Over the Air Rekeying — OTAR (Over The Air Rekeying) is the common name for the method of changing or updating encryption keys in a two way radio system over the radio channel (“over the air”). It is also referred to as Over the Air Transfer (OTAT), depending on the… … Wikipedia
Rekeying — In cryptography, rekeying refers to the process of changing the encryption key of an ongoing communication in order to limit the amount of data encrypted with the same key.Roughly equivalent to the classical procedure of changing codes on a daily … Wikipedia
EKMS — The Electronic Key Management System (EKMS) system is a United States National Security Agency led program responsible for Communications Security (COMSEC) key management, accounting and distribution. Specifically, EKMS generates and distributes… … Wikipedia
Enhanced Position Location Reporting System — The Enhanced Position Location Reporting System (EPLRS) is a secure, jam resistant, computer controlled communications network that distributes near real time tactical information, generally integrated into radio sets, and coordinated by a… … Wikipedia
KY-57 — The Speech Security Equipment (VINSON), TSEC/KY 57, is a portable, tactical cryptographic device in the VINSON family, designed to provide voice encryption for a range of military communication devices such as radio or telephone.The KY 57 can… … Wikipedia
SAASM — An SAASM, for Selective Availability / Anti Spoofing Module , is used by military Global Positioning System receivers to allow decryption of precision GPS coordinates, while the accuracy of civilian GPS receivers may be reduced by the US military … Wikipedia
SINCGARS — (Single Channel Ground and Airborne Radio System) is a Combat Net Radio (CNR) currently used by U.S. and allied military forces. The radios, which handle voice and data communications, are designed to be reliable, secure and easily maintained.… … Wikipedia
Communications security — Not to be confused with Commonwealth Securities. Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended… … Wikipedia
Fill device — KY 57 voice encryptor. Note fill port in center. A fill device is an electronic module used to load cryptographic keys into electronic encryption machines. Fill devices are usually hand held and battery operated. Older mechanical encryption… … Wikipedia
Data Encryption Standard — DES Eine Feistel Runde (F Funktion) Entwickler IBM Veröffentlicht 1975 Abgeleitet von … Deutsch Wikipedia
Zerhacker (Funktechnik) — Zerhacker ist eine interne Bezeichnung für früher eingesetzte analoge Verschlüsselungstechniken, wie sie von den Sicherheitsbehörden (BOS) und Geheimdiensten im Sprechfunk eingesetzt wurden. Frühere Techniken (vor der Zeit der Digitaltechnik)… … Deutsch Wikipedia