Crypto / COMSEC – Block 8 Unit 3 Vocabulary Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/64

flashcard set

Earn XP

Description and Tags

Comprehensive vocabulary flashcards covering key COMSEC concepts, roles, forms, cryptographic principles, devices and security measures from Block 8 Unit 3.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

65 Terms

1
New cards

Communication Security (COMSEC)

Measures and controls used to deny unauthorized access to national-security information and ensure its authenticity.

2
New cards

Cryptographic Security (CRYPTOSEC)

COMSEC component that provides technically sound cryptographic systems and their proper use to protect information.

3
New cards

Transmission Security (TRANSEC)

COMSEC component applying measures to transmissions to prevent interception or exploitation by means other than cryptanalysis.

4
New cards

TEMPEST / Emission Security (EMSEC)

Investigation, study and control of unintentional compromising emanations from telecom and information-systems equipment.

5
New cards

Physical Security (COMSEC context)

Physical measures, policies and procedures that safeguard COMSEC materials from natural hazards and unauthorized intrusion.

6
New cards

National Security Agency (NSA)

U.S. Intelligence Community member that approves all cryptographic systems protecting classified information and manages SIGINT & IA.

7
New cards

Central Security Service (CSS)

NSA component that coordinates cryptologic support and policy for U.S. military Service Cryptologic Components.

8
New cards

National Institute of Standards and Technology (NIST)

Non-regulatory agency that approves cryptographic techniques for UNCLASSIFIED sensitive information (e.g., CUI).

9
New cards

Cryptography

Science of converting plaintext to ciphertext and back using an algorithm and crypto-key.

10
New cards

Encryption

Cryptographic transformation of plaintext into ciphertext to conceal meaning.

11
New cards

Decryption

Process of converting ciphertext back into plaintext using an algorithm and key.

12
New cards

Algorithm

Clearly specified mathematical process that performs encryption or decryption.

13
New cards

Crypto-Key / Key Variable

Numeric value used with an algorithm; determines its operation (e.g., computes or verifies a digital signature).

14
New cards

Vulnerability

Weakness that could be exploited by a threat source to adversely affect an information system.

15
New cards

Threat

Circumstance or event with potential to adversely impact operations or assets via unauthorized access or damage.

16
New cards

Symmetric (Secret-Key) Cryptography

Encryption system that uses the same key for both encryption and decryption.

17
New cards

Block Cipher

Symmetric algorithm that encrypts fixed-size blocks of data (e.g., 64- or 128-bit).

18
New cards

Stream Cipher

Symmetric algorithm that encrypts data one bit/byte at a time in a continuous stream.

19
New cards

Data Encryption Standard (DES)

Legacy 56-bit block cipher; now considered insecure for classified use.

20
New cards

Triple DES (3DES)

Block cipher applying DES three times with three keys to increase security.

21
New cards

Advanced Encryption Standard (AES)

Current NIST-selected block cipher (Rijndael) supporting 128-, 192-, and 256-bit keys; required for classified data.

22
New cards

Asymmetric (Public-Key) Cryptography

System using mathematically related public and private keys; supports authentication, integrity and key exchange.

23
New cards

Public Key Infrastructure (PKI)

Framework that binds public keys to entities and manages keys/certificates across distributed systems.

24
New cards

Digital Signature

Electronic signature created with a sender’s private key; verifies origin, integrity and non-repudiation.

25
New cards

Common Access Card (CAC)

DoD smartcard providing two-factor authentication, digital signature and encryption certificates.

26
New cards

Common Fill Device (CFD)

Portable unit that receives, stores and transfers key variables to cryptographic equipment.

27
New cards

AN/PYQ-10 Simple Key Loader (SKL)

Hand-held NSA-approved CFD that can store up to 500,000 keys; classified up to TS when loaded.

28
New cards

Serial Encryption Device

Link encryptor operating at OSI Layer 2 for point-to-point or multipoint serial connections.

29
New cards

KIV-7M

Programmable Type-1 serial link encryptor with two independent channels; stores up to 10 TEKs.

30
New cards

IP Encryption Device (INE)

Type-1 encryptor operating at OSI Layer 3, protecting IP data-in-transit over networks.

31
New cards

KG-175D TACLANE-Micro

Ruggedized Type-1 in-line network encryptor certified TS/SCI and below; offers basic routing and optical/copper interfaces.

