58--Crypto Module - W15P7T-09-R-CRYP (Archived) - Federal Bu... https://www.fbo.gov/index?s=opportunity&mode=form&tab=core&...

tediousfifthΚινητά – Ασύρματες Τεχνολογίες

12 Νοε 2013 (πριν από 3 χρόνια και 8 μήνες)

160 εμφανίσεις

Solicitation Number:
W15P7T-09-R-CRYP
Notice Type:
Sources Sought
Buyers:
Login |
Register Vendors:
Login |
Register
Accessibility
Original Synopsis
Mar 27, 2009
10:40 am
Return To Opportunities List
Synopsis:
A
dded: Mar 27, 2009 10:40 am
The US Army Communications Electronics Research, Development &
Engineering Center (CERDEC), Fort Monmouth, NJ is conducting an
industry survey of interested sources (US Only), to locate sources for the
development of a Cryptographic Module for baseband/link data
communications encryption. This request for information (RFI)/Sources
Sought (SS) Notice is for information and planning purposes only and shall
not be construed as a solicitation or as an obligation on the part of the US
A
rmy CERDEC. The purpose of this RFI/SS is to identify potential sources
that may be interested in and capable of performing the work described
herein. US Army CERDEC does not intend to award a contract on the basis
of responses nor otherwise pay for the preparation of any information
submitted or for CERDECs use of such information. Acknowledgement of
receipt of responses will not be made, nor will respondents be notified of
CERDEC evaluation of the information received. An original and one copy
shall be sent to the US Army, Communications Electronics Research,
Development & Engineering Center (CERDEC), Attn: AMSRD-
CER-ST-IA-CM (Bob Chu) Bldg. 2700, Fort Monmouth, NJ 07703.
Technical questions may be directed to Bob Chu at 732-427-4683. EMAIL
A
DDRESS: bob.chu@us.army.mil
-----------------------------------------------------------------------
This is a market survey to locate sources for the development of a
cryptographic module. The following is the requirement:
The solicited device will provide cryptographic and security functions to
tactical communications nodes comprised of fixed, ground mobile, and
unmanned air mobile installations operating both within line of sight and
beyond line of sight (e.g., satellite communications). Supported
communications would include commercial, government/military
unprotected, and government/military protected systems. The requested
device will be expected to provide confidentiality, integrity, and
authentication services for both the communication traffic and the
communication node itself.
GENERAL INFORMATION
Notice Type:
Sources Sought
Posted Date:
March 27, 2009
Response Date:
April 27, 2009
Archiving Policy:
Automatic, on specified date
Archive Date:
June 26, 2009
Original Set Aside:
N/A
Set Aside:
N/A
Classification Code:
58 -- Communication, detection,
& coherent radiation equipment
58--Crypto Module
Solicitation Number: W15P7T-09-R-CRYP
Agency: Department of the Army
Office: Army Contracting Command
Location: ACC-APG - Aberdeen Division B
Notice Details
Packages
Interested Vendors List
Print
Link
58--Crypto Module - W15P7T-09-R-CRYP (Archived) - Federal Bu...https://www.fbo.gov/index?s=opportunity&mode=form&tab=core&...
1 of 4 11/12/2013 7:29 AM
Expected production quantities will range between 500 and 10,000 units
(including sparing), depending on the breadth of integration within fielded
organizations. Initial delivery of final, certified devices should begin by
January 2012. The unit cost target for these devices is approximately
$2,500.00 each for a quantity of 1000.
The ideal device will include the following characteristics:
Security Environment
" NSA certified for Type 1 operation
" Operating modes: Suite A, or Suite B, or a mixture of Suite A and Suite B
algorithms
" MLS, MSLS, MILS, or other operations up to Secret-and-below
" Unclassified CCI when powered off
" Supports unattended operations for some limited period of time
" Releasable to allied partners
" Deployable/operable in non-military missions (e.g., disaster relief)
Physical Characteristics
" Suitable for embedment/utilization in small form factor systems (e.g., as a
component within a tactical radio installed in mobile platforms)
" Size on the order of 25 cubic inches, or less, with one dimension not
greater than 1.5
" Standard external interfaces (power, physical connectors, signaling,
communications protocols, etc.)
" Power on the order of 20w (to operate all simultaneous functions as listed
below), or less
" NSA certified tamper and TEMPEST protected enclosure
Functions
" Implements the algorithms, types, and modes at the data rates listed in
Table 1
" Simultaneously operates the algorithms in Table 1 at any of their
supported modes, as depicted in Table 2. The table denotes the number of
simultaneous instances of a particular algorithm/type/rate for each of
several scenarios. These scenarios are representative, and not exhaustive.
" Implements the key fill and key management mechanisms listed in Table 3
" Supports red key fill for testing and development (configurable by policy)
Features
" CMI compliant
" Reprogrammable to implement new algorithms and functions of similar
performance, without requiring hardware modification.
" Configurable via downloadable security and/or behavioral policies.
Policies may be developed and deployed by third-parties.
" Programmable control and status bypass engine, configurable by content
and traffic rate(s). Bypass rules may be developed and deployed by third
parties.
" Fully configurable plaintext/ciphertext routing of traffic data, subject to
policy
" CIK-less operation of selected non type 1 functions (e.g., signature
verification)
Protected Resources
" Availability of unused computing resources (GPP(s), RAM, FPGA
partition(s), DSP(s), etc.) within the NSA certified tamper/TEMPEST
module enclosure itself. Quantity and sizing of these resources are still to
be determined.
" Software/Firmware applications targeted to the protected computing
resources may be developed and deployed by third parties
" Approved software/firmware applications may be deployed without
58--Crypto Module - W15P7T-09-R-CRYP (Archived) - Federal Bu...https://www.fbo.gov/index?s=opportunity&mode=form&tab=core&...
2 of 4 11/12/2013 7:29 AM
requiring module recertification
Deployment and Application
" Delivered with, at a minimum, full government purpose rights to
embedment and use by third party developers. This includes all ICDs and
technical data necessary for the embedment and use of the module by the
government or a government designated agent.
" No run time licensing fees for any aspects of module deployment or
operation
" No additional (i.e., unprovided) tools, licenses, libraries, nor technologies
required to develop policies, bypass rules, and targeted applications.
" No limitations on the purchase, embedment, usage, or development of
applications and/or policies except as restricted by certification and/or
releasability considerations.
Table 1: Representative Algorithms, Modes, and Rates
Id Algorithm Type ECB CBC CFB OFB CTR GCM Throughput
1 Suite A Block (e.g., MEDLEY) stream x x x x x 1 Mb/s
2 Suite A Block stream x x x x x 100 Kb/s
3 Suite A Block stream x 500 b/s
4 Suite A Block cipher x x x x x 100 Mb/s
5 Suite A Block cipher x x x x x 10 Mb/s
6 Suite A Block cipher x x x x x 50 Kb/s
7 Suite B Block (e.g., AES-256) stream x x x x x 5 Mb/s
8 Suite B Block stream x x x x x 1 Mb/s
9 Suite B Block stream x x x x x 20 Mb/s
10 Suite B Block stream x 500 b/s
11 Suite B Block cipher x x x x x 100 Mb/s
12 Suite B Block cipher x x x x x 10 Mb/s
13 Suite B Block cipher x x x x x 250 Kb/s
14 Suite B Block cipher x 50 Kb/s
15 HAIPIS v 3 tunnel as specified 200 Kb/s
16 IPsec tunnel x x x 500 Kb/s
17 IPsec tunnel x x x 200 Kb/s
18 SHA-256/384/512 hash 100 Mb/s
19 Verify DSA/RSA/ECDSA sign 100 Mb/s
20 Generate DSA/RSA/ECDSA sign 10 Mb/s
21 Verify NSA Type 1 sign 100 Mb/s
Table 2: Representative Number of Simultaneous Instances by Function
Id Description Scenario 1 Scenario 2 Scenario 3 Scenario 4 Scenario 5
Scenario 6
1 Suite A Block Stream @ 1 Mb/s 3 3 3 3
2 Suite A Block Stream @ 100 Kb/s 2 2 2 2
3 Suite A Block Stream @ 500 b/s 2 2 2 2
4 Suite A Block Cipher @ 100 Mb/s 1
5 Suite A Block Cipher @ 10 Mb/s 1
6 Suite A Block Cipher @ 50 Kb/s 3 3 3 3
7 Suite B Block Stream @ 5 Mb/s 1 1
8 Suite B Block Stream @ 1 Mb/s 2 2
9 Suite B Block Stream @ 20 Mb/s 3 3
10 Suite B Block Stream @ 500 b/s 2 2
11 Suite B Block Cipher @ 100 Mb/s 1 1
12 Suite B Block Cipher @ 10 Mb/s 1 1
13 Suite B Block Cipher @ 250 Kb/s 2 2
14 Suite B Block Cipher @ 50 Kb/s 2 2
15 HAIPIS v 3 @ 200 Kb/s 1 1 1 1 1 1
16 IPsec @ 500 Kb/s 1 1
58--Crypto Module - W15P7T-09-R-CRYP (Archived) - Federal Bu...https://www.fbo.gov/index?s=opportunity&mode=form&tab=core&...
3 of 4 11/12/2013 7:29 AM
For Help: Federal Service Desk
Accessibility
17 IPsec @ 200 Kb/s 1 1 1 1 1 1
18 SHA-256/384/512 @ 100 Mb/s 1 1 1 1 1 1
19 Verify DSA/RSA/ECDSA @ 100 Mb/s 1 1 1 1 1 1
20 Generate DSA/RSA/ECDSA @ 10 Mb/s 1 1 1
21 Verify NSA Type 1 1 1 1 1 1 1
Table 3: Representative Key Management and Related Functions
A
lgorithm
FIREFLY v 9
FIREFLY v 17
Enhanced FIREFLY
MAYFLY
A
CCORDION v 3
FFC DH
ECC CDH
FFC MQV
ECC MQV
A
ES Key Wrap
JOSEKI
WATARI
TAMP
A
ny interested sources please send information for evaluation NLT 30 days
after this publication to US Army CERDEC. This information should include
technical specification, unit cost by quantities, and previous history.
Contracting Office Address:
US Army C-E LCMC Acquisition Center - DAAB07, ATTN: AMSEL-AC,
Building 1208, Fort Monmouth, NJ 07703-5008
Place of Performance:
US Army C-E LCMC Acquisition Center - DAAB07 ATTN: AMSEL-AC,
Building 1208 Fort Monmouth NJ
07703-5008
US
Point of Contact(s):
Celeste Boucher, 732-427-2768
US Army C-E LCMC Acquisition Center - DAAB07
Return To Opportunities List
58--Crypto Module - W15P7T-09-R-CRYP (Archived) - Federal Bu...https://www.fbo.gov/index?s=opportunity&mode=form&tab=core&...
4 of 4 11/12/2013 7:29 AM