HOME



picture info

KY-68
TSEC/KY-68 DSVT, commonly known as Digital Subscriber Voice Terminal, is a US military ruggedized, full- or half-duplex tactical telephone system with a built-in encryption/decryption module for secure traffic. It transmits voice and data at 16 or 32 kbit/s, converting voice to a digital signal. The KY-68 can operate via civilian and military switches in either encrypted or un-encrypted mode, or point-to-point (encrypted mode only). Although used primarily for secure communications, the KY-68 can also transmit to a Digital Non-secure Voice Terminal (DNVT). A local switch warns the KY-68 user with a tone signal when initiating communication with a non-secure terminal. The KY-68 is keyed using an Electronic Transfer Device, typically either a KYK-13 or AN/CYZ-10. An almost identical office version (KY-78) features the same electronics as the KY-68, but has an exterior casing composed of lighter materials. The KY-68 and KY-78 are approved for use with SECRET-classified in ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




KY-58
The VINSON KY-58 is a secure voice module primarily used to encrypt radio communication to and from military aircraft and other tactical vehicles. It is employed by U.S. Military Joint Services, NATO and some law enforcement agencies. It is designed to operate over bandwidth-restricted circuits such as UHF and VHF satellite access and wideband switched telephone systems. It uses the 16 kbit/s continuously variable slope delta modulation Continuously variable slope delta modulation (CVSD or CVSDM) is a voice coding method. It is a delta modulation with variable step size (i.e., special case of adaptive delta modulation), first proposed by Greefkes and Riemens in 1970. CVSD enco ... (CVSD). The system was initially fielded as a replacement for the KG-36 and KG-34. The unit fits in a five-inch cube and weighs about 5 pounds. Production ended in 1993. See also * KY-68 References External links KY-58 (Vinson)by Jerry Proc National Security Agency encryption devices ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Point-to-point (telecommunications)
In telecommunications, a point-to-point connection refers to a communications connection between two communication endpoints or nodes. An example is a telephone call, in which one telephone is connected with one other, and what is said by one caller can only be heard by the other. This is contrasted with a ''point-to-multipoint'' or ''broadcast'' connection, in which many nodes can receive information transmitted by one node. Other examples of point-to-point communications links are leased lines and microwave radio relay. The term is also used in computer networking and computer architecture to refer to a wire or other connection that links only two computers or circuits, as opposed to other network topologies such as buses or crossbar switches which can connect many communications devices. ''Point-to-point'' is sometimes abbreviated as ''P2P''. This usage of ''P2P'' is distinct from ''P2P'' meaning ''peer-to-peer'' in the context of file sharing networks or other data- ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Classified Information
Classified information is confidential material that a government deems to be sensitive information which must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted by law or regulation to particular groups of individuals with the necessary security clearance with a need to know. A formal security clearance is required to view or handle classified material. The clearance process requires a satisfactory background investigation. Documents and other information must be properly marked "by the author" with one of several (hierarchical) levels of sensitivity—e.g. Confidential (C), Secret (S), and Top Secret (S). All classified documents require designation markings on the technical file which is usually located either on the cover sheet, header and footer of page. The choice of level is based on an impact assessment; governments have their own criteria, including how to determine the classification of an inf ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


