19 August 2006

Errata in Google conversion of PDF to HTML.


This is the html version of the file https://abop.monmouth.army.mil/baas.nsf/Solicitation+By+Number/8DACD026B1A51183852571100056C32F/$File/Req+Desc+Paper+1.pdf.
G o o g l e automatically generates html versions of documents as we crawl the web.
To link to or bookmark this page, use the following url: http://www.google.com/search?q=cache:adxEY5ThahoJ:https://abop.monmouth.army.mil/baas.nsf/Solicitation%2BBy%2BNumber/8DACD026B1A51183852571100056C32F/%24File/Req%2BDesc%2BPaper%2B1.pdf+R21-TECH-30-01,+%22MEDLEY+Implementation+Standard%22&hl=en&gl=us&ct=clnk&cd=6
Google is neither affiliated with the authors of this page nor responsible for its content.


Page 1

U//FOUO
U//FOUO

U.S. ARMY CERDEC POET

(U) General Dynamics Requirements Description Paper
NOTE: All material contained within this report should be considered
U//FOUO. Individual paragraphs have not been individually marked.

Page 2

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CM-001-03

PROOF OF CONCEPT STUDY FOR AN ADVANCED HIGH SPEED
EMBEDDABLE CRYPTOGRAPHIC CHIPSET OR MODULE
REQUIREMENTS DESCRIPTION PAPER
22 November 2005

Revision 2.0
Prepared for:
Lear Siegler Services, Inc.
595 Shrewsbury Avenue
Shrewsbury, NJ 07702
and
Cryptographic Modernization Office
RDECOM, CERDEC, S&TCD CSC
Fort Monmouth, NJ 07703
Prepared by:
General Dynamics C4 Systems
8220 E. Roosevelt Street
Scottsdale, AZ 85257
Contract Number: DAAB07-03-D-B010
Delivery Order: LSI Task Order 094
Subcontract Number: 1.06.20.026
Delivery Order: GDC4S Task Order 002

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 3

UNCLASSIFIED//FOR OFFICIAL USE iNLY

CM-001-03

This Page Is Intentionally Blank
UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 4

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CM-001-03

Document Revision History

THIS TABLE IS UNCLASSIFIED//FOR OFFICIAL USE ONLY
Revision
Date
Description
1.0
16 September 2005
Initial Release
2.0
22 November 2005
Update per CERDEC comments
THIS TABLE IS UNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 5

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CM-001-03

This Page Is Intentionally Blank

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 6

UNCLASSIFIED//FOR OFFICIAL

Use

ONLY

CM-001-03

Table of Contents

1.
SCOPE
1
2.
INFORMATION SOURCES.......................................................................................................2
3.
CAPABILITY OVERVIEW........................................................................................................4
3.1
ARCHITECTURE
4
3.2
INTERIM INFORMATION ASSURANCE DIRECTORATE (IAD) PROCEDURE..............6
3.3
INITIALIZATION
7
3.4
Multi-band, Multi-mode..............................................................................................................7
3.5
WAVEFORM CRYPTOGRAPHY AND MANAGEMENT COMSEC................................... 8
3.6
SCALABLE THROUGHPUT AND POWER............................................................................8
3.7
MULTIPLE SECURITY LEVELS .............................................................................................8
3.8
REMOTE MANAGEMENT CAPABILITY..............................................................................9
3.9
INTEROPERABLE
9
3.10
UPGRADEABLE.......................................................................................................................9
311
ALGORITHMS.........................................................................................................................
an
3.12
INTEGRATABLE.....................................................................................................................11
3.13
STANDARDS BASED INTERFACES....................................................................................12
4.
TRANSMISSION SECURITY (TRANSEC)............................................................................13
4.1
AEHF WAVEFORM................................................................................................................13
4.1.1
Low Data Rate (LDR)............................................................................................................... 14
4.1.2
Medium Data Rate (MDR)..............................................................................................

14

4.1.3
Extended Data Rate (XDR).............................................................................................

14

4.2
TSAT WAVEFORM.................................................................................................................15
4.3
WGS WAVEFORM
15
4.4
COMMERCIAL SATCOM WAVEFORM.............................................................................. 15
4.5
MILSTAR WAVEFORM.........................................................................................................16
4.6
MIL-188-EEE WAVEFORM....................................................................................................16
4.7
WAVEFORM COMSEC...........................................................................................................16
4.7.1
CDL Streams Bulk Encryption/Decryption .....................................................................

16
4.7.2

Encryption/Decryption of Inband Terminal Control/Status (COMSEC) .........................16
9.1
KEY MANAGEMENT AND LOADING............................................................................... 21
9.2
KEY HANDLING AND STORAGE....................................................................................... 22
9.3
ZEROIZATION....................................................................................................................... 22
9.4
AEHF CHANNEL KEY MANAGEMENT............................................................................. 22
9.5
TSAT CHANNEL KEY MANAGEMENT............................................................................. 23
9.6
CDL CHANNEL KEY MANAGEMENT............................................................................... 23
CRYPTOGRAPHIC ALGORITHM MANAGEMENT ......................................................... 23
10.1
CRYPTOGRAPHIC ALGORITHM MANAGEMENT AND LOADING..............................24
10.2
CRYPTOGRAPHIC ALGORITHM HANDLING AND STORAGE.....................................24

UNCLASSIFIED//FOR OFFICIAL USE ONLY

5.
HAIPE DEVICE INTEROPERABILITY................................................................................16
6. LEF DEVICE INTEROPERABILITY.................................................................................................18
7. KEY MANAGEMENT INFRASTRUCTURE INTEROPERABILITY ...........................................19
8. INTERNET PROTOCOL SECURITY (IPSEC) ................................................................................19
8.1 TSAT TERMINAL-TO-TMOS MESSAGE CONFIDENTIALITY AND INTEGRITY..... 20
8.2 TSAT ROUTER CONTROL PLANE CONFIDENTIALITY AND INTEGRITY.............20
9.
CRYPTOGRAPHIC KEY MANAGEMENT .......................................................................... 21
10.

Page 7

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CM-001-03
10.4
AEHF CHANNEL ALGORITHM MANAGEMENT..............................................................25
10.5
TSAT CHANNEL ALGORITHM MANAGEMENT..............................................................25
10.6
CDL CHANNEL ALGORITHM MANAGEMENT ................................................................25
11.
CRYPTOGRAPHIC BYPASS...................................................................................................25
12.
TERMINAL SOFTWARE CONFIDENTIALITY AND INTEGRITY................................26
13.
CRYPTOGRAPHIC SOFTWARE CONFIDENTIALITY AND INTEGRITY .................. 26
14.
UNCLASSIFIED STORAGE/SHIPPING OF CM..................................................................26
15.
DATA AT REST PROTECTION..............................................................................................26
16.
CRYPTOGRAPHIC MODERNIZATION ...............................................................................27
17.
SCA COMPLIANCE...................................................................................................................27
18.
INFORMATION SECURITY (INFOSEC)..............................................................................28
19.
SYSTEM ENVIRONMENTAL REQUIREMENTS...............................................................28
19.1
TEMPERATURE......................................................................................................................28
19.2
SHOCK
29
19.3
VIBRATION
29
19.3.1

Sinusoidal Vibration.......................................................................................................................29

19.3.2

Random Vibration...........................................................................................................................29

19.4
CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBRN).......................29
19.5
ELECTROMAGNETIC RADIATION.....................................................................................29
19.6
TEMPEST..................................................................................................................................30
20.
SYSTEM QUALITY FACTORS ...............................................................................................30
20.1
BUILT-IN-TEST
30
20.2
RELIABILITY
30
20.3
MAINTAINABILITY...............................................................................................................30
20.4
DESIGN AND CONSTRUCTION CONSTRAINTS............................................................... 30
21.
COMMENTS...............................................................................................................................30
A.
ACRONYMS.......................................................................................................................................33
B.
HAIPE IS REQUIREMENT ALLOCATION.................................................................................37
C.
LEF IS REQUIREMENT ALLOCATION ......................................................................................82
Iv

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 8

UNCLASSIFIED//FOR OFFICIAL UbZ ONLY

CM-001-03

List Of Figures

Figure 3.1-1 Annotated INFOSEC card from Raytheon HC3 SAR...................................5
Figure 3.1-2 CM Requirements Context Diagram.............................................................
6

List Of Tables

TABLE 3.11-1. Waveform Algorithms.............................................................................
11

v
UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 9

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CM-001-03

This Page Is Intentionally Blank

vi
UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 10

UNCLASSIFIED//FOR OFFICIAL U5., ONLY

CM-001-03

1. SCOPE

This document is a requirements description paper for a Cryptographic chipset that can
be embedded into High Capacity Communications Capability (HC3) communications
terminals or be used to develop a compatible Cryptographic module.
This requirements paper addresses the Army's HC3 application and therefore is limited to
its environment and terminal platforms. The content of this requirements paper is derived
from General Dynamics C4 Systems' (GDC4S) analysis and practical extensions of the
information provided by the government, available in public literature, and related
requirements of other current programs. The requirements herein appear to be achievable
within the practical constraints of today's industrial parts and technology.
There are additional requirements that should be defined to provide some assurance that a
Cryptographic Module/Cryptographic Chipset (CM) is developed that meets the intended
usage. These derived requirements are identified in this document by To Be Determined
(fBD), To Be
k i isik), and

.

