28 October 1997
Source:
http://www.hr.doe.gov/telcomsec/CRYPTO.html
The DOE Crypto Equipment Guide is published as an information source and guideline for DOE and DOE contractors in selecting or using crypto equipment. This guide contains general information about NSA approved cryptographic devices that are currently available through the Commercial COMSEC Equipment Program (CCEP) or by direct purchase from NSA. Contractors for DOE must have a properly executed Controlled Cryptographic Item agreement with NSA. This guide is not intended to be a complete source of information but rather a summary. The information herein is only in sufficient detail to familiarize the reader with the basic capabilities of the equipment. Please note that the purchase and use of any product identified as "embeddable" requires prior DOE headquarters approval. A Memorandum of Agreement (MOA) with NSA must be properly executed in cases where a DOE or DOE contractor/ supplier proposes to use embedded products for classified operations.
Technical information and points of contact are available from Sharon L. Shank of the Architecture, Standards and Engineering Group, Office of Information Management, at Sharon.Shank@hq.doe.gov or by telephone at (301) 903-3047.
DOE users should contact HR-433 if NES is being considered for any application. The authorized vendor for NES is Motorola Government Electronics Gr., 8201 E. McDowell Road., Scottsdale, AZ 85252-1417. Additional information may be obtained by accessing their web site, http://www.mot.com/GSS/SSTG/ged/iso/nes.html".
The authorized vendor is GTE Goverment Systems Corporation, 77 "A" Street, Needham, MA 02194-2892, phone: (410) 859-4060. Additional information on FASTLANE may be obtained by accessing their web site http://www.gte.com/Cando/Govt/Docs/Software/fastlane.html".
The KGV-135 may be used in tactical military ground, aircraft, or space. The approximate cost is $8,000. Additional information may be obtained by accessing their web site, http://www.mot.com/GSS/SSTG/ged/iso/kgv135.html.
The KG-189 is the next generation of trunk encryptors designed to be compatible
with Synchronous Optical Network (SONET) standard interfaces. It provides
optical transport at both the RED and BLACK interfaces to communications
systems. The KG-189 program currently consists of models supporting two standard
SONET data rates. The OC-3 model operates at 155 Mb/s and the OC-12 model
operates at 622 Mb/s. The development of a model supporting the SONET OC-48
data rate of 2.5 Gigab/s has been terminated. The KG-189 is designed as a
single chassis with interchangeable cards allowing the KG-189 to upgrade
from OC-3 to OC-12 with minimal cost and no impact on installation. The KG-189
supports BENIGN fill capability, traditional key and remote loading of FIREFLY
vectors. It is approved for use at all classification levels.
Inital pre-qualification deliveries were scheduled for January, 1997. Production
of the KG-189 is scheduled to begin in March, 1997. The product was developed
by Motorola GSTG and Nortel. Production of the KG-189 is provided by Motorola
Sectel. The cost for the OC-3 model is $37,654, and the OC-12 model is $62,664.
These systems are approved for use at all classification
levels. The manufacturer is Motorola Secure Telecommunications, Scottsdale,
Arizona. The cost will depend on the size of the production run. Unit cost
of previous production run was $7950 for a KG-95-2 and $16000 for KG-95R.
Additional information may be obtained by accessing their web site,
http://www.mot.com/GSS/SSTG/ged/iso/kg95.html.
The Multi-level Information Systems Security Initiative (MISSI) is an NSA
effort to make available products that could be used to construct systems
that would satisfy user Mutli-level Security (MLS) requirements. MISSI includes
the development of products in four categories: the Crypto Peripheral, Network
Security Management, Secure Network Server, and Workstation Security Applique.
These products will comprise the set of security components needed to construct
Automated Information System (AIS) that satisfy MLS requirements. MISSI
establishes the structure for the placement of the components to achieve
MLS at the workstation, LAN, or WAN levels as needed. This structure is designed
to (1) protect data from unauthorized disclosure and modification; (2) identify
and authenticate system users; (3) control access to data and system resources,
and; (4) support source authentication and non-repudiation of messages. MISSI
will be introduced in a four-phase release approach. Each release will provide
four operational capabilities exceeding those of the previous release along
with the required security services.
