3 September 2001. Thanks to BH.
Main text only, Annexes in preparation.
[116 pages, main text; 202 pages, annexes.]
CJCSM 6231.05A
2 November 1998
FOR OFFICIAL USE ONLY
| J-6 DISTRIBUTION: A, B, C, J |
CJCSM 6231.05A 2 November 1998 |
MANUAL FOR EMPLOYING JOINT TACTICAL COMMUNICATIONS
JOINT COMMUNICATIONS SECURITY
References: See Appendix J.
1. Purpose. This manual provides a brief description of the COMSEC equipment and outlines COMSEC procedures for operating the common baseline circuit switch network, MS network, CNCE, theater data networks, and point-to-point circuits. The following major topics are addressed:
a. Security information for system planners---circuit switch and point-to-point circuits.b. Security information for system planners---AN/TYC-39 MS and special data circuits.
c. Security information for system planners---AN/TSQ-111 CNCE and transmission systems.
d. COMSEC equipment description.
e. COMSEC procedures.
f. Keying concepts and management.
g. Joint Staff inter- and intratheater COMSEC package letters of instruction.
h. Data networking security equipment and procedures.
i. COMSEC equipment under development.
2. Cancellation. CJCSM 6231.05, 13 October 1995, "Joint Communications Security," is canceled
3. Applicability. This manual applies to:
a. The combatant command or JTF J-6 directorate (or equivalent office) responsible for joint communications management in a deployed JTF.b. Components and the assigned joint communications support organization in a JTF.
4. Request for Changes. Submit recommended changes to:
Joint Interoperability and Engineering Office
Attn: JEBBB
Fort Monmouth, NJ 07703-5613
5. Summary of Changes
a. Circuit switch COMSEC procedures were updated to include the CBCS. As these procedures are moved to the main body of the text, procedures for legacy configurations and equipment have been moved to the appendixes.b. Instructions for ITSDN security were added.
c. NES security guidelines were added.
d. Information about equipment under development was added.
e. Information about the KIV-7 was added.
f. Information about strap and switch settings for specific key generator applications was added.
g. New Joint Staff ICP letters of instruction were added.
6. Releasability. This manual is approved for limited release. DOD components (to include the combatant commands) and other Federal agencies may obtain copies of this manual through controlled Internet access only (limited to .mil and .gov users) from the CJCS Directives Home Page--http://www.dtic.mil/doctrine/jel.htm. Joint Staff activities may access or obtain copies of this manual from the Joint Staff LAN.
7. Effective Date. This manual is effective upon receipt.
For the Chairman of the Joint Chiefs of Staff:[Signature]
DENNIS C. BLAIR
Vice Admiral, U.S. Navy
Director, Joint Staff
CJCSM 6231.05A
2 November 1998
MANUAL FOR EMPLOYING JOINT TACTICAL
COMMUNICATIONS
JOINT COMMUNICATIONS SECURITY
LIST OF EFFECTIVE PAGES
The following is a list of effective pages. Use this list
to verify the currency and completeness of your document. An
"O" indicates a page in the original document.
PAGE CHANGE PAGE CHANGE
i thru xii O D-1 thru D-2 O
I-1 thru I-26 O D-A-1 thru D-A-18 O
II-1 thru II-16 O D-B-1 thru D-B-4 O
III-1 thru III-28 O D-C-1 thru D-C-22 O
IV-1 thru IV-12 O E-1 thru E-6 O
V-1 thru V-10 O F-1 thru F-30 O
VI-1 thru VI-6 O G-1 thru G-10 O
A-1 thru A-12 O H-1 thru H-8 O
B-1 thru B-42 O J-1 thru J-4 O
C-1 thru C-22 O GL-1 thru GL-12 O
RECORD OF CHANGES
[None; form omitted]
TABLE OF CONTENTS
CHAPTER
I INTRODUCTION
General
RED/BLACK Isolation
Traffic Flow Security
Security Information for System Planners,
Circuit Switch and Point-to-Point
Circuits
Security Information for System Planners,
AN/TYC-39 and Special Data Circuits
Security Information for Systems Planners,
AN/TSQ-111 CNCE and Transmission Systems
Physical Security
Emergency Plan
Declassification Procedures
Interface Planning Checklists
Additional Information
II KEYS
General
Key
Rekeying Keys
V-key (V)
Net Keys (X-Keys)
Z-Key
Reentry Home Key (M, RH, or R)
Compartmented Key (S-Key)
Trunk Traffic Key (T)
Bulk Transfer Key (BT)
VINSON Cryptonet Variable (CNV)
VINSON Rekey Variable (RKV)
Manual Cooperative Variable Transfer (MCVT)
(DSVT-to-DSVT)
Joint Staff Intertheater COMSEC Package
Key Management
III CIRCUIT SWITCHING NETWORK COMSEC EQUIPMENT AND PROCEDURES
Introduction
AN/TTC-39( )
Mobile Subscriber Equipment
Unit Level Circuit Switches
CBCS Data Base Considerations
AN/TTC-42 Data Base Construction
Co-Parent and Alt-Parent Procedures for ULCS
Keys and Key Management
Key Assignments Within the HUS
Load TED to TED (Trunking)
Tactical-Strategic Interface
Protected Distribution Systems and Approved Loops
Dial-Up Message Switch Connectivity
Point-to-Point Operation (DSVT-to-DSVT)
STU-III Operation in Tactical Networks
Operation of the Motorola MMT/DNVT
Subscriber Terminal in Tactical Switches
Use of LKGs in Circuit Switch Calls
IV MESSAGE SWITCHING NETWORK COMSEC EQUIPMENT AND PROCEDURES
Introduction
Joint Staff ICP Pair-Wise Unique Key Tape System
KG-83 Certification
Assign Keys for the Local Loops
Loading KG-82s and KG-84()s
Rekeying a KG-84()
Loading KG-82 to KG-82 (Trunking)
External Interface (AUTODIN)
Point-to-Point Operation KG-84A to KG-84A
Message Switch Traffic Flow Security
Y-Community Traffic
AN/TYC-39 Reports Classification
V AN/TSQ-111 COMMUNICATIONS NODAL CONTROL ELEMENT AND
TRANSMISSION SYSTEM COMSEC EQUIPMENT AND PROCEDURES
Introduction
General
COMSEC Controller
Key Management
Key Generation and HUS Assignment
DOW Point-to-Point Operation (KG-84()-to-KG-84())
Manual Cooperative Variable Transfer (DSVT-to-DSVT)
Transmission Systems COMSEC Procedures
VI DATA NETWORK SECURITY
General
Security Policy Considerations for JTF to IP
Network Connectivity
NIPRNET Policy
SIPRNET Policy
Application of SIPRNET Policy
SIPRNET Access Limitations
JWICS Policy
[Annexes in preparation]
APPENDIX
A KIV-7 Embeddable KG-84 COMSEC Module
B Detailed COMSEC Procedures
C Equipment Descriptions
D Joint Staff Intertheater and Intratheater COMSEC
Package Letters of Instruction
Annex A--Letter of Instruction for Joint Staff
Inter- and Intratheater Circuit Switch
Network Key System, USKAT-C5572
Annex B--Letter of Instruction for The Use of
The Intertheater COMSEC Package Pair-Wise
Unique Keying Material
Annex C--Draft Letter of Instruction for Joint
Staff Inter- and Intratheater Circuit Switch
Network Key System, USKAT-C5572
E Future Equipment Descriptions
F KG-84() Family Applications
G Trunk Encryption Device Applications
H Network Encryption System
J References and Supplemental Reading
Part I-- References
Part II-- Supplemental Reading
GLOSSARY
Part I-- Abbreviations and Acronyms
Part II-- Terms and Definitions
FIGURE
I-1 CJCSM 6231 Manual Series
I-2 Generic Joint Task Force Communications Systems
III-1 Required Keys for A CBCS Network
III-2 Example CBCS Network
III-3 Typical Red Switch Connectivity
III-4 Possible Red Switch Connectivity
III-5 Example Red Switch Interswitch Trunk Connectivity
III-6 PDS Call Combinations (1 of 3)
III-7 PDS Call Combinations (2 of 3)
III-8 PDS Call Combinations (3 of 3)
IV-1 Representative Joint Message Switch Network
V-1 Data Orderwire to AN/TSQ-111
V-2 Representative Joint Transmission Network
A-1 KIV-7 Front Panel
A-2 KIV-7 Interconnectivity Diagram
B-1 KYX-15 Register Fill
F-1 KG-84A Internal Strapping for MRVC Interface to DRSN
F-2 KG-84A Front Panel Settings for MRVC Interface to DRSN
F-3 KG-84A Internal Strapping for ITSDN Interfaces
F-4 KG-84C Settings for Use With AN/MSC-63A
F-5 Unbalanced RED I/O and BLACK CD Connections
for Wireline Applications
F-6 Unbalanced RED/BLACK I/O Cable Configurations
for Land Based Applications
F-7 KG-84A RED and BLACK Connections for RS-232
F-8 KG-84A BLACK Connections to TRI-TAC (Wireline CD Mode)
F-9 KG-84A RED AN/UYK-83, RS-232 Synchronous
F-10 KG-84A RED Connection to AN/UGC-129
F-11 KG-84A (RS-422 RED and RS-449 BLACK) Connection to IDNX
G-1 IDNX Balanced RS-422 to KG-94A RED
H-1 NES Tower Configuration
H-2 Typical NES Interconnect Using an 802.3 to 802.3 Interface
TABLE
I-1 Circuit Switch Planning Checklist
I-2 Message Switch Planning Checklist
I-3 CNCE/Transmission Planning Checklist
II-1 Summary of Key Requirements
II-2 Subscriber Rekey Key Terminology
II-3 Interswitch Rekey Variables
II-4 Subscriber Net Key Terminology
II-5 Key Cross Reference List
III-1 CBCS COMSEC Complements
III-2 TEDs Available Normal-Through, by DTG
III-3 Recommended Storage Locations for CBCS Optional Keys
III-4 CBCS Storage Locations for Preassigned Keys
III-5 AN/TTC-42 HUS Allocations
III-6 CBCS Allowable Calls
IV-1 LKG and HUS Allocation
V-1 AN/TSQ-111 COMSEC Items
V-2 DOW Rules
V-3 LKG and HUS Allocation
V-4 Transmission Equipment COMSEC Complement
A-1 KIV-7 RED Interface Pinouts
A-2 KIV-7 BLACK Interface Pinouts
B-1 VINSON OTAR Procedures
C-1 Switch Commands and Functions
C-2 Center-Tap Strapping Options
C-3 Receive Cipher Text Clock Phase Selection
C-4 External Command Strapping
C-5 Resync (T) Command Termination Strapping (E-GFW PCB)
C-6 Resync (W) Level Logic Strapping (E-GFV PCB)
C-7 Resync (W) Timeout Strapping Options
C-8 Status Signal Voltage Strapping Options
C-9 KY-90 Technical Characteristics
D-1 USKAT-C5572 Key System
D-2 Key Terminology by Switch Family
D-3 New Key Labels and Old Key Labels
E-1 Release 0 STE Capabilities
E-2 Strapping Options for KG-184A A5 and A7 Boards
E-3 Strapping Options for KG-184C A5 and A6 Boards
F-1 KG-84A Switch Settings for Use with AN/UGC-74A
F-2 KG-84A Switch Settings for Use with AN/UGC-129
F-3 KG-84A Switch Settings for Use with Various
Terminals, Diphase Modem Interface
F-4 KG-84C Switch Settings for Use with AN/MSC-63A
F-5 KG-84C Switch Settings for Use with PC Terminals
F-6 KG-84A Switch Settings for ITSDN Interfaces
F-7 Simplex Operation, Autophase Enabled
F-8 Duplex Independent Operations
F-9 Duplex (End Around Sync) Operations
F-10 Strap Settings, HF Operation
F-11 KG-84A Switch Settings (SUN Workstation (or
Other) Using Wireline CD )
F-12 KG-84A Switch Settings (SUN Workstation (or
Other) Using Dedicated Modem or Dial-up)
F-13 Strapping Options for SUN Workstation Applications
F-14 Balanced RED I/O Cable Configuration for Maritime Applications
F-15 Balanced BLACK I/O Cable Configuration for Maritime Applications
F-16 KG-84() Concealed Controls for DOW Operation
F-17 KG-84A Strapped for Balanced DOW Operation
F-18 KG-84A Internally Strapped for Unbalanced DOW Operation
F-19 KG-84C Strapping Options
F-20 KG-84C Strap Settings, Operation with KG-84A
F-21 Strapping Options for KG-84A Used with KG-84C,
Nonconditioned Baseband, Unbalanced
F-22 Strapping Options for KG-84A Used with KG-84C,
Nonconditioned Baseband, Unbalanced, KG-84 Mode
F-23 KG-84A Switch Settings for Use with KG-82
F-24 KG-84C Switch Settings for Use with KG-82
G-1 KG-94()/-194() Strapping Options for the
AN/TRC-170, AN/TTC-39A(V)/D, AN/TYC-39(),
AN/TSQ-146, AN/TSQ-111, AN/TTC-42,
AN/TTC-46, AN/TTC-47, AN/TTC-48, SB-3865,
and GMF Satellite Terminals
G-2 TED Strapping Options, MS-CS DTGs
G-3 TED Strapping Options for IDNX
G-4 KG-194() Strapping Options for Maritime Applications
H-1 NES Component Classification and Marking
CHAPTER I
INTRODUCTION
1. General. This manual provides information about the
COMSEC aspects of the joint task force (JTF) backbone
network. Information presented in this document should be
used in conjunction with information contained in other
publications in the CJCSM 6231 series (Figure I-1). The
information in this publication primarily pertains to COMSEC
equipment most likely to be found in the JTF backbone
network. Figure I-2 is a guide for determining where to
find this equipment and the connectivity requirements.
TRI-TAC developed COMSEC equipment provides secure voice and
data traffic with a capability for electronic key generation
and distribution under processor control. Alternatively,
keys may be distributed using manual procedures. COMSEC for
equipment fielded later, like MSE, uses the same principles
and is completely interoperable with TRI-TAC equipment.
Operators and maintenance personnel associated with the
COMSEC equipment and keys described in this publication must
have a security clearance and need to know commensurate with
the level of classification of the equipment or keys
involved.
a. When the TRI-TAC COMSEC equipment was designed, the
term "variable" was used instead of the term "key."
However,"variable" was phased out and replaced by "key."
The term "variable" is embedded into the design of the
TRI-TAC equipment and is still used in conjunction with
specific commands associated with COMSEC functions.
Throughout this document, both terms are used and are
interchangeable. Equipment developed later (for example,
MSE and the AN/TTC-39D) use the term "key" primarily but may
use "variable" in certain applications. Where applicable,
tables of equivalents are shown.
b. COMSEC doctrine for TRI-TAC equipment use is
outlined in KAO-193A/TSEC, SAM-70, and NTISSAM COMSEC/1-87.
Similar MSE procedures are described in the MSE Key
Management Plan. Definitions of many of the terms found in
this document are contained in NSTISSI 4009. Definitions
presented in Part II of the Glossary are either not found in
NSTISSI 4009 or are expanded and tailored to the
applications found herein.
_____________________________________________________________
Figure I-1 CJCSM 6231 Manual Series
_____________________________________________________________
Figure I-2 Generic Joint Task Force Communications Systems
_____________________________________________________________
2. RED/BLACK Isolation. Personnel planning for and setting
up secure communications facilities must be aware of the
requirement for requisite RED/BLACK isolation. (In this
manual, the terms RED and BLACK (all capital letters) refer
to the TEMPEST connotation. Other implications of the words
red and black may appear.) The RED/BLACK concept pertains
to the separation of electrical and electronic circuits,
components, equipment, and systems that handle classified
plain text (RED) information in electrical signal form from
those that handle unclassified (BLACK) information in the
same form. The RED designation is applied to telecom-
munications and automated information systems, plus
associated areas, circuits, components, and equipment that,
when classified plain text signals are being processed,
require protection during electrical transmission.
Conversely, the BLACK designation applies to telecom-
munications and automated information systems and to
associated areas, circuits, components, and equipment that
process only unclassified signals. (COMSEC-encrypted data
are unclassified.) RED signals are any telecommunications
or automated information system signals that would divulge
classified information if recovered and analyzed. RED
signals may be plain text, key, subkey, initial fill,
control, or traffic flow related information. A BLACK
signal is any signal (including control or enciphered
signals) that would not divulge national security
information if recovered and analyzed. Refer to
NSTISSI 7000 and "National Security Telecommunications and
Information System Security TEMPEST/2-95" for RED/BLACK
requirements. TEMPEST guidelines for KG-84() installation
are found in Appendix F.
3. Traffic Flow Security. In addition to proper security
for classified communications, traffic flow security is
required also. Traffic security is the specific encryption
of traffic to protect the classified information contained
therein, while traffic flow security is protection that
conceals the presence of valid messages on communications
circuits, whether those messages are encrypted or not.
Traffic flow security is normally achieved by making the
circuit appear busy at all times. In tactical networks,
KG-94()/194() trunk encryption devices (TEDs) are used for
this purpose. This is the main purpose of TEDs, though they
are also used as primary traffic encryptor in a variety of
applications including MSE SP DNVTs. KG-82s and KG-84-based
COMSEC equipment can perform full-period encryption and
provide traffic flow security for individual circuits;
however, all digital transmission groups (DTGs) in the JTF
network will also be secured by TEDs. (KG-84-based
equipment refers to the KG-84A, KG-84C, KIV-7, and KIV-7
HS.) TEDs are part of the equipment suite of all tactical
switching facilities. Transmission facilities also have
TEDs, as indicated in Table V-4.
4. Security Information for System Planners, Circuit Switch
and Point-to-Point Circuits. This paragraph helps system
planners in developing security requirements for circuit
switches. Common baseline circuit switches (CBCSs) assign
COMSEC ID locations for all required keys automatically;
only optional keys require assignment by the operator.
Switches that have not been modified for CBCSs require all
keys to be assigned. Additionally, key usage for some keys
is different in unmodified AN/TTC-39As than in CBCSs. The
procedures below can be used to formulate the requirements
for the JTF secure voice switching network. Differences
between CBCSs and non-CBCSs are noted when applicable.
Chapter II explains key designations and use. The
procedures outlined below are normally done in conjunction
with the development of a circuit switch database. See
CJCSM 6231.02A.
a. Traffic Security. Determine the highest classi-
fication of voice traffic to be processed by the circuit
switch (CS). (This classification is normally SECRET.)
b. Certification. Check the KG-83 or KGX-93/93A
certification. Security guidance requires that these
devices be certified at random intervals not to exceed
1 year, when moved to a higher classification application,
after maintenance, or when administratively decertified for
storage. They are classified CONFIDENTIAL when not
certified. When certified, this equipment will be treated
as TOP SECRET until placed in operation. Once installed,
they will assume a classification level equal to the highest
classification level of the keys to be generated. Detailed
test procedures for certifying the KG-83 with the KT-83 and
performing KG-83 self-test are contained in the SAM-70
Maintenance Manual.
c. Digital Subscriber Voice Terminals (DSVTs).
Identify subscribers who need secure voice including those
who have a need for S-key operation and classmark the DSVTs
for these subscribers. (See CJCSM 6231.02A.) This is done
automatically in CBCSs. U-net keys 24 and 25 (stored in
hardened unique store (HUS) locations 26 and 27) support
TS/SCI CBCS subscribers that communicate with the
AN/TYC-39A. S-keys are pre-positioned on tape. CBCSs
permit digital nonsecure voice terminal (DNVT) subscribers,
in certain circumstances, to communicate in a secure mode.
See subparagraph 4q.
d. Telephone Numbers. Assign directory numbers to
subscribers assigned DSVTs, if they are not already assigned
on an affiliation list or preaffiliation list.
