SECURE COMMUNICATION INTEROPERABILITY PROTOCOL (SCIP) by NSA-pdf

SECURE COMMUNICATION INTEROPERABILITY PROTOCOL (SCIP)
The Secure Communication Interoperability Protocol (SCIP) is a communications standard developed bythe National Security Agency (NSA) to enable interoperable secure communications among allies andpartners around the globe.

The SCIP-210 Signaling Plan is the specification that defines the application layer signaling used tonegotiate a secure end-to-end session between two communication devices, independent of networktransport. SCIP negotiates the operational mode (e.g., voice, data, etc.), the cryptographic algorithmsuite (e.g., Suite A, Suite B, etc), and the traffic encryption key used for each secure session. It alsoprovides capabilities for cryptographic synchronization and operational mode control betweencommunicating end-point devices. SCIP is designed to operate over any network and is currently utilizedin devices operating on a wide variety of networks including PSTN, ISDN, CDMA, GSM, IP, and satellite.Potential developers of SCIP devices may contact the NSA SCIP Program Office atSCIP_POC@missi.ncsc.mil for further information. The SCIP-210 Signaling Plan is available withoutrestrictions on its use for the development, manufacture, and sale of SCIP products. Compliance andinteroperability testing will be necessary to ensure secure interoperability between the wide variety of current and future SCIP products

SCIP-210Revision 3.219 December 2007vii

LIST OF FIGURES
Figure 1.6-1 SCIP Application State Diagram – Point-to-Point…………………………………………..11 Figure 1.6-2 SCIP Protocol Layer Diagram – Point-to-Point………………………………………………12 Figure 1.7-1 Process Diagram Symbols……………………………………………………………………………13 Figure 2.1-1(a) Transport Layer Signaling Time Line (Framed)…………………………………………17 Figure 2.1-1(b) Transport Layer Signaling Time Line (Full bandwidth-to-Framed)………………18 Figure 2.1-1(c) Transport Layer Signaling Time Line (Full bandwidth-to-Full bandwidth)……18 Figure 2.1-2 Transmission Frame Group………………………………………………………………………….19 Figure 2.1-3 ESCAPE Processing…………………………………………………………………………………..24 Figure 2.1-4(a) Message Transmission…………………………………………………………………………….31 Figure 2.1-4(b) Message Transmission (Cont.)…………………………………………………………………32 Figure 2.1-5(a) Message Reception…………………………………………………………………………………35 Figure 2.1-5(b) Message Reception (Cont.)……………………………………………………………………..36 Figure 2.2-1(a) FIREFLY Secure Call Setup Signaling Time Line……………………………………..39 Figure 2.2-1(b) PPK Secure Call Setup Signaling Time Line……………………………………………..41 Figure 2.2-2 Capabilities Message Transmission………………………………………………………………57 Figure 2.2-3 Capabilities Message Reception Unique Processing……………………………………….60 Figure 2.2-4 Common Capabilities Message Processing……………………………………………………62 Figure 2.2-5 Parameters/Certificate Message Transmission……………………………………………….70 Figure 2.2-6(a) Parameters/Certificate Message Reception………………………………………………..72 Figure 2.2-6(b) Parameters/Certificate Message Reception (Cont.)…………………………………….73 Figure 2.2-6(c) Parameters/Certificate Message Reception (Cont.)……………………………………..74 Figure 2.2-7 F(R) Message Transmission…………………………………………………………………………79 Figure 2.2-8 F(R) Message Reception……………………………………………………………………………..81 Figure 2.2-9 Cryptosync Message Transmission……………………………………………………………….84 Figure 2.2-10 Cryptosync Message Reception………………………………………………………………….86 Figure 2.3-1(a) Notification Message Signaling Time Line (Full Bandwidth to Framed)……..107 Figure 2.3-1(b) Notification Message Signaling Time Line (Framed to Framed)………………..107 Figure 2.3-1(c) Notification Message Signaling Time Line (Full Bandwidth to FullBandwidth)…………………………………………………………………………………………..107 Figure 2.3-1(d) Mode Change Signaling Time Line………………………………………………………..108 Figure 2.3-1(e) Two-Way Resync Signaling Time Line…………………………………………………..108 Figure 2.3-2 Notification Message Processing (Connection Terminate)…………………………….115 Figure 2.3-3(a) Notification Message Processing (Native Clear Voice/Connection Idle)……..117 Figure 2.3-3(b) Notification Message Processing (Native Clear Voice/Connection Idle)(Cont.)…………………………………………………………………………………………………118 Figure 2.3-4 Notification Message Receive Processing (CKL Transfer)…………………………….124 Figure 2.3-5 Notification Message Processing (Secure Dial)……………………………………………126 Figure 2.3-6 Notification Message Processing (Attention)……………………………………………….130 Figure 2.3-7 Notification Message Processing (Secure Update)………………………………………..133 Figure 2.3-8 Mode Change Processing…………………………………………………………………………..135 Figure 2.3-9 Two-Way Resync Processing…………………………………………………………………….140 Figure 3.2-1 Application Timeout Processing…………………………………………………………………151 Figure 3.3-1 Secure MELP Voice Transmission Format – Blank and Burst……………………….154 Figure 3.3-2 Sync Management Frame Format – Blank and Burst…………………………………….154

