top - download
⟦fa2a47e57⟧ Wang Wps File
Length: 4805 (0x12c5)
Types: Wang Wps File
Notes: Spelunked
Names: »~ORPHAN74.08«
Derivation
└─⟦84f7719fc⟧ Bits:30006031 8" Wang WCS floppy, CR 0385A
└─ ⟦this⟧ »~ORPHAN74.08«
WangText
Issue
1.1
LKSAA - VOLUME
II
SYS/84-03-01
Part 1
TECHNICAL PROPOSAL
Page
6 CRYPTO SYSTEM ....................................
275a
6.1 CRYPTO CONTRL SYSTEM HARDWARE ...............
275a
6.1.1 System Interface to Off-Line Crypto-
graphic Equipment ........................
277
6.1.2 Interface to On-Line Crypto ..............
277
6.2 SOFTWARE OF THE CRYPTO CONTROL SYSTEM .......
277
6.2.1 Crypto Key Management ....................
278
6.2.1.1 Input of Crypto Keys .................
278
6.2.1.2 Management of Crypto Keys ............
278
6.2.1.3 Initiation of Crypto Keys ............
279
6.2.1.3.1 Tie- and Usage Crypto Keys ......
279
6.2.1.3.2 Modify Present Crypto Key Number
. 279
6.2.2 Management of The OFFLINE Crypto Device ..
279
6.2.3 Management of ONLINE Crypto Devices ......
280a
6.3 CRYPTO KEY SUPERVISION ......................
280b
6.4 CRYPTO SECURITY ..............................
280b
6.5 CRYPTO RACKS .................................
280b
6.5.1 Racks for Off-line Cryptos ...............
280b
6.5.2 Racks for On-line Cryptos ................
280c…86…1 …02… …02… …02… …02…
6̲ ̲C̲R̲Y̲P̲T̲O̲ ̲S̲Y̲S̲T̲E̲M̲
Christian Rovsing A/S's extensive experience in designing
and implementing crypto system will ensure a well functioning
LKSAA.
Christian Rovsing A/S has delvered a very cost effective
crypto system as part of the FIKS system for the Danish
MOD. In this system, several trunk lines share only
one crypto device, which acts as a multiplexor between
the various trunks. Although AA's outline of the crypto
sstem for LKSAA is different, we believe that we in
close cooperation with AA can design a well functioning
and secure crypto system.
The Crypto System consists of the Crypto Control System,
4 Off Line Cryptos and 90 On Line Cryptos.
The purposeof the Crypto Control System is to store
the crypto key's, and make the keys available to the
crypto units under control of the Central Communication
System.
The procedure by which the Central Communication System
requests keys to be sent to the ryptos is found in
section 2.1.5.2.
6.1 C̲R̲Y̲P̲T̲O̲ ̲C̲O̲N̲T̲R̲O̲L̲ ̲S̲Y̲S̲T̲E̲M̲ ̲H̲A̲R̲D̲W̲A̲R̲E̲
The proposed Crypto Control System is a separate system
configured around a dualized X-net (Non-tempest). A
schematic of the Crypto Control System is shown in
figure 6.1-1.
For a general description of the X-net and X-net components
refer to section 2.1.2.
The process capacity in the CRYPTO System is provided
by a work stations, called X-net Administrator, XNA.
This work station is based on the CR16 Terminal.
Fo redundancy purposes the Crypto System is equipped
with 2 XNA's.
The CR16 is in this configuration equipped as a compact
desk top integrated work station, which includes an
intelligent terminal, one mini-Winchester rigid drive
and one mini flopy disk drive.
The Crypto System is equipped with one XTA for interface
to the papertape reader, one XTA for interface to the
printer and two XTA for communication with the Central
Communication System. This communication includes requests
for ky allocation to the Cryptos and status information
to be exchanged between the two systems.
The paths for data to/from cryptos and the paths for
crypto keys is depicted in figure 6.2-2.
Figure 6.1.-1
Crypto Control System…86…1 …02… …02… …02… …02…
Figure 6.1-2
Paths for Keys and Data…86…1 …02… …02… …02… …02…
6.1.1 S̲y̲s̲t̲e̲m̲ ̲I̲n̲t̲e̲r̲f̲a̲c̲e̲ ̲t̲o̲ ̲O̲f̲f̲-̲L̲i̲n̲e̲ ̲C̲r̲y̲p̲t̲o̲g̲r̲a̲p̲h̲i̲c̲ ̲E̲q̲u̲i̲p̲m̲e̲n̲t̲
The information provided in the request for proposal
is insufficient to evaluate this interface.
This proposal is basd on the assumption that the 5-bit
bytes of the keys are transferred under control of
some control signals. Additional information like the
number of the key and the number of the byte in the
key is reported in parallel with the key data. The
key iformation is only transferred once to the cryptos
each time the Central Communication System requests
a new key to be used.
A special XTA is developed for this purpose. The Crypto
System is equipped with 4 XTAs for interface to 4 off
line crypto'