AN/TTC-39A(V)1s and AN/TTC-42s require a directory number
entry in conjunction with a COMSEC ID.
e. Assign Variable Locations. In non-CBCSs, assign a
COMSEC ID to a directory number of the rekeying key. Assign
a COMSEC ID for the common X-net key to the directory
number. Repeat this for all secure voice subscribers.
Location 0000 is reserved for the switch operation and
cannot be assigned for subscribers or an interswitch
rekeying key. CBCSs automatically assign subscriber COMSEC
IDs automatically. See Chapter III for details on key
assignments. The system planners should have assign
variable location (AVL) worksheets to depict the information
to appear on the screen display. These are contained in
CJCSM 6231.02A.
f. Assign Reentry Home (RH) Key. The M key is unique
to one area code and is assigned automatically in CBCSs.
The RH is used in unmodified AN/TTC-39As and must be
assigned on the AVL screen. The R key for the AN/TTC-42 is
unique per switch and is generated locally.
g. Assign Common Interswitch Rekey Key (CIRK). The
CIRK is a common key held by all switches in the same area
code of a joint network and is used to encrypt per-call keys
(V) between switches. The CIRK is usually held on paper
tape and must be pre-positioned by the controlling authority
at each switch location. The KOI-18 tape reader can be the
fill device for this application. As an option, hard-copy
key may be loaded from a KOI-18 into a KYK-13, KYX-15, or
AN/CYZ-10, then loaded into the remote switches. (For some
applications, this key is bulk transferred or locally
generated and not held on paper tape.) COMSEC ID locations
for the interswitch keys are discussed in later chapters;
the CIRV is assigned to location 0001. For proper
operation, the CIRV must be assigned in the database and the
hardware (Automatic Key Distribution Center (AKDC)) of non-
CBCSs (CBCSs do this automatically). This rule must be
followed even for a stand-alone switch that has no
requirement for interswitch key transfer.
h. Assign Interswitch Rekeying Variables. The unique
interswitch rekey variable (UIRV) is held on a switch-pair
basis and used only in AN/TTC-42s (called a UISRV). It is
used to transfer a variety of keys between switches. The
area interswitch rekey key (AIRK) is a common key for a
given pair of area codes. It will be held by the gateway
switches connecting that pair of area codes. If deployments
call for more than one area code, the AIRK must be assigned
and used to encrypt and decrypt per-call keys (V)
transferred between area codes. In CBCSs, the AIRK is an
optional key and must be assigned on the AVL screen.
Chapter III discusses COMSEC ID locations for the
interswitch keys; the AIRK assignments (based on the number
of area codes) will start at location 0130.
i. Local Loops. Identify the number of DSVTs
considered as local loops. A local loop is distinguished
from a long loop primarily by how the DSVT is initially
keyed--electronic or hard copy. These DSVTs can be serviced
with the U and M keys generated at the CS. The fill device
required to load the DSVT at these locations is either the
AN/CYZ-10, KYK-13, or KYX-15.
j. Long Loops. Identify the number of DSVTs considered
as long loops. Long loops are for terminals that are too
far from the servicing CS to permit timely transfer in a
fill device. These DSVTs must be initially serviced with X
and U keys generated from hard-copy key material. This key
may be held on paper tape. The KOI-18 can be used to fill
the DSVT directly or to load another fill device, which can
then be used to load the DSVT.
k. Trunking. Determine the digital trunk groups needed
for the circuit switched network. The T-key is a two-
holder, point-to-point key used to initialize the TEDs. It
is common to all TEDs in a trunk group. This key may be
held on paper tape, and the KOI-18 tape reader can be used
to load the TED directly or to load an AN/CYZ-10, KYK-13, or
KYX-15, which will then be used to load the TED. CBCSs use
a cold-start T-key (T i ) to initiate connectivity and permit
bulk transfer of operational T-key.
l. Tactical-Strategic Interface. The tactical-
strategic interface (to the Defense Red Switch Network
(DRSN))could either be a DSVT or equivalent at the strategic
end functioning as a long loop off the AN/TTC-39() or
interswitch trunks (ISTs) secured by KG-84()s. The type of
interface used is dependent upon the equipment available at
each end. In either case, hard-copy key material must be
pre-positioned at the strategic end. The keys required for
this application are the applicable U- and X- or M-keys.
m. Fill Devices. After the DSVT requirements have been
established, the system planner can allocate the fill
devices to support the mission. A general rule is one fill
device for each long loop and one fill device for every five
local subscribers. A KOI-18 tape reader is required at each
location where hard-copy key is positioned. A KYX-15 net
control device (NCD) or AN/CYZ-10 data transfer device (DTD)
is required for electronic transfer of key between switches.
One KYK-13 must be allocated to each DSVT that has S-key
requirements. One KYK-13 is usually allocated to each
mobile subscriber radiotelephone terminal (MSRT). The
AN/CYZ-10 DTD is replacing the other fill devices as it is
fielded. It has a higher storage capacity and may replace
one or more devices, depending upon the application. The
Joint Key Management System (JKMS), under development, will
facilitate distribution of keys to the DTD.
n. S-Key. Identify secure voice users who have a need
for S-key operation. The S-key is part and parcel of the
AN/TTC-39()'s complement of keys with actual use at the
subscribers' DSVT. It is not used by the CS. S-key
subscribers use hard-copy key material or an electronically
generated key normally generated by the AN/TYC-39 MS. If
using electronic keys, the fill device can be the KYK-13 or
AN/CYZ-10. If using hard copy, the KOI-18 tape reader is
required. The KOI-18 is normally used to load the KYK-13
associated with the DSVT. If the KYK-13 is used, it may be
left attached to the DSVT.
o. Security Classmark. When the circuit switch is
initialized, entries must be made to the database for each
secure subscriber. CBCSs do this automatically from
preaffiliation lists (PALs). Other switches must be
programmed. In the JTF backbone network, all DSVT loops
should be classmarked at least SECURITY PREFERRED.
p. Point-to-Point Circuits. Identify all secure
point-to-point voice circuits (DSVT-to-DSVT) and the
duration of the mission. The mission duration will
determine the number of keys, fill devices, and if rekeying
is needed. This is a non-TRI-TAC application and requires
only an X-key (different from the network X-key).
q. Approved Loops. Approved loops are also called
protected distribution systems (PDSs), defined in
NSTISSI 7003. CBCSs may be classmarked PDS Y or N. In
switches marked PDS=Y, DNVTs may be classmarked SECURITY
PREFERRED and handle secure calls. In the AN/TTC-39A(V)1,
analog or digital approved loops must be classmarked
SECURITY REQUIRED. The AN/TTC-42 and SB-3865 do not use
approved loops. However, calls from the AN/TTC-42 to or
from approved loops will be completed in the secure mode.
5. Security Information for System Planners, AN/TYC-39 and
Special Data Circuits. This paragraph provides information
on the AN/TYC-39 MS, subscriber terminals, AUTODIN access
lines, and trunks to formulate the security requirements for
a message switching network. Use the procedures below to
formulate these security requirements.
a. Traffic Security. Determine the highest
classification and category of traffic to be processed by
the AN/TYC-39 MS. This is normally TOP SECRET for
R-community switches and may include sensitive compartmented
information (SCI) for Y-community switches. (See
CJCSM 6231.07A.) Waivers exist to permit some types of
dial-up service through CBCSs.
b. Certification. Check the KG-83s certification. See
subparagraph 4b.
c. Subscriber Terminals. Identify the number of
subscriber terminals, including the Y terminals and mode of
operation for each. See the discussion in CJCSM 6231.03A on
terminal requirements. Assign HUS locations for each
terminal. These locations will store the rekeying U- and
X-traffic keys.
d. Trunks. Determine the number of trunks needed to
support the message switching network, and assign HUS
locations for each trunk circuit. Again, these locations
will store the rekeying U- and X-traffic keys for each trunk
circuit. Keying material must be pre-positioned at both
ends of the trunks, and equipment at these locations will be
initialized using keys from the Joint Staff Intertheater
COMSEC Package (JSICP) (See Appendix D).
e. AUTODIN. Determine the number of AUTODIN access
lines needed for the mission. Assign HUS locations for the
rekeying U- and X-traffic variables for each AUTODIN access
line. Keying material will be pre-positioned at designated
AUTODIN switches. The KG-84()s at these locations will be
initialized using JSICP keys.
f. Local Terminals. Identify the number of local
terminals. A local terminal is distinguished from a remote
terminal primarily by how the terminal is initially keyed--
electronic or hard copy. A local terminal can be initially
keyed with electronic keys generated at the AN/TYC-39.
Electronic keys for these terminals consist of the rekeying
key U and the X-traffic key. Keying devices required for
loading the KG-84 for local loops can be either the KYK-13,
the KYX-15, or the DTD. The system planner determines
whether a loop is a local or long loop by taking into
account the amount of time required for a courier to
transport the electronic key to the terminal. This is
determined by such factors as distance and terrain. Use of
electronic keys has the advantage of reducing the
requirements for hard-copy key.
g. Remote Terminals. Identify the number of remote
terminals. A remote terminal cannot be reached quickly by a
courier; therefore, it must be initially keyed using hard
copy U- and X-keys. The keying device used to load the
KG-84() at the terminal locations can be the KOI-18. As an
option, hard-copy key may be loaded from a KOI-18 into a
KYK-13, DTD, or KYX-15, then loaded into the remote terminal
equipment. The same hard-copy keys in paper tape form must
be pre-positioned at the AN/TYC-39 and the terminal
location. When no other prior arrangements have been made,
the servicing message switch has the ultimate responsibility
to ensure that remote subscribers have the proper key.
h. MASTER Switch-Crypto Net Control Station. Designate
a MASTER-crypto net control station (CNCS) switch for the
message switching network for controlling the distribution
of keying material. The system planners at the MASTER-CNCS
switch (JTF) location are responsible for the allocation of
hard-copy key material at other switches directly trunked to
the MASTER-CNCS switch. The MASTER-CNCS switch is
responsible for rekeying the COMSEC equipment supporting
these trunk circuits. The CNCS performs these functions for
the AUTODIN access lines.
i. Local Loop Keys. For each circuit identified as a
local loop, a unique rekeying U-key and an X-traffic key
must be generated and sent to these locations by courier.
j. Long Loop Variables. Each long loop circuit,
including subscriber terminals, AUTODIN access lines, and
trunk circuits, requires a unique U-key and a common X-sync
key pre-positioned at each location. Hard-copy key material
is required for long loops, and the keying device can be the
KOI-18 tape reader. As an option, hard-copy key may be
loaded from a KOI-18 into a KYK-13, KYX-15, or DTD, then
loaded into the remote terminal.
k. Fill Devices. After subscriber terminal, AUTODIN
access line, and trunk circuit requirements have been
established, the system planner should allocate the fill
devices needed to support the mission. The general rule is
one fill device for each long loop, and one fill device for
every five local subscribers. A KOI-18 tape reader is
required at each location where hard-copy key is positioned.
Key will not be stored in the KYK-13, KYX-15, or DTD for
more than 12 hours when that same key is stored in the
HGX-83 AKDC in the AN/TYC-39A.
l. Special Data Circuits. Identify the special
point-to-point (non-TRI-TAC) data circuits (KG-84() to
KG-84()). When the KG-84() is operated point-to-point with
another KG-84() on a full period circuit, the X-traffic key
can be extended to a 1-month cryptoperiod with daily
updates. When the X-key is used for the 1 month (or longer)
cryptoperiod, with daily updates, an update to update count
01 must be performed immediately after loading the key. A
U-key is not required when using the update function. Thus,
for point-to-point operation only the X-traffic key is used
with the KG-84()s. Depending on the mission requirement,
the X-traffic key can be generated by the AN/TYC-39A or
taken from hard-copy key material. In either case, identify
the number of point-to-point circuits to formulate
requirements for keys and keying devices.
6. Security Information for Systems Planners, AN/TSQ-111
CNCE and Transmission Systems
a. Traffic Security. Determine the highest classi-
fication of traffic that will use keys generated at the
CNCE. Data orderwires (DOWs) provide the CNCE with status
information gathered at each transmission assemblage or
multiplexer shelter. The DOWs are secured with KG-84()s or
KG-84()/KG-82 combinations. When the status information is
decrypted at the CNCE, this information is not classified.
Thus, status information can be treated as sensitive and
protected as CONFIDENTIAL. If approved loops are not
implemented, all traffic within the CNCE will be BLACK.
Therefore, traffic that is to be bulk encrypted by TEDs can
also be protected at the CONFIDENTIAL level. However, other
security requirements may necessitate a higher classi-
fication of keys than CONFIDENTIAL. (JSICP T-keys are
SECRET.) It is recommended that for all deployments, the
KG-83 assume the classification level of SECRET.
b. Certification. Check the KG-83 certification. See
subparagraph 4b.
c. Collocated DOWs (KG-82/KG-84()). Identify the
collocated DOWs. These DOWs are within transmission
assemblages that are collocated with the CNCE and are
secured with the KG-82(LKG)/KG-84() combinations. Assign a
HUS location and LKG to each collocated DOW. These
collocated DOWs require two keys per assemblage, which are
the key encryption key (KEK "U") and the traffic encryption
key (TEK "X"). The keys for these configurations reside in
the HUS location assigned to that particular assemblage.
Each collocated DOW assemblage must operate on its unique
keys as assigned within the HUS.
d. DOWs Operating Point-to-Point (KG-84() to KG-84()).
Identify the DOWs that operate point-to-point (KG-84() to
KG-84()) (see Figure V-1). These orderwires may be keyed
with pre-positioned hard-copy key or electronically
generated key depending on the distance and ownership. The
DOWs only require a traffic encryption key (TEK).
e. Fill Devices. After the DOW requirements have been
established, the system planner should allocate fill devices
needed to support the mission. For collocated DOWs one
KY-13 fill device (six addressable storage registers) is
needed for every three collocated DOWs. A KYX-15 may
replace one or more KYK-13s. DOWs operating point-to-point
(KG-84() to KG-84()) will require the KOI-18 tape reader at
each KG-84 location or the KYK-13 fill device if using
electronically generated key. DTDs may replace the KYK-13
and KYX-15 as they become available.
f. Traffic Flow Security. Each DTG terminating on an
AN/TTC-39 series CS or multiplex facilities should be
secured using a TED. Digital group multiplex (DGM) equip-ment
configurations that use the TED are discussed in
CJCSM 6231.04. Further, for analog groups, selected
transmission equipment, such as the AN/TSC-85B or -93B GMF
satellite terminals and the AN/GRC-201 tropo terminal use
K-94()s-194()s to provide bulk encryption. The system
planner should always ensure that each major DTG or analog
group is provided traffic flow security by a KG-94()/-194()
(see CJCSM 6231.04), as appropriate. This does not imply
that RED and BLACK information should be mixed in the same
group (although this is allowed in an MSE PDS). Encryption
for traffic security should be provided before the
information is multiplexed into a group. Avoid the use of
multiple TEDs on single transmission links where
operationally feasible. This recommendation is based on the
need to maintain simplicity in system keying,
initialization, and reinitialization procedures. If the
transmission equipment is collocated with the CNCE, bulk
encrypt within the transmission equipment. However if the
transmission equipment is remoted from the CNCE to a radio
park, by using a short-range radio system, then bulk encrypt
at the CNCE. These guidelines may be modified to account
for the availability of TEDs within various equipment
suites.
g. Approved Loops and Trunks. When implementing
approved loops connect directly to the circuit switch via a
PDS. If the interswitch trunks are classmarked AS (Terminal
Type 28) or the extraswitch trunks are classmarked AS and
are connected to the CNCE, operate as a RED CNCE. However,
if the inter-switch trunks are the digital nonsecure (DN)
(Terminal Type 29), then all traffic within the CNCE would
be BLACK. The AN/TTC-42 does not use analog secure trunks.
7. Physical Security. Physical security for the COMSEC
components of the JTF network will be in accordance with
Service procedures and the guidance contained in
subparagraphs a through g.
a. Access Controls
(1) Each person assigned to shelters containing
AN/TTC-39(), -42, -46, -47, -50, and/or AN/TYC-39 COMSEC
equipment and DTDs must have, as a minimum, a SECRET
clearance. TOP SECRET clearances are required if operation
personnel have access to TOP SECRET cryptoequipment,
cryptomaterial, electronic keys, or TOP SECRET plain text.
(2) Personnel with less than SECRET clearances,
whose duties require occasional access to the shelter (for
noncryptographic maintenance, repair, or housekeeping) will
be permitted entry only when continuously escorted by a
regularly assigned, appropriately cleared individual.
(3) Uncleared users may use the handset or headset
of the KY-68 or approved loops in the presence and under the
supervision of appropriately cleared personnel (US or other
national or international organizations to which the
equipment has been released (see CJCSI 6510.01)) provided
the distant party has been alerted to the participation of
an uncleared user.
(4) Military or civilian guards and security
patrols who provide area protection for the shelters do not
need be cleared but will not be authorized entrance. In the
event of an emergency, uncleared personnel including guards,
fire, police, or rescue personnel will be granted immediate
entrance to deal with the emergency (fire, flooding,
terrorist acts, etc.). Upon resolution of the emergency,
reporting actions IAW appropriate Service directives will be
completed.
b. Personnel Protection. The CS and/or MS shelters
that contain operating HGF-85 or -87, HGF-83, or HGF-93 or
-96, will normally be occupied by two cleared individuals.
Brief absences of one individual are permitted as authorized
by the local authority. The two-person rule does not apply
to the AN/TTC-42 when the restricted command locking bar is
in place. When TOP SECRET material is involved, the
requirement for two-person integrity (TPI) will be
considered. TPI is a handling and storing system designed
to prevent single-person access to certain COMSEC material.
TPI handling requires that at least two persons, authorized
access to COMSEC keying material, be in constant view of
each other and the COMSEC material that requires TPI
whenever that material is accessed and handled. Each
individual must be capable of detecting incorrect or
unauthorized security procedures with respect to the task
being performed. All DOD personnel are required to adhere
to TPI handling and storage for TOP SECRET key, except in
tactical situations (see NSTISSI 4005, paragraph 42c). TPI
is no longer automatically required for TS key in tactical
situations; however, the controlling authority for the
equipment and circuits must make the final determination.
Use of TPI is recommended whenever possible, especially in
SCI applications.
c. Shelter Locking Device. The access door shall be
secured with a three-combination changeable padlock, NSN
5240-00-285-6523 or equivalent, during periods of
nonoperation. To facilitate rapid reentry, the access door
may be secured with a good quality key-operated padlock when
operating personnel are absent for short periods of time.
When individual Service procedures do not authorize the use
of a three-position, dial type, changeable combination
padlock to secure such shelters, padlocks Service-specified
will be used. A key control system is then required.
d. Restricted Areas
(1) The operational CS or MS shelter will be
located in a restricted area. Access to a restricted area
is subject to special restrictions or controls for security
or to safeguard property or material. The following
combinations of security control should be considered in
setting the appropriate protection level: fences,
concertina wire, alarms, guards in the vicinity or acting as
perimeter security, identification and security check
procedures, entry control points, and escort procedures for
maintenance, repair, or housekeeping personnel. Examples of
appropriate combinations are: fences and alarms, fences and
guards, or fences and identification and security check
procedures.
(2) Each shelter will be operated as a limited
access area, consistent with the following:
(a) Access Restriction. Only personnel who
are required to be present to perform assigned duties will
be authorized access to the shelter.
1. The name of each authorized person
must appear on the access list maintained within the
shelter.
2. An official having cognizance over the
shelter must approve the composition of the access list,
including the addition of each new name.
3. Persons not named on the access list
who require access in the performance of their duties, such
as custodial and maintenance personnel, may be authorized
access only if they are under continuous escort by an
individual whose name appears on the access list.
