www.wikidata.uk-ua.nina.az
Sformovane v 1952 roci Agentstvo nacionalnoyi bezpeki NSA vzyalo na sebe vidpovidalnist za vsi sistemi shifruvannya uryadu SShA 1 Tehnichni detali bilshosti sistem shvalenih ANB vse she zasekrecheni Odnak stalo nabagato bilshe vidomo pro ranni sistemi a najsuchasnishi sistemi deyaki yih funkciyi buli vprovadzheni v komercijni produkti Zmist 1 Pokolinnya sistem shifruvannya ANB 1 1 Pershe pokolinnya elektromehanichne 1 2 Druge pokolinnya vakuumni lampi 1 3 Tretye pokolinnya integralni shemi 1 4 Chetverte pokolinnya elektronnij rozpodil klyuchiv 1 5 P yate pokolinnya merezhevi sistemi 2 Shifruvannya ANB za tipami zastosuvannya 2 1 Shifruvannya napisanogo tekstu 2 2 Strategichni sili 2 3 Internet 2 4 Polova autentifikaciya 2 5 Vidkriti sistemi 3 Posilannya 4 DzherelaPokolinnya sistem shifruvannya ANB red Sistemi shifruvannya rozroblenih ANB za pivstolittya roboti mozhut buti zgrupovani v p yat pokolin desyatilittya vkazani priblizno 2 Pershe pokolinnya elektromehanichne red nbsp KL 7 u muzeyi ANB Sistemi ANB pershogo pokolinnya buli predstavleni v 1950 h ta zasnovani na poperednih napracyuvannya ANB chasiv Drugoyi svitovoyi vijni i rotornih mashinah otrimanih z konstrukciyi SIGABA dlya najbilsh visokogo rivnya shifruvannya napriklad KL 7 en 3 4 Rozpodil klyuchiv buv rozpodilom paperovih spiskiv klyuchiv sho opisuyut roztashuvannya rotora yake zminyuyetsya kozhen den kriptoperiod opivnochi GMT Najbilsha kilkist trafiku peredavalosya za dopomogoyu odnorazovoyi strichkovoyi sistemi vklyuchayuchi britansku 5 UCO en yakij potribna velichezna kilkist perfostrichki Druge pokolinnya vakuumni lampi red nbsp Masiv KW 26 sistemi shifruvannya Vsi elektronni proekti sistem drugogo pokolinnya 1970 ti buli na osnovi logiki peretvoryuvacha i vakuumnih lamp Algoritmi gruntuyutsya na linijnih zsuvnih registrah zvorotnogo zv yazku mozhlivo z deyakimi nelinijnimi elementami dodanimi shob zrobiti yih bilsh vazhkimi dlya kriptoanalizu Klyuchi zavantazhuvalisya z dopomogoyu primishennya perfokarti u zamknenij pristrij chitannya na perednij paneli 5 Ci sistemi buli predstavleni v kinci 1960 h i zalishalisya u vikoristanni do seredini 1980 h Voni vimagali velikogo doglyadu ta obslugovuvannya ale ne buli urazlivi dlya EMP Vidkrittya agenturnoyi merezhi Walker zabezpechilo impuls dlya yih starinnya poryad z inshimi sistemami pershogo pokolinnya Tretye pokolinnya integralni shemi red nbsp KOI 18 pristrij polovogo chitannya perfostrichki Sistemi tretogo pokolinnya 1980 ti buli tranzitornimi j na osnovi integralnih shem ta vikoristovuvali bilsh doskonali algoritmi Voni buli kompaktnishi j nadijnishi Tehobslugovuvannya v polovih umovah chasto obmezhuvalasya vikonannyam diagnostiki ta zaminoyu povnistyu nerobochoyi chastini pristroyu zapchastinoyu a poshkodzhene obladnannya vidpravlyalosya nazad dlya vidnovlennya Klyuchi zavantazhuvalisya cherez roz yem na perednij paneli ANB prijnyala toj zhe tip z yednuvacha yakij zbrojni sili vikoristovuvali dlya polovih radio garnitur v yakosti zavantazhuvalnogo z yednuvacha Klyuchi spochatku rozpodilyalisya yak smugi perfostrichki yaki mogli buti vilucheni z kishenkovogo ridera KOI 18 spoluchenogo z zavantazhuvalnim portom Takozh vikoristovuvalisya inshi portativni elektronni pristroyi zavantazhennya pristoroyu zagruzki KYK 13 tosho 6 Chetverte pokolinnya elektronnij rozpodil klyuchiv red nbsp STU III telefon z yaki zgoryayut kriptoklyuchem Sistemi chetvertogo pokolinnya 1990 ti vikoristovuyut bilshe komercijnih pristroyiv i elektronnij rozpodil klyuchiv Tehnologiya integralnoyi shemi dozvolila zvorotnu sumisnist z sistemami tretogo pokolinnya Buli predstavleni tokeni bezpeki taki yak crypto ignition key CIK KSD 64 Piznishe karta