Crypto / COMSEC – Core Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/68

flashcard set

Earn XP

Description and Tags

These flashcards present essential COMSEC, cryptographic, and physical-security vocabulary needed to understand Block 8 Unit 3 material and prepare for the quiz.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

69 Terms

1
New cards

Communication Security (COMSEC)

Measures and controls taken to deny unauthorized access to national-security information and to ensure its authenticity.

2
New cards

National Security Agency (NSA)

U.S. Intelligence agency that approves all cryptographic systems for classified DoD use and manages SIGINT and IA missions.

3
New cards

Central Security Service (CSS)

Military component within NSA that coordinates cryptologic support to U.S. Armed Forces.

4
New cards

National Institute of Standards and Technology (NIST)

Non-regulatory agency that sets standards, including cryptographic techniques for protecting UNCLASSIFIED sensitive information.

5
New cards

Cryptographic Security (CRYPTOSEC)

COMSEC component that provides technically sound cryptographic systems and their proper use.

6
New cards

Transmission Security (TRANSEC)

COMSEC component that applies controls to prevent interception or exploitation of transmissions by means other than cryptanalysis.

7
New cards

TEMPEST

Study and control of unintentional compromising emanations from information-processing equipment.

8
New cards

RED/BLACK Separation

Design practice that physically and electrically isolates plaintext (RED) circuits from ciphertext or unclassified (BLACK) circuits.

9
New cards

Physical Security (COMSEC)

Physical measures used to safeguard COMSEC materials from unauthorized access.

10
New cards

Cryptanalysis

The science of breaking codes or ciphers without prior knowledge of the key.

11
New cards

Encryption

Conversion of plaintext into ciphertext to conceal meaning.

12
New cards

Decryption

Process of converting ciphertext back into plaintext using a key and algorithm.

13
New cards

Algorithm

Precisely defined mathematical procedure used in cryptography to encrypt or decrypt data.

14
New cards

Cryptographic (Crypto) Key

Numeric value that controls the operation of a cryptographic algorithm; also called key variable.

15
New cards

Vulnerability

Weakness that could be exploited by a threat to adversely affect an information system.

16
New cards

Threat

Any circumstance with potential to exploit a vulnerability and negatively impact operations or assets.

17
New cards

Need-to-Know

Authorized holder’s decision that a person requires access to information to perform official duties.

18
New cards

Security Clearance

Formal determination that an individual may access a specific level of classified information.

19
New cards

Controlled Area

Facility requiring limited entry to protect military resources from theft, compromise, or destruction.

20
New cards

Restricted Area

Area under military control employing special security measures to prevent unauthorized entry; often guards may use lethal force.

21
New cards

Sensitive Compartmented Information Facility (SCIF)

Restricted area where SCI may be stored, discussed, or processed with enhanced physical and technical protections.

22
New cards

GSA-Approved Class 5 Container

Safe certified for TOP SECRET storage; requires dual-combination lock and continuous guard or alarm.

23
New cards

Class A / Class B Vault

Hardened structures for storing TOP SECRET (Class A) or SECRET (Class B) materials.

24
New cards

Two-Person Integrity (TPI)

Requirement that two authorized individuals jointly handle TOP SECRET COMSEC material to prevent single-person access.

25
New cards

Controlled Cryptographic Item (CCI)

Unclassified but sensitive equipment containing or able to contain a classified cryptographic key.

26
New cards

Key Management Infrastructure Operating Account Manager (KOAM)

Wing-level manager responsible for operation and accountability of a COMSEC account.

27
New cards

COMSEC Responsible Officer (CRO)

Unit-level official who administers physical security and accountability for COMSEC sub-accounts.

28
New cards

COMSEC Authorized User

Individual trained, cleared, and with need-to-know who uses COMSEC materials and must safeguard them.

29
New cards

Standard Form 702

Security Container Check Sheet documenting opening, closing, and checks of safes or vaults.

30
New cards

Standard Form 701

Activity Security Checklist used to record end-of-day security checks.

31
New cards

AF Form 1109

Visitor Register Log for recording escorted visitors not on the access list.

32
New cards

AFCOMSEC Form 16

Inventory checklist used for daily or shift COMSEC material inventories.

33
New cards

Standard Form 153

COMSEC Material Report for transfers, destructions, inventories, or hand receipts.

34
New cards

Accounting Legend Code (ALC)

Code (e.g., ALC-1, 2, 4, 6) defining the required level and frequency of COMSEC accountability.