The following paragraphs describe the features and characteristics of MISSI
products as they pertain to system performance, capabilities and characteristics.
MISSI components will support mandatory access controls to provide hierarchical
(Unclassified, Confidential, Secret, Top Secret) and non-hierarchical
("compartmented") classifications. Discretionary access controls provide
additional "need-to-know" granularity. All data stored and processed by MISSI
components will be labeled with a designation of its criticality and sensitivity
through the use of the Common Internet Protocol Security Option (CIPSO) labels
and internal labels in a Trusted Computing Base (TCB).
The user operation requirements of MISSI hardware components will be compatible
with those required to operate the AISs they secure. At the workstation level,
a user's identity will be authenticated up to the Top Secret level with a
local name, a personal password, and a physical token inserted into a reader
associated with the workstation's MISSI component. The use of trusted software
and trusted operating systems will provide protection from unauthorized
interference or tampering. MISSI components will use CIPSO labels for mandatory
access controls and a database/directory scheme for discretionary access
controls. These access controls and those of the trusted operation system
will permit users to specify and control sharing of files and programs and
provide controls to limit the propagation of access rights.
Initial MISSI components will operate on DDN X.25, CCITT 1984 X.25, IEEE
802.3, and Ethernet networks. Later releases are planned to evolve with
communications network protocols such as ATM. MISSI systems are intended
to be protocol independent below the lowest layer where security is applied.
A Secure Network Server (SNS) providing a guard/gateway function will provide
CIPSO labeling to route datagrams to the proper networks and prevent those
labels from being inadvertently or deliberately altered. MISSI components
communicating on Ethernet (TCP/IP based) networks will support Address Resolution
Protocol functions to provide logical addressing. MISSI components will also
support GOSIP X.25 protocols.
MISSI components will rely on the Electronic Key Management System (EKMS)
for keying and rekeying activities. Components will support FIREFLY technology.
The reliability, availability, and maintainability of MISSI hardware and
software components will meet or exceed current industry standards for commercial
off-the-shelf office environment applications. Some of the MISSI critical
system characteristics are:
The Information Security (INFOSEC) product evolution of MISSI, as defined
in the four-phased release approach and the four product categories previously
mentioned, is explained in more detail by the following graphics.
The Mosaic program is an implementation designed to support MISSI Release
1. This program provides a Personal Computer Memory Card International
Association (PCMCIA) crypto card, which provides encryption of sensitive
unclassified electronic mail (E-mail) messages. Under the Mosaic program,
a Commercial Off The Shelf (COTS) networked workstation configured with a
PCMCIA card bus or separate reader performs the required MISSI Release 1
functions.
The Mosaic program supports X.400 or Simple Mail Transfer Protocol (SMTP)
E-mail on the Defense Message System, as well as other Department of Defense
(DoD) and Civil Agency applications. This system is currently designed to
operate at 1.5 Mbps encryption/decryption. The PCMCIA card is under going
test in the Mosaic program.
The APPLIQUE is a low cost product that provides multi-level security services
for COTS networked workstations. It consists of both a software package and
a hardware device referred to as the Crypto Peripheral (CP). Capabilities
include security services to support writer to reader security for X.400
based E-mail and peer-to-peer applications. The security services performed
by the APPLIQUE are: access control, audit, data confidentiality, data integrity,
identification, and authentication as well as non-repudiation. It consists
integrates with a wide variety of 386/486 based processor COTS workstations
and higher. The APPLIQUE consists of several basic elements that allow the
user to communicate in networked environments with multiple security levels.
These elements include: a communications security package, trusted computing
base, CP and a physical token.
The communications security package includes these ISO layer 3 and 7 security
protocols: Network Layer Security Protocol (NLSP1), Message Security Protocol
(MSP), and Key Management Protocol (KMP). The APPLIQUE will support both
the GOSIP and DoD (TCP/IP) protocol suites. The TMACH Security Monitor provides
multi-level security services to the workstation user. The CP with an estimated
minimum throughput rate of 10 Mbs/sec., performs FIREFLY key generation,
encryption, and digital signatures. The Crypto Peripheral can make use of
a PCMCIA device to provide the physical token and crypto-ignition key (CIK)
functionally as a means for user identification and authentication. It is
required to access security mechanisms in the CP.