angl Fortezza spochatku predstavlena yak chastinu spirnogo propoziciyi po chipu Clipper vikoristovuvalasya yak token 7 Kriptoperiodi buli nabagato dovshi prinajmni naskilki ce potribno bulo koristuvachevi Koristuvachi bezpechnih telefoniv takih yak STU III povinni viklikati specialnij telefonnij nomer tilki odin raz v rik shob onoviti yih shifruvannya Metodi z vidkritim klyuchem Firefly angl key exchange protocol buli predstavleni dlya keruvannya elektronnim klyuchem EKMS angl Electronic Key Management System 8 Klyuchi mogli teper buti zgenerovani okremimi komandami zamist togo shob pribuvati z ANB kur yerom Zvichajnij kishenkovij pristrij zavantazhennya AN CYZ 10 bulo predstavleno dlya zamini bezlichi zavantazhuvalnih pristroyiv sho vklyuchayut v sebe bagato sistem tretogo pokolinnya yaki vse she shiroko vikoristovuvalisya Pidtrimka shifruvannya bula nadana dlya komercijnih standartiv takih yak Ethernet IP spochatku rozroblenij ARPA DOD om ta optichnogo multipleksuvannya Zasekrecheni merezhi taki yak SIPRNET angl Secret Internet Protocol Router Network i JWICS angl Joint Worldwide Intelligence Communications System buli stvoreni vikoristovuyuchi komercijnu Internet tehnologiyu z bezpechnimi komunikacijnimi kanalami mizh anklavami de i obroblyalisya sekretni dani Potribno bulo dotrimuvatisya oberezhnosti shob garantuvati vidsutnist nebezpechnih z yednan mizh zasekrechenimi merezhami i zagalnodostupnim Internetom P yate pokolinnya merezhevi sistemi red nbsp Kishenkovi radio na osnovi mikroprocesora taki yak AN PRC 148 mayut skladovi metodi shifruvannya U dvadcyat pershomu stolitti peredacha vse bilshe i bilshe zasnovana na komp yuternih merezhah Shifruvannya lishe odin aspekt zahistu konfidencijnoyi informaciyi v takih sistemah Rol ANB povinna bude vse bilshe j bilshe polyagati v napryamku komercijnih firm sho rozroblyayut sistemi dlya uryadovogo vikoristannya Rishennya HAIPE angl Assurance Internet Protocol Encryptor prikladi cogo tipu produktu napriklad KG 245A nedostupne posilannya z travnya 2019 i KG 250 9 Inshi agentstva osoblivo NIST vzyali na sebe rol pidtrimki bezpeki dlya komercijnih i vrazlivih ale ne sekretnih dodatkiv Sertifikaciya ANB pro nesekretnomu vibranomu iz NIST algoritmi AES dlya sekretnogo vikoristannya dlya sistem zatverdzhenih ANB pripuskaye sho v majbutnomu ANB mozhe vikoristovuvati bilshe nezasekrechennyh algoritmiv KG 245A i KG 250 vikoristovuyut i sekretni j nesekretni algoritmi The NSA Information Assurance Directorate cherez Departament Bezpeki realizuye angl Cryptographic Modernization Program dlya peretvorennya ta modernizaciyi informacijnih mozhlivostej v 21 mu stolitti 10 11 V nogo vhodit tri fazi Zamina Vsi nebezpechni pristroyi budut zamineni Modernizaciya Integraciya modulnih programovanih vbudovanih kriptorishen Peretvorennya Zdijsniti sumisnist z vimogami pro globalizaciyu informaciyi Grid NetCentric ANB dopomogla rozrobiti kilka golovnih standartiv dlya bezpechnoyi peredachi angl Future Narrow Band Digital Terminal FNBDT angl Secure Communications Interoperability Protocol dlya peredach movlennya 12 High Assurance Internet Protocol Interoperability Encryption Interoperability Specification sumisnosti HAIPE dlya komp yuternih merezh ta Suite B angl NSA Suite B Cryptography algoritmi shifruvannya Shifruvannya ANB za tipami zastosuvannya red Velika kilkist sistem shifruvannya yaki rozrobila ANB mozhe buti zgrupovano po zastosuvannyu Shifruvannya napisanogo tekstu red Pid chas Drugoyi svitovoyi vijni napisani povidomlennya buli zashifrovani ryadkom na specialnih ta ponad sekretnih rotornih mashinah angl Rotor machine i potim peredavalisya v pyatibukvenni kodovi grupi sho vikoristovuyut azbuku Morze abo shemi teletajpu angl Teletype