(b) Visitors Register. The register should
show the date of visit, the name and signature of the
visitor, the visitor's title or rank and organizational
affiliation, the purpose of the visit, the name of the
authorizing officer, and the time in and out. A visitors
register may not be required by Service regulations.
e. Storage. The rules listed below apply generally.
Additional rules apply specifically to the storage
requirements and subsequent use of KG-83 and KGX-93/93A key
variable generators (KVGs). These rules are summarized in
subparagraph 7e(3). The rules are presented in more detail
in NAG-16D.
(1) Operational Site
(a) At an operational site, the unmanned
shelter constitutes an authorized storage facility for keyed
or unkeyed classified COMSEC equipment when the following
conditions have been met:
1. The shelter is secured according to
subparagraph 7c.
2. The shelter is located in a restricted
area as specified in subparagraph 7d.
(b) If the shelter has a security container
(not mandatory), fill devices including the DTD, hard-copy
keying material, and classified documents may be secured
therein.
(c) If the provisions of subparagraph 7e(1)
cannot be met, all COMSEC equipment will be zeroized, the
common fill devices (DTD) will either be zeroized or removed
and stored at an approved alternate site, and all hard-copy
keying material and all classified documents will be removed
and stored at an approved alternate site.
(2) Nonoperational Site
(a) At a nonoperational site, the shelter
constitutes an authorized storage facility for classified
COMSEC equipment contained therein when the following
conditions have been met:
1. The shelter is secured according to
subparagraph 7c.
2. The shelter is physically controlled
as specified in subparagraph 7d.
3. All COMSEC equipment and devices
stored therein have been zeroized.
4. The KG-83 (or the KGX-93/93A, where
found) has been placed in a GSA-approved security container.
As an exception, the KG-83 may remain in the shelter but the
rules listed in subparagraph 7e(3) must be observed.
(b) When the shelter cannot be located within
a restricted area, the commander must institute safeguards
that will preclude any reasonable chance of tampering,
unauthorized access, sabotage, or theft of the shelter and
its contents. Such measures should include periodic checks
by security guards or patrols and a sight inventory of the
contents of the shelter at least once each month.
(c) Storage of keys in the shelter is not
authorized at a site where communications operations are not
being performed (like a warehouse or a depot). All keys
must be removed from the shelter and all COMSEC equipment
and devices must be zeroized. Classified documents may not
be stored in the shelter at such a site.
(d) Whenever a shelter is not secured or
physically controlled as described in subparagraphs 7c and
7d, the tamper detect labels on KG-83s and KGX-93/93As must
be checked to ensure that there was no tampering before
using the equipment. If there is an indication of
tampering, the equipment must be replaced immediately and a
COMSEC incident reported. Rules governing the use of tamper
detect labels are contained in NAG-16D.
(3) KVG Storage. KG-83 and KGX-93/93A KVGs may be
stored in unmanned TRI-TAC and MSE shelters, if the
following conditions are met:
(a) Physical Safeguards. Safeguards described
in subparagraph 7e(2)(b) must be applied.
(b) Certification. Each KVG must have been
certified within 12 months, to the level of traffic for
which it must generate keys, by persons who are properly
cleared and technically qualified using a certified KT-83
and NSA-approved procedures.
(c) Tamper Detection Labels. At the time of
the last certification, NSA-furnished tamper detection
labels were applied to each KG-83 and KGX-93/93A IAW NSA
instructions.
(d) Locking Bars. Each KVG must be secured in
its mounting by means of a hinged locking bar on a TPI basis
by two combination locks.
(e) Inspections. All tamper detection labels
must be visually inspected by partially withdrawing the KVG
from its mount immediately before each KG-83 or KGX-93/93A
activation.
f. Transportation. Keying material and classified
COMSEC equipment need not be removed before transporting the
shelter. During movement, the facility must be locked and
escorted; escorts need not be armed but must be cleared for
the classification of the COMSEC material contained in the
shelter. The KG-83 or KGX-93/93A may be certified, and the
rules listed in subparagraph 7e(3) must be complied with
before the KVG can be used. Transportation of accountable
COMSEC material exclusive of the shelter will be IAW
guidance contained in appropriate Service regulations.
g. Reportable COMSEC Incidents. Any occurrence that
subjects any classified COMSEC material or equipment to
possible compromise must be reported immediately IAW
NSTISSI 4003 or appropriate Service, department, or agency
directives or regulations. Any suspicious or unusual
occurrence should be reported immediately. While these
conditions may or may not be compromising, they must be
reported for subsequent evaluation. COMSEC incidents are
reportable IAW NSTISSI 4003 and applicable Service,
Department, or agency directives or instructions.
8. Emergency Plan. In the event of threatened or imminent
overrun or capture, COMSEC keys, material, and equipment in
jeopardy of compromise will be collected and destroyed in
accordance with the following guidance as directed by local
commanders or their designated representatives. Periodic
emergency action exercises should be conducted to reinforce
the actions specified in this paragraph.
a. Each switch shelter and subscriber location will
contain an up-to-date listing reflecting all COMSEC and
other classified materials.
b. Destruction priority is as follows:
(1) Superseded and currently effective keying
material and equipment marked CRYPTO. This includes
zeroizing all module equipment, COMSEC databases, and fill
devices in use. All keying material and equipment marked
CRYPTO must be destroyed before any nonoperational test key.
(2) TOP SECRET multiholder keying material to be
used within the next 30 days.
(3) SECRET and CONFIDENTIAL multiholder keying
material to be used within the next 30 days.
(4) COMSEC maintenance manuals, operating
instructions, and general publications, or at least the
pages containing sensitive information.
(5) Classified printed circuit boards (PCBs) in all
module equipment.
(6) Any remaining classified COMSEC material,
including history tapes, future keying material not included
in items (2) and (3), and all COMSEC equipment and devices.
c. Materials described above will be destroyed in
accordance with approved methods. Appropriate facilities
like a burning pit with fuel, if required, will be put in
place during shelter setup.
d. One person per shelter per operating shift will be
delegated the responsibility for zeroizing all keyed
equipment and devices contained in that shelter. These
individuals will be charged with the destruction of any
superseded or unused hard-copy keying materials and COMSEC
aids contained in the shelter.
e. One individual per shelter per operating shift will
be delegated the responsibility for moving all history tapes
to the fire pit for destruction and witnessing the total
destruction of the material.
f. One person per shelter per operating shift will be
delegated the responsibility for physically destroying all
COMSEC equipment and devices contained in the shelter.
Physical destruction is herein defined as damaging the
equipment and devices to the point they are unusable. Use
any physical means available. For example, remove equipment
and smash or crush it with a sledge hammer or chop it with
fire ax.
g. Check off on the shelter COMSEC inventory listing
each item to be destroyed or zeroized to ensure nothing is
overlooked. The evacuating party should carry the inventory
listing.
h. Make all attempts to assess the extent of material
compromised by an overrun. Use methods such as review of
documents, physical observation, or interviews of survivors.
Local commanders or their designated representatives will
submit required reports to the proper authorities.
i. The emergency plan will be posted in each shelter,
and all personnel will be familiar with its contents. The
duty position of personnel specifically delegated
destruction responsibilities will be listed on the emergency
plan.
9. Declassification Procedures. Safeguarding classified
information in a computer or computer system requires
special precautions because of the type of storage media and
devices (magnetic drums, disks, disk packs, and tapes) used
to store, record, or manipulate data that must be protected
by appropriate classification and security controls until
the declassification procedures below are carried out. The
eventual temporary or outright release of the storage device
or a system including storage media should be anticipated.
Procedures to release or deploy the storage media outside
the controlled environment are below. Destruction may be
used when the media is no longer needed or the risks
associated with declassification are unacceptable. See
NSA/CSS Manual 130-1, Annex D, for further guidance.
a. Magnetic Tapes. Tapes used to store magnetically
recorded digital data may be declassified by erasing with
bulk tape degaussers. These degaussers must be tested and
approved by a DOD component or a commercial testing
laboratory. Such tests may be certified by adhering to test
methods and performance criteria outlined in NSA/CSS
Specification L1-MTC-4A, "Magnetic Tape Degausser." DOD
components may, where necessary, develop procurement
specifications for their use, provided test methods and
performance criteria comply, as a minimum, to the NSA/CSS
specification outlined above. The degausser must be listed
in the NSA Information Systems Security (ISS) Products and
Services Catalog as meeting minimum requirements for
degaussing the media.
b. Magnetic Disks, Disk Packs, Drums, and Other Similar
Rigid Magnetic Storage Devices. The equipment will be
checked immediately before beginning the overwrite procedure
to ensure that malfunctions do not occur that will prevent
the classified information from being effectively over-written.
Thereafter, all storage locations will be over-written
a minimum of three times, once with the binary digit
"1," once with the binary digit "0," and once with a random
numeric, alphabetic, or special character. The overwrite
must be verified by testing of at least 10 percent of the
overwrite. Such alphanumeric or other unclassified data
will be left on the device. The electrical current used in
overwriting must be equal to that used in recording the
information but of a strength that will not damage or impair
the equipment. Only use evaluated and approved overwrite
programs. The risks associated with software overwrite
procedures may be unacceptable considering data sensitivity,
ultimate disposition of the media, and possible inherent
weakness of the procedures. Software overwriting is not
authorized for declassification of COMSEC keying material
marked CRYPTO.
c. Inoperative Magnetic Disks, Disk Packs, Drums, and
Similar Rigid Storage Devices. The storage device may be
declassified by exposing the recording surface(s) to a
permanent magnet. The magnet should be listed in the NSA
ISS Products and Services Catalog as meeting minimum
requirements for degaussing the media.
d. Internal Memory. Volatile memory can usually be
declassified by removing all power, including battery and
capacitor power supplies.
10. Interface Planning Checklists. The planning
information in this chapter has been summarized in three
checklists--Tables I-1, I-2, and I-3. These checklists are
not meant to be all-inclusive and should be modified for
local use. These checklists should be used in conjunction
with equipment worksheets found in CJCSMs 6231.02A and
6231.03A. In some cases, applicable worksheets are
identified on the checklists. Be sure to classify completed
checklists at the appropriate level if classified
information is entered in the remarks.
11. Additional Information. Information contained in this
manual may change after publication but before the next
revision. Several organizations maintain home pages that
contain the most current information and additional related
information. Information pertaining to switch software and
related procedures is maintained by EA-TSS at the following
addresses:
http://EATSS1.SED.MONMOUTH.ARMY.MIL and
http://EATSS.CECOM1.ARMY.SMIL.MIL
The software engineering directorate home page is found at:
http://WWW.SED.MONMOUTH.ARMY.MIL
Information about test results, lessons learned, and other
information about tactical circuit switch testing is
maintained by the Joint Interoperability Test Command at:
http://JITC-EMH.ARMY.MIL and
http://207.132.160.252/HONOR/JITC.HTM or
http://199.208.204.125/JITC.HTM
The Joint Communications Support Element maintains current
information relevant to its operations at:
http://WWW.JCSE.MACDILL.AF.MIL
The Air Force "Index of Deployable C4I" is found at:
http://www.afca.scott.af.mil/seminars/xpxrman/indexp.htm
The Army Signal Command home page is located at:
http://138.27.190.13/ASC_MAIN.HTML
Network management information may be found at:
http://www.gordon.army.mil/tsmnm
_____________________________________________________________
Table I-1. Circuit Switch Planning Checklist 1/, 2/
Task Yes No Remarks
_____________________________________________________________
Switch _______/Location _______
KG-83s or KGX-93/93A Certified
_____________________________________________________________
DSVTs (all)
Requirements Identified
Local/Long Loops Flagged
Keys, Fill Devices Allocated
Classmarks Assigned (AAL, APL,
ATS 3/)
Directory Numbers Assigned (ATS
3/)
COMSEC IDs Assigned (AVL 3/)
RH Key Assigned (AVL 3/)
S-Key Users Identified
Key Material Allocated
Fill Devices Allocated
_____________________________________________________________
Trunks (all)
Keys Identified, Positioned
CIRV Assigned (AVL 3/)
Other IRVs Assigned (AVL)
TEDS
Required/Assigned (ADT)
Keys Allocated
_____________________________________________________________
Strategic Interface
Type (Long Loop or IST)
Keys Identified, Positioned
_____________________________________________________________
Message Switch Trunks (all)
Keys Assigned (AVL)
TED Assigned (ADT)
_____________________________________________________________
STU-IIIs
Users Identified
Connectivity Established
_____________________________________________________________
Point-to-Point Circuits
Keys, Fill Devices Assigned
__________
1/ To be completed for each switch.
2/ Applicable AN/TTC-39( ) worksheets in parentheses.
3/ Apply only to AN/TTC-39A(V)1s and AN/TTC-39A(V)4s that
have not been converted to CBCSs. See Chapter III and
CJCSM 6231.02A.
_____________________________________________________________
_____________________________________________________________
Table I-2. Message Switch Planning Checklist 1/
Task Yes No Remarks
_____________________________________________________________
Switch _______/Location _______
MASTER/CNCS?
_____________________________________________________________
Traffic Security Level
_____________________________________________________________
KG-83s Certified
_____________________________________________________________
Subscriber Terminals (all)
Identified
HUS Locations Assigned
_____________________________________________________________
Trunks
Number required at this switch
Distant End(s) Identified
Key Material Identified,
Positioned
HUS Locations Assigned
_____________________________________________________________
AUTODIN Access Lines
Number Required
Key Material Identified
HUS Locations Assigned
_____________________________________________________________
Local Loops (all)
Keys Identified, Generated
Fill Device Identified
_____________________________________________________________
Long Loops (all)
Key Material Identified,
Positioned
Fill Device Identified
_____________________________________________________________
Special Data Circuits, This
Location
Keys Identified
Fill Device Assigned
_____________________________________________________________
1/ To be completed for each switch or location.
_____________________________________________________________
_____________________________________________________________
Table I-3. CNCE/Transmission Planning Checklist 1/
Task Yes No Remarks
_____________________________________________________________
CNCE _______/Location _______
Traffic Security Level?
CNCE RED or BLACK?
_____________________________________________________________
KG-83s Certified
_____________________________________________________________
Collocated DOWs (all)
Identified
HUS Locations Assigned
_____________________________________________________________
DOWs Point-to-Point (all)
Key Material Identified,
Positioned
Fill Devices Assigned
_____________________________________________________________
Traffic Flow Security
Groups Requiring TEDs Identified
TEDs Assigned
Keys Identified, Distributed
_____________________________________________________________
1/ To be completed for each CNCE or transmission node.
CHAPTER II
KEYS
1. General. This chapter provides general information
about the keys likely to be employed in the JTF backbone
network or by component forces. It also contains some
information about key management and accountability. It is
intended to be used in conjunction with information in other
chapters and the Joint Staff inter- and intratheater COMSEC
package (JSICP) letters of instruction (LOIs) published by
the JSICP manager. Two LOIs are reproduced in Appendix D.
Much of the information in this document pertains to the use
of hard-copy key material. The Joint Key Management System
(JKMS), under development, will enable the electronic
distribution of keys within the JTF. CJCSM 6520.01, "Joint
Key Management Manual," under development, will prescribe
the use of this system. The local management device/key
processor (LMD/KP) will not be used instead of the methods
described in this manual for field generation of keys.
2. Key. A key is a sequence of random binary bits used to
initially set up and periodically change permutations in
cryptoequipment for encrypting or decrypting electronic
signals, controlling transmission security (TRANSEC)
processes (for frequency hopping or spread spectrum), or
producing other keys. This definition reflects the current
NSA definition of the term "key" (formerly "variable," "key
variable," and "crypto-variable"). The TRI-TAC switches
(AN/TYC-39, AN/TTC-39A(), AN/TTC-42) use the term
"variable," and it is needed when entering information into
the database of the AN/TTC-39A() CS. For example, the area
interswitch rekeying variable (AIRV) must be entered using
the AVL command, and is recognized by the AN/TTC-39A()
software. Later systems, such as the MSE, use the term
"key" in their COMSEC management functions but may also use
the term "variable" (it also has the AVL command). There
are two basic types of keys--KEKs and TEKs. In addition,
TEKs for some applications (like TEDs and KG-84()s operating
point-to-point) are used as seed keys. Seed keys are used
to initialize devices for encryption. Seed keys are not
expected to be used to encrypt online traffic. The use and
daily update of such keys for this purpose is allowed only
in exceptional circumstances where conversion to normal
operational keys has been precluded. Seed keys must be
updated every 24 hours during their cryptoperiod. A summary
of keys required for various types of equipment found in the
JTF backbone network is contained in Table II-1.
______________________________________________________________
Table II-1. Summary of Key Requirements
Comments,
Requirement Key Distribution Method
______________________________________________________________
AN/TYC-39A MS
Local Terminals U-keys and KG-82/KG-84()
X-traffic keys Locally generated
1/ or OTAR
Remote Terminals U- and X-sync Manual distribution
keys (this can be JSICP
key)
Trunk Circuits U- and X-sync Use JSICP pair-wise
keys unique key system
AUTODIN Access U- and X-sync Use JSICP pair-wise
Lines keys unique key system
HGX-83 Z-key Key tape or locally
generated
CS Trunks T-key Mode VI subscribers
off CS, manual or
OTAR from CS
______________________________________________________________
AN/TTC-39A(V)l and non-CBCS modified AN/TTC-39A(V)4 CS
Local DSVTs U- and X-net TERV (U) (manual)
keys and TERN (X-net)
(electronic)
Long Loop DSVTs U- and X-net TERV (U) and TERN
keys (X-net) (manual,
TERN electronic
after first
cryptoperiod)(this
can be JSICP key)
Switch CIRV--This key Key tape (JSICP),
is held only at manual, or local
switches. generation
Switch AIRV--This key Use JSICP key,
is common for a manual
given pair of
area codes.
CPS, Local and CSS Reentry Home RH
DSVTs (RH) Manual (JSICP)
S-key operation S-key-- This Use JSICP S-keys
key is held SCI channels for
only by SCI keys
subscribers.
TEDs T-keys 2/ TED cold start or
TED seed key
key tape (JSICP),
manual
HGX-83 Z-key Key tape or local
generation
______________________________________________________________
CBCS
Local DSVTs U- and X-keys Local generation
Long Loop DSVTs U-keys Use JSICP, local
generation, or OTAT
Switch CIRK--This key Manual, key tape or
is held only at local generation
switches, may
be JSICP keys.
Switch AIRK--This key Manual or bulk
is common for a transfer (may be
given pair of JSICP key)
area codes.
Switch BT-key Key tape or OTAR
(may be JSICP key)
CPS, Local and CSS Reentry Home Manual
DSVTs, MSRTs (M) May be
JSICP
S-key operation S-key-- This Use JSICP S-keys
key is held SCI channels for
only by SCI keys
subscribers.
HGX-83 Z-key Key tape or local
generation
TEDs T-keys 2/ TED cold start (Tj)
key tape (JSICP)-
manual or TED
traffic keys (T),
bulk transfer
______________________________________________________________
AN/TTC-42 CS
DSVT REENTRY (R) Initialization key
loaded in X
position. Used for
cold start.
Replaced by X-net.
manual (JSICP).
S-key operation S-key--This key Use JSICP S-keys
is held only by SCI channels for
subscribers. SCI keys
DSVT U-Keys Used in each DSVT.
Unique per DSVT.
Locally generated
or JSICP.
DSVT X-net Key Synchronization
Key. Held by all
DSVTs on an
AN/TTC-42.
Electronic.
Switch CISRV Common interswitch
KEK. Held by all
CPS within same
area code. Manual
(JSICP), OTAT,
locally generated.
Switch UTSRV Unique interswitch
KEK. Held pair-
wise between CPSs.
May be used inter-
or intra-area. It
is used between Co-
and Alt-parent.
Manual (JSTCP),
OTAT, locally
generated.
Switch AISRV Area interswitch
KEK held by area
boundary switches.
It is used only by
the boundary
switches. Manual
(JSICP), OTAT,
locally generated.
KG-94/194 3/ T-Key (JSICP) A TEK used to
encrypt DTGs. Used
for traffic flow
security. Must be
unique to each
link, but used on
all trunks in a
link. OTAT,
locally generated.
KG-194 3/ FIREFLY A TEK for DTGs.
Should be in netted
format to allow
total crypto
compatibility
throughout the
network. They are
held uniquely per
each system
containing KG-194s.
KSD-64.
DVOW CNV, RKV KY-57 keys. Only
CNV is needed.
Manual (JSICP),
OTAT, locally
generated.
______________________________________________________________
SB-3865
DSVT REENTRY (R) Initialization key
loaded in X-
position. Used for
cold start. Same
reentry as used in
CPS. Use JSICP or
locally generated.
DSVT U-Keys Unique per DSVT.
Locally generated,
or use JSICP.
DSVT X-net Key Synchronization
key. Held by all
DSVTs on a CPS.
Electronic or use
JSICP.
KG-94A/194A 3/ T-Key Same as AN/TTC-42.
S-Key operation S-Key--This key Use JSICP S-keys
is held only by SCI channels for
subscribers. SCI keys.
______________________________________________________________
AN/TSQ-111
DOW, Operating X-traffic key KG-82/KG-84().
Point-to-Point
HGX-83 Z-Key Key tape or local
generation.
DVOW CNV, RKV VINSON-secured
RKV-key tape
CNV-key tape, OTAR,
local generation.
TEDs T-Key 2/ Key tape.
______________________________________________________________
1/ "U" is a key encryption key (KEK). "X" is a traffic
encryption key (TEK).
2/ Key requires updating every 24 hours. Update "01"
should be implemented prior to passing traffic.
3/ TEDs in these switches should be used only when there
are no available TEDs in the transmission equipment.
______________________________________________________________
3. Rekeying Keys. Rekeying keys are used to secure
electrical transmission of other keys between the CS and a
DSVT or between two CSs, for example, to protect a new or
subsequent TEK. Rekeying keys are KEKs. The U-key is also
used between a CPS and DSVTs connected to a COMSEC
subordinate switch (CSS). The U-key is also used between a
CS and the AN/TYC-39 in support of data subscribers
connected to the CS. It is also used between MSs or CNCEs
or between the MS or CNCE and remote KG-84()s. The U-key is
used for the AN/TYC-39-to-AUTODIN interface. Terminology
for various CS applications of the U-key is summarized in
Table 11-2. The cryptoperiod for the U-key at CPSs, MSs,
and CNCEs is 3 months or the length of the mission,
whichever is less. Planners must be aware of cryptoperiods
and consider means to rekey the network at times of key
expiration. When the KEK is used between two CSs, it is
referred to as an Interswitch Rekeying Variable (IRV). The
terminology used for IRVs by different switches is
summarized in Table 11-3.
a. Subscriber Rekeying Keys (U). These keys are held
at individual subscriber terminals or in groups and at
parent or host-parent switches. These KEKs are called U at
the terminal equipment (KY-68 or KG-84()). U-keys are
unique for ULCS and AN/TTC-39A(V)l DSVT subscribers, and are
netted for DSVT subscribers of CBCSs. For subscribers
connected to a CSS, the cryptoperiod is 1 month or the
length of the mission, whichever is less.
______________________________________________________________
Table 11-2. Subscriber Rekey Key Terminology
Type Use Comments
______________________________________________________________
TERV DSVT Rekey AN/TTC-39A(V)l
U DSVT Rekey CBCS
U Subscriber and CSS Rekey AN/TTC-42
HRV SB-3865 Home Rekey AN/TTC-39(A)Vl,
CBCS
SRV Option 11 SEN Rekey CBCS
MSRV Message Switch LKG Rekey AN/TTC-39(V)l,
CBCS
______________________________________________________________
b. Unique IRV. The UIRV may be used on a switch pair
basis between AN/TTC-39A(V)ls, but probably will not be used
due to the small quantity of switches remaining. In
AN/TTC-42 networks, this key is called the UISRV. A version
of this key may be held between a CPS and a CSS or between
two CSSs for over-the-air transfer purposes. This use is
totally manual and it is not up to the staff planner to
implement. It is not assigned from ICP material and would
be locally defined and controlled. CBCSs do not use this
key.
______________________________________________________________
Table 11-3. Interswitch Rekey Variables
Interswitch Key AN/TTC-42 AN/TTC-39A(V)l CBCS
______________________________________________________________
Common CISRV CIRV CIRK
Interarea AISRV AIRV AIRK
Unique UISRV UIRV --
Bulk Transfer -- -- BT
______________________________________________________________
c. CIRK. The CIRK is held by all parent switches in the
same area code. In AN/TTC-42s, this key is called the
CISRV.
d. Interarea IRV (AIRK). The AIRK is held by interface
switches connecting two given area codes for transfer of
per-call keys between two area codes. For AN/TTC-42s, it is
called the AISRV.
4. V-key (V). A V-key, a TEK is the per-call key used only
during a given call. The V-key is generated at CPSs and is
used whenever a DSVT call is placed at or transits a CPS, or
transits more than one CPS. One V-key is uniquely generated
on a per-call basis and is used to effect end-to-end
encryption.
5. Net Keys (X). Net keys are TEKs.
a. Circuit Switch Applications. For CS use, the X-key
is held by all subscribers of a given net. The X-key is
E~ither used to synchronize a CPS and its subscribers in nets
or for encryption of traffic on calls that do not involve a
CPS (calls between two DSVTs of the same CSS). It is also
assigned to MSs (MSNV). The cryptoperiod for subscribers
connected to the CPS is 3 months or the length of the
mission, whichever is less. For subscribers connected to
the CSS, the key period is 1 week. CS terminology for
,rarious applications of the X-key is summarized in
Table 11-4. A cross-reference table of all commonly used
keys is given in Table 11-5.
______________________________________________________________
Table 11-4. Subscriber Net Key Terminology
Type Use Comments, Distribution
______________________________________________________________
TERN DSVT Net AN/TTC-39A(V)I, Manual,
Electronic, or OTAR
X DSVT Net CBCS, Electronic
X DSVT Net AN/TTC-42, Electronic
x SB-3865 Home Net AN/TTC-42, Manual, OTAT
HN SB-3865 Home Net CBCS, Manual
SN Option 11 Home Net CBCS, Manual
MSNV Message Switch Net AN/TTC-39(V)l, CBCS, OTAR
RH Reentry Home AN/TTC-39(), Manual
R Reentry/Cold Start A N/TTC-42, Manual
M ReentrV Home CBCS, Courier
______________________________________________________________
b. Message Switch Applications
(1) Message Switch Traffic Keys (X-Traffic Keys).
For the AN/TYC-39, the X-traffic variable is used to encrypt
and decrypt traffic on a KG-82 to KG-84() loop. Each loop
will have a different X-traffic key. The X-traffic key will
also be used on trunks between AN/TYC-39s (LKG-to-LKG). The
normal cryptoperiod for the X-traffic key when used with the
MS is 1 week or the length of the mission, whichever is
less. When the X-traffic key is used for point-to-point
operation (KG-84() to KG-84()), the X-traffic key
cryptoperiod is 1 month, provided the UPDATE feature on the
KG-84() is used once a day.
(2) Initial Synchronization KeV (X-SynC Key). To
reduce the number of tapes required at the AN/TYC-39 and
subscriber locations, a common synchronization key (X-sync
key) will be employed. This X-sync key will be common to
message switches and only used to initialize KG-84()s and
dedicated KG-82s considered long loops off the message
switch (terminals, trunks, and AUTODIN interface). The
X-sync key is intended only to sync the loop(s), and once in
sync with the KG-82, the X-sync key must be replaced with
the X-traffic key. Therefore, once loaded and in sync with
the KG-82, the X-sync key must be replaced with an X-traffic
key (different for each KG-82/84-KG-82/82 loop) by remote
electronic rekeying from the controlling AN/TYC-39.
____________________________________________________________________
Table 11-5. Key Cross Reference List
Key CBCS AN/TTC-42 AN/TYC-39( ) CNCE
____________________________________________________________________
Rekey
Subscriber U U U
Net U
SB-3865 Home Rekey HRV U
Option 11 Home Rekey SRV
Message Switch LKG MSRV U
Rekey (Interswitch)
Common CIRK CISRV
Unique UISRV
Interarea AIRK AISRV
Rekey (Orderwire) RKV RKV RKV RKV
Duplicate RKVD
Bulk Transfer BT
Traffic
Net X X X-Traffic X
SB-3865 Home Net HN X
Option 11 Home Net SN
Message Switch Net MSNV X
MS Initialization X-Sync
Reentry Home M R
Orderwire CNV CNV CNV CNV
Compartmented S S
Trunk T T T T
TED Cold Start 1/ TI T T T
Z-Key Z Z Z Z
____________________________________________________________________
1/ Held in common with the transmission network
____________________________________________________________________
c. CNCE Applications. The TEK X encrypts and decrypts
DOW traffic on an LKG/KG-84() combination. It will also be
used between CNCEs (LKG to LKG). KG-84()-to-KG-84() DOW
links will also use the TEK X. The normal cryptoperiod for
the TEK X when used with the CNCE is 1 week or the length of
the mission, whichever is less.
NOTE: When the TEK X is used for point-to-point operation
(KG-84()-to-KG-84()), the TEK X cryptoperiod is
1 month, provided the update function on the KG-84()
is used once a day.
6. Z-Key. The Z-key, a KEK, is used with the Z-key
generator (ZKG) on the HGX-83. The ZKG encrypts and
decrypts keys when they are read into or out of the HUS.
Zeroizing the ZKG protects the contents of the HUS in an
emergency. The normal cryptoperiod for the Z-key is 3
months or the length of the mission, whichever is less.
7. Reentry Home Key (M, RH, or R)
a. The M-key, a TEK, is used in CS applications. It is
loaded manually with a fill device and is used for a cold
start or for a zeroized DSVT to reenter the net. All
subscribers connected to a CPS (including those connected
through a CSS) will be loaded with the same RH-key in common
with the CPS. The M-key is loaded in the X-key location and
is used only for initial synchronization of the zeroized
DSVT. The M-key is immediately replaced with the current
X-net key by the CPS when the subscriber using the M-key
first goes offhook.
b. For the AN/TTC-42, it is called R, and has
additional uses. It also serves as the traffic key in
stand-alone SB-3865s in the initial phase of a deployment.
In this application, it is loaded in both positions in the
KY-68 (the key in the LDU position is not used but must be
loaded for proper DSVT operation). The cryptoperiod in this
application is 30 days or the duration of the mission,
whichever is less. As an AN/TTC-42 network is established,
the initial R-key is replaced by keys generated at the CPSs.
c. In the AN/TTC-39A(V)1, the reentry home key is
called RH. The M-key is common within an area code, but may
be unique to an AN/TTC-39A(V)1 or AN/TTC-42. The
cryptoperiod for the M-key is 3 months or the length of the
mission, whichever is less. In CBCSs equipped with radio
access units (RAUs), the M-key is also used for encrypting
signaling between the mobile subscriber radio terminal
(MSRT) and RAU. The cryptoperiod in the MSE system for both
applications is 30 days.
8. Compartmented Key (S). The S-key, a TEK, is used by
small select communities of interest for discussing TOP
SECRET or compartmented information over DSVTs. The S-key
is used only by subscriber terminals and not switches and
can be distributed only by courier, either in hard-copy key
material (HCKM) or stored in an electronic fill device. For
the joint network, the key material will either be HCKM or
will be generated by the AN/TYC-39 MS AKDC for transfer to
the electronic fill device. When the S-key is generated at
the AKDC, a copy should not be maintained at the message
switch. The MS must be certified for TOP SECRET, whereas
the CS will only be certified for SECRET. The cryptoperiod
is 3 months, or the length of the mission, whichever is
less.
9. Trunk Traffic Key (T). The T-key, a TEK also known as a
seed key, is a two-holder, point-to-point key used to
initialize TEDs for bulk encryption for trunk traffic and
signaling. Whichever switch is the controlling end is
responsible for distributing the T-key to the other end.
For the joint network, the JTF switch will be the
controlling or master switch and must distribute T-keys to
the other switches. The cryptoperiod for the T-key is
30 days, with a daily update. Seed keys must be updated
every 24 hours. In the MSE network, T-keys for trunks to
CPSs are not unique. Between NCSs, different keys are used
for each trunk. In the documentation for MSE or CBCS
network operation, specific nomenclature is used for various
applications of the T-key. T i is the T-key used for circuit
initialization. T i and TI are designators for the initial-
ization key. T n (network) is used on trunks between pairs
of CPSs. T e (extension) is used on trunks between CPSs and
CSSs. T g (gateway) is used for trunks that traverse an area
code gateway. For dial-and-hold circuits, a unique T-key
for each circuit should be generated at the establishing
switch and bulk transferred to the switch at the other end.
A call may be established and maintained for 7 days before a
rekey is required. A specific request is required to keep a
call up for a longer period.
10. Bulk Transfer Key (BT). The BT-key is a KEK used in
the CBCS network to encrypt AKDC-to-AKDC transfers of keys
between nodes. The BT-key is pre-positioned. The crypto-
period is 30 days.
11. VINSON Cryptonet Variable (CNV). The CNV is a TEK used
to encrypt VINSON-secured orderwire traffic. The
cryptoperiod is 30 days.
12. VINSON Rekey Variable (RKV). The RKV is a KEK used for
remote rekeying in VINSON-secured nets. The cryptoperiod is
30 days.
13. Manual Cooperative Variable Transfer (MCVT) (DSVT-to-
DSVT). The MCVT is used to manually transfer net (X), TED
seed, subscriber rekey (U), reentry (M, R, or RH), and
contingency keys between switch nodes. The procedures
require the use of the DSVT and KYX-15 or DTD at both the
sending and receiving switch nodes. Each switch node must
have the same KEK stored in the KYX-15 or DTD. The control-
ling node must also have the variable(s) to be transferred
stored in its KYX-15 or DTD. The MCVT will be accomplished
using the procedures found in KAO-193A/TSEC, subparagraph
2004.i. MCVT procedures, including analogous procedures for
KY-57s and comparable OTAT procedures for KG-84()s, are
contained in NAG-16D.
14. Joint Staff Intertheater COMSEC Package. The JSICP is
an array of COMSEC material used in certain applications.
See CJCSI 6510.03 or the current version of the "Joint Staff
ICP Manager's Electronic Redbook," available on the SIPRNET
at http://www.centcom.smil.mil, for further information.
15. Key Management. A key management plan is required for
each deployment. This plan should indicate the source of
each key required by the network; who is responsible for key
provisioning, generation, transfer, and daily update of
T-keys; and how the network is to be rekeyed. It should
also provide guidelines for general control and management
of keys throughout the network. Keys generated by key
generators or read from a KOI-18 tape reader at sites that
have AKDCs must be controlled. This includes all keys that
are actually used. Keys automatically placed in AKDC
locations as part of the initialization process do not need
to be controlled if they are later replaced by another key
that is actually used.
a. Responsibilities. Local supervisors are responsible
for controlling and managing all keys generated at their
facilities.
b. Accountability. All keys in electronic form will be
accounted for in key management logs. Logs are generally
classified CONFIDENTIAL when filled in. The following line
entries must be recorded on the log for each key, depending
upon the type of equipment used at the facility:
(1) Type of Key. The type of key to be entered
into the log.
(2) Cryptoperiod. The cryptoperiod of the key.
This information is recorded in the DTG Generated and DTG
Scheduled Supersession columns.
(3) Accounting Number. An accounting number
consists of the last two digits of the year, a four-digit
serial number, and a single letter signifying the key type:
U (rekeying), X (traffic), etc.
(4) AKDC HUS Location. Location in the HUS where
the key is stored. The AN/TTC-39() log also requires the
directory number or matrix location associated with the
assignment.
(5) Class. Classification.
(6) DTG Generated. Date/time group generated.
(7) DTG Scheduled Supersession. Date/time group
the key is scheduled for supersession. This entry is made
when the key is first entered into the log.
(8) DTG Superseded. Date/time group of the actual
key supersession.
(9) User ID. Intended user identification; phone
number or routing indicator.
(10) How Transferred. Electronically or by
courier. If by courier, include courier's initials.
(11) ETD/NCD/DTD Location. Serial number of device
and location in device where key is stored.
(12) Equipment. Specific equipment in which the
key is to be stored.
(13) Location of Equipment. Geographic location.
(14) Remarks. Any pertinent information relating
to the key or its distribution.
(15) Key Tape Information. Enter the unique COMSEC
short title (USKAT-_____ ), edition segment number, and other
pertinent information.
d. Supersession. Supervisors are responsible for the
timely and orderly supersession of all keys generated at
their facilities. They should coordinate the distribution
of keys in sufficient time to allow changes before the end
of the cryptoperiod. Whenever a key is superseded, enter
the date/time group of supersession in the key management
log.
CHAPTER III
CIRCUIT SWITCHING NETWORK
COMSEC EQUIPMENT AND PROCEDURES
1. Introduction. This chapter identifies the COMSEC
equipment used to support secure voice subscribers in a
joint network. In conjunction with CJCSM 6231.02A, it
provides procedures for system planner-engineers to develop
databases for secure voice subscribers. It also provides
information about other procedures related to secure voice
operation. The bulk of this chapter pertains to the various
versions of the common baseline circuit switch, since they
comprise the majority of switches in the JTF network.
However, pertinent information about secure voice operation
of other switches likely to be found in the joint arena is
provided also. With the advent of the CBCS, it is now
possible to place most or all of the JTF network in the same
area code. Formerly, the "JTF backbone" network (composed
of switches at the JTF HQ, JSOTF HQ, and Service component
HQ) was in its own area code and was managed by the JCCC.
Switches at these nodes are still the primary interest of
the joint planners. The information in this manual is
focused at the joint planners. After any initial surge,
switches at these nodes (except NAVFOR and MARFOR) are
likely to be variants of the AN/TTC-39().
2. AN/TTC-39(). The AN/TTC-39() family of switches
includes the AN/TTC-39A(V)1 (not a CBCS), the
AN/TTC-39A(V)3, the AN/TTC-39A(V)4, the AN/TTC-39D, the
compact digital switch (CDS), and the switch multiplex unit
(SMU). The COMSEC equipment used to support subscribers is
the TSEC/KG-82. It is cryptographically compatible with the
KY-68, the KG-84(), or another KG-82 or KG-112. It is
basically the same as used in the AN/TYC-39() MS. The
difference is the control of the COMSEC equipment in the CS
as opposed to the MS. In the CSs, the processor
automatically controls these commands. In the MS, the
commands needed to generate keys, load the HUS, key, and
rekey the COMSEC equipment are operator controlled.
However, initialization of the CS is similar to the MS. The
difference is that at the CS, a combination of keyboard
entries and manual commands must be used. Another
difference is that in the message switch, the KG-82 LKG is
dedicated to a subscriber loop and operates in conjunction
with a KG-84(). In the CS, the LKGs are pooled and are
online with the DSVT only during the signaling phase, key
transfer, or conference calls. Within the CBCS network,
LKGs are not tied up on direct DNVT-DNVT PDS=Y calls, but
one LKG stays online when a DSVT is connected to a DNVT.
