Military Embedded Systems

Download the white paper: "Cryptographic Ignition Keys: Implementation Methodology and Guidance"

Eletter Product

Datakey Electronics is the recognized leader in Crypto Ignition Keys (CIKs). CIKs are rugged portable memory devices that serve as a primary way to restrict access to and de-classify equipment, such as inline network encryptors (data-in-transit) and encrypted hard drives (data-at-rest). Historically, CIKs have been used with Type 1 products certified by the National Security Agency (NSA), but have more recently been finding application in other devices utilizing Suite B cryptography.

Datakey Electronics is the recognized leader in Crypto Ignition Keys (CIKs). CIKs are rugged portable memory devices that serve as a primary way to restrict access to and de-classify equipment, such as inline network encryptors (data-in-transit) and encrypted hard drives (data-at-rest). Historically, CIKs have been used with Type 1 products certified by the National Security Agency (NSA), but have more recently been finding application in other devices utilizing Suite B cryptography.

Throughout the years, Datakey Electronics has continuously demonstrated the ability to successfully design and manufacture portable memory systems for CIK applications that work reliably under harsh environmental conditions in tactical settings.

WOULD YOU LIKE TO LEARN MORE ABOUT CIKs?
Download the free, 13-page white paper, titled: Cryptographic Ignition Keys: Implementation Methodology and Guidance.

This white paper explains what a Crypto Ignition Key (CIK) is--discussing the purpose, function and benefits of using a CIK. It also presents implementation and design considerations. Here is a preview from the opening section of the white paper:

As the security design of electronic equipment advances so must the tools of the security designer. The design evolution of the devices we use to protect our valuable information is progressing beyond the use of robust cryptographic algorithms and includes requirements that are covered under the more comprehensive term of "Information Assurance" or IA. Designers can no longer afford to add cryptography to a device as if they were adding icing to a cake. Simply adding a layer of traffic cryptography without managing the risks associated with physical access and the movement of Critical Security Parameters (CSPs) does not constitute a secure implementation.

Having strong data in-flight security without having strong endpoint security is like driving around in an armored car, but always leaving the doors unlocked and the keys in the ignition. You may feel safe while driving around, but anyone with a purpose could easily tamper with the car, steal its contents, make copies of your keys, or be waiting inside when you to return.

This white paper examines a proven physical security and Critical Security Parameter protection scheme often referred to as a Cryptographic Ignition Key or CIK. CIK technology is a tool that allows a device designer to protect the information processed by their device, including both data in flight and data at rest. In a lot of ways a CIK is just like a set of car keys. Lock the doors and take the keys with you and for the most part the car is secure. However, implementing a CIK properly can be more like locking the doors and taking the keys, engine, transmission, and wheels with you.

To review the rest of the contents, please download the white paper.

 

Featured Companies

Datakey

10025 Valley View Road
Eden Praire, Minnesota 55344