1'o Be Specified (TBS) tags. TBR tags identify those
requirements where some information to justify an initial value or capability is available,
but the justification may be weak. System design trade offs or implementation trades may
result in changes to these values. Those requirements where sufficient supporting
information is just not available are tagged with TBDs or TBSs. TBSs are requirements
that should be defined and TBDs are requirements that may or may not be defined
depending on the platform architecture and the Government procurement philosophy.
The CM is a set of hardware and software that provides cryptographic services to HC3
terminals. It supports both TRANSEC and COMSEC functions and is capable of
changing crypto algorithms and keys in a tactical environment. This allows the CM to be
configured to interoperate with different waveforms such as Common Data Link (CDL),
Low Data Rate (LDR), Medium Data Rate (MDR), Extended Data Rate ()CDR), and
Extremely High Frequency (EHF) High Data Rate ()CDR+) on a platform-by-platform
and mission-by-mission basis.
The HC3 communication system is used for ground tactical and sea-based networks that
form part of the Global Information Grid (GIG). HC3 supports circuit and packet
switched connectivity to terrestrial, airborne, surface/subsurface and satellite
communications nodes for network centric operations. A suite of modular hardware and
software components can be chosen to tailor an HC3 system to meet tactical missions
requiring high-capacity communications.
HC3 connects tactical users across the services using military and commercial satellite
communications as well as ground-to-ground and ground-to-air Line-of-Sight (LOS)
communications links. HC3 operates with the military and commercial satellites
envisioned for 2010 and beyond using X, Ku, Ka, and Q waveforms. Military satellites
include the Wideband Gapfiller Satellite (WGS), Advanced Extremely High Frequency
(AEHF), and Transformational Satellite (TSAT). Commercial satellite support includes
Ku and Ka systems. LOS enables high data rate communications from an HC3 to an
1

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 11

UNCLASSIFIED/IFOR OFFICIAL USE ONLY

CM-001-03
airborne platform as well as LOS communications capabilities on the ground-either
directly or using an airborne relay.
The number of simultaneous waveforms hosted and operated depends on the
communications capabilities required to perform a mission and the capabilities of the
platform on which the specific HC3 resides (e.g., aboard a Ship, in a highly mobile
armored vehicle, on a Heavy High Mobility Multipurpose Wheeled Vehicle
(HHMMWV), etc.).
HC3 capabilities are assigned to the following categories. This set of categories is
referred to throughout HC3 documents to describe HC3 variants.
• Communication on the move (COTM): The ability to establish and maintain
communication while a vehicle is in motion.
• Communication at the quick halt (COTQH): The ability to establish and
maintain reliable tactical communications within 5 minutes after vehicle is at rest.
• Communication on the halt (COTH): The ability to provide reliable tactical
communications with a setup time of 30 minutes after coming to a full stop.
• Transit case: The ability to provide tactical communication with a minimum
number of transit storage cases with a setup time of 30 minutes.
• Ship: The ability to provide reliable communications in installations distributed
throughout a seagoing vessel.
• Navy Shore: The ability to provide reliable tactical communications from a
shore fixed-site facility.
• Submarine: The ability to provide communications in installations distributed
throu

g

hout a submarine.
2. INFORMATION SOURCES
The information used to derive the requirements contained in this paper consist of the
Performance Work Statement (PWS), specifications, and trade study results supplied by
the Government listed below.
• Performance Work Statement (PWS) Dated 05Apr05
• HAIPISv3 Specification Version 3.0.0. Dated 31 Mar 05
• LEF_ SPEC. NSA 03-OIA, Version 2.0, Dated 30 Sep 04
• IAD lntenm Procedure NO. 01-02, Dated 21 Jan 03
• High Capacity Communications Capability (HC3) Specification, Draft Dated 10
May 05
•
JAoA brief Minus Funding, Dated 07 Apr 05
2

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 12

UNCLASSIFIED//FOR OFFICIAL Ubr: ONLY

CM-001-03
• Raytheon Study Documents:
o Multi-Band Operations Report, July 2004
o Network Interoperability Report, July 2004
o Modular Architecture Report, July2004
o Security Architecture Report, CDRL A005-002, 29 Mar 2005
o Raytheon HC3 Study Statement Of Work (SOW), 26 Oct 04
• Boeing Study Documents:
o HC3 Modular Architecture Description Document, CDRL A001-01 Dated
1 Oct 04
o Boeing HC3 Study Statement Of Work (SOW), 16 Mar 05
o HC3 Security Architecture Draft presentation 16 Jan 05 (proprietary
marking removed)
o TIM 4 slides, 1 i-18 May 05
o Security Architecture Report CDRL A005 Interim Draft Dated 1 Aug 05
o TIM 5 slides, 1-2 June 2005
• Algorithm Table update received 15 July 2005
The following documents are referenced by the above source material and provide
additional detail from which the CM requirements were derived.
• Joint Tactical Radio System (JTRS-5000), Software Communications
Architecture Specification, SCA V3.0, August 27, 2004
• JTRS-5000 SEC, Security Supplement to the Software Communications
Architecture Specification, V3.0, August 27, 2004.
• JTRS-5000 SP, Specialized Hardware Supplement to the Software
Communications Architecture (SCA)` Specification, V3.0, August 27, 2004.
• Electronic Key Management System (EKMS 217), EKMS Benign Techniques
Specification, Revision G, 21 December 2001.
• EKMS 308, EKMS Data Tagging and Delivery Standard, Revision D, 09
September 2003.
• EKMS 317, EKMS FIREFLY Specification, 15 April 2002.
• EKMS 322, Generic Fill Format Specification, 26 August 1998.
• KG-TG-002-96 Standard for Signing and Obtaining a Hash word for a Software
Package to Support INFOSEC Applications (for Signature Verification Only).
•
HAIPE Legacy Encryption Implementation Guide, 31 Mar 2005
3

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 13

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CM-001-03
3. CAPABILITY OVERVIEW
Future communication terminal architectures will require enhanced high-speed
cryptographic capabilities in order to support the higher data rates and increased security
demands imposed by modem waveforms and ever-increasing security regulations.
These future terminals are envisioned to be a family of multi-band, multi-mode,
transportable, modular, flexible, Software Communications Architecture (SCA)
compliant, satellite and Line of Sight (LOS) systems supporting simultaneous
communications between ground, airborne and surface/subsurface units for a range of
missions across all services in tactical operational environments.
These terminals are envisioned to be capable of operating with the military and
commercial satellites envisioned to be operational in the 2010 and beyond timeframe,
utilizing X, Ka, and Q-band frequencies. These systems included the Wideband Gapfiller
System (WGS), Advanced Extremely High Frequency (AEHF), and Transformational
Communications MILSATCOM (TCM) constellations. Commercial satellite support will
include both Ku and Ka-band systems. The terminals will also provide high-capacity
line-of-sight (LOS) communications utilizing Common Data Link (CDL)/Networked
Common Data Link (NCDL) links.
Because the family of systems will operate with many legacy waveforms currently used
by military and civilian agencies, and incorporate new waveforms as they are developed,
the cryptographic components of the system will need to be programmable and scaleable
to meet specific user operational needs. The desire is that the system provides flexibility
through an open system architecture that enables technology insertion (via re-
programmability or other means). The terminal system will be capable of high data
throughput rates per channel; incremental channel expansion; high levels of reliability,
availability, and maintainability; technological enhancement; and commercial support
service compatibility.
3.1 Architecture
The CM is intended to be a subsystem of an INFOSEC module within a HC3 terminal.
All RED processing within the terminal is done within the INFOSEC module. The CM
provides cryptographic services and isolates the RED processing from the rest of the
terminal. A modified version of the INFOSEC module block diagram of the one in the
Raytheon HC3 Security Architecture Report (SAR) showing the CM is given in Figure
3.1-1. The diagram has been annotated to show General Dynamic C4 Systems' (GDC4S)
recommendation that the CM boundary should be extended to include all RED/BLACK
signaling (bypass/control).
4

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 14

UNCLASSIFIED//FOR OFFICIAL UoE ONLY

CM-001-03
Figure 3.1-1. Annotated INFOSEC card from Raytheon HC3 SAR
The major functions provided by the CM include cryptographic key management, High
Assurance

-

Internet.

Protocol

Encryptor (HAIPE) management COMSEC, TRANSEC for
up to four channels, bypass processing, non-user data COMSEC and RED data for
storage. The CM interfaces to other functions of the INFOSEC module and terminal. A
top-level view of the CM functional allocation and their context is shown in Figure 3.1-2.
5

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 15

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CM-001-03

Real
Time
Clock

Power
(prime
and
battery)
CIK
(User/
Tamper
Recovery)
( .
FILL

--------------------

RED High Speed
processing
Waveform
TRANSEC
and
COMSEC
ZEROIZE
TAMPER
BLACK High Speed
tâ–º
Suite
(

'T

y

p

e - - -
A/B
Interfaces to Modems

-------------------

or

Commercial)

Terminal
Applications
RED Processing
Low Speed
modem
Interface
HAIPE or
Commercial
RED
IP formatting
and protocols
Low Speed
modem
Interface
HAIPE or
Commercial
BLACK IP
formatting
MILS Key
MGMT and
wrapping
(

Typ

e 1
Suite A/B or
Commercial)
MILS COMSEC
(HAIPE Type 1
Suite A/B or
Commercial)
Bypass Processing
Cryptographic Module
BLACK Processing

Figure 3.1-2. CM Requirements Context Diagram
3.2 Interim Information Assurance Directorate (IAD) Procedure
The CM design shall meet the information assurance requirements described in the
following sections and must satisfy the security and certifiability of the cryptographic
application by the National Security Agency (NSA). The principal sections of Interim
Information Assurance Directorate (IAD) Procedure No. 01-02 that must be addressed
during the design include:
14.a(4) Proper Classification
14.b Development Requirements-Buildin

g

Assurance Levels 1, 2, and 3
14.b(1)(a) Cleared Personnel
14.b(1)(b) Cleared Facilities
14.b(1)(c) Established Development Methodology and Standards
14.b(2) High Level System Requirements Review
14.b(8)(c)(1) Informal Review-Requirements
6

