Back to Results
First PageMeta Content
National Security Agency / Key size / Symmetric-key algorithm / Triple DES / Project 25 / Wireless security / Secure voice / Strong cryptography / Key Wrap / Cryptography / Data Encryption Standard / Advanced Encryption Standard


DHS Office of Emergency Communications Guidelines for Encryption in Land Mobile Radio Systems September 2013
Add to Reading List

Document Date: 2013-10-02 16:37:55


Open Document

File Size: 255,28 KB

Share Result on Facebook

City

Safety / Washington / /

Company

Land Mobile Radio Systems / NIST / Land Mobile Radio / The AES / FPIC Security Working Group / LMR Systems / /

Country

United States / /

Currency

pence / /

Event

FDA Phase / /

Facility

Missouri Interoperability Center / National Institute of Standards and Technology / National Law Enforcement Communications Center / Information Technology Laboratory / NIST FIPS PUB / /

IndustryTerm

symmetric key algorithm / search using modern computer systems / digital technology / wireless communications systems / communications interoperability / Standards compliant algorithms / public safety wireless systems / nonstandard algorithms / communication protocol / exhaustive key search / cryptographic algorithm / electronic communications system / digital wireless communications network / mobile radio communications / data encryption algorithms / cryptographic algorithms / local public safety communications platforms / encryption systems / voice and data / voice and data communications / wireless encryption operations / digital communications technology / interim algorithm / security solutions / specified algorithm / algorithm / exhaustive key search increases / symmetric key algorithms / voice communications / voice and data communications needs / non-standard encryption protocols / voice and data encryption / particular algorithm / communications needs / secure communications / encryption solutions / software implementation / security services / pseudo-random generation algorithm / encryption algorithms / non-standard/proprietary security technology / mobile-radio applications / encryption algorithm / publicsafety communications / /

Organization

office of Emergency Communications / U.S. Government / Tax Administration / Firearms Division / Communications Data Electronics Department / Radio Services Division / National Institute of Standards and Technology / Telecommunications Industry Association / U.S. Department of Justice / Information Technology Laboratory / Sheriff’s Department / Connecticut Department of Emergency Services / Missouri Interoperability Center / Wyoming Public Safety Communications Commission / Wireless and Radio Systems Department / National Security Agency / Computer Security Division / office of Investigative Technology / Wireless Management Office / Operational Technology Division / Federal Bureau of Investigation / United States Marine Corps / Radio Systems Development Unit / State Police / Public Safety Division / Federal Government / U.S. Drug Enforcement Administration / Connecticut Department of Emergency Services and Public Protection / Department of Information Technology / Missouri Department of Public Safety / DHS office of Emergency Communications Guidelines for Encryption / Radio-Microwave Unit / Department of Homeland Security / National Law Enforcement Communications Center / /

Position

Treasury Inspector General / specific author / /

Product

RC45 / TIA-102 / Proprietary solutions / /

ProvinceOrState

Virginia / Loudon County / Connecticut / Missouri / California / Orange County / Wyoming / Maryland / Fairfax County / Montgomery County / /

RadioStation

Radio Systems September / /

Technology

pseudo-random generation algorithm / encryption algorithms / 25 Block Encryption Protocol / 25 digital communications technology / encryption algorithm / Information Technology / symmetric key algorithm / DES algorithm / cryptographic algorithm / Encryption / Office of Information Technology / Cryptography / standards compliant encryption / keyscheduling algorithm / particular algorithm / security technology / interim algorithm / communication protocol / encryption system / data encryption algorithms / Encryption Protocol / publically specified algorithm / Algorithm Reference Matrix Algorithm / same cryptographic algorithms / Cryptographic algorithms / WEP / DES encryption / term encryption / wireless communications / Standards compliant algorithms / data encryption / Microwave / symmetric key algorithms / Wi-Fi / encryption protocols / 256 bit encryption / stream cipher / generated using a pseudo-random generation algorithm / /

URL

http /

SocialTag