Advanced INFOSEC Machine (AIM)

GD's Family of Advanced Core Cryptographic Technologies

The Advanced INFOSEC Machine (AIM) is a programmable, embeddable security engine for communications equipment requiring high-grade cryptographic processing. The state-of-the-art AIM chip provides a secure, certified hardware platform that supports interoperability with legacy equipment, as well as modern network-centric systems. AIM II is the next generation successor to the Advanced INFOSEC Machine (AIM).

  • NSA Certified
  • Multi-security level architecture
  • Extensible design supports up to 500 Mbps
  • Low power, high performance, fully programmable
  • Interoperable with legacy and future systems

AIM Features

AIM II is the next generation successor to the Advanced INFOSEC Machine (AIM). Specifically developed for the Joint Tactical Radio Systems (JTRS) Handheld, Manpack and Small Form Fit (HMS), AIM II enhances many of AIM's proven features like total programmability and adds new capabilities to ease integration into new developments. AIM II is code compatible with AIM so that current investments in AIM-based platforms can be leveraged.

  • NSA Certified
  • Multi-security level architecture
  • Support for single and multi-channel embedments
  • Extensible design supports up to 500 Mbps
  • Low power, high performance, fully programmable
  • Interoperable with legacy and future systems

Applications

  • Software definable radios
  • Single- and multi-channel radios
  • Type 1 and non-Type 1 radios
  • Multiple Level Security radios and Network Interface Cards (NIC) HAIPE­®
  • Legacy crypto replacement
  • Crypto Modernization programs
  • Homeland security applications
  • Avionic (manned and unattended) applications
  • JTRS radio products (e.g., marine, vehicle, manpack, handheld, small form fit, airborne, munitions)
  • Key management products and applications modules

Algorithms & CEAs

Algorithm and Crypto Equipment Application (CEA) Software
The algorithms and CEAs shown in the table below have been developed to support AIM and AIM II.

Algorithms  
Accordion Jackknife
Acme Joseki
AES (AIM) Keesee
Baton Mark XII (Cadmus)
Benign Techniques Medley
Crayon Phalanx
DES, 3-DES Saville
Digital Signature Algorithm (DSA) SHA-1/256/384/512
Elliptic Curve Cryptographic (ECC) Shillelagh
Elliptic Curve Digital Vallor
Signature Algorithm (ECDSA) Walburn
Firefly Weasel
   
Crypto Equipment Application (CEA) Software  
APCO 25 KGV-10
CCSA KGV-11
FED KWR-46
HAIPE (TACLANE, KG-235) KY-57/58
Havequick I/II KY-99/100
IFF Mode 4 KYV-5 (ANDVT)
IFF Mode 5 MADL
JPALS* NES
KG-84A/C (KIV-7) Saturn
KGR-96 SRW
KGV-8 WNW

 


Copyright 2024 General Dynamics Mission Systems, Inc.

A General Dynamics Business