Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Electronic Key Management System
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Program of US National Security Agency}} {{other uses|Society of Estonian Literati}} The '''Electronic Key Management System''' ('''EKMS''') is a United States [[National Security Agency]] led program responsible for Communications Security ([[COMSEC]]) [[key management]], accounting, and distribution. Specifically, EKMS generates and distributes electronic [[key (cryptography)|key]] material for all [[NSA encryption systems]] whose keys are loaded using standard fill devices, and directs the distribution of [[National Security Agency|NSA]] produced key material. Additionally, EKMS performs account registration, privilege management, ordering, distribution, and accounting to direct the management and distribution of physical COMSEC material for the services. The common EKMS components and standards facilitate interoperability and commonality among the armed services and civilian agencies.<ref>See OTAR</ref><ref>{{Cite web |url=http://findarticles.com/p/articles/mi_m0PAA/is_2_30/ai_n15674490 |title=AKMS update: army key management system|publisher= Army Communicator |date=2005|author= Al Walton |access-date=August 30, 2022 |archive-url=https://web.archive.org/web/20080217010202/http://findarticles.com/p/articles/mi_m0PAA/is_2_30/ai_n15674490 |archive-date=2008-02-17 }}</ref><ref>{{Cite web |last=Editor |first=CSRC Content |title=electronic key management system (EKMS) β Glossary {{!}} CSRC |url=https://csrc.nist.gov/glossary/term/electronic_key_management_system |access-date=2023-07-26 |website=csrc.nist.gov |language=EN-US}}</ref> [[Communications_security#Key_Management_Infrastructure_(KMI)_Program|Key Management Infrastructure (KMI)]] replaces EKMS.<ref>{{cite web|url=https://www.dote.osd.mil/Portals/97/pub/reports/FY2020/dod/2020kmi.pdf |title=FY20 DOD PROGRAMS β Key Management Infrastructure (KMI) | access-date=2023-08-21}}</ref> == Reasons for development == The primary reason for the development of EKMS centers on the security and logistics problems that plagued the COMSEC Material Control System (CMCS),<ref>{{cite web|url=http://apps.dtic.mil/dtic/tr/fulltext/u2/a271771.pdf |archive-url=https://web.archive.org/web/20120916173743/http://www.dtic.mil/dtic/tr/fulltext/u2/a271771.pdf |url-status=live |archive-date=September 16, 2012 |title=The Communications Security Material System |date= |accessdate=2013-08-17}}</ref> which replaced the Registered Publications System (RPS) in the 1970s. The CMCS was a very labor-intensive operation that had been stretched to capacity. The most serious, immediate concern was the human threat associated with access to and exploitation of paper key throughout its life cycle. The disclosure of the [[Walker spy ring]] was clear justification of this concern. Although eliminating the majority of paper keys will greatly reduce this human threat, the long-term goal of EKMS to minimize human access to keys will not be realized until benign fill key is fully implemented. '''Benign fill''' permits the encrypted distribution of electronic keying material directly to the COMSEC device without human access to the key itself. The need for joint interoperability led to the Defense Reorganization Act of 1986, under which the [[Joint Chiefs of Staff]] (JCS) tasked NSA, the Defense Information Systems Agency ([[Defense Information Systems Agency|DISA]]), and the Joint Tactical Command, Control and Communications Agency (JTC3A) to develop a Key Management Goal Architecture (KMGA). Subsequent difficulties in coordinating COMSEC distribution and support during joint military operations, e.g., [[Desert Storm]], [[Invasion of Grenada|Urgent Fury]], and [[Operation Just Cause]], have further emphasized the need for a system capable of interoperability between the Services. == Central facility (Tier 0) == EKMS starts with the '''Central Facility''' (CF), run by NSA, which provides a broad range of capabilities to the Services and other government agencies. The CF, also referred to as Tier 0, is the foundation of EKMS. Traditional paper-based keys, and keys for Secure Telephone Unit β Third Generation ([[STU-III]]), [[Secure Terminal Equipment|STE]], [[FNBDT]], [[Iridium Satellite LLC|Iridium]], Secure Data Network System (SDNS), and other electronic key are managed from an underground building in [[Finksburg, Maryland]] which is capable of the following: * processing orders for both physical and electronic keys * electronically generating and distributing keys * generating key material for '''[[FIREFLY]]''' (an NSA algorithm) * performing seed conversion and rekey * maintaining compromise recovery and management of FIREFLY material * support for over-the-air rekeying (OTAR) The CF talks to other EKMS elements through a variety of media, communication devices, and networks, either through direct distance dialing using [[STU-III]] (data mode) or dedicated link access using [[KG-84]] devices. During the transition to full electronic key, the 3.5-inch floppy disk and 9-track magnetic tape are also supported. A common user interface, the [[TCP/IP]]-based message service, is the primary method of communication with the CF. The message service permits EKMS elements to store EKMS messages that include electronic key for later retrieval by another EKMS element. == Tier 1 == Under CMCS, each service maintained a central office of record (COR) that performed basic key and COMSEC management functions, such as key ordering, distribution, inventory control, etc. Under EKMS, each service operates its own key management system using EKMS Tier 1 software that supports physical and electronic key distribution, traditional electronic key generation, management of material distribution, ordering, and other related accounting and COR functions. Common Tier 1 is based on the [[U.S. Navy]]'s key distribution system (NKDS) software developed by the [[Naval Research Laboratory]] and further developed by [[Science Applications International Corporation|SAIC]] in San Diego. == Tier 2 == [[Image:LMD-KP.nsa-cf.jpg|thumb|KP and LMD]] EKMS '''Tier 2''', the '''Local Management Device''' (LMD), is composed of a commercial off-the-shelf (COTS) [[personal computer]] (PC) running the [[Santa Cruz Operation]]'s SCO [[Unix|UNIX]] operating system, and an NSA KOK-22A '''Key Processor (KP)'''. The KP is a [[trusted system|trusted]] component of EKMS. It performs cryptographic functions, including [[encryption]] and decryption functions for the account, as well as key generation, and electronic signature operations. The KP is capable of secure field generation of traditional keys. Locally generated keys can be employed in crypto-net communications, transmission security (TRANSEC) applications, point-to-point circuits, and virtually anywhere that paper-based keys were used. Electronic keys can be downloaded directly to a [[fill device]], such as the [[KYK-13]], KYX-15, or the more modern [[AN/CYZ-10]] Data Transfer Device (DTD) for further transfer (or '''fill''') into the end cryptographic unit. == Tier 3 == The lowest tier or layer of the EKMS architecture which includes the AN/CYZ-10 (Data Transfer Device (DTD)), the SKL (Simple Key Loader) [[AN/PYQ-10]], and all other means used to fill keys to End Cryptographic Units (ECUs); hard copy material holdings only; and STU-III/STE material only using Key Management Entities (KMEs) (i.e., Local Elements (LEs)). Unlike LMD/KP Tier 2 accounts, Tier 3 using entities never receive electronic key directly from a COR or Tier 0. == References == <references /> == External links == * [https://www.iad.gov/KeySupport/ Central Facility web site] * [https://web.archive.org/web/20120926071443/http://www.dtic.mil/cjcs_directives/cdata/unlimit/m652001.pdf Link 16 Joint Key Management Plan, CJCSM 6520.01A, 2011] * [http://cryptome.org/jya/AKAPBEDF.htm Marine Corps Order 2201.1 concerning UMSC COMSEC] [[Category:National Security Agency]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Cite web
(
edit
)
Template:Other uses
(
edit
)
Template:Short description
(
edit
)