KYK-13
The KYK-13 Electronic Transfer Device is a common fill device designed by the United States National Security Agency for the transfer and loading of cryptographic keys with their corresponding check word. The KYK-13 is battery powered and uses the DS-102 protocol for key transfer. Its National Stock Number A NATO Stock Number, or National Stock Number (NSN) as it is known in the U.S., is a 13-digit numeric code used by the NATO military alliance, identifying all the 'standardized material items of supply' as they have been recognized by all member ... is 5810-01-026-9618. Even though the KYK-13 was first introduced in 1976 and was supposed to have been made obsolete by the AN/CYZ-10 Data Transfer Device, it is still widely used because of its simplicity and reliability. A simpler device than the CYZ-10, the KIK-30 "Really Simple Key Loader" (RASKL) is now planned to replace the KYK-13, with up to $200 million budgeted to procure them in quantity. Components * P1 and J1 C ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Fill Device
A fill device or key loader is a module used to load cryptographic keys into electronic encryption machines. Fill devices are usually hand held and electronic ones are battery operated. Older mechanical encryption systems, such as rotor machines, were keyed by setting the positions of wheels and plugs from a printed keying list. Electronic systems required some way to load the necessary cryptovariable data. In the 1950s and 1960s, systems such as the U.S. National Security Agency KW-26 and the Soviet Union's Fialka used punched cards for this purpose. Later NSA encryption systems incorporated a serial port fill connector and developed several common fill devices (CFDs) that could be used with multiple systems. A CFD was plugged in when new keys were to be loaded. Newer NSA systems allow " over the air rekeying" (OTAR), but a master key often must still be loaded using a fill device. NSA uses two serial protocols for key fill, DS-101 and DS-102. Both employ the same U-229 6-pi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Key (cryptography)
A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be different sizes and varieties, but in all cases, the strength of the encryption relies on the security of the key being maintained. A key's security strength is dependent on its algorithm, the size of the key, the generation of the key, and the process of key exchange. Scope The key is what is used to encrypt data from plaintext to ciphertext. There are different methods for utilizing keys and encryption. Symmetric cryptography Symmetric cryptography refers to the practice of the same key being used for both encryption and decryption. Asymmetric cryptography Asymmetric cryptography has separate keys for encrypting and decrypting. These keys are known as the public and private keys, respectively. Purpose Since the key ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Electronic Switching System
In telecommunications, an electronic switching system (ESS) is a telephone switch that uses solid-state electronics, such as digital electronics and computerized common control, to interconnect telephone circuits for the purpose of establishing telephone calls. The generations of telephone switches before the advent of electronic switching in the 1950s used purely electro-mechanical relay systems and analog voice paths. These early machines typically utilized the step-by-step technique. The first generation of electronic switching systems in the 1960s were not entirely digital in nature, but used reed relay-operated metallic paths or crossbar switches operated by stored program control (SPC) systems. First announced in 1955, the first customer trial installation of an all-electronic central office commenced in Morris, Illinois in November 1960 by Bell Laboratories. The first large-scale electronic switching system was the Number One Electronic Switching System (1ESS) of th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


US Military KY-68 Phone
US or Us most often refers to: * ''Us'' (pronoun), the objective case of the English first-person plural pronoun ''we'' * US, an abbreviation for the United States US, U.S., Us, us, or u.s. may also refer to: Arts and entertainment Albums * ''Us'' (Brother Ali album) or the title song, 2009 * ''Us'' (Empress Of album), 2018 * ''Us'' (Mull Historical Society album), 2003 * ''Us'' (Peter Gabriel album), 1992 * ''Us'' (EP), by Moon Jong-up, 2021 * ''Us'', by Maceo Parker, 1974 * ''Us'', mini-album by Peakboy, 2019 Songs * "Us" (James Bay song), 2018 * "Us" (Jennifer Lopez song), 2018 * "Us" (Regina Spektor song), 2004 * "Us" (Gracie Abrams song), 2024 * "Us", by Azealia Banks from '' Fantasea'', 2012 * "Us", by Celine Dion from ''Let's Talk About Love'', 1997 * "Us", by Gucci Mane from ''Delusions of Grandeur'', 2019 * "Us", by Spoon from '' Hot Thoughts'', 2017 Other media * US Festival, two 1980s California music festivals organized by Steve Wozniak * ''Us'' (1991 f ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Kbit/s
In telecommunications, data transfer rate is the average number of bits ( bitrate), characters or symbols ( baudrate), or data blocks per unit time passing through a communication link in a data-transmission system. Common data rate units are multiples of bits per second (bit/s) and bytes per second (B/s). For example, the data rates of modern residential high-speed Internet connections are commonly expressed in megabits per second (Mbit/s). Standards for unit symbols and prefixes Unit symbol The ISQ symbols for the bit and byte are ''bit'' and ''B'', respectively. In the context of data-rate units, one byte consists of 8 bits, and is synonymous with the unit octet. The abbreviation bps is often used to mean bit/s, so that when a ''1 Mbps'' connection is advertised, it usually means that the maximum achievable bandwidth is 1 Mbit/s (one million bits per second), which is 0.125 MB/s ( megabyte per second), or about 0.1192 MiB/s ( mebibyte per second). ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Secure Voice
Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or Voice over IP, IP. History The implementation of voice encryption dates back to World War II when secure communication was paramount to the US armed forces. During that time, noise was simply added to a voice signal to prevent enemies from listening to the conversations. Noise was added by playing a record of noise in sync with the voice signal and when the voice signal reached the receiver, the noise signal was subtracted out, leaving the original voice signal. In order to subtract out the noise, the receiver needed to have exactly the same noise signal and the noise records were only made in pairs; one for the transmitter and one for the receiver. Having only two copies of records made it impossible for the wrong receiver to decrypt the signal. To implement the system, the army contracted Bell ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]