Site icon Liquidmatrix Security Digest

DOD Using ‘Stealth’ To Secure The Clouds

The DoD is locking down its tubes with some new crypto it would appear. In an effort to move into cloud computing in earnest within the DoD there is a move afoot to layer in security.

OK, I’m listening.

From GCN.com:

The new cryptographic technology enables the convergence of various Defense Department Global Information Grid networks that operate at different security levels, which currently require individualized infrastructure designed to handle restricted data – and also individualized costs.

“The government spends a considerable amount of money on these networks, and they’ve been looking for years for a way to combine them,” said David Gardiner, vice president of security technology and solutions at Unisys, which is deploying its Stealth technology under a one-year JFCOM contract.

Stealth” you say? Oh, I got all tingly there for a moment.

Stealth works by splitting bits of data into multiple packets as it moves through the network, then reassembles the information packets when delivered to authorized users. Only authenticated users who have obtained a workgroup key, authorized by a Stealth Solution server, would have the means to reassemble and unscramble the packets.

In some ways this sounds oddly familiar. The article goes on to say how this could be used to help improve cloud computing from a security perspective. I’d be interested to see how the keys are managed.

Oh look. A nice black helicopter overhead. Wave to the nice men.

🙂

Article Link

UPDATE: As per my conversation with Chris Hoff, I should offer clarity on the ‘Stealth’ article. “To be clear: Unisys’ Stealth is being ‘evaluated/assessed’ under the JFCOM contract, not widely deployed.” Thanks Hoff.

See, this is what happens when I write something with little to no sleep. Clarity escapes me.

(Image used under CC from iancarroll‘s Flickr stream)

Exit mobile version