| Electronic Key Management System (EKMS) |
| Primary Purpose | Just as CMS replaced the Registered Publications |
| System (RPS) in the 1970s, EKMS will replace CMS |
| as we move into the next century with |
| state-of-the-art technology and key management |
| strategies that will ensure maximum |
| interoperability and security and will meet the |
| challenges of the future. The primary reason for |
| the development of EKMS centers on the security |
| and logistics problems that have plagued the |
| current Communications Security Material Control |
| System (CMCS). The CMCS is a very labor-intensive |
| operation that has been stretched to capacity. |
| The CMCS will not be able to meet increased |
| demands for keying material in a timely, secure |
| manner as we enter the next century. The most |
| serious, immediate concern to be addressed by the |
| EKMS is the human threat associated with access |
| to and exploitation of paper key throughout its |
| life cycle. Although eliminating the majority of |
| paper key will greatly reduce this human threat, |
| the long-term goal of EKMS to minimize human |
| access to key will not be realized until benign |
| fill key is implemented. Benign fill will permit |
| the encrypted distribution of electronic keying |
| material directly to the COMSEC device without |
| human access to the key itself. |
| Sub-Functions | The EKMS is a key management, COMSEC material |
| distribution, and logistics support system |
| consisting of interoperable Service and civil |
| agency key management systems. NSA established |
| the EKMS program to meet multiple objectives, |
| which include supplying electronic key to COMSEC |
| devices in a secure and timely manner and |
| providing COMSEC managers with an automated |
| system capable of ordering, generation, |
| production, distribution, storage, security, |
| accounting, and access control. Other features of |
| EKMS will include automated auditing |
| capabilities to monitor and record |
| security-relevant events, account registration, |
| and extensive system and operator privilege |
| management techniques that will provide flexible |
| access control to sensitive key, data, and |
| functions within the system. The common EKMS |
| components and standards will facilitate |
| interoperability and commonality among the |
| Services. The EKMS is a total COMSEC management |
| system that encompasses all aspects of the Navy's |
| COMSEC key management architecture and meets the |
| following NSA and joint requirements: |
| enhanced security through encrypted electronic |
| key distribution; |
| increased responsiveness to operational |
| requirements; |
| joint interoperability; |
| automation and simplification of COMSEC material |
| control; and |
| elimination of physical key distribution and |
| management of paper products. |
| Equipment Requirements | UNIX-Based PC running Local COMSEC Management Software (LCMS). LCMS allows COMSEC account management functions and controls the cryptographic capabilities of the key processor (KOK-22A), which, among other things, generates electronic keys. |
Connectivity Requirements | Access to commercial/DSN lines and a STU-III are |
required for remote electronic key distribution |
and access to the National Security Agency |
central facility. |
Crypto Requirements | Self-contained. |
Normal Locations | Fielded down to regimental/group locations. |
Information Managed | COMSEC account and electronic key management. |
Products Created | N/A |
Lead Service/Contractor | SPAWARSYSCOM PMW161. |
Current Fielding Status | Fielded throughout the Department of the Navy. |
Known Problems | None |
DIICOE Compliance Rating | N/A |
Point of Contact | Mr. Calvin Curry, EKMS Logistics Manager, SPAWAR |
phone (843) 308-9981; Fax (843) 308-9985; |
Calvin.Curry@GalaxyScientific. |
Updated by | Capt Steven Bowers, USMC, CCSC-01 |
NEWSLETTER
|
Join the GlobalSecurity.org mailing list |
|
|