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 16

UNCLASSIFIED//FOR OFFICIAL Us ONLY

CM-001-03
14.b(8)(c)(3) Informal Review-Code Review
The CM shall be designed such that follow-on product delivery is capable of achieving
Type 1 certification by NSA. Certification is a process involving meeting the security
requirements provided by NSA as well as evolution of the technology and policy
requirements as defined by the process documented in the User Partnership Agreement
(UPA) between the Army and NSA. This process defines both the policy, technical
capability, and testing needed for certification for a particular use.
3.3 Initialization
The CM shall utilize a boot function contained within the CM boundary. The CM boot
function shall be independent of the terminal application initialization.
The CM shall provide services to decrypt, install, and execute its run-time application.
The CM shall perform diagnostic tests during the power-up sequence. Power-up
diagnostic testing will include internal health tests, memory tests, and other tests
determined to be necessary to satisfy the system security -: .ysts. Upon request, the CM
shall provide the results of the diagnostic tests, in addition to the overall CM version
identifier.
Upon request, the CM shall perform additional diagnostics during the HC3 terminal
initialization sequence. These diagnostics will include known answer tests (to verify the
encrypt/decrypt path) and tests that verify the correct operation of the cryptographic
bypass.
3.4 Multi-band, Multi-mode
The CM supports platforms that are multi-band and multi-mode, with the capability to
run various modes/waveforms simultaneously with varying security level and data
requirements for each.
The CM shall provide the waveform cryptography for at least four separate, independent,
and simultaneous Radio Frequency (RF) channels. Waveform cryptography includes the
generation of key streams required by the terminal TRANSEC modulation and cover
functions as well as performing waveform COMSEC encryption and decryption where
required.
The CM shall support both continuous and request-reply interface concepts.
The CM shall generate waveform cryptography key streams to support at least 500
Megabits per second (Mbps) bandwidth on each channel and the aggregate bandwidth of
2 Gigabits per second (Gbps) (threshold requirement).
The term Security Association (SA) is used in this requirements description paper to
identify/describe a relationship between a key with the data source and/or destination. A
unique key will require a unique SA, however a unique seed (e.g. Time of Day (TOD) or
Net ID) does not. The CM shall support up to an aggregate of 28 simultaneous waveform
SAs (4 channels, 7 SAs each). This is in addition to the SA support required for
waveform COMSEC and remote managers.
7

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 17

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CM-001-03
The CM shall provide the capability to accept seed and/or time-of-day (TOD)
information from a channel Modulator Demodulator (MODEM) and reply with the
corresponding TRANSEC bits required by the MODEM to perform its TRANSEC
functions.
The CM shall provide the TRANSEC bits to the channel interface within To Be Specified
(TBS) msec of receiving the request (defined as the time between the last request bit is
received and the last response bit is sent).
3.5 Waveform Cryptography and Management COMSEC
The CM provides both waveform cryptography and remote management COMSEC
capabilities. It shall be configurable to perform either or both functions.
All user data entering the terminal will already be COMSEC encrypted (i.e. "black").
A relationship that defines a key with the source and/or destination is identified as a
Security Association (SA) in this requirements description paper. A unique COMSEC
key will require a unique SA.
3.6 Scalable Throughput and Power
Some platforms are not required to provide high or multi-channel throughput capability
but low power consumption is critical. Reasonable means to conserve power shall be
employed, including reducing CM power consumption when high performance is not
needed.
The CM shall be configurable for different levels of aggregate throughput from 100 Kbps
to 2 Gbps (threshold). An aggregate throughput of 10 Gbps is a desired objective
capability. Derivative implementations for higher or lower throughput should implement
a common control and management scheme and should implement a common design
when feasible to reduce development/certification/maintenance costs.
The CM shall be configurable for the number of independent channels supported from
one to four.
The CM shall scale its power requirements in relation to the configured throughput and
channels supported, lower throughput using less power.
3.7 Multiple Security Levels
The CM shall provide the capability to operate at all security levels from Sensitive, But
Unclassified (SBU) to Top Secret/Sensitive Compartmented Information (TS/SCI).
Simultaneous operation on up to four channels at different security levels with required
domain separation shall be supported. Each channel. however, operates at a single
classification level. (See the discussion in the comments section)
The CM shall provide multiple security level COMSEC support to the terminal
management function. The terminal management function communicates with Multiple
Network Management Servers operating at different security levels. The Network
8

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 18

UNCLASSIFIED//FOR OFFICIAL Usi ONLY

CM-001-03
management data/messages are expected to be classified at the level of the channel being
managed and will need to be segregated for each Network Manager and channel.
3.8 Remote Management Capability
The CM shall provide COMSEC and authentication services to the remote management
function of the terminal. Note that the CM provides authentication and COMSEC
services to the terminal and responds to terminal provided commands but does not
interface directly with remote sites. The CM also supports "unattended" operations
indirectly where an operator is not physically present at the terminal. These operational
requirements will include features such as zeroization and low power consumption.
Management includes cryptographic device control and status, network/system
management and key management and distribution. A common management structure
over all implementations is a threshold requirement with a single management view or
model. A desired objective capability is that the entire community of terminals should be
able to be managed from a single workstation. It is also a desired objective capability that
.i.,glc ma,1agel,.:: ,t worl.o:ation also Le able to enforce terminal con .
guidelines and policies. All management shall be in accordance with current security
guidelines.
The CM COMSEC shall be interoperable with High Assurance Internet Protocol
Encryptor (HAIPE) compliant Inline Network Encryptor (INE) devices located at the
management sites and used to encrypt and decrypt management messages.
The CM shall provide the cryptography needed by the terminal authentication function to
identify and authenticate Remote Management Entities.
The CM shall provide the capability to accept restart commands and restart without an
operator physically present at the terminal/crypto. The HAIPE Management Information
Base (MIB) includes objects that provide the capability to restart the terminal from a
management workstation.
The CM supports the terminal capability to accept Over The Air Zeroize (OTAZ)
commands without an operator physically present at the terminallcrypto with its
authentication and cryptographic services. The terminal interfaces with remote entities
and generates the commands that select and execute the CM zeroization capabilities
provided for both keys and algorithms.
The CM shall support an aggregate of at least 16 remote management SAs. This
accommodates four remote managers operating at up to four security levels and is in
addition to SAs that may be needed to support other terminal functions.
3.9 Interoperable
The CM shall interoperate with legacy systems and modem systems desi

g

ned to existing
standards as defined in this requirements paper.
3.10 Upgradeable
It is desirable to maximize the field upgradeability of the CM. All upgrading should be
achievable from the management workstation. The device should have technology

9
UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 19

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CM-001-03
insertion built in. This ability should allow continued operation as the current standards
evolve (e.g., Link Encryptor Family (LEF) 2.0). All upgrading shall be in accordance
with security requirements.
The HAIPE Interoperability Specification (IS) includes requirements to support over-the-
network field upgrade of terminal software/firmware. The terminal communicates with a
manager using either the Trivial File Transfer Protocol ('1'N 1'P) or the Hypertext Transfer
Protocol (HTTP) to retrieve an encrypted upgrade package. The CM shall support
software and signature verification in accordance with KM-TG-002-96, "Standard for
Signing and Obtaining a Hash word for a Software Package to Support INFOSEC
Applications (for Signature Verification Only)." The CM shall verify the signature on a
software file prior to non-volatile storage.
3.11 Algorithms
The CM shall provide the capability to generate key streams and support COMSEC
functions using the following algorithms. Table 3.11-1 lists the waveform, associated
algorithms and highest security level associated with each.
MEDLEY
SHILLELAGH
BATON
KEESEE
AES (Advanced Encryption Standard)
WALBURN
Commercial SATCOM
SAVILLE
The CM shall provide WEASEL cryptographic capability to the terminal for
authentication services.
10

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 20

_ UNCLASSIFIED//FOR OFFICIAL UNE ONLY

CM-001-03
TABLE 3.11-1. Waveform Algorithms
THIS TABLE IS UNCLASSIFIED//FOR OFFICIAL USE ONLY
Waveform
Modulation
Algorithm(s)
Cover
Algorithm(s)
COMSEC
Algorithm(s)
Max Security
Level

AEHF LDR
Suite A:
MEDLEY
SHILLELAGH
BATON
KEESEE
Suite A:
MEDLEY
SHILLELAGH
BATON
KEESEE
TBS
SECRET
AEHF MDR
Suite A:
MEDLEY
SHILLELAGH
BATON
KEESEE
Suite A:
MEDLEY
SHILLELAGH
BATON
KEESEE
TBS
SECRET

A
: '
..

Suite A:
MEDLEY
SHILLELAGH
BATON
KEESEE
Suite

A:

MEDLEY
SHILLELAGH
TBS
SECT
BATON
KEESEE
TSAT XDR+
Suite A or B:
MEDLEY
SHILLELAGH
BATON
KEESEE
AES
Suite A or B:
MEDLEY
SHILLELAGH
BATON
KEESEE
AES
TBS
SECRET
WGS (MIL-188-165A) None
WALBURN
AES
SECRET
Commercial
SATCOM
TBS
TBS
TBS
UNCLASS
CDL 1
None
Suite A*
Suite A*
TOP SECRET
CDL 2
None
Suite A*
Suite A*
TOP SECRET
MILSTAR
TBS
TBS
TBS
TBS
MIL-188-EEE
AES
AES
TBS
TBS

THIS TABLE IS UNCLASSIFIED//FOR OFFICIAL USE ONLY
*-Details classified,
Required algorithms could be selected from a library of SCA compliant implementation
sets.
3.12 Integratable
While the CM design demonstrated will not be a production item, the design approach is
expected to meet the requirements described in this document and have the features
11

