welded together with ultra-sound. In practice, defective units were sent to Tobyhanna see above where they received a new case as part of the repair [6].



0コメント

  • 1000 / 1000