Showing 1 - 12 of 53
Meeting DAL A Challenges with Dissimilar Redundant Architecture

Meeting DAL A Challenges with Dissimilar Redundant Architecture

This white paper examines how building a system with a dissimilar redundant architecture can help overcome the challenges of meeting DO-254/178 DAL A requirements.

05/22/2024
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

The goal of post-quantum cryptography (PQC), also called quantum-resistant cryptography (QRC), is to develop cryptographic systems that are secure against both quantum and classical computers and can interoperate with existing communications protocols and networks.

05/22/2024
Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

In this second paper, we cover challenges for deploying QR encryption, including pre-shared key (PSK) management, RFC 8784 - an extension of Internet Key Exchange (IKE) v2 that allows it to be resistant to a quantum computer by using PSKs, and how to implement data-at-rest (DAR) and data-in-transit (DIT) QR encryption solutions today using commercial FPGA devices and off-the-shelf hardware.

05/22/2024
Navigating the Unseen: Mitigating Degraded Visual Environments

Navigating the Unseen: Mitigating Degraded Visual Environments

Using a Degraded Visual Environment (DVE) system enables aircraft pilots to visualize the landing area in poor conditions, allowing them a safe, on-time descent to their target destination.

05/01/2024
DAR Series Part 3: NSA Type 1 Encryption

DAR Series Part 3: NSA Type 1 Encryption

A Type 1 product is a classified or Controlled Cryptographic Item (CCI) endorsed by the NSA for securing classified and sensitive U.S. government information.

04/02/2024
Certifying Multi-Core Processing Following AMC 20-193/AC 20-193 Objectives

Certifying Multi-Core Processing Following AMC 20-193/AC 20-193 Objectives

This white paper examines the key challenges multi-core processors present in safety-certifiable systems, and the traditional and newer, more effective techniques for alleviating them to ensure MCP-based systems will safely perform their intended functions.

04/01/2024
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the NSA CSfC program, data at rest encryption, capability package, protection profiles, components & layers, and trusted integrators.

03/13/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation.

01/04/2024
Webinar: Delivering True Unified Command and Control to the Tactical Edge URL

Webinar: Delivering True Unified Command and Control to the Tactical Edge

Curtiss-Wright's Dominic Perez and REDCOM's Jeff Smith discuss how to choose the correct hardware for land, sea and air with examples from Curtiss-Wright's modular and rugged tactical communication systems.

10/25/2023
System Solutions Brochure

System Solutions Brochure

Whether looking for a modular, SFF LRU or a scalable VPX system designed to meet your program requirements, Curtiss-Wright computing systems are built rugged to perform optimally in the harshest deployed environments on land, in the air, or at sea.

07/12/2023
Webinar: Cross-Domain and Secure Remote Access Solutions at the Edge

Webinar: Cross-Domain and Secure Remote Access Solutions at the Edge

Curtiss-Wright's Dominic Perez and Forcepoint's Rob Link discuss the use of cross domain solutions for securing remote access to classified networks.

07/06/2023
Why Trusted Platform Modules are Critical to Deployed Network Attached Storage

Why Trusted Platform Modules are Critical to Deployed Network Attached Storage

Classified data-at-rest (DAR) in deployed applications faces both internal and external threats that can subject sensitive data to exploitation.

07/06/2023