Learning Event 3:
IDENTIFY CRYPTOGRAPHIC SECURITY INSPECTION AREAS
1.
Cryptographic security (cryptosecurity) is that component of COMSEC
that results from the provision of technically sound cryptosystems and their
proper use.
2.
of cryptosystems.
Cryptosystems are those items of COMSEC material that
provide a single means of encryption and decryption.
Cryptosystems are
designated on-line or off-line.
On-line cryptosystems use cryptoequipment
that is directly connected to the signal path. Examples of on-line system
include the KW-7 installed in a teletype system and the KY-57 used with a
VRC-12
FM
radio
system.
Off-line
cryptosystems
perform
encryption/decryption by hand or by machines that are not electrically
connected to the signal path.
Examples are numeral/cipher systems and
tactical operations codes.
3.
The terminology that pertains to cryptosecurity is important for
identification and management of cryptosystems.
The marking "CRYPTO" is
used to identify COMSEC keys used to protect or authenticate communications
authority is the individual or agency responsible for directing the
establishment and operation of cryptonets. A cryptonet includes individuals
or elements which must intercommunicate in a secure mode.
Cryptonets are
not necessarily synonymous with communications nets.
Cryptonets may be
established along command or operational lines, whichever serves the
commanders' requirements.
4.
When inspecting your area for proper cryptographic security, attention
to detail is critical.
The equipment in use must be checked for proper
installation.
Special attention should be given to interconnection of
cabling.
cryptoequipment.
An improperly keyed cryptosystem will not function
properly; hence, the keying of the system must be checked.
When keying
material is superseded, it must be destroyed. Destruction is accomplished
immediately, or within 72 hours.
Superseded keying material is most
sensitive and expeditious destruction is imperative. Continuous protection
and control of keying material is accomplished through shift-to-shift and
daily inventories. The area of operations is protected by full time guards
or operating personnel.
Operating personnel normally provide adequate
protection of a cryptofacility while in operation. Unkeyed COMSEC equipment
that is installed in an operational configuration requires the same level of
While
keyed, COMSEC equipment must be protected to
19