COMSEC Cryptographic Systems

By U.S. ArmyJune 2, 2016

Communication Security (COMSEC) Cryptographic Systems
(Photo Credit: U.S. Army) VIEW ORIGINAL

Cryptographic Systems procures, tests and fields Communication Security (COMSEC) solutions to secure the Army's information infrastructure against all cyber threats; increase the Soldier's survivability and lethality on the battlefield and enable mission command activities.

Description

The COMSEC Cryptographic Systems Program procures, tests and fields COMSEC solutions to secure the Army's Tactical and Enterprise Networks. New and emerging architectures, cease key dates and DoD/Army policy are all driving the need to replace the current inventory of legacy stovepipe systems with technologically advanced (network centric/Global Information Grid compliant) modern devices that incorporate Chairman of the Joint Chiefs of Staff and Joint Requirements Oversight Council directed cryptographic standardization, advanced key management and network centric performance capabilities. This enables the Army to equip the force with critical crypto solutions and services during peacetime, wartime and contingency operations.

Capabilities

In-Line Network Encryptor Family - Encryption systems provide secure data and voice communications over Internet Protocol (IP) networks.

Link/Trunk Encryptor Family - Encryption systems that provide secure data and voice communication over point-to-point wideband data links.

Secure Voice Family -- Encryption systems that provide secure voice and limited data communication over unsecured IP and public switched telephone networks.

Encryption systems that provide secure data encryption capabilities for data at rest.

Embedded Cryptographic Modernization Initiative -- Retrofit of existing systems with embedded cryptographic capability to insure they will be able to accept and utilize modern keying material.

Commercial Solutions for Classified -- commercially available products that when used together in a layered fashion are approved by NSA for protecting classified information.

Last Updated: February 1, 2016

Related Links:

PMO NET E

Common Hardware Systems

Key Management

MilTech Solutions

Tactical Network Initialization & Configuration

PEO C3T Home