Controlled Cryptographic Item (CCI) is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated cryptographic component or other hardware item which performs a critical communications security (COMSEC) function. Items so designated may be unclassified but are subject to special accounting controls and required markings.
Part of the physical security protection given to COMSEC equipment and material is afforded by its special handling and accounting. CCI equipment must be controlled in a manner that affords protection at least equal to other high value equipment, such as money, computers, and Privacy Act-controlled. There are two separate channels used for the handling of such equipment and materials: "the COMSEC channel" and "the administrative channel." The COMSEC channel, called the COMSEC Material Control System, is used to distribute accountable COMSEC items such as classified and CCI equipment, keying material, and maintenance manuals. Some military departments have been authorized to distribute CCI equipment through their standard logistics system.
The COMSEC channel is composed of a series of COMSEC accounts, each of which has an appointed COMSEC Custodian who is personally responsible and accountable for all COMSEC materials charged to his/her account. The COMSEC Custodian assumes accountability for the equipment or material upon receipt, then controls its dissemination to authorized individuals on job requirements and a need-to-know basis. The administrative channel is used to distribute COMSEC information other than that which is accountable in the COMSEC Material Control System.
Persons with access to COMSEC materials are asked, among other restrictions, to avoid unapproved travel to any countries which are adversaries of the United States, or their establishments or facilities within the U.S.[1]
^U.S. DOD Controlled Cryptographic Item Briefing Form DD2625
and 26 Related for: Controlled Cryptographic Item information
ControlledCryptographicItem (CCI) is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated...
endorsed classified or controlledcryptographicitem for classified or sensitive U.S. government information, including cryptographic equipment, assembly...
country. These items are considered to be controlled. The export of controlleditem is regulated to restrict the harmful use of those items. Many governments...
encryption equipment, TEMPEST-approved electronics, custom cryptographic software, and even cryptographic consulting services still require an export license(pp...
Interface, part of the Java EE Connector Architecture ControlledCryptographicItem Copy Control Information The first type of Current conveyor, an electronic...
A algorithms categorizes the hardware that store them as a ControlledCryptographicItem (CCI) under the International Traffic in Arms Regulations, or...
Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
communications systems and cryptographic equipment intercepts and the interception and analysis of compromising emanations from cryptographic equipment, information...
and tactical phone systems. These terminals are unclassified ControlledCryptographicItems (CCI) when unkeyed and classified to the keymat of the key when...
cryptography. One particularly important issue has been the export of cryptography and cryptographic software and hardware. Probably because of the importance of...
and trust is established by known individuals signing each other's cryptographic key for instance. The second type of authentication is comparing the...
to which several keys can be attached. The length of a keychain allows an item to be used more easily than if connected directly to a keyring. Some keychains...
number and any modification letters indicates an item which directly contains NSA-controlledcryptographic material. For example: AN/PRC-163B(V)2(P)(C) would...
relating to public and private key management. Cryptographic products are export-controlled licensed items, and licenses to India are not generally available...
attacks on cryptographic systems that are currently in use. Integer factorization, which underpins the security of public key cryptographic systems, is...
relating to public and private key management. Cryptographic products are export-controlled licensed items, and licenses to India are not generally available...
encryption equipment, TEMPEST-approved electronics, custom cryptographic software, and even cryptographic consulting services still require an export license...
based on a cryptographic signature. The contract and any payments linked to it are recorded on the blockchain using a unique cryptographic key that identifies...
issues related to cryptography, as well as more practical nuts-and-bolts mathematical, computational, technological, and cryptographic matters. The list...
of coding: Data compression (or source coding) Error control (or channel coding) Cryptographic coding Line coding Data compression attempts to remove...
generator service. Since much cryptography depends on a cryptographically secure random number generator for key and cryptographic nonce generation, if a random...
communication protocol that defines message formats for the manipulation of cryptographic keys on a key management server. This facilitates data encryption by...
A serial number is a unique identifier used to uniquely identify an item, and is usually assigned incrementally or sequentially. Despite being called serial...
to Perceptual Control Theory (PCT), a reference condition is the state toward which a control system's output tends to alter a controlled quantity. The...