Information Technology
- Overview: Information Technology
- DoD Information Enterprise
- Information Operations (IO)
- Information Support Plan (ISP)
- Information Assurance (IA)
- Information Assurance Policy Map
- Acquisition Information Assurance Strategy
- Automated Information System (AIS)
- Clinger-Cohen Act
- Compliance with Information Enterprise
- Computer Security (COMPUSEC)
- Configuration Management Information System (CMIS)
- CyberSecurity Strategy
- Cyberspace
- Defense Business System (DBS)
- Defense Information System Agency
- DoD Enterprise Architecture
- DoD Enterprise Software Initiative
- DoD Information Assurance Certification & Accreditation Process (DIACAP)
- DoD Information Enterprise
- DoD Information Enterprise Architecture
- DoD Information Sharing Strategy
- DoD IT Portfolio Repository (DITPR)
- DoD IT Standards and Profile Registry
- DoD Metadata Registry
- DoD NetOps Strategic Vision
- DoD Public Key Infrastructure
- Electronic Data Interchange (EDI)
- Federal Risk and Authorization Management Program
- Global Information Grid (GIG)
- Information Assurance (IA)
- IA Content in a Request for Proposal
- IA Services in the Acquisition Strategy
- Information Resource Management
- Information Superiority
- Information Support Plan (ISP)
- Information Support Plan (ISP) Analysis
- Information Operations (IO)
- IT Acquisition Board (ITAB)
- Information Technology Maintenance
- Initial Technical Review (ITR)
- Joint Interoperability Test Certification & Validation
- Linux Operating System
- Major Automated Information System
- Mission Assurance Category
- Net-Centric Data & Service Strategy
- Net-Centric Operations
- Net-Ready Key Performance Parameter
- Net-Ready KPP Checklist
- Reference Architecture (RA)
Information Technology
DoD Public Key Infrastructure

A Cryptography Key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the particular transformation of plaintext into ciphertext, or vice versa during decryption. Keys are also used in other cryptographic algorithms, such as digital signature schemes and message authentication codes. Most keys are small and generated a truly randomly and contain sufficient entropy. This is to prevent a key from being guessed. [1] 

The DoD implements the DoD Public Key Infrastructure (PKI) and the DoD Coalition PKI to satisfy operational needs and requirements. The PKI framework and service provides for the generation, production, distribution, control, accounting, and destruction of PK certificates. These PKIs are operated by the DoD PKI Program Management Office (PMO) and are certified and accredited in accordance with DoD Instruction 8510.01 "DoD Information Assurance Certification and Accreditation Process (DIACAP)".  

PKI provides an encryption capability and can be a tool for complying with encryption requirements in DoD Instruction 8520.01 “Public Key Infrastructure (PKI) and Public Key (PK) Enabling”. If an information system uses PKI for encryption of information in transit or at rest, then that system shall follow DoD Information Security Program policy, DoD Instruction 5200.01 "DoD Information Security Program and Protection of Sensitive Compartmented Information".  

The Common Access Card (CAC) is the primary hardware token for identifying individuals for logical access to NIPRNET resources and physical access to DoD facilities. The CAC hardware token protects the private keys associated with identity, authentication, signature, and encryption certificates issued by the DoD PKI for use in unclassified environments.  

The Department of Defense (DoD) Approved Cryptography Encryption Levels:


Approved cryptography consists of three (3) certified components:
  1. An approved algorithm
  2. An implementation that as been approved for the protection of classified information in a particular environment; nearly always a dedicated device
  3. A supporting key management infrastructure



AcqLinks and References:
- DoD Instruction 8520.01 “Public Key Infrastructure (PKI) and Public Key (PK) Enabling” 24 May 2011
- DoD Instruction 8510.01 Risk Management Framework (RMF) for DoD Information Technology (IT) - 12 Mar 2014
- DoD Instruction 5200.01 "DoD Info Security Program and Protection of Sensitive Compartmented Info" - 13 Jun 11
- Presentation: Sample U.S. Government Cryptography and Key Management Methods and Policies
- [1] Website: Wikipedia - Key (Cryptography)

Click Here!


Click Here!