Global Information Lookup Global Information

Controlled Cryptographic Item information


Controlled Cryptographic Item (CCI) is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated cryptographic component or other hardware item which performs a critical communications security (COMSEC) function. Items so designated may be unclassified but are subject to special accounting controls and required markings.

Part of the physical security protection given to COMSEC equipment and material is afforded by its special handling and accounting. CCI equipment must be controlled in a manner that affords protection at least equal to other high value equipment, such as money, computers, and Privacy Act-controlled. There are two separate channels used for the handling of such equipment and materials: "the COMSEC channel" and "the administrative channel." The COMSEC channel, called the COMSEC Material Control System, is used to distribute accountable COMSEC items such as classified and CCI equipment, keying material, and maintenance manuals. Some military departments have been authorized to distribute CCI equipment through their standard logistics system.

The COMSEC channel is composed of a series of COMSEC accounts, each of which has an appointed COMSEC Custodian who is personally responsible and accountable for all COMSEC materials charged to his/her account. The COMSEC Custodian assumes accountability for the equipment or material upon receipt, then controls its dissemination to authorized individuals on job requirements and a need-to-know basis. The administrative channel is used to distribute COMSEC information other than that which is accountable in the COMSEC Material Control System.

Persons with access to COMSEC materials are asked, among other restrictions, to avoid unapproved travel to any countries which are adversaries of the United States, or their establishments or facilities within the U.S.[1]

  1. ^ U.S. DOD Controlled Cryptographic Item Briefing Form DD2625

and 26 Related for: Controlled Cryptographic Item information

Request time (Page generated in 0.8917 seconds.)

Controlled Cryptographic Item

Last Update:

Controlled Cryptographic Item (CCI) is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated...

Word Count : 291

NSA cryptography

Last Update:

endorsed classified or controlled cryptographic item for classified or sensitive U.S. government information, including cryptographic equipment, assembly...

Word Count : 469

Export control

Last Update:

country. These items are considered to be controlled. The export of controlled item is regulated to restrict the harmful use of those items. Many governments...

Word Count : 2097

Export of cryptography from the United States

Last Update:

encryption equipment, TEMPEST-approved electronics, custom cryptographic software, and even cryptographic consulting services still require an export license(pp...

Word Count : 2310

CCI

Last Update:

Interface, part of the Java EE Connector Architecture Controlled Cryptographic Item Copy Control Information The first type of Current conveyor, an electronic...

Word Count : 510

Classified information in the United States

Last Update:

A algorithms categorizes the hardware that store them as a Controlled Cryptographic Item (CCI) under the International Traffic in Arms Regulations, or...

Word Count : 10245

Strong cryptography

Last Update:

Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...

Word Count : 2846

Communications security

Last Update:

communications systems and cryptographic equipment intercepts and the interception and analysis of compromising emanations from cryptographic equipment, information...

Word Count : 1011

VINSON

Last Update:

and tactical phone systems. These terminals are unclassified Controlled Cryptographic Items (CCI) when unkeyed and classified to the keymat of the key when...

Word Count : 176

Cryptography law

Last Update:

cryptography. One particularly important issue has been the export of cryptography and cryptographic software and hardware. Probably because of the importance of...

Word Count : 3045

Index of cryptography articles

Last Update:

Interface • Cryptographic hash function • Cryptographic key types • Cryptographic Message Syntax • Cryptographic primitive • Cryptographic protocol • Cryptographic...

Word Count : 2943

Authentication

Last Update:

and trust is established by known individuals signing each other's cryptographic key for instance. The second type of authentication is comparing the...

Word Count : 3811

Keychain

Last Update:

to which several keys can be attached. The length of a keychain allows an item to be used more easily than if connected directly to a keyring. Some keychains...

Word Count : 1794

Joint Electronics Type Designation System

Last Update:

number and any modification letters indicates an item which directly contains NSA-controlled cryptographic material. For example: AN/PRC-163B(V)2(P)(C) would...

Word Count : 3570

Joint Cipher Bureau

Last Update:

relating to public and private key management. Cryptographic products are export-controlled licensed items, and licenses to India are not generally available...

Word Count : 292

Quantum computing

Last Update:

attacks on cryptographic systems that are currently in use. Integer factorization, which underpins the security of public key cryptographic systems, is...

Word Count : 12491

List of Indian intelligence agencies

Last Update:

relating to public and private key management. Cryptographic products are export-controlled licensed items, and licenses to India are not generally available...

Word Count : 1785

Crypto Wars

Last Update:

encryption equipment, TEMPEST-approved electronics, custom cryptographic software, and even cryptographic consulting services still require an export license...

Word Count : 4062

Colored Coins

Last Update:

based on a cryptographic signature. The contract and any payments linked to it are recorded on the blockchain using a unique cryptographic key that identifies...

Word Count : 4203

Cypherpunk

Last Update:

issues related to cryptography, as well as more practical nuts-and-bolts mathematical, computational, technological, and cryptographic matters. The list...

Word Count : 5252

Coding theory

Last Update:

of coding: Data compression (or source coding) Error control (or channel coding) Cryptographic coding Line coding Data compression attempts to remove...

Word Count : 3546

Random number generation

Last Update:

generator service. Since much cryptography depends on a cryptographically secure random number generator for key and cryptographic nonce generation, if a random...

Word Count : 4335

Token

Last Update:

interaction session Security token or hardware token, authentication token or cryptographic token, a physical device for computer authentication Bearer token, a...

Word Count : 376

Key Management Interoperability Protocol

Last Update:

communication protocol that defines message formats for the manipulation of cryptographic keys on a key management server. This facilitates data encryption by...

Word Count : 1675

Serial number

Last Update:

A serial number is a unique identifier used to uniquely identify an item, and is usually assigned incrementally or sequentially. Despite being called serial...

Word Count : 1061

Reference

Last Update:

to Perceptual Control Theory (PCT), a reference condition is the state toward which a control system's output tends to alter a controlled quantity. The...

Word Count : 1347

PDF Search Engine © AllGlobal.net