Upon completion of the signaling phase, the LKG is returned
to the pool (offline). When a DSVT is connected to a
nonsecure telephone, the circuit switch electronically
switches the DSVT to a plain text mode and the LKG is
dropped after call setup. A small number of AN/TTC-39A(V)1s
will remain in service. All other versions of the
AN/TTC-39() have been or will be converted to CBCSs. In a
CBCS network, the AN/TTC-39A(V)1 must function as a private
branch exchange (PBX). For information about the
AN/TTC-39A(V)1, see CJCSM 6231.02A.
a. Equipment Configuration. The HGF-85 is the COMSEC
CEF system for an AN/TTC-39A. An HGF-85 rack consists of 2
HGX-84s, 2 HGX-83s, 4 HGX-82s, 32 LKGS, 2 KG-83s, and 2
HGF-91s. Each HGF-91 provides for three KG-94/194s. The
AN/TTC-39D uses an HGF-87 rack instead of an HGF-85. The
only difference in makeup is that an HGF-87 contains
HGX-83As instead of HGX-83s. Each switch also has a trunk
encryption module containing an additional 3 HGF-91s with 9
associated KG-94/194s. The CDS and SMU generally appear
(singly or in combination) in various equipment suites
(i.e., AN/TTC-39E(V)1, AN/TSQ-188(), AN/TSQ-201, and
AN/TSC-143). The CDS and SMU support any TRI-TAC COMSEC
equipment, but may or may not have a full COMSEC suite,
depending upon the application. All applications generally
include TEDs. The number of TEDs may vary with the
combination of CDSs and SMUs employed. COMSEC equipment
complements for all CPS CBCSs (including combinations of
CDSs and SMUs) are summarized in Table III-1.
________________________________________________________________
Table III-1. CBCS COMSEC Complements
CDS CDS SMU
39Av3 39Av4 39D CDS w/CDS w/SMU SMU w/SMU NCS LEN FES
TEDs 15 15 15 9 18 15 15 15 15 3 4
HGX-83A 2 2 2 1/ 1/ 1/ 1/ 1/
KGX-93A 1/ 1/ 1/ 1/ 1/ 1 1 1
KG-82 32 32 32 1/ 1/ 1/ 1/ 1/
KG-112 1/ 1/ 1/ 1/ 1/ 8 8 8
________________________________________________________________
1/ Supports either AN/TTC-39() or MSE configuration
________________________________________________________________
b. System Description. The AN/TTC-39() CS is
designated as a CPS. AN/TTC-39A(V)1s generate common X-keys
for all DSVTs in a net connected to the switch, a rekeying
U-key unique to each DSVT, and the V-key generated on a
per-call basis. CBCSs use netted U-keys and a common X-key.
The V-key is generated at the circuit switch and is
encrypted in the U-key assigned to the called and calling
DSVT and sent to each DSVT. Thus, the V-key is generated on
a per-call basis and is used for end-to-end encryption.
When two or more CBCSs are connected into a network, one of
the switches must be designated as the master. The master
for an area code generates the U- and X-keys for that area
code. Personnel at the master switch are responsible for
the distribution of trunk and interswitch rekeying keys. As
previously explained, the AN/TTC-39() is designated as a
CPS, which means that this type of switch will house the
COMSEC equipment AKDC/RCU, LKGs, and associated equipment to
secure signaling and supervision information on loops,
generate keys, manage traffic keys on a per-call basis, and
provide other COMSEC functions. The AN/TTC-42 also
functions as a CPS. In joint applications, CBCS
AN/TTC-39()s can be configured as a CPS for the
AN/TTC-48A(V)2 echelons above corps (EAC) small extension
node (SEN), the SB-3865, AN/TTC-48A, and Option 11 switches,
all CSSs. A circuit switch network, showing locations where
various keys may be generated, held, or used, is depicted in
Figure III-1. Figure III-2 depicts a possible configuration
of a CBCS network, showing all required keys.
______________________________________________________________
Figure III-1. Required Keys for a CBCS Network
______________________________________________________________
Figure III-2. Example CBCS Network
______________________________________________________________
c. Net Definition. Each switch will employ its X-keys,
or net keys, which are held by all of its directly connected
DSVTs and are used during the initial signaling phase.
U-keys are divided into 25 nets at each switch. Subscribers
are automatically assigned to a U net based on their user
profile. Nets U-24 and U-25 are reserved for S-key holders.
The maximum net size for the U-key is 250. To allow for
mobile subscribers to affiliate at any switch, the X- and
U-net keys must be common to a home area code.
d. LKG Usage. The LKGs contained in the HGF-85 or
HGF-87 COMSEC module are normally configured to operate on a
pooled basis. However, during the signaling phase and
conference calls (RED), the LKG will operate with the DSVT
in the link encryption mode. The LKG will encrypt and
decrypt signaling information in the X-key and will also
send the V-key using the DSVT assigned U-key. This same
V-key is also sent to the called DSVT using the U-key
assigned to that DSVT and another LKG. After completion of
the V-key distribution and dialing sequence by the LKGs, the
LKGs are switched back to the pooled mode, and the called
and calling DSVTs will synchronize in the V-key for
end-to-end operation using the per-call V-key. Upon
completion of the call, the called and calling party go
onhook and the V-key is erased from volatile memory. The
LKG will also operate in the link encryption mode when it
engages in a call with a secure DNVT. During the voice
mode, synchronization between DSVTs will be automatic using
the AUTO-RESYNC capability of the DSVT. This is the most
common example of LKG usage. LKGs are also used to transfer
X-key to DSVT subscribers whenever a DSVT affiliates with an
M- or R-key loaded in its X location and at the end of the
X-key cryptoperiod. Specific examples of other scenarios
are presented in paragraph 17.
e. Keys and Key Management. The primary means of key
distribution in the CBCS network is electronic bulk transfer
from AKDC to AKDC. These transfers are encrypted with the
BT key. (The BT key is always distributed manually.) Lists
of keys can be created and distributed using the Assign,
Transfer, and Activate Lists (ATL) and Assign Bulk Transfer
(ABT) screens of the NCS and LEN. Keys can be distributed
by manual operation of the AKDC. The AN/TTC-39A(V)1 is not
capable of bulk transfer.
3. Mobile Subscriber Equipment. MSE is the US Army's area
communications system for echelons corps and below. MSE
switches are CBCSs. There are three types of switches in
the MSE system: the AN/TTC-47 Node Center Switch (NCS), the
AN/TTC-46 Large Extension Node (LEN), and the AN/TTC-48 SEN.
The NCS and LEN function as a CPS. The system also contains
radio access units (RAUs), which work in conjunction with
NCSs to service mobile subscribers who have MSRTs. As a
result of CBCS modifications, MSE switches can now operate
at either 16 or 32 kbps. However, switches servicing RAUs
and MSRTs are restricted to 16 kbps. As an option, the LEN
and SEN can service CNR callers through a secure digital net
radio interface unit (SDNRIU). The SDNRIU is really a KY-90
and appears to the switch as a DSVT. SENs and RAUs must
have all keys trunking data duplicated to at least one
switch in addition to the servicing CPS, so the servicing
CPS can be bypassed if it fails. Two switches similar to
the MSE network switches, but used for different purposes,
are the AN/TTC-50 Force Entry Switch (FES) and the AN/TTC-51
Dismounted Extension Switch (DES). The FES is a CPS, while
the DES is CSS. See CJCSM 6231.02A for further information
about these switches.
a. COMSEC Equipment. Both the NCS and LEN contain one
KGX-93A AKDC. They also contain one HGF-96 transition unit
nest assembly (TUNA) and eight KG-112 dual LKGs. Both can
contain KG-94A or -194A TEDs; the NCS has 15, the LEN has 3.
No new KG-94As are being fielded. Existing KG-94As are
being replaced by KG-194As. The SEN performs no COMSEC
functions for its subscribers and contains only one TED.
The SEN and LEN can be configured with one KY-90. The RAU
uses the MO-3(C)/G mobile COMSEC unit (MCU) for encryption
of signaling between the RAU and each MSRT. The RAU
contains eight of these units; each MSRT contains one.
Traffic on these links is encrypted by DSVTs. The FES
contains one KGX-93A, one HGF-96, eight KG-112s, and up to
eight KG-194As. The DES contains one KG-194A. COMSEC
complements for MSE CPSs are shown in Table III-1.
b. Keys and Key Management. The primary means of key
distribution in the MSE network is electronic bulk transfer
from AKDC to AKDC. These transfers are encrypted with the
BT-key. (The BT-key is always distributed manually.) Lists
of keys can be created and distributed using the assign,
transfer, and activate lists (ATL) and assign bulk transfer
(ABT) screens of the NCS and LEN. Keys can also be
distributed by manual operation of the AKDC.
4. Unit Level Circuit Switches. The ULCSs are the
AN/TTC-42 and the SB-3865 (both are not CBCSs). The
AN/TTC-42 is a CPS, while the SB-3865 is a CSS. For more
information, see CJCSM 6231.02A.
a. COMSEC Equipment. The AN/TTC-42 contains 2 KGX-93
AKDCs, 2 HGF-93 TUNAs, and 16 KG-82 LKGs. It can also
contain up to six KG-94/194 TEDs, housed in two HGF-94
transition unit frame assemblies. The SB-3865 contains no
COMSEC equipment. It may use one KG-94A/194A TED, external
to the switch. Only Modem 001 may be secured by that TED.
The other two trunk groups must be secured at the
transmission facility. All three trunk groups should be
encrypted at the transmission facility, if possible.
b. Parent-Subordinate Relationships. The
alt-/co-parent relationship is a special relationship
established between two CPSs to provide alternate routing
for secure calls to and from a CSS network and to continue
providing COMSEC service to a CSS network in the event of a
catastrophic failure to the subordinate network's parent
switch. A co-parent is a CPS whose subordinate switch
network can be controlled by another CPS. An alt-parent is
a CPS capable of controlling the subordinate switch network
belonging to another CPS. Co- and alt-parent switches must
be directly connected. Home subordinate network is the term
used to refer to the CSS network of the co-parent switch.
Lateral subordinate network is the term used by the
alt-parent to refer to the CSS network of its co-parent.
SB-3865s are frequently deployed in networks with both alt-
and co-parent CPSs assigned. By holding keys for the
lateral CSS network, the alt-parent is able to provide
complete secure service for the CSS DSVTs, and, in the event
of a failure of the co-parent, resume any incomplete REKEYs
of the lateral network. The alt-parent must NOT initiate a
REKEY of the lateral network unless the alt-parent assigns
these switches as part of its home network. This process is
key management sensitive and is not recommended. The
alt-/co-parent relationship does not provide alternative
service for DSVTs or other terminals directly connected to a
CPS. It is only for selected CSSs which must have access to
a directly connected digital in-band trunk signaling (DIBTS)
link to the alt-parent. This route may be over other DIBTS
links within the lateral network; the route cannot be made
over or through a common channel interswitch signaling
(CCIS) link.
c. Keys and Key Management. The ULCSs use most of the
same keys as CBCSs. However, some keys have different
names. See Chapter II. AN/TTC-42s cannot perform bulk key
transfer in the same manner as CBCSs; however, electronic
key transfer between switches is possible. See
subparagraph 7d.
5. CBCS Database Considerations. Required CBCS database
parameters and worksheets are discussed in CJCSM 6231.02A.
This paragraph describes selected elements of the database
for secure subscribers.
a. Assign Digital Transmission Group (ADT). When a
digital transmission group (DTG) is assigned, the security
must also be designated. If security is required, a TED
must be installed and the proper classmark selected, which
is TED (0-15, 0 = NONE). The entry must be 0 if the DTG is
in repeater mode, supports a 4½ channel group to a remote
loop group multiplexer, or supports a multiplexed orderwire
group from the Orderwire Control Unit Type II. TEDs
available normal-through for specific DTGs, by switch type,
are shown in Table III-2. TEDs may be used for other DTGs,
but patching is required.
b. Assign Net Rekey (ANR). The ANR command identifies
a specific net or group of nets for a rekeying cycle, or
initiates a cold start for the SB-3865. The sequence of
entries for an SB-3865 cold start is G, 00, new net number.
______________________________________________________________
Table III-2. TEDS Available Normal-Through, by DTG
Switch Type DTGs Available
AN/TTC-39A(V)3 DTG 1 to TED 1
AN/TTC-39A(V)4 DTG 2 to TED 2
AN/TTC-39D DTG 3 to TED 3
CDS DTG 4 to TED 4
DTG 5 to TED 5
DTG 6 to TED 6
DTG 7 to TED 7
DTG 8 to TED 8
DTG 9 to TED 9
AN/TTC-39A(V)3 DTG 16 to TED 10
AN/TTC-39A(V)4 DTG 17 to TED 11
AN/TTC-39D DTG 18 to TED 12
DTG 19 to TED 13
DTG 20 to TED 14
DTG 21 to TED 15
AN/TSC-143 DTG 2 to TED 1
DTG 3 to TED 2
DTG 4 to TED 3
______________________________________________________________
AN/TTC-47 DTG 1 to TED 1
DTG 2 to TED 2
DTG 3 to TED 3
DTG 4 to TED 4
DTG 5 to TED 5
DTG 6 to TED 6
DTG 7 to TED 7
DTG 8 to TED 8
______________________________________________________________
AN/TTC-46 DTG 1 to TED 1
DTG 5 to TED 5
DTG 16 to TED 9
______________________________________________________________
c. Assign Variable Location (AVL). The AVL command
identifies the COMSEC ID for any optional keys used by the
CS. Required keys are assigned by executing the commands
AAL or APL. During initialization of the HGX-83 or KGX-
93/93A, one of them must be assigned to the online position,
which normally occurs on power-up, and the other must be
assigned to the standby position. However, if one of them
is not online, an ASSIGN ONLINE DIAGNOSTIC (AOD) command is
entered, which would be AOD-93, "HGX-83 SWITCHOVER UNIT #,
TYPE." Upon completion of this command, one of the AKDCs
status indications displays ONLINE. The other, if offline,
can be switched to the STANDBY position. This is done using
the AOD-93 command, "HGX-83 SWITCHOVER UNIT #, Type #3,"
where 3 indicates offline to standby. The AN/TTC-39A(V)1
requires all keys be entered by the AVL command. See CJCSM
6231.02A. A list of optional keys, with recommended storage
locations and other required information, is shown in
Table III-3.
_______________________________________________________________
Table III-3. Recommended Storage Locations for CBCS
Optional Keys
Recommended Storage
Location
Key HGX-83A KGX-93A Dir No/BS-LA Key Type Net No
_______________________________________________________________
AIRK 130-150 130-150 NYX AIRK N/A
SB-3865
Net 902-911 202-211 NNX(X) HN 2-11 1/
Rekey 151-159 151-159 NNX()X HRV 1-9 2/
Option 11
Net 902-911 202-211 NNX(X) SN 2-11 1/
Rekey 160-169 160-169 NNX(X) SRV 60-69 2/
MS
Net 902-911 202-211 XX-XX MSNV 2-11 1/
Rekey 170-198 170-198 XX-XX MSRV 70-98 2/
_______________________________________________________________
1/ Use last two digits of storage location as net number.
2/ Use last digit of storage location as net number.
_______________________________________________________________
d. Assign Transfer Lists (ATL). This command
identifies the COMSEC ID for a particular key or a range of
COMSEC IDs for a contiguous group of keys to be defined as a
list to be subsequently transferred to another switch. The
AN/TTC-39A(V)1 does not have this capability.
e. Assign Bulk Transfer (ABT). This command generates
or activates a key or list of keys, or transfers a key or
list of keys to another switch. The entry for
"authorization to accept bulk transfer" must be set to Y in
the receiving switch in order to accept bulk transfer. The
AN/TTC-39A(V)1 does not have this capability. Neither does
the AN/TTC-42.
f. Duplication and Bypass. CBCSs use a series of
commands (assign bypass and duplication (ABD), assign bypass
reception (ABR), and assign local duplication (ALD)) to
accommodate SEN and RAU subscribers and designated essential
users in the event of switch failure. There is no longer a
specific set of commands required to accommodate essential
users, nor is there a set of keys specifically designated
for essential users. See CJCSM 6231.02A for more
information about duplication and bypass.
g. Security Classmarks. Security classmarks are part
of each individual subscriber's profile and are assigned
automatically using the APL, AAL, or APF commands. The four
classmarks are: P = Preferred, R = Required, N = Nonsecure,
and E = End-To-End Encryption Required.
6. AN/TTC-42 Database Construction. COMSEC functions are
performed using a series of menu-based index (IDX)
procedures. These procedures are divided into three
categories: key assignment, rekey management, and
transfer/purge control. Worksheets to aid in performing
these functions are contained in CJCSM 6231.02A.
a. Key Assignment. This series of procedures enables
the operator to perform net key assignments, local DSVT
assignments, ISRV assignments, subordinate switch
assignments, and external key assignments, and to display
AKDC status. The information required to make these
assignments is basically the same as for the AN/TTC-39();
however, the terminology and information entry order are
different.
b. Rekey Management. These procedures allow the
operator to rekey the home subnetwork (REKEY NET), a
particular switch (REKEY SWITCH), or the lateral subnetwork
(REKEY LAT NET). They also allow the operator to change or
display rekeying status.
c. Transfer/Purge Control. This series of procedures
allows net, rekey, and CSS keys to be purged or transferred
to the alt-parent.
7. Co-Parent and Alt-Parent Procedures for ULCS. The co-
and alt-parent must be directly connected (no intermediate
switch).
a. At the Alt-Parent. The operator defines the
alt-parent, loads the UISRV in AKDC UVS location 008, and
enters the co-parent's home CSS network as lateral CSSs.
The alt-parent must have a direct DIBTS route to the lateral
network. (For proper network routing, this route MUST be
the primary route from the alt-parent to the lateral
network.)
b. At the Co-Parent. The operator defines the
alt-parent and loads the UISRV in AKDC UVS location 007.
(This UISRV is no different than any other UISRV, except
that it is also used to encrypt the transfer of the Reentry,
Net, and U-keys assigned to the home CSS of the alt-parent.)
The operator performs Command 11 at the AKDC to transfer
Reentry and U-keys to the lateral switch. The switch will
not default if this is not done. The operator then rekeys
home CSS switches. The switch defaults to require these net
keys be transferred to the alt-parent before the REKEY
function is initiated. Upon successful transfer of keys,
the alt- and co-parent relationship is established.
c. At the CSS Network. The operators define the
co-parent and alt-parent switches. The link from the
lateral network to the alt-parent must be the PRIMARY route
from each lateral switch to the alt-parent and to that
portion of the network which is accessed through that
switch. If the primary route is selected through the
co-parent, alt-routing will not occur if the link between
the alt- and co-parent is "out of service" or "busy."
d. Key Transfer. Although the AN/TTC-42 does not
perform a "bulk" transfer, it can be used to transfer keys
between switches. To perform this function, the
TRANSMITTING switch must define the RECEIVING switch as an
alt-parent, while the RECEIVING switch defines the
TRANSMITTING switch as a co-parent. A "dummy" CSS is then
entered in each switch as either a home or lateral switch,
as appropriate. Each switch must then load the KEK as the
UISRV in either location 007 or 008. A manual "transfer
variable" routine is then initiated by the co-parent
operator, who then may transfer the key(s) to the
alt-parent. Although appearing cumbersome, this is an easy
method to transfer (OTAT) a large number of keys through the
network. This procedure must be done between directly
connected CPSs. Using this method, it is possible with one
common, two party key in the network, for one switch to
generate certain keys and initialize the network without
dependence upon keytape.
8. Keys and Key Management. Keys used in circuit switch
applications are discussed in Chapter II. All keys in
electronic form will be accounted for in a log. The log is
CONFIDENTIAL when filled in.
9. Key Assignments Within the HUS. All keys that are
required for CBCS operation have preassigned HUS locations.
These locations are shown in Table III-4. Additional
(optional) keys are assigned using the AVL command.
Recommended key locations are in Table III-3. After keys
have been assigned to the HUS, use Command 57 to transfer
variables from the HUS/COMSEC ID to the AKDC Fill Buffer and
then to a fill device. Command 57 is used to load the fill
devices for distribution of variables to local subscribers.
