Advanced INFOSEC Machine (AIM)

GD's Family of Advanced Core Cryptographic Technologies

The Advanced INFOSEC Machine (AIM) is a programmable, embeddable security engine for communications equipment requiring high-grade cryptographic processing. The state-of-the-art AIM chip provides a secure, certified hardware platform that supports interoperability with legacy equipment, as well as modern network-centric systems. AIM II is the next generation successor to the Advanced INFOSEC Machine (AIM).

  • NSA Certified
  • Multi-security level architecture
  • Extensible design supports up to 500 Mbps
  • Low power, high performance, fully programmable
  • Interoperable with legacy and future systems

AIM Features

AIM II is the next generation successor to the Advanced INFOSEC Machine (AIM). Specifically developed for the Joint Tactical Radio Systems (JTRS) Handheld, Manpack and Small Form Fit (HMS), AIM II enhances many of AIM's proven features like total programmability and adds new capabilities to ease integration into new developments. AIM II is code compatible with AIM so that current investments in AIM-based platforms can be leveraged.

  • NSA Certified
  • Multi-security level architecture
  • Support for single and multi-channel embedments
  • Extensible design supports up to 500 Mbps
  • Low power, high performance, fully programmable
  • Interoperable with legacy and future systems

Applications

  • Software definable radios
  • Single- and multi-channel radios
  • Type 1 and non-Type 1 radios
  • Multiple Level Security radios and Network Interface Cards (NIC) HAIPE­®
  • Legacy crypto replacement
  • Crypto Modernization programs
  • Homeland security applications
  • Avionic (manned and unattended) applications
  • JTRS radio products (e.g., marine, vehicle, manpack, handheld, small form fit, airborne, munitions)
  • Key management products and applications modules

Algorithms & CEAs

Algorithm and Crypto Equipment Application (CEA) Software
The algorithms and CEAs shown in the table below have been developed to support AIM and AIM II.

Algorithms  
Accordion Jackknife
Acme Joseki
AES (AIM) Keesee
Baton Mark XII (Cadmus)
Benign Techniques Medley
Crayon Phalanx
DES, 3-DES Saville
Digital Signature Algorithm (DSA) SHA-1/256/384/512
Elliptic Curve Cryptographic (ECC) Shillelagh
Elliptic Curve Digital Vallor
Signature Algorithm (ECDSA) Walburn
Firefly Weasel
   
Crypto Equipment Application (CEA) Software  
APCO 25 KGV-10
CCSA KGV-11
FED KWR-46
HAIPE (TACLANE, KG-235) KY-57/58
Havequick I/II KY-99/100
IFF Mode 4 KYV-5 (ANDVT)
IFF Mode 5 MADL
JPALS* NES
KG-84A/C (KIV-7) Saturn
KGR-96 SRW
KGV-8 WNW

 

  • Features

    AIM Features

    AIM II is the next generation successor to the Advanced INFOSEC Machine (AIM). Specifically developed for the Joint Tactical Radio Systems (JTRS) Handheld, Manpack and Small Form Fit (HMS), AIM II enhances many of AIM's proven features like total programmability and adds new capabilities to ease integration into new developments. AIM II is code compatible with AIM so that current investments in AIM-based platforms can be leveraged.

    • NSA Certified
    • Multi-security level architecture
    • Support for single and multi-channel embedments
    • Extensible design supports up to 500 Mbps
    • Low power, high performance, fully programmable
    • Interoperable with legacy and future systems
  • Applications

    Applications

    • Software definable radios
    • Single- and multi-channel radios
    • Type 1 and non-Type 1 radios
    • Multiple Level Security radios and Network Interface Cards (NIC) HAIPE­®
    • Legacy crypto replacement
    • Crypto Modernization programs
    • Homeland security applications
    • Avionic (manned and unattended) applications
    • JTRS radio products (e.g., marine, vehicle, manpack, handheld, small form fit, airborne, munitions)
    • Key management products and applications modules
  • Specifications

    Algorithms & CEAs

    Algorithm and Crypto Equipment Application (CEA) Software
    The algorithms and CEAs shown in the table below have been developed to support AIM and AIM II.

    Algorithms  
    Accordion Jackknife
    Acme Joseki
    AES (AIM) Keesee
    Baton Mark XII (Cadmus)
    Benign Techniques Medley
    Crayon Phalanx
    DES, 3-DES Saville
    Digital Signature Algorithm (DSA) SHA-1/256/384/512
    Elliptic Curve Cryptographic (ECC) Shillelagh
    Elliptic Curve Digital Vallor
    Signature Algorithm (ECDSA) Walburn
    Firefly Weasel
       
    Crypto Equipment Application (CEA) Software  
    APCO 25 KGV-10
    CCSA KGV-11
    FED KWR-46
    HAIPE (TACLANE, KG-235) KY-57/58
    Havequick I/II KY-99/100
    IFF Mode 4 KYV-5 (ANDVT)
    IFF Mode 5 MADL
    JPALS* NES
    KG-84A/C (KIV-7) Saturn
    KGR-96 SRW
    KGV-8 WNW

     

  • Literature

Back to top