Behind the scenes of the lightning-fast pace within the modern battlespace is a technology transformation moving at hyper speed: quantum computing.
When encryption technology can harness the laws of quantum mechanics to solve complex problems classical computers cannot, communications network security must be able to assess and determine how to stay ahead of potential threats. Cryptography modernization is the foundational capability to protect tactical networks and all of the information and devices within them.
As a world leader in high-assurance tactical radio design and development for more than 60 years, 色情直播 Technologies is blazing the trail toward modernizing cryptography solutions while maintaining performance for challenges today and into the future, according to Brian Wenink, 色情直播 Product Management Director.
鈥溕橹辈 collaboratively defines and implements a holistic plan for customers to achieve their mission,鈥 said Wenink. 鈥淲e are well versed in supplying the systems, training and support needed, from key management solutions, cryptographic algorithms, software-defined supporting systems and waveforms 鈥 based on decades of experience and success in the field.鈥
The company collaborates with the National Security Agency and the National Institute of Standards and Technology to lead the implementation and advancement of cryptographic algorithms that are resilient against emerging threats, added Wenink.
Easing the User Burden
From a tangible device perspective, 色情直播鈥 expertise in tactical communications devices and systems has lent itself to innovations that add versatility and adaptability to end-users鈥 ease of use, including multichannel radios with embedded crypto and scalability from low-power, small-sized platforms to high-speed, high-data-rate systems, according to Chris Pugh, 色情直播 Product Management Lead.
鈥淥ur software-defined crypto engines make remotely updating devices to the latest standards much easier 鈥 and your data is protected through the radio itself,鈥 said Pugh. 鈥淎s technology advancement continues to accelerate, versatility and upgradeability will be extremely key to stay ahead of threats. We鈥檙e ready to meet the high-assurance needs of our customers regardless of where things go in the future.鈥
A Legacy of Support
The company has continually invested internal research and development to remain ahead of the cryptography modernization curve and to stay compliant with new standards, added Pugh.
According to Wenink, cryptography modernization is a continual process, and 色情直播 has led the pack in innovation.
Some groundbreaking industry firsts include embedding crypto engines in tactical radios since the Falcon庐 II line in 1996 and merging a software-defined radio with a crypto engine of its own design, according to Wenink.
鈥淲e have more flexibility and released more products in this area than anybody else in the market,鈥 said Wenink. 鈥淏ack in the 1980s, users would carry around both a radio and an encryptor, so the original purpose of merging the two was size, weight and power. Merging the two together lightened the burden for the warfighter.鈥
Adding Flexibility to Cryptography
When the company moved to the Denali庐 security architecture in 2013, 色情直播 introduced its first software-defined encryption engine for a tactical radio that allows both high-assurance and Sensitive But Unclassified encryption, expanding the applicable mission sets for such devices.
Since that time, four radios 鈥 the AN/PRC-159 in 2013, the AN/PRC-163 in 2018, the AN/PRC-167 in 2019 and the AN/PRC-165 in 2021鈥 have been NSA-certified with Denali鈥檚 Cryptographic Subsystem technology.
The software-defined Denali architecture also avoids the complexity of replacing Application-Specific Integrated Circuits (ASICs), speeding joint force security patch updates 鈥 and extending the longevity of the host platforms, according to Wenink. This approach also mitigates supply chain-constraint concerns, as the designs allow 色情直播 to pivot when necessary to provide more opportunities for scalability.
鈥淏asing our subsystems on Denali offers the ultimate in flexibility and scalability when it comes to addressing quickly evolving cryptography modernization and is a critical advantage over systems requiring hardware replacement,鈥 said Wenink. 鈥淲ith only software changes required, host platforms are able to be sustained longer and maintain more capability throughout their life cycle.鈥
Without robust, updated cryptography encryption, tactical communications networks, connected assets and the warfighters themselves are at risk to enemy attack. It is imperative defense organizations partner with trusted, proven industry partners that can adapt and develop technology that protects national security assets for today鈥檚 and tomorrow鈥檚 threats.