35
New cards

Routine Destruction

Normal disposal of superseded or obsolete COMSEC material using approved methods like burning or cross-cut shredding.

36
New cards

Precautionary Destruction

Pre-planned destruction when enemy attack is probable to prevent compromise.

37
New cards

Emergency Destruction

Rapid destruction during imminent capture or hostile action when time is limited.

38
New cards

Emergency Action Plan (EAP)

Locally developed task-card plan outlining protection or destruction of COMSEC during emergencies.

39
New cards

Compromising Emanations (CE)

Unintentional intelligence-bearing signals that may disclose information if intercepted and analyzed.

40
New cards

Common Fill Device (CFD)

Portable device used to receive, store, and load cryptographic keys into end equipment.

41
New cards

AN/PYQ-10 Simple Key Loader (SKL)

Ruggedized handheld CFD capable of storing up to 500,000 keys; classification equals highest key loaded.

42
New cards

Serial Encryption Device

Encryptor operating on serial links at OSI Layer 2; e.g., KIV-7M.

43
New cards

KIV-7M

Type 1 link encryptor with two channels; stores up to 10 TEKs and interoperates with many legacy devices.

44
New cards

IP Encryption Device (INE)

Encryptor operating at OSI Layer 3 to secure IP traffic; e.g., TACLANE family.

45
New cards

TACLANE-Micro KG-175D

Rugged Type 1 IP encryptor/router certified for TS/SCI and below; supports copper and fiber interfaces.

46
New cards

Peer Enclave Route

Static routing entry in a TACLANE pointing directly to another TACLANE’s protected network.

47
New cards

Gateway of Last Resort (TACLANE)

Fallback TACLANE route used when no peer enclave path exists to the destination network.

48
New cards

Over-the-Air Rekeying (OTAR)

Secure remote update or distribution of cryptographic keys via electronic transmission.

49
New cards

Manual Rekey (MK)

Point-to-point OTAR method where master station pushes a key directly into a single remote device.

50
New cards

Automatic Rekey (AK)

Point-to-multipoint OTAR allowing a master station to update many subscribers simultaneously.

51
New cards

Manual Cooperative Key Transfer (MK/RV)

Point-to-point OTAR that moves keys between two fill devices for future loading.

52
New cards

Traffic Encryption Key (TEK)

Key used to encrypt operational user data passing through an encryptor.

53
New cards

Key Encryption Key (KEK)

Key used to encrypt or decrypt other keys during distribution (e.g., OTAR).

54
New cards

Pre-Placed Key (PPK)

Symmetric keying material installed in equipment ahead of time, often for extended periods.

55
New cards

Firefly Vector Set (FFVS)

NSA asymmetric keying scheme based on Diffie-Hellman for exchanging key pairs between INEs.

56
New cards

Diffie-Hellman Key Exchange

Public-key protocol enabling two parties to create a shared secret over an insecure channel.

57
New cards

Symmetric (Secret-Key) Cryptography

Encryption where the same key is used for both encryption and decryption.

58
New cards

Block Cipher

Symmetric algorithm that encrypts fixed-size blocks of data (e.g., 64 or 128 bits).

59
New cards

Stream Cipher

Symmetric algorithm that encrypts data one bit or byte at a time in a continuous stream.

60
New cards

Data Encryption Standard (DES)

Original 56-bit block cipher now considered insecure for classified use.

61
New cards

Triple DES (3DES)

Block cipher applying DES three times with three keys for improved security.

62
New cards

Advanced Encryption Standard (AES)

Current NIST standard block cipher using 128-, 192-, or 256-bit keys; required for classified data.

63
New cards

One-Time Pad

Perfect-secrecy stream cipher using a truly random key equal in length to the message and used only once.

64
New cards

RC4

Widely used software stream cipher implemented in protocols like SSL (now largely deprecated).

65
New cards

Asymmetric (Public-Key) Cryptography

System using mathematically related public and private keys; data encrypted with one can be decrypted with the other.

66
New cards

Public Key Infrastructure (PKI)

Framework that binds public keys to identities and manages keys throughout their life cycle.

67
New cards

Digital Signature

Cryptographic value created with a private key to prove data origin and integrity; verified with the corresponding public key.

68
New cards

Common Access Card (CAC)

DoD smartcard providing two-factor authentication, digital signatures, and encryption certificates.

69
New cards

Cryptographic Modernization Initiative

DoD effort to replace or upgrade legacy cryptographic devices to modern standards such as KIV-7M and TACLANE.