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 21

UNCLA6SIFIED//FOR OFFICIAL USE ONLY

CM-001-03
necessary for NSA certification to the maximum extent possible. When the design is
certified by NSA and taken to production, it is envisioned that the CM would be
delivered as an item(s) that could be embedded into a variety of platforms.
3.13 Standards Based Interfaces
To maximize the usability of the CM, industry standards shall be used for all external
interfaces. The proper use of interface standards to allow future technology insertion and
development of derivative products is a requirement. The interfaces discussed in this
requirements paper are listed below in summary form. These interfaces are discussed in
more detail in the corresponding capability section.
The interface list below does not mean to imply physically separate interfaces. Interfaces
may be aggregated on physical media subject to meeting other requirements.
The CM shall provide four high speed aggregate TRANSEC stream interfaces (one for
each channel's modulation and cover).
The CM shall provide four high speed waveform COMSEC interfaces (red and black
interface for each).
The CM shall provide an identification and authentication service interface.
The CM shall provide remote management message interface(s).
The CM shall provide a recoverable zeroize key command discrete signal interface (i.e.
recoverable via Over-the-air rekey (OTAR), benign, or black fill techniques).
The CM shall provide a zeroize all keys command discrete signal interface (zeroize all
key command includes the key material needed to support OTAR, benign, or black fill
techniques).
The CM shall provide a zeroize algorithm command discrete signal interface.
The CM shall provide a TAMPER command discrete signal interface.
The CM shall provide discrete status interfaces to indicate alarm and tamper conditions.
The CM shall provided a TBS power interface. The CM power consumption, when
configured as a module, shall be less than or equal to 35 Watts.
The goal is to maintain CM operation when its stored or transported without the need for
battery power. If a battery is required to maintain CM operation during storage or
transport, and the CM is configured as a module, the CM shall provide an interface for a
transport battery. In this case a transport battery will be attached to the CM in order to
provide power when the CM is not installed in and powered by an Line Replaceable Unit
(LRU), i.e., when the CM is in storage or in transit from its factory location. The
transport battery will be indelibly marked with a visible, human-readable date (day,
month, and year) that identifies when the battery should be replaced.
The CM shall provide a TBS interface for a remote Cryptographic Ignition Key (CIK)
device.
The CM shall provide a DS-101 and EKMS 308 compatible fill interface. These
standards specify, among other things, the mechanical interface (hosted by the HC3
12

UNCLASSIFIED/IFOR OFFICIAL USE ONLY

Page 22

UNCLASSIFIED//FOR OFFICIAL Usk; ONLY

CM-001-03
terminal) and the physical, data link, and application layer services utilized by an End
Cryptographic Unit (ECU) (i.e., the HC3 terminal, specifically the CM, in this case).
These services combine to provide a method by which an EKMS 308 compliant Data
Transfer Device (DTD), such as the ANICYZ-10, can load RED or BLACK key material,
cryptographic algorithms, applications, and other data into the terminal.
The CM shall provide a local interface for loading data such as algorithms, programs, and
configuration. There are a number of concepts that accomplish this e.g. a serial, console,
or Ethernet port or use of the DS-101 fill interface.
The CM shall provide an interface(s) to accept software and configuration files from the
terminal and return the encrypted or decrypted results.
The CM shall provide an interface to accept real time clock information from the terminal
to be used for TRANSEC waveform sync purposed.
The CM, when configured as a module, shall be designed to be compatible with VMEbus
International Trade Association (VITA) standards for packaging, connectors, and
ele trical interf-

_;A;o

case the CM snail be configured as

a

15U form factor using a
maximum of 1 slot (the hardware and software required for the terminal INFOSEC
processing functions not allocated to the CM are not included in the CM).
The CM weight, when configured as a module, shall be less than or equal to seven
pounds.
4. TRANSMISSION SECURITY (TRANSEC)
The Type 1 crypto functions needed to support specific communication channels are
described in this section and organized by channel. and waveform type. The CM shall
provide Type 1 TRANSEC features sufficient to satisfy the NSA requirements allocated
to the CM. The NSA will provide a document containing these requirements as part of
the UPA for NSA cryptographic certification.
The functionality of the CM includes generating TRANSEC key stream(s) sent to the
MODEM(s)._These control fine and course frequency_hopping for spectrum spreading
and despreading.
The TRANSEC stream also contains sequences of pseudo random bits generated by a
cryptographic process that may be exclusively OR-ed with the bit stream between the
modem encoding and modulation functions. This process is called "cover".
The TRANSEC stream generated by the CM also contains information that controls the
order used in the frequency and time permutation process.
The cryptographic function of the CM also provides waveform transmission security via
encryption/decryption of link and control data as required by the channel.
4.1 AEHF Waveform
The CM shall provide the capability to generate an aggregate AEHF TRANSEC stream
using Suite A uplink key.
13

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 23

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CM-001-03
The CM shall provide the capability to generate an independent aggregate AEHF
TRANSEC stream using Suite A downlink key.
The CM shall provide the capability to generate aggregate AEHF cover streams using
distinct Suite A cover keys.
The CM shall provide the capability to encrypt/decrypt AEHF payload-to-terminal
messages using Suite A keys.
The CM shall provide COMSEC services for the inband communications channel (XCO)
as required by select AEHF platforms.
4.1.1 Low Data Rate (LDR)
LDR transmissions are protected by three uplink TRANSEC functions:
1) Frequency hopping
2) Time and frequency permutation
3) Selective C2 (Terminal-to-Payload Control Message) cover using separate
high/low C2 cover keys
and three downlink TRANSEC functions:
1) C3 (Payload-to-Terminal Control Message)
2) Acquisition and
3) Report-back Order-Wire (AROW) cover
4.1.2 Medium Data Rate (MDR)
MDR transmissions are protected by four uplink TRANSEC functions:
1) Frequency hopping

2)

=

Time-and frequenc_y erm_utation_
3) MC2 (Terminal-to-Payload Control Message) cover
4) Probing slot time rotation
and three downlink TRANSEC functions:
1) MC3 (Payload-to-Terminal Control Message)
2) Acquisition and
3) Tracking Order-Wire (ATOW) cover
4.13 Extended Data Rate (XDR)
XDR transmissions are protected by four uplink TRANSEC functions:
1) Frequency hopping
2) Time and frequency permutation
14

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 24

UNCLASSIFIED//FOR OFFICIAL UbE ONLY

CM-001-03
3) XC2 (Terminal-to-Payload Control Message) encryption using individual
terminal Traffic Encryption Key (TEK)
4) Probing slot time rotation
and three downlink TRANSEC functions:
1) XC3 cover using country specific Transmission Security Key (TSK)
2) ATOW cover using country specific Transmission Security Key (TSK)
3) XC3 encryption using individual terminal-, service- or payload-specific TEK
4.2 TSAT Waveform
The CM shall provide the capability to generate an aggregate TSAT TRANSEC stream
using Suite A or Suite B uplink key.
The CM shall provide the capability to generate an aggregate TSAT TRANSEC stream
using Suite A or Suite B downlink key
The CM shall provide the capawity to decrypt TSAT satellite broadcast using Suite A or
Suite B decryption key
The CM shall provide. the capability to generate aggregate TSAT cover streams using
Suite A or Suite B cover key. Up to 7 (TBR) unique keys may be required for each
channel.
The CM shall provide the capability to generate aggregate TSAT cover streams using
distinct Suite A or Suite B cover keys. Up to 7 (TBR) unique keys may be required for
each TSAT channel. Note that the use of 7 unique keys drives the support requirement for
7 SAs on TSAT waveform channels.
The CM shall provide the capability to Encrypt/decrypt

.

TSAT payload-to-terminal
messages using Suite A or Suite B keys (potential; not yet finalized).
The CM shall provide the capability to generate key streams for use by the TSAT Suite B
coveLexpansioniunction..
The CM shall provide TSAT payload-to-terminal resource control Confidentiality and
integrity services.
4.3 WGS Waveform
The CM shall provide the capability to generate aggregate WGS TRANSEC stream using
unclassified WGS keys and algorithms
The CM shall provide the capability to encrypt/decrypt WGS positive control messages
using unclassified WGS keys and algorithms
4.4 Commercial SATCOM Waveform
The CM shall provide the capability to generate aggregate commercial SATCOM
TRANSEC stream using unclassified keys and algorithms.
15

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 25

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CM-001-03
4.5 MILSTAR Waveform
The CM shall provide the capability to generate aggregate MILSTAR SATCOM
TRANSEC stream(s) (TBR). This is a placeholder here as the details are not available in
provided documentation and MILSTAR was not on the original HC3 support listing. It
was added as a requirement during a Technical Interchange Meeting (TIM).
4.6 MIL-188-EEE Waveform
The CM shall provide the capability to generate aggregate MIL-188-EFF, TRANSEC
stream(s). MIL-188-F.F.F, is a variant of MIL-STD-165A and is the emerging standard .
The MIL-188-EEE waveform uses the Advanced Encryption Standard (AES) in a Cipher
Block Chaining (CBC) mode with key lengths of 256 bits.
4.7 Waveform COMSEC
Some waveforms require COMSEC processing for non-user data. The CM shall provide
Type 1 COMSEC features sufficient to satisfy the NSA requirements allocated to the
CM. The NSA will provide a document containing these requirements as part of the UPA
for NSA cryptographic certification.
The CM shall provide the capability to support two independent data streams (i.e. SAs)
per channel for an aggregate total of up to 8.
4.7.1 CDL Streams Bulk Encryption/Decryption
The CM shall provide the capability to bulk encrypt/decrypt distinct CDL streams using
Suite A or Suite B keys.
4.7.2 Encryption/Decryption of Inband Terminal Control/Status (COMSEC)
The CM shall provide COMSEC services for the inband communications channels as
required by some platforms. (additional detail TBD).
.
HAIPEDEVICE INTEROPERABILITY
High Assurance Internet Protocol Encryptor (HAIPE) devices front management
workstations to protect HC3 terminal management messages, including information
related to device control and status, network/system management information, and key
management and distribution. The HAIPE Interoperability Specification (IS) captures
the traffic protection, networking, management, and application level functional
requirements necessary to ensure interoperability of HAIPE compliant devices.
The CM services provided to the HC3 terminal shall be compliant with the core and
extension HAIPE IS Version 3.0 requirements. Compliance with both the core and
extension documents ensures that the CM is interoperable with all HAIPE Version 1.3.5
and Version 3.0 devices. The requirements traceability matrix provided in Appendix B
indicates the allocation of requirements to the system based on the architecture described
in Section 3.
At this time, legacy compliance to HAIPE IS Version 1.3.5 is required as the roll-out of
HAIPE IS Version 3.0 devices is not expected to begin until the second quarter of 2008.
16

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 26

UNCLASSIFIED//FOR OFFICIAL U ONLY

CM-001-03
If the fielding of HC3 terminals is sufficiently further into the future, compliance with the
legacy algorithms and protocols may be waived.
The following CM requirements represent a subset of those that are either explicitly
stated in the HAIPE IS (and elevated to this level to highlight the necessary algorithms
and capabilities) or implied by one or more of the requirements from that set:
• Key management:
o The CM shall support key fill (load) operations in accordance with EKMS
308.
o The CM shall accept FIREFLY vector sets formatted in accordance with
EKMS 322.
o - Key update:
â–  The CM shall perform deterministic update of a TEK used to
protect MEDLEY encrypted traffic using ACCORDION 3.0 in
accordance with R21

.

=
MEDLEY
Implementation Standard: An ACCORDION MEDLEY", 7 Feb
2002.
â–  The CM shall perform deterministic update of a TEK used to
protect BATON encrypted traffic using ACCORDION 1.3 in
accordance with KM-TG-0001-87, "ACCORDION 1.3", 30 Oct
1987.
â–  The CM shall perform deterministic update of a Suite B TEK using
the algorithm specified in R21-TECH-02-05, "R21 Information
Technical Report: A Key Update Function Based on the AES Key
Wrap", 10 Jan 2005.
o Key agreement:
â–  The CM shall support the FIREFLY exchange in accordance with
=
=-EKMS 322B- in order to generate-Suite A encryption keys (either
for traffic or key encryption).
â–  The CM shall support the Menezes-Qu-Vanstone (MQV) exchange
in order to generate Suite B encryption keys.
â–  The CM shall support the use of exclusion key in accordance with
"Exclusion Key and it's Application to Foreign Interoperability", 7
June 2002 and "Guidance for Exclusion Key Specification", 8
Nov 2004.
• User traffic protection:
o The CM shall support the use of MEDLEY in Galois Counter Mode
(GCM) to protect Suite A user traffic communication with IS Version 3.0
HAIPE devices.
17

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 27

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CM-001-03
o The CM shall support the use of MEDLEY in the mode defined in
"HAIPE Legacy Encryption Implementation Guide", 31 Mar 2005 to
protect user traffic communication with HAIPE IS Version 1.3.5
compliant devices.
o The CM shall support the use of BATON in the mode defined in "HAIPE
Legacy Encryption Implementation Guide", 31 Mar 2005 to protect user
traffic communication with HAIPE IS Version 1.3.5 compliant devices.
o The CM shall support the use of AES in Counter Mode to protect Suite B
user traffic communication with HAIPE IS Version 3.0 compliant devices.
The HC3 terminal must be designed in such a way to permit HAIPE interoperability
testing to be performed. The implications of this statement are solely applicable to
terminal components other than the CM. For example, the RED processor must provide
an RJ-45 connector through which the RED interface of the HAIPE Interoperability
Tester (HIT) connects.
6. LEF DEVICE INTEROPERABILITY
Link Encryptor Family (LEF) devices may be used by interfacing payloads or platforms
to provide link encryption on some channels. HC3 terminals are required to comply with
the Cryptographic Interoperability Specification for LEF Equipment so it will
interoperate with these payloads and platforms.
The LEF specification defines requirements for developing link encryptors to ensure
interoperability with Cryptographic Modernization Initiative devices. These
requirements include performance characteristics, key management requirements, and
human machine interface requirements.
The CM services provided to the HC3 terminal shall be compliant with the LEF IS
Version 2.0 requirements. The requirements traceability matrix provided in Appendix C
indicates the allocation of requirements to the system based on the architecture described
in Section 3.
-The following--CM requirements-represent a subset of those that are either explicitly
--
stated in the LEF IS (and elevated to this level to highlight the necessary algorithms and
capabilities) or implied by one or more of the requirements from that set:
• Key management:
o The CM shall support key fill operations in accordance with EKMS 308.
o The CM shall accept Enhanced FIREFLY vector sets formatted in
accordance with EKMS 322.
o The CM shall support BLACK key fill operations in accordance with
EKMS 217 (EKMS Benign Techniques Specification).
o Key update:
• The CM shall perform deterministic update of a TEK using
ACCORDION 3.0.
o
Key agreement:
18

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 28

UNC ASSIFIED//FOR OFFICIAL IJoE ONLY

CM-001-03
â–  The CM shall perform Enhanced FIREFLY key calculation in
accordance with EKMS 322 and the classified appendix to the LEF
IS.
• User traffic protection:
o The CM shall support the use of MEDLEY in Counter Mode. Details in
the MEDLEY Implementation Standard, NSA document 0N679197 and
TBS in the classified appendix to the LEF IS.
o The CM shall support the NSA authentication algorithm in conjunction
with MEDLEY. Details TBS in the classified appendix to the LEF IS.
o The CM shall support the National Institute of Standards and Technology
(NIST) AES (NIPS 197) algorithm in Counter Mode. Details TBS in the
classified appendix to the LEF IS.
o The CM shall support the NSA authentication algorithm in conjunction
with AES. Details TBS in the classified appendix to the T.EF,IS.
o The CM shall support EKMS 322 requirements for Enhanced FIREFLY.
7. KEY MANAGEMENT INFRASTRUCTURE INTEROPERABILITY
The CM shall provide cryptographic services needed by the HC3 terminals

.

for
interoperability with EKMS, Public Key Infrastructure (PKI) and Key Management
Infrastructure (KMI) infrastructures. Similar to HAIPE and T.FF interoperability, the CM
provides cryptographic services to the terminal's INFOSEC function. The interchange of
messages and data with the key management infrastructures are within protocols
processed by the terminal red processor. The CM provides confidentiality, integrity, and
authentication services to the red processor.
Note that the CM also provides a fill interface capability that is interoperable with the
KMI as described in the cryptographic key management section of this document.
8. INTERNET PROTOCOL SECURITY (IPSEC)
HC3 terminals are required to use IPsec on the Transformational Satellite Mission
Operations System (TMOS) and TSAT router plane interfaces. The CM provides IPsec
confidentiality, integrity, and authentication services to the HC3 terminal INFOSEC
function as defined in this section.
IPsec is designed to provide interoperable, high quality, cryptographically-based security
for IPv4 and IPv6. The set of security services offered includes access control,
connectionless integrity, data origin authentication, detection and rejection of replays (a
form of partial sequence integrity), confidentiality (via encryption), and limited traffic
flow confidentiality. These services are provided at the Internet Protocol (IP) layer,
offering protection in a standard fashion for all protocols that may be carried over IP
(including IP itself).
19

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 29

CM-001-03

UNCLASSIFIED//FOR OFFICIAL USE uNLY

The IPsec series of protocols makes use of various cryptographic algorithms in order to
provide security services. The IPsec, Internet Key Exchange (IKE), and IKEv2 protocols
rely on security algorithms to provide privacy and authentication between the initiator
and responder. The Encapsulating Security Payload (ESP) and the Authentication
Header (AH) provide two mechanisms for protecting data being sent over an IPsec
Security Association (SA). IKE provides a mechanism to negotiate which algorithms
should be used in any given association. Request For Comments (RFCs) and Internet-
Draft documents define the current set of algorithms that are mandatory to implement, as
well as algorithms that should be implemented because they may be promoted to
mandatory at some future time.
There are many such algorithms available, and two IPsec systems cannot interoperate
unless they are using the same algorithms. The Internet-Drafts listed below contain the
latest IPsec information and proposed requirements:

INTERNET-DRAFT Cryptographic Algorithms For ESP & AH
August 2004
INTERNET-DRAFT Cryptographic Algorithms for IKE Version 2
April 2004
INTERNET-DRAFT Security Architecture for IP
March 2005
INTERNET-DRAFT Cryptographic Suites for IPsec
April 2004
INTERNET-DRAFT IP Authentication Header
March 2005
INTERNET-DRAFT Internet Key Exchange (IKEv2) Protocol
Sept 2004
INTERNET-DRAFT IP Encapsulating Security Payload (ESP)
Mar 2005
INTERNET-DRAFT Ext Seq No Addendum to IPsec DOI for ISAKMP Feb 2004

8.1 TSAT terminal-to-TMOS message Confidentiality and integrity
The CM shall provide IPSec confidentiality and integrity processing services to the
terminal-to-TMOS interface function.
The CM shall support the capability to generate DoD PKI public/private key pairs for
non-type 1 IPSec functions
The CM shall provide the capability to store DoD PKI private keys for non-type 1 IPSec
functions
8.2 TSAT router control plane Confidentiality and integrity
The Type 1 crypto shall (TBD) support non-type 1 IPSec confidentiality and integrity
processing for the terminal router.
The Type 1 crypto shall (TBD) support generation of DoD PKI public/private key pairs
for non-type 1 IPSec functions.
The Type 1 crypto shall (TBD) support storage of DoD PKI private keys for non-type 1
IPSec functions.
20