Remote subscribers normally receive variables via pre-
positioned tape, and these subscriber terminals must be
loaded using the KOI-18 tape reader. HUS locations used by
the Marine Corps in the AN/TTC-42 are shown in Table III-5.
10. Load TED to TED (Trunking). When assigning a digital
transmission group, the TED must be assigned if traffic flow
security is needed for a particular deployment. Therefore,
if traffic flow security is required between two AN/TTC-39s,
the TEDs must be assigned using the ADT Command--Assign
Digital Transmission Group--which is TED (0-15, 0 = NONE).
Before activating the TEDS, they must be internally strapped
for proper operation (see Apendix G). TEDS are also used
for traffic encryption in some applications.
11. Tactical-Strategic Interface. Interface to the Defense
Red Switch Network or other strategic secure network can be
done in two ways, though the specific type of secure switch
or availability of other required equipment may force the
use of one method instead of the other. One method is
through a DSVT (or equivalent) at the strategic end. This
DSVT is treated as a long loop off the AN/TTC-39(). (See
Figure III-3.) Another example of this connectivity is
shown in Figure III-4. The other method involves
establishing interswitch trunks using multiple rate voice
cards (MRVCs) at both ends. This is a nonstandard con-
figuration, using KG-84() family equipment at both ends.
Typical connectivity for this method is shown in
Figure III-5. Required keys are the appropriate U- and
X-keys. Hard-copy key material is required to support these
interfaces. Technical information about establishing these
interfaces and others can be found in CJCSM 6231.02A.
______________________________________________________________
Table III-4. CBCS Storage Locations for Preassigned Keys
_____________________________________________________________
HGX-83 HUS FUNCTION KGX-93 HUS
LOCATIONS LOCATIONS
_______________ _______________
A B A B
_____________________________________________________________
0 223 RESERVED 0 256
1 224 CIRIK 1 257
2 225 COMMON BT 2 258
3 226 U NET 1 3 259
4 227 NET 2 4 260
5 228 NET 3 5 261
6 229 NET 4 6 262
7 230 NET 5 7 263
8 231 NET 6 8 264
9 232 NET 7 9 265
10 233 NET 8 10 266
11 234 NET 9 11 267
12 235 NET 10 12 268
13 236 NET 11 13 269
14 237 NET 12 14 270
15 238 NET 13 15 271
16 239 NET 14 16 272
17 240 NET 15 17 273
18 241 NET 16 18 274
19 242 NET 17 19 275
20 243 NET 18 20 276
21 244 NET 19 21 277
22 245 NET 20 22 278
23 246 NET 21 23 279
24 247 NET 22 24 280
25 248 NET 23 25 281
26 249 NET 24 26 282
27 250 NET 25 27 283
28 251 RKV 28 284
29 252 CNV 29 285
30 253 TI 30 286
31-96 254-319 AVAILABLE 31-96 287-35
97 320 RKV 97 353
98 321 RKV 98 354
99 322 RKV 99 355
100 323 RKV 100 356
101 324 T 101 357
102 325 T 102 358
103 326 T 103 359
104 327 T 104 360
105 328 T 105 361
106 329 T 106 362
107 330 T 107 363
108 331 T 108 364
109 332 T 109 365
110 333 T 110 366
111 334 T 111 367
112 335 T 112 368
113 336 T 113 369
114 337 T 114 370
115 338 T 115 371
116 339 T 116 372
117 340 T 117 373
118 341 T 118 374
119 342 T 119 375
120 343 T 120 376
121 344 T 121 377
122 345 T 122 378
123 346 T 123 379
124 347 T 124 380
125 348 T 125 381
126-222 349-445 AVAILABLE 126-222 382-478
880 912 M 224 480
881 913 NET 2(A) X NET 27(B) 225 481
882-911 914-943 AVAILABLE 226-255 482-511
446-879 944-1007 AVAILABLE
_____________________________________________________________
________________________________________________________________
Table III-5. AN/TTC-42 HUS Allocations
________________________________________________________________
Location Key Type Remarks
________________________________________________________________
000 Reserved for switch use
001 CISRV Location must be marked "valid"
002 ISRV Formerly reserved for DAMA ISRV,
not used
003-006 AISRV
007 UISRV Of alt-parent, at co-parent
008 UISRV Of co-parent, at alt-parent
009-070 UISRV
071-100 Spare Extra-switch, not used by switch
software
101-220 U Directly connected subscribers
221 U Post-nuclear
222-223 Reserved for AKDC diagnostics
224-253 X Home nets
254 R May be ICP long local key
255 X post-nuclear
256-300 Spare Extra-switch
301-348 U CSS subscribers
349-400 Spare Extra-switch
401-448 U Lateral subnetwork
449-476 Spare Extra-switch
477 CISRV Lateral switch
478-479 Reserved for AKDC diagnostics
480-509 X Lateral subnetwork
510 R Lateral subnetwork
511 CISRV Lateral switch
________________________________________________________________
Figure III-3. Typical Red Switch Connectivity
________________________________________________________________
Figure III-4. Possible Red Switch Connectivity
________________________________________________________________
Figure III-5. Example Red Switch Interswitch Trunk Connectivity
________________________________________________________________
12. Protected Distribution Systems and Approved Loops.
CBCSs permit switches and their subscribers to operate in a
PDS, using different handling rules for secure calls than
would be used for unprotected distribution systems. The
switch is classmarked for PDS operation using the PDS=Y/N
entry on the assign switch initialization (ASI) screen.
PDS=Y allows SECRET-high traffic to operate in areas of the
network without encryption. DNVT subscribers classmarked
SP, when affiliated with a PDS=Y switch, may complete secure
calls to any DSVT subscribers in the network, any DNVT
subscribers that are classmarked SP at a PDS=Y switch, or
any SR subscribers. The Army operates its switches PDS=Y,
while the other Services and JCSE operate PDS=N. Switches
classmarked PDS=N may use approved loops for DNVT and analog
subscribers, though this is seldom done. The "approved
loop" must meet the requirements specified for a PDS in
NSTISSI 7003 and NACSIM 5203. The DNVT (or other telephones
so classmarked) can talk only to a secure subscriber. When
approved loops are implemented, the secure call privilege on
those loops must be R = Required. For the DSVT, the secure
call privilege can be R or P = Preferred. When the R
classmark is used, a secure path must be available to
complete the call. Therefore, it is suggested that the
DSVTs use the secure call privilege P. Army DNVT
subscribers classmarked SP may affiliate at a PDS=N switch,
but will be downgraded to NS, and NSWT will be played
throughout all calls. Figures III-6, III-7, and III-8
illustrate different call combinations in a mixed (PDS= Y or
N) network. Table III-6 lists allowable calls in CBCS
networks. See NSTISSI 7003 for more information about PDS
requirements.
________________________________________________________________
Figure III-6. PDS Call Combinations (1 of 3)
________________________________________________________________
Figure III-7. PDS Call Combinations (2 of 3)
________________________________________________________________
Figure III-8. PDS Call Combinations (3 of 3)
________________________________________________________________
__________________________________________________________________
Table III-6. CBCS Allowable Calls
__________________________________________________________________
Calling Called
Subscriber Subscriber
Approved DNVT or
Loop Analog DNVT DSVT DSVT DSVT
R NS P 1/ P R E
__________________________________________________________________
Approved Yes No Yes Yes Yes No
Loop
R
DNVT or Analog No Yes Yes Yes No No
NS NSWT 2/ NSWT 2/
DNVT Yes Yes Yes Yes Yes 4/
P 1/ NSWT 2/ 3/
DNVT Yes No Yes Yes Yes No
R
DSVT Yes Yes Yes Yes Yes No
P NSWT 2/
DSVT Yes No Yes Yes Yes Yes
R
DSVT No No 4/ Yes Yes Yes
E
_________
1/ At CBCS marked PDS=Y. At PDS=N switch, reverts to NS and always
receives NSWT. Calls that originate and terminate at PDS=Y switches
but tandem through PDS=N switches are allowable as long as the PDS=N
switches are protected IAW all of the provisions of paragraph 7.
Chapter I. If those switches cannot be protected as specified,
routing restrictions must be imposed to prevent those calls from
occurring.
2/ NSWT is only applied at the P terminal.
3/ NSWT may be provided to both terminals if the connecting path
contains nonsecure trunks.
4/ No for voice calls, Yes for data-initiated calls. Applies if DNVT
at PDS=Y and DSVT is at PDS=N, for traffic at SECRET level or below.
Legend: Secure Call Privilege
R = Required
NS = Nonsecure
P = Preferred
E = End-to-End
NSWT = Nonecure Warning Tone
__________________________________________________________________
13. Dial-Up Message Switch Connectivity. See
CJCSM 6231.03A for database entries for this service.
a. CBCSs. AN/UGC-144s can be configured for message
switch access through an AN/TTC-39(). The AN/UGC-144 is
used in conjunction with a DSVT in this application. The
DSVT must be properly classmarked for this application
(including MS COMPATIBLE = Y on ATS screen and security
classmark E). (The message switch will reject a call that
is nonsecure.) A link between the CS and the AN/TYC-39 must
also be properly established. MSRVs and MSNVs for this link
are assigned using the AVL command. The MS matrix locations
(BS-LA) are required for these entries. Also, CSs are
normally certified for SECRET operation and generate SECRET
keys. A waiver is in effect to permit TOP SECRET calls to
the MS using SECRET key, providing physical safeguards for
TOP SECRET are met (see Chapter I). This waiver applies
only to calls from a DSVT. In addition to calls through a
DSVT, CBCS switches classmarked PDS=Y permit calls initiated
in data mode through a SECURITY PREFERRED DNVT. These calls
are limited to SECRET traffic.
b. AN/TTC-42. No specially named keys are used for
this application. Calls through a DNVT are not permitted.
14. Point-to-Point Operation (DSVT-to-DSVT). The DSVT can
be operated point-to-point with another DSVT without the CS.
This is the sole user mode of operation and must be
internally strapped for Mode 2. An internal jumper is
provided on the control logic (E-EUL) printed wiring
assembly (PWA) for this function. For Mode 2 operation, the
jumper must be connected between jacks A4J2 and A4J3. In
the sole user encrypted mode of operation two DSVTs are
connected back-to-back via transmission equipment. Both
keypads are disabled and signaling is accomplished
automatically. When the calling DSVT goes offhook, the
called DSVT rings. Secure operation can begin when the
called DSVT goes offhook. The sole user mode of operation
does not provide a plain text mode. When the DSVTs are
operated in the sole user mode, the cryptoperiod for the U-
and X-key is the same as that for a subscriber connected to
the CSS. For the U-key, the cryptoperiod is 1 month or the
length of the mission, whichever is less. The cryptoperiod
for the X-key is 1 week or the length of the mission,
whichever is less. However, the DSVTs can be rekeyed to
change the X-key, through the Remote Cooperative Rekeying
process. Another DSVT feature is the capability to manually
send a new key from one end of the DSVT link to the distant
link using a KYX-15/DSVT combination. This is called Manual
Cooperative Variable Transfer and can be applied to switched
or nonswitched DSVTs after they have established secure end-
to-end communications. To support missions up to 3 months,
only the rekeying feature is needed. Specific procedures
for this operation are contained in Appendix B.
15. STU-III Operation in Tactical Networks. Several
certified interfaces are available to connect STU-IIIs
through tactical CSs to the Defense Switched Network (DSN)
or commercial networks. Information about these interfaces
is contained in CJCSM 6231.02A. Interfaces using STU-III
variants releasable to allies have also been certified.
Units taking STU-IIIs are using the keys used with the
instruments at the home station. There are not yet any
approved or validated key management, key distribution, or
other COMSEC procedures specifically intended for STU-III
operation in a JTF. Should such procedures be developed,
applicable information will be placed in this document.
Procedures governing the COMSEC aspects of STU-III operation
which are used in garrison also apply in a JTF. The next
generation of secure terminals, STE, which should eliminate
the requirement for the STU-III in tactical theaters, is now
under development. The STE is described in Appendix E. A
transitional terminal, the Motorola Multi-Media Terminal
(MMT)/DNVT has been developed and fielded for use at
tactical switches prior to the introduction of the STE.
16. Operation of the Motorola MMT/DNVT Subscriber Terminal
in Tactical Switches. The MMT/DNVT is a transitional,
limited functional replacement for the STU-III at tactical
switches. It consists of two major components, SECTEL 1500
STU-III terminal, which can operate in the secure analog
(STU-III) mode at 2,400, 4,800, or 9,600 bps, plus a DNVT
adaptor "wedge" attachment to provide DNVT signaling when
connected to a tactical switch. When connected to a
tactical switch, it is treated by that switch as a DNVT.
When communicating with a DNVT or DSVT in plain text
(unencrypted) mode its signaling and voice digitization at
16 kbps is identical to a DNVT. When connected to a STU-III
on the public switched telephone network (PSTN) or DSN, the
MMT/DNVT subscriber dials to a tactical interworking
function (IWF), an ancillary device that provides a gateway
that converts the MMT/DNVT's digital signal to an analog
message compatible with either the PSTN or DSN. The
MMT/DNVT uses a proprietary BLACK digital interface (BDI)
mode for communications through the the DNVT adaptor or to
digital RF facilities. It is dual-homed so it can be
attached simultaneously to telephone and RF networks. The
MMT can also be attached to the SECTEL Video Docking Unit
(VDU) to achieve real-time secure transmission of still or
near full-motion video images. It can be upgraded using a
3.5-inch crypto-sealed disk by downloading new software from
a PC.
17. Use of LKGs in Circuit Switch Calls. LKGs (KG-82 or
KG-112) are used in all circuit switch secure calls between
two DSVTs to pass the V-key to each subscriber terminal but
do not remain in the circuit during the traffic phase of the
call. This paragraph covers cases where LKGs do remain in
the circuit for the duration of the call.
a. Calls Between non-CBCS Modified Switches
(1) For secure calls between two DNVTs where at
least one of the subscribers is in a TRI-TAC switch or the
call is routed through the TRI-TAC network, two LKGs remain
online for the duration of the call, one at each
subscriber's switch. For secure calls within MSE no LKGs
are used.
(2) For secure calls between a DSVT and a DNVT, one
LKG remains in the circuit for the duration of the call. On
calls within MSE, the LKG that remains online is the one
located at the switch nearest the called subscriber. On
calls within TRI-TAC, the LKG at the DNVT's parent switch
remains online. Whenever an MSE subscriber calls a TRI-TAC
subscriber through a gateway (to a different area code), the
LKG at the calling party's switch remains online to avoid
overuse of LKGs at the gateway switches. If the call is
from a DSVT in MSE, an LKG comes online on the MSE side of
the gateway and two additional LKGs will remain online on
the TRI-TAC side of the circuit, one at the gateway entry
switch and one at the DNVT's switch. When a TRI-TAC DNVT
calls to an MSE DSVT, the LKG at the DNVT's switch is kept
in the circuit. When a TRI-TAC DSVT calls to an MSE DNVT,
the LKG at the DNVT's switch stays online.
b. Calls Between Switches When at Least One Is a CBCS.
The CBCS modification significantly reduces the incidence of
calls between area codes, reducing the number of gateway
calls between MSE and TRI-TAC switches. Calls routed within
the CBCS network follow the LKG rules for calls formerly
within the TRI-TAC network described in subparagraph 17a.
The only case in which the former MSE rules apply is if the
call is made between two MSE subscribers and is never routed
outside the local MSE network.
CHAPTER IV
MESSAGE SWITCHING NETWORK
COMSEC EQUIPMENT AND PROCEDURES
1. Introduction. The JTF backbone message switching
network is based upon the AN/TYC-39A. The COMSEC equipment
currently used in the AN/TYC-39A MS to interface with
subscribers is the LKG TSEC/KG-82. The COMSEC equipment is
basically the same as in the AN/TTC-39A() CS. The dif-
ference is the control of the COMSEC equipment in the CS as
opposed to the MS. In the MS, the commands needed to
generate keys, load the HUS, and key and rekey the COMSEC
equipment are under operator control. In the CS, these
commands are under processor control. At subscriber
terminals, the TSEC/KG-84() is used. The TSEC/KG-82 is
cryptographically compatible with the TSEC/KG-84() family or
another TSEC/KG-82. A fully populated AN/TYC-39A contains a
COMSEC equipment facility (CEF) HGF-83/TSEC. The HGF-83 is
a rack that provides housing, power distribution, cooling
channels, and blowers for the physical and environmental
support of the following equipment: 2 KG-83s, 2 HGX-84s,
1 HGX-83, 48 KG-82s, 6 HGX-82s, 3 KG-94/194s, and 1 HGF-91.
The HGF-91 is a transition unit that houses the three TEDs.
Details on specific equipment and fill devices that can be
used with them can be found in Appendix C.
a. Autonomous Message Switch (AMS). In support of the
joint message switching network requirements, the AN/TYC-39A
will be fielded as an AMS. In the TRI-TAC equipment
definitions, this is a message switch having the inherent
capability to generate, store, and provide keys.
b. Message Switching Network. The message switching
network, as defined in CJCSM 6231.03A, shows a variety of
message processing systems and terminals dedicated to
AN/TYC-39A ports. Full period encryption will be employed
between the AN/TYC-39A LKG and KG-84()s or KIV-7s associated
with the message processors and terminals. The capability
also exists for an AN/UGC-144 communications terminal (CT)
to access the AN/TYC-39A through a circuit switch. In that
configuration, encryption for the CT is provided by a KY-68
DSVT. CTs may be directly connected to the MS using
KG-84()s. Trunking between AN/TYC-39A MSs will be
encrypted full-period using the LKGs. For an interoperable
interface with the ASCs, the designated AUTODIN switches are
equipped with KG-84()s; and full-period link encryption
between the AN/TYC-39A LKG and AUTODIN KG-84() will be used
to support the security requirements for the Mode I terminal
interface. In the JTF network, Marine Corps elements employ
the AN/MSC-63A, which uses KG-84Cs for full-period
encryption with MS LKGs. The AN/MSC-63A contains eight
KG-84Cs. It also contains two KWR-46s to decrypt Fleet
Broadcast messages. Message processors based on the CGS-100
contain varying numbers of KIV-7s or KG-84()s, and are
therefore cryptologically equivalent to terminals using the
same devices. More information about the various terminals
and message processors directly connected to AN/TYC-39()s is
found in CJCSM 6231.03A. A representative portion of a
typical JTF MS network is shown in Figure IV-1.
________________________________________________________________
Figure IV-1. Representative Joint Message Switch Network
________________________________________________________________
c. Modes of Operation. As discussed in CJCSM 6231.03A,
interfaces between TTY terminals and the MS will usually be
configured for Mode I or II operation. (The AN/UGC-144 can
be configured to operate in Mode VI.) Trunks between
AN/TYC-39s will operate in Mode I using the message control
block (MCB) feature, and the AN/TYC-39-AUTODIN access line
will use Mode I or Mode VI.
d. Performance. The AN/TYC-39A, terminals (Modes I or
II) and AUTODIN access line will provide the following
functions.
(1) Switch detection of out-of-sync and generation
of SYNC COMMANDS to the online LKG (Modes I, II, and VI)
automatically.
(2) Rekeying of a synchronized KG-84() (Modes I,
II, and IV).
(3) KG-84C detection of out-of-sync condition in
the synchronous mode.
e. Switch Detection of Out-of-Synchronization.
Normally in Mode II operation, the terminal operator must
detect an out-of-sync condition by monitoring a printer for
garbled text. At a message switch, such as AUTODIN, an
out-of-sync condition is detected by monitoring message
sequence or an end-of-message sequence without a
start-of-message (SOM) sequence. However, the AN/TYC-39A
will monitor the data stream on a character-by-character
basis to determine an out-of-sync condition. This is done
by monitoring the framing characters (start/stop bits) for
asynchronous Mode II interface (Type I or Type II lines).
