Home
HC-6835 Ruggedized Security Workstation
Contents
1. key for disk encryption variety over 10 Algorithm Customisation e Customisation by CMP variety over 10 Customer Definitions e Total variety of customer definition in security chip HCC 420 Crypto AG HC6835 E PPT hy 25 HC 6835 Ruggedized Security Workstation Detachment Philosophy Security elements fully under customer control e The Master Communication Keys e The Storage Key e The Access Password e A vital Part of the Algorithm i HCA 420 3 HCA 420 Crypto AG HC6835 E PPT hy 26 Page 13 HC 6835 Ruggedized Security Workstation Cryptographic Algorithms e Proprietary customer specific secure handled cryptographic algorithms e Possibility to set algorithm structure parameters by customer Cipla Hesse E PETE ny 27 2001 Crypto AG all rights reserved HC 6835 Ruggedized Security Workstation Algorithm Highly Sophisticated Algorithms e HCA 420 for encryption decryption embedded in Crypto AG s security chip HCC 420 e Hardware based true random generator embedded in security chip HCC 420 Crypto AG HCB835 E PPT hyi 28 2001 Crypto AG all rights reserved Page 14 HC 6835 Ruggedized Security Workstation Elements of Seamless Security A Security Chain is as strong as its weakest link Detachment from manufacturer Customer controlled algorithm Access to terminal Highly sophisticated hardware based algorithm Flexible security management Hardware base
2. 38 Page 19 HC 6835 Ruggedized Security Workstation Capabilities as System Intergrator General contractor for a complete secure system On customer request we shall supply install and commission the entire IT and security system on a turnkey basis Cae AG HCGEIS EPR FANY 39 2001 Crypto AG all rights reserved HC 6835 Ruggedized Security Workstation But Crypto AG will support e The customer with ideas proposals security know how if the new and the existing units have to be used e The customer with hardware software brainware to use the existing and new units in an optimized configuration Crypto AG HC6835 E Per Hy 40 2001 Crypto AG all rights reserved Page 20 Your Benefits End to end communication security File disk virtual memory and message encryption Virtual Private Network VPN encryption Excellent perfomance light small ruggedized ee E f Crypto AG HC6835 E PPT hy 41 2001 Crypto AG all rights reserve Page 21
3. Total Information Security By Crypto AG HC 6835 Ruggedized Security Workstation Page 1 HC 6835 Ruggedized Security Workstation General Applications e Message Handling e Processing Data Graphics Fax Images Video Voice Data e C I Applications Or Crypto AG HERS Sere tl Ny 3 2001 Crypto AG all rights reserved HC 6835 Ruggedized Security Workstation General Specifications e Ideal ruggedized security workstation for all types of electronic data processing applications i e for E Mail Peer Messaging PC Security with HC 6360 or VPN Encryption with HC 7830 or both installed in the same system HC 6835 with HC 6378 e Fully ruggedized and absolutly mobile e Comprehensive Workstation Security including Access control User identification Disk file and message encryption Virtual memory encryption VPN encryption Crypto AG HC6835 E PPT hy 4 2001 Crypto AG all rights reserved Page 2 HC 6835 Ruggedized Security Workstation Hardware Software Hardware components Fully ruggedized Notebook state of the art Pentium IIl gt 256 MB RAM 12 GB HDD DVD CD ROM Drive MPEG II Ethernet 10 100 Mbit 3 5 1 44 MB FDD PC Card Slot Type ll 12 1 Monitor TFT 800x600 Backlight keyboard Including one parallel two serial and one Card Bus Type interfaces Microsoft Windows NT 4 0 operating system Microsoft Office 2000 application wit
