Adaza Netcom Latest Profile

  • Uploaded by: mohd khair bin othman
  • 0
  • 0
  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Adaza Netcom Latest Profile as PDF for free.

More details

  • Words: 2,645
  • Pages: 16
Adaza Netcom Sdn Bhd is the ICT Company which has experience and expertise in planning and developed a system more converging towards intelligence, forensic and inside applications investigation concept and counter intelligence. A highly qualified staffs in ICT field and intelligence skills are successfully brought our corporate image into a new dimension and indirectly has created a competitive market. • •

• • • •

Get tender supply of ICT equipment to Intelligence Branch, Army Base, and Ministry of Defense. (Develop database security system and database tactical system). Supply ICT equipment to Intelligence Branch, Army Base, Ministry of Defense involving Intelligence Fusion Center's developments(IFC) namely data combination from various intelligence source and open-source by real time. Fed, install and commissioning system biometric access to National Heart Institute in the month of March 2009. Expertise in ICT FORENSIC field. Expertise in ICT and counter intelligence field. Having business network with a couple foreign companies such as Mills Electronic which operates in Innsbruck, Austria for crypto systems development in process data transmission and Sail Labs Technology, Vienna, Austria in translation system implementation audio by real time. Adaza NetCom Sdn Bhd is also capable of supplying intelligence special equipment and associates with a few foreign companies such as in German, UK, Iran, USA and China in market the equipment in Malaysia.

Introduction Mils system 700 is a cipher and communication system that able to handle information exchange and image inside the network securely by using personal computer (PC) or notebook. System basic formation Basic peripheral used to create Mils System 700 is from a PC or notebook that had been transformed to a cipher machine using ”Key Module M775” that the Mills Electronic company had created. The Key Module had been created with the PCMCIA Standards that can be loaded to varieties of computers or notebooks with condition of using suitable adaptor. To make the Mils system functions as mentioned above, it requires PC with the minimum specification of IBM compatible Personal Computer 386. Hardware Consumers have the option to choose PC type from Desktop/Laptop/Notebook or which was made specifically for military configuration. Using notebook is suitable for mobile operation while desktop suitable for static application. Besides from specific software Mils Electronic used in the computer, application program used is user-friendly and its using WINDOW operating system. From handling aspect, Mils system 700 is easily understood and easy to be handled by consumer.

WORKING CONCEPT IN NETWORK This system are made up from two kinds, namely usual consumer station(static or mobile) equipped with cipher tool while another is individual, which often moved to external work without complete equipment. This individual consumer can use any cipher station in the network only with the use of "Key Module" (PCMCIA Card) that programmed for personal use to relate safely with the desired station. Thereby, he doesn’t need to bring "M730 Terminal" physically when working outstation. This network also able to handle many cipher stations suit to consumer configuration. NETWORK INFORMATION EXCHANGE PATTERN Network pattern can be formed to contain a few "Link" or "Complex Structures" such as "Pointto-Point Link", "Orcular link" and "Emergency link". Consumer have the freedom of determine network pattern follow own organisation. SECURED INFORMATION EXCHANGE NETWORK To create safety of the network, this system needs two station type which consists of cipher stations and network manager station. Role played by each "subsystem" were as follows.

a.Cipher Machine . This machine supplied to every station used to provide information "text" and image, edit, encrypt, decrypt and send "ciphertext" out or vice-versa via needed media of necessity. Choice of encryption can either be "One- Time-Key" (OTK), " Internal Key Generator" (IKG)or "Emergency" subject to operator’s choice and the current system usage policy. b. Network Manager . It is located Off-line, responsible as administrator and control the whole network. Its role is preparing and distributing key, and supervises each cipher machine that joins the network. "Network Manager" is also a personal computer that equipped with "Noise Card" to generate OTK key for distribution and cipher stations use. For confirmation that OTK key is "Random" several tests loaded into M705:(1) "Character Frequency Testll. (2) "Bit Frequency Test". (3) "Run Test". (4) "Serial Correlation Test". (5) "Poker Test".

"TAMPER PROOF" "Key Module" is a PCMCIA card equipped with "micro processor" and "access protected memory". Same with cryptography "algorithm" and secret key kept in that card have been pinned with self-defence system (tamper proof). All data in the card will be lost, if there is any threat establish by physical or hack its content. Hardware and related software with Mils system 700 will also not function without that card. Indirectly, the system security can be defended easily and suitable for strategic and tactical operation use. KEY TO ENCRYPT INFORMATION Mils system 700 offers two separate cryptology system, namely "Unbreakable Random" OTK and "Proprietry stream cipher algorithm" IKG in order to meet strategic security needs and tactical. Consumer may prescribe high classification information use OTK while low classification information or image using IKG. KEY MANAGEMENT Key management and preparation centrally made and administer network. Management Manager/network would use "Network Manager" (M705) to provide OTK key and will test "randomness" before being channeled to consumer station by "Off-line" or "On-line" followed by consumer safety directions.