SCIP-210Revision 3.219 December 2007vii

LIST OF FIGURES
Figure 1.6-1 SCIP Application State Diagram – Point-to-Point…………………………………………..11 Figure 1.6-2 SCIP Protocol Layer Diagram – Point-to-Point………………………………………………12 Figure 1.7-1 Process Diagram Symbols……………………………………………………………………………13 Figure 2.1-1(a) Transport Layer Signaling Time Line (Framed)…………………………………………17 Figure 2.1-1(b) Transport Layer Signaling Time Line (Full bandwidth-to-Framed)………………18 Figure 2.1-1(c) Transport Layer Signaling Time Line (Full bandwidth-to-Full bandwidth)……18 Figure 2.1-2 Transmission Frame Group………………………………………………………………………….19 Figure 2.1-3 ESCAPE Processing…………………………………………………………………………………..24 Figure 2.1-4(a) Message Transmission…………………………………………………………………………….31 Figure 2.1-4(b) Message Transmission (Cont.)…………………………………………………………………32 Figure 2.1-5(a) Message Reception…………………………………………………………………………………35 Figure 2.1-5(b) Message Reception (Cont.)……………………………………………………………………..36 Figure 2.2-1(a) FIREFLY Secure Call Setup Signaling Time Line……………………………………..39 Figure 2.2-1(b) PPK Secure Call Setup Signaling Time Line……………………………………………..41 Figure 2.2-2 Capabilities Message Transmission………………………………………………………………57 Figure 2.2-3 Capabilities Message Reception Unique Processing……………………………………….60 Figure 2.2-4 Common Capabilities Message Processing……………………………………………………62 Figure 2.2-5 Parameters/Certificate Message Transmission……………………………………………….70 Figure 2.2-6(a) Parameters/Certificate Message Reception………………………………………………..72 Figure 2.2-6(b) Parameters/Certificate Message Reception (Cont.)…………………………………….73 Figure 2.2-6(c) Parameters/Certificate Message Reception (Cont.)……………………………………..74 Figure 2.2-7 F(R) Message Transmission…………………………………………………………………………79 Figure 2.2-8 F(R) Message Reception……………………………………………………………………………..81 Figure 2.2-9 Cryptosync Message Transmission……………………………………………………………….84 Figure 2.2-10 Cryptosync Message Reception………………………………………………………………….86 Figure 2.3-1(a) Notification Message Signaling Time Line (Full Bandwidth to Framed)……..107 Figure 2.3-1(b) Notification Message Signaling Time Line (Framed to Framed)………………..107 Figure 2.3-1(c) Notification Message Signaling Time Line (Full Bandwidth to FullBandwidth)…………………………………………………………………………………………..107 Figure 2.3-1(d) Mode Change Signaling Time Line………………………………………………………..108 Figure 2.3-1(e) Two-Way Resync Signaling Time Line…………………………………………………..108 Figure 2.3-2 Notification Message Processing (Connection Terminate)…………………………….115 Figure 2.3-3(a) Notification Message Processing (Native Clear Voice/Connection Idle)……..117 Figure 2.3-3(b) Notification Message Processing (Native Clear Voice/Connection Idle)(Cont.)…………………………………………………………………………………………………118 Figure 2.3-4 Notification Message Receive Processing (CKL Transfer)…………………………….124 Figure 2.3-5 Notification Message Processing (Secure Dial)……………………………………………126 Figure 2.3-6 Notification Message Processing (Attention)……………………………………………….130 Figure 2.3-7 Notification Message Processing (Secure Update)………………………………………..133 Figure 2.3-8 Mode Change Processing…………………………………………………………………………..135 Figure 2.3-9 Two-Way Resync Processing…………………………………………………………………….140 Figure 3.2-1 Application Timeout Processing…………………………………………………………………151 Figure 3.3-1 Secure MELP Voice Transmission Format – Blank and Burst……………………….154 Figure 3.3-2 Sync Management Frame Format – Blank and Burst…………………………………….154