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 30

UNCLASSIFIED//FOR OFFICIAL US: ONLY

CM-001-03
9. CRYPTOGRAPHIC KEY MANAGEMENT
The CM shall provide the capability to accept keys from the centralized cryptographic
Key Management System (KMS) as defined in TBS.
The CM cryptography shall be capable of interfacing with DoD encryption devices to
include the High Assurance IP Encryptor (HAIPE), KIV-19, and KG-194 (TBR).
The CM shall provide the capability to accept keys from KMS key distribution to include
Over-the-Air Re-keying (OTAR). HC3 terminals connect to existing systems to
communicate and receive OTAR messages. Rekey messages are waveform-specific and
are generated by the manager of that waveform. Rekey messages may be transmitted over
the air in small pieces which are assembled by the terminal processor(s) and send to the
CM as a single complete message.
The CM shall provide supporting capability to the terminal subsystems to support
Tactical Network management (TNM) KMS in the "dis-avowing" (i.e., "de-affiliation" or ,
canceling the registration, to include remote "zero-izing" of the crypto) o - lay captured or
lost systems or nodes that will:
Preclude such systems from being used to access, disrupt the system's networks, or "Tie-
up" network access request mechanisms in hostile "denial of service" attempts.
9.1 Key Management and Loading
The CM provides a service by which the fill interface can be configured to receive data.
Key material received in this manner can include a seed, operational, or one-time-use
FIREFLY vector set or traditional key material. Delivery may be in red form, black form
(using a Transfer Key Encryption Key (TrKEK)), or utilizing benign techniques.
The CM shall provide the capability to accept key and control/status information from the
DS-101 fill interface provided by the platform.
The CM shall provide the capability to send control/status information to the DS-101 fill
The CM shall be compatible with the DS-101 link/physical layer processing required by
HAIPE IS v3.0.
The CM shall support accepting key loads in accordance with EKMS 308.
EKMS Benign Techniques (EKMS 217) support is required. Operations identified here
as Benign Key/Fill/Rekey operations can be performed with the Local Management
Device/Key Processor (LMD/KP) via the DTD.
The CM shall support EKMS Benign Techniques in accordance with EKMS 217.
The CM shall accept keys in both EKMS 317 generic fill format and DS-100-1 tagged
key data formats.
The CM shall provide a interface by which information (e.g., update count, key tag,
description) about one or more keys may be requested and provided.
The CM shall perform cryptographic rollover without loss of communications.
21

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 31

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CM-001-03
9.2 Key Handling and Storage
The CM shall protect keys stored within CM.
Red keys shall be stored in volatile memory only and only stored in red form when the
terminal configuration requires them for TRANSEC or COMSEC functions.
Unused or de-assigned Red keys shall be erased from volatile memory.
9.3 Zeroization
The CM shall complete zeroization of all key material within 1 second of zeroize discrete
assertion.
The CM shall complete zeroization of all TRANSEC and COMSEC keys within 1 second
of recoverable zeroize discrete insertion. Key material needed for black/benign fill
techniques shall be retained through a recoverable zeroize event.
The CM shall complete zeroization of all associated channel TRANSEC and COMSEC
keys within 1 second of channel zeroize discrete insertion. Key material needed for
black/benign fill techniques as well as non selected channels shall be retained through a
channel zeroize event.
The CM shall complete zeroization of all key material within 10 seconds of zeroize
command reception.
The CM shall complete zeroization of all TRANSEC and COMSEC keys within 10
seconds of recoverable zeroize command. Key material needed for black/benign fill
techniques shall be retained through a recoverable zeroize event.
The CM shall complete zeroization of all associated channel TRANSEC and COMSEC
keys within 10 seconds of channel zeroize command receipt. Key material needed for
black/benign fill techniques as well as non selected channels shall be retained through a
channel zeroize event.
9.4 AEHF Channel Key Management
The CM shall provide the capability to accept, decrypt, and store keys up to SECRET
using Suite A BLACK fill.
The CM shall provide the capability to accept, decrypt, and store keys up to SECRET
using Suite A BLACK fill during "on air" terminal operation.
The CM shall provide the capability to accept, decrypt, and store keys up to SECRET
using Suite A EKMS benign fill.
The CM shall provide the capability to Re-encrypt keys up to SECRET for unclassified
terminal host storage.
The CM shall provide the capability to accept, process, and store unencrypted Suite A
key material on a fill port interface to support crypto initialization.
22

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 32

UNCLASSIFIED//FOR OFFICIAL UoE ONLY

CM-001-03
9.5 TSAT Channel Key Management
The CM shall provide the capability to accept, decrypt, and store keys up to SECRET
using Suite A or Suite B BLACK fill.
The CM shall provide the capability to accept, decrypt, and store keys up to SECRET
using Suite A or Suite B BLACK fill during "on air" terminal operation.
The CM shall provide the capability to accept, decrypt, and store keys up to SECRET
using Suite A or Suite B KMI over-the-network keying (OTNK).
The CM shall provide the capability to accept, decrypt, and store keys up to SECRET
using Suite'A or Suite B KMI OINK during "on air" terminal operation.
The CM shall provide the capability to Re-encrypt keys up to SECRET for unclassified
terminal host storage.
The CM shall provide the capability to accept, process, and store unencrypted Suite A or
Suite B key material on a fill port interface to support crypto initialization.
9.6 CDL Channel Key Management
The CM shall provide the capability to accept, decrypt, and store keys up to TOP
SECRET using Suite A or Suite B BLACK fill.
The CM shall provide the capability to accept, decrypt, and store keys up to TOP
SECRET using Suite A or Suite B BLACK fill during "on air" terminal operation.
The CM shall provide the capability to accept, decrypt, and store keys up to TOP
SECRET using Suite A or Suite B KMI OTNK.
The CM shall provide the capability to accept, decrypt, and store keys up to TOP
SECRET using Suite A or Suite B KMI OTNK during "on air" terminal operation.
The CM shall provide the capability to re-encrypt keys up to TOP SECRET for
unclassified terminal host storage.
_The_CM shall ..providethecapability _to accept, process, andstore_unencr_y_pted Suite A _or
Suite B key material on a fill port interface to support crypto initialization.
10. CRYPTOGRAPHIC ALGORITHM MANAGEMENT
The CM provides the capability to generate key streams and support COMSEC functions
using the following algorithms:
MEDLEY
SHILLELAGH
BATON
KEESEE
AES
WALBURN
Commercial SATCOM
SAVILLE
23

-UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 33

UNCLASIFIED//FOR OFFICIAL USE uNLY

CM-001-03
The CM provides WEASEL cryptographic capability to the terminal to support its
authentication functions.
10.1 Cryptographic Algorithm Management and Loading
The CM shall provide the capability to accept and store algorithms and assign them to
TRANSEC streams, COMSEC functions, and channels.
The CM shall provide the capability to accept both encrypted (black form) and decrypted
(red form) cryptographic algorithms from a local fill port. Note that JTRS-5000 SEC
requires all classified cryptographic algorithms to be encrypted.
The CM shall provide the capability to load, configure, and assign algorithms to one
channel without affecting the operation of other channels.
The CM shall be reprogrammable. The CM shall permit configuration of the
cryptographic algorithm or algorithms as part of device configuration. The CM shall
permit removal of the cryptographic algorithm or algorithms as part of device
configuration.
The CM shall provide the services to the terminal such that the terminal can authenticate
the source of a request to assign a stored algorithm to a particular terminal channel
waveform modulation and/or cover and/or link COMSEC independently.
10.2 Cryptographic Algorithm Handling and Storage
The CM shall provide the capability to store cryptographic algorithms in black form
within the CM.
The CM shall protect cryptographic algorithms stored within CM.
The CM shall provide the capability to decrypt classified cryptographic algorithms using
the JOSEKI-1 algorithm.
The CM shall only accept cryptographic algorithms signed by the NSA
Only the assigned algorithm for the current mission shall be available within the terminal

in red

form during cannel configuration and operation.
10.3 Cryptographic Algorithm Zeroization
The CM shall complete zeroization of all TRANSEC and COMSEC cryptographic
algorithms within 1 second of zeroize algorithm discrete assertion.
The CM shall complete zeroization of all associated channel TRANSEC and COMSEC
cryptographic algorithms within 1 second of channel algorithm zeroize discrete insertion.
Cryptographic algorithms material needed for non selected channels shall be retained
through a channel algorithm zeroize event.
The CM shall complete zeroization of all TRANSEC and COMSEC cryptographic
algorithms material within 10 seconds of zeroize algorithm command reception.
The CM shall complete zeroization of all associated channel cryptographic algorithms
within 10 seconds of channel zeroize algorithm command receipt. Cryptographic
24

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 34

UNCLASSIFIED//FOR OFFICIAL UL,.+., ONLY

CM-001-03
algorithm material needed for non selected channels shall be retained through a channel
zeroize event.
10.4 AEHF Channel Algorithm Management
The CM shall provide the capability to accept and store encrypted and unencrypted Suite
A cryptographic algorithms material from a local port interface up to SECRET during
"on air" and "off-air" terminal operation.
The CM shall provide the capability to accept and store Suite A cryptographic algorithms
up to SECRET using over-the-network algorithm update during "on air" terminal
operation.
10.5 TSAT Channel Algorithm Management
The CM shall provide the capability to accept from a local port interface and store
unencrypted and encrypted Suite A or Suite B cryptographic algorithms up to SECRET
during "on air" and "off-air" terminal operation.
The CM shall provide the capability to accept and store Suite A or Suite B cryptographic
algorithms up to SECRET using over-the-network algorithm update during "on air"
terminal operation.
10.6 CDL Channel Algorithm Management
The CM shall provide the capability to accept from a local port interface and store
unencrypted and encrypted Suite A or Suite B cryptographic algorithms up to TOP
SECRET during "on air" and "off-air" terminal operation.
The CM shall provide the capability to accept and store Suite A or Suite B cryptographic
algorithms up to TOP SECRET using over-the-network algorithm update during "on air"
terminal operation.
11. CRYPTOGRAPHIC BYPASS
Cryptographic-bypass-is-t-he-process-of-tr-ansferrin-g-information between-the-terminal
RED and BLACK domains unencrypted. The CM shall provide the only bypass function
between the RED and BLACK side of the terminal.
Protocol- or waveform-specific communicator information (normally in-band with user
information), such as unencrypted protocol headers or addresses, may require bypass.
The CM shall provide the capability to configure a bypass function security policy on a
per-waveform basis.
Application-specific control/status information may require bypass. For example:
1) The RED processor may initiate an IKE exchange by sending a control
message to the BLACK processor, which then constructs and sends the IKE
message 1 (unencrypted).
25