Corporation dlya deshifruvannya offlajn podibnimi mashinami na inshomu kinci KW 26 ROMULUS buv shiroko zastosovanoyu sistemoyu shifruvannya drugogo pokolinnya yaka mogla buti vstavlena v shemi teletajpu takim chinom trafik buv zashifrovanij i deshifrovan avtomatichno 13 Cya sistema vikoristovuvala elektronni zsuvni registri zamist rotoriv sho stalo duzhe populyarnim dlya COMSEC pristroyi yiyi eri z bilsh nizh 14 000 viroblenih moduliv Vona bula zaminena v 1980 h bilsh kompaktnim KG 84 yakij potim buv zaminenij na KG 84 sumisnij KIV 7 en Strategichni sili red ANB nese vidpovidalnist za zahist sistem komanduvannya i upravlinnya yadernimi silami Seriya KG 3X vikoristovuyetsya v minimalnij osnovnij merezhi zv yazku z nadzvichajnih situacij MEECN uryadu SShA a Fixed Submarine Broadcast System vikoristovuyetsya dlya peredachi povidomlen v nadzvichajnih situaciyah dlya yadernogo ta nacionalnogo komanduvannya i kontrolyu strategichnih sil SShA 14 Vijskovo morskij flot zaminyuye KG 38 yakij vikoristovuyetsya v atomnih pidvodnih chovnah modulyami shemi KOV 17 vklyuchenimi v novi shirokochastotni resiveri na osnovi komercijnoyi konstrukciyi VME U 2004roci amerikanski Vijskovo povitryani sili ukladali kontrakti dlya pochatku sistemnoyi rozrobki ta demonstracijnoyi SDD fazi programi dlya onovlennya cih zastarilih sistem generaciyi vikoristanih u povitroplavanni Internet red ANB shvaliv ryad pristroyiv dlya zabezpechennya zv yazku za dopomogoyu Internet protokolu V nih vikoristovuvavsya dlya zahistu Secret Internet Protocol Router Network SIPRNet v chisli inshih zasobiv 15 Pershim komercijnim pristroyem shifruvannya merezhevogo rivnya buv Motorola Network Encryption System NES 16 Sistema vikoristovuvala SP3 i protokoli KMP viznacheni ANB Secure Data Network System SDNS i bula pryamimi poperednikami IPsec V NES bula vikoristana arhitektura yaka skladayetsya z troh chastin yaka vikoristovuvala nevelike kriptografichne yadro bezpeki dlya podilu nadijnih i nenadijnih stekiv merezhevogo protokolu 17 Programa SDNS viznachila Message Security Protocol MSP yakij buv pobudovanij pri vikoristanni X 509 sertifikativ Pershi aparatni zasobi ANB stvoreni dlya cogo dodatka buli BBN Safekeeper 18 Message Security Protocol bulo poperednikom protokolu IETF Privacy Enhance Mail PEM BBN Safekeeper zabezpechiv visokij stupin zahistu vid vtruchannya i buv odnim z pershih pristroyiv vikoristovuvanih komercijnimi PKI kompaniyami Polova autentifikaciya red nbsp NSA KAL 55B Tactical Autentifikacijna sistema yaka vikoristovuvalasya pid chas vijni u V yetnami Nacionalnij muzej kriptografiyiANB vse she pidtrimuye prosti paperovi sistemi shifruvannya i sistemi autentifikaciyi dlya polovogo vikoristannya taki yak DRYADDRYAD 19 Vidkriti sistemi red ANB brala uchast v rozrobci dekilkoh sistem shifruvannya dlya zagalnodostupnogo vikoristannya A same Suite B algoritm z naborom standartiv dlya vidkritogo klyucha na osnovi shifruvannya v eliptichnih krivih Advanced Encryption Standard AES algoritm shifruvannya vibranij NIST pislya provedenogo zmagannya U 2003 ANB sertifikuvala AES dlya vikoristannya Type 1 v deyakih zatverdzhenih ANB sistemah 20 Secure Hash Algorithm simejstvo gesh algoritmiv rozroblene ANB Digital Signature Algorithm Data Encryption Standard DES 21 Skipjack shifr rozroblenij dlya Clipper chipu i opublikovanij v 1998 22 Clipper chip vbudovana mikroshema za zadumom ANB cya tehnologiya povinna bula virishiti problemu pov yazanu z planuvannyam i vedennyam nezakonnoyi diyalnosti 23 Security Enhanced Linux neobhidnist polipshennya operacijnoyi sistemi ne mensh vazhlivimi dlya informacijnoyi bezpeki nizh polipshennya shifriv 24 The Speck and Simon light vagovi Blochni shifri opublikovani v 2013 25 