32
New cards

Traffic Encryption Key (TEK)

Key that encrypts user data traffic within a cryptographic device.

33
New cards

Key Encryption Key (KEK)

Key used to encrypt or decrypt other keys during distribution (e.g., OTAR).

34
New cards

Over-The-Air Rekeying (OTAR)

Secure remote distribution or update of keys via communications links.

35
New cards

Manual Rekey (MK)

Point-to-point OTAR method where a master station sends and installs a new key.

36
New cards

Automatic Rekey (AK)

Point-to-multipoint OTAR method used by a master station to update multiple subscribers.

37
New cards

Manual Cooperative Key Transfer (MK/RV)

OTAR method sending keys CFD-to-CFD for future storage at remote sites.

38
New cards

Pre-Placed Key (PPK)

Symmetric keys positioned in equipment in advance, often for long-term (e.g., one-year) use.

39
New cards

Firefly Vector Set (FFVS)

NSA Diffie-Hellman-based scheme for generating cooperative public-key pairs and shared TEKs.

40
New cards

Red/Black Concept

Engineering practice separating plaintext (RED) circuits from ciphertext/unclassified (BLACK) circuits to reduce compromising emanations.

41
New cards

Compromising Emanations (CE)

Unintentional intelligence-bearing signals that could disclose processed information if intercepted.

42
New cards

Two-Person Integrity (TPI)

Storage/handling system requiring two authorized individuals to prevent solitary access to TS key material.

43
New cards

Controlled Cryptographic Item (CCI)

Unclassified but sensitive crypto equipment; keyed CCI assumes classification of loaded key.

44
New cards

Key Management Infrastructure Operating Account Manager (KOAM)

Wing-level manager responsible for all KMI key distribution, accountability and COMSEC training.

45
New cards

COMSEC Responsible Officer (CRO)

Unit-level individual administering physical security and user training for a COMSEC sub-account.

46
New cards

COMSEC Authorized User

Person trained, cleared and designated to use COMSEC materials and equipment unescorted.

47
New cards

Controlled Area

Facility where entry is limited to protect resources vulnerable to theft, compromise or destruction.

48
New cards

Restricted Area

Military area employing special security measures; unauthorized entry may be met with lethal force.

49
New cards

Sensitive Compartmented Information Facility (SCIF)

Restricted area accredited for storing and processing SCI under stringent physical and technical controls.

50
New cards

Standard Form 702 (SF 702)

Security Container Check Sheet affixed to safes/vaults to record opening, closing and checks.

51
New cards

Standard Form 701 (SF 701)

Activity Security Checklist used to record end-of-day security checks of areas holding classified info.

52
New cards

Standard Form 153 (SF 153)

COMSEC Material Report documenting inventory, transfer, destruction or hand-receipt of COMSEC items.

53
New cards

AFCOMSEC Form 16

Inventory checklist used for daily/shift inventories of COMSEC material in each container.

54
New cards

AF Form 1109

Visitor Register Log for recording escorted visitors not on the access list.

55
New cards

Accounting Legend Code (ALC)-1

COMSEC items requiring continuous cradle-to-grave accountability; daily inventory by short title, edition, reg #, quantity.

56
New cards

Accounting Legend Code (ALC)-2

Cryptographic equipment inventoried by short title and quantity; continuous accountability required.

57
New cards

Accounting Legend Code (ALC)-4

Publications with limited accountability; inventory only when directed by COMSEC manager.

58
New cards

Accounting Legend Code (ALC)-6

Category reserved for electronic (modernized) keys.

59
New cards

Routine Destruction

Normal disposal of superseded or obsolete COMSEC material using approved methods (burn, crosscut shred, pulp).

60
New cards

Precautionary Destruction

Pre-emptive destruction when enemy attack is probable and compromise imminent.

61
New cards

Emergency Destruction

Rapid destruction of COMSEC material when capture or compromise is unavoidable.

62
New cards

Emergency Action Plan (EAP)

Task-card plan outlining steps to protect or destroy COMSEC material during emergencies.

63
New cards

Controlled Access Requirements

Need-to-know, proper security clearance and positive identification—all required for unescorted COMSEC access.

64
New cards

Lock Combination Classification

Combination is classified equal to highest material in container and changed bi-annually or upon compromise.

65
New cards

Cryptanalysis

Science of defeating cryptographic systems to reveal plaintext without prior knowledge of the key.