Over the Air Rekeying

From Infogalactic: the planetary knowledge core
Jump to: navigation, search

Over the Air Rekeying (OTAR) is the common name for the method of changing or updating encryption keys in a telecommunications system over the communications channel (“over the air”). It is also referred to as Over-the-Air Transfer (OTAT), depending on the specific type and use of key being changed. Although the acronym refers specifically to radio transmission means, the technology is also employed via land line and cable.

OTAR was operationally introduced to the US Department of Defense via the Navy in 1988 through 1993. Lieutenant Commander David Winters, an American naval officer in London during the final years of the Cold War,[1] was "code master" overseeing update of cryptologic technologies throughout Europe. He was first to recognize the necessity and potential of these technological advances, and personally oversaw development and deployment of the innovative procedures required.

His methods were quickly adopted and spread Navy wide, during which Vice Admiral J.O Tuttle, the Navy "J6", shortly influenced the Joint Chiefs of Staff to bring all the other military services into compliance.[2] Thereafter, when joint US forces became heavily tasked in the Middle-East and Eastern Europe, Commander Winters was dispatched to the combat zones where he oversaw integration of the Army, Navy, and Air Force, and other Allied Forces into unified OTAR methodology.

This coincided with introduction of newer NSA cryptographic systems that use a 128-bit electronic key, such as the ANDVT, KY-58, KG-84A/C, and KY-75, capable of obtaining new or updated keys via the circuit they protect or other secure communications circuits. Adoption of OTAR drastically reduces requirements both for distribution of physical keying material and the physical process of loading cryptographic devices with key tapes.

OTAR essentially eliminates need for individual stations to be involved with tangible physical key changeovers on a day-to-day updates. Instead, electronically transmitted keys would normally come from a Network Control Station (NCS). The OTAT feature permits key to be extracted from an OTAT-capable cryptographic system using a fill device, such as the KYK-13 or KYX-15/KYX-15A and then loaded ("squirted") into another cryptographic system as needed.

Introduction of this technology revolutionized US and associated secure telecommunications by obviating many previous requirements for risky, expensive wide-spread distribution of paper code keys. It thereby extinguished vulnerability to physical theft and loss previously exploited by the infamous "Johnny Walker" spy ring.[3] Elimination of this vulnerability, although little appreciated outside the security community at the time, was an innovation of inestimable impact.

OTAR applications have now been adapted for civilian emergency service providers and other users requiring enhanced communications security. Extensive parallel technology conversion and development have produced commercially viable systems that include end to end key generation, distribution, management, and control.

In example, one popular system permits network controllers to remotely, dependably, and securely, change encryption keys for an entire network at their discretion. This security enhancement greatly simplifies and streamlines operations while virtually eliminating risk of compromise. As a matter of normal routine, key updates can be sent to users, stations, or nodes remotely or “over the air.” In practical terms, this means users need not bring or return their units for manual updates, nor must technicians visit each user, station, or node to service their units in the field. This saves many man hours in addition to increasing security.

Further, in the unlikely event that a unit, station, or node is stolen, mimicked, or otherwise compromised, a network controller can:

-Remotely inhibit access of additional users, stations, or nodes to the network.

-Remotely and securely enable network access to additional users, stations, or nodes.

-Remotely “zeroize” or remove a user's, station's, or node's cryptographic key material.

-Remotely and securely change or update a user’s, station's, or node's cryptographic keys.


This and other technological contributions of Commander Winters were quietly recognized and mentioned in official history,[4] military awards, and by his election in 2003 to membership in the elite British Special Forces Club.[5]

References

  1. Also see STU-III and John Anthony Walker, spy
  2. (U) American Cryptology During the Cold War (1945-1989), (U) Book IV, Cryptologic Rebirth, 1981-1999, by Thomas R. Johnson, Center For Cryptologic History, National Security Agency, pp 40-41.
  3. See John Anthony Walker, spy.
  4. "OPERATION PROVIDE COMFORT, A Communications Perspective, published by the United States European Command Directorate of Command, Control, and Communications, June 4, 1993. Also see STU-III.
  5. See Special Forces Club.


<templatestyles src="Asbox/styles.css"></templatestyles>