!!! Overview [{$pagename}] system provides the Extended [NSA] Enterprise with an [End-to-End Communications] [attack] orchestration and [Key Recovery] service for [Data Network Cipher] ([DNC]) and [Data Network Session Cipher] ([DNSC]) [Communication]. [{$pagename}] is extensible to allow for the addition of other [Digital Network Intelligence] [cipher] types. [{$pagename}] system is composed of several components as shown in this End-to-End View. [{$pagename}] receives cryptanalytic information (CA Data} from the field systems and passes information back to field systems using its Front End. The Front End validates the sender/receiver using [CASPORT] services. [{$pagename}] contains [Attack Orchestrator] components (one [Orchestration] component for each distinct type of [attack]), and [Attack Service] components. [Attack Orchestrator] figures out what cryptanalytic processing should be applied for each piece of CA Data, and then initiates, and as needed manages, that processing. [Attack service] performs the cryptanalytic [attack]. Once the processing is complete, the result is returned to the [Attack Orchestrator] component, information about the processing is "saved" for Management and Analysis, and then as appropriate the result is returned to the "requesting" CA Server. [{$pagename}] accesses [CES] [Databases] for certain information needed for [Attack Orchestrator] and attack services. [{$pagename}] also provides an interface for [CES] [Analysts] that need access to information pertaining to the [{$pagename}] processed data. [{$pagename}] maintains its own internal [Government Data Store] for the management and control of its processing activities. !! Category %%category [Government Surveillance]%% !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }]