Advanced INFOSEC Machine (AIM)
GD's Family of Advanced Core Cryptographic Technologies
The Advanced INFOSEC Machine (AIM) is a programmable, embeddable security engine for communications equipment requiring high-grade cryptographic processing. The state-of-the-art AIM chip provides a secure, certified hardware platform that supports interoperability with legacy equipment, as well as modern network-centric systems. AIM II is the next generation successor to the Advanced INFOSEC Machine (AIM).
- NSA Certified
- Multi-security level architecture
- Extensible design supports up to 500 Mbps
- Low power, high performance, fully programmable
- Interoperable with legacy and future systems
AIM Features
AIM II is the next generation successor to the Advanced INFOSEC Machine (AIM). Specifically developed for the Joint Tactical Radio Systems (JTRS) Handheld, Manpack and Small Form Fit (HMS), AIM II enhances many of AIM's proven features like total programmability and adds new capabilities to ease integration into new developments. AIM II is code compatible with AIM so that current investments in AIM-based platforms can be leveraged.
- NSA Certified
- Multi-security level architecture
- Support for single and multi-channel embedments
- Extensible design supports up to 500 Mbps
- Low power, high performance, fully programmable
- Interoperable with legacy and future systems
Applications
- Software definable radios
- Single- and multi-channel radios
- Type 1 and non-Type 1 radios
- Multiple Level Security radios and Network Interface Cards (NIC) HAIPE®
- Legacy crypto replacement
- Crypto Modernization programs
- Homeland security applications
- Avionic (manned and unattended) applications
- JTRS radio products (e.g., marine, vehicle, manpack, handheld, small form fit, airborne, munitions)
- Key management products and applications modules
Algorithms & CEAs
Algorithm and Crypto Equipment Application (CEA) Software
The algorithms and CEAs shown in the table below have been developed to support AIM and AIM II.
Algorithms | |
---|---|
Accordion | Jackknife |
Acme | Joseki |
AES (AIM) | Keesee |
Baton | Mark XII (Cadmus) |
Benign Techniques | Medley |
Crayon | Phalanx |
DES, 3-DES | Saville |
Digital Signature Algorithm (DSA) | SHA-1/256/384/512 |
Elliptic Curve Cryptographic (ECC) | Shillelagh |
Elliptic Curve Digital | Vallor |
Signature Algorithm (ECDSA) | Walburn |
Firefly | Weasel |
Crypto Equipment Application (CEA) Software | |
APCO 25 | KGV-10 |
CCSA | KGV-11 |
FED | KWR-46 |
HAIPE (TACLANE, KG-235) | KY-57/58 |
Havequick I/II | KY-99/100 |
IFF Mode 4 | KYV-5 (ANDVT) |
IFF Mode 5 | MADL |
JPALS* | NES |
KG-84A/C (KIV-7) | Saturn |
KGR-96 | SRW |
KGV-8 | WNW |