Printer Friendly

The Army Key Management System update.

The Electronic Key Management System, a Department of Defense initiative, is operated by the National Security Agency, which was developed to enhance security and modernize the management and distribution of communication security material. EKMS provides an integrated end-to-end key management, COMSEC material generation and distribution, and logistics support capability for DoD and Civil Agencies. The Army implementation of the EKMS is through the Army Key Management System Program.

AKMS Updated Operational Requirements Document. The ORD was AROC approved with Joint Certification on May 26, 2006. This office continues working with all the program managers to capture Key Management requirements and ensure that these requirements will either be supported by AKMS and/ or the planned Key Management Infrastructure.

System Subcomponents

Simple Key Loader

The AN/PYQ-10 SKL is a mission essential system that provides the Army communications network planner and end user with the means to handle, view, manage, store and load Signal Operating Instructions/ Electronic Protection data, and COMSEC keys. The SKL replaces the AN/CYZ-10 within the Army Key Management System. The goal is to field 50,000 SKLs to the force by 2010. Fielding is currently ongoing IAW the CY06 through CY08 fielding schedule.

Automated Communications Engineering Software

Approximately 520 workstations have been purchased under the five-year warranty and fielded based on the Modular Force Structure. The PdM is also developing ACES v1.8 software which will add the capability to support emerging requirements.

Local COMSEC Management Software

The Army has fielded 368 new workstations with LCMS software. LCMS software 5.1 will be fielded when available but still needs to complete government testing (the Army will not field LCMS 5.0 except to pilot accounts). The new release date is late 2006.

Key Management Infrastructure

EKMS/AKMS will begin a transition to the DoD Key Management Infrastructure beginning in fiscal year 2008 timeframe. KMI is a critical foundation element for ensuring an adequate security posture for national security systems by providing transparent cryptographic capabilities consistent with operational imperatives and mission environments. The starting point for KMI will be to leverage EKMS Phase V capabilities as a baseline. New capabilities have been identified and will aid in a transformation from the current key management infrastructure to a new paradigm for key. This new paradigm will be via secured net-centric operations (e.g. Over-the-Net Keying). As the developer of KMI, NSA is responsible for developing a KMI transition plan in partnership with the Services.

New roles or naming paradigm that KMI will bring: (KMI Role-EKMS Role) Roles identified span all services.

* A Controlling Authority would have been


* A Command Authority would have been


* A Product Requestor would have been any or all of:


--A User Representative, or

--A COMSEC Custodian / COMSEC Manager

* A KOA Manager would have been

--A COMSEC Custodian / COMSEC Manager

* A KOA Registration Manager (note: there will be a Personnel RM and an Equipment RM) would have been

--An EKMS Registration Authority

* A Client Platform SSO would have been

--A KOA Manager

--Current local security personnel

* A KOA Agent would have been

--A Local Element

--A COMSEC Responsible Officer

--A Hand Receipt Holder

* A Device Registration Manager would have been

--A COMSEC Custodian / COMSEC Manager

* A Personnel Registration Manager would have been

--An appropriate Security, Personnel, or Human Resources representative

* A Service/Agency Help Desk Manager would have been

--A current EKMS help desk entity

* A Client Platform Administrator would have been

--A current services local computer support entity

TSM WIN-T's point of contact for AKMS and KMI transition questions is Allen Walton (706) 791-2316/DSN 780-2316 or by email at and Tim Kirkland (706) 791-6623, email at

Mr. Walton served in the U.S. Army for 30 years. He is currently employed by Engineering Solutions & Products, Inc. providing contractor support to the Training and Doctrine Command System Manager for the Warfighter Information Network--Tactical. Walton is the TSM Project Leader for the Army Key Management System, and has worked extensively in developing and documenting key management requirements in support of current and future DoD Information Systems.

Mr. Kirkland served in the U.S. Army as a custodian and network technician for more than 20 years. He is currently employed by Engineering Solutions and Products, Inc., providing contractor support to TRADOC as a liaison to the U.S. Army Signal Center addressing Information Assurance Capabilities. Mr. Kirkland works in support of Army tactical warfighter requirements at DoD and Department of the Army level working groups supporting Public Key Infrastructure, Key Management Infrastructure, and Information Assurance Component to the Global Information Grid and Portfolio management efforts.


ACES--Automated Communications Engineering Software

AKMS--Army Key Management System Program

AROC--Army Requirements Oversight Council

COMSEC--communication security

CONAUTH--Controlling Authority

CRO--COMSEC Responsible Officer

DoD--Department of Defense

E KMS--Electronic Key Management System

EP--Electronic Protection

KMI--Key Management Infrastructure

LCMS--Local COMSEC Management Software

LE--Local Element

NSA--National Security Agency

OTNK--Over-the-Net Keying

ORD--Operational Requirements Document

PdM--Product Manager

RA--Registration Authority

RM--Registration Manager

SKL--Simple Key Loader

SOI--Signal Operating Instructions

TRADOC--Training and Doctrine Command
COPYRIGHT 2006 U.S. Army Signal Center
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2006 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Author:Walton, Allen; Kirkland, Tim
Publication:Army Communicator
Geographic Code:1USA
Date:Sep 22, 2006
Previous Article:'A new strategy' an update on the Joint Network Management System.
Next Article:Integrated System Control update.

Terms of use | Privacy policy | Copyright © 2019 Farlex, Inc. | Feedback | For webmasters