Showing 1 - 12 of 129
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

The goal of post-quantum cryptography (PQC), also called quantum-resistant cryptography (QRC), is to develop cryptographic systems that are secure against both quantum and classical computers and can interoperate with existing communications protocols and networks.

05/22/2024
Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

In this second paper, we cover challenges for deploying QR encryption, including pre-shared key (PSK) management, RFC 8784 - an extension of Internet Key Exchange (IKE) v2 that allows it to be resistant to a quantum computer by using PSKs, and how to implement data-at-rest (DAR) and data-in-transit (DIT) QR encryption solutions today using commercial FPGA devices and off-the-shelf hardware.

05/22/2024
Defining the C5ISR Space for Army Vehicles

Optimizing Army Vehicle Interoperability with Open Architecture

The goal of reducing the cost of equipping Army vehicles with new capabilities, while adding increasing interoperability and flexibility of operation, can be accomplished through the use of a Modular Open Systems Approach (MOSA), a technical and business strategy for designing an affordable and adaptable system.

05/10/2024
Navigating the Unseen: Mitigating Degraded Visual Environments

Navigating the Unseen: Mitigating Degraded Visual Environments

Using a Degraded Visual Environment (DVE) system enables aircraft pilots to visualize the landing area in poor conditions, allowing them a safe, on-time descent to their target destination.

05/01/2024
Understanding the Power-to-Performance Capabilities of Intel Processors White Paper

Understanding the Power-to-Performance Capabilities of Intel Processors

There is a popular industry misconception that Intel processors draw more power than Power Architecture and Arm processors. This paper discusses how that is not the case.

04/17/2024
Webinar: Compute at the Edge: Selecting CPUs, GPUs, FPGAs for SWaP-Constrained and Rugged Applications

Webinar: Compute at the Edge: Selecting CPUs, GPUs, FPGAs for SWaP-Constrained and Rugged Applications

Dominic Perez, Chief Technology Officer, Curtiss-Wright Defense Solutions, and Aaron Frank, Senior Product Manager, Curtiss-Wright Defense Solutions, talk about critical considerations for selecting CPUs, GPUs and FPGAs for rugged field applications and vehicle platforms with size, weight and power constraints.

04/12/2024
DAR Series Part 3: NSA Type 1 Encryption

DAR Series Part 3: NSA Type 1 Encryption

A Type 1 product is a classified or Controlled Cryptographic Item (CCI) endorsed by the NSA for securing classified and sensitive U.S. government information.

04/02/2024
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the NSA CSfC program, data at rest encryption, capability package, protection profiles, components & layers, and trusted integrators.

03/13/2024
Defense Solutions Product Guide

Defense Solutions Product Guide

Explore Curtiss-Wright's mission-critical solutions based on the latest technologies and open standards. These innovative solutions are trusted and proven for aerospace and defense applications.

02/22/2024
Webinar: Delivering Cloud Capabilities to the Tactical Edge

Webinar: Delivering Cloud Capabilities to the Tactical Edge

Dominic Perez, Chief Technology Officer, Curtiss-Wright Defense Solutions and Brandon Gulla, Vice-President and Chief Technology Officer, Rancher Government Solutions, talk about how to take advantage of containerized and virtualized application infrastructure when moving out of the data center and into the combat scenarios.

01/10/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation.

01/04/2024
Plug-in-Card Security and the SOSA Technical Standard

Webinar: Plug-in-Card Security and the SOSA Technical Standard

Steve Edwards, Director of Secure Embedded Solutions at Curtiss-Wright Defense Solutions, talks about plug-in card security and the SOSA technical standard.

12/20/2023