Posilannya red Shnajer B 25 1 Agentstvo nacionalnoj bezopasnosti Prikladnaya kriptografiya Protokoly algoritmy ishodnye teksty na yazyke Si Applied Cryptography Protocols Algorithms and Source Code in C M Triumf 2002 S 661 663 816 s 3000 ekz BookSources 5893920554 ISBN 5 89392 055 4 NSA security history Arhivovano 2020 02 15 u Wayback Machine National Cryptologic Museum Exhibit Information A History of U S Communications Security the David G Boak Lectures National Security Agency NSA Volume I 1973 partially released 2008 additional portions declassified October 14 2015 Jerry Proc s page on the KL 7 Melville Klein Securing Record Communications The TSEC KW 26 2003 NSA brochure p 4 PDF KYK 13 FIPS 140 1 Security and FORTEZZA Crypto Cards Choosing Security Solutions That Use Public Key Technology Microsoft Procitovano 16 lyutogo 2012 The Communications Security Material System Arhiv originalu za 16 veresnya 2012 Procitovano 17 serpnya 2013 L 3 Common HAIPE Manager nedostupne posilannya z lipnya 2019 Security Guide Operationalizing the IA Component of the GIG Richard C Schaeffer Jr Military Information Technology Arhiv originalu za 11 zhovtnya 2007 Procitovano 19 kvitnya 2018 Allen Walton Army Key Management System 2007 update Army Communicator Fall 2007 FindArticles com 21 Aug 2008 Introduction to FNBDT Arhivovano 2016 11 04 u Wayback Machine by NC3A discusses the prospects for FNBDT for NATO in 2003 KW 26 history page Fixed Submarine Broadcast System Misiewicz September 1998 Thesis Modeling and Simulation of a Global Reachback Architecture Arhiv originalu za 12 serpnya 2011 Procitovano 13 kvitnya 2011 Motorola Network Encryption System National Computer Security Conference 1993 16th Proceedings Information Systems Security User Choice pages 236 244 Patent EP0435094B1 na Uniform interface for cryptographic services Google Patents Cox Nancy 24 listopada 1999 Electronic Messaging CRC Press Procitovano 8 chervnya 2021 angl U S Army Field Manual FM 24 12 Chapter 7 Communications Security Operations Lynn Hathaway June 2003 National Policy on the Use of the Advanced Encryption Standard AES to Protect National Security Systems and National Security Information PDF Procitovano 15 lyutogo 2011 Thomas R Johnson 18 grudnya 2009 American Cryptology during the Cold War 1945 1989 Book III Retrenchment and Reform 1972 1980 page 233 National Security Agency DOCID 3417193 file released on 2009 12 18 hosted at nsa gov Arhiv originalu za 18 veresnya 2013 Procitovano 10 lipnya 2014 However I have noted that the inconsistency involved may be more apparent than real Between the statements cited and the declassification of SKIPJACK a paper was published by an academic researcher noting that Feistel ciphers of a particular type specifically those in which the f function was itself a series of Feistel rounds could be proven to be immune to differential cryptanalysis http www quadibloc com crypto co040303 htm Levy Steven 12 chervnya 1994 Battle of the Clipper Chip SELinux Arhiv originalu za 19 lipnya 2019 Procitovano 19 kvitnya 2018 Schneier Bruce 1 lipnya 2013 Schneier on Security Procitovano 17 lipnya 2013 Dzherela red NSA official site Jerry Proc Crypto machine page Brooke Clarke Crypto machines site Telecommunications Security TSEC Nomenclature System A History of U S Communications Security the David G Boak Lectures National Security Agency NSA Volumes I 1973 Volumes II 1981 partially released 2008 additional portions declassified October 14 2015Na cyu stattyu ne posilayutsya inshi statti Vikipediyi Bud laska skoristajtesya pidkazkoyu ta rozstavte posilannya vidpovidno do prijnyatih rekomendacij Otrimano z https uk wikipedia org w index php title Sistemi shifruvannya NSA amp oldid 39602099