The criterion for determining out-of-sync for the Type I or
Type II line is 127 receive timing errors (RTEs) while
searching for a start-of-message or 10 RTEs in an
84-character block (Mode II is blocked within the message
switch). Upon detection of the out-of-sync condition, the
message switch will generate commands to the online LKG for
a full-duplex start sequence between an LKG and a KG-84() or
another LKG. The AN/TYC-39A will also detect an out-of-sync
condition while operating synchronously (that is, the
AN/TYC-39A Mode I, Type III line interface) This is done by
monitoring the idle pattern or block parity associated with
the 84-character block. Upon detection of the out-of-sync
condition, the AN/TYC-39A will issue a SYNC COMMAND to the
online LKG for a full-duplex resynchronization between the
LKG and distant KG-84() or LKG.
f. Rekeying a Synchronized KG-84(). If the LKG and
KG-84() are in cryptographic synchronization, the
KG-84() can be rekeyed electronically from the AN/TYC-39A
AKDC. However, at the AN/TYC-39A, the rekeying function is
under operator control.
g. KG-84() Detection of Out-of-Synchronization. The
KG-84() can be configured for asynchronous or synchronous
operation. For the Type I or Type II line interface, the
KG-84() at the TTY terminal will be configured in the
full-duplex asynchronous mode (character framed with
start/stop bits). The KG-84() in this mode of operation
features the capability to monitor out-of-sync and to
generate automatic resync. When an out-of-sync condition
has been detected (about 19 character intervals searching
for missing stop bits), the KG-84() will automatically
initiate resync between the KG-84() and LKG. However, when
the KG-84() is operating synchronously (no start/stop bits)
in Mode I or Mode VI operation, only the KG-84C can detect
an out-of-sync condition, the KG-84A cannot.
2. Joint Staff ICP Pair-Wise Unique Key Tape System. The
Pair-Wise Unique Key Tape System permits up to 80 MSs and
KG-84() equipped ASCs to establish secure connectivity by
providing all the keys necessary for cold-start
cryptosynchronization in a single canister of key tape.
(See Annex B of Appendix D.)
3. KG-83 Certification. Detailed test procedures for
certifying the KG-83 with the KT-83 and performing KT-83
self-test are contained in the SAM-70 Maintenance Manual.
4. Assign Keys for the Local Loops. This paragraph
provides information needed at the AN/TYC-39A to assign keys
within the HUS for the local loops. Specific procedures can
be obtained from the operating manuals for the fill device
used. A local loop is a terminal that can be initially
keyed with electronic keys generated at the AN/TYC-39. The
procedures for initializing the HGX-83/TSEC AKDC have a
secondary effect of generating 1,024 new keys, which may be
distributed to subscribers. These keys must be entered on
the key management log as they are requested from the HUS
location and implemented. Therefore, when servicing local
subscribers, only Command 57 is needed. This command
transfers a key from the HUS location to a fill device. The
HGX-83 obtains the key from the HUS location specified by
address A and loads it into the FILL BUFFER. When requested
by the fill device, the HGX-83 transfers the key from the
FILL BUFFER to the fill device. The transfer from the Fill
Buffer to the fill devices must occur within 7 seconds or
the HGX-83 will destroy the contents of the Fill Buffer
register. Upon completion of a Command 57 for the U-key and
a Command 57 for the X-traffic key, the KG-82 and distant
KG-84() can be loaded. During these load procedures the
U-key must be stored in HUS location 0-299 and the X-traffic
variables must be displaced by 300 locations from the U-key.
Therefore, if the U-key is stored in the Y location, then
the X-traffic key must be stored in Y + 300.
a. LKG and HUS Assignments. The AN/TYC-39A offers four
line types and services a variety of TTY terminals operating
in Mode I or Mode II. The Mode II TTY terminals will be a
combination of ITA #2 (Baudot) and ITA #5 (ASCII). At the
message switch, a Type I line equates to Mode II (ITA #2), a
Type II line is for the Mode II ASCII TTY terminals, a Type
III line is for the Mode I terminals trunking between
AN/TYC-39As and the AUTODIN interface, and a Type IV line is
for any application in which data adapters are used. To aid
in the management of the U- and X-traffic keys within the
HUS and for selection of LKGS, LKGs 1-15 will be assigned to
the Type I line interface, and LKGs 16-30 will be assigned
to the Type II line interface (see Table IV-1). LKGs 31-40
and 46, 47, and 48 will support the Type III line interface.
Therefore, HUS locations 0001-0015 and 0301-0315 will
support ITA #2 Mode II subscriber terminals (Type I line),
and HUS locations 0016-0030 and 0316-0330 will be assigned
to the Type II line (ITA #5, Mode II). For the Type III
line interfaces in support of subscriber terminals, HUS
locations 0031-0037 will be assigned to support Mode I
terminals. For Type III line interfaces used on interswitch
trunking and the AUTODIN interface, only LKGs will be
assigned; HUS locations must be determined from Table IV-1.
Therefore, HUS locations 0001-0015 and 0301-0315 will
support ITA #2 Mode II subscriber terminals. Table IV-1
outlines the LKG and HUS locations for the various line
types. (Type IV lines are not shown. If used, HUS
allocations should be rearranged to accommodate them.)
Following these rules, HUS locations 0001 and 0301 will be
assigned to subscriber #1 (logical line number 01) and the
terminal equipment must be a Mode II (ITA #2) type of
operation. At the AN/TYC-39A message switch, the Mode II
(ITA #2) terminal will be connected to a Type I line
interface using LKG #1. HUS locations 0101 and up will be
reserved for the Pair-Wise Unique Key Tapes in support of
the interswitch trunking and the AUTODIN interface.
_____________________________________________________________
Table IV-1. LKG and HUS Allocation
_____________________________________________________________
HUS Location
X-Traffic Line
LTU Red Patch LKG U-Key Key Type
_____________________________________________________________
0 1 1 0001 0301 I
1 2 2 0002 0302 I
2 3 3 0003 0303 I
3 4 4 0004 0304 I
4 5 5 0005 0305 I
5 CONTROL + CHANNEL (OX-54)
6 6 6 0006 0306 I
7 7 7 0007 0306 I
8 8 8 0008 0308 I
9 9 9 0009 0309 I
10 10 10 0010 0310 I
11 CONTROL + CHANNEL (OX-54)
12 1 11 0011 0311 I
13 2 12 0012 0312 I
14 3 13 0013 0313 I
15 4 14 0014 0314 I
16 5 15 0015 0315 I
17 CONTROL + CHANNEL (OX-54)
18 6 16 0016 0316 II 1/
19 7 17 0017 0317 II
20 8 18 0018 0318 II
21 9 19 0019 0319 II
22 10 20 0020 0320 II
23 CONTROL + CHANNEL (OX-54)
25 1 21 0021 0321 II
26 2 22 0022 0322 II
27 3 23 0023 0323 II
28 4 24 0024 0324 II
29 5 25 0025 0325 II
32 6 26 0026 0326 II
33 7 27 0027 0327 II
34 8 28 0028 0328 II
35 9 29 0029 0329 II
36 10 30 0030 0330 II
38 1 31 0031 0331 III
39 2 32 0032 0332 III
40 3 33 0033 0333 III
41 4 34 0034 0334 III
42 5 35 0035 0335 III
44 6 36 0036 0336 III
45 7 37 0037 0037 III
46 8 38 -- -- TRUNKING
47 9 39 -- -- TRUNKING
48 10 40 -- -- TRUNKING
50 1 41 17
51 2 42 18 TDIG
52 3 43 19 J-1
53 4 44 20
54 5 45 21
55 CONTROL + CHANNEL (OX-54) III
57 6 46 -- -- AUTODIN
58 7 47 -- -- AUTODIN
59 8 48 -- -- AUTODIN
60 9
61 10
62 CONTROL + CHANNEL (OX-54)
_________
1/ The Type II line interface can use diphase modem data at
rates 1,200 baud.
_____________________________________________________________
b. Fill Device Usage. The AN/CYZ-10 DTD, KYK-13, and
KYX-15 fill devices are interchangeable for holding and
filling key material. Whenever hard-copy keying material is
used, the KOI-18 tape reader must be used. Fill devices are
loaded using Command 57. This command requests a key from
the HUS location in ADRS A and transfers the key to the fill
buffer. The fill buffer is the interface for a keying
device and is used to load the electronic devices that will,
in turn, manually load the LKG(s) and KG-84()(s).
5. Loading KG-82s and KG-84()s. After the fill device is
loaded, the KG-82 and then the remote KG-84() must be loaded
with the same U- and X-traffic key. The KG-82 should be set
for Position #2, which equates to the redundant sync mode
(FCTN Position #2). After the KG-82 is loaded, the
corresponding KG-84() can then be loaded. The U- and
X-traffic keys will be the same ones loaded into the
corresponding KG-82. The KG-84() must be strapped correctly
and all switches must be set to support a Type I line
interface at the AN/TYC-39A. For details on the technical
characteristics for this interface, see CJCSM 6231.03A.
6. Rekeying a KG-84(). An operator at the AN/TYC-39A can
rekey a KG-84() via the HGX-83. During the rekeying
process, the message switch supervisor may want to inhibit
the traffic on the subscriber loop to be rekeyed. Also,
before rekeying a loop, the switch operator should load a
keying device with the original U- and X-traffic keys.
Thus, if rekeying is not successful, the KG-82 can be
manually loaded with the U- and X-keys. The KG-84() may
also have to be loaded. It is assumed that a keying device
with identical U- and X-traffic keys would be at the
subscriber location. Also, the KG-82 and KG-84() must be in
secure operation before activating the rekeying command.
The rekeying command is Command 23.
7. Loading KG-82 to KG-82 (Trunking). Interswitch trunks
between AN/TYC-39s will establish cold start crypto
initialization using the procedures described in the
applicable JSICP LOI (see Appendix D). At each switch, key
tape will be pre-positioned and the KOI-18 tape reader must
be used. The KOI-18 can be used to load the HUS. However,
the KOI-18 cannot be used to load the KG-82 via the HGX-82.
Therefore, to reduce the number of steps, the KOI-18 should
only be used to load another fill device (KYK-13, KYX-15, or
DTD).
8. External Interface (AUTODIN). KG-84()s at AUTODIN
switch are loaded using procedures described in the
applicable JSICP LOI. It is assumed that the KG-84() is
strapped and switches are set to support a Mode I interface
as described in CJCSM 6231.03A.
9. Point-to-Point Operation KG-84A to KG-84A. In some
deployments, the AN/TYC-39A message switch may not be
needed, and only subscriber terminals will be deployed.
With these types of scenarios, the KG-84A equipment will be
operating point-to-point with other KG-84A/Cs. See
MCM-166-91 for joint doctrine for keying KG-84A/C secured
point-to-point circuits. This document mandates that OTAR
be used to key nearly all KG-84A/C secured point-to-point
circuits that are operated by DOD elements. OTAR procedures
for these KG-84A/Cs are contained in NAG-16D and are
excerpted in Appendix B. If the responsible commander opts
not to rekey KG-84A/C circuits by OTAR, a variety of
cryptoperiods are authorized, the most common being daily
change of TEK or monthly TEK change with daily update.
a. OTAR, using quarterly cryptoperiod KEK and manual
keying (MK) procedures, is the normal means of replacing
KG-84A TEK in point-to-point applications. OTAR TEK should
normally be generated by the KG-83 and distributed to the
net control station in AN/CYZ-10, KYK-13, or KYX-15 fill
devices, but OTAR TEK in tape form may also be used. When
operationally feasible, OTAR KEK should also be generated by
the KG-83 and distributed to both users in fill devices.
Where this procedure is not feasible, OTAR KEK in tape form
may be used. Start-up KEK may be used to activate circuits
and nets that distribute TEK by OTAR. See NAG-16D.
NOTE: Use of the FILL V mode is not authorized.
b. If the responsible commander opts not to replace TEK
by OTAR, TEK may be generated by the KG-83 and furnished to
both stations in fill devices, or tape TEK may be used,
provided the affected segments are not used for any other
purpose.
10. Message Switch Traffic Flow Security. Normally,
trunking between the AN/TYC-39A MSs is Mode I operating at
1,200 baud and is encrypted full period using LKGs.
Therefore, all traffic between switches is secured with the
LKGs and configured to provide traffic flow security. When
TRI-TAC transmission equipment is used, the LKGs will still
be employed to perform full-period encryption and provide
traffic flow security. Traffic flow security for TRI-TAC
digital groups will be achieved by employing TEDs. This is
for trunking between a message switch and circuit switch in
support of data terminals connected to the circuit switch.
These trunks are in support of the Type IV line interface at
the message switch and dial-up data subscribers off the
circuit switch.
11. Y-Community Traffic. As noted in CJCSM 6231.03A, the
joint message switching network comprises a mixture of R-
and Y-community subscribers. Procedures required to
accredit the AN/TYC-39A MS as an SCI facility (SCIF) are
provided in CJCSM 6231.07A. A waiver is in effect to allow
TS/SCI CBCS subscribers dial-up access to the AN/TYC-39A.
U-keys are issued to these subscribers on tape. Those keys
are stored in HUS locations 26 and 27 at the CBCSs that
support SCIFs. Specific rules for safeguarding and use of
these keys are prescribed as conditions for the waiver. The
actual waiver or any implementing directives should be
consulted when planning for or using this capability.
12. AN/TYC-39A Reports Classification. Below are security
guidelines for the AN/TYC-39A MS and associated automatic
reports.
a. Classification Authority. SSO, Defense Intelligence
Agency (DIA) exercises original security classification
authority for the Tactical Defense Special Security
Communications System (TDSSCS) and information processed by
the AN/TYC-39. Actual routing indicators are not to be
associated with activities and geographic locations unless
appropriately classified and approved by the original class-
ification authority. If necessary, derivative classifica-
tion may be used to tentatively classify information pending
review by the SSO DIA. All unclassified information will be
handled as FOR OFFICIAL USE ONLY. SSO DIA is the point of
contact for Freedom of Information releases in cases of
appeal to release FOR OFFICIAL USE ONLY information.
b. Daily Cumulative Statistics (CUM STATS). Classify
CUM STATS CONFIDENTIAL when Y-traffic and circuit status are
contained therein. Identify further tributary circuit data
for Y-community subscribers by routing indicators and
command communication service designators.
c. Routing Indicators (RIs). RIs, when associated with
unclassified activities or unclassified messages, are
unclassified. Classify Y-community RI table and channel
parameters CONFIDENTIAL.
d. System and Cumulative Statistics (STATS). Classify
STATS CONFIDENTIAL. Extracts of R-community statistics are
unclassified.
e. Printer Printouts. The supervisor, traffic service,
and maintenance printer printouts are CONFIDENTIAL.
f. Service Messages. Individual service messages are
unclassified.
g. Transmission Control Code (TCC). Any TCC code with
its ID is unclassified. Classify any actual TCC with its
associated routing indicator CONFIDENTIAL. However, this
combination may be unclassified based on a case-by-case
determination.
h. Special Access Data. Information stating that an
individual is approved for access to SCI or SIOP-ESI is
unclassified, FOR OFFICIAL USE ONLY, or CONFIDENTIAL, at the
discretion of the originator, depending on the information
disclosed and other classification criteria. In any event,
classify a listing that reveals the names and job titles of
all SCI and/or SIOP-ESI approved personnel of an
organization or company not lower than CONFIDENTIAL.
i. DSSCS. The term "Defense Special Security
Communications System (DSSCS)" is unclassified when
unaccompanied by other descriptive data.
j. Magnetic Storage Devices. Classify long- and
short-history magnetic tapes, disks, and memory storage
devices TOP SECRET/SIOP-ESI/Contains CODEWORD/Sensitive
Compartmented Information/US ONLY. Classify other magnetic
tapes, disks, and memory devices (such as program storage
media) in accordance with the classification of the data or
information they contain.
k. Y RIs. One or more Y-community routing indicators
are unclassified; RI table and channel parameters are
CONFIDENTIAL.
l. Use of NOFORN or US ONLY. DOD 5200.1-R authorizes
the marking of "NOFORN" as a designator for "Not Releasable
to Foreign Nationals" in electrically transmitted messages
and automated data processing products that include the
appropriate documents covered in this publication. However,
the NOFORN and REL TO designators are being phased out, to
be replaced by US ONLY and US and (designated nation) ONLY.
The new terms are already required on hard-copy
communications. NOFORN and REL TO will continue in use on
electronic communications until worldwide systems are
modified to accept the new designators.
CHAPTER V
AN/TSQ-111 COMMUNICATIONS NODAL CONTROL ELEMENT AND
TRANSMISSION SYSTEM COMSEC EQUIPMENT AND PROCEDURES
1. Introduction. This chapter describes COMSEC equipment
used within the AN/TSQ-111 CNCE and at the transmission
assemblages to support DOW functions and DTGs egressing from
the CNCE. It provides information to enable system planners
to determine needed COMSEC equipment and keys to support
DOWs and COMSEC within the transmission network.
2. General. COMSEC equipment developed to support CNCE
security requirements is the same as previously described
for the MS and the CS. The COMSEC equipment in the CS is
under processor control, whereas the COMSEC equipment in the
MS and the CNCE is under operator control. The difference
between the operation at the AN/TYC-39A MS and the CNCE is
the out-of-sync (OOS) detection scheme and KG-84() usage.
Within the AN/TYC-39A, OOS detection is done by the switch
processor; at the CNCE, OOS detection is provided externally
from the CNCE processor. Also, OOS detection is only
provided at one end of the link. In the message switch
network, all subscriber terminals are connected directly to
the MS, and KG-84()s at subscriber terminals are assigned to
an LKG within the AN/TYC-39. Most KG-84()s used to support
CNCE/DOW functions must operate KG-84()-to-KG-84(). Thus,
KG-84()s operating with the AN/TYC-39A can be rekeyed
automatically, but the majority of KG-84()s used with the
CNCE must be manually rekeyed.
a. Equipment Configuration. For the CNCE, a fully
populated CEF consists of 2 HGF-92s, 2 HGX-82s, 16 KG-82s, 1
HGX-83, 1 KG-83, 4 HGF-94s, and 12 KG-94 TEDS. Table V-1
lists the TRI-TAC and non-TRI-TAC COMSEC equipment
associated with a CNCE.
_____________________________________________________________
Table V-1. AN/TSQ-111 COMSEC Items
_____________________________________________________________
COMSEC Eq Qty Spare Total Remarks
_____________________________________________________________
HGF-92 2 0 2
HGF-94 4 0 4
HGX-82 2 0 2
HGX-83 1 1 1
KG-94 12 1 13
KG-82 16 1 17
KG-83 1 0 2
KY-58 1 0 1 Non-TRI-TAC
KY-68 1 0 1
KY-75 1 0 1 Non-TRI-TAC
KOI-18 1/ 1 0 1 Tape Reader
Fill Cable 3 0 3
KYK-13 1/ 5 0 5 Electronic Transfer
Device
KYX-15 1/ 1 0 1 Net Control Device
_________
1/ The AN/CYZ-10 DTD will replace these devices. DTDs will
be used based on availability until they are fully
fielded. The utility of DTDs will be limited until the
JKMS is fully implemented.
_____________________________________________________________
b. System Description. The 16 KG-82s in the CNCE are
used to secure DOWs which can be telemetry, teletype, or
links from one CNCE processor to another CNCE processor.
The telemetry system provides the CNCE controller with
real-time status information on cable systems, RF
transmission systems, multiplexers, modems, and AN/TSQ-146
multiplexer terminals. This status information and the
results of 2-kbps loop-back tests made through the network
are used for network quality assessment and fault isolation.
