Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Electronic Key Management System

Index Electronic Key Management System

The Electronic Key Management System (EKMS) system is a United States National Security Agency led program responsible for Communications Security (COMSEC) key management, accounting, and distribution. [1]

31 relations: AN/CYZ-10, AN/PYQ-10, Communications security, Defense Information Systems Agency, Encryption, Fill device, Finksburg, Maryland, Firefly (key exchange protocol), Gulf War, Internet protocol suite, Iridium Communications, John Anthony Walker, Joint Chiefs of Staff, Key (cryptography), Key management, KG-84, KYK-13, National Security Agency, NSA encryption systems, Personal computer, Santa Cruz Operation, Science Applications International Corporation, Secure Communications Interoperability Protocol, Secure Terminal Equipment, STU-III, Trusted system, United States invasion of Grenada, United States invasion of Panama, United States Naval Research Laboratory, United States Navy, Unix.

AN/CYZ-10

The AN/CYZ-10 Data Transfer Device, often called a Filler, Crazy 10, ANCD or DTD, is a United States National Security Agency-developed, portable, hand-held fill device, for securely receiving, storing, and transferring data between compatible cryptographic and communications equipment.

New!!: Electronic Key Management System and AN/CYZ-10 · See more »

AN/PYQ-10

The AN/PYQ-10 Simple Key Loader (SKL) is a ruggedized, portable, hand-held fill device, for securely receiving, storing, and transferring data between compatible cryptographic and communications equipment.

New!!: Electronic Key Management System and AN/PYQ-10 · See more »

Communications security

Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients.

New!!: Electronic Key Management System and Communications security · See more »

Defense Information Systems Agency

The Defense Information Systems Agency (DISA), known as the Defense Communications Agency (DCA) until 1991, is a United States Department of Defense (DoD) combat support agency composed of military, federal civilians, and contractors.

New!!: Electronic Key Management System and Defense Information Systems Agency · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Electronic Key Management System and Encryption · See more »

Fill device

A fill device or key loader is a module used to load cryptographic keys into electronic encryption machines.

New!!: Electronic Key Management System and Fill device · See more »

Finksburg, Maryland

Finksburg is an unincorporated community in Carroll County, Maryland, United States.

New!!: Electronic Key Management System and Finksburg, Maryland · See more »

Firefly (key exchange protocol)

Firefly is a U.S. National Security Agency public-key key exchange protocol, used in EKMS, the STU-III secure telephone, and several other U.S. cryptographic systems.

New!!: Electronic Key Management System and Firefly (key exchange protocol) · See more »

Gulf War

The Gulf War (2 August 199028 February 1991), codenamed Operation Desert Shield (2 August 199017 January 1991) for operations leading to the buildup of troops and defense of Saudi Arabia and Operation Desert Storm (17 January 199128 February 1991) in its combat phase, was a war waged by coalition forces from 35 nations led by the United States against Iraq in response to Iraq's invasion and annexation of Kuwait.

New!!: Electronic Key Management System and Gulf War · See more »

Internet protocol suite

The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.

New!!: Electronic Key Management System and Internet protocol suite · See more »

Iridium Communications

Iridium Communications Inc. (formerly Iridium Satellite LLC) is a publicly traded American company headquartered in McLean, Virginia.

New!!: Electronic Key Management System and Iridium Communications · See more »

John Anthony Walker

John Anthony Walker Jr. (July 28, 1937 – August 28, 2014) was a United States Navy Chief Warrant Officer and communications specialist convicted of spying for the Soviet Union from 1968 to 1985.

New!!: Electronic Key Management System and John Anthony Walker · See more »

Joint Chiefs of Staff

The Joint Chiefs of Staff (JCS) is a body of senior uniformed leaders in the United States Department of Defense who advise the President of the United States, the Secretary of Defense, the Homeland Security Council and the National Security Council on military matters.

New!!: Electronic Key Management System and Joint Chiefs of Staff · See more »

Key (cryptography)

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.

New!!: Electronic Key Management System and Key (cryptography) · See more »

Key management

Key management refers to management of cryptographic keys in a cryptosystem.

New!!: Electronic Key Management System and Key management · See more »

KG-84

The KG-84A and KG-84C are encryption devices developed by the U.S. National Security Agency (NSA) to ensure secure transmission of digital data.

New!!: Electronic Key Management System and KG-84 · See more »

KYK-13

The KYK-13 Electronic Transfer Device is a common fill device designed by the United States National Security Agency for the transfer and loading of cryptographic keys with their corresponding check word.

New!!: Electronic Key Management System and KYK-13 · See more »

National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.

New!!: Electronic Key Management System and National Security Agency · See more »

NSA encryption systems

The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952.

New!!: Electronic Key Management System and NSA encryption systems · See more »

Personal computer

A personal computer (PC) is a multi-purpose computer whose size, capabilities, and price make it feasible for individual use.

New!!: Electronic Key Management System and Personal computer · See more »

Santa Cruz Operation

Santa Cruz Operation (SCO) was a software company based in Santa Cruz, California which was best known for selling three Unix variants for Intel x86 processors: Xenix, SCO UNIX (later known as SCO OpenServer), and UnixWare.

New!!: Electronic Key Management System and Santa Cruz Operation · See more »

Science Applications International Corporation

Science Applications International Corporation (SAIC) is an American company headquartered in Reston, Virginia that provides government services and information technology support.

New!!: Electronic Key Management System and Science Applications International Corporation · See more »

Secure Communications Interoperability Protocol

The Secure Communications Interoperability Protocol (SCIP) is a multinational standard for secure voice and data communication, for one-to-one connections, not packet-switched networks.

New!!: Electronic Key Management System and Secure Communications Interoperability Protocol · See more »

Secure Terminal Equipment

Secure Terminal Equipment (STE) is the U.S. Government's current, encrypted telephone communications system for wired or "landline" communications.

New!!: Electronic Key Management System and Secure Terminal Equipment · See more »

STU-III

STU-III is a family of secure telephones introduced in 1987 by the NSA for use by the United States government, its contractors, and its allies.

New!!: Electronic Key Management System and STU-III · See more »

Trusted system

In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy.

New!!: Electronic Key Management System and Trusted system · See more »

United States invasion of Grenada

The United States invasion of Grenada was a 1983 invasion led by the United States of the Caribbean island nation of Grenada, which has a population of about 91,000 and is located north of Venezuela, that resulted in a U.S. victory within a matter of weeks.

New!!: Electronic Key Management System and United States invasion of Grenada · See more »

United States invasion of Panama

The United States Invasion of Panama, code named Operation Just Cause occurred between mid-December 1989 and late January 1990.

New!!: Electronic Key Management System and United States invasion of Panama · See more »

United States Naval Research Laboratory

The United States Naval Research Laboratory (NRL) is the corporate research laboratory for the United States Navy and the United States Marine Corps.

New!!: Electronic Key Management System and United States Naval Research Laboratory · See more »

United States Navy

The United States Navy (USN) is the naval warfare service branch of the United States Armed Forces and one of the seven uniformed services of the United States.

New!!: Electronic Key Management System and United States Navy · See more »

Unix

Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Electronic Key Management System and Unix · See more »

Redirects here:

EKMS.

References

[1] https://en.wikipedia.org/wiki/Electronic_Key_Management_System

OutgoingIncoming
Hey! We are on Facebook now! »