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 35

UNCLA,,SIFIED//FOR OFFICIAL USE .NLY

CM-001-03
2)The RED processor may initiate an antenna pointing change by sending
antenna control commands to the antenna control system (Black Processor),
which performs the configuration change.
3) The BLACK processor may provide signal level status information to the RED
processor, which initiates adjustments to data rates.
The CM shall provide the capability to configure a control/status bypass function security
policy on a per-application basis
The communicator information bypass function shall be distinct from the control/status
information bypass function. Both the communicator information bypass function and
the control/status information bypass function shall be reprogrammable.
The CM shall use a message identifier and the total message length to make bypass
decisions.
12. TERMINAL SOFTWARE CONFIDENTIALITY AND INTEGRITY
The CM shall provide the capability to encrypt terminal software for data at rest storage.
The CM shall provide the capability to decrypt and integrity check terminal software
taken from data at rest.
The CM shall provide the capability to decrypt and integrity check terminal software
updates loaded during "on air" terminal operation using
The terminal shall be configurable to use Suite A or Suite B keys for encryption and
decryption of terminal software. Potentially a security requirement may be derived that
assures only Suite A keys are used for non releasable terminal software.
13. CRYPTOGRAPHIC SOFTWARE CONFIDENTIALITY AND INTEGRITY
The CM shall provide the capability to encrypt the cryptographic software for data at rest
storage.
The CM shall provide the capability to decrypt and integrity check the cryptographic
software taken from data at rest storage.
The CM shall provide the capability to decrypt and integrity check the cryptographic
software updates loaded during "on air" terminal operation.
The terminal shall be configurable to use Suite A or Suite B keys for encryption and
decryption of cryptographic software. Potentially a security requirement may be derived
that assures only Suite A keys are used for non releasable cryptographic software.
14. UNCLASSIFIED STORAGE/SHIPPING OF CM
The CM shall provide the capability to render it unclassified for storage/shipping.
15. DATA AT REST PROTECTION
The CM should support both Type 1 and non-type 1 data at rest encryption/decryption
services.
26

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 36

UNCLASSIFIED//FOR OFFICIAL Ut, ONLY

CM-001-03
16. CRYPTOGRAPHIC MODERNIZATION
When the CM satisfies the requirements defined in this paper, it will satisfy NSA Policy
3-9 requirements for cryptographic modernization. This policy includes: Assured security
robustness, Cryptographic algorithm support, Interoperability, Releasability,
Programmability, CM Management, and KMI Compatibility.
17. SCA COMPLIANCE
The HC3 terminal is required to be compliant with the Software Communications
Architecture (SCA). The CM architecture shall be compliant with the applicable
requirements of the Software Communications Architecture Specification, JTRS-5000,
SCA V3.0, August 27, 2004. There are several methods by which SCA compliance may
be provided by a particular implementation of these requirements. The choice of method
is an implementation detail outside the scope of this document.
The SCA specifies an Operating Environment (OE) that includes a Core Framework
(CF), a Portable Operating System

Tp

tr.*f ee (POSIX) compliant Operating System (OS),
and a Common Object Request .,faer Architecture (CORBA) middleware.
The CM shall be compliant with the applicable requirements in the Security Supplement
to the Software Communications Architecture, JTRS-5000 SEC, V3.0, August 27, 2004.
The following CM requirements represent a subset of those that are either explicitly
stated collection of SCA specifications (and elevated to this level to highlight the
necessary algorithms and capabilities) or implied by one or more of the requirements
from that set:
• Identification and authentication:
o The CM shall provide Digital Signature Standard (DSS) cryptographic
processing.
o The CM shall store DSS certificates.
o The CM shall generate DSS authentication messages._
• Integrity:
o The CM shall provide Secure Hash Algorithm (SHA-1) processing.
o The CM shall generate SHA-1 based integrity checks.
• Key management:
o The CM shall develop encryption keys via FIREFLY processing.
• Algorithm management:
o The CM shall decrypt classified cryptographic algorithms using the
JOSEKI-1 algorithm.
o
The CM shall only accept cryptographic algorithms signed by the NSA.
27

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 37

.UNCLASSIFIED//FOR OFFICIAL USE JNLY

CM-001-03
18. INFORMATION SECURITY (INFOSEC)
The CM will comply with the security and information assurance (IA) requirements
provided in a document by the NSA as part of the User Partnership Agreement (UPA) for
NSA cryptographic certification.
CM security and IA requirements will be developed in accordance with tailored Unified
INFOSEC Criteria (UIC), and documented in a Theory of Design and Operation (TDO).
The CM shall include security mechanisms sufficient to satisfy the NSA requirements
allocated to the CM. The NSA will provide a document containing these requirements as
part of the UPA for NSA cryptographic certification.
The CM will demonstrate compliance with any additional security or IA requirements
imposed outside of the TDO by CM Type 1 certification with the NSA.
The CM shall protect sensitive software and firmware within the CM tamper boundary.
The CM shall support Type-1 security classification up to TS/SCI for a single
compartment.
The CM shall include means of enforcing the least privilege principle. The least privilege
principal requires that each subject be granted the most restrictive set of privileges
needed for the performance of authorized tasks.
The CM shall include services that allow the terminal to enforce that the system manager
is authenticated before the terminal accepts its commands.
The CM shall audit security relevant events. Security relevant events will be identified in
the appropriate security document.
The CM shall provide audit data to the system manager upon request.
The CM shall perform cryptographic testing in order to become operational. The CM will
not transition to the operational state until the CM passes all security-relevant tests.
The operational CM shall provide the capability to automatically perform specified
periodic cryptographic testing_ The CM must pass all security-relevant tests in order-to---
remain operational.
19. SYSTEM ENVIRONMENTAL REQUIREMENTS
The CM is installed in an HC3 terminal subsystem LRU that is expected to provide a
protected environment.
The CM may be configured as a chipset to be integrated into HC3 terminal circuit card(s)

or

a stand alone module that plugs into a terminal circuit card backplane.
19.1 Temperature
The CM is installed in an LRU that is expected to provide an environment that satisfies
the CM temperature needs.
The CM shall be designed for storage within a temperature range of -40° C to +71° C.
28

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 38

UNL ASSIFIED//FOR OFFICIAL L,E ONLY

CM-001-03
The CM, when configured as a module, shall be designed to operate at rail temperatures
within the range of -40° C to +49° C.
19.2 Shock
The CM, when configured as a module, shall withstand non-operating shock levels
applied on each axis of: - 75g for 11 ms, 175g for 2 ms, half-sine.
The CM, when configured as a module, shall operate normally when operating shock
levels are applied on each axis of: - 20g for 11 ms, 65g for 2 ms, half-sine.
The CM, when configured as a module, shall withstand bench-handling shock in
accordance with MIL-STD-810F, Method 516.5, Procedure VI: 45-degree drop.
19.3 Vibration
19.3.1 Sinusoidal Vibration
The CM, when configured as a module, shall ;:_a. ; e „uorally when operating vibration
li
mits of 5-50 Hz/6g, 50-400Hz/1.25g, 400-2000 Hz/.25g are applied in a twenty-minute
logarithmic sweep, from low to high frequency, per axis.
The CM, when configured as a module, shall withstand the non-operating vibration limits
.of 5-50 Hz/6g, 50-400Hz/4g, 400-2000 Hz/.5g are applied for a twenty-minute
logarithmic sweep, from low to high frequency, per axis.
19.3.2 Random Vibration
The CM, when configured as a module, shall operate normally under the random
vibration conditions in [MIL-STD-810D] Figure 514.3-36, 10 minutes each axis. Figure
514.3-36 indicates a level vibration energy level that is a flat .04 g2/Hz level from 20 Hz
outwards to 1,000 Hz, followed by a 6 db/octave roll-off after 1,000 Hz to 2,000 Hz limit.
The CM will be tested in a simulated operational environment (no interfacing devices).
19.4 Chemical, Biological, Radiological and Nuclear (CBRN)
The platform may be required to operate during and after exposure to a CBRN warfare
agent environment and decontamination process. The CM, however, is protected from
CBR contaminants by the platform and HC3 enclosures, which prevents the ingress of
contamination into the CM. The CM will operate during and after exposure to radiation
dose and dose rates non-lethal to humans.
19.5 Electromagnetic Radiation
The CM design, when configured as a module, shall follow good Electromagnetic
Interference (EMI) design practices as guided by the Requirements for the Control of
Electromagnetic Interference Characteristics of Subsystems and Equipment [MIL-STD-
461E
29

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 39

UNCLASSIFIED//FOR OFFICIAL USE ..,NLY

CM-001-03
19.6 TEMPEST
Although the platform is ultimately responsible for Telecommunications Electronic
Material Protected from Emanating Spurious Transmissions (TEMPEST) protection, the
CM design, when configured as a module, shall implement design practices to support
the platform TEMPEST certification.
20. SYSTEM QUALITY FACTORS
20.1 Built-in-test
The CM, when configured as a module, shall provide Failure Rate Weighted Fault
Coverage greater than or equal to 95% without the use of external built-in test (BIT)
components.
The CM, when configured as a module, shall provide a False Alarm Rate (FAR) of less
than or equal to 3%.
20.2 Reliability
The CM, when configured as a module, shall have a minimum operating life of 15,000
hours. The CM life profile definition is TBS.
The CM, when configured as a module, shall have a Mean Time Between Failure
(MTBF) of greater than or equal to 20,000 hours in a ground mobile environment at a rail
operating temperature of 35 C. Failure rates will be based on the Telcordia reliability
prediction procedures, Issue 1, in accordance with Section 3.1.
20.3 Maintainability
All CM maintenance, when configured as a module, will be performed at depot or factory
level. If an CM fails at the field level, it or its LRU will be replaced.
20.4 Design and Construction Constraints
The CM-design-will follow good workmanship practice-as guided by the-General --
Guidelines for Electronic Equipment [MIL-HDBK-454A].
The CM design will use the General Specification for Nameplates/Labels and Marking of
Electronic and Electro-Mechanical Equipment [NSA-2J] for guidance with product
markings. Note that this specification may contradict Army nameplate requirements but
meeting NSA's marking requirements are necessary for certification.
21. COMMENTS
The documents and studies provided do not establish hard performance requirements in
terms of bandwidth and latency as there are several areas that need more rigorous system
design tradeoff analyses. Some topics for consideration follow.
30

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 40

UNCLASSIFIED//FOR OFFICIAL USG ONLY

CM-001-03
Latency:
Latency for request/reply interfacing concepts is an example. The terminal must tune to a
certain frequency and at a certain time based on TRANSEC streams provided by the CM.
This may involve several components, each with processing time (latency). The terminal
latency contribution budget for each component is not discussed in the documentation
available, although there is some mention of a specific TRANSEC stream exposure time
vs. secure protection, i.e. TRANSEC bits when used within a specified time can be
treated as black data and thus simplify the terminal security architecture. There are so
many variables in terms of packet lengths, overhead, security assurances, impacts on the
terminal INFOSEC architecture, and interface protocol that it may not be feasible to
establish latency parameters without a significant systems engineering trade effort
beyond the scope of this document.
Simultaneous Keys and Active SAs:
The documentation supports the

.