Telemetry data is generated at 15-characters per second and
transmitted to the CNCE at a 75-bps, 150-bps, or 2-kbps
transmission rate. Within the CNCE, 75-bps or 150-bps data
can be entered directly into the communication interface
controller (CIC) to be processed as independent status data
for each assemblage or can be combined at the CNCE and then
entered at a 2-kbps transmission rate. If entered at the
2-kbps transmission rate, the combined telemetry data is
decombined within the CIC and processed as independent
status data for each assemblage. The last approach would
reduce the number of ports used at the CIC. If the
assemblages are in series, the combined telemetry data
enters the CNCE at the 2-kbps transmission rate and is
entered directly into the CIC and decombined as previously
explained. This configuration reduces the number of LKGs
needed at the CNCE. Figure V-1 depicts the Orderwire
Control Unit (OCU), which would be located at one of the
assemblages interfaced directly with the equivalent
equipment at the CNCE. Only the telemetry combiner (TC) and
telemetry decombiner (TD) functions of the OCU are shown.
Also provided in Figure V-1 are the communication equipment
support element (CESE) telemetry data requirements and
equipment parameters. Rules for DOW operation in this
configuration are shown in Table V-2. KG-84() strapping
options and switch settings for DOW operation are shown in
Appendix F.
____________________________________________________________________
Figure V-1. Data Orderwire to AN/TSQ-111
____________________________________________________________________
_____________________________________________________________
Table V-2. DOW Rules
_____________________________________________________________
1. KG-84() associated with the TC operates in the SLAVE
CLOCK MODE (Position #2). This should be KG-84() #2.
2. KG-84() associated with the TD operates in the MASTER
CLOCK MODE (Position #1). This should be KG-84() #1.
3. TD monitors for loss of sync and issues a SYNC CM to
KG-84() #1.
4. Loss of sync is detected at only one end of the
circuit for KG-84()s operating point-to-point.
5. Loss of sync is detected at the CNCE/OOS for KG-84()s
directly connected to LKGs. For this operation, loss
of sync is only detected at one end of the circuit.
_____________________________________________________________
3. COMSEC Controller. The CNCE COMSEC controller monitors
the RED side of the 16 LKGs to determine an OOS condition
for the DOWs. When an OOS condition is detected, the COMSEC
controller generates codewords to the HGX-82, which
initiates and verifies synchronization for the affected LKG.
The COMSEC controller can monitor for loss-of-sync in any of
12 possible data formats as outlined in CJCSM 6231.06. The
COMSEC Controller performs many functions and is structured
as depicted in Figure V-1, which includes the sync detection
module (SDM) and the resync control module (RCM).
a. Sync Detection Module. The SDM scans each plain
text received line of the 16 LKGs to determine loss of sync.
The SDM sets time limits, controls all timing and sequences,
generates request messages to the RCM, and receives resync
achieved messages from the RCM. When an OOS condition is
detected by the SDM for a given LKG, a resync request is
transmitted to the RCM. During the LKG sync phase, the SDM
sets the 4.1 seconds time limit for the sync acquisition.
The count is ended when a resync achieved message is
received from the RCM or when the counter has timed-out at
the end of 4.1 seconds. If the LKG remains OOS, another
resync request is sent to the RCM and the time-out counter
is again activated. After three attempts to resync a given
LKG, an OOS condition is declared by the SDM and a channel
status alarm is activated for the affected LKG.
b. Resync Control Module. The RCM handshakes with the
HGX-82s during the LKG synchronization phase. The RCM
generates the sync command that is sent to the LKG via the
HGX-82 and monitors the status of the BUSY indicator (FULL
OPERATE) for a successful sync cycle between the LKG and the
KG-84(). A successful sync cycle is shown when the BUSY
status indicator goes from the ON to the OFF and back to the
ON state. When this occurs, the RCM generates a RESYNC
ACKNOWLEDGE message to the SDM to indicate that resync has
been achieved.
4. Key Management. The CNCE is configured with an
electronic key generator (KG-83), and keys generated by it
or read from a KOI-18 tape reader at the CNCE must be
controlled.
a. Responsibilities. The CNCE controller is
responsible for the control and management of all keys
generated at the CNCE.
b. Accountability. All keys in electronic form will be
accounted for in the key management log. A key management
log will be maintained wherever keys are generated and
stored. The CNCE controller will maintain a key management
log that records all keys generated at the CNCE.
c. Supersession. The CNCE controller is responsible
for the timely and orderly supersession of all keys
generated at the CNCE. The controller should coordinate the
distribution of keys in sufficient time to allow changes
before the end of the cryptoperiod. Whenever a key is
superseded, enter the supersession DTG in the key management
log.
5. Key Generation and HUS Assignment. Specific procedures
for generating keys are contained in Appendix B. When the
HUS is loaded with keys, the CNCE has the classification of
the orderwires and transmission links that must be
protected. For the CNCE application, the CNCE
classification would be SECRET. CNCE rules are:
a. During key assignment, the U-key must be stored in
HUS location 0-299 and the X-key must be displaced by 300
locations for the U-key. Therefore, if the U-key is stored
in the Y location, then the X-key must be stored in Y + 300.
b. A transfer from the fill buffer to the keying device
must occur within 7 seconds or the HGX-83 will destroy the
contents of the fill buffer register. To support DOWs, HUS
locations 0001-0016 have been reserved for the KEK "U" and
0301-0316 are for the TEK "X" as shown in Table V-3.
___________________________________________________________
Table V-3. LKG and HUS Allocation
___________________________________________________________
LKG KEK "U" TEK "X" Station ID Notes
___________________________________________________________
1 0001 0301
2 0002 0302
3 0003 0303
4 0004 0304
5 0005 0305
6 0006 0306
7 0007 0307
8 0008 0308
9 0009 0309
10 0010 0310
11 0011 0311
12 0012 0312
13 0013 0313
14 0014 0314
15 0015 0315
16 0016 0316
0017 0317
Other CNCE Functions
VINSON
DSVT
0032 0332
0333 TED Seed Keys
___________________________________________________________
6. DOW Point-to-Point Operation (KG-84()-to-KG-84()).
Three separate orderwire assemblages are decombined within
the CIC. However, two orderwire assemblages operate on a
link basis, and the encryption scheme is independent of CNCE
COMSEC operation. That is, the KG-84()s do not connect to
LKGs within the CNCE. Thus, the AN/TSQ-146 and distant
AN/TRC-170 orderwire assemblages are combined and encrypted
or decrypted and decombined on a link basis. The KG-84()s
operate point-to-point with another KG-84(). For this type
of operation, the distant AN/TRC-170 could be up to 150 to
175 miles from the AN/TRC-170 collocated with the CNCE.
When the KG-84() is operated point-to-point with another
KG-84() on a full-period circuit, the X-traffic key can be
extended to a 1-month cryptoperiod with daily updates. When
the UPDATE function is activated, a coordinated procedure
between KG-84() operators is required. During this
procedure, the TEK "X" is replaced with a modified TEK "X."
A KEK "U" is not used with the UPDATE function. However,
when a KG-84() is initialized from a cold start, the LDU
register must be initialized. These procedures are used
when no remote rekeying is done.
7. Manual Cooperative Variable Transfer (DSVT-to-DSVT).
These procedures provide manual transfer of keys from one
CNCE to another CNCE. TEDs are initially keyed using a
unique segment of the ICP key tape(s). This segment is
identified as the TED Cold Start key and is used only for
cold start initialization. After secure connectivity
between CNCEs or AN/TRC-170s is established, the controlling
CNCE will electronically generate TED Seed keys (see
Table V-3), which must be electronically transferred between
the CNCEs. For this application, DSVT MCVT procedures will
be implemented. One DSVT at the CNCE will become a
subscriber off the AN/TTC-39(). At the distant CNCE, one of
its DSVTs will also be connected to its collocated CS.
Thus, keys for the DSVTs will be generated by collocated
AN/TTC-39()s. In the MCVT operation, the transferred key
does not alter X- or U-key contents of the DSVTs partici-
pating in the operation. The DSVTs do not use their
resident U-key in the transfer, but use a rekeying key
stored in each of the KYX-15s or DTDs. Both KYX-15s must
contain the same rekeying key, and the sending KYX-15
(controlling CNCE) must also contain the TED Seed key(s) to
be transferred. Electronically generated keys used as TED
Seed keys on TED links must be destroyed (fill device or
AKDC location zeroized) immediately after establishing
synchronization. To implement MCVT procedures, the TED
protected MUX group at the CNCE or AN/TRC-170 must be
operational. For this scenario, the TED at the CNCE will be
used. The DSVT at the controlling CNCE will be assigned as
a subscriber off the CS. At the distant CNCE, a DSVT will
also be assigned as a subscriber off its collocated CS.
Thus, secure communications can be established between CNCEs
using DSVTs and switch generated keys. The next step is to
load the KYX-15 at the controlling CNCE with the rekeying
key and TED Seed keys. TED Seed keys for this operation
will be transferred from the AKDC to the fill device
(Table V-3). The TED Seed keys can also be generated
directly from the KG-83 to the fill device. The latter
approach reduces the number of required steps. At the
distant CNCE, the KYX-15 must also be loaded with the
identical rekeying key. At the completion of the above
steps, MCVT procedures can be activated. After completion
of the TED Seed key(s) transfer, the TED Cold Start key that
was used to initialize the TEDs must be replaced with the
TED Seed key. To implement MCVT procedures requires the
following steps:
a. Activate TEDs with the TED Cold Start key.
b. Load DSVTs and assign directory numbers at both
CNCEs.
c. Load the KYX-15 or DTD at the controlling CNCE with
the identified rekeying key using the KOI-18.
d. Load the KYX-15 or DTD at the controlling CNCE with
TED Seed keys using HGX-83 Command 57.
e. Use MCVT-DSVT procedures to transfer TED Seed
key(s). See NAG-16D/TSEC for more information about MCVT
procedures.
f. Replace the TED Cold Start key with the TED Seed
key.
g. After TED synchronization in the TED Seed key,
zeroize the KYX-15(s) or DTDs and HUS storage location(s)
(Command 05) for the electronically generated Seed key that
is operational. (In the MSE, the HUS storage locations for
operational TED keys are not erased.)
8. Transmission Systems COMSEC Procedures. To meet
tactical security requirements, TEDs have been implemented
within the AN/TTC-39(), ULCSs, MSE, AN/TYC-39A, AN/TSQ-111,
AN/TSQ-146, AN/TRC-170, AN/TRC-173, and the AN/TSC-85B,
AN/TSC-93B, AN/TSC-94A, AN/TSC-100A satellite terminals.
This equipment can be deployed in various configurations to
provide the needed security. Table V-4 lists the COMSEC
complement of various types of transmission equipment.
Certainly, it is not necessary to encrypt and decrypt on a
link basis. A representative joint transmission network
showing a possible employment of TEDs is shown in
Figure V-2. Listed below are some guidelines for TED usage
when the above equipment is deployed.
__________________________________________________________________
Table V-4. Transmission Equipment COMSEC Complement
__________________________________________________________________
Equipment TED KG-84() VINSON
__________________________________________________________________
AN/TSC-94A(V) 2 2 1
AN/TSC-94A(V)2 1 1 1
AN/TSC-100A(V)1 6 1 2
AN/TSC-100A(V)2 5 1 2
AN/TSC-85B 4 1
AN/TSC-93B 2 1/ 1
AN/TSQ-146(V)1/2 4 3 2/ 2
AN/TSQ-146(V)3 4 3 2/ 1
AN/TRC-170 2 2 1
AN/TRC-173 3/ 2 1 1
AN/TRC-174 3/ 2 1
AN/TRC-175 3/ 1 1
AN/MRC-142 2 1
AN/TRC-138() 3/ 1
AN/TRC-190(V) 1
AN/TRC-198(V)1 1
_________
1/ JCSE AN/TSC-93Bs have 3.
2/ one is a spare.
1/ Also has a DSVT.
__________________________________________________________________
__________________________________________________________________
Figure V-2. Representative Joint Transmission Network
__________________________________________________________________
a. If traffic flows between AN/TTC-39()s via CNCEs and
AN/TRC-170s, bulk encrypt at the AN/TRC-170s.
b. If radio links are remoted via a TSSR or the
AN/TAC-1, bulk encrypt at the CNCE. If the AN/TSQ-146 is
being used instead of the CNCE, bulk encrypt at the
AN/TSQ-146 or at the ASOC.
c. The KG-94()/-194() TED has a number of internal
strapping options for various applications. Strapping
options for common applications are contained in Appendix G.
CHAPTER VI
DATA NETWORK SECURITY
1. General. As a JTF builds up, a tactical wide area
network (WAN) is established. The JTF WAN is composed of
Internet protocol (IP) routers (IPRs) and packet switch
nodes (PSNs) with protocol gateways to automatically route
traffic to and from local and remote subscriber local area
networks (LANs). Tactical-to-strategic connectivity is
achieved through Integrated Tactical-Strategic Data
Networking (ITSDN) gateways. The strategic networks to
which tactical users must be connected are the sensitive but
unclassified IPR network (NIPRNET), the SECRET IPR network
(SIPRNET), and the Joint Worldwide Intelligence Communi-
cations System (JWICS). (JWICS is not accessible via ITSDN
at this time). These networks handle traffic at different
levels of security. In the JTF WAN, data from all three
networks may traverse the same transmission backbone. This
could be accomplished through the use of the Network
Encryption System (NES) inline network encryptor (INE).
Specific security information about the NES is found in
Appendix H. More information about the network may be found
in CJCSM 6231.07A, Chapter VIII.
2. Security Policy Considerations for JTF to IP Network
Connectivity
a. Deployed JTF networks can access strategic IP
networks at the sensitive but unclassified (SBU), SECRET,
and SCI levels using the NIPRNET, SIPRNET, and JWICS
respectively. The connection policies are outlined below.
b. In support of the Defense Information Infrastructure
(DII), DISA is responsible for establishing the NIPRNET and
SIPRNET connection requirements, accreditation procedures,
and the subsequent publication of such policies to the
commands, Services, and Defense agencies. For JWICS, DIA
will provide cognizance over SCI connections on a case-by-
case basis until the process to standardize SCI connectivity
via STEP sites has matured.
3. NIPRNET Policy. The security connection policy for the
NIPRNET is currently under DISA internal review.
4. SIPRNET Policy. For potential SIPRNET subscribers
desiring connectivity, the following interim network
connection requirements must be met before a new connection
is granted. These interim procedures are considered valid
until the overall DII connection requirements are
promulgated by DISA.
a. Contact the SIPRNET Program Office. All CONUS
customers desiring a direct connection to the SIPRNET must
first contact the SIPRNET Program Management office,
DISA/D3113, at COMM (703) 735-3238/8290/8041, or DSN 653-
8290/3238/8041. European customers contact DISA-EUR, at DSN
(314) 430-8457. Pacific customers contact DISA-PAC, at DSN
(315) 456-2858.
b. Prepare System Security Package. For DISA to
approve SIPRNET connectivity, all automated information
systems (AIS) currently connected or desiring connectivity
must submit the following documents to the Defense
Information Systems Agency, Attn: D3113, 11440 Isaac Newton
Square, Reston, VA 22090-5087.
(1) Accreditation Letter. Signed by the cognizant
Designated Approval Authority (DAA) for the network or
system requiring connection to SIPRNET. If the AIS is not
accredited, indicate if system is operating under an interim
approval to operate (IATO). The SIPRNET connection will not
be granted unless accreditation or IATO is provided.
(2) Interim Approval to Operate. If an IATO has
been granted, advise DISA of all significant risks the
system is currently operating under. Significant risks
include lack of identification and proper access controls,
lack of audit function, unprotected connections to other
networks which are not approved to connect to SIPRNET,
unapproved connections to other networks.
(3) AIS Concept of Operations and Security Policy
or Equivalent Documentation. These security documents will
describe how security requirements have been implemented in
the environment. Further, these documents will identify
data types, classification level of date, system owner, and
designated approving authority.
(4) System Connectivity Diagram. This diagram will
identify all AIS connections, both front and backside, to
include any connections to other gateways directly or
indirectly connected to other networks. Diagrams will
include the applicable IP address.
(5) Foreign Connections. The SIPRNET is a SECRET,
SYSTEM HIGH, US ONLY, network. However, connections to
foreign government agencies may exist. All foreign
connections to the SIPRNET and applications to be used must
first be validated by the Joint Staff under the provisions
of CJCSI 6740.01 and CJCSI 6211.02A and approved in
accordance with this policy. All foreign connections will
require the installation of a high assurance guard device or
an end-to-end encryption device. Both types of devices will
be under US control (procured, operated, maintained, and
configured by the US sponsoring activity) and used to
prevent unauthorized or accidental disclosure of classified,
US ONLY information on the SIPRNET.
(6) Acknowledgment of Periodic Monitoring and
Vulnerability Assessments. All connection requests must
provide the following statement: "We acknowledge and
consent to DISA conducting an initial vulnerability
assessment and periodic unannounced vulnerability
assessments on the connected host systems to determine the
security features in place to protect against unauthorized
access or attack."
5. Application of SIPRNET Policy. DISA will review the
above documentation and make a connection approval
determination. The Joint Staff will validate and approve
all foreign connections. After reviewing the documentation
and ensuring initial security concerns are satisfied, DISA
will issue interim approval to connect to the SIPRNET for
180 days in most cases. The final approval will be provided
based on successful completion of a vulnerability assessment
and satisfaction of security documentation. SIPRNET
requests for service and feeder TSRs can be submitted
concurrent with the above documentation; however, connection
activation will not occur until an interim connection
approval is granted in writing.
6. SIPRNET Access Limitations. Failure to comply with
these requirements may result in service disruption. DISA
reserves the right to deny or discontinue SIPRNET access to
any network or system demonstrating behavior that increases
risk to the SIPRNET infrastructure and SIPRNET subscribers.
7. JWICS Policy. At the request of the J-2 DIA, JWICS can
provide JTF components SCI system-high access on a
case-by-case, contingency basis. In general, the following
preplanning considerations and security constraints need to
be addressed prior to a connection request:
a. Preplanning Considerations. Every JTF operation
requires planning for the following two categories of JTF
intelligence communications requirements:
(1) For the exchange of intelligence information
within a deployed JTF (intra-JTF exchanges).
(2) For the exchange of intelligence information
between the deployed JTF and organizations external to the
JTF (external JTF exchanges).
b. Information System and Communication Services
Constraints. In the past, planning support for intelligence
information flows for current or near-term operations has
been constrained by the limited capabilities of existing
intelligence information systems to communicate over data
networks. Therefore, DIA methodology for long-term planning
stresses that all intelligence information systems will be
able to communicate over data networks and that information
requirements can be combined to determine aggregate
requirements. However, current constraints dictate that
intelligence data that supports a JTF will be classified at
the SCI and collateral levels (normally SECRET), with
separate communication networks necessary to support these
different classification levels.
c. Future Options. Packet encryption techniques that
encrypt packets with a security level that is different from
the transporting network may offer a solution. Data with
multiple security levels can then be transported over one
communication system. Several successful initiatives have
demonstrated this capability. DIA methodology is designed
to incorporate such advances as they mature.
d. Current Policy. Until efforts to achieve end-to-end
flows of intelligence information from the national and
theater echelons down to the echelons within the deployed
JTF have matured, the DIA methodology specifies that
intelligence communications requirements will be specified
and implemented separately for each security level.
e. Summary. The DIA connection methodology uses a
framework developed for long-range planning for the
intelligence support area. The key component of the
methodology is a functional model for intelligence that
identifies the intelligence functions required to support
JTF operational requirements and determines the intelligence
information flows that support the functions. Advances in
packet encryption techniques may reduce the current
constraints on the communications planner. Prior to
addressing specific security communications service
constraints, contact the DIA Deputy Directorate for Crisis
Operations (J2O) office at (703) 614-5555 to obtain the
JWICS contingency deployment policy framework document that
outlines the full preplanning methodology.
Transcription and HTML by Cryptome.