expand for answer

Over-the-air rekeying (OTAR)

Changing traffic encryption key or transmission security key in remote cryptoequipment by sending new key directly to the remote cryptoequipment over the communications path it secures.


Similar items:
Procedure by which a distant cryptoequipment is rekeyed electrically, with specific actions required by the receiving terminal operator. Synonymous with cooperative remote rekeying. (Also . See automatic remote keying. )
[view]
An encryption technique that protects entire communications circuits by creating a secure tunnel between two points. This is done by using either a hardware or software solution that encrypts all traffic entering one end of the tunnel and decrypts all traffic exiting the other end of the tunnel. Encryption of information between nodes of a communications system. The application of online cryptooperations to a link of a communications system so that all information passing over the link is encrypted in its entirety.
[view]
A mechanical, electrical, or electronic device that opens or closes circuits, completes or breaks an electrical path, or selects paths or circuits. A switch looks at incoming data to determine the destination address. Based on that address, a transmission path is set up through the switching matrix between the incoming and outgoing physical communications ports and links. A network device that is an intelligent hub because it knows the addresses of the systems connected on each outbound port. Instead of repeating traffic on every outbound port, a switch repeats only traffic out of the port on which the destination is known to exist. Switches offer greater efficiency for traffic delivery, create separate broadcast and collision domains, and improve the overall throughput of data.
[view]
An encryption algorithm that protects communications between two parties (in other words, a client and a server) and is performed independently of link encryption. An example of this would be the use of Privacy Enhanced Mail (PEM) to pass a message between a sender and a receiver. This protects against an intruder who might be monitoring traffic on the secure side of an encrypted link or traffic sent over an unencrypted link.
[view]
Deliberate transmission, retransmission, or alteration of communications to mislead an adversary’s interpretation of the communications. (. See imitative communications deception and manipulative communications deception. )
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in