CipherONE: Optimized Network Encryption

CipherONE® Optimized Network Encryption

With more than 55 years dedicated to designing, manufacturing, marketing and supporting military-grade secure communications solutions, Technical Communications Corporation is an expert in protecting highly sensitive information transmitted over a broad range of networks.

Our solutions meet TCC's CipherONE Optimized Network Encryption best-in-class criteria for confidentiality, data integrity, authenticity and non-repudiation. CipherONE solutions offer maximum cryptographic strength and are optimized for performance and ease of use for our customers.

Whether voice, data, fax or video over landline, cellular, radio, microwave, satellite, fiber optic or other media, TCC's solutions deliver true, continuous end-to-end secure communications that seamlessly integrate into existing communications networks and are easy to install, operate and maintain. Government entities, military agencies and corporate enterprises in 115 countries have selected TCC's secure communications to protect their mission-critical information.

Cryptographic Strength

Multiple layers of security are designed into TCC's solutions. Our products are designed to government and industry security standards such as Suite B (e.g., SHA-256 authentication, AES 256-bit algorithm), and FIPS 140-2 Level 3. TCC also offers both proprietary algorithms and development or integration of national algorithms.

Key management is a vital part of an encryption solution. TCC's public negotiated and secret distributed key management solutions are designed to be unnoticeable to the user and built to maintain the security of the cryptographic keys at every point in their life cycle—from key generation, through key use and key destruction.

TCC's secret key systems include: random key generation, automatic (timed or event-based) key changes, anti-tamper devices and security vaults, encrypted SmartModule key fill/load devices, keying indices (vs. transmitting the key), encrypted Simple Network Management Protocol (SNMP) with TCC Management Information Base (MIB) extensions for online key transporting, central key and device management, and more.

Additionally, our secure radio and telephone encryption systems for secure voice use a large number of operational keys that are securely stored within each encryption device. Large numbers of keys allow more frequent key changes to reduce the risk of cryptographic exposure. The use of dual keybanks enables key refreshes without interfering with the current key set in use.

Key Management Systems


TCC's online KEYNET key and device management systems enable automatic key management, configuration, monitoring, and maintenance of global networks of Cipher X® IP (Internet Protocol) encryption and frame relay encryptors, and DSD 72B-SP and DSD 72A-SP (STM) optical data SONET/SDH encryption units from one or more locations.

Our offline Crypto Management System generates and distributes all the configuration data, interface parameters, and cryptographic keying materials for an unlimited number of our CSD 3324 SE secure telephones, the DSP 9000 secure radio encryption family and HSE 6000 headset secure radio encryption.

Other products offer comprehensive key management using public key or public and secret key combinations along with other security measures as appropriate such as authentication and hardened operating environments.

 

Performance

In addition to offering superior-grade secure voice and secure data communications, TCC's solutions are designed for high performance over a variety of communications mediums in a wide range of environmental conditions. TCC offers ruggedized solutions meeting demanding MIL-STD environmental specifications as well as products for industrial and corporate enterprise applications.

Our cryptographic technology ensures dependable secure communications with crypto-synchronization techniques developed to maintain connections in high error and jamming environments such as tactical radio relay, missile systems and microwave backbone systems deployed around the world. Additionally, our voice ciphering technology provides end-to-end secure communications for ground, naval and air forces over a vast number of HF, VHF, UHF radio communications systems and telephone command networks, while maintaining excellent voice quality—even in the harshest field and network environments, and with degraded line conditions.

A network of DSD 72B-SP optical SONET/SDH data encryptors, and Cipher X IP and frame relay encryptors are examples of our many protocol sensitive encryption products and designed to be seamlessly overlaid on existing data networks. As a result, performance impact is negligible and no network modification is required.

Additionally, our Cipher X encrytion family offers unprecedented value to customers by providing configurable performance in a single hardware platform. At any time in the deployment life of the encryptor, incremental updates can be added to meet emerging network speed and data throughput requirements via downloadable firmware upgrades to targeted units in the field.

With a commitment to excellence, TCC has been ISO 9001 certified since 1995. ISO 9001:2008, granted to TCC by TUV (the Technical Inspection Association of Germany), is the most stringent standard available for total quality systems in design/development, production, installation and servicing.

 

Ease of Use

The most secure solutions are those that are easily installed, configured and used. All of TCC's products are designed for ease of use and automation, and to be used in existing voice and data communications environments. Additionally, our online KEYNET key and device management systems centrally and automatically monitor, manage and maintain secure networks, while supporting existing security and network policies. With KEYNET's alerts, polls, logs and intuitive user-friendly application, a network manager can easily remotely manage a global network secured with TCC encryption.

Dedicated to full service, TCC's Systems Engineering and Customer Support groups assist with equipment installations, perform tests in the field and work with our customers to achieve 100 percent satisfaction. TCC products are also built to last decades and are logistically supported throughout their entire life cycle. The combination of built-in diagnostics software and on-site service promote continuous network up-time. This, combined with personalized on-site user and field-service training, ensures reliable operation and communications protection.

Mission-Critical Secure Communications

From our strong encryption algorithms, advanced key and device management, and multiple layers of security, to our many data and voice ciphering innovations, custom solutions and life cycle support, you can be assured that your TCC CipherONE Optimized Network Encryption solution will provide the cryptographic strength, performance and ease of use needed for absolute communications security.

Back to Top

Cipher One

CipherONE® Optimized Network Encryption

Our solutions meet TCC's CipherONE Optimized Network Encryption best-in-class criteria for maximum cryptographic strength, and are optimized for performance and ease of use for our customers.

Read More