The CP is a compact security product that provides encryption of E-mail messages
for COTS networked workstations. It is contained on a PCMCIA card and interfaces
directly to the workstation through a PCMCIA card bus or reader. The CP is
the workstation security product designed to support the MISSI Release 2
system, and to protect classified information up to Secret. The CP supports
a wide variety of COTS workstations that support X.400 mail packages. It
is specifically designed to support ISO layer 7 security protocols. Writer
to reader security protection is provided between both for Official Use Only
sensitive community of Release 1 and the Secret community served by Release
2, as well as Top Secret communities served by Release 3 and above. The CP
is designed for a 10 Mbps throughput rate.
The SNS is a computer system designed to allow simultaneous processing of
information from the Unclassified level up to Top Secret level. It combines
the highest levels of both Computer Security and COMSEC technology. The SNS
will allow the connection of two or more networks at different security levels
and as a MLS network file server, the SNS will allow files of different security
levels to be stored and accessed simultaneously. Application software being
developed for the SNS will allow it to function as a guard/downgrader. The
SNS will support the CP associated with an untrusted workstation during MISSI
Release 2. It insures the CP has been invoked before releasing an E-mail
message to an unclassified network and regrades E-mail by human review. In
MISSI Release 3, the SNS in conjunction with the Workstation Security Applique,
provides full E-mail security services including regrading and MLS file storage.
An EKMS compatible cryptographic function in the SNS allows all data stored
on non-removable media to be protected. This allows the SNS to be treated
as an unclassified Controlled Cryptographic Item (CCI) once the CIK is removed.
For the software applications developer, this MLS computer will provide a
POSIX compliant interface at the operating system level. Therefore, it will
be possible for the SNS to run existing UNIX based application programs.
NSM provides network security management functions for the MISSI products.
These functions consist of key generator and distribution, access control
permissions, secure directory, and mail list services. It is a primary link
to other network management functions, such as configuration management,
fault management, accounting management, and performance management. The
capabilities of the security management components will be phased, along
with the various MISSI components. The NSM components needed to provide the
above functions are the Domain Security Manager, Local Authority Workstation
(LAW), Audit Manager, Rekey Agent (RKA), Secure Directory Server, and Mail
List Agent. It is anticipated that these components will be software application
programs that will run on COTS workstations equipped with a Workstation Security
APPLIQUE. Together they will provide the necessary services to securely manage
and operate the MISSI.
Optical Encryption Equipment
HIGH SPEED STRATEGIC TRUNK ENCRYPTOR
Data Link Encryption Equipment
KIV-19
KG95
KG-135
KGR-68
KG-84A
KG-94/94A and KG-194/194A
KIV-19
KG-95
KG-135
TACTICAL HIGH SPEED KEY GENERATOR
KGR-68
ELECTRONIC KEY GENERATOR RECEIVER
KG-84A
GENERAL PURPOSE ENCRYPTION EQUIPMENT
STU Encryption Equipment
MOTOROLA STU-III SECTEL CELLULAR
AT&T STU-III 1100/1150
AT&T STU-III 1900/1910
AT&T SECURE CELLULAR
SECURE TERMINAL EQUIPMENT
MOTOROLA STU-III SECTEL
AT&T STU-III 1100/1150
SECURE TERMINAL EQUIPMENT
Other Encryption Equipment
AT&T SECURE CONFERENCE SYSTEM
SSP3110 DATA STORAGE ENCRYPTOR
DATA TRANSFER DEVICE
CONDOR
AT&T SECURE CONFERENCE SYSTEM
SSP3110 DATA STORAGE ENCRYPTOR
DATA TRANSFER DEVICE
MISSI Encryption Equipment
SECURITY INITIATIVE (MISSI)
Operation
Networks
Keying
Equipment
Product Development
Mosaic
Workstation Security Applique (APPLIQUE)
Crypto Peripheral (CP)
Secure Network Server (SNS)
Network Security Management (NSM)