Showing 1 - 12 of 63
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

The goal of post-quantum cryptography (PQC), also called quantum-resistant cryptography (QRC), is to develop cryptographic systems that are secure against both quantum and classical computers and can interoperate with existing communications protocols and networks.

05/22/2024
Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

In this second paper, we cover challenges for deploying QR encryption, including pre-shared key (PSK) management, RFC 8784 - an extension of Internet Key Exchange (IKE) v2 that allows it to be resistant to a quantum computer by using PSKs, and how to implement data-at-rest (DAR) and data-in-transit (DIT) QR encryption solutions today using commercial FPGA devices and off-the-shelf hardware.

05/22/2024
Defining the C5ISR Space for Army Vehicles

Optimizing Army Vehicle Interoperability with Open Architecture

The goal of reducing the cost of equipping Army vehicles with new capabilities, while adding increasing interoperability and flexibility of operation, can be accomplished through the use of a Modular Open Systems Approach (MOSA), a technical and business strategy for designing an affordable and adaptable system.

05/10/2024
Understanding the Power-to-Performance Capabilities of Intel Processors White Paper

Understanding the Power-to-Performance Capabilities of Intel Processors

There is a popular industry misconception that Intel processors draw more power than Power Architecture and Arm processors. This paper discusses how that is not the case.

04/17/2024
DAR Series Part 3: NSA Type 1 Encryption

DAR Series Part 3: NSA Type 1 Encryption

A Type 1 product is a classified or Controlled Cryptographic Item (CCI) endorsed by the NSA for securing classified and sensitive U.S. government information.

04/02/2024
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the NSA CSfC program, data at rest encryption, capability package, protection profiles, components & layers, and trusted integrators.

03/13/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation.

01/04/2024
Cores & Threads: Hybrid Processors for Today's Multitasking World (Part 2)

Cores & Threads (Part 2): Hybrid Processors for Today's Multitasking World

In this paper, we present performance testing results on Intel hybrid core processors, exploring the performance and efficiency of P-cores vs. E-cores and single-threaded cores vs. hyper-threading cores.

12/08/2023
Cores & Threads: Hybrid Processors for Today's Multitasking World (Part 1)

Cores & Threads (Part 1): Hybrid Processors for Today's Multitasking World

Systems designers must understand the latest enhancements in processing architectures to realize their multiple benefits. The newest multi-core and hybrid-core processors offer enhanced capabilities, including increased processing power and efficiency.

12/07/2023
Solving the Tactical Communications Challenge

Solving the Tactical Communications Challenge

Building connected and workable communications in remote environments presents unique challenges, but the right technology can keep users connected in even contested and harsh environments.

10/03/2023
SOSA UAV

The SOSA Technical Standard and Trusted Computing for Defense Systems

The SOSA Technical Standard combines MOSA principles with security to enable secure sensor processing systems to be quickly developed and deployed in a low-risk environment.

03/09/2023

How to Lower the Cost and Risk of a New Tactical Data Link Solution

By using a proven, easy-to-use, comprehensive technology suite, ROI is increased, and greater capability is delivered with less downtime incurred.

11/15/2022