SYSTEM APPLICATION Consumer be given option either to have Mils system 700 work by "On-line" or "Off-line". That system application is up to the work requirement and comfort picked by consumer. ELECTRONICALLY SYSTEM PROCESSING Mils system 700 does not require various kind of documents, but this system need to be matched according to consumer needs and all processing was done by system electronically and automatic. This system boosting consumer changed paradigm from "conventional system" to "paperless system" work culture. MEDIA ROUTING "Opheltext" that have been processed can be sent and accepted through various kinds routing telecommunication service media. Consumer has the flexibility to determine the way of information channeled and also controls consumers by limiting type of permitted media only. ACCESS SYSTEM System also give the option to allow "Network Manager" when necessary to obtain route to enter the system in order to control consumer if organization security policy allow that route.

TRAINING PERIOD Design and software supplied to Mils System 700 easy to understand and handle. For normal consumer, he/she would just needs two or three days of training to know and run the system. COMPOSITION AND FEATURE 700 SYSTEM 16. Mils system's composition 700 include modules and features following: a. M705 (NETWORK MANAGER) . It is a management system responsible in implementing overall management and handling of systems. Between this role and system function was: (1) Programming PCMCIA card for use station. (2) Produce and test by key statistic "Random" for OTK's system, IKG and key emergency obtained through "Noise Card". (3) Build and coordinate overall stations in network. (4) Key distribution to station in network. (5) Oversee entire network.

b. M 775 (KEY MODULE) . It is a PCMCIA card built up with new technology to prevent any attempt to hack information found inside either logically or physical ("Tamper Resistant"). In PCMCIA also kept rescued information including ID station, IKG key, Emergency Key and "Cryptographic Check Sum Value" used to prevent any change made on system via "Horse Trojan", Logic Bomb, Virus", etc. This card have security features thwarted every detailed information from being read, instead of only allow to be applied solely. c. M 730 ("CIPHER MACHINE'1). It was computer software which is used to send and received information of network station.This software responsible to coordinate the necessary security level and routing type that would be used subject to operator’s need. Delivery or decoder that had been rescued through this system could be made through a few media type which encompasses: (1) Through telephone modem line. (2) Through telex service. (3) Through modem radio. (4) Through Line Switched Data Services -x.21. (5) Through Packet Switched Data Services -x. 25. (6) Through electronic mail -x.400. (7) THrough ISDN network. (8) Through satellite. (9) Through baudot format atau punch tape.

MILS 700 KEY's METHOD 17. Security cryptography applies in Mils system 700 is such as : a. QIK . Key method in this most important system is OTK which is recognized as a most safe cryptography system in the world. To make it easy to understand, this OTK's system is defined as a system which need to keep features as following: (1) Key withdrawn at random and tested by statistic to determine it is fully random. (2) Key do not repeat and do not have any pattern or rule. (3) Bit volume in key equal the length with the bit that are included in envoy. (4) The key that had been used will be deleted automatically. b. Other than that, this system also equipped with cryptography system named "Internal Key Generator” (IKG) which also have features entirely random in key issued. It is used to rescue information which possess lower security level. c. Emergency key .With both system mentioned above, this system also also provide with emergency key used to communicate with stations which had no relationship with OTK key. This enable it to be used during emergency and when one system that have OTK relationship could not contact.

OTHER SECURITY FEATURE 18. Other than cipher system that was explained above, this system have a few security features used in order to to be sure all key and major features which include inside it, is safe if this system is stolen or sank into enemies hand. Between security features and algorithm resides within this system is as following: a. Data Protection System (DPS} . It is an algorithm used to bail OTK key if it fell into foreign party’s hand or duplicated by foreign party. Its main function are blocking enemy from obtaining the OTK's key. b. Message Authentication System (MAS). In short, this algorithm is applied to ensure that any envoy received is emanate from station that had fixed and it has been undisturbed or being transformed during intransmission. Its function is similar to digital signature concept system but use function hash to ensure validity each envoy received.

