NSA Encryption Systems - Security Factors

Security Factors

NSA has to deal with many factors in ensuring the security of communication and information (COMSEC and INFOSEC in NSA jargon):

  • Confidentiality and authentication - making sure messages cannot be read by unauthorized people and that they cannot be forged (nonrepudiation). Little is publicly known about the algorithms NSA has developed for protecting classified information, what NSA calls Type 1 algorithms. In 2003, for the first time in its history, NSA approved two published algorithms, Skipjack and AES for Type 1 use in NSA approved systems.
  • Traffic flow security - making sure an adversary cannot obtain information from traffic analysis, often accomplished by link encryption.
  • Key management - getting keys securely to thousands of crypto boxes in the field, perhaps the most challenging part of any encryption system. One NSA goal is benign fill (technology for distributing keys in a way that the humans never have access to plaintext key).
  • Investigative access - making sure encrypted communications are accessible to the U.S. Government. While few would argue with the need for the government to access its own internal communications, the NSA Clipper chip proposal to extend this key escrow requirement to public use of cryptography was highly controversial.
  • TEMPEST - protecting plaintext from compromise by electronic, acoustic or other emanations.
  • Tamper resistance, tamper-evident, self-destruct - ensuring security even if encryption systems are physically accessed without authorization or are captured.
  • Meeting military specifications for size, weight, power consumption, MTBF and ruggedness to fit in mobile platforms.
  • Electromagnetic pulse hardening - protecting against nuclear explosion effects, particularly electromagnetic pulse.
  • Ensuring compatibility with military and commercial communication standards.
  • Controlling cost - making sure encryption is affordable so units that need it have it. There are many costs beyond the initial purchase price, including the manpower to operate and maintain the systems and to ensure their security and the cost of key distribution.
  • Enabling secure communication with NATO, allied and coalition forces without compromising secret methods.

Read more about this topic:  NSA Encryption Systems

Famous quotes containing the words security and/or factors:

    Of course we will continue to work for cheaper electricity in the homes and on the farms of America; for better and cheaper transportation; for low interest rates; for sounder home financing; for better banking; for the regulation of security issues; for reciprocal trade among nations and for the wiping out of slums. And my friends, for all of these we have only begun to fight.
    Franklin D. Roosevelt (1882–1945)

    I always knew I wanted to be somebody. I think that’s where it begins. People decide, “I want to be somebody. I want to make a contribution. I want to leave my mark here.” Then different factors contribute to how you will do that.
    Faith Ringgold (b. 1934)