Password equipment, hereinafter referred to as Palsan, is a set of tools in the form of software or hardware that functions to support information security activities and directly affect the encoding process (PERKA LEMSANEG No. 14 of 2010, Chapter I, Article I) . Palsan itself developed quite significantly from the first time it was created tens to hundreds of years ago. Palsan does not only include digital machines, but also includes classic cipher tools that were created tens to hundreds of years ago, for example Skytale, Caesar, etc.
It states that Palsan has a fairly large rate of development along with the increasing rate of technological development in the world in order to be able to provide the latest cryptographic services. Over time, Palsan has also progressed in terms of its physical form in order to facilitate user mobility. Can be sampled HC-2203 and CR-7000i cipher machines in the form of a mobile phone so as to facilitate the mobility of its users.
With the rapid development of information technology and the widespread use of the internet in the world, Palsan is required to be able to balance the security aspects in the process of exchanging information wirelessly. Therefore, technological renewal in Palsan is crucial and cannot be separated from its development.
UNDERSTANDING OF PASSWORD (PALSAN) & PASSWORD (MS) MACHINE
Password Equipment (Palsan) is a set of tools used for information security activities consisting of Password Machines (MS) and other media that contain a password application program that directly functions and / or influences the coding process (PERKA LEMSANEG No. 9 of 2010, Chapter I, Article I), while the Coding Machine (MS) is a device that contains cryptographic algorithms and can be used for encryption and decryption processes (PERKA LEMSANEG No. 9 of 2010, Chapter I, Article I).
Explained in the Head of the State Code Institution Regulation, a Coding Machine can be lawfully declared a Coding Machine if it meets the following requirements:
• The Password Machine must be a combination of software and hardware.
• There is an Encoding Module that can generate and store encryption algorithms.
• Modules in the device are connected by a system.
• The device is only used for password-coding activities.
• Has good physical security, in this case includes protection and anticipation factors.
Types of Password Machines can be divided into several categories, namely based on the architecture and the input objects, which are as follows:
• Based on the architecture, namely:
• Password machines with mechanical architecture, and
• Password machines with electronic architecture.
• Based on the input object, namely:
• Password Machine with Text input
• Password Machines with Voice input, and
• Password Machine with Data input.
DEVELOPMENT OF PASSWORD MACHINERY IN 5 (FIVE) YEARS
Password machines have a variety of types and types, depending on the needs of the input. There are various manufacturers of Coding Machines that provide a wide range of coding hardware services, both those produced by commercial companies and limited production under a state agency. Following are examples and developments of the Password Machine:
• SECURE TERMINAL EQUIPMENT
Secure Terminal Equipment or STE developed by the National Security Agency (NSA) in the United States. STE is a telephone-shaped password machine that provides data and voice transmission security services using the Integrated Services Digital Network (ISDN), which is a communication standard for digital telephone connections, voice and data transmission over digital lines. By using ISDN, data and voice do not need to be separated when transmitted, because data and voice are transmitted using the same path, different from its predecessor technology.
Figure 1.1 L3 type Secure Terminal Equipment (STE) machine
At the front of the device, there is a slot to place the crypto card which functions as a cryptographic algorithm generator. Every crypto card manufactured from a factory has a different level of security clearance depending on the user. There is a battery embedded in the crypto card to power the on-board Real Time Clock which functions to prevent date-spoofing.
Figure 1.2 Crypto Card
STE machines are not classified classified machines, because the cryptographic algorithm in the use of these machines comes from the crypto card used. If crypto card is not used, STE can function as a normal telephone. The data transmission speed of STE is 38.4 Kb / s asynchronously and 128 Kb / s synchronously. The device is priced around $ 3000 – $ 4000 (not including crypto cards), considering its use is specific to certain circles. around 2014, this machine was stopped production and no longer used by some countries, replaced with the Sectera Viper Universal Secure Phone.
SG Figure 1.3 Sectera Viper Universal Phone
SSectera Viper Universal Secure Phone has the ability to encrypt and transmit data without the need to use crypto cards to create cryptographic algorithms. At present, Sectera Viper Universal Secure Phone has been used in almost all US government agencies, including in the White House. The official price per unit is not much different from STE L3 when it was first launched, which is around $ 3000- $ 4000. This device also adopts one-button-away technology, which is to change the use of encrypted telephones to ordinary phones using only buttons, without changing or adding hardware.
Password machines actually have a rapid development rate that is not too fast in the hardware field, not as fast as other technological devices. These devices have begun to be replaced with conventional telecommunications equipment embedded with cryptographic software, making it easier for users because they do not need to carry the Password Machine and telecommunications equipment separately. Even so innovation and renewal will always be present in the development of the Password Machine hardware.