Lightweight Hardware-Only Protocol Stack providing an EKMS compliant interface from an end cryptographic units (ECU) or information assurance. EKMS Key Fill–DS/DS RF Communications | University Avenue | Rochester, NY USA Specifications. 23 Apr BACKGROUND. The Electronic Key Management System (EKMS) which operates through the use of a Local Management Device/Key.

Author: Arashidal Faushura
Country: France
Language: English (Spanish)
Genre: Science
Published (Last): 1 April 2008
Pages: 345
PDF File Size: 7.26 Mb
ePub File Size: 1.65 Mb
ISBN: 487-5-18264-118-5
Downloads: 15372
Price: Free* [*Free Regsitration Required]
Uploader: Kazrazshura

Key Management Tools

The KP is capable of secure field generation of traditional keys. Locally ekjs keys can be employed in crypto-net communications, transmission security TRANSEC applications, point-to-point circuits, and virtually anywhere that paper-based keys were used. From Wikipedia, the free encyclopedia.

Views Read Edit View history. By using this site, you agree to the Terms of Use and Privacy Policy.

Retrieved from ” https: The most serious, immediate concern was the human threat associated with access to and exploitation of paper key throughout its life cycle. Although eliminating the majority of paper keys will greatly reduce this human threat, the long-term goal of EKMS to minimize human access to keys will not be realized until benign fill key is fully implemented.


March Learn how and when ekns remove this template message.

This article includes a list of referencesbut its sources remain unclear because it has insufficient inline citations. This page was last edited on 27 Julyat Common Tier 1 is based on the U. The common EKMS components and standards facilitate interoperability and commonality among the eks services and civilian agencies. For other uses, see Society of Estonian Literati.

The CMCS was a very labor-intensive operation that had been stretched to capacity.

During the transition to full electronic key, the 3. Additionally, EKMS performs account registration, privilege management, ordering, distribution, and accounting to direct the management and distribution of dkms COMSEC material for the services. The disclosure of the Walker spy ring was clear justification of this concern. Languages Deutsch Edit links.

Articles lacking in-text citations from March All articles lacking in-text citations. Specifically, EKMS generates and distributes electronic key material for all NSA encryption system whose keys are loaded using standard fill devices, and directs the distribution of NSA produced key material.


Benign fill permits the encrypted distribution of electronic keying material directly to the COMSEC device without human access to the key itself.

Electronic Key Management System – Wikipedia

It performs cryptographic functions, including encryption and decryption functions for the account, as well as key generation, and electronic signature operations. Please help to improve this article by introducing more precise citations.

Under EKMS, each service operates its own key management system using EKMS 3308 1 software that supports physical and electronic key distribution, traditional electronic key generation, management of material distribution, ordering, and other related accounting and COR functions.

Author: admin