Data Protection and Encryption Methods for Shared Memory Networks

Award Information
Agency:
Department of Defense
Branch
Air Force
Amount:
$362,987.00
Award Year:
1994
Program:
SBIR
Phase:
Phase II
Contract:
n/a
Agency Tracking Number:
20170
Solicitation Year:
n/a
Solicitation Topic Code:
n/a
Solicitation Number:
n/a
Small Business Information
Systran Corp
4126 Linden Avenue, Dayton, OH, 45432
Hubzone Owned:
N
Minority Owned:
N
Woman Owned:
N
Duns:
n/a
Principal Investigator:
George J. Valentino
(513) 252-5601
Business Contact:
() -
Research Institution:
n/a
Abstract
Replicated Shared-Memory Network (SMN) and fiber-optic (FO) communications technology has been used for several years as the means to configure multiple computational nodes into real-time simulation systems. In most cases these simulations were within a single facility, with node-to-node distances constrained 300 meters. The use of high-power laser diodes and/or higher-power laser transmitters and receivers to extend node-to-node distance by one or two orders of magnitude (to over 30,000 meters) and the use of satellite communications to extend these distances to geographically significant distances are a natural extension of replicated shared-memory networks. SYSTRAN's SCRAMNet (Shared Common RAM Network) product currently includes "Long-Link" laser diode boosters for internode distances approaching 3,500 meters. The Avionics Wind Tunnel (AWT), an ongoing plan to connect several Wright-Patterson AFB facilities within the Flight Dynamics and Avionics Directorates, and potentially other Area B facilities, requires additional capability in order to share U.S. Government classified data in a manner approved by the National Security Agency (NSA). SYSTRAN is aware of several techniques and products that can either: (i) protect this original data while it is being transmitted (without using time consuming and data generating encryption/decryption methods), or (ii) encrypt and decrypt the data. Both techniques offer advantages and limitations for AWT real-time requirements. This SBIR program will evaluate alternative methods to protect and/or to encrypt/decrypt shared memory network communications traffic using NSA-approved algorithms/devices.

* information listed above is at the time of submission.

Agency Micro-sites


SBA logo

Department of Agriculture logo

Department of Commerce logo

Department of Defense logo

Department of Education logo

Department of Energy logo

Department of Health and Human Services logo

Department of Homeland Security logo

Department of Transportation logo

Enviromental Protection Agency logo

National Aeronautics and Space Administration logo

National Science Foundation logo
US Flag An Official Website of the United States Government