Content deleted Content added
minor fmt fixes |
|||
(6 intermediate revisions by 6 users not shown) | |||
Line 1:
{{Short description|Encryption device}}
{{multiple issues|
{{cleanup|date=March 2012}}
Line 4 ⟶ 5:
{{refimprove |date= February 2008}}
}}
{{Use mdy dates|date=March 2025}}
A '''High Assurance Internet Protocol Encryptor''' ('''HAIPE''') is a [[Type 1 encryption]] device that complies with the [[National Security Agency]]'s HAIPE IS (formerly the HAIPIS, the High Assurance Internet Protocol Interoperability Specification).
==Examples==
Examples of HAIPE devices include:
* [[L3Harris Technologies]]' Encryption Products<ref>[https://www2.l3t.com/cs-east/what-we-do/products/encryption-products_red-eagle.htm L-3 Communication Encryption Products]</ref>
** KG-245X 10 Gbit/s (HAIPE IS v3.1.2 and Foreign Interoperable),
** KG-245A fully tactical 1
** RedEagle
* [[ViaSat]]'s AltaSec Products<ref>[http://www.viasat.com/government-communications/information-assurance/ ViaSat Information Assurance web page]</ref>
** KG-250,<ref>[http://www.viasat.com/government-communications/information-assurance/altasec-kg-250 ViaSat KG-250]</ref> and
** KG-255 [1
* [[General Dynamics Mission Systems]] TACLANE Products<ref name="ge">[https://gdmissionsystems.com/encryption/taclane-network-encryption General Dynamics TACLANE Encryptor (KG-175)]</ref>
** FLEX (KG-175F)
** 10G (KG-175X)
** Nano (KG-175N)
* Airbus Defence & Space ECTOCRYP Transparent Cryptography<ref>{{Cite web |url=http://www.cassidian.com/pl/web/guest/1307 |title=Ectocrypt Blue by Cassidian, an EADS Company |access-date=
Three of these devices are compliant to the HAIPE IS v3.0.2 specification while the remaining devices use the HAIPE IS version 1.3.5, which has a couple of notable limitations: limited support for [[routing protocols]] or open [[network management]].
A HAIPE is an IP encryption device, looking up the destination IP address of a [[Network packet|packet]] in its internal Security Association Database (SAD) and picking the encrypted tunnel based on the appropriate entry. For new communications, HAIPEs use the internal Security Policy Database (SPD) to set up new tunnels with the appropriate algorithms and settings.
A couple of new HAIPE devices will combine the functionality of a router and encryptor when HAIPE IS version 3.0 is approved. General Dynamics has completed its TACLANE version (KG-175R), which house both [[Red/black concept|a red and a black]] Cisco router, and both ViaSat and L-3 Communications are coming out with a line of network encryptors at version 3.0 and above.
There is a UK HAIPE variant that implements UKEO algorithms in place of US Suite A. Cassidian has entered the HAIPE market in the UK with its Ectocryp range. Ectocryp Blue is HAIPE version 3.0 compliant and provides a number of the HAIPE extensions as well as support for network [[quality of service]] (QoS). Harris has also entered the UK HAIPE market with the BID/2370 End Cryptographic Unit (ECU).<ref>[https://www.harris.com/press-releases/2008/12/next-generation-bid-2370-device-developed-under-uk-ministry-of-defence-chimp Harris UK BID/2370 ECU]</ref>
In addition to site encryptors HAIPE is also being inserted into client devices that provide both wired and wireless capabilities. Examples of these include L3Harris Technologies' KOV-26 Talon and KOV-26B Talon2, and Harris Corporation's KIV-54 <ref>{{Cite web |url=http://rf.harris.com/media/secnet54_emod_tcm26-9219.pdf |title=Harris KIV-54 (SECNET 54) |access-date=
== HAIPE managers ==
Viasat and General Dynamics Mission Systems both develop their own
Both the HAIPE IS v3 management and HAIPE device implementations are required to be compliant to the HAIPE IS version 3.0 common MIBs. Assurance of cross vendor interoperability may require additional effort. An example of a management application that supports HAIPE IS v3 is the L3Harris Common HAIPE Manager (which only operates with L3Harris products).{{Citation Needed|date=June 2022}}
Line 44 ⟶ 47:
== External links ==
* [http://www.cnss.gov/Assets/pdf/CNSSP-19.pdf CNSS Policy #19 governing the use of HAIPE] {{Webarchive|url=https://web.archive.org/web/20080513042825/http://www.cnss.gov/Assets/pdf/CNSSP-19.pdf |date=May 13, 2008 }}
[[Category:Cryptographic protocols]]
|