OTK CRIPTOGRAPHY KEY CONCEPT 19. One Time Letter Pad {OTLP} . Through development history of cryptology technology, One Time Letter Pad key's concept (OTLP)serves to encrypt and decrypt information, it is the safest cryptography system in past age. This concept also already used in modern technique cipher system which called by now cryptography OTK system. Through technological capability, by using "Noise Card" will be able to produce cipher key in form of cipher stream which his key not recurring (True random key) keep OTK's features. This cyrptology technique were made and developed by Mils Electronic until they can create Mils 700 cipher system to use cryptography OTK system. 20. Strong Evidences of OTK System. Concept key of cryptography system OTK is 'Unbreakable Key" is based on experience practical and perusal (empiricial explanation) or mathematical proof from inside experts cryptology field mathematics and other. This fact is was conceded by that experts in book written own by them as : a. "Cipher System, The Protection of Communication" by Henery Beker and Fred Piper . b. The Codebreakers by David Kahn. 21. Network Concept . This network concept is through point to point relationship where consumer station can use variety of transmission media to communicate.

22. Key Management .OTK key's management committed by Network Manager to this system. Preparation process key and management is easy and no need procedure or document particular document. This management does not require many member , even management member could be reduced. 23. Operation instructions .Behalf consumer safety and management user guide must produce one operation instructions key tool and management M705 and M730. SECURITY 24. Real Security (TransDarency) .System 700 is terminal cipher and communication able to exchange message meaning safely (secure). Its Cryptography Algorithm development based on the latest technology. 25. Design principle .This system is based on personal computer and switched to be cipher terminal with the use of PCMCIA KAD and specially designed software.Its process involve text message preparation which uses suitable key, which is necessary to be protected and rescued.. As such, key, algorithm and secret key is controlled and protected with special security featureshave been pinned in PCMCIA KAD, that had modified. Although this card are available in open market, without those special features that specially designed by Mils Elektronik, that system would not function or its datas will be lost, if there is attempt threattrespassing that system. 26. Key .With this , the key can be made by consumer and free from supplier side knowledge.

27 System Function Protected .Each system and process which need rescued (secure) with technology cryptography, would be built with special algorithm protect that function. 28. General Information .Through general reading process, information on OTK concept is applied in Mils system 700 to process ciphertext is known by populace in the countries and overseas. They also know that general information on OTK concept is "Unbreakable Key" since its discovery hundreds year earlier and this concept strength remain sophisticated in latest cryptology technology.

Pros and cons 29. Pros .Mils system 700 displayed advantages as follows. A. Technology user cryptography OTK key's system (Unbreakble Key) to protect strategic information and tactical so that can be channeled safely and the system is certified secured and the information will be secured. B. This system has two technology method of encrypt namely OTK and IKG and Multi Hierarchy Protection to protect stored data in a cipher equipment known as DPS and MAS. This layers of security is have made this system’ immunity increased. C. Tempest proof features held in that system, to check act of sabotaging on system, where all system data will be lost and also may not be copied or being diverted. D. This system also can be adapt with transmission multimedia provided by consumer such as modem telephone, radio (HF, VHF, UHF), telex, e'mail, packet switched data and lain-Iain ISDN service / PSTN. Give consumer choices and flexibility in routing process information. E. Management having flexibility and option for re-configuring work stations to work in network (STAR network topology, TREE or RING), or point to point follow organization need. F. Operating system based on Windows which is easy to understand and maneuver by consumer.

G. Key system crypto OTK cannot be penetrated or broken up by "crypto analyst" expert compared to cipher which uses encrypt technique "pseudo random" or other technique in the market. H. Key Module is PCMCIA CARD which contains micro computer and access protection memory contrasts with the one found in the market. In fact all algorithm cryptography and other keys are safe to keep in that card. I. Computer equipment used together with Mils 700 is from the standard type and with PCMCIA card usage will convert it from a simple computer into cipher system. J. All keys are needed to run with Mils 700 system is housed in PCMCIA card and key diskette. Thus consumers don’t need to determine various documentation management key. K. Paperless concept and shift paradigm in work culture from system conventional to computerized working style can achieved. L. Mils Electronic tool manufacturer cryptography which uses OTK system was a private company and not tied to any organization and policies which control controlled export goods to other countries. M. All encrypt and decrypt process in Mils 700 system is being implemented automatically. N. System that is compatible by all PCs. O. Have options for cryptography key preparation to made by off line or on line. P. Generating cryptography key process and master key is by consumers decisionl and not subject to supplier. Q. Handling crypto course implementation period which merely take time 3 to 4 days.

30. Cons .Overall, there is almost no indications of weaknesses identified in Mils system 700. Weakness can be identified from attitude / consumer practice.

Related Documents

1993 - Netcom
August 2019 22
Latest
May 2020 39
Latest
October 2019 57
Latest
April 2020 34

More Documents from ""