You are on page 1of 16

Adaza Netcom Sdn Bhd is the ICT Company which has experience and expertise in planning and

developed a system more converging towards intelligence, forensic and inside applications investigation
concept and counter intelligence. A highly qualified staffs in ICT field and intelligence skills are
successfully brought our corporate image into a new dimension and indirectly has created a competitive
market.

• Get tender supply of ICT equipment to Intelligence Branch, Army Base, and Ministry of
Defense. (Develop database security system and database tactical system).
• Supply ICT equipment to Intelligence Branch, Army Base, Ministry of Defense involving
Intelligence Fusion Center's developments(IFC) namely data combination from various
intelligence source and open-source by real time.
• Fed, install and commissioning system biometric access to National Heart Institute in the
month of March 2009.
• Expertise in ICT FORENSIC field.
• Expertise in ICT and counter intelligence field.
• Having business network with a couple foreign companies such as Mills Electronic which
operates in Innsbruck, Austria for crypto systems development in process data
transmission and Sail Labs Technology, Vienna, Austria in translation system
implementation audio by real time.

Adaza NetCom Sdn Bhd is also capable of supplying intelligence special


equipment and associates with a few foreign companies such as in
German, UK, Iran, USA and China in market the equipment in Malaysia.
Introduction

Mils system 700 is a cipher and communication system that able to handle information exchange
and image inside the network securely by using personal computer (PC) or notebook.

System basic formation

Basic peripheral used to create Mils System 700 is from a PC or notebook that had been
transformed to a cipher machine using ”Key Module M775” that the Mills Electronic company
had created. The Key Module had been created with the PCMCIA Standards that can be loaded to
varieties of computers or notebooks with condition of using suitable adaptor. To make the Mils
system functions as mentioned above, it requires PC with the minimum specification of IBM
compatible Personal Computer 386.

Hardware

Consumers have the option to choose PC type from Desktop/Laptop/Notebook or which


was made specifically for military configuration. Using notebook is suitable for mobile
operation while desktop suitable for static application.

Besides from specific software Mils Electronic used in the computer,


application program used is user-friendly and its using WINDOW
operating system. From handling aspect, Mils system 700 is easily
understood and easy to be handled by consumer.
WORKING CONCEPT IN NETWORK

This system are made up from two kinds, namely usual consumer station(static or mobile) equipped with
cipher tool while another is individual, which often moved to external work without complete equipment.
This individual consumer can use any cipher station in the network only with the use of "Key Module"
(PCMCIA Card) that programmed for personal use to relate safely with the desired station. Thereby, he
doesn’t need to bring "M730 Terminal" physically when working outstation. This network also able to
handle many cipher stations suit to consumer configuration.

NETWORK INFORMATION EXCHANGE PATTERN

Network pattern can be formed to contain a few "Link" or "Complex Structures" such as "Point-
to-Point Link", "Orcular link" and "Emergency link". Consumer have the freedom of determine
network pattern follow own organisation.

SECURED INFORMATION EXCHANGE NETWORK

To create safety of the network, this system needs two station type which consists
of cipher stations and network manager station. Role played by each "sub-
system" were as follows.
a.Cipher Machine .

This machine supplied to every station used to provide information "text" and image, edit,
encrypt, decrypt and send "ciphertext" out or vice-versa via needed media of necessity. Choice of
encryption can either be "One- Time-Key" (OTK), " Internal Key Generator" (IKG)or
"Emergency" subject to operator’s choice and the current system usage policy.

b. Network Manager .

It is located Off-line, responsible as administrator and control the whole network. Its role is
preparing and distributing key, and supervises each cipher machine that joins the network.
"Network Manager" is also a personal computer that equipped with "Noise Card" to generate
OTK key for distribution and cipher stations use. For confirmation that OTK key is "Random"
several tests loaded into M705:-

(1) "Character Frequency Testll.

(2) "Bit Frequency Test".

(3) "Run Test".

(4) "Serial Correlation Test".

(5) "Poker Test".


"TAMPER PROOF"

"Key Module" is a PCMCIA card equipped with "micro processor" and "access protected
memory". Same with cryptography "algorithm" and secret key kept in that card have been pinned
with self-defence system (tamper proof). All data in the card will be lost, if there is any threat
establish by physical or hack its content. Hardware and related software with Mils system 700
will also not function without that card. Indirectly, the system security can be defended easily and
suitable for strategic and tactical operation use.

KEY TO ENCRYPT INFORMATION

Mils system 700 offers two separate cryptology system, namely "Unbreakable
Random" OTK and "Proprietry stream cipher algorithm" IKG in order to meet
strategic security needs and tactical. Consumer may prescribe high classification
information use OTK while low classification information or image using IKG.

