
What is the KSD-64 [A] crypto ignition key?
The KSD-64 [A] Crypto Ignition Key (CIK) is an NSA -developed EEPROM chip packed in a plastic case that looks like a toy key. The model number is due to its storage capacity — 64 kibibits (65,536 bits, or 8 KiB ), enough to store multiple encryption keys.
What is a cryptovariable key?
It often uses the term cryptovariable for the bits that control the stream cipher, what the public cryptographic community calls a key. data encryption key (DEK) used to encrypt the underlying data. derived key - keys computed by applying a predetermined hash algorithm or key derivation function to a password or, better, a passphrase.
How is the ignition key sequence provided?
The ignition key sequence can be provided in several ways. In the first crypto-equipment to use the idea (the KY-70), the CIK is loaded with its sequence at NSA and supplied to each user like any other item of keying material. Follow-on application (as in the STU-II) use an even more clever scheme.
What is a pre-placed key and red key?
pre-placed key - (NSA) large numbers of keys (perhaps a year's supply) that are loaded into an encryption device allowing frequent key change without refill. RED key - (NSA) symmetric key in a format that can be easily copied, e.g. paper key or unencrypted electronic key.

What happens if you lose your key?
If the key is lost, the user is still safe unless the finder or thief can match it with the user's machine. In case of loss, the user gets a new CIK, effectively changing the lock in the cipher machine, and gets back in business. The ignition key sequence can be provided in several ways.
What is a CIK?
The CIK is a small device which can be loaded with a 128·bit sequence which is different for each user. When the device is removed from the machine, that sequence is automatically added (mod 2) to the unique key in the machine, thus leaving it stored in encrypted form.
Can crypto equipment be accessed by unauthorized people?
This concept appears particularly attractive in office environments where physical structures and guarding arrangements will not be sufficiently rigorous to assure that crypto-equipments cannot be accessed by unauthorized people.
Datakey & Cryptographic Network Security
The Datakey range of portable memory products is used extensively in the field of cryptographic network security.
The first rule of Fight Club
If you’ve seen the Brad Pitt classic, you’ll know that the first rule of Fight Club is that you don’t talk about Fight Club.
What is a key encryption key?
key production key (KPK) -Key used to initialize a keystream generator for the production of other electronically generated keys. key fill - (NSA) loading keys into a cryptographic device. See fill device.
What is a firefly key?
FIREFLY key - (NSA) keys used in an NSA system based on public key cryptography.
What is a DEK key?
data encryption key (DEK) used to encrypt the underlying data. derived key - keys computed by applying a predetermined hash algorithm or key derivation function to a password or, better, a passphrase. electronic key - (NSA) key that is distributed in electronic (as opposed to paper) form. See EKMS.
What is a cryptovariable?
cryptovariable - NSA calls the output of a stream cipher a key or key stream. It often uses the term cryptovariable for the bits that control the stream cipher, what the public cryptographic community calls a key. data encryption key (DEK) used to encrypt the underlying data.
What is an ephemeral key?
ephemeral key - A key that only exists within the lifetime of a communication session. expired key - Key that was issued for a use in a limited time frame ( cryptoperiod in NSA parlance) which has passed and, hence, the key is no longer valid. FIREFLY key - (NSA) keys used in an NSA system based on public key cryptography.
What is a session key?
session key - key used for one message or an entire communications session. See traffic encryption key. symmetric key - a key that is used both to encrypt and decrypt a message. Symmetric keys are typically used with a cipher and must be kept secret to maintain confidentiality.
Why is a private key kept secret?
The decryption or private key must be kept secret to maintain confidentiality. Public keys are often distributed in a signed public key certificate. pre-placed key - (NSA) large numbers of keys (perhaps a year's supply) that are loaded into an encryption device allowing frequent key change without refill.
