
Trusted Computing for Defense & Aerospace
Comprehensive protection throughout the product lifecycle
Curtiss-Wright goes well beyond standard approaches to Trusted Computing to provide truly secure solutions for air, ground, and sea platforms. We keep cybersecurity and physical protection in mind, from design and testing to supply chain and manufacturing. This comprehensive, end-to-end approach creates an effective mesh of protection layers that integrate to ensure reliability of Curtiss-Wright products in the face of attempted compromise.
Our Trusted Computing solutions are designed and built around three major data protection domains:
- Technology protection safeguards how computing tasks are executed. It combines the hardware capabilities, software algorithms, and operations needed to protect functionality, such as how the algorithm in a radar application works.
- Data protection safeguards software algorithms, data-at-rest, and data-in-motion. It ensures that, for example, when data is sent from one system to another, it is not compromised.
- Parts protection safeguards the supply chain and manufacturing processes. This ensures customers can trust that all components on Curtiss-Wright products are authentic and all processes have met the strictest quality controls.
Our Approach to Secure Processing
The threats facing today's defense and aerospace applications are more varied and sophisticated than ever. Curtiss-Wright builds trusted computing technologies and techniques into every aspect of our security solution development, from design and testing to supply chain and manufacturing. This comprehensive, end-to-end approach creates an effective mesh of protection layers that integrate to ensure reliability in the face of attempted compromise. Learn more about our Trusted COTS and enhanced Trusted COTS approaches to program protection
Data Protection Domains
Secure Wireless Solutions for Tactical, Expeditionary, and Deployable Communications
This whitepaper compares various Commercial Solutions for Classified network architectures and proposes several approaches for CSfC solutions optimized for mobility use cases. Download the whitepaper to learn more about:
- CSfC architecture and process
- CSfC program overview
- CSfC capabilities packages
- WLAN encryption
- Tactical CSfC solutions
Trusted Computing for Defense & Aerospace Article eBook
This collection of articles, originally published by Military & Aerospace Electronics, covers a variety of Trusted Computing topics with a specific focus on the defense and aerospace industries.
Explore DAR Encryption Approaches
Systems designers must employ the correct cryptography algorithms in their proper modes to secure secret or sensitive data in military trusted computing. Symmetric cryptography can provide confidentiality for data-at-rest and data-in-transit. In this approach, the same key encrypts and decrypts data to ensure the secrecy of that key, which is critical for ensuring the secrecy of the protected data. Systems designers choose different algorithms based on their performance requirements, their desired level of security, and necessary certifications.
CSfC Data-at-Rest Capability Package 5.0 Review
This paper reviews the most recent changes from CP 4.0 to 5.0. Particular emphasis will be given to the more significant new topics: Unattended Operation Use Case and a hardware full-disk encryption (HWFDE) + HWFDE solution.
The Evolving State of Network Security
In a constantly evolving threat environment, where new attacks arrive virtually every day, system architects must design networks to be as secure as possible. Network security involves providing protections against all devices that are connected, or might potentially have access, to the network. Embedded networks are expanding to connect more devices and between systems that previously would not have been connected. Solutions are being continually developed to address emerging threats and challenges.
Trends in Network Cybersecurity
Learn about the evolving state of network security, the standards developed to preserve your system’s integrity with layers of encryption, and how investing in qualified and expert professionals in the field can be a critical advantage in keeping up with the challenges of designing secure networks.