KY-68
From Wikipedia, the free encyclopedia
The TSEC/KY-68 is a ruggedized telephone terminal with a built-in encryption/decryption module for secure traffic. It can be used in the field. It is a full-duplex voice and data interface terminal that converts voice to digital form, encrypts it and transmits at 16 or 32 kbit/s. The KY-68 can operate via civilian and military switches. Although used primarily for secure communications, the KY-68 can operate with a Digital Non-secure Voice Terminal - a DNVT as its partner. The local switch provides the KY-68 user with a warning tone when communicating with a nonsecure terminal; however, the tone stops as soon as the DNVT user picks up the handset. For data communications, the KY-68 is equipped with a data port for encryption with various data devices.
The key is inserted into the KY-68 using a KYK-13 keying device.
The office version of the KY-68 is the KY-78. It is made from lighter materials, but has the same insides as the KY-68.
The KY-68 and KY-78 are approved at the SECRET level.
The KY-78 was compromised in the early 1990's, but it and the KY-68 are still in use.
[edit] See also
[edit] External links
- Jerry Proc's page on the KY-68
- The Signal Leader's Guide — Field Manual 11-43
Cipher machines
|
---|
Rotor machines: CCM | Enigma | Fialka | Hebern | HX-63 | KL-7 | Lacida | M-325 | Mercury | NEMA | OMI | Portex | SIGABA | SIGCUM | Singlet | Typex |
Mechanical: Bazeries cylinder | C-36 | C-52 | CD-57 | Cipher disk | HC-9 | Kryha | Jefferson disk | M-94 | M-209 | Reihenschieber | Scytale |
Teleprinter: 5-UCO | BID 770 | KW-26 | KW-37 | Lorenz SZ 40/42 | Siemens and Halske T52 |
Secure voice: KY-3 | KY-57 | KY-58 | KY-68 | OMNI | SIGSALY | STE | STU-II | STU-III | VINSON | SCIP | Sectéra Secure Module |
Miscellaneous: Cryptex | JADE | KG-84 | KL-43 | Noreen | PURPLE | Pinwheel | Rockex |
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography |
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers |