Showing 1 - 12 of 23
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

The goal of post-quantum cryptography (PQC), also called quantum-resistant cryptography (QRC), is to develop cryptographic systems that are secure against both quantum and classical computers and can interoperate with existing communications protocols and networks.

05/22/2024
Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

In this second paper, we cover challenges for deploying QR encryption, including pre-shared key (PSK) management, RFC 8784 - an extension of Internet Key Exchange (IKE) v2 that allows it to be resistant to a quantum computer by using PSKs, and how to implement data-at-rest (DAR) and data-in-transit (DIT) QR encryption solutions today using commercial FPGA devices and off-the-shelf hardware.

05/22/2024
Using NetBoot to Reduce Maintenance and SWaP-C in Embedded Systems

Using NetBoot to Reduce Deployed System Maintenance and SWaP-C

This white paper looks at how NetBoot brings new efficiencies, better security, and significant savings to teams that are tasked with maintaining software on embedded systems.

04/16/2024
DAR Series Part 3: NSA Type 1 Encryption

DAR Series Part 3: NSA Type 1 Encryption

A Type 1 product is a classified or Controlled Cryptographic Item (CCI) endorsed by the NSA for securing classified and sensitive U.S. government information.

04/02/2024
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the NSA CSfC program, data at rest encryption, capability package, protection profiles, components & layers, and trusted integrators.

03/13/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation.

01/04/2024
B2 Bomber

Removing 10 GbE Network Attached Storage Bottlenecks

Network attached storage (NAS) devices have the ability to protect and store critical data at high-performance speeds.

03/22/2023
Choosing the Right Data Storage Solutions for Modern Military Missions

Choosing the Right Data Storage Solutions for Modern Military Missions

This paper discusses the advanced characteristics of both network-attached storage devices and direct-attached storage devices.

07/20/2022
Seaborne Applications & Protecting Data-at-Rest

Seaborne Applications & Protecting Data-at-Rest

Find out how seaborne applications like UUVs, USVs, and submarines store and protect top-secret data-at-rest with a network-attached storage device.

06/21/2022
Data-At-Rest Build vs. Buy Considerations for Deployed Storage Devices

Data-at-Rest Build vs. Buy Considerations for Deployed Storage Devices

This paper focuses on deployed DAR devices. Whether you build a NAS or buy an existing COTS NAS, each approach has advantages and disadvantages.

03/14/2022
Accelerate Time to Market with Pre-Engineered Nano Motion Controllers White Paper

Accelerate Time to Market with Pre-Engineered Nano Motion Controllers

Motion controllers are a vital building block in every motion control system, and several factors must be considered when choosing the right-sized motion controller for the application. In this white paper, we discuss those factors, including whether to buy or build.

11/01/2021
What's New? CSfC Data-at-Rest Capability Package 5.0 Review

What's New in CSfC Data-at-Rest Capability Package 5.0

This paper provides a review of the most recent changes from CP 4.0 to 5.0 with special emphasis on Unattended Operation Use Case and a HH solution.

10/08/2021