CM need for the capability
.::1tLacously support up
to 7 independent TRANSEC modulation/cover keys streams per channel on some
waveforms, each using a different key perhaps. In addition, there may be two
independent waveform COMSEC SAs per channel and 16 additional HAIPE remote
management SAs. The number of SAs the CM needs to support simultaneously,
therefore, appears to be 7x4 + 2x4 + 16 = 52 SAs worst case, which is well within current
technology. As mentioned in the body of this paper, a net ID or COI may be treated as a
unique seed variable and may not be considered a unique SA. At the TIM it was
mentioned that each COI or net may use a different key. The available documentation
does not quantify this requirement, however. The current technologies can support
hundreds to thousands of SAs at HC3 rates.
TRANSEC Bit Rate:
The documentation we analyzed contains TRANSEC stream bit rate inconsistencies and
there is an independent effort to determine what may be required or desired. The values
specified-in-this requirements-description-paper-reflects-the-worst-case scenarios--found--in-
the documentation provided to General Dynamics C4 Systems (GDC4S).
Multiple Security levels for one TRANSEC Channel:
Requirements are defined to provide the capability to operate at all security levels from
SBU to TS/SCI with simultaneous operation on up to four channels at different security
levels while providing the required domain separation. Operating each channel at a single
classification level simplifies the CM design, however. Operating at multiple levels with
domain separation on a single channel impacts CM assurance mechanism complexity as
well as its size and power consumption by a significant factor. We have defined the
requirement as a single level per channel.
Multiple security levels was mentioned in a TIM but has not been found within the
documents provided as source information to this study. Multiple TRANSEC streams
based on different keys on a single channel to support waveform TRANSEC for different
Communities of Interest nets, and types of data cover is clearly required. It also appears
that TS/SCI is
31
UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 41

UNCLASSIFIED//FOR OFFICIAL USE JNLY

CM-001-03
required for waveform COMSEC (encryption) functions only on certain waveforms that
are used for LOS type channels. If the waveform TRANSEC streams generated on a
channel are limited to SECRET high, there may be some savings in assurance complexity
with resulting size and power savings along with performance improvements. Protecting
TS/SCI information requires a higher level of assurance built into the design than those
required to protect SECRET high information.
Security Landscape:
We should also note that the Unified INFOSEC Criteria (UIC) and certification landscape
has been moving toward stricter software development guidelines and stricter guidelines
regarding use of COTS as well as given increased attention to least privilege concepts
and signed and encrypted software protection approaches. NSA is moving toward a more
conservative certification approach where the reuse of some legacy security architectures
may not be acceptable.
32

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 42

UNL ASSIFIED//FOR OFFICIAL U,,E ONLY

CM-001-03
A. ACRONYMS
AEHF
AES
AROW
ASCII
ATOW
BIT
CBRN
CDL
CF
CIK
CKL
CM
CORBA

L:O

T

1'H
COTM
COTQH
CRC
CT
DF
DoD
DSCP
DSS
DTD
ECN
ECU
EFF
EHF
EK
EKL ---
EKMS
EMI
ESN
ESP
FAR
FIPS
FSDA
Gbps
GCM
GMT
HAIPE
HC3
HIJMMWV
Advanced Extremely High Frequency
Advanced Encryption Standard
Acquisition and Report-back Order-Wire
American Standard Code for Information Interchange
Acquisition and Tracking Order-Wire
Built-in Test
Chemical, Biological, Radiological and Nuclear
Common Data Link
Core Framework
Cryptographic Ignition Key
Compromised Key List
Cryptographic Chipset/ModuleCOMSEC Communications
Security
Common Object Request Broker Architecture
Communication on The Halt
Communication on the move
Communication on The Quick Halt
Cyclic Redundancy Check
Ciphertext
Don't Fragment
Department of Defense
Differentiated Services Code Point
Digital Signature Standard
Data Transfer Device
Explicit Congestion Notification
End Cryptographic Unit
Enhanced FIREFLY
Extremely High Frequency
Exclusion Key

Exclusion Key List

Electronic Key Management System
Electromagnetic Interference
Electronic Serial Number
Encapsulated Security Protocol
False Alarm Rate
Federal Information Processing Standard
Fail Safe Design Analysis
Gigabits Per Second
Galois Counter Mode
Greenwich Mean Time
High Assurance Internet Protocol Encryptor
High Capacity Communications Capability
Heavy High Mobility Multipurpose Wheeled Vehicle
33

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 43

UNCLASSIFIED//FOR OFFICIAL USE .ONLY

CM-001-03
HMI
Human Machine Interface
HMS
HAIPE Management Station
HTTP
Hypertext Transfer Protocol
Hz
Hertz
IAD
Information Assurance Directorate
ICMP
Internet Control Message Protocol
ICV
Integrity Check Value
IETF
Internet Engineering Task Force
IGMP
Internet Group Management Protocol
]HI
Internet Protocol Header Length
IKE
Internet Key Exchange
ISAKMP
Internet Security Association and Key Management
Protocol
INE
Inline Network Encryptor
INFOSEC
Information Security
IP
Internet Protocol
IPsec
Internet Protocol Security
IS
Interoperability Specification
IV
Initialization Vector
JTRS
Joint Tactical Radio System
Kbps
Kilobits Per Second
KEK
Key Encryption Key
KMI
Key Management Infrastructure
KMS
Key Management System
KSD
Key Storage Device
LDR
Low Data Rate
LEF
Link Encryptor Family
LMD/KP
Local Management Device/Key Processor
LOS
Line of Sight
LRU
Line Replaceable Units
LSb
Least Significant Bit
Mbps
Megabits Per Second
MDR
Medium Data Rate
MIB
Management Information Base
MLD
Multicast Listener Discovery
MODEM
Modulator Demodulator
MQV
Menezes-Qu-Vanstone
MSb
Most Significant Bit
MTBF
Mean Time Between Failure
MTU
Maximum Transmission Unit
NCDL
Networked Common Data Link
ND
Neighbor Discovery
NIST
National Institute of Standards and Technology
NSA
National Security Agency
OE
Operating Environment
34

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 44

UNCLASSIFIED/NOR

OFFICIAL 1.).,E ONLY

CM-001-03
OTAR
OTAT
OTAZ
OTNK
PBC
PKI
PMTU
POSIX
PPK
PT
PWS
RF
RFC
RIP
RIPng
RRQ
SA.
SAD
SATCOM
SBU
SCA
SCI
SHA
SNMP
SPD
SPI
SV
TBD
TBR
TBS
TDO
TEK
TEMPEST
TFC
TFTP
TIM
TMOS
TNM
TOD
ToS
TRANSEC
TrKEK
TS/SCI
TSAT
TSK
Over-The-Air Rekey
Over-The-Air Transfer
Over-The-Air Zeroization
Over-The-Network Keying
Per Block Counter
Public Key Infrastructure
Path Maximum Transmission Unit
Portable Operating System Interface
Pre-placed Key
Plaintext
Performance Work Statement
Radio Frequency
Request For Comments
Routing Information Protocol
Routing Information Protocol Next Generation
Read Request
Security Association
Security Association Database
Satellite Communications
Sensitive, But Unclassified
Software Communications Architecture
Sensitive Compartmented Information
Secure Hash Algorithm
Simple Network Management Protocol
Security Policy Database
Security Parameter Index
State Variable
To Be Determined
To Be Revised
To Be Specified
Theory ofDesign and Operation
Traffic Encryption Key
Telecommunications Electronic Material Protected from
Emanating Spurious Transmissions
Traffic Flow Confidentiality
Trivial File Transfer Protocol
Technical Interchange Meeting
Transformational Satellite Mission Operations System
Tactical Network Management
Time of Day
Type of Service
Transmission Security
Transmission Key Encryption Key
Top Secret/Sensitive Compartmented Information
Transformational Satellite
Transmission Security Key
35

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 45

UNCLASSIFIED//FOR OFFICIAL USE vNLY

CM-001-03
TTL
Time To Live
UDP
User Datagram Protocol
UIC
Unified INFOSEC Criteria
UPA
User Partnership Agreement
URI
Uniform Resource Identifier
USM
User-based Security Model
VITA
VMEbus International Trade Association
WGS
Wideband Gapfiller Satellite
WRQ
Write Request
XDR
Extended Data Rate
36

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Page 46

Y
'r

ill

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CM-001-03

B.
HAIPE IS REQUIREMENT ALLOCATION

The following table presents the allocation ofithe HAIPE IS 3.0 requirements to the CM, portions of the terminal other than the CM,
or to both. Notes are provided as necessary to provide additional detail or justification.

Requirement II
Requirement
Type
Requirement Text
Requirement Source HC3 Allocation
Notes

TP.1
Threshold
HAIPEs shall pre-configure the deviceVersionTable as
follows: dvName is "TrafficProtection", and dvVersion
is "3.0.0".

1

Traffic Protection Core
Terminal
TP.ESP.1