KEY MANAGEMENT
Key management and preparation centrally made and administer
network. Management Manager/network would use "Network
Manager" (M705) to provide OTK key and will test
"randomness" before being channeled to consumer station by
"Off-line" or "On-line" followed by consumer safety directions.
SYSTEM APPLICATION
Consumer be given option either to have Mils system 700 work by "On-line" or "Off-line". That system
application is up to the work requirement and comfort picked by consumer.

ELECTRONICALLY SYSTEM PROCESSING

Mils system 700 does not require various kind of documents, but this system need to be matched
according to consumer needs and all processing was done by system electronically and automatic.
This system boosting consumer changed paradigm from "conventional system" to "paperless
system" work culture.

MEDIA ROUTING

"Opheltext" that have been processed can be sent and accepted through various kinds
routing telecommunication service media. Consumer has the flexibility to determine the
way of information channeled and also controls consumers by limiting type of permitted
media only.

ACCESS SYSTEM

System also give the option to allow "Network Manager" when necessary to
obtain route to enter the system in order to control consumer if organization
security policy allow that route.
TRAINING PERIOD

Design and software supplied to Mils System 700 easy to understand and handle. For normal consumer,
he/she would just needs two or three days of training to know and run the system.

COMPOSITION AND FEATURE 700 SYSTEM

16. Mils system's composition 700 include modules and features

following:

a. M705 (NETWORK MANAGER) . It is a management system responsible in


implementing overall management and handling of systems.

Between this role and system function was:

(1) Programming PCMCIA card for use station.

(2) Produce and test by key statistic "Random" for OTK's system, IKG
and key emergency obtained through "Noise Card".

(3) Build and coordinate overall stations in network.

(4) Key distribution to station in network.

(5) Oversee entire network.


b. M 775 (KEY MODULE) . It is a PCMCIA card built up with new technology to prevent any attempt to
hack information found inside either logically or physical ("Tamper Resistant"). In PCMCIA also kept
rescued information including ID station, IKG key, Emergency Key and "Cryptographic Check Sum
Value" used to prevent any change made on system via "Horse Trojan", Logic Bomb, Virus", etc. This
card have security features thwarted every detailed information from being read, instead of only allow to
be applied solely.

c. M 730 ("CIPHER MACHINE'1). It was computer software which is used to send and received
information of network station.This software responsible to coordinate the necessary security
level and routing type that would be used subject to operator’s need. Delivery or decoder that had
been rescued through this system could be made through a few media type which encompasses:

(1) Through telephone modem line.


(2) Through telex service.
(3) Through modem radio.
(4) Through Line Switched Data Services -x.21.
(5) Through Packet Switched Data Services -x. 25.
(6) Through electronic mail -x.400.
(7) THrough ISDN network.
(8) Through satellite.
(9) Through baudot format atau punch tape.
MILS 700 KEY's METHOD

17. Security cryptography applies in Mils system 700 is

such as :
a. QIK . Key method in this most important system is OTK which is recognized as a most safe
cryptography system in the world.
To make it easy to understand, this OTK's system is defined as a system which need to keep features as
following:
(1) Key withdrawn at random and tested by statistic to determine it is fully random.
(2) Key do not repeat and do not have any pattern or rule.
(3) Bit volume in key equal the length with the bit that are included in envoy.
(4) The key that had been used will be deleted automatically.

b. Other than that, this system also equipped with cryptography


system named "Internal Key Generator” (IKG) which also have
features entirely random in key issued. It is used to rescue
information which possess lower security level.
c. Emergency key .With both system mentioned above, this
system also also provide with emergency key used to
communicate with stations which had no relationship with OTK
key. This enable it to be used during emergency and when one
system that have OTK relationship could not contact.
OTHER SECURITY FEATURE
18. Other than cipher system that was explained above, this system have a few security features used in
order to to be sure all key and major features which include inside it, is safe if this system is stolen or
sank into enemies hand. Between security features and algorithm resides within this system is as
following:

a. Data Protection System (DPS} . It is an algorithm used to bail OTK key if it fell into foreign
party’s hand or duplicated by foreign party. Its main function are blocking enemy from obtaining
the OTK's key.

b. Message Authentication System (MAS). In short, this algorithm is applied to ensure that any
envoy received is emanate from station that had fixed and it has been undisturbed or being
transformed during intransmission. Its function is similar to digital signature concept system but
use function hash to ensure validity each envoy received.
OTK CRIPTOGRAPHY KEY CONCEPT

19. One Time Letter Pad {OTLP} . Through development history of cryptology technology, One Time
Letter Pad key's concept (OTLP)serves to encrypt and decrypt information, it is the safest cryptography
system in past age. This concept also already used in modern technique cipher system which called by
now cryptography OTK system. Through technological capability, by using "Noise Card" will be able to
produce cipher key in form of cipher stream which his key not recurring (True random key) keep OTK's
features. This cyrptology technique were made and developed by Mils Electronic until they can create
Mils 700 cipher system to use cryptography OTK system.

