military encoding device

In the era of globalization, information and communication technology is developing very rapidly. The main priority in information and communication technology is how to secure it. This can be achieved with cryptography. The development of cryptography also triggered the development of cipher devices as the primary means of support. AN / ARC– 210 is one of the military cipher devices that has been used and continues to be updated.

Starting with the discovery of microprocessor technology in the 1960s, the application of cryptographic systems is no longer manual, or based on mechanical machinery, but turned to digital electronic applications. And cryptographic system algorithms have developed following the characteristics of digital electronic technology, which is based on binary operations “0” and “1”. And since then began the era of modern cryptography, which actually focuses more on the implementation of an electronic nature, by utilizing computer technology and high-speed data processing.

After seeing a glimpse of classical cryptography, then we will then enter the area of ​​contemporary cryptography, which has led to digital processing. Modern bit-based cryptographic algorithm. Each encryption operation is performed on data bits. Thus, all digital data can be encrypted using this cryptographic algorithm.

Modern cryptographic algorithms are divided into two main parts based on the keys used to do encryption and decryption. The two parts are the key asymmetry algorithm and the symmetry key algorithm.

 Technological developments are advances in developing microprocessors, field-programmable gate arrays (FPGAs), digital signal processors (DSPs), small-form-factor single-board computers, and other embedded computing technologies. Make wireless communication safer and faster. Small, fast, and power-efficient hybrid computing is currently the primary activation technology for modern cryptography that promises secure wireless computing capabilities for military forces, even to the front of the battle.

Encryption among the military is used in sending messages. Storing military and state confidential data in the storage media is always in an encrypted state.

Modern cryptographic equipment enables system designers to embed security in handheld devices such as small radios and smartphones to provide secure wireless communication on the battlefield. The United States military and security authorities are at the center of the largest and most important crypto modernization program in the past half century. Not only does sophisticated embedded computing open the way to wearable and handheld computing and wireless communications that are safe from enemy interception and eavesdropping, but it also makes the case for an approach that has never been used before modern cryptography to protect vital military computing and communications.

While previous generations of military cryptography mandated the use of secret algorithms and independent encryption hardware, encryption technology is now increasingly using special off-the-shelf (COTS) crypto algorithms and processing hardware is the most effective way to counter the effects of technological obsolescence, enabling operations network-centered military, addressing data dissemination and data sharing, making images and videos a major component of military intelligence and situational awareness, immediately utilizing new technology, keeping the cost of developing and maintaining cryptographic technology to a minimum, incorporating the latest cryptographic capabilities into security systems legacy, and ensuring interoperability between communications and computer systems of the United States and its secure allies.

National Security Agency (NSA) in Fort Meade, Md. Any military communication or computing system that uses security encryption is subject to NSA approval to ensure that the encryption is effective and implemented. In recent years, the NSA developed a military encryption algorithm, and maintained each algorithm as a tightly held secret. This secret crypto algorithm is designated as “Type 1” security.

The crypto Modernization Program is developing a fast, small crypto processor that saves size and weight for frontline combat strength. While the NSA still creates and manages type 1 classified – or what is now called “Suite A” – this update is the result of developments in existing technology. The NSA has in recent years begun to accept unclassified crypto algorithms created in private industry, as long as NSA experts can verify the effectiveness of these algorithms and authorize them for deployed military systems. The industrial non-classification crypto algorithm developed is most commonly known as the “Suite B” cryptography.

Department of Defense NSA and U.S. started the Cryptographic Modernization Program which continued in 2005 to solve problems in the crypto approach, including obsolescence, expensive maintenance costs, insufficient bandwidth, and integration of difficult systems and systems.

EVOLUTION OF AN / ARC-210 radio

Rockwell Collins AN / ARC-210 V / UHF integrated communication system provides multimode voice and normal data communication, safe or clock-resistant modes via line-of-sight (LOS) or satellite communication (SATCOM) links.

1. AN / ARC-210 First generation

AN / ARC-210 is the first generation with three updates. RT-1556 was made in 1990 and developed into RT-1556A in 1995 and 1998 by releasing RT-1556B which is the latest output in the first generation, with specifications:

  • RT-1556 :
  • 30-400 MHz
  • Have Quick I/II
  • SINCGARS
  • RT-1556A (1995) :
  • 8.33 kHz
  • RT-1556B (1998)
  • AMLV Capability

2. AN / ARC-210 Second generation

In 1992, RT-1747D was produced as the second generation of AN / ART-210 radio with additional specifications:

  1. All RT-1556 functions
  2. Link 11
  3. Link 4A
  4. Standard 70 MHz interface

3. AN / ARC-210 Third generation

There are two functions renewal in the third generation, namely RT-

1794 (C) issued in 1998 and RT-124 (C) in 2000. AN / ARC-210 This third generation is no longer produced either RT-1794 (C) and RT-124 (C).

  1. RT-1794(C)
  2. All RT-1556 functions
  3. DAMA SATCOM
  4. Embedded COMSEC
  5. CNR (188-220C)
  • All RT-1794 functions
  • Updated COMSEC
  • Updated Link 4A

4. AN / ARC-210 fourth generation

There are two types of AN / ARC-210 radios in the fourth generation, in 2004 namely RT-1851 (C) Warrior and are no longer produced and RT-1851A (C) are still being produced.

i. All RT-1824 functions

• DAMA A / B Standards

• DAME IW

• FM Immunit

ii. RT-1851A (C):

• All RT-1851 functions

• 30-512 MHz

• Land Mobile

5. AN / ARC-210 fifth generation

AN / ARC-210 The fifth generation is the last generation that is still produced today, with the best function among the previous AN / ARC-210 generations. There are two types in the same year, namely RT-1939 (C) Gen 5 and RT-1939A (C), the first production of these two types in 2011.

  1. RT-1939(C) Gen 5
  2. All RT-1851A(C) functions
  3. Programmable Crypto
  4. 30-941 MHz
  5. CNR (188-220D)
  6. Ability to host JPALS
  7. SATURN/ESIP
  • RT-1939A (C)
  • All RT-1939(C) functions
  • RS Ethernet incorp into J7

1 COMMENT

LEAVE A REPLY

Please enter your comment!
Please enter your name here