SCIP-210Revision 3.219 December 2007vii

LIST OF FIGURES
Figure 1.6-1 SCIP Application State Diagram – Point-to-Point…………………………………………..11 Figure 1.6-2 SCIP Protocol Layer Diagram – Point-to-Point………………………………………………12 Figure 1.7-1 Process Diagram Symbols……………………………………………………………………………13 Figure 2.1-1(a) Transport Layer Signaling Time Line (Framed)…………………………………………17 Figure 2.1-1(b) Transport Layer Signaling Time Line (Full bandwidth-to-Framed)………………18 Figure 2.1-1(c) Transport Layer Signaling Time Line (Full bandwidth-to-Full bandwidth)……18 Figure 2.1-2 Transmission Frame Group………………………………………………………………………….19 Figure 2.1-3 ESCAPE Processing…………………………………………………………………………………..24 Figure 2.1-4(a) Message Transmission…………………………………………………………………………….31 Figure 2.1-4(b) Message Transmission (Cont.)…………………………………………………………………32 Figure 2.1-5(a) Message Reception…………………………………………………………………………………35 Figure 2.1-5(b) Message Reception (Cont.)……………………………………………………………………..36 Figure 2.2-1(a) FIREFLY Secure Call Setup Signaling Time Line……………………………………..39 Figure 2.2-1(b) PPK Secure Call Setup Signaling Time Line……………………………………………..41 Figure 2.2-2 Capabilities Message Transmission………………………………………………………………57 Figure 2.2-3 Capabilities Message Reception Unique Processing……………………………………….60 Figure 2.2-4 Common Capabilities Message Processing……………………………………………………62 Figure 2.2-5 Parameters/Certificate Message Transmission……………………………………………….70 Figure 2.2-6(a) Parameters/Certificate Message Reception………………………………………………..72 Figure 2.2-6(b) Parameters/Certificate Message Reception (Cont.)…………………………………….73 Figure 2.2-6(c) Parameters/Certificate Message Reception (Cont.)……………………………………..74 Figure 2.2-7 F(R) Message Transmission…………………………………………………………………………79 Figure 2.2-8 F(R) Message Reception……………………………………………………………………………..81 Figure 2.2-9 Cryptosync Message Transmission……………………………………………………………….84 Figure 2.2-10 Cryptosync Message Reception………………………………………………………………….86 Figure 2.3-1(a) Notification Message Signaling Time Line (Full Bandwidth to Framed)……..107 Figure 2.3-1(b) Notification Message Signaling Time Line (Framed to Framed)………………..107 Figure 2.3-1(c) Notification Message Signaling Time Line (Full Bandwidth to FullBandwidth)…………………………………………………………………………………………..107 Figure 2.3-1(d) Mode Change Signaling Time Line………………………………………………………..108 Figure 2.3-1(e) Two-Way Resync Signaling Time Line…………………………………………………..108 Figure 2.3-2 Notification Message Processing (Connection Terminate)…………………………….115 Figure 2.3-3(a) Notification Message Processing (Native Clear Voice/Connection Idle)……..117 Figure 2.3-3(b) Notification Message Processing (Native Clear Voice/Connection Idle)(Cont.)…………………………………………………………………………………………………118 Figure 2.3-4 Notification Message Receive Processing (CKL Transfer)…………………………….124 Figure 2.3-5 Notification Message Processing (Secure Dial)……………………………………………126 Figure 2.3-6 Notification Message Processing (Attention)……………………………………………….130 Figure 2.3-7 Notification Message Processing (Secure Update)………………………………………..133 Figure 2.3-8 Mode Change Processing…………………………………………………………………………..135 Figure 2.3-9 Two-Way Resync Processing…………………………………………………………………….140 Figure 3.2-1 Application Timeout Processing…………………………………………………………………151 Figure 3.3-1 Secure MELP Voice Transmission Format – Blank and Burst……………………….154 Figure 3.3-2 Sync Management Frame Format – Blank and Burst…………………………………….154

