Learning Event 3:
IDENTIFY CRYPTOGRAPHIC SECURITY INSPECTION AREAS
Cryptographic security (cryptosecurity) is that component of COMSEC
that results from the provision of technically sound cryptosystems and their
Cryptosystems are those items of COMSEC material that
provide a single means of encryption and decryption.
designated on-line or off-line.
On-line cryptosystems use cryptoequipment
that is directly connected to the signal path. Examples of on-line system
include the KW-7 installed in a teletype system and the KY-57 used with a
encryption/decryption by hand or by machines that are not electrically
connected to the signal path.
Examples are numeral/cipher systems and
tactical operations codes.
The terminology that pertains to cryptosecurity is important for
identification and management of cryptosystems.
The marking "CRYPTO" is
used to identify COMSEC keys used to protect or authenticate communications
authority is the individual or agency responsible for directing the
establishment and operation of cryptonets. A cryptonet includes individuals
or elements which must intercommunicate in a secure mode.
not necessarily synonymous with communications nets.
Cryptonets may be
established along command or operational lines, whichever serves the
When inspecting your area for proper cryptographic security, attention
to detail is critical.
The equipment in use must be checked for proper
Special attention should be given to interconnection of
An improperly keyed cryptosystem will not function
properly; hence, the keying of the system must be checked.
material is superseded, it must be destroyed. Destruction is accomplished
immediately, or within 72 hours.
Superseded keying material is most
sensitive and expeditious destruction is imperative. Continuous protection
and control of keying material is accomplished through shift-to-shift and
daily inventories. The area of operations is protected by full time guards
or operating personnel.
Operating personnel normally provide adequate
protection of a cryptofacility while in operation. Unkeyed COMSEC equipment
that is installed in an operational configuration requires the same level of
keyed, COMSEC equipment must be protected to