Click for homepage
Chips
JTRS
Data
Voice
GD
  
← AIM
  
AIM II
Advanced INFOSEC Machine II

The Advanced INFOSEC Machine II, or AIM II, is an embeddable cryptographic core (processor) developed by General Dynamics C4 Systems in Scottsdale, Arizona (USA), and introduced in 2011. AIM II is an NSA-approved Type-1 encryption product and is the successor to the original AIM that was developed in 2001 by Motorola, shortly before it was acquired by General Dynamics.

AIM II is a further development of the original AIM and is fully backward compatible with it. It was developed for the software-defined Joint Tactical Radio System (JTRS) produced by Thales and General Dynamics. In addition to a number of (speed) improvements and additional crypto­graphic functions, such as elliptic curve algorithms, AIM II is fully programmable.

AIM II can be used in Type-1 and non-Type-1 products and is not classified. In fact, it is not even a Controlled Cryptographic Item (CCI) un­less programmed with Type-1 functionality [2].
  
Image copyright General Dynamics [3]

in 2015, JTRS AIM was added to the product line [C]. It consists of a reprogrammable embeddable module with thee AIM II chip at its heart. JTRS AIM has three independent cryptographic proces­sors, and supports interoperability with legacy equipment as well as network-centric systems. It has been approved by NSA for information up to an including TOP SECRET. AIM II is backward compatible with software written for the original AIM. Detailed information and brochures are available below and from the General Dynamics website [3].

AIM-compatible equipment on this website
KG-84 Dedicated Loop Encryption Device
KY-57 (VINSON) Wide-band Voice and Data Encryption Unit
KY-99 (MINTERM) Narrow-band Voice and Data Terminal (ANDVT)
KIV-7, embeddable KG-84 COMSEC module
Cryptographic algorithms
The following cryptographic algorithms are available in AIM II [2]:

  • Accordion
  • Acme 1
  • AES (AIM)
  • BATON
  • Benign Techniques 1
  • Crayon
  • DES, 3DES
  • DSA (Digital Signature Algorithm)
  • ECC (Elliptic Curve Cryptography) 1
  • ECDSA (Elliptic Curve Digital Signature Algorithm) 1
  • Firefly
  • Jackknife
  • Joseki 1
  • Keesee
  • Mark XII (Cadmus)
  • Medley
  • Phalanx
  • SAVILLE
  • SHA-1/256/384/512
  • Shillelagh 1
  • Vallor
  • WALBURN
  • Weasel
  1. Added since the original AIM.

Compatibility
AIM II is compatible and interoperable with the following devices and techniques [2]:

  • KG-84
  • KG-235
  • KGR-96
  • KGV-8
  • KGV-10
  • KGV-11
  • KIV-7
  • KWR-46
  1. Compatibility with these products is currently under development (2013).

Products
The following products are known to use AIM II or JTRS AIM:

Documentation
  1. Advanced INFOSEC Machine (AIM) leaflet
    D-AIM-11-0308. General Dynamics, 2008.

  2. AIM II — Embeddable Programmable Security - leaflet
    D-AIM2-4-0111. General Dynamics, 2011.

  3. JTRS AIM leaflet
    D-AIM2-4-0111. General Dynamics, 2015.
References
  1. General Dynamics, Advanced INFOSEC Machine (AIM)
    March 2008. Retrieved March 2013.

  2. General Dynamics, AIM II - Embeddable Programmable Security
    January 2011. Retrieved March 2013.

  3. General Dynamics Mission Systems, Advanced INFOSEC Machine (AIM)
    Retrieved March 2013, May 2024.
Further information
Any links shown in red are currently unavailable. If you like the information on this website, why not make a donation?
© Crypto Museum. Created: Saturday 04 May 2013. Last changed: Monday, 13 May 2024 - 21:27 CET.
Click for homepage