CONDOR secure cell phone
Qualcomm built several prototype secure CDMA phones for NSA under a contract project called "Condor". The NSA insisted on hardware encryption, which Qualcomm originally implemented using Fortezza PC c...
KL-43
The KL-43 is a portable, electronic cipher device used by the United States and the NATO from the early 1980s. The machine, manufactured by TRW, is an adaptation of language translator technology, and...
KL-43 - Wikipedia
TACLANE
A TACLANE (short for "Tactical FASTLANE" or Tactical Local Area Network Encryption) is a family of Inline Network Encryptors (INE) developed and manufactured by General Dynamics C4 Systems to meet the...
FASCINATOR
FASCINATOR is a series of Type 1 encryption modules designed in the late-1980s to be installed in Motorola digital-capable voice radios. These radios were originally built to accept a DES-based encry...
SINCGARS
Single Channel Ground and Airborne Radio System (SINCGARS) is a Combat Net Radio (CNR) currently used by U.S. and allied military forces. The radios, which handle voice and data communications, are de...
SINCGARS - Wikipedia
AN/PYQ-10
The AN/PYQ-10 Simple Key Loader (SKL) is a ruggedized, portable, hand-held fill device, for securely receiving, storing, and transferring data between compatible cryptographic and communications equip...
AN/PYQ-10 - Wikipedia
KG-84
The KG-84A and KG-84C are encryption devices developed by the U.S. National Security Agency (NSA) to ensure secure transmission of digital data. The KG-84C is a Dedicated Loop Encryption Device (DLED)...
KG-84 - Wikipedia
Clipper chip
The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device, with a built-in backdoor, intended to be adopted by telecomm...
Clipper chip - Wikipedia
KY-57
The Speech Security Equipment (VINSON), TSEC/KY-57, is a portable, tactical cryptographic device in the VINSON family, designed to provide voice encryption for a range of military communication devic...
Type 2 product
In cryptography, Type 2 products are unclassified cryptographic equipment, assemblies, or components, endorsed by the National Security Agency (NSA), for use in telecommunications and automated inform...
STU-I
The STU-I, like its successors sometimes known as a "stew phone", was a secure telephone developed by the U.S. National Security Agency for use by senior U.S. government officials in the 1970s.
STU-I - Wikipedia
KOI-18
The KOI-18 is a hand-held paper tape reader developed by the U.S. National Security Agency as a fill device for loading cryptographic keys, or "crypto variables," into security devices, such as encry...
KOI-18 - Wikipedia
KY-3
The KY-3 (TSEC/KY-3) is a secure telephone system developed by the U.S. National Security Agency in the early 1960s. The "TSEC" prefix to the model number indicates NSA's Telecommunications Security n...
KY-3 - Wikipedia
Fortezza
Fortezza is an information security system that implements NIST/NSA cryptographic algorithms. A Fortezza Crypto Card is a PC Card based security token. Each individual who is authorized to see protect...
Fortezza - Wikipedia
KOV-14
The KOV-14 Fortezza Plus is a US National Security Agency-approved PC card which provides encryption functions and key storage to the Secure Terminal Equipment and other devices. It is a tamper-resis...
Secure DTD2000 System
The KIK-20 Secure DTD2000 System (SDS) is a key fill device developed by Sypris Electronics, Florida, US, under the auspices of the U.S. National Security Agency. It, along with the AN/PYQ-10, is inte...
Secure DTD2000 System - Wikipedia
KOV-21
The KOV-21 is a cryptographic PC card module developed under the auspices of the U.S. National Security Agency and manufactured by Sypris Electronics LLC. It is intended to be the cryptographic engine...
KYK-13
The KYK-13 Electronic Transfer Device is a common fill device designed by the United States National Security Agency for the transfer and loading of cryptographic keys with their corresponding check w...
KYK-13 - Wikipedia
Secure Communications Interoperability Protocol
The Secure Communications Interoperability Protocol (SCIP) is a multinational standard for secure voice and data communication. SCIP derived from the US Government Future Narrowband Digital Terminal...
KW-37
The KW-37, code named JASON, was an encryption system developed In the 1950s by the U.S. National Security Agency to protect fleet broadcasts of the U.S. Navy. Naval doctrine calls for warships at sea...
Over the Air Rekeying
Over the Air Rekeying (OTAR) is the common name for the method of changing or updating encryption keys in a two-way radio system over the radio channel (“over the air”). It is also referred to as Over...
NSA encryption systems
The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA-approved systems are still classified, bu...
NSA encryption systems - Wikipedia
KL-51
The KL-51 is an off-line keyboard encryption system that read and punched paper tape for use with teleprinters. In NATO it was called RACE (Rapid Automatic Cryptographic Equipment).It was developed in...
KL-51 - Wikipedia
Fill device
A fill device is an electronic module used to load cryptographic keys into electronic encryption machines. Fill devices are usually hand held and battery operated.Older mechanical encryption systems,...
Fill device - Wikipedia
Navajo I
The Navajo I is a secure telephone built into a briefcase that was developed by the U.S. National Security Agency. According to information on display in 2002 at the NSA's National Cryptologic Museum,...
Navajo I - Wikipedia
VINSON
VINSON is a family of voice encryption devices used by U.S. and allied military and law enforcement, based on the NSA's classified Suite A SAVILLE encryption algorithm and 16 kbit/s CVSD audio compres...
KY-68
TSEC/KY-68 DSVT, commonly known as Digital Subscriber Voice Terminal, is a US military ruggedized, full- or half-duplex tactical telephone system with a built-in encryption/decryption module for secur...
KY-68 - Wikipedia
NSA cryptography
The vast majority of the National Security Agency's work on encryption is classified, but from time to time NSA participates in standards processes or otherwise publishes information about its cryptog...
U-229
The U-229 is a cable connector currently (as of 2009) used by the U.S. military for audio connections to field radios, typically for connecting a handset. [1] There are five-pin and six-pin versions....