SCIP-210Revision 3.219 December 2007viii
LIST OF FIGURES (Cont.)
Figure 3.3-3 Secure MELP Voice Transmission Format – Burst w/o Blank……………………….159 Figure 3.3-4 Sync Management Frame Format – Burst w/o Blank…………………………………….159 Figure 3.3-5 Clear MELP Voice Transmission Format…………………………………………………….163 Figure 3.3-6 Clear MELP Voice Sync Management Frame Format…………………………………..163 Figure 3.3-7 Secure G.729D Voice Transmission……………………………………………………………166 Figure 3.3-8 Secure G.729D Voice Superframe Details…………………………………………………..167 Figure 3.3-9 Secure G.729D Voice Escape and Return Example (No Cryptosync)……………..167 Figure 3.3-10 Secure G.729D Voice Sync Management Frame Format……………………………..169 Figure 3.3-11 Secure G.729D Voice Encrypted Speech Frame Header………………………………170 Figure 3.4-1 Secure RT Asynchronous Data Message Preparation…………………………………….174 Figure 3.4-2 V.14 Asynchronous Data Input Ordering…………………………………………………….175 Figure 3.4-3 Secure BET Asynchronous Data Transmission Format…………………………………178 Figure 3.4-4 Secure BET Asynchronous Data Superframe Structure…………………………………179 Figure 3.4-5 Sync Management Frame Format……………………………………………………………….180 Figure 3.4-6 V.14 Asynchronous Data Input Ordering…………………………………………………….180 Figure 4.1-1 Rekey Protocol Conversion Using the GRFE……………………………………………….184 Figure 4.1-2 Electronic Rekey System Infrastructure………………………………………………………185 Figure 4.2-1 SCIP Rekey Message Preparation……………………………………………………………….186 Figure 5.1-1 Multipoint Transport Signaling Timeline…………………………………………………….191 Figure 5.1-2 Multiple Multipoint Cryptosync Message Transmissions………………………………192 Figure 5.2-1 SCIP Multipoint State Diagram………………………………………………………………….197 Figure 5.2-2 Multipoint Secure Voice Transmit Signaling Time Line………………………………..198 Figure 5.2-3 Multipoint Cryptosync Message Transmission……………………………………………..200 Figure 5.2-4 Multipoint MELP Voice Transmission Format – Blank and Burst………………….202 Figure 5.2-5 End of Multipoint Secure Traffic Transmission……………………………………………203 Figure 5.2-6 Multipoint Cryptosync Message Reception………………………………………………….205 Figure 5.2-7 Multipoint Secure Voice Traffic Reception………………………………………………….206 Figure 5.2-8 Multipoint Late Entry Cryptographic Synchronization………………………………….208 Figure 5.2-9 End of Multipoint Secure Traffic Reception…………………………………………………209 Figure B-1 DTX Voice………………………………………………………………………………………………..B-1

Advertisements

About irmedeaca


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Well Balanced Blog

Take Control of Your Own Health!

Έγκλημα και Τιμωρία/Crime and Punishment/Crime et Châtiment/Delitto e castigo/Преступление и наказание

CRIME DOES NOT PAY... PLUS, THE BUTLER DID IT! AND REMEMBER: WHAT DOESN'T KILL YOU, WILL -MOST LIKELY- TRY AGAIN... AND DON'T FORGET: TODAY IS A GOOD DAY FOR SOMEONE ELSE TO DIE.

BanTheBBC Blog

A constant reminder that life would be so much better without the BBC's TV Licence Gestapo

Healthy At Any Age

Welcome to June Rousso's Blog !

iGlinavos

Thoughts of a recovering leftist

Scottish Gaelic

Word a Day

NEO INKA - ΣΕ ΠΡΟΣΤΑΤΕΥΕΙ, ΔΥΝΑΜΩΣΕ ΤΟ!!!

ΓΙΝΕ Ο ΕΠΟΜΕΝΟΣ ΚΡΙΚΟΣ ΣΤΟ ΔΙΚΤΥΟ.

Talk of the Tail

"Tails" from pets searching for their forever home.

ultimatemindsettoday

A great WordPress.com site

Are You Finished Yet?

Alea Jacta Est

Watts Up With That?

The world's most viewed site on global warming and climate change

Levi Quackenboss

Putting the boss in quack.

I shouldn't have left Wonderland

Ir's diary of deficient years

KXAN.com

Austin News & Weather - Austin Texas, Round Rock, TX

Unstrange Mind

Remapping My World

psychinfo.gr

ΛΙΝΑ ΨΟΥΝΗ • psouni@gmail.com • www.psychinfo.gr

Wee Ginger Dug

Biting the hand of Project Fear

%d bloggers like this: