Breadcrumb
- Home
- Capabilities
- Technologies
- Security
- Data-At-Rest (DAR) Encryption
- NSA Type 1 Encryption
What is NSA Type 1 Encryption?
A Type 1 product is a Classified or Controlled Cryptographic Item (CCI) endorsed by the NSA for securing classified and sensitive U.S. Government information when appropriately keyed. The term refers only to products, and not to information, keys, services, or controls.
NSA Type 1 Encryption
The United States government classified data may range from Confidential to Secret to Top Secret. Type 1 devices are available to US government users, their contractors, and federally sponsored non-US government activities subject to export restrictions in accordance with International Traffic in Arms Regulation (ITAR). As cryptographic security devices, Type 1 encryptors are communications security (COMSEC) equipment. For effective COMSEC, sound cryptographic systems must be combined with transmission security, physical security, and emission security.
Explore the DAR Technologies
DAR Series Part 1: Data Threats and Protection
Explore strategies for protecting classified data through encryption and considerations for choosing a data-at-rest encryption approach.

DAR Series Part 1: Data Threats and Protection
Explore strategies for protecting classified data through encryption and considerations for choosing a data-at-rest encryption approach.
DAR Series Part 2: Commercial Solutions for Classified (CSfC)
Learn about the innovative NSA CSfC program leveraging commercial encryption technologies in a layered approach for agile and cost-effective classified data protection.

DAR Series Part 2: Commercial Solutions for Classified (CSfC)
Learn about the innovative NSA CSfC program leveraging commercial encryption technologies in a layered approach for agile and cost-effective classified data protection.
DAR Series Part 3: NSA High Assurance Type 1 Encryption
Gain valuable insights into NSA High Assurance Type 1 encryption including device consideration factors, encryption algorithms, and certification processes.

DAR Series Part 3: NSA High Assurance Type 1 Encryption
Gain valuable insights into NSA High Assurance Type 1 encryption including device consideration factors, encryption algorithms, and certification processes.
DAR Series Part 4: NSA CSfC vs. High Assurance Type 1 Encryption
Compare NSA High Assurance Type 1 and CSfC encryption approaches across over a dozen factors, including procurement, risk, technology adoption, and exportability.

DAR Series Part 4: NSA CSfC vs. High Assurance Type 1 Encryption
Compare NSA High Assurance Type 1 and CSfC encryption approaches across over a dozen factors, including procurement, risk, technology adoption, and exportability.
CSfC Series: Inner vs. Outer Layer
This white paper explores the Commercial Solutions for Classified (CSfC) program, data at rest encryption, terminology, and the inner vs. outer layer of protection.

CSfC Series: Inner vs. Outer Layer
This white paper explores the Commercial Solutions for Classified (CSfC) program, data at rest encryption, terminology, and the inner vs. outer layer of protection.
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption
The goal of post-quantum cryptography is to develop cryptographic systems that are secure and can interoperate with existing communications protocols and networks.

Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption
The goal of post-quantum cryptography is to develop cryptographic systems that are secure and can interoperate with existing communications protocols and networks.
Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions
Review the challenges for deploying QR encryption and how to implement DAR and data-in-transit QR encryption solutions using commercial FPGA devices and off-the-shelf hardware.

Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions
Review the challenges for deploying QR encryption and how to implement DAR and data-in-transit QR encryption solutions using commercial FPGA devices and off-the-shelf hardware.
What's New in CSfC Data-at-Rest Capability Package 5.0
This paper provides a review of the most recent changes from CP 4.0 to 5.0 with special emphasis on Unattended Operation Use Case and a HH solution.

What's New in CSfC Data-at-Rest Capability Package 5.0
This paper provides a review of the most recent changes from CP 4.0 to 5.0 with special emphasis on Unattended Operation Use Case and a HH solution.
Airborne Applications & Protecting Data-at-Rest
Protecting top-secret data on network attached storage with National Security Agency (NSA) approved encryption for military aircraft.

Airborne Applications & Protecting Data-at-Rest
Protecting top-secret data on network attached storage with National Security Agency (NSA) approved encryption for military aircraft.
Seaborne Applications & Protecting Data-at-Rest
Find out how seaborne applications like UUVs, USVs, and submarines store and protect top-secret data-at-rest with a network-attached storage device.

Seaborne Applications & Protecting Data-at-Rest
Find out how seaborne applications like UUVs, USVs, and submarines store and protect top-secret data-at-rest with a network-attached storage device.
Certification Authorities for Trusted Computing in Military and Avionics Products
This white paper provides an overview of certification authorities involved in Trusted Computing, explores which disciplines they oversee, and gives guidance on when to get these certification authorities involved.

Certification Authorities for Trusted Computing in Military and Avionics Products
This white paper provides an overview of certification authorities involved in Trusted Computing, explores which disciplines they oversee, and gives guidance on when to get these certification authorities involved.
Choosing the Best Location for Your Data-At-Rest Encryption Technology
The choice of encryption location can determine how difficult it is for adversaries to decrypt sensitive data and use it to their advantage.

Choosing the Best Location for Your Data-At-Rest Encryption Technology
The choice of encryption location can determine how difficult it is for adversaries to decrypt sensitive data and use it to their advantage.

Network-attached storage for unattended operations
Review DAR Encryption Approaches
Strategy to deliver secure solutions that leverage commercial technologies and products.
An internationally recognized security certification standard for commercial cryptography.
See DAR Technologies in Action
Maximizing Endurance and Data Security for UUVs
The NAS solution had to be optimized for size, weight, and power (SWaP) to preserve space and energy for mission systems

Maximizing Endurance and Data Security for UUVs
The NAS solution had to be optimized for size, weight, and power (SWaP) to preserve space and energy for mission systems
Enabling Secure, Scalable Data Storage for UAV Operations
The UAV developer needed a rugged, National Security Agency (NSA)-approved NAS solution that could be deployed without custom engineering.

Enabling Secure, Scalable Data Storage for UAV Operations
The UAV developer needed a rugged, National Security Agency (NSA)-approved NAS solution that could be deployed without custom engineering.
Modernizing an ISR Mission with Secure 10 GbE Data Storage
An aerospace company sought a network attached storage (NAS) device that was fast enough for new high-fidelity sensors that could store the vast amounts of data produced, could protect the classified data, and facilitate capacity expansion in the future.

Modernizing an ISR Mission with Secure 10 GbE Data Storage
An aerospace company sought a network attached storage (NAS) device that was fast enough for new high-fidelity sensors that could store the vast amounts of data produced, could protect the classified data, and facilitate capacity expansion in the future.
Safeguarding Top Secret Data for an Unmanned Surface Vehicle
A leading U.S. naval defense contractor was developing a next-generation Unmanned Surface Vehicle (USV) designed to perform critical reconnaissance and surveillance missions without putting personnel at risk.

Safeguarding Top Secret Data for an Unmanned Surface Vehicle
A leading U.S. naval defense contractor was developing a next-generation Unmanned Surface Vehicle (USV) designed to perform critical reconnaissance and surveillance missions without putting personnel at risk.
Aggressor Fighter Squadron Needs Secure Removable Storage Solutions
Tasked by the U.S. Air Force with updating their Aggressor fighter squadron, an aerospace company sought a small data network attached storage (NAS) device for a new batch of refurbished fighter jets.

Aggressor Fighter Squadron Needs Secure Removable Storage Solutions
Tasked by the U.S. Air Force with updating their Aggressor fighter squadron, an aerospace company sought a small data network attached storage (NAS) device for a new batch of refurbished fighter jets.
COTS Data-at-Rest Encryption Onboard an Unmanned Underwater Vehicle (UUV)
Curtiss-Wright develops network-attached storage (NAS) devices for an unmanned underwater vehicle (UUV).

COTS Data-at-Rest Encryption Onboard an Unmanned Underwater Vehicle (UUV)
Curtiss-Wright develops network-attached storage (NAS) devices for an unmanned underwater vehicle (UUV).
Next-Generation Aircraft Protection Requires ITAR-Free Data Storage
Tasked with developing a flexible, modular aircraft protection system, an aerospace company sought a small data network attached storage (NAS) device that could be used on current and future programs.

Next-Generation Aircraft Protection Requires ITAR-Free Data Storage
Tasked with developing a flexible, modular aircraft protection system, an aerospace company sought a small data network attached storage (NAS) device that could be used on current and future programs.
Unmanned Surface Vehicle Requires NetBoot and Commercial Encryption
Tasked with building a new Unmanned Surface Vehicle (USV), a shipbuilder faced challenging requirements. The developer planned to connect all the computer systems via a one gigabit Ethernet (1 GbE) network.

Unmanned Surface Vehicle Requires NetBoot and Commercial Encryption
Tasked with building a new Unmanned Surface Vehicle (USV), a shipbuilder faced challenging requirements. The developer planned to connect all the computer systems via a one gigabit Ethernet (1 GbE) network.
Aircraft Developer Looks to Modernize Storage of Sensitive Data
A leading C5ISR system integrator reached out to Curtiss-Wright in search of network-attached storage (NAS) server that would bring their aging fleet up-to-date.

Aircraft Developer Looks to Modernize Storage of Sensitive Data
A leading C5ISR system integrator reached out to Curtiss-Wright in search of network-attached storage (NAS) server that would bring their aging fleet up-to-date.
Rugged, Secure Data Storage for Propeller-Driven ISR Aircraft
A major aerospace integrator was tasked with designing an intelligence, surveillance, and reconnaissance (ISR) system for a propeller-driven aircraft supporting long-duration missions.

Rugged, Secure Data Storage for Propeller-Driven ISR Aircraft
A major aerospace integrator was tasked with designing an intelligence, surveillance, and reconnaissance (ISR) system for a propeller-driven aircraft supporting long-duration missions.
Unmanned Underwater Vehicle NAS Protects Terabytes of Top Secret Mission Data
In search of a small form factor network attached storage (NAS) solution for a new UUV, an engineer at a defense contractor reached out to Curtiss-Wright. The UUV required a high storage capacity solution to store critical mission data on long-range missions.

Unmanned Underwater Vehicle NAS Protects Terabytes of Top Secret Mission Data
In search of a small form factor network attached storage (NAS) solution for a new UUV, an engineer at a defense contractor reached out to Curtiss-Wright. The UUV required a high storage capacity solution to store critical mission data on long-range missions.
Rugged, Encrypted Data Storage for an ISR Pod
A customer sought a secure data storage solution that could maintain reliability under extreme temperatures and vibration, and be available off the shelf.

Rugged, Encrypted Data Storage for an ISR Pod
A customer sought a secure data storage solution that could maintain reliability under extreme temperatures and vibration, and be available off the shelf.
Protecting Top Secret Data While Extending UAV Mission Duration
A large integrator faced the challenge of protecting Top Secret DAR on a UAV and approached Curtiss-Wright for a solution.

Protecting Top Secret Data While Extending UAV Mission Duration
A large integrator faced the challenge of protecting Top Secret DAR on a UAV and approached Curtiss-Wright for a solution.