SOURCES SOUGHT
58 -- Crypto Module
- Notice Date
- 3/27/2009
- Notice Type
- Sources Sought
- Contracting Office
- Department of the Army, U. S. Army Materiel Command, US Army C-E LCMC Acquisition Center - DAAB07, US Army C-E LCMC Acquisition Center - DAAB07, ATTN: AMSEL-AC, Building 1208, Fort Monmouth, NJ 07703-5008
- ZIP Code
- 07703-5008
- Solicitation Number
- W15P7T-09-R-CRYP
- Response Due
- 4/27/2009
- Archive Date
- 6/26/2009
- Point of Contact
- Celeste Boucher, 732-427-2768<br />
- Small Business Set-Aside
- N/A
- Description
- The US Army Communications Electronics Research, Development & Engineering Center (CERDEC), Fort Monmouth, NJ is conducting an industry survey of interested sources (US Only), to locate sources for the development of a Cryptographic Module for baseband/link data communications encryption. This request for information (RFI)/Sources Sought (SS) Notice is for information and planning purposes only and shall not be construed as a solicitation or as an obligation on the part of the US Army CERDEC. The purpose of this RFI/SS is to identify potential sources that may be interested in and capable of performing the work described herein. US Army CERDEC does not intend to award a contract on the basis of responses nor otherwise pay for the preparation of any information submitted or for CERDECs use of such information. Acknowledgement of receipt of responses will not be made, nor will respondents be notified of CERDEC evaluation of the information received. An original and one copy shall be sent to the US Army, Communications Electronics Research, Development & Engineering Center (CERDEC), Attn: AMSRD-CER-ST-IA-CM (Bob Chu) Bldg. 2700, Fort Monmouth, NJ 07703. Technical questions may be directed to Bob Chu at 732-427-4683. EMAIL ADDRESS: bob.chu@us.army.mil ----------------------------------------------------------------------- This is a market survey to locate sources for the development of a cryptographic module. The following is the requirement: The solicited device will provide cryptographic and security functions to tactical communications nodes comprised of fixed, ground mobile, and unmanned air mobile installations operating both within line of sight and beyond line of sight (e.g., satellite communications). Supported communications would include commercial, government/military unprotected, and government/military protected systems. The requested device will be expected to provide confidentiality, integrity, and authentication services for both the communication traffic and the communication node itself. Expected production quantities will range between 500 and 10,000 units (including sparing), depending on the breadth of integration within fielded organizations. Initial delivery of final, certified devices should begin by January 2012. The unit cost target for these devices is approximately $2,500.00 each for a quantity of 1000. The ideal device will include the following characteristics: Security Environment "NSA certified for Type 1 operation "Operating modes: Suite A, or Suite B, or a mixture of Suite A and Suite B algorithms "MLS, MSLS, MILS, or other operations up to Secret-and-below "Unclassified CCI when powered off "Supports unattended operations for some limited period of time "Releasable to allied partners "Deployable/operable in non-military missions (e.g., disaster relief) Physical Characteristics "Suitable for embedment/utilization in small form factor systems (e.g., as a component within a tactical radio installed in mobile platforms) "Size on the order of 25 cubic inches, or less, with one dimension not greater than 1.5 "Standard external interfaces (power, physical connectors, signaling, communications protocols, etc.) "Power on the order of 20w (to operate all simultaneous functions as listed below), or less "NSA certified tamper and TEMPEST protected enclosure Functions "Implements the algorithms, types, and modes at the data rates listed in Table 1 "Simultaneously operates the algorithms in Table 1 at any of their supported modes, as depicted in Table 2. The table denotes the number of simultaneous instances of a particular algorithm/type/rate for each of several scenarios. These scenarios are representative, and not exhaustive. "Implements the key fill and key management mechanisms listed in Table 3 "Supports red key fill for testing and development (configurable by policy) Features "CMI compliant "Reprogrammable to implement new algorithms and functions of similar performance, without requiring hardware modification. "Configurable via downloadable security and/or behavioral policies. Policies may be developed and deployed by third-parties. "Programmable control and status bypass engine, configurable by content and traffic rate(s). Bypass rules may be developed and deployed by third parties. "Fully configurable plaintext/ciphertext routing of traffic data, subject to policy "CIK-less operation of selected non type 1 functions (e.g., signature verification) Protected Resources "Availability of unused computing resources (GPP(s), RAM, FPGA partition(s), DSP(s), etc.) within the NSA certified tamper/TEMPEST module enclosure itself. Quantity and sizing of these resources are still to be determined. "Software/Firmware applications targeted to the protected computing resources may be developed and deployed by third parties "Approved software/firmware applications may be deployed without requiring module recertification Deployment and Application "Delivered with, at a minimum, full government purpose rights to embedment and use by third party developers. This includes all ICDs and technical data necessary for the embedment and use of the module by the government or a government designated agent. "No run time licensing fees for any aspects of module deployment or operation "No additional (i.e., unprovided) tools, licenses, libraries, nor technologies required to develop policies, bypass rules, and targeted applications. "No limitations on the purchase, embedment, usage, or development of applications and/or policies except as restricted by certification and/or releasability considerations. Table 1: Representative Algorithms, Modes, and Rates IdAlgorithmTypeECBCBCCFBOFBCTRGCMThroughput 1Suite A Block (e.g., MEDLEY)streamxxxxx1 Mb/s 2Suite A Blockstreamxxxxx100 Kb/s 3Suite A Blockstreamx500 b/s 4Suite A Blockcipherxxxxx100 Mb/s 5Suite A Blockcipherxxxxx10 Mb/s 6Suite A Blockcipherxxxxx50 Kb/s 7Suite B Block (e.g., AES-256)streamxxxxx5 Mb/s 8Suite B Blockstreamxxxxx1 Mb/s 9Suite B Blockstreamxxxxx20 Mb/s 10Suite B Blockstreamx500 b/s 11Suite B Blockcipherxxxxx100 Mb/s 12Suite B Blockcipherxxxxx10 Mb/s 13Suite B Blockcipherxxxxx250 Kb/s 14Suite B Blockcipherx50 Kb/s 15HAIPIS v 3tunnelas specified200 Kb/s 16IPsectunnelxxx500 Kb/s 17IPsectunnelxxx200 Kb/s 18SHA-256/384/512hash100 Mb/s 19Verify DSA/RSA/ECDSAsign100 Mb/s 20Generate DSA/RSA/ECDSAsign10 Mb/s 21Verify NSA Type 1sign100 Mb/s Table 2: Representative Number of Simultaneous Instances by Function IdDescriptionScenario 1Scenario 2Scenario 3Scenario 4Scenario 5Scenario 6 1Suite A Block Stream @ 1 Mb/s3333 2Suite A Block Stream @ 100 Kb/s2222 3Suite A Block Stream @ 500 b/s2222 4Suite A Block Cipher @ 100 Mb/s1 5Suite A Block Cipher @ 10 Mb/s1 6Suite A Block Cipher @ 50 Kb/s3333 7Suite B Block Stream @ 5 Mb/s11 8Suite B Block Stream @ 1 Mb/s22 9Suite B Block Stream @ 20 Mb/s33 10Suite B Block Stream @ 500 b/s22 11Suite B Block Cipher @ 100 Mb/s11 12Suite B Block Cipher @ 10 Mb/s11 13Suite B Block Cipher @ 250 Kb/s22 14Suite B Block Cipher @ 50 Kb/s22 15HAIPIS v 3 @ 200 Kb/s111111 16IPsec @ 500 Kb/s11 17IPsec @ 200 Kb/s111111 18SHA-256/384/512 @ 100 Mb/s111111 19Verify DSA/RSA/ECDSA @ 100 Mb/s111111 20Generate DSA/RSA/ECDSA @ 10 Mb/s111 21Verify NSA Type 1111111 Table 3: Representative Key Management and Related Functions Algorithm FIREFLY v 9 FIREFLY v 17 Enhanced FIREFLY MAYFLY ACCORDION v 3 FFC DH ECC CDH FFC MQV ECC MQV AES Key Wrap JOSEKI WATARI TAMP Any interested sources please send information for evaluation NLT 30 days after this publication to US Army CERDEC. This information should include technical specification, unit cost by quantities, and previous history.
- Web Link
-
FedBizOpps Complete View
(https://www.fbo.gov/?s=opportunity&mode=form&id=22563fe5c3731049cbb5ff885e1de83b&tab=core&_cview=1)
- Place of Performance
- Address: US Army C-E LCMC Acquisition Center - DAAB07 ATTN: AMSEL-AC, Building 1208 Fort Monmouth NJ<br />
- Zip Code: 07703-5008<br />
- Zip Code: 07703-5008<br />
- Record
- SN01780096-W 20090329/090327220541-22563fe5c3731049cbb5ff885e1de83b (fbodaily.com)
- Source
-
FedBizOpps Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's FBO Daily Index Page |