4. context menu e Drag amp Drop files onto CryptoPad application e Works with single or multiple files e Decryption e Automatically on double click e Manually in Explorer context menu e Includes Compression and Integrity Check O Crypto AG Hoes Peri hyy2 2001 Crypto AG all rights reserved HC 6835 Ruggedized Security Workstation Communication Security Mechanisms Sender P Customer defined MCK main g m oy tg HCA 420 CK one time l Security Chip HCC 420 Crypto AG HCB835 E PPT hy 22 2001 Crypto AG all rights reserved Page 11 HC 6835 Ruggedized Security Workstation Communication Security Mechanisms Receiver Customer defined MCK Domain on CK sedis HCA 420 Security Chip HCC 420 Cae ne HCGEIS EPR FANY 23 2001 Crypto AG all rights reserved HC 6835 Ruggedized Security Workstation Key Life Cycles Communication Key CK is randomly generated to encrypt only one message Master Communication Key MCK is generated by customer s security administrator and used until the next key change Validity duration for MCK is defined at generation time MCK 1 MCK 2 Crypto AG HC6835 E PPT snes 2001 Crypto AG all rights reserved Page 12 HC 6835 Ruggedized Security Workstation Algorithm in the HCC 420 Cryptographical parameters e Master communication key variety over 1097 e Communication key variety over 1037 e Storage
5. d access control mechanisms Easy and reliable operation High quality of COMPREM measures CHpinaG MCG8STE PPTI NY 29 2001 Crypto AG all rights reserved HC 6835 Ruggedized Security Workstation Security Management Communication Topology MCK Domain A CK Domain C Crypto AG HC6835 E PPT hy 30 2001 Crypto AG all rights reserved Page 15 HC 6835 Ruggedized Security Workstation Traditional Security Management e Delivery of all HC 6835 to the customer e HC 6835 are detached by customer e Traditional key management by security manager of communication organisation BC periodically Crypto AG HC6835 E PPT hy 31 HC 6835 Ruggedized Security Workstation Enhanced Security Management e Delivery of all HC 6835 to customer s communication organisations Detachment of first HC 6835 according to customer s centralized rules CMP Manual input of MCK into first HC 6835 Distribution of securely copied security modules to the other communication panniers periodically 5 Crypto AG HC6835 E PPT hy 32 Page 16 HC 6835 Ruggedized Security Workstation Security Module Tamper proof security chip HCC 420 with cipher algorithm HCA 420 true random generation of keys Plain keys Password and other classified data never leave the security chip Algorithm is fully protected against copying readout modifications High COMPREM quality due to yi J housing of PC card 5 E Cr
6. h integrated secure messaging Crypto AG HC6835 E PPT hy 5 HC 6835 Ruggedized Security Workstation Communications Public Network Private Network Telephone lines HF VHF UHF radio circuits Optionally Satellite GSM or ISDN X 25 LANs etc Crypto AG HC6835 E PPT hy 6 Page 3 HC 6835 Ruggedized Security Workstation Secure and Reliable Radio communication Built in HF Modem HF VHF UHF Point to point amp broadcast Automatic error correction Automatic speed adaptation Automatic compensation of Tx Rx frequency off set Long range HF communication up to 30 000 km possible 5 Crypto AG HC6835 E PPT hy 7 HC 6835 Ruggedized Security Workstation Public Private Network communication e Built in Telephone Modem Public Private e Point to point communication Network i e E Mail encryption e VPN encryption Built in Ethernet 10 100 Mbit e E Mail encryption e VPN encryption Crypto AG HC6835 E PPT hy 8 Page 4 HC 6835 Ruggedized Security Workstation Accessories e Field carrying bag for HC 6835 basic unit and accessories e External ruggedized portable printer e DC adaptor 10 32 Vdc e AC adaptor 100 240V ac e External battery charger e LS 120 Floppy Drive e Docking Station Mounting kit e etc Crypto AG HC6835 E PPT hy 9 HC 6835 Ruggedized Security Workstation Versions e Versions English French Spanish Arabic e
