The Cryptographic Modernization Program is a
Department of Defense directed,
NSA Information Assurance Directorate led effort to transform and modernize
Information Assurance capabilities for the 21st century. It has three phases:
*Replacement- All at risk devices to be replaced.
*Modernization- Integrate modular (programmable/
embedded) crypto solutions.
*Transformation- Be compliant to
GIG/
NetCentrics requirements.
The CM is a joint initiative to upgrade the DoD crypto inventory. Of the 1.3 million
cryptographic devices in the U.S. inventory, 73 percent will be replaced over the next 10 to 15 years by ongoing and planned
C4ISR systems programs,
Information Technology modernization initiatives and advanced weapons platforms.
All
command and control, communications, computer,
intelligence,
surveillance
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
,
reconnaissance,
information technology and
weapons systems
A weapon, arm or armament is any implement or device that can be used to deter, threaten, inflict physical damage, harm, or kill. Weapons are used to increase the efficacy and efficiency of activities such as hunting, crime, law enforcement, ...
that rely upon
cryptography for the provision of assured
confidentiality,
integrity, and
authentication services will become a part of this long-term undertaking. The Cryptographic Modernization program is a tightly integrated partnership between the NSA, the military departments, operational commands, defense agencies, the
Joint Staff, federal government entities and industry.
The program is a multibillion-dollar, multi-year undertaking that will transform cryptographic security capabilities for national security systems at all echelons and points of use. It will exploit new and emerging technologies, provide advanced enabling infrastructure capabilities, and at the same time, modernize legacy devices that are now operationally employed.
The program also directly supports the DoD vision of the
Global Information Grid. The security configuration features enable new
cryptosystems to provide secure information delivery anywhere on the global grid while using the grid itself for security configuration and provisioning—seamless integration.
[Leveraging Cybersecurity - Interview with Daniel G. Wolf - Military Information Technology]
Technology
Cryptography
Most modernized devices will include both
Suite A (US only) and
Suite B support. This allows for protection of sensitive government data as well as interoperability with coalition partners, such as
NATO.
[Security Guide: Operationalizing the IA Component of the GIG - Richard C. Schaeffer Jr. - Military Information Technology]
{{webarchive, url=https://web.archive.org/web/20071011114724/http://www.military-information-technology.com/article.cfm?DocID=1932 , date=2007-10-11 The program includes the DOD's
Key Management Initiative
Key or The Key may refer to:
Common meanings
* Key (cryptography), a piece of information that controls the operation of a cryptography algorithm
* Key (lock), device used to control access to places or facilities restricted by a lock
* Key (map ...
which is designed to replace cumbersome special purpose channels for distribution of
cryptographic keys with a network-based approach by 2015.
Allen Walton "Army Key Management System 2007 update". Army Communicator. Fall 2007. FindArticles.com. 21 Aug. 2008.
/ref>
Interoperability
The NSA has also led the effort to create standards for devices to prevent vendor lock in.
*High Assurance Internet Protocol Encryptor
A High Assurance Internet Protocol Encryptor (HAIPE) is a Type 1 encryption device that complies with the National Security Agency's HAIPE IS (formerly the HAIPIS, the High Assurance Internet Protocol Interoperability Specification). The cryptogr ...
(HAIPE)
* Link Encryptor Family (LEF)
* Secure Communications Interoperability Protocol (SCIP)
Devices
The modernized devices that are being built usually include the ability to add to or replace the current algorithms as firmware updates as newer ones become available.
References
Military communications
National Security Agency