Ekms 1 Manual

Posted on
Ekms 1 Manual Rating: 4,4/5 2402 votes
Ekms 1 Manual

From the legacy Electronic Key Management System (EKMS). Enhancements to the Spiral 1 baseline. Key Management Infrastructure. Manual KG-250 and virtual private. Department of the Navy Information Security Program Published By Chief of Naval Operations. This policy manual establishes the Department of the Navy. EKMS 1 MANUAL ekms 5 i record of amendments amend number identification date entered yymmdd entered by signature rankrate command title table of.

This article includes a, but its sources remain unclear because it has insufficient. Please help to this article by more precise citations. (March 2009) The Electronic Key Management System ( EKMS) system is a United States led program responsible for Communications Security , accounting, and distribution.

Specifically, EKMS generates and distributes electronic material for all whose keys are loaded using standard fill devices, and directs the distribution of NSA produced key material. Additionally, EKMS performs account registration, privilege management, ordering, distribution, and accounting to direct the management and distribution of physical COMSEC material for the services. The common EKMS components and standards facilitate interoperability and commonality among the armed services and civilian agencies. Contents. Reasons for development The primary reason for the development of EKMS centers on the security and logistics problems that plagued the COMSEC Material Control System (CMCS), which replaced the Registered Publications System (RPS) in the 1970s. The CMCS was a very labor-intensive operation that had been stretched to capacity.

The most serious, immediate concern was the human threat associated with access to and exploitation of paper key throughout its life cycle. The disclosure of the was clear justification of this concern. Although eliminating the majority of paper keys will greatly reduce this human threat, the long-term goal of EKMS to minimize human access to keys will not be realized until benign fill key is fully implemented. Benign fill permits the encrypted distribution of electronic keying material directly to the COMSEC device without human access to the key itself. The need for joint interoperability led to the Defense Reorganization Act of 1986, under which the (JCS) tasked NSA, the Defense Information Systems Agency , and the Joint Tactical Command, Control and Communications Agency (JTC3A) to develop a Key Management Goal Architecture (KMGA).

Subsequent difficulties in coordinating COMSEC distribution and support during joint military operations, e.g., and, have further emphasized the need for a system capable of interoperability between the Services. Central facility (Tier 0) EKMS starts with the Central Facility (CF), run by NSA, which provides a broad range of capabilities to the Services and other government agencies. The CF, also referred to as Tier 0, is the foundation of EKMS. KP and LMD EKMS Tier 2, the Local Management Device (LMD), is composed of a commercial off-the-shelf (COTS) (PC) running the 's SCO operating system, and an NSA KOK-22A Key Processor (KP). The KP is a component of EKMS. It performs cryptographic functions, including and decryption functions for the account, as well as key generation, and electronic signature operations. The KP is capable of secure field generation of traditional keys.

Locally generated keys can be employed in crypto-net communications, transmission security (TRANSEC) applications, point-to-point circuits, and virtually anywhere that paper-based keys were used. Electronic keys can be downloaded directly to a, such as the, KYX-15, or the more modern Data Transfer Device (DTD) for further transfer (or fill) into the end cryptographic unit. Tier 3 The lowest tier or layer of the EKMS architecture which includes the AN/CYZ-10 (Data Transfer Device (DTD)), the SKL (Simple Key Loader), and all other means used to fill keys to End Cryptographic Units (ECUs); hard copy material holdings only; and STU-III/STE material only using Key Management Entities (KMEs) (i.e., Local Elements (LEs)). Unlike LMD/KP Tier 2 accounts, Tier 3 using entities never receive electronic key directly from a COR or Tier 0. References.

Ekms 1 (series) Manual

EkmsEkms 1 (series) manual

Administers the DON COMSEC program and is the Service Authority for DON.Maintain the central office of record, ensuring the proper storage, distribution, inventory, accounting, and overall safeguarding of COMSEC materials for the Navy, Marine Corps, Coast Guard, Military Sealift Command, and joint and allied commands as required.draft and publish COMSEC policy directives, standards, and procedures pertaining to COMSEC material security, distribution, training, handling, and accounting within the DON.