7. ll rights reserved HC 6835 Ruggedized Security Workstation Military Applications Vehicular Application Manpack Application Airborne Application as Stationary Application A E Crypto AG HCB83S EPPT hy 16 2001 Crypto AG all rights reserved Page 8 HC 6835 Ruggedized Security Workstation Navy Applications Ship Application Shore Application A E O Crypto AG Hesse Per Kyi 17 2001 Crypto AG all rights reserved HC 6835 Ruggedized Security Workstation MOFA Applications Vehicular Application g 3 HF Backup link Application A E Crypto AG HC6835 E PPT Hy 18 2001 Crypto AG all rights reserved Page 9 HC 6835 Ruggedized Security Workstation security and Administration Crypto AG HC6835 E PPT hy 19 HC 6835 Ruggedized Security Workstation The Security Services Local Security Encryption of files stored locally or on server Automatic decryption upon selection of encrypted file double click Wipe Function secure delete Transparent Disk Encryption for extended hard disk partitions and floppy disks Access Protection to encrypted drives and encryption decryption services swap File Clean up Temp File Redirection Crypto AG HC6835 E PPT hy 20 Page 10 HC 6835 Ruggedized Security Workstation The Security Services Message amp File Encryption Manual operation e Type and include files into CryptoPad application e Select in Explorer
8. nabled Crypto AG HC6835 E PPT hy 10 Page 5 HC 6835 Ruggedized Security Workstation Compatibility e The HC 6835 Ruggedized Security Workstastion is compatible with HC 6830 HC 6950 Standard Desktop PC with integrated PC Security Standard Notebook with integrated PC Security SCHR MOGISSE PET NYUNI 2001 Crypto AG all rights reserved HC 6835 Ruggedized Security Workstation Environmental Conditions Climate Mil Standard 810E Operating temperature 0 C 4 50 C Storage temperature 20 C 70 C Humidity 5 95 RH Altitude operating lt 16 000 ft Salt fog 5 salt solution at 35 C 48h Enclosure class IP 54 IEC 529 Crypto AG HC6835 E PPT hy 12 2001 Crypto AG all rights reserved Page 6 HC 6835 Ruggedized Security Workstation Environmental Conditions Mechanical Mil Standard 810E _ Shock operating 25g 6ms IEC 68 2 29 e Vibration operating random 10 500Hz 1 04g RMS e Drop 90cm e GB GF GMW MP NS ARW GMT es Crypto AG HC6835 E PPT hy 13 HC 6835 Ruggedized Security Workstation Environmental Conditions Susceptibility EMC Radiated susceptibility e Magnetic field e Electric field MIL STD 461C RS103 limits Radiated susceptibility gt 10V m Crypto AG HC6835 E PPT hy 14 Page 7 HC 6835 Ruggedized Security Workstation Applications A E One AG MCG8ISE PRT AYAS 2001 Crypto AG a
9. ypto AG s security chip HCC 420 titre E E ee ee i ToT Cie Crypto AG HC6835 E PPT hy 33 Services Crypto AG HC6835 E PPT hy 34 Page 17 HC 6835 Ruggedized Security Workstation Maintenance Concept e Support for various levels Level by operator Level II module level Tools and test equipment Spare parts Factory repair Documentation Training Crypto AG HC6835 E PPT hy 35 HC 6835 Ruggedized Security Workstation Maintenance Level Level Operator Performed by the operator or user Replacement of complete units or parts thereof No spare parts or tools required Part of optional basic training Level is entirely covered with standard documentation e g user Manual Crypto AG HC6835 E PPT hy 36 Page 18 HC 6835 Ruggedized Security Workstation Maintenance Level Il Level II Module Level Spare modules required Performed by technicians e Replacement of modules e Diagnosis with off the shelf test equipment and BITE built in tests Standard tool set WOF service Handbook Part of WOF Optional Level II training available Crypto AG HC6835 E PPT hy 37 HC 6835 Ruggedized Security Workstation Turn Key Aspects Crypto AG Capabilities e Customer presentation e Field trials e Site survey e Installation Commissioning Acceptance tests Pa raining Customer service Crypto AG HC6835 E PPT hy
Download Pdf Manuals
Related Search
Related Contents
Castelle 61-1260-001A User's Manual WaRnIng - Felling Trailers Hubbell Electric Heater Company MSE User's Manual 9362661b, Istruzioni d`uso Ricevitore - DVR-S UFD 550 Sony SAL35F18 User's Manual EOIS Case Management System Service Provider User Guide FlexScan 170eW 取扱説明書 ECG Palmare Cardio B - Bluetooth Cardio-B Palm ECG Manual Crioscópio MK540L EMAIL Web JoinNet User Guide A HomeMeeting Inc. Official Document Copyright © All rights reserved.
Failed to retrieve file