Knowledge Builders

what is a crypto ignition key

by Amie Hansen Published 3 years ago Updated 2 years ago
image

Definition(s): Device or electronic key used to unlock the secure mode of cryptographic equipment.

Full Answer

What is the KSD-64 [A] crypto ignition key?

The KSD-64 [A] Crypto Ignition Key (CIK) is an NSA -developed EEPROM chip packed in a plastic case that looks like a toy key. The model number is due to its storage capacity — 64 kibibits (65,536 bits, or 8 KiB ), enough to store multiple encryption keys.

What is a cryptovariable key?

It often uses the term cryptovariable for the bits that control the stream cipher, what the public cryptographic community calls a key. data encryption key (DEK) used to encrypt the underlying data. derived key - keys computed by applying a predetermined hash algorithm or key derivation function to a password or, better, a passphrase.

How is the ignition key sequence provided?

The ignition key sequence can be provided in several ways. In the first crypto-equipment to use the idea (the KY-70), the CIK is loaded with its sequence at NSA and supplied to each user like any other item of keying material. Follow-on application (as in the STU-II) use an even more clever scheme.

What is a pre-placed key and red key?

pre-placed key - (NSA) large numbers of keys (perhaps a year's supply) that are loaded into an encryption device allowing frequent key change without refill. RED key - (NSA) symmetric key in a format that can be easily copied, e.g. paper key or unencrypted electronic key.

image

What happens if you lose your key?

If the key is lost, the user is still safe unless the finder or thief can match it with the user's machine. In case of loss, the user gets a new CIK, effectively changing the lock in the cipher machine, and gets back in business. The ignition key sequence can be provided in several ways.

What is a CIK?

The CIK is a small device which can be loaded with a 128·bit sequence which is different for each user. When the device is removed from the machine, that sequence is automatically added (mod 2) to the unique key in the machine, thus leaving it stored in encrypted form.

Can crypto equipment be accessed by unauthorized people?

This concept appears particularly attractive in office environments where physical structures and guarding arrangements will not be sufficiently rigorous to assure that crypto-equipments cannot be accessed by unauthorized people.

Datakey & Cryptographic Network Security

The Datakey range of portable memory products is used extensively in the field of cryptographic network security.

The first rule of Fight Club

If you’ve seen the Brad Pitt classic, you’ll know that the first rule of Fight Club is that you don’t talk about Fight Club.

What is a key encryption key?

key production key (KPK) -Key used to initialize a keystream generator for the production of other electronically generated keys. key fill - (NSA) loading keys into a cryptographic device. See fill device.

What is a firefly key?

FIREFLY key - (NSA) keys used in an NSA system based on public key cryptography.

What is a DEK key?

data encryption key (DEK) used to encrypt the underlying data. derived key - keys computed by applying a predetermined hash algorithm or key derivation function to a password or, better, a passphrase. electronic key - (NSA) key that is distributed in electronic (as opposed to paper) form. See EKMS.

What is a cryptovariable?

cryptovariable - NSA calls the output of a stream cipher a key or key stream. It often uses the term cryptovariable for the bits that control the stream cipher, what the public cryptographic community calls a key. data encryption key (DEK) used to encrypt the underlying data.

What is an ephemeral key?

ephemeral key - A key that only exists within the lifetime of a communication session. expired key - Key that was issued for a use in a limited time frame ( cryptoperiod in NSA parlance) which has passed and, hence, the key is no longer valid. FIREFLY key - (NSA) keys used in an NSA system based on public key cryptography.

What is a session key?

session key - key used for one message or an entire communications session. See traffic encryption key. symmetric key - a key that is used both to encrypt and decrypt a message. Symmetric keys are typically used with a cipher and must be kept secret to maintain confidentiality.

Why is a private key kept secret?

The decryption or private key must be kept secret to maintain confidentiality. Public keys are often distributed in a signed public key certificate. pre-placed key - (NSA) large numbers of keys (perhaps a year's supply) that are loaded into an encryption device allowing frequent key change without refill.

image

1.Cryptographic Ignition Key - Glossary | CSRC

Url:https://csrc.nist.gov/glossary/term/cryptographic_ignition_key

8 hours ago Cryptographic Ignition Key. Abbreviation (s) and Synonym (s): CIK. show sources. Definition (s): Device or electronic key used to unlock the secure mode of cryptographic equipment.

2.KSD-64 - Wikipedia

Url:https://en.wikipedia.org/wiki/KSD-64

3 hours ago If you’re looking for a crypto ignition key that you can use for your military or governmental application, then it’s worth noting that Datakey products are recognised as the leaders in CIKs. As you know, CIKs are essential in a huge number of security applications, and often serve as the primary way of restricting access and de-classifying secure communication equipment.

3.Crypto ignition key | The IT Law Wiki | Fandom

Url:https://itlaw.fandom.com/wiki/Crypto_ignition_key

19 hours ago  · A physical device known as a Crypto Ignition Key had to be inserted into the telephone, and turned with a satisfying clunk to enable encryption. This physical key contains digital encryption keys...

4.CIK Crypto Ignition Key - Nexus Industrial Memory

Url:https://www.nexusindustrialmemory.com/knowledge/industry-sectors/cik-crypto-ignition-key-military-government-sector/

17 hours ago Product Details | CRYPTO IGNITION KEY 5810-01-583-4368 A physical key for Communications Security Equipment that does not process multilevel encryption/decryption functions. It only provides for unlock/lock communication equipment capability and allows for secure voice/data processing within the associated equipment.

5.John McMaster Explains Crypto Ignition Phone Keys And …

Url:https://hackaday.com/2019/12/02/john-mcmaster-explains-crypto-ignition-phone-keys-and-how-to-reproduce-them/

22 hours ago crypto ignition key An NSA key storage device ( KSD-64) shaped to look like an ordinary physical key. cryptovariable - NSA calls the output of a stream cipher a key or key stream. It often uses the term cryptovariable for the bits that control the stream cipher, what the public cryptographic community calls a key.

6.Glossary of cryptographic keys - Wikipedia

Url:https://en.wikipedia.org/wiki/Glossary_of_cryptographic_keys

17 hours ago crypto ignition key (cik) for the kg-175d micro only sst series slimline;height:0.180 in;width:0.730 in;depth:1.190 in;weight:0.010 oz;color:grey;memory:16kb III END ITEM IDENTIFICATION KG-175D

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9