20. Strong Evidences of OTK System. Concept key of cryptography system OTK is 'Unbreakable
Key" is based on experience practical and perusal (empiricial explanation) or mathematical proof
from inside experts cryptology field mathematics and other. This fact is was conceded by that
experts in book written own by them as :

a. "Cipher System, The Protection of Communication" by Henery Beker and Fred Piper .

b. The Codebreakers by David Kahn.


21. Network Concept . This network concept is through point to point
relationship where consumer station can use variety of transmission media to
communicate.
22. Key Management .OTK key's management committed by Network Manager to this system.
Preparation process key and management is easy and no need procedure or document particular
document. This management does not require many member , even management member could be
reduced.
23. Operation instructions .Behalf consumer safety and management user guide must produce one
operation instructions key tool and management M705 and M730.

SECURITY
24. Real Security (TransDarency) .System 700 is terminal cipher and communication able to
exchange message meaning safely (secure). Its Cryptography Algorithm development based on
the latest technology.

25. Design principle .This system is based on personal computer and


switched to be cipher terminal with the use of PCMCIA KAD and
specially designed software.Its process involve text message preparation
which uses suitable key, which is necessary to be protected and rescued..
As such, key, algorithm and secret key is controlled and protected with
special security featureshave been pinned in PCMCIA KAD, that had
modified. Although this card are available in open market, without those
special features that specially designed by Mils Elektronik, that system
would not function or its datas will be lost, if there is attempt
threattrespassing that system.

26. Key .With this , the key can be made by consumer and free
from supplier side knowledge.
27 System Function Protected .Each system and process which need rescued (secure) with technology
cryptography, would be built with special algorithm protect that function.

28. General Information .Through general reading process, information on OTK concept is applied in
Mils system 700 to process ciphertext is known by populace in the countries and overseas. They also
know that general information on OTK concept is "Unbreakable Key" since its discovery hundreds year
earlier and this concept strength remain sophisticated in latest cryptology technology.
Pros and cons

29. Pros .Mils system 700 displayed advantages as follows.

A. Technology user cryptography OTK key's system (Unbreakble Key) to protect strategic information
and tactical so that can be channeled safely and the system is certified secured and the information will be
secured.

B. This system has two technology method of encrypt namely OTK and IKG and Multi Hierarchy
Protection to protect stored data in a cipher equipment known as DPS and MAS. This layers of
security is have made this system’ immunity increased.

C. Tempest proof features held in that system, to check act of sabotaging on system, where all
system data will be lost and also may not be copied or being diverted.

D. This system also can be adapt with transmission multimedia provided by consumer
such as modem telephone, radio (HF, VHF, UHF), telex, e'mail, packet switched data and
lain-Iain ISDN service / PSTN. Give consumer choices and flexibility in routing process
information.

E. Management having flexibility and option for re-configuring work stations to


work in network (STAR network topology, TREE or RING), or point to point
follow organization need.

F. Operating system based on Windows which is easy to


understand and maneuver by consumer.
G. Key system crypto OTK cannot be penetrated or broken up by "crypto analyst" expert compared to
cipher which uses encrypt technique "pseudo random" or other technique in the market.
H. Key Module is PCMCIA CARD which contains micro computer and access protection memory
contrasts with the one found in the market. In fact all algorithm cryptography and other keys are safe to
keep in that card.
I. Computer equipment used together with Mils 700 is from the standard type and with PCMCIA card
usage will convert it from a simple computer into cipher system.

J. All keys are needed to run with Mils 700 system is housed in PCMCIA card and key diskette.
Thus consumers don’t need to determine various documentation management key.

K. Paperless concept and shift paradigm in work culture from system conventional to
computerized working style can achieved.

L. Mils Electronic tool manufacturer cryptography which uses OTK system was a private
company and not tied to any organization and policies which control controlled export
goods to other countries.

M. All encrypt and decrypt process in Mils 700 system is being implemented
automatically.

N. System that is compatible by all PCs.


O. Have options for cryptography key preparation to made by off line or
on line.
P. Generating cryptography key process and master key
is by consumers decisionl and not subject to
supplier.
Q. Handling crypto course implementation
period which merely take time 3 to 4 days.
30. Cons .Overall, there is almost no indications of weaknesses identified in Mils system 700. Weakness
can be identified from attitude / consumer practice.

You might also like