SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Microcap & Penny Stocks : CYCOMM (CYII)-on aquisition trail

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: James W. Bradsh who wrote (960)1/12/1998 1:26:00 AM
From: Robert Morrison  Read Replies (1) of 1800
 
Jim, Kimrric. Hardware encryption is the only encryption standard accepted by the NSA. Why hardware encryption instead of software or file encryption? The reasons are many: (1) software encryption uses up a lot of file space and processing capability and therefore is much slower than hardware or drive encryption; (2) file encryption means the parties to the transmission must know what they are doing to properly encrypt and de-cipher the file (eg use the right/same software whereas drive encryption is a no-brainer - just plug in the encryption unit(s) and anyone can use it; (3) file encryption must rely on disc-drives for processing the encrypted message eg. computer hard disc or floppy ports which boom out electomagnetic signals easily scanned whereas drive encryption is encased normally two ways (a) on say a VLSI chip with special coatings which will cause erasure if the coating is tampered with and/or (b) TEMPEST standard shielding so that scanners cannot read the electomagnetic radiation coming from the hardware encryption unit or computer hard drive and break the cipher.

What does all this mean for Cycomm? It means at NSA and military levels of encrption (ie TEMPEST) Cycomm has the perfect mix of technologies to fully encrypt high level wireless transmissions between the PC Mobile and base stations or other PC Mobiles. So with Cycomm's subsidiary Valcomm having the highest level of security clearance (by the way they were working on a F15 project recently weren't they?) there is a logical pathway toward Cycomm offering a complete off-the-shelf solution to military and government agencies. In other words Cycomm building their proprietory encryption capability into the TEMPEST standard product instead of say the NSA buying a TEMPEST computer and then having to pull it apart to include the hardware encryption they require for NSA standards.

Once you have disassembled a TEMPEST computer you have to have it TEMPEST tested again which means putting it in a Faraday box and checking for electromagnetic emissions all over again (and probably blowing your product guarantee).

Imagine a PC Mobile built to TEMPEST standard offering inbuilt encryption vocal and data communications along the whole chain of command from platoon level to divisional command and transport support groups and you are talking BIG potential for military contracts with the US and NATO forces.

The big problem with encryption in the commercial market is nobody knows what it is and therefore only cares if it says "encrypted". With the military and other government agencies they are very certain of what level of encryption they need and are willing to pay for it.

Rob

Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext