KAYC-S - Crypto Key Loading Device

-A +A

NATIONAL KEY LOADING SOLUTIONS
KAYC-S is a crypto device which is used for storing the crypto keys and data received from standard
interface and protocols (DS-101, DS-102, MILAY) securely, transporting them and key loading/data
transmitting to cryptographic terminals.

KAYC-S, which is identified and activated through EKADAS (Electronic Crypto Key Distribution System), can take keys from EKADAS or other systems. KAYC-S has ability to take cryptographic data and keys from EKAYUC (Key Loading Device) and EKATAC (Key Transport Device) which are EKADAS terminals or other data transfer devices (AN/CYZ-10 (DTD), DTD2000 (SDS), Simple Key Loader (SKL)) and key loading devices (KYK-13, KAYC-10, KAYC-32, KAOC-8, KOI-18, MILAY EAYC) with supported standard interfaces. It processes cryptographic data and keys with safety enhancer like integrity checking and encryption. KAYC-S can also store cryptographic data and keys safely and load to several cryptographic key loading/transfer terminal devices. KAYC-S is capable of keeping account information of the keys safely.

Data security in the device is provided by system architecture based on red/black separation, filtering, tamper protection and emergency deleting. KAYC-S is a tactical device and it is compliant with COMSEC, EMI/EMC, TEMPEST standards.

INTERFACES
On 6-pin connector
▪ DS-102 (EKMS-308F)
▪ DS-101/RS-485 (EKMS-308F)
▪ DS-101/RS-232-D (EKMS-308F)
▪ MILAY

FEATURES
▪ “National SECRET” and below confidentiality levels
▪ Storage and loading of national formatted keys
▪ User-friendly interface
▪ Electrical and mechanical red/black isolation
▪ 320x240 TFT liquid crystal display and 7 stokes keypad
▪ External keyboard interface (PS/2)
▪ Led and audible warnings
▪ The ability to identify and initialize users from EKADAS KMI
▪ Cryptographic data receiving from EKADAS and EKADAS KMI
▪ Ability to create, store and transport (to EKADAS KMI ) accounts and audit
▪ The ability to update some of the device software from EKADAS KMI
▪ Turkish General Staff approved crypto algorithms
▪ System-independent initialization feature (Free Mode)
▪ User Access Control by smart card and password
▪ Emergency erasable permanent memory to protect cryptographic data
▪ Emergency erase feature while it is on or off
▪ 8 MB storage memory